Ec_quiz_01_final_with_answers.docx

  • Uploaded by: NANDAN JAISWAL
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ec_quiz_01_final_with_answers.docx as PDF for free.

More details

  • Words: 2,228
  • Pages: 6
Which products are people most likely to be more uncomfortable buying on the Internet? Furniture Books Movies All The best products to sell in B2C e-commerce are: Small products Digital products Specialty products

Fresh products

In which website Global Easy Buy is facilitated? Ebay.com Amazon.com Yepme.com

None of these

Which type deals with auction? B2B B2C

C2B

C2C

Which segment is eBay an example? B2B C2B

C2C

None

Which type of e-commerce focuses on consumers dealing with each other? C2C B2B B2C C2B Which products are people most likely to be comfortable buying on the Internet? All Books PCs CDs The solution for all business needs is EDI ERP

SCM

None

Which is a function of E-commerce marketing advertising

warehousing

ALL

Which is not a function of E-commerce marketing advertising

warehousing

NONE

What is the percentage of customers who visit a Web site and actually buy something called Click-through Spam Conversion rate ? Affiliate programs Which segment do eBay, Amazon.com belong? B2Cs B2Bs

C2Bs

C2Cs

Which of the following is part of the four main types for e-commerce? B2C B2B C2B All Which of the following describes e-commerce? Doing business electronically

Doing business

Sale of goods

All

Which of the following examines information passing through switches, hubs, or routers? Packet sniffer Key logger Log analysis Screen captures tools What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? Reverse auction B2B marketplace Intranet Internet plastic card having the size of a credit card and containing an embedded chip on which digital information is stored Smart cards CRM systems cards E-government ID cards FEDI cards

Materials used in production in a manufacturing company or are placed on the shelf for sale in a retail Direct environment materials Indirect materials EDI None What are materials that are necessary for running a modern corporation, but do not relate to the company’s primary business activities?

Direct materials

Indirect materials

EDI

None

What are ballpoint pens purchased by a clothing company ? Direct materials

Indirect materials

EDI

None

Most individuals are familiar with which form of e-commerce ? B2B

B2C

C2B

C2C

Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?

Affiliate programs

Click-through

Spam

All

All of the following are techniques B2C e-commerce companies use to attract customers , except: Registering with search Viral marketing Online ads Virtual marketing engines

Digital products are best suited for B2C e-commerce because they: Are commodity like products

mass-customized & personalized

delivered at the time of purchase

All

Which form of e-commerce currently accounts for about 97% of all e-commerce revenues ? B2C

B2B

C2B

C2C

Which of the following are advantages normally associated with B2B e-commerce? Reaches wider Reduction in costs Shorter cycle All audiences time An industry is less attractive for suppliers when the rivalry among existing competitors Low More Less is:High If it is easy for competitors to enter the market, the threat of new entrants is considered: High Low More Less The threat of new entrants is high when it is: Hard for customers to enter the market

Hard for competitors to enter the market

Easy for competitors to enter the market

Easy for customers to enter the market

If the threat of substitute products or services is low it is a(n): Disadvantage to supplier

Advantage to the buyer

Advantage to supplier

None

Which of the following is a method of transferring money from one persons account to electronic check credit card e-transfer none another? An electronic check is one form of what? e-commerce online banking

e-cash

check

If you need to transfer money to another person via the internet, which of the following methods could you use? ALL financial E-bill presentment ELECTRONIC CHQUE

cybermediary PAY Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? financial E-bill presentment ELECTRONIC CHQUE ALL PAY cybermediary A combination of software & information designed to provide security and information for digital wallet pop up ad shopping cart encryption payment is called Name for direct computer-to-computer transfer of transaction information contained in EDI internet e-commerce trans info business doccommerce transfer What sends work assignments through an e-mail system ? Database-based enterprise information portal

Which will not harm

Messaging-based enterprise info portal

computer resources

Database-based workflow system

Messaging-based workflow system

firewall

Virus

Which is not a function of ERP? Warehousing sales

Trojan horse

NONE

scheduling

NONE

Which factor determines when your IT system will be available for knowledge workers to Availability Accessibility Reliability NONE access? Which factor determines who has the right to access different types of IT systems and information? Availability Accessibility Reliability Scalability Which factor ensures your IT systems are functioning correctly and providing accurate information? Reliability Availability Accessibility Scalability Which factor represents how well your system can adapt to increased demands? Availability

Accessibility

Reliability

Scalability

Which factor represents a systems ability to change quickly? Flexibility

Performance

Capacity planning

Benchmark

What is a set of conditions used to measure how well a product or system functions? Flexibility

Performance

Capacity planning

Benchmark

What determines the future IT infrastructure requirements for new equipment and additional network capacity? Capacity planning Flexibility Performance Benchmark What automates business processes? Workflow

ASP

Workflow system

EIP

What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? Workflow

EIP

Workflow system

SLA

Which concept suggests that different apps and computer systems should be able to communicate with one another? Interoperability Integration Web services Scalability Which service encompasses all technologies used to transmit and process information on an across a network? Interoperability Scalability Benchmarking Web services

