You are on page 1of 164

E-Commerce stands for _______.

A. Electrical Commerce

B. Electronic Commerce

C. Entertainment Commerce

D. Electro Chemical Commerce

View Answer
B. Electronic

_______describes e-commerce.

A. Doing business offline

B. Doing business electronically

C. Surfing online

D. Both A & B

View Answer
B. Doing business electronically

________ is NOT a function of E commerce.

A. Warehouse

B. Finance

C. Marketing

D. None of the above

View Answer
D. None of the above

_______ is a function of E commerce.


A. Marketing

B. Supply Chain

C. Finance

D. All of the above

View Answer
D. All of the above

________mainly deals buying and selling, especially on a large scale.

A. Shopping

B. Retailing

C. Distribution

D. Commerce

View Answer
D. Commerce

E-commerce has _____ scope than E-Business or Digital Business.

A. Higher

B. Wider

C. Narrower

D. More

View Answer
C. Narrower

_______is a system of interconnected electronic components or circuits.

A. Marketplaces
B. Metamarkets

C. Electronic Markets

D. Electronic Network

View Answer
D. Electronic Network

All electronically mediated information exchanges are known as _____

A. E-Business

B. E-Commerce

C. Digital Business

D. None of the above

View Answer
B. E-Commerce

_________are markets connected through modern communications


networks and powered by high-speed computers.

A. Marketplaces

B. Metamarkets

C. Electronic Markets

D. Electronic Network

View Answer
C. Electronic Markets

________ is NOT an example of E-Commerce Platform.

A. Amazon Pantry
B. Reliance SMART

C. Flipkart Plus

D. DMart Ready

View Answer
B. Reliance SMART

___________ refers to e-commerce transactions delivered via social


media.

A. Social Network

B. Social Commerce

C. Social Business

D. B&C

View Answer
D. B&C

ESN stands for ________.

A. Enterprise Special Networks

B. Enterprise Social Networks

C. Entrepreneur Social Networks

D. Essential Social Networks

View Answer
C. Enterprise Social Networks

Enterprise 2.0 also known as _______

A. Social Business
B. Social Enterprise

C. Web 2.0

D. Social Media

View Answer
B. Social Enterprise

Collaboration 2.0 is also known as ____.

A. Social Enterprise

B. Social Collaboration

C. Collaboration Commerce

D. Collaboration Media

View Answer
B. Social Collaboration

Collaboration word is derived from latin word _______.

A. Collabrica

B. Collaberance

C. Collaboratio

D. Collaboraze

View Answer
C. Collaboratio

Social networking is ________.

A. Group-centric

B. Individual-centric
C. Organization-centric

D. Society-centric

View Answer
B. Individual-centric

Social collaboration is ______.

A. Group-centric

B. Individual-centric

C. Organization-centric

D. Person-centric

View Answer
A. Group-centric

EC in EC Business models stands for ______

A. E-Connected

B. Electronic Commerce

C. Essential Commerce

D. Electric Commerce

View Answer
B. Electronic Commerce

________is part of the four main types for e-commerce.

A. B2B

B. P2P

C. C2A
D. All of the above

View Answer
D. All of the above

Companies like Flipkart, Shopclues and Myntra belongs to the ________


Ecommerce (EC) segment.

A. B2B

B. P2P

C. B2C

D. C2B

View Answer
C. B2C

OLX is an example of ________ E-commerce segment.

A. B2B

B. B2C

C. C2B

D. C2C

View Answer
D. C2C

Customers pay a fixed amount, usually monthly or quarterly or annually,


to get some type of service is known as ________E-Commerce Business
Model.

A. Licensing

B. Transaction
C. Affiliate

D. Subscription

View Answer
D. Subscription

This E-Commerce business model mainly focuses on selling products or


services online.

A. Indirect Marketing

B. Marketplace

C. Online Direct Marketing

D. Brick & Mortar

View Answer
C. Online Direct Marketing

_______ is related to software frameworks for e-commerce applications.

A. WordPress Framework

B. E-commerce Framework

C. Business Framework

D. .NET Framework

View Answer
B. E-commerce Framework

_________is a retail fulfilment method where a store doesn’t keep the


products it sells in stock.

A. Aggregator Model

B. Dropshipping
C. Affiliate

D. Advertising Model

View Answer
B. Dropshipping

_______type of E-Commerce has trade and transaction dealings between


business establishments.

A. Business To Customer

B. Peer To Peer

C. Business To Business

D. Customer To Customer

View Answer
C. Business To Business

In ___________E-Commerce Model, Marketer or Companies charge


others for allowing them to place a banner on their websites, blogs or
platforms.

A. Affiliate

B. Advertising

C. Transaction

D. Aggregator

View Answer
B. Advertising

_______ FDI permitted B2B E-commerce and in marketplace model of e-


commerce.
A. 100%

B. 50%

C. 65%

D. 30%

View Answer
A. 100%

1. Digital marketing is often referred to as___________.


A. online marketing
B. internet marketing
C. web marketing
D. All of the above
View Answer
Ans : D

Explanation: Digital marketing is often referred to as online marketing, internet marketing or web
marketing.

2. Which of the following is a type of digital marketing activity?


A. Email marketing.
B. Social web marketing.
C. Viral marketing.
D. All of the above
View Answer
Ans : D

Explanation: All of the above is a type of digital marketing activity.

3. Which of the following is not a traditional forms of digital


marketing?
A. radio
B. TV
C. billboard
D. All of the above
View Answer
Ans : D

Explanation: All of the above is not a traditional forms of digital marketing.

4. What is not true about digital marketing?


A. Digital marketing is any form of marketing products or services that involves
electronic devices.
B. Digital marketing can be done online
C. Digital marketing cannot be done online
D. Digital marketing is often referred to as online marketing, internet marketing or
web marketing.
View Answer
Ans : C

Explanation: Digital marketing can be done both online and offline.

5. How many main pillars of digital marketing?


A. 2
B. 4
C. 3
D. 5
View Answer
Ans : A

Explanation: The 2 main pillars of digital marketing are online marketing and offline marketing.

6. Marketing that moves away from a transaction-based effort to a


conversation (i.e. two-way dialogue) and can be described as a
situation or mechanism through which marketers and a customer (e.g.
stakeholders) interact usually in real-time is known as:
A. Direct Marketing
B. Eectronic marketing
C. Interactive Marketing
D. Indirect Marketing
View Answer
Ans : C

Explanation: Marketing that moves away from a transaction-based effort to a conversation (i.e.
two-way dialogue) and can be described as a situation or mechanism through which marketers
and a customer (e.g. stakeholders) interact usually in real-time is known as:Interactive marketing.
7. In the first 10 years, the web was heavily used as a static publishing
and/or retailing (transactional) channel. This was known as:
A. Web 2.0.
B. Web 3.0.
C. Web 1.0.
D. Web 3.0.
View Answer
Ans : C

Explanation: The first 10 years of the web was characterized by what we call Web 1.0, wherein
the web was heavily used as a static publishing and/or retailing (transactional) channel.

8. Digital marketing includes_____________.


A. voice broadcast
B. podcasting
C. RSA
D. Both A and B
View Answer
Ans : D

Explanation: Digital marketing includes e-mail, RSS, voice broadcast, fax broadcast, blogging,
podcasting, video streams, wireless text messaging, and instant messaging.

9. A website`s front - or home page should include_____________


A. A lengthy description of the organization
B. Logos depicting awards the site`s designers have received
C. Links to other websites
D. None of the above
View Answer
Ans : D

Explanation: A website`s front - or home page should include none of the above options.

10. This is the process of marketing accomplished or facilitated


through the application of electronic devices, appliances, tools,
techniques, technologies and or systems:
A. Direct Marketing
B. interactive marketing
C. Electronic marketing
D. internet marketing
View Answer
Ans : C

Explanation: This is the process of marketing accomplished or facilitated through the application
of electronic devices, appliances, tools, techniques, technologies and or systems:Electronic
marketing

11. Digital Marketing has been around us since the very beginning. It


started in the year ________.
A. 1980
B. 2000
C. 1995
D. 1990
View Answer
Ans : D

Explanation: The term Digital Marketing was first used in the 1990s. The digital age took off
with the coming of the internet and the development of the Web 1.0 platform. The Web 1.0
platform allowed users to find the information they wanted but did not allow them to share this
information over the web.

12. Digital marketing is becoming very popular due to the?


A. increase in internet users
B. increase in mobile phone users
C. increase in digital content consumption
D. All of the above
View Answer
Ans : D

Explanation: Now digital marketing is becoming very popular due to the increase in internet
users, mobile phone users and digital content consumption.

13. Up to ______ of online experiences happening to people usually


begin by using a search engine.
A. 0.85
B. 0.9
C. 0.93
D. 0.97
View Answer
Ans : C

Explanation: up to 93% of online experiences happening to people usually begin by using a


search engine.

14. The ________ plays a major role in better content creation.


A. icon
B. keyword
C. description
D. viewport
View Answer
Ans : B

Explanation: The keyword plays a major role in better content creation. This is basically the
development of a prioritized list of targeted search terms related to your customer base and
market segment.

15. ___________ help in providing the user the gist of what is the article
about.
A. Meta Description
B. Meta tags
C. Meta Description or Meta tags
D. None of the above
View Answer
Ans : C

Explanation: Meta Description or Meta tags help in providing the user the gist of what is the
article about.

