4. Pick the correct statement. A. Transmission Control Protocol is the communication network protocol used on the internet. B. Internet Protocol performs routing and addressing. C. Aand B. D. none of the above. 5. The two methods of transporting data across a network are A. e-mail and fax. B. fax and scanner. C. scanner and e-mail. D. circuit and packet switch. 6. Messages can be sent from one computer to another only when A. every server on the internet is uniquely addressable. B. they are the same brands. C. they are being operated by the same person. D. none of the above. 7. The key elements of the Web are: A. None at all here. B. URL and HTML. C. Network Protocol. D. B and C 8. Which of these are the components of Secure Electronic Transaction? A. cardholder wallet; and merchant server. B. payment gateway; and certificate authority. C. merchant server; and payment gateway. D. All of the above. 9. Which of the following is an example of authentication mechanism for personal characteristic? A. All of them below. B. Fingerprint. C. Voiceprint. D. Hand size. 10. Which of the following statements is NOT correct? a. Customers are not a viable source of innovative ideas, and firms need not find efficient and effective means of continual communication with customers. b. Failure to match competitors' unit costs-inefficiency is a strategic challenge. c. The need to process high volume physical flows is likely to result in economies of scale. d. Electronic commerce offers many opportunities to reformulate traditional modes of business.
4. Pick the correct statement. A. Transmission Control Protocol is the communication network protocol used on the internet. B. Internet Protocol performs routing and addressing. C. Aand B. D. none of the above. 5. The two methods of transporting data across a network are A. e-mail and fax. B. fax and scanner. C. scanner and e-mail. D. circuit and packet switch. 6. Messages can be sent from one computer to another only when A. every server on the internet is uniquely addressable. B. they are the same brands. C. they are being operated by the same person. D. none of the above. 7. The key elements of the Web are: A. None at all here. B. URL and HTML. C. Network Protocol. D. B and C 8. Which of these are the components of Secure Electronic Transaction? A. cardholder wallet; and merchant server. B. payment gateway; and certificate authority. C. merchant server; and payment gateway. D. All of the above. 9. Which of the following is an example of authentication mechanism for personal characteristic? A. All of them below. B. Fingerprint. C. Voiceprint. D. Hand size. 10. Which of the following statements is NOT correct? a. Customers are not a viable source of innovative ideas, and firms need not find efficient and effective means of continual communication with customers. b. Failure to match competitors' unit costs-inefficiency is a strategic challenge. c. The need to process high volume physical flows is likely to result in economies of scale. d. Electronic commerce offers many opportunities to reformulate traditional modes of business.
Chapter18: Personal Selling And Sales Promotion
Section18.2: Salesforce.com Sold On Stakeholder Satisfaction
Problem 1C
Related questions
Question

Transcribed Image Text:4. Pick the correct statement.
A. Transmission Control Protocol is the communication network protocol used on the
internet.
B. Internet Protocol performs routing and addressing.
C. Aand B.
D. none of the above.
5. The two methods of transporting data across a network are
A. e-mail and fax.
B. fax and scanner.
C. scanner and e-mail.
D. circuit and packet switch.
6. Messages can be sent from one computer to another only when
A. every server on the internet is uniquely addressable.
B. they are the same brands.
C. they are being operated by the same person.
D. none of the above.
7. The key elements of the Web are:
A. None at all here.
B. URL and HTML.
C. Network Protocol.
D. B and C

Transcribed Image Text:8. Which of these are the components of Secure Electronic Transaction?
A. cardholder wallet; and merchant server.
B. payment gateway; and certificate authority.
C. merchant server; and payment gateway.
D. All of the above.
9. Which of the following is an example of authentication mechanism for personal
characteristic?
A. All of them below.
B. Fingerprint.
C. Voiceprint.
D. Hand size.
10. Which of the following statements is NOT correct?
a. Customers are not a viable source of innovative ideas, and firms need not find efficient
and effective means of continual communication with customers.
b. Failure to match competitors' unit costs-inefficiency is a strategic challenge.
c. The need to process high volume physical flows is likely to result in economies of scale.
d. Electronic commerce offers many opportunities to reformulate traditional modes of
business.
AI-Generated Solution
Unlock instant AI solutions
Tap the button
to generate a solution