Accounting Cycle and Classifying Accounts
Accounting for Merchandising Activities
Accounting for Pensions
Activity Based Costing
Adjusting Accounts for Financial Statements
Analysis and Forecasting Techniques
Analyzing and Recording Transactions
Auditing and Attestation
Business Organisations and Environment
Business Process Performance
California Real Estate
Changes in Accounting Principles
Consolidated Financial Statements
Cost Accumulation Systems
Cost Allocation Techniques
Cost of Capital
Currency Exchange Rates
CVP Analysis and Marginal Analysis
Derivative Instruments and Hedging Activities
Ethical and Professional Standards
Ethics for Management Accountants
Federal Securities Acts
Financial Decision Making
Financial Markets and Securities Offerings
Financial Statements and Accounting Transactions
Florida Real Estate MCQs
Fundamental Accounting Principles
Governmental Accounting-State and Local
Human Resource Management
Internal Auditing and Systems Controls
Investment Risk and Portfolio Management
Long Term Investment
Long Term Securities
Mergers and Acquisitions
Not For Profit Accounting
Principles and Practices of Management
Production and Operations Management
Profitability Analysis and Analytical Issues
Property Plant and Equipment
Responsibility Accounting and Performance Measures
Risk and Procedures for Control
Short Term Financing
Short Term Investment
Standard Costs and Variance Analysis
Statement of Cash Flow
Statement of Comprehensive Income
Statement of Financial Position
System Analysis and Design
Texas Real Estate
Total Quality Management
E Business MCQs
The dimension of e-commerce that enables commerce across national boundaries is called ______________.
The primary source of financing during the early years of e-commerce was ______________.
large retail firms
venture capital funds
initial public offerings
The source of revenue in a subscription revenue model is ______________.
Fees from advertisers in exchange for advertisements
Fees for business referrals
Fees from subscribers in exchange for access to content or services
Fees for enabling or execution a transaction
Industry structure is defined as ______________.
the nature of the players in an industry and their relative bargaining power
a set of plans for achieving long term returns on the capital invested in a business firm
set of planned activities designed to result in a profit in a marketplace
how a company product or service fulfills the needs of customers
A situation where there are no differences among products or services, and the only basis of choosing products is price is known as ______________. ...
a value web
The component of TCP/IP that provides the Internet addressing scheme and is responsible for the actual delivery of packets is ______________.
the Network Layer
the Application Layer
Which of the following is not a limitation of the current Internet?
insufficient capacity throughout the backbone
network architecture limitations
Internet users account for about ______________ of the world population.
The largest component of a Web site budget is ______________.
content design and development
The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server...
Active Server Pages (ASP)
Java Server Pages (JSP)
Common Gateway Interface (CGI)
The most common type of Internet crime according to the IC3 is ______________.
Credit card fraud
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.
a Denial of Service (DoS) attack
A security plan begins with a(n) is ______________.
______________ influence the behavior of others through their personality, skills, or other factors.
Direct reference groups
Indirect reference groups
A(n) ______________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
database management system
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called___...
Which of the following represents a limiting factor for the growth of e-commerce?
Persistent cultural attraction of physical markets and traditional shopping experiences
Inadequate selection of goods compared to physical marketplaces.
E-commerce lacks the convenience of other methods of transacting business
The potential audience for e-commerce is too low to support it as a widespread method of commerce
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
Which of the following statements about privacy is true?
It is a moral right to be left alone
Only corporations and government need to be concerned about it
It has only just recently become a concern
It is most easily obtained on the Internet
The redirection of traffic from a legitimate site to an infringing site is called ______________.
All of the following are acts Congress has passed or attempted to pass to protect children online except ______________.
Video Privacy Protection Act
Children Online Protection Act
Communications Decency Act
Children Internet Protection Act
All of the following are challenges to online retail except ______________.
Consumer concerns about the security of transactions
Consumer concerns about the privacy of personal information given to Web sites
Delays in delivery of goods when compared to store shopping
Inability to change prices nearly instantly
Which of the following is not one of the top three online career service providers?
Which of the following describes paid content relation to free user-generated content?
Free content jeopardizes paid content
Paid content jeopardizes free content
Free content and paid content can both work in tandem cooperatively
Paid content is viable now but will not be in the future
What is the most commonly offered interactive feature of newspaper Web sites?
comments on blogs
All of the following are characteristics of a social network except ______________.
involves a group of people
features shared social interaction
always feature shared goals and purposes
common ties among members
Which of the following is not considered to be a drawback of Internet auctions?
delayed consumption costs
Which portal business model best describes Yahoo?
general purpose portal
affinity group based vertical market
focused content based vertical market
none of the above
All of the following are potential benefits of B2B e-commerce except______________.
reduced amount of first-mover advantages
decreased product cycle time
increased opportunities for collaborating with suppliers and distributors
increased production flexibility
The two main types of Internet-based B2B commerce are______________.
Net marketplaces and private industrial networks
EDI and collaborative commerce
Net marketplaces and collaborative commerce
EDI and private industrial networks
_____________ are networks that connect people within a company to each other and to the company network.
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company products directly ...
A website offering content created by third party transparently to customers is an example of ______________.
E-commerce technologies have improved upon traditional commerce technologies in ______________.
both richness and reach
neither richness nor reach
All of the following are technologies used to gather information about you online except ______________.
All of the following are major B2C business models except ______________.
A perfect market is one in which ______________.
One firm develops an advantage based on a factor of production that other firms cannot purchase
One participant in the market has more resources than the others
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage
______________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client ...
Which of the following is a new and disruptive Web feature or service?
All of the following are steps in the systems development life cycle except ______________.