1. Which of the following describes e-commerce?


A. doing business electronically
B. doing business
C. sale of goods
D. all of the above
Discussion
A. doing business electronically
2. Which of the following is part of the four main types for e-
commerce?
A. b2b
B. b2c
C. c2b
D. all of the above
Discussion
D. all of the above

3. Which segment do eBay, Amazon.com belong?


A. b2bs
B. b2cs
C. c2bs
D. c2cs
Discussion
B. b2cs

4. Which type of e-commerce focuses on consumers dealing


with each other?
A. b2b
B. b2c
C. c2b
D. c2c
Discussion
D. c2c

5. Which segment is eBay an example?


A. b2b
B. c2b
C. c2c
D. none of the above
Discussion
D. none of the above
6. Which type deals with auction?
A. b2b
B. b2c
C. c2b
D. c2c
Discussion
D. c2c

7. In which website Global Easy Buy is facilitated?


A. ebay.com
B. amazon.com
C. yepme.com
D. none of these
Discussion
A. ebay.com

8. The best products to sell in B2C e-commerce are:


A. small products
B. digital products
C. specialty products
D. fresh products
Discussion
B. digital products

9. Which products are people most likely to be more


uncomfortable buying on the Internet?
A. books
B. furniture
C. movies
D. all of the above
Discussion
B. furniture
10. Which products are people most likely to be comfortable
buying on the Internet?
A. books
B. pcs
C. cds
D. all of the above
Discussion
D. all of the above

11. Digital products are best suited for B2C e-commerce


because they:
A. are commodity like products
B. can be mass-customized and personalized
C. can be delivered at the time of purchase
D. all of the above
Discussion
D. all of the above

12. The solution for all business needs is


A. edi
B. erp
C. scm
D. none of the above
Discussion
B. erp

13. All of the following are techniques B2C e-commerce


companies use to attract customers, except:
A. registering with search engines
B. viral marketing
C. online ads
D. virtual marketing
Discussion
D. virtual marketing

14. Which is a function of E-commerce


A. marketing
B. advertising
C. warehousing
D. all of the above
Discussion
D. all of the above

15. Which is not a function of E-commerce


A. marketing
B. advertising
C. warehousing
D. none of the above
Discussion
C. warehousing

16. Which term represents a count of the number of people


who visit one site, click on an ad, and are taken to the site of
the advertiser?
A. affiliate programs
B. click-through
C. spam
D. all of the above
Discussion
B. click-through

17. What is the percentage of customers who visit a Web site


and actually buy something called?
A. affiliate programs
B. click-through
C. spam
D. conversion rate
Discussion
D. conversion rate

18. What are materials used in production in a manufacturing


company or are placed on the shelf for sale in a retail
environment?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Discussion
A. direct materials

19. What are materials that are necessary for running a


modern corporation, but do not relate to the company's
primary business activities?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Discussion
B. indirect materials

20. What are ballpoint pens purchased by a clothing


company?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Discussion
B. indirect materials

21. What is another name for?


A. direct materials
B. indirect materials
C. edi
D. none of the above
Discussion
B. indirect materials

22. What is the process in which a buyer posts its interest in


buying a certain quantity of items, and sellers compete for the
business by submitting successively lower bids until there is
only one seller left?
A. b2b marketplace
B. intranet
C. reverse auction
D. internet
Discussion
C. reverse auction

23. What are plastic cards the size of a credit card that
contains an embedded chip on which digital information can
be stored?
A. customer relationship management systems cards
B. e-government identity cards
C. fedi cards
D. smart cards
Discussion
D. smart cards

24. Most individuals are familiar with which form of e-


commerce?
A. b2b
B. b2c
C. c2b
D. c2c
Discussion
B. b2c

25. Which form of e-commerce currently accounts for about


97% of all e-commerce revenues?
A. b2b
B. b2c
C. c2b
D. c2c
Discussion
A. b2b

26. Which of the following are advantages normally


associated with B2B e-commerce?
A. shorter cycle times
B. reduction in costs
C. reaches wider audiences
D. all of the above
Discussion
D. all of the above

27. If the threat of substitute products or services is low it is


a(n):
A. disadvantage to the supplier
B. advantage to the buyer
C. advantage to the supplier
D. none of the above
Discussion
C. advantage to the supplier

28. The threat of new entrants is high when it is:


A. hard for customers to enter the market
B. hard for competitors to enter the market
C. easy for competitors to enter the market
D. easy for customers to enter the market
Discussion
C. easy for competitors to enter the market

29. If it is easy for competitors to enter the market, the threat


of new entrants is considered:
A. high
B. low
C. more
D. less
Discussion
A. high

30. An industry is less attractive for suppliers when the rivalry


among existing competitors is:
A. high
B. low
C. more
D. less
Discussion
A. high

31. Unique value auction is mainly applies to?


A. new products
B. second hand products
C. engineering products
D. none of the above
Discussion
B. second hand products

32. Paisapay is facilitated in


A. ebay.co.in
B. amazon.com
C. flipkart.com
D. none of the above
Discussion
A. ebay.co.in

33. Which of the following is a useful security mechanism


when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above
Discussion
D. all the above

34. Which of the following is not related to security


mechanism
A. encryption
B. decryption
C. e-cash
D. all the above
Discussion
C. e-cash

35. A product or service that customers have come to expect


from an industry, which must be offered by new entrants if
they wish to compete and survive, is known as a(n)?
A. switching costs
B. loyalty programs
C. entry barriers
D. affiliate programs
Discussion
C. entry barriers

36. Which of the following statements accurately reflect the


impact of technology?
A. technology has caused buyer power to increase
B. technology has lessened the entry barriers for many industries
C. technology has increased the threat of substitute products and services
D. all of the above
Discussion
D. all of the above

37. A business cannot be all things to all people. Instead, a


business must:
A. identify target customers
B. identify the value of products/services as perceived by customers
C. all of the above
D. none of the above
Discussion
C. all of the above

38. How the transactions occur in e-commerce?


A. using e-medias
B. using computers only
C. using mobile phones only
D. none of the above
Discussion
A. using e-medias

39. Which type of products is lesser purchased using


ecommerce?
A. automobiles
B. books
C. softwares
D. none
Discussion
A. automobiles
40. A business competing in a commodity like environment
must focus on which of the following?
A. price
B. ease / speed of delivery
C. ease of ordering
D. all of the above
Discussion
D. all of the above

41. Which of the following refers to creating products tailored


to individual customers?
A. customization
B. aggregation
C. direct materials
D. reverse auction
Discussion
A. customization

42. Materials used in the normal operation of a business but


not related to primary business operations are called what?
A. supplies
B. direct materials
C. indirect materials
D. daily stuff
Discussion
C. indirect materials

43. Amazon.com is well-known for which e-commerce


marketing technique?
A. banner ads
B. pop-up ads
C. affiliate programs
D. viral marketing
Discussion
C. affiliate programs

44. What is the name given to an interactive business


providing a centralized market where many buyers and
suppliers can come together for e-commerce or commerce-
related activities?
A. direct marketplace
B. b2b
C. b2c
D. electronic marketplace
Discussion
D. electronic marketplace

45. Which form of e-marketplace brings together buyers and


sellers from multiple industries, often for MRO materials?
A. horizontal
B. vertical
C. integrated
D. inclined
Discussion
A. horizontal

46. Which form of e-marketplace brings together buyers and


sellers from the same industry?
A. horizontal
B. vertical
C. integrated
D. inclined
Discussion
B. vertical

47. Which type of add appears on a web page?


A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Discussion
C. banner ad

48. What type of ad appears on top of a web page?


A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Discussion
B. pop-up ad

49. What type of ad appears under a web page?


A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Discussion
A. pop-under ad

50. Which, if any, of the following types of ads are people


most willing to tolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above
Discussion
D. none of the above

51. Which of the following is an Internet-based company that


makes it easy for one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Discussion
D. financial cybermediary

52. Which of the following is a method of transferring money


from one person's account to another?
A. electronic check
B. credit card
C. e-transfer
D. none of the above
Discussion
A. electronic check

53. If you need to transfer money to another person via the


internet, which of the following methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Discussion
D. all of the above

54. Which of the following permits the transmission of a bill,


along with payment of that bill, to be conducted over the
Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Discussion
C. electronic bill presentment and payment
55. A combination of software and information designed to
provide security and information for payment is called a
what?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Discussion
A. digital wallet

56. What is the name for direct computer-to-computer transfer


of transaction information contained in standard business
documents?
A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
Discussion
D. electronic data interchange

57. Which of the following is used in B2B to pay for


purchases?
A. e-commerce
B. financial electronic data interchange
C. electronic data exchange
D. electronic checks
Discussion
B. financial electronic data interchange

58. Public key encryption uses multiple keys. One key is used
to encrypt data, while another is used to decrypt data. The key
used to encrypt data is called the _____ key, while the key
used to decrypt data is called the _____ key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Discussion
D. public, private

59. Secure Sockets Layers does which of the following?


A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above
Discussion
D. all of the above

60. When a transaction is processed online, how can the


merchant verify the customer's identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Discussion
B. use secure electronic transactions

61. The practice of forging a return address on an e-mail so


that the recipient is fooled into revealing private information
is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Discussion
D. spoofing
62. What is a model of a proposed product, service, or
system?
A. prototyping
B. prototype
C. proof-of-concept prototype
D. selling prototype
Discussion
B. prototype

63. What is an internal organizational Internet that is guarded


against outside access by a special security feature called a
firewall (which can be software, hardware, or a combination
of the two)?
A. client/server network
B. intranet
C. extranet
D. thin client
Discussion
B. intranet

64. What is an intranet that is restricted to an organization and


certain outsiders, such as customers and suppliers?
A. client/server network
B. intranet
C. extranet
D. thin client
Discussion
C. extranet

65. What is a detailed process for recovering information or


an IT system in the event of a catastrophic disaster such as a
fire or flood?
A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Discussion
A. disaster recovery plan

66. What is a separate facility that does not have any


computer equipment but is a place where the knowledge
workers can move after the disaster?
A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Discussion
C. cold site

67. What is a separate and fully equipped facility where the


company can move immediately after the disaster and resume
business?
A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Discussion
B. hot site

68. Which factor determines who has the right to access


different types of IT systems and information?
A. availability
B. accessibility
C. reliability
D. scalability
Discussion
B. accessibility
69. Which factor ensures your IT systems are functioning
correctly and providing accurate information?
A. availability
B. accessibility
C. reliability
D. scalability
Discussion
C. reliability

70. Which factor represents how well your system can adapt
to increased demands?
A. availability
B. accessibility
C. reliability
D. scalability
Discussion
D. scalability

71. Which factor represents a system's ability to change


quickly?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Discussion
A. flexibility

72. What is a set of conditions used to measure how well a


product or system functions?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Discussion
D. benchmark

73. What determines the future IT infrastructure requirements


for new equipment and additional network capacity?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Discussion
C. capacity planning

74. What automates business processes?


A. workflow
B. asp
C. workflow system
D. eip
Discussion
C. workflow system

75. What defines all of the steps or business rules, from


beginning to end, required for a process to run correctly?
A. workflow
B. eip
C. workflow system
D. sla
Discussion
A. workflow

76. What sends work assignments through an e-mail system?


A. database-based enterprise information portal
B. messaging-based enterprise information portal
C. database-based workflow system
D. messaging-based workflow system
Discussion
D. messaging-based workflow system

77. Which will not harm computer resources


A. firewall
B. virus
C. trojan horse
D. none of the above
Discussion
A. firewall

78. Which is not a function of ERP?


A. warehousing
B. sales
C. scheduling
D. none of the above
Discussion
D. none of the above

79. Which is a function of ERP?


A. warehousing
B. sales
C. scheduling
D. all of the above
Discussion
D. all of the above

80. Which of the following is the primary characteristic of an


intranet?
A. people outside the organization can access it
B. people inside the organization can\t access it
C. people outside the organization can\t access it
D. none of the above
Discussion
C. people outside the organization can\t access it

81. Which concept suggests that different applications and


computer systems should be able to communicate with one
another?
A. integration
B. web services
C. scalability
D. interoperability
Discussion
D. interoperability

82. Which process can prevent data from lose due to computer
problems or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Discussion
A. backup

