You are on page 1of 12

DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

Page 1
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

Q1. Select the appropriate option

1. Digital enablement of transactions and processes within a firm is called


(a) E-commerce (b) E-business
(c) M-commerce (d) None of these

2. Commercial transactions cone with the help of cell phones or PDA's is


called_______
(a) M-commerce (b) E-commerce
(c) E-business (d) Peer to Peer

3. In _______ revenue model, revenue is generated from sales of goods,


information or services.
(a) Advertising (b) Affiliation
(c) Sales (d) Transaction

4. _______business model offers an integrated package of content services


and content search, news, emails, chat etc.
(a) Content provider (b) E-tailor
(c) Market creator (d) Portal

5. ________business model create market that bring worldwide buyers and


sellers together.
(a) Market creator (b) Transaction broker
(c) content provider (d) Community provider

6. _____ dimension of e-commerce security deals with alternation done


during transmission.
(a) Authenticity (b) Privacy
(c) Non-repudiation (d) Integrity

7. In________encryption, both the sender and the receiver uses the. same key.
(a) Secret key (b) Public key
(c) Symmetric key (d) both (a) and (c)

8. In online store value system, cared that have embedded chips that store
personal information is called________.
(a) Credit card (b) Stored card
(c) Chips card (d) Smart card

Page 2
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

9. -_____ authenticate card holder and merchant identity through use of


digital certificates.
(a) SSL (b) Private Key
(c) SET (d) digital signature

10. ________ payment system allows users to make micro payment and
purchases on web from accumulated debit balance.
(a) Digit cash (b) Digital accumulating balance
(c) Stored value system (d) Smart card.

11. In ________encryption both the sender and receiver uses the same key.
(a) Symmetric key (b) Asymmetric key
(c) Public Key (d) both (A) and (C)

12. The full from the P2P in E-commerce is________.


(a) Peer to Peer (b) Person to Person
(c) Peer to Person (d) Person to Peer

13. The full from the B2B in e-Commerce is_______.


(a) Bill to Bill (b) Business to Business
(c) Bill to Business (d) Business to Bill

14. The full from of B2C in E- commerce is________.


(a) Business to care (b) Business to case
(c) Business to Customer (d) Business to Core
15. The full from of C2C in E-commerce is________.
(a) Consumer to Commerce
(b) Commerce to Consumer
(c) Consumer to Consumer
(d) Commerce to Commerce

16. The full from of HTTP in E-Commerce is Hyper Tax Transfer________.


(a) Paper (b) Protocol
(c) Power (d) Place

17. The full from of SET in E-Commerce is________.


(a) Secure Electronic Tax (b) Secure Electronic Transaction
(c) Secure Electronic Territory (d) Secure Electronic Tunnel

18. The full from of SSL in E-Commerce is________.


(a) Secure Socket Layer (b) Secure Socket Loop
(c) Secure Socket Locket (d) Secure Socket Liaison

Page 3
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

19. The full from of WAP in E-Commerce is Wireless ________Protocol


(a) And (b) App
(c) Application (d) Area

20. Generally most people are familiar with ________from of E-Commerce


(a) B2B (b) C2B
(c) B2C (d) C2C

21. The maximum number of transactions done in E-Commerce are of


________type.
(a) B2B (b) C2B
(c) B2C (d) C2C

22. In________ E-Commerce the consumers deal with each other.


(a) B2B (b) C2B
(c) C2C (d) B2C

23.________is part of E-Commerce.


