Essentials of IT for BBA MCQ set 1

Q1. Advertising can build —–, but brands are built through —–.

a. product value; pricing strategies
b. recognition; viral campaigns
c. awareness; customer experience
d. customer loyalty; funding
e. image; television promotion

Answer

awareness; customer experience

Q2: CRM systems are used widely to maintain details about customers like their

a. interactions with the organization
b. purchasing and payment details
c. service needs and other similar details
d. all of the above

Answer

all of the above

Q3: What is followed by the formal steps of testing and implementation.

a. Analysis
b. Maintenance
c. Coding
d. Implementation

Answer

c. Coding

Q4. The phenomenon whereby firms can make money by selling a near-limitless selection of less popular products is known as —–.

a. economies of scale
b. the long tail
c. the grey market
d. economies of scope
e. the product lifecycle

Answer

the long tail

Q5. Firms enjoy —– when they are able to leverage the cost of an investment across increasing units of production.

a. economies of scope
b. absolute advantage
c. complementary benefits
d. scale economies
e. high stock market valuations

Answer

scale economies

Q6. Which term refers to a classification of software that monitors trends among customers and uses this data to personalize an individual customer’s experience?

a. Cloud computing
b. Data warehousing
c. The long tail
d. Collaborative filtering
e. Crowdsourcing

Answer

Collaborative filtering

Q7. When firms find themselves in situations where they are both competitors and partners, the situation is called —–.

a. collaborative filtering
b. strategic balancing
c. crowdsourcing
d. coopetition
e. straddling

Answer

coopetition

Q8. An industry practice whereby content is available to a given distribution channel for a specified time period, usually under a different revenue model is known as —–.

a. hoarding
b. pre-empting
c. stalling
d. scheduling
e. windowing

Answer

windowing

Q9. Removing an organization from a firm’s distribution channel thereby collapsing the path between supplier and customer is known as —–.

a. digital distribution
b. disintermediation
c. outsourcing
d. privatization
e. expulsion

Answer

disintermediation

Q10. —– refer(s) to a limit imposed by the Internet service provider on the total amount of traffic that a given subscriber can consume.

a. spectrum
b. long tail
c. bandwidth caps
d. price ceilings
e. cloudbursting

Answer

bandwidth caps

Q11. —– has allowed Amazon to radically drop the price of Kindle offerings, while increasing device functionality.

a. Network Effects
b. Moore’s Law
c. Publisher subsidies
d. Metcalfe’s Law
e. Robotics-driven inventory turns

Answer

Moore’s Law

Q12. Storing digital goods in the cloud via a firm-controlled standard means a company will create the competitive asset of —–.

a. low-cost
b. switching costs
c. brand
d. scale
e. marginal cost

Answer

switching costs

Q13. The —– defines the rules for communication between Web browsers and Web servers.

a. internet message access protocol
b. session initiation protocol
c. hypertext transfer protocol
d. simple mail transfer protocol
e. file transfer protocol

Answer

hypertext transfer protocol

Q14. Mistyping path or filenames in a Web address may result in a 404 error, which means:

a. incorrect case.
b. document not found.
c. unrecognized command.
d. access denied.
e. bad command or filename.

Answer

document not found

Q15. The —– is a distributed database that looks up the host and domain names that a user enters, and returns the actual IP address for the computer that the user wants to communicate with.

a. Web hosting service
b. cache
c. domain name service
d. uniform resource locator
e. network address translation

Answer

domain name service

Q16. The temporary storage space used to speed up computing tasks like accessing Web sites is called a:

a. recall.
b. buffer.
c. cache.
d. backup.
e. reserve.

Answer

cache

Q17. The —– protocol works at both the start and endpoint of an Internet communication between two computers to ensure perfect copies of messages are sent and received.

a. -transmission control
b. internet message access
c. simple mail transfer
d. internet message control
e. file transfer

Answer

transmission control

Q18. A(n)—– refers to a unit of data forwarded by a network.

a. cache
b. protocol
c. router
d. clip
e. packet

Answer

packet

Q19. The relaying of data packets between the two ends of a communication over the Internet is carried out through special computers called:

a. messengers.
b. servers.
c. exchanges.
d. routers.
e. relays.