83. Which process is used to reinstall data from a copy when


the original data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Discussion
B. recovery

84. What describes a process of continuously measuring


results and comparing those results to optimal performance so
that actual performance may be improved?
A. performance
B. capacity planning
C. benchmarking
D. data cleansing
Discussion
C. benchmarking

85. Who protects system from external threats?


A. firewall
B. edi
C. erp
D. script kiddies
Discussion
A. firewall

86. Who breaks into other people's computer systems and


steals and destroys information?
A. hackers
B. softwares
C. hacktivists
D. script kiddies
Discussion
A. hackers

87. What is software that comes hidden in free downloadable


software and tracks your online movements, mines the
information stored on your computer, or uses your computer's
CPU and storage for some task you know nothing about?
A. web log
B. clickstream
C. anonymous web browsing service
D. none of the above
Discussion
D. none of the above
88. ERP stands for
A. enterprise resolution planning
B. enterprise reverse planning
C. enterprise resource planning
D. none of the above
Discussion
C. enterprise resource planning

89. Which is not a component of ERP?


A. legacy systems
B. bolt on applications
C. operational database
D. cybersoft
Discussion
D. cybersoft

90. Which is not a function of ERP?


A. human resource management
B. financial
C. warehousing
D. none of the above
Discussion
D. none of the above

91. What is a type of virus that spreads itself, not just from
file to file, but from computer to computer via e-mail and
other Internet traffic?
A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Discussion
B. worm
92. What floods a Web site with so many requests for service
that it slows down or crashes?
A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Discussion
C. denial-of-service attack

93. What harnesses far-flung computers together by way of


the Internet or a virtual private network to share CPU power,
databases, and database storage?
A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Discussion
D. none of the above

94. What consists of the identification of risks or threats, the


implementation of security measures, and the monitoring of
those measures for effectiveness?
A. risk management
B. risk assessment
C. security
D. none of the above
Discussion
A. risk management

95. What is the process of evaluating IT assets, their


importance to the organization, and their susceptibility to
threats, to measure the risk exposure of these assets?
A. risk management
B. risk assessment
C. security
D. none of the above
Discussion
B. risk assessment

96. What is the process of making a copy of the information


stored on a computer?
A. backup
B. anti-virus
C. firewall
D. biometrics
Discussion
A. backup

97. Companies use………………………networks to


automate employee related Corporate
processes.
A. b2g
B. b2e
C. b2b
D. p2p
Discussion
B. b2e

98. ……………….is an early form of E-commerce


A. scm
B. edi
C. both of these
D. none of these
Discussion
B. edi
99. ………………..is concerned with the buying and selling
information, products and
services over computer communication networks
A. commerce
B. e-commerce
C. e-business
D. none of these
Discussion
B. e-commerce

100. Which among the following product is suitable for E-


Commerce ?
A. books
B. vegetables
C. all of these
D. none of these
Discussion
A. books

101. ……………allows a business application on the


computer of one organization to
communicate directly with the business application on the
computer of another company.
A. edi
B. protocols
C. standards
D. business applications
Discussion
A. edi

102. Electronic Exchange of business documents in a standard


format is known as
………………
A. e-commerce
B. e-business
C. edi
D. none of these
Discussion
C. edi

103. Which of the following is not a party of SCM ?


A. suppliers
B. manufacturers
C. distributors
D. customers
Discussion
C. distributors

104. ………………is a commercial process that includes


production, distribution, sales or
delivery of goods and services through electronic means
A. e-commerce
B. scm
C. edi
D. none of these
Discussion
A. e-commerce

105. Among the alternate models of B2B e-commerce,……is


the best means to obtain a
competitive advantage in the Market place.
A. process based
B. strategic relationship based
C. transaction based
D. any of these
Discussion
B. strategic relationship based
106. …………………is basically a concept of online
marketing and distributing of products
and services over the internet
A. b2g
B. b2e
C. b2c
D. b2b
Discussion
C. b2c

107. ……………………..e-commerce consists of the sale of


products or services from a
business to the general public
A. b2g
B. b2e
C. b2b
D. b2c
Discussion
D. b2c

108. Which of the following is not suitable for a B2C


transaction ?
A. clothes
B. flowers
C. airline reservation
D. none
Discussion
D. none

109. ……………..e-commerce transaction has the advantage


of eliminating middlemen.
A. b2g
B. b2c
C. b2b
D. b2e
Discussion
B. b2c

110. ………………….e-commerce involves customers


gathering information, purchasing and
receiving products over an electronic network
A. b2g
B. b2e
C. b2b
D. b2c
Discussion
D. b2c

111. Which among the following is not an user of B2C e-


commerce ?
A. manufacturers
B. distributors
C. publishers
D. none
Discussion
D. none

112. ………………….e-commerce involves the electronic


facilitation of transaction between
customers through some third party.
A. c2c
B. b2e
C. b2b
D. b2g
Discussion
A. c2c
113. Which among the following is not a B2E application
A. online insurance policy management
B. online supply requests
C. special employee offers
D. locate application and tax forms
Discussion
D. locate application and tax forms

114. ……………………..streamlines the flow of information


and self service capabilities
through automation
A. scc
B. crm
C. crp
D. scm
Discussion
A. scc

115. …………………is an application layer protocol for


distributed, collaborative,
hypermedia information systems.
A. html
B. http
C. bothe of these
D. none of these
Discussion
A. html

116. English physicist Tim Berner’s Lee was famous for the
establishment of
…………………..in 1990.
A. internet
B. www
C. intranet
D. none of these
Discussion
B. www

117. ………refers to a kind of e-commerce which refers to a


company selling or buying
from other company
A. b2g
B. b2e
C. b2b
D. p2p
Discussion
C. b2b

118. A company that manufacturers bicycles may use the


internet to purchase tyres from
their suppliers. This is an example of-----------transaction
A. b2g
B. b2e
C. b2b
D. p2p
Discussion
C. b2b

119. …………..sites act as an intermediary between someone


wanting a product or service
and potential providers
A. brokering sites
B. information sites
C. industry portals
D. none of these
Discussion
A. brokering sites
120. A……………portal is a specialized entry point to a
specific market place or industry
niche.
A. vertical portal
B. horizontal portal
C. both of these
D. none of these
Discussion
A. vertical portal

121. Which among the following is an example for vertical


portal ?
A. i-village
B. yahoo
C. google
D. net scape
Discussion
A. i-village

122. 4. A portal that helps to establish relations and to conduct


transactions between various
organizations is termed as………………
A. b2b portals
B. c2c portals
C. both of these
D. none of these
Discussion
A. b2b portals

123. A …………………….is a software that scours the


internet collecting data about every
website and every webpage within it
A. spiders
B. search engines
C. robots
D. none of these
Discussion
B. search engines

124. Which among the following is not an example for Search


engine ?
A. google
B. msn
C. alta vista
D. none of these
Discussion
D. none of these

125. Web pages are prepared using their language


as…………………
A. html
B. ftp
C. http
D. none of these
Discussion
A. html

126. A web page is transferred to users computer through


……………………..
A. html
B. ftp
C. http
D. none of these
Discussion
C. http
127. The user reaches this page when they specify the address
of a website
A. home page
B. web page
C. summary page
D. none of these
Discussion
A. home page

128. ……………………..streamlines the flow of information


and self service capabilities
through automation
A. scc
B. crm
C. crp
D. scm
Discussion
A. scc

129. ………………is a global web in which millions of users


are communicating with each
other with the help of computers.
A. internet
B. www
C. both of these
D. none of these
Discussion
A. internet

130. …………………….is an online auctioning site that


facilitates the trade of privately
owned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Discussion
A. e-bay

131. Monster.com is an example of


……………………..website
A. c2c
B. b2e
C. b2b
D. b2c
Discussion
A. c2c

132. This is a protocol which allows files to be transferred


from one computer to another
computer
A. tcp/ip
B. ftp
C. http
D. none of these
Discussion
B. ftp

133. A ……………….is a document, typically written in


plain text interspersed with
formatting instructions of html
A. web page
B. home page
C. domain
D. none of these
Discussion
A. web page
134. ………………….is the first page of a web site.
A. web page
B. home page
C. domain
D. none of these
Discussion
B. home page

135. …………………….is an online auctioning site that


facilitates the trade of privately
owned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Discussion
A. e-bay

136. ……………..is a card with a microchip that can be used


instead of cash and coins for
everything from vending machines to public transportation.
A. debit card
B. credit card
C. electronic purse
D. any of these
Discussion
C. electronic purse

137. ……………………encrypts payment card transaction


data and verifies that both
parties in the transaction are genuine.
A. ssl
B. set
C. both of these
D. none of these
Discussion
B. set

138. SET means ………………


A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these
Discussion
C. secure electronic transaction

139. The verification of credit card is done by


using…………….. with a communications link
to the merchants acquiring bank
A. credit card payment terminal
B. point of sale
C. all of these
D. none of these
Discussion
C. all of these

140. ……………….is a financial institution that establishes


an account with a merchant and
processes payment card authorization and payments
A. customer
B. issuer
C. merchant
D. acquirer
Discussion
D. acquirer
141. ………………type of payment system is highly useful to
those customers who would
like to control overspending,
A. prepaid
B. post paid
C. both of these
D. none of these
Discussion
A. prepaid

142. ……………………….credit card gives all the


advantages of a normal credit card
without worrying about the interest charges
A. prepaid
B. post paid
C. both of these
D. none of these
Discussion
A. prepaid

143. ……………………facility helps the customer to pay


only a small amount of the total
outstanding and revolve the rest of the payment to the next
month.
A. cash advance
B. revolver
C. tele draft
D. none of these
Discussion
B. revolver

144. ………………….is a financial instrument which can be


used more than once to borrow
money or buy products and services on credit.
A. credit card
B. e-cheques
C. e-cash
D. none of these
Discussion
A. credit card

145. To accept a credit card for payment, we have to open a


…………………account with
our bank
A. savings bank
B. current account
C. merchant account
D. any of these
Discussion
C. merchant account

146. ………………..is a kind of payment card that transfers


fund directly from the
consumer’s bank account to the merchants account
A. debit card
B. electronic purse
C. credit card
D. any of these
Discussion
A. debit card

147. A ………………is an electronic file that uniquely


identifies individuals and websites on
the internet and enables secure confidential communications
A. digital signature
B. digital certificates
C. ssl
D. none of these
Discussion
B. digital certificates

148. The information Technology Act [IT ACT] came into


effect on
A. 16th november 2000
B. 15th december 2000
C. 17th october 2000
D. none of these
Discussion
C. 17th october 2000

149. Information sent over the Internet commonly uses the set
of rules
called……………………
A. tcp/ip
B. ftp
C. http
D. gopher
Discussion
A. tcp/ip

150. ……………………….is a person who breaks in or


trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Discussion
A. hacker

151. E-mail which contains useless material is termed


as……………
A. spam
B. useless mail
C. trunk mail
D. junk mail
Discussion
D. junk mail