(a) B2B (b) C2C
(c) B2C (d) All of These

24. The emerging market economy where consumer's producers and merchants interact
electronically is called________.
(a) E-Commerce . (b) E-Market
(c) Supermarket (d) EDI

25. A Computer to Computer exchange of business transaction is called


(a) E-Commerce (b) EDI
(c) E-Market (d) M-Commerce

26. Buying and selling goods and services over the Internet is called________.
(a) EDI (b) Internet Commerce
(c) E-Commerce (d) E-Market

27. The process of converting intelligible data into unintelligible data is called
(a) Encryption (b) Decryption
(c) EDI (d) E-Market

28. Conversion of data into code is called________.


(a) Firewall (b) Decryption
(c) Encryption (d) Password

29. Which product people more likely to be comfortable buying on the Internet?

Page 4
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

(a) Clothing (b) Food


(c) Furniture (d) All product
30. Which term describes the percentage of people who visit a website and buy
something?
(a) Affiliates (b) Click-through
(c) Spam (d) Conversion rate

31. In E-Commerce, to authenticate the sender of the message we use


(a) Digital signature (b) Privacy protocol
(c) Digital sending (d) Digital protocol

32. An SSL does not provide________.


(a) Integrity (b) Data security
(c) Authentication (d) Confidentiality

33. ________; is a convention that all sites that use SSL connection while
making a secure connection use instead of HTTP.
(a) HTTPS (b) POP
(c) FTP (d) TCP/IP

34. SET ensures


(a) Authentication
(b) Non-repudiation
(c) Both authentication and repudiation
(d) None of the above

35. Ebay.com is________.


(a) Only C2C (b) Only B2C
(c) Only B2B (d) Both B2B & B2C

36. Decryption refers to________.


(a) Converting plain text into binary numbers
(b) Converting plain text to cipher text
(c) Converting cipher text to plain text
(d) None of the above

37. SSL stands for________.


(a) Single Socket Layer (b) Secure Socket Layer
(c) Secure Standard Layer (d) Simple Sockets Layer

38. Criminally acquiring password is called________.


(a) Encryption (b) Phishing
(c) Hacking (d) Decryption

Page 5
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

39. SET in an open standard in E-Commerce offered by________.


(a) Certification authorities (b) Microsoft
(c) Master and Visa (d) World bank

40. In E-Commerce the assurance that the message is not altered is known as
(a) Authentication (b) Confidentiality
(c) Integrity (d) Validation

41. A public key differs from the private key due to________.
(a) It being used only for encryption
(b) It being used only for decryption
(c) It being shorter in Length
(d) None of the above

42. The model in E-Commerce where companies earn revenue by.


(a) Sales revenue (b) Transaction fee Revenue
(c) Advertising Revenue (d) Affiliate Revenue

43. Sender and Receiver have same key in________.


(a) Symmetric Key Encryption (b) Asymmetric Key Encryption
(c) DES (d) PKI

44. EDI stands for________.


(a) Electronic data Internet (b) Electronic Data Inference
(c) Electronic Data Interchange (d) Electronic Data Intake

45. There are many techniques used by B2C companies to attract customers
except________.
(a) Viral Marketing (b) Online Ads
(c) Registering with search engines (d) Discount Price

46. The most commonly used form of payment in E-Commerce is________.


(a) Credit Card (b) Paypal
(c) Petro Card (d) Digital Cash

47. Buying and selling products on the Internet called


(a) EDI . (b) E-Commerce
(c) E-business (d) E-Market

48. E-Commerce means________.


(a) Buying and selling
(b) Buying and selling over the Internet
(c) Accounting on the Internet
(d) None of these

