IT In Business E-Commerce Past / Likely Questions And Answers Part 3

Share Question on social media:
WhatsApp
Facebook
Twitter

INSTURCTION
Try answering ALL questions and click on SHOW ANSWERS at the bottom of the page to see the suggested answers. All the best!!

Share your comments, answers or questions with us via Whatsapp (+233) 0553969961

1. Which of the following refers to creating products tailored to individual customers?

2. Materials used in the normal operation of a business but not related to primary business operations are called what?

3. Amazon.com is well-known for which e-commerce marketing technique?

4. What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e-commerce or commerce-related activities?

5. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO materials?

6. Which form of e-marketplace brings together buyers and sellers from the same industry?

7. Which type of add appears on a web page?

8. What type of ad appears on top of a web page?

9. What type of ad appears under a web page?

10. Which, if any, of the following types of ads are people most willing to tolerate?

11. Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet?

12. Which of the following is a method of transferring money from one person's account to another?

13. An electronic check is one form of what?

14. If you need to transfer money to another person via the internet, which of the following methods could you use?

15. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

16. A combination of software and information designed to provide security and information for payment is called a what?

17. What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?

18. Which of the following is used in B2B to pay for purchases?

19. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _ _ key, while the key used to decrypt data is called the _ _ key.

20. Secure Sockets Layers does which of the following?

More Questions

Pas-ko.com

Providing Past, Sample & Quiz Questions to help you revise.

                                             -Team

Recent Questions
SPONSORS
CATEGORIES