152. India has enacted the first IT Act in the


year……………………
A. 2001
B. 2002
C. 2009
D. 2000
Discussion
D. 2000

153. Which of the following crimes were not covered under


IT (Amendment) Act, 2008 ?
A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these
Discussion
D. none of these

154. Trade mark, copyright, patent law etc comes under the
purview of……………………
A. data protection
B. telecommunication laws
C. intellectual property laws
D. none
Discussion
C. intellectual property laws
155. Which one of the following is not a principle of e-
commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Discussion
D. none of these

156. ………………is basically a secure gate between our


organization data and internet.
A. network firewall
B. antivirus
C. both of these
D. none of these
Discussion
A. network firewall

157. ………………is automated methods of recognizing a


person based on a physiological or
behavioral characteristic.
A. biometrics
B. pin
C. both of these
D. none of these
Discussion
A. biometrics

158. ……………….is a financial institution that establishes


an account with a merchant and
processes payment card authorization and payments.
A. customer
B. issuer
C. merchant
D. acquirer
Discussion
D. acquirer

159. In …………………..type of payment system customer is


allowed to spend only up to the
amount that have pre deposited into account.
A. prepaid
B. post paid
C. both of these
D. none of these
Discussion
A. prepaid

160. .……………….is the exchange of goods or items or


commodities and services or
applications used for money and deals the money matters
A. e-commerce
B. commerce
C. both of these
D. none
Discussion
B. commerce

161. ……………….always operate on intranet


A. e--commerce
B. e-business
C. edi
D. none of these
Discussion
B. e-business
162. Which among the following is not an example for E-
commerce
A. amazon.com
B. baazar.com
C. e-trade.com
D. none of these
Discussion
C. e-trade.com

163. ………………were the first to establish prominent E-


commerce Brands
A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these
Discussion
B. e-bay and amazon

164. …………….is a form of supply chain where a series of


assembly operations are carried
out to obtain the final product
A. converging supply chain
B. diverging supply chain
C. any of these
D. none
Discussion
A. converging supply chain

165. .…………………is a form of supply chain where a wide


variety of finished goods are
produced with limited number of raw material or components.
A. converging structure
B. diverging structure
C. any of these
D. none
Discussion
B. diverging structure

166. ……………………is the exchange of services,


information or product from one
business to a government agency
A. b2g
B. b2e
C. b2b
D. p2p
Discussion
C. b2b

167. ………………….is an internet network that allows users


with the same network in
software to connect to each other’s hard disks and exchange
files
A. b2c
B. b2e
C. b2b
D. p2p
Discussion
D. p2p

168. ”Google” is one of the most popular………………..


A. portal
B. browser
C. search engine
D. none of these
Discussion
C. search engine
169. A ………………….. Presents information from diverse
sources in a unified way in a
web site.
A. web portal
B. link page
C. both of these
D. none of these
Discussion
C. both of these

170. ……………………….is a person who breaks in or


trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Discussion
A. hacker

171. Peer to Peer [P2P] is also used to describe


………………………
A. c2c
B. b2e
C. b2b
D. b2c
Discussion
A. c2c

172. ……………..allows the person to type ion just the main


word or words and the site will
come in
A. web page
B. home page
C. domain
D. none of these
Discussion
C. domain

173. A ………………….. presents information from diverse


sources in a unified way in a
web site
A. web portal
B. link page
C. both of these
D. none of these
Discussion
C. both of these

174. In Biometrics,…………………………ID system is


designed to prevent one person
from using more than one identity
A. positive id system
B. negative id system
C. both of these
D. none of these
Discussion
B. negative id system

175. …………………..are program developed by some


dishonest people to destroy the
computer system and the valuable information in it.
A. network firewall
B. computer virus
C. both of these
D. none of these
Discussion
B. computer virus
176. he dimension of e-commerce that enables commerce
across national boundaries is called
______________.
A. interactivity
B. global reach
C. richness
D. ubiquity
Discussion
B. global reach

177. The primary source of financing during the early years of


e-commerce was
______________.
A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Discussion
C. venture capital funds

178. The source of revenue in a subscription revenue model is


______________.
A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
D. fees for enabling or execution a transaction
Discussion
C. fees from subscribers in exchange for access to content or services

179. Industry structure is defined as ______________.


A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business
firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company\s product or service fulfills the needs of customers
Discussion
A. the nature of the players in an industry and their relative bargaining power

180. The component of TCP/IP that provides the Internet's


addressing scheme and is
responsible for the actual delivery of packets is
______________.
A. tcp
B. ip
C. the network layer
D. the application layer
Discussion
B. ip

181. Which of the following is not a limitation of the current


Internet?
A. insufficient capacity throughout the backbone
B. network architecture limitations
C. insufficient reach
D. best-efforts qos
Discussion
C. insufficient reach

182. Internet users account for about ______________ of the


world's population.
A. 7%
B. 17%
C. 27%
D. 47%
Discussion
B. 17%
183. The most common type of Internet crime according to
the IC3 is ______________.
A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud
Discussion
D. auction fraud

184. When hackers flood a Web site with useless traffic to


overwhelm the network, it is
called ______________.
A. phishing
B. pharming
C. a denial of service (dos) attack
D. spoofing
Discussion
C. a denial of service (dos) attack

185. ______________ influence the behavior of others


through their personality, skills, or other
factors.
A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups
Discussion
A. opinion leaders

186. A(n) ______________ represents data as two-


dimensional tables with records
organized in rows and attributes in columns.
A. database management system
B. data warehouse
C. sql query
D. relational database
Discussion
D. relational database

187. Creating multiple versions of information goods and


selling essentially the same
product to different market segments at different prices is
called______________.
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Discussion
A. versioning

188. Which of the following is a measure of the percentage of


purchasers who return to a
Web site within a year?
A. loyalty
B. reach
C. recency
D. unique visitors
Discussion
A. loyalty

189. Which of the following statements about privacy is true?


A. it is a moral right to be left alone
B. only corporations and government need to be concerned about it
C. it has only just recently become a concern
D. it is most easily obtained on the internet
Discussion
A. it is a moral right to be left alone
190. The redirection of traffic from a legitimate site to an
infringing site is called
______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Discussion
B. cyber piracy

191. A security plan begins with a(n) is ______________.


A. security policy
B. risk assessment
C. implementation plan
D. security organization
Discussion
B. risk assessment

192. ______________ influence the behavior of others


through their personality, skills, or
other factors.
A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups
Discussion
A. opinion leaders

193. Creating multiple versions of information goods and


selling essentially the same
product to different market segments at different prices is
called______________.
A. versioning
B. bundling.
C. transitive content
D. price discrimination
Discussion
A. versioning

194. Which of the following is a measure of the percentage of


purchasers who return to a
Web site within a year?
A. loyalty
B. reach
C. regency
D. unique visitors
Discussion
A. loyalty

195. ______________ are networks that connect people


within a company to each other and
to the company network.
A. bitstreams
B. extranets
C. internets
D. intranets
Discussion
D. intranets

196. A website offering content created by third party


transparently to customers is an
example of ______________.
A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order
Discussion
B. syndication

197. E-commerce technologies have improved upon


traditional commerce technologies in
______________.
A. richness
B. reach
C. both richness and reach
D. neither richness nor reach
Discussion
C. both richness and reach

198. All of the following are technologies used to gather


information about you online
except ______________.
A. spy ware
B. cookies
C. gmail
D. anonymizers
Discussion
D. anonymizers

199. ______________ is a program that you can run from the


DOS prompt in the Windows
operating system in order to check the connection between
your client and the server.
A. ping
B. telnet
C. tracert
D. ssl
Discussion
A. ping

200. Which of the following is a new and disruptive Web


feature or service?
A. xml
B. diffserv
C. blogs
D. cdma
Discussion
C. blogs

201. What Web server functionality allows it verify


usernames and passwords and process
certificates and encryption information?
A. processing of http requests
B. file transfer protocol
C. data capture
D. security services
Discussion
D. security services

202. The ability to change the product to better fit the needs of
the customer is called
______________.
A. customization
B. personalization
C. privacy
D. accessibility
Discussion
A. customization

203. All of the following are major categories of computer


viruses except ______________.
A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses
Discussion
D. trojan viruses

204. The most prevalent online payment method is


______________.
A. paypal
B. checks
C. credit cards
D. debit
Discussion
C. credit cards

205. Complete price transparency in a perfect information


marketplace is necessary for
______________ to take effect.
A. bertrand\s law
B. the law of universal prices
C. the law of one price
D. the law of perfect commerce
Discussion
C. the law of one price

206. The process of getting customers to pass along a


company's marketing message to
friends, family, and colleagues is known as ______________.
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Discussion
B. viral marketing

207. All of the following are types of social marketing except


______________.
A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising
Discussion
A. affiliate marketing

208. The ethical principle which states that if an action is not


right for all situations, then it
is not right for any situation is known as ______________.
A. the golden rule
B. slippery slope
C. no free lunch
D. universalism
Discussion
D. universalism

209. What is the first step in a P3P-enabled transaction?


A. send web page
B. http get request web page
C. send p3p policy files
D. http get request p3p policy files
Discussion
B. http get request web page

210. The majority of job seekers rely on which of the


following?
A. word-of-mouth leads
B. employment agencies
C. internet and newspapers equally
D. internet only
Discussion
C. internet and newspapers equally
211. Which of the following best describes predicted growth
in C2C and B2C auction
spending?
A. b2c spending will overtake c2c spending
B. both types of spending will increase
C. c2c spending will decrease while b2c increases
D. both types of spending will decline at similar rates
Discussion
B. both types of spending will increase

212. A materials requirements planning (MRP) system is an


example of ______________.
A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange
Discussion
C. a legacy computer system

213. The E-commerce domain that involves business activity


initiated by the consumer and
targeted to businesses is known as ______________.
A. business to business (b2b)
B. consumer to consumer (c2c)
C. consumer to business (c2b)
D. business to consumer (b2c)
Discussion
C. consumer to business (c2b)

214. Why would a merchant want to customize products?


A. to charge a higher price
B. to decrease costs
C. it is required in ec
D. customers will only accept customized products
Discussion
A. to charge a higher price

215. A ______________ is the set of planned activities


designed to result in a profit in a
marketplace.
A. business model
B. profit model
C. business plan
D. revenue model
Discussion
A. business model

216. Affiliate revenue is also called as _______.


A. commission
B. brokerage
C. referral fee
D. discount
Discussion
C. referral fee

217. Standards of EDI are decided by ______


A. ascii
B. ansi
C. usa
D. government
Discussion
B. ansi

218. ______ means converting readable text to unreadable


text.
A. conversion
B. decryption
C. encryption
D. decoding
Discussion
C. encryption

219. ______ means converting unreadable text to readable


text.
A. conversion
B. decryption
C. encryption
D. decoding
Discussion
B. decryption

220. _____ changes URL from http to https.