What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?
Processing of HTTP requests
File Transfer Protocol
The ability to change the product to better fit the needs of the customer is called ______________.
All of the following are major categories of computer viruses except ______________.
The most widely used encryption standard is ______________.
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Universal Encryption Standard (UES)
Optimal Encryption Standard (OES)
The most prevalent online payment method is ______________.
Complete price transparency in a perfect information marketplace is necessary for ______________ to take effect.
the Law of Universal Prices
the Law of One Price
the Law of Perfect Commerce
The process of getting customers to pass along a company marketing message to friends, family, and colleagues is known as ______________.
E-business can be defined as ______________.
the uninhibited flow of information and goods on the Web
the use of the Internet and the Web to transact business
digitally enabled transactions and processes within an organization
commercial transactions involving electronic goods
All of the following are types of social marketing except ______________.
social network advertising
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as _____________...
The Golden Rule
No Free Lunch
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______________ years.
What is the first step in a P3P-enabled transaction?
send Web page
http GET request Web page
Send P3P policy files
http GET request P3P policy files
Products are made to prior to orders received based on estimated demand under a ______________.
The majority of job seekers rely on which of the following?
Internet and newspapers equally
The online content revenue model in which free content drives offline revenues is called the ______________.
Technologies that help enhance resolution of e-book reader display screens are known as ______________.
high-res pixel formatting
screen resolution technologies
sub-screen smoothing technologies
sub-pixel display technologies
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______________.
Which of the following best describes predicted growth in C2C and B2C auction spending?
B2C spending will overtake C2C spending
Both types of spending will increase
C2C spending will decrease while B2C increases
Both types of spending will decline at similar rates
A materials requirements planning (MRP) system is an example of ______________.
a multi-tier supply chain
a legacy computer system
electronic data interchange
All of the following are objectives of private industrial networks except ______________.
developing efficient purchasing and selling business processes industry-wide
operating on a local scale
creating increased supply chain visibility
reducing industry risk
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ______________.
Business to Business (B2B)
Consumer to Consumer (C2C)
Consumer to Business (C2B)
Business to Consumer (B2C)
Why would a merchant want to customize products?
To charge a higher price
To decrease costs
It is required in EC
Customers will only accept customized products
Which one of the following is not one of the major types of e-commerce?
A ______________ is the set of planned activities designed to result in a profit in a marketplace.
Compared to Internet users, the number of cell phone subscribers is ______________.
about the same
Which of the following is not one of the stages of the development of the Internet?
Broadband is generally considered to be any communication technology allowing streaming audio and video at or above ______________.
All of the following are wireless Internet access network technologies except ______________.
The dominant Web server software is ______________.
Which of the following is not a widely used midrange or high-end e-commerce suite?
Microsoft Commerce Server
WebTrends Marketing Lab2
IBM WebSphere Commerce
A worm is designed to spread ______________.
from computer to computer
from file to file on a computer
from Web site to Web site
from Web site to computer
Firewalls perform all of the following functions except ______________.
Forbids communications from untrustworthy sources
Allows communications from trustworthy sources
Eliminates viruses and other malicious attacks
Filters traffic based on packet attributes
All of the following are reasons more people don not shop online except ______________.
lack of trust in online merchants
lack of convenience
inability to touch and feel the product
fear of misuse of personal information
Which of the following market entry strategies are the most common for existing firms?
The fastest growing form of online advertising is ______________.
rich media/video ads
As consumers become more accustomed to new online advertising formats, click-through rates tend to ______________.
The ______________ is the first major effort to adjust the copyright laws to the Internet age.
Platform for Privacy Preferences (P3P)
Center for Democracy and Technology
Digital Millennium Copyright Act (DMCA)
E-Government Act of 2002
The taxation system for e-commerce sales is best described as ______________.
Companies that have a network of physical stores as their primary retail channel, but also have introduced online offerings are called ______________....
Bricks and clicks
Which of the following is the largest online travel service?
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as ______________....
Digital rights management
Digital protection schemes
Digital distribution regulation
Digital rights protection
After television, the next largest major player in the commercial entertainment industry is ______________.
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called ______________. ...
interest-based social network
The most popular type of auction on eBay is the ______________.
Dutch Internet auction
Name Your Own Price auction
Professional service auction
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called ______________.
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an ______________.
Which of the following is not one of the benefits of e-commerce to sellers?
E-commerce offers greater flexibility in meeting customer needs
E-commerce is a powerful tool for customer relationship building
E-commerce can help to reduce costs
E-commerce increases the net cost per contact
______________ marketing is the Internet version of word-of-mouth marketing.
Which of the following is not considered to be one of the three phases of e-commerce?
Which of the following is an example of a portal?
Which of the following is not a horizontal portal?
Which protocol permits users to transfer files from the server to their client computer, and vice versa?
All of the following are examples of 2G wireless phone technologies except ______________.
All of the following are factors in optimizing Web site performance except ______________.
Redundant navigation refers to ______________.
pages that work, load quickly, and point the customer toward your product offerings
simple, fool-proof navigation
a site working with the most popular browsers
alternative navigation to the same content
All of the following are tools for optimizing a Web site location in search engine listings except ______________.
keywords and page titles
identifying market niches
The most common form of securing channels is through ______________.
After sending e-mail, which of the following activities is most common among Internet users?
sending instant messages
reading someone else blog
using a search engine to find information
All of the following are types of data mining except ______________.
selective data mining
query-driven data mining
model-driven data mining
rule-based data mining
All of the following are examples of intelligent agent technology except ______________.
automated response systems
automatic shipping confirmation
order status reports
online web bugs
Copyright © 2015
| All Rights Reserved