| |
| Question No: 1 |
|
Which of the following is the least attractive product to sell online?
|
| |
|
| . Downloadable music |
| Software |
| A pda |
| Electronic stock trading |
|
| |
| Question No: 2 |
|
Security-and-risk services include--
|
| |
|
| Firewalls & policies for remote access |
| Encryption and use of passwords |
| Disaster planning and recovery |
| All of the above |
|
| |
| Question No: 3 |
|
Software, music, digitized images, electronic games, pornography can be revenue sources for the B2C e-commerce --
|
| |
|
| Selling services |
| Doing customization |
| Selling digital products |
| Selling physical products |
|
| |
| Question No: 4 |
|
For selling physical products on the Internet, what is the key to profitability?
|
| |
|
| Hook |
| Cost Control |
| Brand Recognition |
| Customization |
|
| |
| Question No: 5 |
|
Digital products are particularly appealing for a company's bottom-line because of--
|
| |
|
| The freedom from the law of diminishing returns |
| The integration of the value chain |
| The increasing brand recognition |
| The changes they bring to the industry |
|
| |
| Question No: 6 |
|
In the e-mail address, jgreen03@gsm.uci.edu, what is the top-level domain?
|
| |
|
| gsm |
| uci |
| . edu |
| none of these |
|
| |
| Question No: 7 |
|
It is particularly difficult to maintain the competition advantage based on ________.
|
| |
|
| . Quality |
| Efficiency |
| Price |
| Internal Cost Reduction |
|
| |
| Question No: 8 |
|
Business Plans are important when trying to find capital to start up your new business. Important
elements of a business plan include--
|
| |
|
| Sales and marketing |
| Human resources handbook |
| Business description |
| a and c above |
|
| |
| Question No: 9 |
|
On which forms of e-commerce does Dell Computer Corporation rely in conducting its business?
|
| |
|
| B2E |
| B2C |
| B2B |
| All of the above |
|
| |
| Question No: 10 |
|
These are all uses of plug-ins except--
I. Air fresheners
II. Speed up data transmission
III. Enhance browser capability
IV. To view different file types
|
| |
|
| I and II |
| III and IV |
| I |
| I and IV |
|
| |
| Question No: 11 |
|
What is the 'last mile' in the last mile problem? The link between your--
|
| |
|
| Computer and telephone |
| Home and telephone provider's local office |
| Office and server |
| Home and internet service provider |
|
| |
| Question No: 12 |
|
Just after your customers have accepted your revolutionary new e-commerce idea, which of the following is not expected to immediately happen?
|
| |
|
| Competitor catch-up moves |
| Commoditization |
| First-mover expansion |
| None of the above |
|
| |
| Question No: 13 |
|
B2B & B2C IT initiatives can use the--
|
| |
|
| Same E-Commerce platforms |
| Not use same IT platform |
| Can not say |
| All are true |
|
| |
| Question No: 14 |
|
Which is/are types of e – commerce?
|
| |
|
| B2B |
| B2C |
| C2C |
| All the above |
|
| |
| Question No: 15 |
|
Where do CGI (Common Gateway Interface) application programs or scripts run?
|
| |
|
| . On the client through a web browser |
| On the client through temporary stored files |
| On the web server |
| Where the user installs them |
|
| |
| Question No: 16 |
|
What are the 3 types of web information system logic?
|
| |
|
| Presentation, business, information/data |
| Presentation, information/data, active server pages |
| Business, information/data, client/server |
| None |
|
| |
| Question No: 17 |
|
Which of the following items is used to protect your computer from unwanted intruders?
|
| |
|
| A cookie. |
| A browser. |
| A firewall. |
| A server. |
|
| |
| Question No: 18 |
|
AsianAvenue.com, BlackVoices.com, iVillage.com, SeniorNet.org; are the examples of what?
|
| |
|
| Intermediary Services websites |
| Physical Communities |
| B2C websites |
| Virtual Communities |
|
| |
| Question No: 19 |
|
Which is more significant for web based advertisers?
|
| |
|
| Impressions |
| Page Views |
| Click Thoughts |
| Hits |
|
| |
| Question No: 20 |
|
What is the most significant part of e-commerce?
|
| |
|
|
|
| |
| Question No: 21 |
|
Much of Amazon.com's initial success can be attributed to which of the following?
