You are on page 1of 5

Ecommerce Final Exam (40%) February 2018 Time allowed 80 minutes

Part I Multiple Choice: Each question has four suggested answers; choose the
best answer and write the letter of your choice on the space provided

___ 1.  What is an arrangement made between e-commerce sites that direct users from one site to the
other?
a. Spam b. viral marketing c. affiliate program d. none
___ 2. The set of marketing tools that the firm uses to pursue its marketing objectives in the target
market is called
a. Customer mix b. competitor mix c. marketing mix d. all
___ 3. Digital products are best suited for B2C ecommerce because they:
a. Are commodity like products c. can be mass-customized and personalized
b. Can be delivered at the time of purchase d. all of the above
___ 4. The best products to sell in B2C ecommerce are:
a. Small products b. digital products c. specialty products d. fresh products
___ 5. Which segment ecommerce focuses on consumers dealing with each other?
a. B2B b. B2C c. C2B d. C2C
___ 6. Which segment of ecommerce do eBay and Amazon.com belong?
a. B2Bs b, B2Cs c. C2Bs d. C2Cs
___7. When a transaction is processed online, how can the merchant verify the customer’s identity?
a. Use secure socket layers c. use secure electronic transactions
b. Use electronic data interchange d. use financial electronic data interchange
___ 8. Secure socket layers does which of the following?
a.Creates a secure, private connection to a web server c. Sends information over the internet
b. Encrypts information d. All of the above
___ 9. What is hardware and/or software that protects computers from intruders?
a. Backup b. anti-virus c. firewall d. biometrics

___ 10. By encryption of a text we mean

a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

1
___ 11. E-commerce has the following advantages:

a. geographic reach b. 24/7 coverage c. information sharing d. all of the above

___ 12. What type of web technology creates a secure and private connection between two
computers?

a. secure socket layers b. encryption c. internet-locked connection c. sheltered web sites

___ 13. E-commerce includes:-

a. Electronic trading of goods b. Electronic trading of services

c. Electronic Financial transaction d. All of these

___ 14. Which of the following describes e-commerce?

a. Buying products from each other b. Buying services from each other

c. Selling services from each other d. All of the above

___ 15. Which products are people most likely to be more uncomfortable buying on the Internet?
A. Books B. Furniture C. Movies D. All of the above

___ 16. What is the name of the card which can be used by the buyers during the time of purchase
and in which the amount will be immediately debited from the buyers account?
a. E-Distributor b. Debit Card c. Credit Card d. Power Card

___ 17. A firewall is a

a. wall built to prevent fires from damaging a corporate intranet

b. security device deployed at the boundary of a company to prevent unauthorized physical


access

c. security device deployed at the boundary of a corporate intranet to protect it from


unauthorized access

d. device to prevent all accesses from the internet to the corporate intranet

___ 18. By symmetric key encryption we mean

a. one private key is used for both encryption and decryption

b. private and public key used are symmetric

2
c. only public keys are used for encryption

d. only symmetric key is used for encryption

___ 19. Public key encryption method is a system

a. which uses a set of public keys one for each participant in e-Commerce

b. in which each person who wants to communicate has two keys; a private key known to
him only and a public key which is publicized to enable others to send message to him.

c. which uses the RSA coding system.

d. which is a standard for use in e-Commerce.

___ 20. Secure Sockets Layers does which of the following?

a. creates a secure, private connection to a web server

b. encrypts information

c. sends information over the internet

d. all of the above

___ 21. When a transaction is processed online, how can the merchant verify the customer's identity?

a. use secure sockets layers

b. use secure electronic transactions

c. use electronic data interchange

d. use financial electronic data interchange

3
Part II Matching: Match items in column A with items in column B which has
closest meaning and write that letter in the space provided.

Column A Column B

___ 1.Secret Key Cryptography A. protection against the customer’s unjustified denial of
placing an order or merchants’ unjustified denial of
___ 2.Credit cards payments
B. Uses a single key for both encryption and decryption
___ 3.protocol
C. The process of transforming encrypted information so that
___ 4.Cryptography it is intelligible again.
D. Charges will be taken from the customer's checking
___ 5. Authentication account
E. The process of transforming information so it is
___ 6.Non-repudiation unintelligible to anyone but the intended recipient.
F. The mechanism of verifying the identity of the entity (the
___ 7.Encryption
actor) that is attempting to access the system
___ 8.Public Key Cryptography G. A device (e.g., a computer) placed between an
organization's network and the Internet to monitor and
___ 9.Debit cards control all traffic between the Internet and the intranet
H. Issued based on the customer's income level, credit history,
___ 10. Firewall and total wealth
I. A set of rules and procedures that governs the transfer of
information on the Internet
J. The science of writing in secret code
K. Assuring the receiver that the received message has not
been altered in any way from the original
L. Uses one key for encryption and another for decryption

4
Part III Write Short answer for each of the following questions

1. What is the difference between electronic debit card and credit card?

2. What are the advantages of ecommerce?

3. Describe authentication and authorization in short.

4. What forces are fueling e-commerce?

5. List some disadvantages of ecommerce

6. Write some well known ecommerce sites on the Internet

7. What are the two major payment protocols used in ecommerce?

8. Describe the B2C ecommerce business model in short.

9. What are the three electronic commerce frameworks?

You might also like