Page 6
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

Ans. 1. (b) E-business, 2. (a) M-commerce, 3. (c) Sales, 4. (d) Portal,


5. (a) Market creator, 6. (d) Integrity, 7. (d) both (a) and (c), 8. (d) Smart card,
9. (c) SET, 10. (b) Digital accumulating balance, 11. (a) Symmetric key,
12. (a) Peer to Peer, 13. (b) Business to Business, 14. (c) Business to Customer,
15. (c) Consumer to Consumer, 16. (b) Protocol,
17. (b) Secure Electronic Transaction, 18. (a) Secure Socket Layer,
19. (c) Application, 20. (c) B2C, 21. (a) B2B, 22. (c) C2C, 23. (d) All of these,
24. (b) E-Market, 25. (b) EDI, 26. (c) E-Commerce, 27. (a) Encryption,
28. (c) Encryption, 29. (a) Clothing, 30. (c) Spam, 31. (a) Digital signature,
32. (d) Confidentiality, 33. (a) HTTPS,
34. (c) Both authentication and repudiation, 35. (b) Only B2C,
36. (c) Converting cipher text to plain text, 37. (b) Secure Socket Layer,
38. (b) Phishing, 39. (c) Master and Visa, 40. (a) Authentication,
41. (a) It being used only for encryption, 42. (d) Affiliate Revenue,
43. (a) Symmetric Key Encryption, 44. (c) Electronic Data Interchange,
45. (a) Viral Marketing, 46. (a) Credit Card, 47. (b) E-Commerce,
48. (b) Buying and selling over the Internet.

Page 7
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

Page 8
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

Q.2. State whether the following are true or false :


1. A firm's revenue model describes how the firm will earn revenue.
2. Portal offers users powerful Web search tools.
3. Online retail stores are often called as E-tailers.
4. Sites that process transactions for consumers are transaction brokers.
5. Market creators build a digital environment in which buyers and sellers can meet,
display products, search for products, and establish prices.
6. SSL stands for Secure Security Layer.
7. Digital cash also called e-cash.
8. E-commerce give the global reach to the business.
9. E-Tailer is an online retail shop.
10. Portal earns their revenue by selling goods.
11. E-commerce makes market highly competitive.
12. E-commerce reduces the level of Customer Service.
13. B2B e-commerce refers to a business communicating with or selling to an
individual rather than a company.
14. Banners and sponsorships are examples of subscription revenue models.
15. Transaction fees .are commission based on volume of transactions made, fixed or
incremental.
16. Portals earn revenue from advertising and referral fees.
17. E-tailers differentiate from existing stores and develop a niche strategy.
18. Job placement services are content providers.
19. Encryption is the process of converting encrypted data back into its original form.
20. The "frame" part of the term refers to the socket method of passing data back and
forth between a client and a server program.
21. Digital Wallets bill users at the end of the month.
22. Digital Credit card Payment System extends the functionality of existing credit
cards for use as online shopping payment.
23. There are three entities in a SET transaction.
24. E-commerce encourages competition between small and large online
retailers.
25. EDI is an integral part of B2B E-commerce.
26. Ecommerce uses smart phone's for transaction.
27. GSM is the bearer network for E-commerce transaction.
28. The merchant's bank authorization to merchant is mandatory in a SET transaction.
29. The scope of E-commerce is local.
30. E-markets are a virtual representation of the physical market.
31. EDI is a subset of E-commerce.
32. E-commerce is a broader concept than E-business.
33. E-commerce may be non-traditional.
34. In traditional commerce, all products are digital.

Page 9
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

35. E-market is a subset of E-commerce.


36. VAN stands for vehicle area network.
37. Encryption means converting readable text into cipher text.
38. Public key is used to create a digital signature.
39. B2C represents E-Commerce service from Business to Consumer directly.
40. In E-Commerce Ubiquity refers to Universal standards.
41. EDI requires a invoice ...
42. E-Commerce is available 24 x 7 ...
43. E-Commerce means buying and selling of products or services by business or
consumers over the Internet ...
44. Trade cycle in E-Commerce is the same as in traditional commerce ...
45. EDI is part of E-Commerce ...
46. E-Commerce is Global ...
47. B2B E-Commerce is between Business to Business and consumers ...
48. ANSI ASC x 12 is a popular standard used in B2B E-Commerce ...
49. Brokers facilitate transactions in B2C between buyers and sellers ...
50. E-Tailers are not direct sellers ...
51. In C2C E-Commerce consumers transact with other consumers through a physical
market ...
52. In the subscription model a fee is charged to the user for having access to material
on the website ...
53. Orkut is a type of service provider ...
54. B2C E-Commerce is seller driven ...
55. In E-auctions one of greatest advantage is that there is physical inspection of
goods ...
56. The volume of B2B transactions being done is more than B2C transaction
57. Transaction brokers charge a fee for facilitating transactions ...
58. There is no scope for negotiations in B2B E-Commerce ...
59. There is no scope for negotiations in B2C E-Commerce ...
60. More security is required in B2C E-Commerce ...
61. ebay.com is an example of transaction fee revenue model ...
62. B2C refers to Business selling goods to other business ...
63. E-tailer is a online retail shop ...
64. In E-Commerce Ubiquity refers to Universal Standers ...
65. B2B refers to a Business selling goods to other individuals ...
66. Portals are focused around a particular market segment ...
67. Transactions Brokers make money each time a transaction occurs ...
68. Ebay.com is an example of C2C E-Commerce ...
69. Digital signature changes for every document ...
70. Electronic Market is the virtual representation of Physical market ...
71. E-Commerce means buying and selling of products by consumers and business