A. ssl
B. set
C. e-commerce
D. m-commerce
Discussion
A. ssl

221. In ____ server-side authentication is compulsory.


A. ssl
B. set
C. e-commerce
D. m-commerce
Discussion
A. ssl

222. An online retail store is called as _____.


A. trader
B. retailer
C. e-tailer
D. amazon
Discussion
C. e-tailer

223. In _______, one consumer deals with another consumer.


A. c2c
B. b2c
C. b2b
D. p2p
Discussion
A. c2c

224. amazon.com is an example of ______


A. b2b
B. b2c
C. c2c
D. p2p
Discussion
B. b2c

225. In SSL encryption is done using ____ key.


A. public
B. private
C. session
D. symmetric
Discussion
C. session

226. ____ is an online retail store.


A. portal
B. service provider
C. e-tailer
D. content provider
Discussion
C. e-tailer

227. Identify the identity of a person or entity with whom you


are dealing on Internet is known
as ______.
A. integrity
B. authenticity
C. authorisation
D. none of these
Discussion
B. authenticity

228. ____ means that the information being displayed on a


Web site/transmitted/received over
the Internet has not been changed in any way by an un-
authorised party.
A. integrity
B. authenticity
C. authorisation
D. none of these
Discussion
A. integrity

229. In public key encryption ______ keys are used.


A. public and private
B. only public
C. only private
D. session
Discussion
A. public and private

230. SET is developed by association led by _________.


A. master card and visa
B. master card
C. visa
D. rupay
Discussion
A. master card and visa

231. The technology behind M-commerce is based on ______.


A. http
B. https
C. wap
D. pop
Discussion
C. wap

232. ________ is virtual representation of physical market.


A. edi
B. electronic market
C. e-commerce
D. internet commerce
Discussion
B. electronic market

233. _____ allows you paperless transaction.


A. edi
B. electronic market
C. e-commerce
D. internet commerce
Discussion
A. edi

234. _____ means the information being displayed on a Web


site or transmitted or received
over the Internet has not been changed in any way by an
unauthorized party.
A. integrity
B. confidentiality
C. authenticity
D. privacy
Discussion
A. integrity

235. In ________ encryption is performed with session key.


A. public key
B. private key
C. ssl
D. set
Discussion
C. ssl

236. olx.com is an example of ________


A. b2b
B. b2c
C. c2c
D. p2p
Discussion
C. c2c

237. ______ are sites that creates a digital online environment


where people with similar
interest can transact.
A. community provider
B. market creator
C. portal
D. service provider
Discussion
A. community provider

238. Flipkart.com is an example of _______.


A. b2b
B. b2c
C. c2c
D. p2p
Discussion
B. b2c

239. Normally in M-commerce language used to create web


pages is _______.
A. html
B. wml
C. vb
D. xml
Discussion
B. wml

240. _____ is an art of attempting to acquire information by


masked as trustworthy entity.
A. hacking
B. phishing
C. sniffing
D. spoofing
Discussion
B. phishing

241. SSL can be used only with _____.


A. ftp
B. http
C. pop
D. smtp
Discussion
B. http

242. _____ means converting cipher text to plain text.


A. encryption
B. decryption
C. conversion
D. de-conversion
Discussion
B. decryption

243. ______ means converting plain text to cipher text.


A. encryption
B. decryption
C. conversion
D. de-conversion
Discussion
A. encryption

244. In Public Key Encryption ______ key is used for


Encryption.
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
Discussion
C. sender’s public

245. In Public Key Encryption ______ key is used for


Decryption.
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
Discussion
B. receiver’s private

246. _____ can read the cipher text.


A. sender
B. receiver
C. any one
D. no one
Discussion
D. no one

247. When message & data are available only to those who
are authorized to view them is
known as ______ .
A. integrity
B. confidentiality
C. authenticity
D. privacy
Discussion
B. confidentiality

248. Digital Accumulating Balance Payment System is


generally used for ______ payments.
A. micro
B. macro
C. credit card
D. debit card
Discussion
A. micro

249. Scope of E-Commerce is ______.


A. local
B. global
C. within own country
D. within own state
Discussion
B. global
250. ______ means found everywhere.
A. universal
B. ubiquity
C. global
D. local
Discussion
B. ubiquity

251. E-Commerce Lacks _______ touch.


A. social
B. smooth
C. personal
D. communication
Discussion
C. personal

252. In SSL _______ key is used for encryption.


A. public
B. private
C. session
D. otp
Discussion
C. session

253. To handle credit card transaction on internet _____ is


developed by Visa and Master card.
A. ssl
B. set
C. sat
D. encryption
Discussion
B. set
254. The sender and receiver will have the same key in _____
Key Encryption.
A. symmetric
B. asymmetric
C. public
D. private
Discussion
A. symmetric

255. In SSL URL will change from HTTP to _______.


A. cipher text
B. https
C. shttp
D. smtp
Discussion
B. https

256. __________ is a best example of Online Stored Value


System.
A. google
B. yahoo
C. paypal
D. go daddy
Discussion
C. paypal

257. BitTorrent.Com is an example of _____


A. b2b
B. b2c
C. c2c
D. p2p
Discussion
D. p2p
258. E-Tailer revenue model is ______ revenue.
A. sales
B. subscription
C. advertising
D. affiliate
Discussion
A. sales

259. The percentage of people who visit web site and buy
something is known as _____
A. hits
B. conversion rate
C. affiliate
D. walk-in-customer
Discussion
B. conversion rate

260. In _______ user can share files and computer resources


directly.
A. b2b
B. b2c
C. c2c
D. p2p
Discussion
D. p2p

261. E-tailer can be Pure Plays or _______ .


A. impure plays
B. indirect plays
C. bricks & clicks
D. direct plays
Discussion
C. bricks & clicks
262. World Wide Web (WWW) was introduced in the year
……………………
A. 1994
B. 1996
C. 1992
D. 1990
Discussion
A. 1994

263. ……………….is an early form of E-commerce


A. SCM
B. EDI
C. Both of these
D. None of these
Discussion
B. EDI

264. ………………..is concerned with the buying and selling


information, products and services over
computer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Discussion
B. E-Commerce

265. ………………..is a set of standards developed in the


1960s to exchange business information
and to do electronic transactions
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Discussion
A. EDI

266. Which among the following product is suitable for E-


Commerce ?
A. Books
B. Vegetables
C. All of these
D. None of these
Discussion
A. Books

267. ……………allows a business application on the


computer of one organization to communicate
directly with the business application on the computer of
another company.
A. EDI
B. Protocols
C. Standards
D. Business applications
Discussion
A. EDI

268. Electronic Exchange of business documents in a standard


format is known as ………………
A. E-commerce
B. E-Business
C. EDI
D. None of these
Discussion
C. EDI
269. ………………. is essentially a business process that
connects manufacturers, retailers,
customers and suppliers in the form of a chain to develop and
deliver products.
A. E-commerce
B. EDI
C. SCM
D. Networking
Discussion
C. SCM

270. Which of the following is not a party of SCM ?


A. Suppliers
B. Manufacturers
C. Distributors
D. Customers
Discussion
C. Distributors

271. ………………is a commercial process that includes


production, distribution, sales or delivery
of goods and services through electronic means
A. E-commerce
B. SCM
C. EDI
D. None of these
Discussion
A. E-commerce

272. ……………….is the exchange of goods or items or


commodities and services or applications
used for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none
Discussion
B. Commerce

273. …………….is an approach to deliver information


differentiated business values called services
by combining the system and process generally called
resources
A. E-business
B. E-commerce
C. any of these
D. none
Discussion
A. E-business

274. ……………….always operate on intranet


A. E--commerce
B. E-Business
C. EDI
D. None of these
Discussion
B. E-Business

275. Which among the following is not an example for E-


commerce
A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these
Discussion
C. E-trade.com
276. ……………….and ………………… were the enabling
technologies that laid the ground work for E- commerce
A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these
Discussion
C. EDI and EFT

277. ………………were the first to establish prominent E-


commerce Brands
A. Baazar.com
B. E-bay and Amazon
C. E-trade.com
D. none of these
Discussion
B. E-bay and Amazon

278. …………….is a systems approach to Managing the


entire flow of information, materials, and
services from raw material suppliers through factories and
warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Discussion
D. SCM

279. …………….is a form of supply chain where a series of


assembly operations are carried out to
obtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Discussion
A. Converging supply chain

280. ……………………is a form of supply chain where a


wide variety of finished goods are produced
with limited number of raw material or components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Discussion
B. Diverging structure

281. ……………………is the exchange of services,


information or product from one business to a
government agency
A. B2G
B. B2E
C. B2B
D. P2P
Discussion
C. B2B

282. Companies use………………………networks to


automate employee related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Discussion
B. B2E
283. Which among the following is not a B2E application
A. Online Insurance policy management
B. Online supply requests
C. Special employee offers
D. Locate application and tax forms
Discussion
D. Locate application and tax forms

284. ……………………..streamlines the flow of information


and self service capabilities through
automation
A. SCC
B. CRM
C. CRP
D. SCM
Discussion
A. SCC

285. ………………is a global web in which millions of users


are communicating with each other with
the help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Discussion
A. Internet

286. …………………is an application layer protocol for


distributed, collaborative, hypermedia
information systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Discussion
A. html

287. English physicist Tim Berner’s Lee was famous for the
establishment of …………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Discussion
B. WWW

288. ………refers to a kind of e-commerce which refers to a


company selling or buying from other
company
A. B2G
B. B2E
C. B2B
D. P2P
Discussion
C. B2B

289. Which of the following is not an example for B2B e-


commerce ?
A. Sending and receiving orders
B. Invoice and shopping
C. all of these
D. none of these
Discussion
D. none of these
290. A company that manufacturers bicycles may use the
internet to purchase tyres from their
suppliers. This is an example of-----------transaction.
A. B2G
B. B2E
C. B2B
D. P2P
Discussion
C. B2B

291. …………..sites act as an intermediary between someone


wanting a product or service and
potential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Discussion
A. brokering sites

292. Among the alternate models of B2B e-commerce,……is


the best means to obtain a
competitive advantage in the Market place.
A. Process based
B. strategic relationship based
C. transaction based
D. any of these
Discussion
B. strategic relationship based

293. ……………..focus on producing a highly integrated


value proposition through a managed process.
A. hubs
B. community
C. contents
D. none of these
Discussion
A. hubs

294. …………………is basically a concept of online


marketing and distributing of products and
services over the internet
A. B2G
B. B2E
C. B2B
D. B2C
Discussion
D. B2C

295. ……………………..e-commerce consists of the sale of


products or services from a business to
the general public
A. B2G
B. B2E
C. B2B
D. B2C
Discussion
D. B2C