Answer

routers

Q20. When different ISPs connect their networking equipment together to share traffic, it is called:

a. load balancing.
b. caching.
c. peering.
d. traffic diffusion.
e. optimizing.

Answer

peering

Q21. High-speed last-mile technologies are usually referred to as:

a. high fidelity.
b. supraband.
c. broadband.
d. hyper-speed.
e. hyper-band.

Answer

broadband

Q22. Wireless systems provided by earth-bound base stations like cell phone towers are referred to as:

a. middle earth wireless.
b. high-fidelity wireless.
c. satellite wireless.
d. terrestrial wireless.
e. geostationary wireless.

Answer

terrestrial wireless.

Q23. One possible solution that can provide improved wireless performance when a home otherwise suffers from poor cellular connectivity is:

a. FTTH
b. femtocell technology
c. DSL (but only in dense urban areas)
d. cable-fiber hybrids, but with one connection to each home.
e. HFT

Answer

femtocell technology

Q24. GitHub and StackOverflow are websites that are especially useful for students and professionals focusing on the —– industries

a. Airline
b. Software development
c. Political science
d. Journalism and publishing
e. Photography

Answer

Software development

Q25. ____ includes social media sites and open source software and involves the participation of users to provide the infrastructure and computational resources that enable a service.

a. Coopetition
b. Collaborative filtering
c. Disintermediation
d. Peer production
e. User aggregation

Answer

peer production

Q26. The phrase —– refers to efforts where participants share access to products and services rather than having ownership.

a. Collaborative consumption
b. Journalism and publishing
c. Political science
d. Software development
e. Photography

Answer

Collaborative consumption

Q27. A Web site anyone can edit directly within a Web browser is known as a —–.

a. cloud site
b. microblog
c. blog
d. torrent
e. wiki

Answer

wiki

Q28. Which of the following is an example of a web service that enables crowdsourcing.

a. All of the above
b. Amazon’s Mechanical Turk
c. None of the above
d. Innocentive
e. TopCoder

Answer

Innocentive

Q29. —– refers to a false online persona created to promote a particular point of view often in praise of a firm, product, or individual.

a. Mirage
b. Image illusion
c. Astroturfing
d. Sock puppet
e. Deceit post

Answer

sock puppet

Q30. Engineering the posting of positive comments and reviews of a firm’s product and services on feedback forums is known as —–.

a. sensationalism
b. lobbying
c. framing
d. censoring
e. astroturfing

Answer

astroturfing

Q31. —– refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

a. Script kiddies
b. Trolls
c. Fraudsters
d. Hacktivists
e. Phishers

Answer

Hacktivists

Q32. Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:

a. Trojans.
b. viruses.
c. adware.
d. worms.
e. botnets.

Answer

trojans

Q33. The —– framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.

a. Snowden
b. UN Encryption Mandate
c. ISO 27000
d. Carbonite
e. OpenSSL

Answer

ISO 27000

Q34. A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:

a. firewall.
b. honeypot.
c. blacklist.
d. security bait.
e. red herring.

Answer

honeypot

Q35. Programs that use —– are highly restrictive, permitting communication only with pre-approved entities.

a. Certificate authorities
b. Blacklists
c. Whitelists
d. Firewalls
e. Safelists

Answer

Whitelists

Q36. Malware —– are a sort of electronic fingerprint often used to recognize malicious code.

a. code patterns
b. code trails
c. impressions
d. signatures
e. digital tags

Answer

signatures

Q37. —– is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote.

a. Phishing
b. Click scam
c. Link fraud
d. SQL injection
e. DNS cache poisoning

Answer

Link fraud

Q38. The term —– refers to Internet content that cannot be indexed by Google and other search engines.

a. lock-in
b. spam
c. dark Web
d. link fraud
e. walled garden

Answer

dark Web

Q39. Ads that run before a user arrives at a Web site’s contents are called —–.

a. third-party cookies
b. landing pages
c. banner ads
d. intermediary ads
e. interstitials

Answer

interstitials

Q40. —– is a nonprofit industry trade group for the interactive advertising industry.

a. Internet Revenue Service
b. Internet Advertising Bureau
c. Interactive Advertising Council
d. Board of Advertising Standards
e. Advertising Bureau of Circulations

Answer

Internet Advertising Bureau

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.