Page
10
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

are the local level ...


72. In E-Commerce Scope is local ...
73. EDI stands for Electronic Data Interchange ...
74. EDI does not require printed order and invoice ...
75. All products and services can"be sold through E-Commerce ...
76. E-Commerce stands for Electrical Commerce ...
77. The cost of the products sold through E-Commerce is very high ...
78. E-Commerce is the most secure and private system ...
79. Payment is done by credit card in E-Commerce ...
80. The full form a WAP is wireless Associate protocol ...
81. M-Commerce means buying and selling of goods and service using a laptop.
82. M-Commerce means buying and selling of goods and service using a mobile
phone or a PDA device ...
83. In SET the customer's credit card number is never seen by the merchant ...
84. Online stored value systems allow the customers to make immediate online
payments to merchants and others, based on the amount that they have kept in
their online account...
85. Digital cash is the Electronic parallel on the notes and coins ...
86. Secure socket Layer is the protocol developed by Netscape for security of data in
transit ...
87. A digital signature is a digital code that is attached to a message sent
electronically ...
88. In public key Encryption there are two keys, one private and the other public ...
89. In public key Encryption there is only one key called the public key? ...
90. Decryption means converting readable text into cipher text...

91. In a credit card Transaction on the net, the buyers' credits card details are revealed
to the seller ...
92. One limitation of E-Commerce is lakh of PC penetration ...
93. In SSL and URL changes to HTTPS from HTTP ...
94. Non-repudiation refers to non-denial of E-commerce transaction ...
95. Authentication ensures that the message was not read by others ...
96. Symmetric key encryption requires that both parties share the same key ...

Ans. 1. True, 2. True, 3. True, 4. True, 5. True, 6. False, 7. True, 8. True,


9 True, 10. False, 11. True, 12. False, 13. False, 14. False, 15. True, 16. True, 17. True,
18. False, 19. False, 20. True, 21. False, 22. True, 23. False, 24. True, 25. True,
26. False, 27. False, 28. True, 29. False, 30. True, 31. True, 32. True, 33. False,
34. False, 35. True, 36. False, 37. True, 38. False, 39. True, 40. False, 41. False,
42. True, 43. True, 44. True, 45. True, 46. True, 47. False, 48. True, 49. True, 50. True,
51. False, 52. True, 53. False, 54. True, 55. False, 56, True, 57. True, 58. True, 59. True,

Page
11
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6

60. False, 61. True, 62. False, 63. True, 64. False, 65. False, 66. False, 67. True,
68. False, 69. False, 70. True, 71. False, 72. False, 73. True, 74. True, 75. False,
76. False, 77. False, 78. False, 79. True, 80. False, 81. False, 82. True, 83. True,
84. True, 85. True, 86. True, 87. True, 88. True, 89. False, 90. False, 91. True,
92. True, 93. True, 94. True, 95. False, 96. True.

Page
12

You might also like