281. When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as ______________
Spoofing
Unauthorized disclosure
Eavesdropping
Phishing
Correct answer: (B) Unauthorized disclosure
282. ______________ is an electronic file that uniquely identifies individuals and web sites on the internet and enables secure confidential communications.
Digital signature
Digital certificates
Secure electronic transactions
None of these
Correct answer: (B) Digital certificates
283. Marketing is a ______________ process
Goal oriented
Exchange
Social
All of these
Correct answer: (D) All of these
284. Market where goods are transacted on the spot or immediately
Future market
Spot market
Perfect market
None of these
Correct answer: (B) Spot market
285. Market where currencies of different countries are bought and sold.
Money market
Foreign exchange market
Stock market
None of these
Correct answer: (B) Foreign exchange market
286. Risk bearing is a function of ______________
Research
Exchange
Physical supply
Facilitating
Correct answer: (D) Facilitating
287. Behaviour exhibited while purchasing a car is an example of ______________
Dissonance Reduction Buying Behaviour
Variety Seeking Buying Behaviour
Complex Buying Behaviour
Habitual Buying Behaviour
Correct answer: (C) Complex Buying Behaviour
288. The negative feeling which arise after purchase causing inner tension is'known as ______________
Cognitive dissonance
Post purchase dissonance
Buyer's remorse
All of these
Correct answer: (D) All of these
289. Identifying and providing different marketing mix for each of the segments is known as ______________.
Undifferentiated Marketing
Differentiated Marketing
Concentrated Marketing
Customised or Personalised Marketing
Correct answer: (B) Differentiated Marketing
290. Motives which are driven by learning, perception and attitude are known as ______________