296. Which of the following is not suitable for a B2C


transaction ?
A. clothes
B. flowers
C. airline reservation
D. none
Discussion
D. none
297. ……………..e-commerce transaction has the advantage
of eliminating middlemen.
A. B2G
B. B2E
C. B2B
D. B2C
Discussion
D. B2C

298. ………………….e-commerce involves customers


gathering information, purchasing and receiving
products over an electronic network
A. B2G
B. B2E
C. B2B
D. B2C
Discussion
D. B2C

299. Which among the following is not an user of B2C e-


commerce ?
A. manufacturers
B. distributors
C. Publishers
D. none
Discussion
D. none

300. ………………….e-commerce involves the electronic


facilitation of transaction between
customers through some third party.
A. B2G
B. B2E
C. B2B
D. C2C
Discussion
D. C2C

301. Which among the following is an example of C2C ?


A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Discussion
D. all of these

302. Peer to Peer [P2P] is also used to


describe………………………….
A. C2C
B. B2E
C. B2B
D. B2C
Discussion
A. C2C

303. …………………….is an online auctioning site that


facilitates the trade of privately owned items
between individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Discussion
A. e-Bay

304. Monster.com is an example of


……………………..website
A. C2C
B. B2E
C. B2B
D. B2C
Discussion
A. C2C

305. ………………….is an internet network that allows users


with the same network in software to
connect to each other’s hard disks and exchange files
A. P2P
B. B2E
C. B2B
D. B2C
Discussion
A. P2P

306. This is a protocol which allows files to be transferred


from one computer to another computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Discussion
B. FTP

307. A ……………….is a document, typically written in


plain text interspersed with formatting
instructions of html
A. Web page
B. home page
C. domain
D. none of these
Discussion
A. Web page

308. ………………….is the first page of a web site.


A. Web page
B. home page
C. domain
D. none of these
Discussion
B. home page

309. ……………..allows the person to type ion just the main


word or words and the site will come in
A. Web page
B. home page
C. domain
D. none of these
Discussion
C. domain

310. ”Google” is one of the most popular………………..


a)Portal b)Browser c)Search Engine d)none of these
50. A ………………….. presents information from diverse
sources in a unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these
Discussion
C. Both of these

311. A……………portal is a specialized entry point to a


specific market place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Discussion
A. Vertical portal

312. ………………..are general interest portals covering a


wide range of topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Discussion
B. horizontal portal

313. Which among the following is an example for vertical


portal ?
A. i-village
B. Yahoo
C. Google
D. Net scape
Discussion
A. i-village

314. A portal that helps to establish relations and to conduct


transactions between various
organizations is termed as………………
A. B2B portals
B. C2C portals
C. both of these
D. none of these
Discussion
A. B2B portals
315. A …………………….is a software that scours the
internet collecting data about every website
and every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Discussion
B. Search Engines

316. Search Engines databases are selected and built by


computer robot programs
called………………………
A. spiders
B. Search Engines
C. robots
D. none of these
Discussion
A. spiders

317. Which among the following is not an example for Search


engine ?
A. Google
B. MSN
C. Alta vista
D. none of these
Discussion
D. none of these

318. Web pages are prepared using their language


as…………………
A. html
B. FTP
C. HTTP
D. None of these
Discussion
A. html

319. A web page is transferred to users computer through


……………………..
A. html
B. FTP
C. HTTP
D. None of these
Discussion
C. HTTP

320. The user reaches this page when they specify the address
of a website
A. Home page
B. Web page
C. Summary page
D. None of these
Discussion
A. Home page

321. The purpose of ………………page is to provide links to


other pages
A. Home page
B. Web page
C. Summary page
D. None of these
Discussion
A. Home page
322. ……………is an example for a software that visits
suggested pages and return the appropriate
information to be indexed by the search Engine
A. Robot
B. Spiders
C. Ants
D. All
Discussion
D. All

323. ………………………………..ads appears as rectangular


graphics near the top of the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Discussion
A. Banner ads

324. ………………….ads take up the entire screen and are


more powerful than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Discussion
B. floating ads

325. ………………………….is a form of advertisement on


the web that appears between web pages
that the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Discussion
C. interstitials

326. ……………………is basically a TV commercial that


runs in the browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Discussion
D. Unicast ads

327. Advertisements take the form of a website copy are


called…………………………
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Discussion
A. Advertorials

328. ………………..is the most unwanted of online


advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Discussion
B. pop-up ads

329. …………………..is an unsolicited e-mail sent to every


e-mail address that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Discussion
C. Spam e-mail

330. …………………..is the buying and selling of goods and


services through wireless handled
devices such as cellular phone and Personal Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Discussion
A. Mobile Commerce

331. …………………is a class of advertising methods which


are considered unethical and may even
be illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Discussion
D. malware

332. ……………….is the most common way for purchasing


an online advertising
A. CPM
B. CPC
C. Any of these
D. none of these
Discussion
C. Any of these

333. ………………are animated full screen ads placed at the


entry of a site before a user reaches
the intended content.
A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Discussion
A. Intromercials

334. ………………….are interactive online ads that require


the user to respond intermittently in
order to wade through the message before reaching the
intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Discussion
A. Ultramercials

335. ………………is any transaction, involving the transfer


or rights to use goods and services, which is initiated and or
completed by using mobile access to computer mediated
networks
with the help of an electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Discussion
A. Mobile Commerce
336. …………….provide security and privacy for the use of
the web page content
A. HTTP
B. html
C. FTP
D. none of these
Discussion
A. HTTP

337. …………………….website is one that changes or


customizes itself frequently and automatically
based on certain criteria
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Discussion
A. Dynamic website

338. ………………site is created to fraudulently acquire


sensitive information such as pass words
and credit card details, by masquerading as a trustworthy
person or business.
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Discussion
C. phish site

339. ……………….in the e-commerce may be a holder of a


payment card such as credit card or
debit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer
Discussion
A. customer

340. ……………….is a financial institution that establishes


an account with a merchant and
processes payment card authorization and payments
A. customer
B. issuer
C. Merchant
D. Acquirer
Discussion
D. Acquirer

341. In …………………..type of payment system customer is


allowed to spend only up to the
amount that have pre deposited into account.
A. Prepaid
B. Post paid
C. both of these
D. none of these
Discussion
A. Prepaid

342. ………………type of payment system is highly useful to


those customers who would like to
control overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Discussion
A. Prepaid

343. ……………………….credit card gives all the


advantages of a normal credit card without worrying
about the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Discussion
A. Prepaid

344. ……………………facility helps the customer to pay


only a small amount of the total outstanding
and revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Discussion
B. Revolver

345. ………………….is a financial instrument which can be


used more than once to borrow money
or buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Discussion
A. Credit card
346. To accept a credit card for payment, we have to open a
…………………account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Discussion
C. Merchant account

347. ………………..is a kind of payment card that transfers


fund directly from the consumer’s bank
account to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Discussion
A. Debit Card

348. ……………..is a card with a microchip that can be used


instead of cash and coins for
everything from vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Discussion
B. Electronic purse

349. ………………is basically a secure gate between our


organization data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Discussion
A. Network firewall

350. ……………………encrypts payment card transaction


data and verifies that both parties in the
transaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Discussion
B. SET

351. ………………is automated methods of recognizing a


person based on a physiological or
behavioral characteristic.
A. Biometrics
B. PIN
C. both of these
D. none of these
Discussion
A. Biometrics

352. In Biometrics,…………………………ID system is


designed to prevent more than one person from
using a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Discussion
A. Positive ID system

353. In Biometrics,…………………………ID system is


designed to prevent one person from using
more than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Discussion
B. Negative ID system

354. …………………..are program developed by some


dishonest people to destroy the computer
system and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Discussion
B. computer virus

355. Which among the following is not an example for


computer virus ?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Discussion
D. None of these

356. ……………………are special type of software meant


for limiting the risks of being hit by
computer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Discussion
B. Antivirus

357. A……………….is a person who gains unauthorized


access to a computer network for profit,
criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Discussion
A. Hacker

358. ……………….acts like a gate keeper that examines each


users identification before allowing
them to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Discussion
A. Network firewall

359. …………..Prevents unauthorized communication into


and out of the network, allowing the
organization to enforce a security policy on traffic between its
network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Discussion
A. Network firewall

360. SET means …………………………….


A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Discussion
C. Secure Electronic Transaction

361. The verification of credit card is done by


using…………….. with a communications link to the
merchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Discussion
C. All of these

362. Creating illegitimate sites that appear to be published by


established organizations by
unscrupulous artists is termed as………………………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Discussion
A. Spoofing
363. Gain entry into the user’s system and scan your file
system for personal information is
known as……………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Discussion
B. Snooping

364. ………………attacks are difficult and are only


successful if the attacker knows something
about the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Discussion
D. Guessing passwords

365. …………………is the process of making information


unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Discussion
D. Cryptography

366. ………………….is the reverse process of encryption, to


make the information readable once
again
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Discussion
B. Decryption

367. A………………….provides a way to associate the


message with the sender and is the
equivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Discussion
B. Digital signature

368. A ………………is an electronic file that uniquely


identifies individuals and websites on the
internet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Discussion
B. Digital certificates

369. The information Technology Act [IT ACT] came into


effect on
A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these
Discussion
C. 17th October 2000
370. Information sent over the Internet commonly uses the set
of rules called………………………..
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Discussion
A. TCP/IP

371. E-mail which contain useless material is termed


as………………………
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Discussion
D. Junk mail

372. India has enacted the first IT Act in the


year……………………………………
A. 2001
B. 2002
C. 2009
D. 2000
Discussion
D. 2000

373. Which of the following crimes were not covered under


IT (Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Discussion
D. None of these

374. Trade mark, copyright, patent law etc comes under the
purview of……………………
A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Discussion
C. Intellectual property laws

375. ……………….is a programme designed o replicate and


spread generally with the victim being
oblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Discussion
C. Computer virus

376. Which one of the following is not a principle of e-


commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Discussion
D. none of these

377. Which of the below is/are goals of E-Commerce?


A. 24×7
B. reach out to larger audience
C. time saving
D. all of the above
Discussion
D. all of the above

378. In which one of the following type of E-Commerce,


consumer sells to consumer directly?
A. C2B
B. B2C
C. B2B
D. C2C
Discussion
D. C2C

379. ................ is the electronic transmission of business


transaction documents directly between the computers of
trading partners in a standard message format
A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Discussion
B. EDI

380. What does EDI stand for?


A. Electronic Data Interface
B. E-Commerce Data Interface
C. Electronic Data Interaction
D. Electronic Data Interchange
Discussion
D. Electronic Data Interchange
381. When a company buys some raw material from some
other company, then it will come under:
A. B2B
B. B2C
C. C2B
D. C2C
Discussion
A. B2B

