Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1) The Deliver components of ECM present information from the Manage, Store,
and Preserve components.
9) Online shopping is the process of buying goods and services from merchants
who sell on the Internet.
10) Instant messaging is a bit more private than a typical chat room.
11) Store involves the long-term, safe storage and back-up of static, unchanging
information.
13) The R.A. 8792 is also known as the e-Commerce Act of 2000.
15) The e-Commerce is the buying and selling of products or services over the
electronic systems.
Multiple choices:
1. C
2. B
3. A
4. D
5. A
6. C
7. B
8. D
9. A
10. D
11. B
12. D
13. D
14. D
15. C
16. D
17. C
18. D
19. D
20. B
Multiple choices:
1. R.A 8792 was signed into last?
A. June 14, 2001
B. June 24, 2000
C. June 14, 2000
D. June 24, 2001
2. All existing laws such as the Consumer Act of the Philippines also apply to e-
commerce transactions.
A. Sec 32
B. Sec 33
C. Sec 34
D. Sec 35
10. Which of the following is part of the four main types for e‐commerce?
A. B2B
B. B2C
C. C2B
D. All of the above
12. Digital products are best suited for B2C e‐commerce because they:
A. Are commodity like products?
B. Can be mass‐customized and personalized
C. Can be delivered at the time of purchase
D. All of the above
13. What is the name given to an interactive business providing a centralized
market where many buyers and suppliers can come together for e‐commerce or
commerce‐related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
14. What punishment is given to crimes like hacking or cracking under the E-
Commerce Law?
A. Imprisonment only
B. Fines only
C. No penalties
D. Imprisonment and fines
15. Achieving marketing objectives through the use of any electronic communication
technology refers to
A. E-business
B. E-commerce
C. E-marketing
D. Internet Marketing
17. Which of the following is not considered to be one of the three phases of e-
commerce?
A. Innovation
B. Consolidation
C. Preservation
D. Reinvention
20. Which of the following is used to verify the identity of the person purporting
to provide an electronic signature?
A. file formatting
B. a digital certificate
C. a court order
D. information security