|
| |
|
| Low prices |
| Brand recognition |
| Fast web connections |
| Customer service |
|
| |
| Question No: 22 |
|
E-commerce increases competition by, erasing geographical boundaries, empowering customers and
suppliers, commoditizing new products, etc. How do companies usually solve this problem?
|
| |
|
| By competing on price |
| By selling only through traditional channels |
| By lowering costs |
| By creating attractive websites |
|
| |
| Question No: 23 |
|
Why can't new connection infrastructure like DSL, Cable Modem, and fiber optics solve the last mile
problem?
|
| |
|
| Availability |
| Cost |
| Distance |
| All of the Above |
|
| |
| Question No: 24 |
|
What's the real potential of e-commerce?
|
| |
|
| Making a profit |
| Generating Revenue |
| Improving efficiency |
| Buying and selling on the internet and WWW |
|
| |
| Question No: 25 |
|
Which of the following is an example of the supply chain of commerce?
|
| |
|
| A company turns blocks of wood into pencils. |
| A department supplies processed data to another department within a company. |
| A consumer purchases canned vegetables at the store. |
| None of the above |
|
| |
| Question No: 26 |
|
An application layer protocol, such as FTP or HTTP--
|
| |
|
| Is transparent to the end user. |
| Is not transparent to the end user. |
| Are not application layers protocols |
| None of these |
|
| |
| Question No: 27 |
|
Two computers can communicate using different communication protocols by using--
|
| |
|
|
|
| |
| Question No: 28 |
|
In which of the models, the application logic is partitioned among the clients and multiple specialized servers?
1. Two tier
2. Three tier
3. N tier
|
| |
|
|
|
| |
| Question No: 29 |
|
What e-commerce category is the largest in terms of revenue?
|
| |
|
| Business to Business (B2B) |
| Intra-Business (B2E) |
| Business to Consumer (B2C) |
| Consumer to Consumer (C2C) |
|
| |
| Question No: 30 |
|
Which of the following B2C companies is the best example of achieving its financial success through controlling its cost?
|
| |
|
| Yahoo |
| Amazon |
| E-Bay |
| Google |
|
| |
| Question No: 31 |
|
The primary focus of most B2C applications is generating ____.
|
| |
|
| Revenue |
| Product |
| Service |
| Web Site |
|
| |
| Question No: 32 |
|
The differences between B2B and B2C exchanges include--
I. Size of customer set
II. Transaction volume
III. Form of payment
IV. Level of customization on products/services
|
| |
|
| I and II |
| I, II, and III |
| II and III |
| All of the above |
|
| |
| Question No: 33 |
|
What do you think cookies do?
|
| |
|
| They are threat to privacy |
| The help the user not to repeat some input info |
| They personalize user's webpage |
| b and c |
|
| |
| Question No: 34 |
|
What type of application has the potential to change a market or even create a new market?
|
| |
|
| Software application |
| Intelligent application |
| Killer application |
| Business application |
|
| |
| Question No: 35 |
|
Based on the study, in the supply side initiatives, which of the following clusters was the only one found to be critical enterprise-wide?
|
| |
|
| IT management |
| Communications |
| Data management |
| IT-architecture-and-standards |
|
| |
| Question No: 36 |
|
Why did the e-commerce boom, as evidenced by soaring stock prices of Internet businesses such as Pets.com and eToys went bust in 2000?
|
| |
|
| Websites started by techies who lack business knowledge |
| Lack of good business model |
| Investors' and entrepreneurs' greed and ignorance |
| All of the above |
|
| |
| Question No: 37 |
|
A system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment best defines--
|
| |
|
| A web site. |
| A web location. |
| The World Wide Web. |
| An intranet. |
|
| |
| Question No: 38 |
|
Which of the following is a function of a proxy server?
|
| |
|
| Maintaining a log of transactions |
| Caching pages to reduce page load times |
| Performing virus checks |
| Forwarding transactions from a user to the appropriate server |
|
| |
| Question No: 39 |
|
Which of the following statements about E-Commerce and E-Business is true?
|
| |
|
| E-Commerce involves buying and selling over the internet while E-Business does not. |
| E-Commerce is B2C (business to consumer) while E-Business is B2B (business to business). |
| E-Business is a broader term that encompasses E-Commerce (buying and selling) as well as doing other forms of business over the internet. |
| None of the above. |
|
| |
| Question No: 40 |
|
B2B involves small, focused customers
|
| |
|
| customization of products and services |
| All of above Set with large transaction volume per customer |
| Periodic consolidated payments |
| Significant |
|