382. In traditional commerce, people buy goods and services


:
A. over the internet
B. physical visit
C. Both online & offline
D. None of the mentioned
Discussion
B. physical visit

383. Promotion of products in e-commerce can be done by


A. Social media
B. Online Ads
C. Blog
D. All of the mentioned
Discussion
D. All of the mentioned

384. Which of the following is not a dimension of e-


commerce security provided by encryption ?
A. availability
B. integrity
C. non-repudiation
D. confidentiality
Discussion
A. availability

385. Conversion of Plain text to Cipher Text is


called………………
A. Encryption
B. Decryption
C. Cryptography
D. none of these
Discussion
A. Encryption

386. In Porter's Five Forces, the 'threat of new entrants' relates


to:
A. Barriers to entry
B. Substitutes
C. Switching costs
D. Buyer power
Discussion
A. Barriers to entry

387. Which of the following is true for supply chain


management?
A. The physical material moves in the direction
B. Flow of cash backwards through the chain
C. Exchange of information moves in both the
D. All of the above
Discussion
D. All of the above

388. Logistics is the part of a supply chain involved with the


forward and reverse flow of
A. goods
B. services
C. cash
D. All of the above
Discussion
D. All of the above

389. BPM is about:


A. Aligning business processes toorganisational
B. Maintaining a process view of the organisation ratherthan a functional
C. Establishing and maintaining an environment ofcontinuous
D. All of the above
Discussion
D. All of the above

390. CRM is :
A. Customer Relationship
B. Customer Relationship
C. Customer Recovery
D. Consumer Relation
Discussion
A. Customer Relationship

391. The best products to sell in B2C e-commerce are:


A. Small Products
B. Digital Products
C. Special Products
D. Fresh Products
Discussion
B. Digital Products

392. Which of the following is a useful security mechanism


when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
D. All of the mentioned
Discussion
D. All of the mentioned

393. Which type of products is lesser purchased using e-


commerce?
A. automobiles
B. books
C. groceries
D. None of the mentioned
Discussion
A. automobiles

394. Which is not the application area of e-commerce?


A. E-Learning
B. E-Banking
C. E-Auction
D. None of the mentioned
Discussion
D. None of the mentioned

395. In which year the IT Act was introduced?


A. 2000
B. 2020
C. 2001
D. 2010
Discussion
A. 2000

396.                            is an early form of E-Commerce.


A. SCM
B. EDI
C. Both SCM & EDI
D. None of the mentioned
Discussion
B. EDI

397. Which of the following is not related to security


mechanism?
A. encryption
B. decryption
C. e-cash
D. All of the mentioned
Discussion
C. e-cash

398. Digital Products are best suited for B2C e-commerce


because they:
A. Are commodity like products
B. Can be mass- customized and
C. Can be delivered at the time of
D. All of the mentioned
Discussion
D. All of the mentioned

399. Which of the following is part of the four main types of


e-commerce?
A. B2B
B. B2C
C. C2B
D. All of the mentioned
Discussion
D. All of the mentioned

400. The dimension of E-Commerce that enables commerce


across the boundaries is called                    
A. interactivity
B. global reach
C. richness
D. ubiquity
Discussion
B. global reach

401. Reverse logistics is required because


A. Goods are defective
B. Goods are unsold
C. The customers simply change
D. All of the above
Discussion
D. All of the above

402. The purpose of supply chain management is


A. provide customer
B. improve quality of a product
C. integrating supply and demand
D. increase production
Discussion
C. integrating supply and demand

403. Barriers to entry into an industry are likely to be high if:


A. Switching costs are low
B. Differentiation is low
C. Requirement for economies of
D. Access to distribution
Discussion
C. Requirement for economies of

404. A digital signature is required …..


i) to tie an electronic message to the sender’s identity
ii) for non repudiation of communication by a sender
A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv
Discussion
B. i, ii and iii

405. Which of the following examines information passing


through switches,
hubs, or routers?
A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures
Discussion
B. Packet sniffer

406. Which type of e-commerce focuses on consumers


dealing with each
other?
A. B2B
B. B2C
C. C2B
D. C2C
Discussion
D. C2C

407. Which products are people most likely to be more


uncomfortable buying
on the Internet?
A. Books
B. Furniture
C. Movies
D. All of the above
Discussion
B. Furniture
408. Which products are people most likely to be comfortable
buying on the
Internet?
A. Books
B. PCs
C. CDs
D. All of the above
Discussion
D. All of the above

409. Digital products are best suited for B2C e-commerce


because they:
A. Are commodity like products
B. Can be mass-customised and personalised
C. Can be delivered at the time of purchase
D. All of the above
Discussion
D. All of the above

410. All of the following are techniques B2C e-commerce


companies use to
attract customers, except
A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
Discussion
D. Virtual marketing

411. E-commerce involves


A. marketing
B. advertising
C. warehousing
D. all of the above
Discussion
D. all of the above

412. Which term represents a count of the number of people


who visit one
site, click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through
C. Spam
D. All of the above
Discussion
B. Click-through

413. What is the percentage of customers who visit a Web site


and actually
buy something called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
Discussion
D. Conversion rate

414. What are materials used in production in a manufacturing


company or
are placed on the shelf for sale in a retail environment?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Discussion
A. Direct materials
415. What are materials that are necessary for running a
modern corporation,
but do not relate to the company’s primary business activities?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Discussion
B. Indirect materials

416. What is another name for materials which cannot be


linked to a specific
product or process?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Discussion
B. Indirect materials

417. What are plastic cards the size of a credit card that
contains an
embedded chip on which digital information can be stored?
A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards
Discussion
D. Smart cards

418. Which form of e-commerce currently accounts for about


97% of all ecommerce revenues?
A. B2B
B. B2C
C. C2B
D. C2C
Discussion
A. B2B

419. Which of the following are advantages normally


associated with B2B ecommerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
Discussion
D. all of the above

420. If it is easy for competitors to enter the market, the threat


of new entrants
is considered:
A. High
B. Low
C. More
D. Less
Discussion
A. High

421. An industry is less attractive for suppliers when the


rivalry among existing
competitors is:
A. High
B. Low
C. More
D. Less
Discussion
A. High
422. Unique value auction mainly applies to?
A. New products
B. Second hand products
C. Engineering products
D. None of the above.
Discussion
B. Second hand products

423. Which of the following is a useful security mechanism


when considering
business strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above
Discussion
D. all the above

424. Which of the following statements accurately reflect the


impact of
technology?
A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
C. Technology has increased the threat of substitute products and services
D. all of the above
Discussion
D. all of the above

425. Which type of products is lesser purchased using e-


commerce?
A. automobiles
B. books
C. softwares
D. none
Discussion
A. automobiles

426. A business competing in a commodity like environment


must focus on
which of the following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
Discussion
A. Price

427. Which of the following refers to creating products


tailored to individual
customers?
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
Discussion
A. customisation

428. Materials used in the normal operation of a business but


not related to
primary business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Discussion
C. Indirect materials
429. What is the name given to an interactive business
providing a centralised
market where many buyers and suppliers can come together
for ecommerce or commerce-related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Discussion
D. Electronic marketplace

430. Which form of e-marketplace brings together buyers and


sellers from
multiple industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Discussion
A. horizontal

431. Which form of e-marketplace brings together buyers and


sellers from the
same industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Discussion
B. Vertical

432. Which, if any, of the following types of ads are people


most willing to
tolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above
Discussion
D. none of the above

433. Which of the following is an Internet-based company


that makes it easy
for one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Discussion
D. financial cybermediary

434. Which of the following is a method of transferring


money from one
persons account to another?
A. electronic check
B. credit card
C. e-transfer
D. none of the above
Discussion
A. electronic check

435. An electronic check is one form of what?


A. e-commerce
B. online banking
C. e-cash
D. check
Discussion
C. e-cash
436. If you need to transfer money to another person via the
internet, which of
the following methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Discussion
D. all of the above

437. Which of the following permits the transmission of a bill,


along with
payment of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Discussion
C. electronic bill presentment and payment

438. A combination of software and information designed to


provide security
and information for payment is called a?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Discussion
A. digital wallet

439. What is the name for direct computer-to-computer


transfer of transaction
information contained in standard business documents?
A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
Discussion
D. electronic data interchange

440. Public key encryption uses multiple keys. One key is


used to encrypt data, while another is used to decrypt data.
The key used to encrypt data is called the _____ key, while
the key used to decrypt data is called the _____n key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Discussion
D. public, private

441. When a transaction is processed online, how can the


merchant verify the
customers identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Discussion
B. use secure electronic transactions

442. The practice of forging a return address on an e-mail so


that the recipient
is fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Discussion
D. spoofing

443. What is an internal organisational Internet that is guarded


against outside access by a special security feature called a
firewall (which can be software, hardware, or a combination
of the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Discussion
B. Intranet

444. What is an intranet that is restricted to an organisation


and certain
outsiders, such as customers and suppliers?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Discussion
C. Extranet

445. What is a detailed process for recovering information or


an IT system in
the event of a catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Discussion
A. Disaster recovery plan
446. What is a separate facility that does not have any
computer equipment
but is a place where the knowledge workers can move after
the disaster?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Discussion
C. Cold site

447. What is a separate and fully equipped facility where the


company can
move immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Discussion
B. Hot site

448. What charts (1) the cost to your organisation of the


unavailability of
information and technology and (2) the cost to your
organisation of recovering from a disaster over time?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Discussion
D. Disaster recovery cost curve
449. Which factor determines when the IT system will be
available for
knowledge workers to access?
A. Availability
B. Accessibility
C. Reliability
D. None of the above
Discussion
A. Availability

450. Which factor determines who has the right to access


different types of IT
systems and information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Discussion
B. Accessibility

451. Which factor ensures the IT systems are functioning


correctly and
providing accurate information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Discussion
C. Reliability

452. Which factor represents how well your system can adapt
to increased
demands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Discussion
D. Scalability

453. Which factor represents a systems ability to change


quickly?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Discussion
A. Flexibility

454. What is a set of conditions used to measure how well a


product or
system functions?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Discussion
D. Benchmark

455. What determines the future IT infrastructure


requirements for new
equipment and additional network capacity?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Discussion
C. Capacity planning

456. What defines all of the steps or business rules, from


beginning to end,
required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
Discussion
A. Workflow

457. Which will not harm computer resources?


A. firewall
B. Virus
C. Trojan horse
D. None of the above
Discussion
A. firewall

458. Which of the following is the primary characteristic of an


intranet?
A. People outside the organisation can access it
B. People inside the organisation cant access it
C. People outside the organisation cant access it
D. None of the above
Discussion
C. People outside the organisation cant access it

459. Which concept suggests that different applications and


computer
systems should be able to communicate with one another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
Discussion
D. Interoperability

460. Which service encompasses all technologies used to


transmit and
process information on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Discussion
D. Web services

461. Which process can prevent data from losing due to


computer problems
or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Discussion
A. backup

462. Which process is used to reinstall data from a copy when


the original
data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Discussion
B. recovery
463. Who breaks into other peoples computer systems and
steals and
destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Discussion
A. Hackers

464. What is software that comes hidden in free downloadable


software and tracks your online movements, mines the
information stored on your computer, or uses your computers
CPU and storage for some task you know nothing about?
A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above
Discussion
D. None of the above

465. What is a type of virus that spreads itself, not just from
file to file, but
from computer to computer via e-mail and other Internet
traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
Discussion
B. Worm
466. What floods a Web site with so many requests for service
that it slows
down or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
Discussion
C. Denial-of-service attack

467. What is the process of evaluating IT assets, their


importance to the organisation, and their susceptibility to
threats, to measure the risk exposure of these assets?
A. Risk management
B. Risk assessment
C. Security
D. None of the above
Discussion
A. Risk management

468. The E-commerce domain that involves business activity


initiated by the consumer and targeted to businesses is known
as:
A. Business to Business (B2B).
B. Consumer to Business (C2B).
C. Business to Consumer (B2C).
D. Consumer to Consumer (C2C).
Discussion
B. Consumer to Business (C2B).

