An industry is less attractive for suppliers when the rivalry among existing competitors is:
a. High
b. Low
c. More
d. Less

1 Answer

Answer :

a. High

Related questions

Description : According to the five factors model, an attractive industry would have all of the following characteristics EXCEPT: A. Low barriers to entry. B. Suppliers with low bargaining power. C. A moderate degree of rivalry among competitors. D. Few good product substitutes.

Last Answer : Low barriers to entry.

Description : According to the five factors model, an attractive industry would have all of the following characteristics EXCEPT: A. Low barriers to entry. B. Suppliers with low bargaining power. C. A moderate degree of rivalry among competitors. D. Few good product substitutes.

Last Answer : A moderate degree of rivalry among competitors.

Description : If it is easy for competitors to enter the market, the threat of new entrants is considered: a. High b. Low c. More d. Less

Last Answer : a. High

Description : Which one of the following is NOT included in the Porter’s Five Forces model: A. Potential development of substitute products B. Bargaining power of suppliers C. Rivalry among stockholders D. Rivalry among competing firms

Last Answer : Rivalry among stockholders

Description : Which one of the following is NOT included in the Porter’s Five Forces model: A. Potential development of substitute products B. Bargaining power of suppliers C. Rivalry among stockholders D. Rivalry among competing firms

Last Answer : Rivalry among stockholders

Description : The threat of new entrants is high when it is: a. Hard for customers to enter the market b. Hard for competitors to enter the market c. Easy for competitors to enter the market d. Easy for customers to enter the market

Last Answer : c. Easy for competitors to enter the market

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : All of these, except__________, are part of Porter's competitive forces in industry analysis. a. potential entry of new competitors b. bargaining power of suppliers c. development of substitute products d. bargaining power of union

Last Answer : bargaining power of union

Description : Industry analysis should include information on – a) Market size of competitor’s product b) Growth rate of suppliers c) New product entry d) Economic conditions

Last Answer : d) Economic conditions

Description : Which form of e‐marketplace brings together buyers and sellers from the same industry? a. horizontal b. Vertical c. Integrated d. Inclined

Last Answer : b. Vertical

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : Following is not a part of Internet Micro-Environment  Customers  Competitors  Suppliers  Technology

Last Answer :  Technology

Description : Changing the relationship with and services provided to customers in such a way that they will not think of changing suppliers is called …………. A) Lock in customers B) Lock out customers C) Lock in competitors D) Lock out competitors

Last Answer : A) Lock in customers

Description : Micro environment consists of ? A. suppliers B. marketing C. competitors D. all of the above

Last Answer : D. all of the above

Description : A continually evolving network of independent companies, suppliers, customers, even competitors, linked together to share skills, costs, and access to one another s markets is called a/an ... Virtual organization ; (b) Boundaryless organization ; (c) Modular organization (d) Integrated organization

Last Answer : (a) Virtual organization ;

Description : When the price is less than the average variable cost, the firm should . (a) Continue to operate till the market recover ; (b) Shut down its operation for the time being (c) Retrench ... compensation; (d) Clear the existing stock at a price less than the prevailing price to beat the competitors

Last Answer :  (b) Shut down its operation for the time being

Description : If the threat of substitute products or services is low it is a(n): a. Disadvantage to the supplier b. Advantage to the buyer c. Advantage to the supplier d. None of the above

Last Answer : c. Advantage to the supplier

Description : Michael Porter has identified five forces that determine the intrinsic long-run attractiveness of a market or market segment. Which of the following would NOT be among Porter’s five forces? A. Industry competitors B. Technological partners C. Substitutes D. Buyers E. Potential entrants

Last Answer : B. Technological partners

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : Which products are people most likely to be more uncomfortable buying on the Internet? a. Books b. Furniture c. Movies d. All of the above

Last Answer : b. Furniture

Description : A product is a price leader when: A)it is sold at the highest possible price. B)an increase in price leads to increased revenue C)it sometimes is sold at less than cost in the hope that sales of other products will increase. D)its price leads the industry and competitors follow with similar prices.

Last Answer : C)it sometimes is sold at less than cost in the hope that sales of other products will increase. D)its price leads the industry and competitors follow with similar prices.

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None

Last Answer : a. On Time Password

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b

Last Answer : d. Both a and b

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above

Last Answer : d. All the above

Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above

Last Answer : d. All the above

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code