Which process can prevent data from lose due to computer problems or human errors? backup

recovery

benchmarking

data cleansing

Which process is used to reinstall data from a copy when the original data has been lost? recovery backup benchmarking data cleansing Who protects system from external threats? firewall

EDI

ERP

Script kiddies

What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

Performance

Capacity planning

Benchmarking

Data cleansing

Which of the following statements accurately reflect the impact of technology? caused buyer power to increase

lessened entry increased threat of ALL barriers for many substitute P & S What is a separate facility industries that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? Disaster recovery cost curve

Disaster recovery Hot site plan Which of the following is the primary characteristic of an intranet? People outside the People inside the People outside the organization can’t organization can organization can’t access it access it access it Separate & fully equipped facility where the company move immediately Disasterbusiness recovery cost Hot site Cold site & resume curve

Which of the following is used in B2B to pay for purchases ? EDI E-commerce Financial EDI

Cold site

NONE after the disaster Disaster recovery plan Electronic checks

Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key encryption, private, public encryption, public, private decryption public Secure Sockets Layers does which of the following? creates a secure sends information encrypts ALL private connection to over the internet information a web server When a transaction is processed online, how can the merchant verify the customers

identity? use secure sockets layers

use secure E-transactions

use EDI

use financial EDI

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information spoofing hacking cracking is termed? dumpster diving What is a model of a proposed product, service, or system? Prototyping

Proof-of-concept Selling prototype prototype What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a Client/server Extranet Thin client combination of the two) ? Intranet network What is an intranet, restricted to an organization & certain outsiders, such as customers Extranet Client/server Intranet Thin client & suppliers ? network What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? Disaster recovery Disaster recovery plan Hot site Cold site cost curve Prototype

What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? Disaster recovery Disaster recovery Hot site Cold site cost curve plan Which is a function of ERP ? Warehousing sales

scheduling

ALL

Who breaks into other peoples computer systems and steals and destroys information? Hackers softwares Hacktivists Script kiddies What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about? Anonymous Web Web log Clickstream NONE browsing service ERP stands for Enterprise resolution planning

Enterprise reverse planning

Which is not a component of ERP? Legacy systems Bolt on applications Which is not a function of ERP? Human resource Financial management

Enterprise resource planning

NONE

Operational database

Cybersoft

Warehousing

NONE

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic? Denial-of-service Computer virus Worm NONE attack 1 GEOP BYTE = _ _ _ _ BRONTO BYTES , 1 BRONTO BYTE = _ _ _ _ YOTTA BYTES 1 YOTTA BYTE = _ _ _ _ ZETTA BYTES , 1 ZETTA BYTE = _ _ _ _ EXA BYTES 1 EXA BYTE = _ _ _ _ PETA BYTES , 1 PETA BYTE = _ _ _ _ TERRA BYTES 512

1000

256

1024

What floods a Web site with so many requests for service that it slows down or crashes? Denial-of-service attack Computer virus Worm NONE

What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? NONE Denial-of-service Worm Computer virus attack A business cannot be all things to all people. Instead, a business must: Identify the value of None ALL products/services as perceived by Which of the following is ancustomers Internet-based company that makes it easy for one person to pay another over the Internet? electronic bill electronic check conversion rates financial cybermediary presentment and paymenttypes of ads are people most willing to tolerate ? Which, if any, of the following

Identify target customers

pop-under ad

pop-up ad

banner ad

NONE

What type of ad appears under a web page ? pop-under ad pop-up ad

banner ad

discount ad

What type of ad appears on top of a web page ? pop-up ad pop-under ad

banner ad

discount ad

Which type of add appears on a web page ? pop-under ad Pop-up ad

Banner ad

Discount ad

Which form of e-marketplace brings together buyers and sellers from the same industry ? Vertical Horizontal Integrated Inclined Form of e-marketplace brings together buyers and sellers from multiple industries, often Vertical Integrated Inclined forHorizontal MRO materials What is the name given to an interactive business providing a centralized market where many buyers and Electronic ? marketplace Direct marketplace B2B B2C suppliers can come together for e-commerce or commerce-related activities Amazon.com is well-known for which e-commerce marketing technique ? Affiliate programs Banner ads Pop-up ads

Viral marketing

Materials used in the normal operation of a business but not related to primary business operations are called Indirect materials Supplies Direct materials Daily stuff

Which of the following refers to creating products tailored to individual customers ? customization aggregation Direct materials Reverse auction A business competing in a commodity like environment must focus on which of the following ALL Ease speed of Ease of ordering ? Price delivery Which type of products is lesser purchased using e-commerce ? Automobiles Books Softwares None How the transactions occur in e-commerce ? Using mobile phones Using e-medias Using computers None only only A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? Entry barriers Switching costs Loyalty programs Affiliate programs Which of the following is not related to security mechanism e-cash encryption decryption

ALL

Which of the following is a useful security mechanism when considering business strategy encryption decryption firewall all and IT ? Paisapay is facilitated in eBay.co.in amazon.com

flipkart.com

None

Engineering products

None

Unique value auction is mainly applies to ? New products

Second hand products

What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness ? Risk management Risk assessment Security None What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets ? Risk assessment Risk management Security None

More Documents from "NANDAN JAISWAL"