469. By electronic commerce we mean:


A. Commerce of electronic goods
B. Commerce which depends on electronics
C. Commerce which is based on the use of internet
D. None of the above
Discussion
D. None of the above

470. E-commerce is
A. B2C
B. B2B
C. C2B
D. All the above
Discussion
A. B2C

471. Advantages of e-commerce are


A. Low cost
B. Economical
C. Productivity gains
D. All the above
Discussion
B. Economical

472. B2B2C is a model of


A. E-commerce
B. E-business
C. Data mining
D. None of the above
Discussion
C. Data mining

473. Mobile commerce is same as


A. E-commerce
B. E-business
C. Data mining
D. None of the above
Discussion
B. E-business

474. The types of Business to Business e-commerce


are ................
A. Direct selling and support to Business
B. Industry portals
C. Information sites about a industry
D. All the above
Discussion
D. All the above

475. Which of the following is not the example of business to


consumer (B to C) e-commerce?
A. Amazon.com
B. e-bay.com
C. dell.com
D. lastminute.com
Discussion
B. e-bay.com

476. Which driver promote E-commerce


A. Digital Convergence
B. 24/7 availability
C. Profit margins
D. None of the above
Discussion
A. Digital Convergence

477. Advantage of e-com is


A. Lower cost
B. Economy
C. Higher margins
D. All of the above
Discussion
A. Lower cost

478. Which model of e commerce deals with virtual auction?


A. Aggregator Model
B. Info-mediary model
C. Community Model
D. Brokerage Model
Discussion
D. Brokerage Model

479. When you look at e-commerce and e-business, which is


the most realistic relationship between these two concepts?
A. E-commerce is broadly equivalent to e-business
B. E-commerce has some overlap with e-business
C. E-commerce is a subset of e-business
D. E-business is a subset of e-commerce
Discussion
C. E-commerce is a subset of e-business

480. Social network sites such as Facebook and Twitter have


become increasingly popular for sell-side e-commerce and
would normally be considered to be in which category?
A. Portal, publisher or media sites
B. Brand-building sites
C. Transactional e-commerce sites
D. Services-orientated relationship-building websites
Discussion
A. Portal, publisher or media sites

481. A summary of how a company will generate a profit


identifying its core product, target customers, position in the
online marketplace, and projections for revenue and costs is
known as:
A. Value chain and marketplace positioning
B. Value proposition
C. Online business model
D. Revenue model and cost base
Discussion
C. Online business model

482. While search engines index registered sites which users


search by inputting key words, which type of intermediary
updates its content typically through text but can include
video or audio delivered through RSS feeds?
A. Directory
B. Publisher site
C. Blog
D. Access portal
Discussion
C. Blog

483. What are Microsoft Internet Explorer, Mozilla Firefox,


Apple Safari, and Google
Chrome examples of?
A. Web servers
B. Web browsers
C. Web application servers
D. All of the above
Discussion
B. Web browsers

484. A hardened firewall host on an Intranet is


A. a software which runs in any of the computers in the intranet
B. a software which runs on a special reserved computer on the intranet
C. a stripped-down computer connected to the intranet
D. a mainframe connected to the intranet to ensure security
Discussion
B. a software which runs on a special reserved computer on the intranet

485. Advantages of B2C commerce are


(i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii) Shop can be open 24 hours a day seven days a week
(iv) Privacy of transaction always maintained
A. i and ii
B. ii and iii
C. i and iii
D. iii and iv
Discussion
C. i and iii

486. Disadvantages of e-Commerce in India are


(i) internet access is not universally available
(ii) credit card payment security is not yet guaranteed
(iii) transactions are de-personalized and human contact is
missing
(iv) cyberlaws are not in place
A. i and ii
B. ii and iii
C. i, ii, iii
D. i, ii, iii, iv
Discussion
C. i, ii, iii

487. Most common uses of the Internet and the Web include
communicating, shopping,
A. searching, entertainment, and education
B. e-commerce, e-mail, and searching
C. e-mail, entertainment, and education
D. e -commerce, e-mail, and education
Discussion
A. searching, entertainment, and education

488. The __________ is the multimedia interface to resources


available on the Internet.
A. Web
B. ISP
C. browser
D. URL
Discussion
A. Web

489. The multimedia interface to the resources available on


the Net is called the
A. World Wide Web
B. Internet
C. GUI interface
D. Server
Discussion
A. World Wide Web

490. Rules for exchanging data between computers are called


A. programs
B. procedures
C. protocols
D. hyperlinks
Discussion
C. protocols

491. Moving from one Web site to another is called


A. jumping
B. moving
C. surfing
D. applying
Discussion
C. surfing

492. ____________ are networks that connect people within a


company to each other and to the
company network.
A. Internets
B. Intranets
C. Extranets
D. Components
Discussion
B. Intranets

493. E-money is a ……………. medium for making payments


A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above
Discussion
A. Digital

494. Acid testis a set of properties of money transfer that


include
A. Atomicity and isolation
B. Consistency and durability
C. Both (a) and (b)
D. None of the above
Discussion
C. Both (a) and (b)

495. In…………………., each transaction must be


independent
A. Consistency
B. Isolation
C. Durability
D. None of the above
Discussion
B. Isolation

496. In ICES test, C means


A. Consistency
B. Complexity
C. Conservation
D. None of the above
Discussion
A. Consistency

497. Electronic payment is a financial transaction made


…………. the use of paper documents
A. With
B. Without
C. Both (a) and (b)
D. None of the above
Discussion
B. Without

498. Electronic payment media can be grouped into


A. Trusted third party type
B. Notational fund transfers related type
C. Authentication type
D. All the above
Discussion
D. All the above

499. ………………is a type of EPS


A. Credit card
B. Debit card
C. Smart card
D. All the above
Discussion
D. All the above

500. Smart card is same as…….


A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above
Discussion
C. Both (a) and (b)

501. Debit card is used for


A. On line transactions
B. Off line transaction
C. Both (a) and (b)
D. None of the above
Discussion
C. Both (a) and (b)

502. ……………………. card is a card with a built-in chip


capable of storing information in its
memory
A. Debit
B. Credit
C. Smart
D. None of the above
Discussion
C. Smart

503. Applications of smart card are:


A. Government
B. Identification
C. Health care
D. All the above
Discussion
D. All the above

504. ……………………………is an application of smart


card
A. ATM
B. Telecommunication
C. Transportation
D. None of the above
Discussion
A. ATM

505. EFT is a computer based system


A. True
B. False
C. none
D. all
Discussion
A. True

506. EFT is
A. Electronic Fund Transfer
B. Electrical fund transfer
C. Electronic fast transfer
D. None of the above
Discussion
A. Electronic Fund Transfer

507. …………….cards and ………….cards are two ways to


make payments on a web site
A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above
Discussion
B. Credit and debit

508. ……………………….allows the transfer of money itself


A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above
Discussion
A. Digital cash

509. E-money has…………….types


A. 3
B. 4
C. 5
D. 6
Discussion
A. 3

510. Paisapay is facilitated in………………


A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above
Discussion
B. eBay.co.in

511. The way to hide digital information is through……


A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above
Discussion
A. Cryptography

512. Main models of internet based payment system are:


A. Electronic currency
B. Credit card
C. Debit card
D. All the above
Discussion
D. All the above

513. ……………………..card is a model of IPS


A. Smart
B. Debit
C. Credit
D. All the above
Discussion
D. All the above

514. Payment systems via the internet include


A. Cyber cash
B. First virtual
C. Both (a) and (b)
D. None of the above
Discussion
C. Both (a) and (b)

515. ………………………cards directly transfer funds from


consumers bank account to the
merchant’s
A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above
Discussion
A. Debit

516. Credit cards ……………. convenient for making small


purchases
A. Are
B. Are not
C. Both (a) and (b)
D. None of the above
Discussion
A. Are

517. ACH is
A. Acid consistency house
B. Automated clearing house
C. Automated consistency house
D. None of the above
Discussion
B. Automated clearing house

518. Google.com is an example of a:


A. Destination site
B. Portal
C. Search engine
D. None of the above
Discussion
C. Search engine

519. Currency used in e-business transactions around the


world
A. Dollars
B. Rupees
C. None of the above
D. All the above
Discussion
C. None of the above

520. ________ is an example of an auction site


A. e-bay
B. Ibibo
C. Facebook
D. Orkut
Discussion
A. e-bay

521. What items are traded in e-business


A. Consumer durables
B. Pharmaceutical products
C. Industrial goods
D. All the above
Discussion
D. All the above

522. Once segments have been identified, organizations need


to define how best to position their online services relative to
competitors according to four main variables: product quality,
service quality, and fulfillment time. Which variable is
missing?
A. After sales service
B. Brand perception
C. Customer value
D. Price
Discussion
D. Price
523. What could be an implication for an organization if an e-
business strategy is not clearly
defined?
A. Clear direction of e-business strategy
B. Effective integration of e-business at a technical level
C. Greater opportunities from evaluation of opportunities
D. None of the above are applicable
Discussion
D. None of the above are applicable

524. Before developing any type of strategy, a management


team needs to agree the process they will follow for
generating and then implementing the strategy. A framework
that gives a logical sequence to follow to ensure inclusion of
all key activities of an ebusiness strategic development is
generally known as:
A. An E-channel strategy
B. E- business stratification process
C. A strategy process model
D. Multi-channel e-business strategy
Discussion
C. A strategy process model

525. The approach by which applications of internal and


external electronic communications can support and influence
strategy is a definition of:
A. Corporate Strategy
B. E-channel strategy
C. E-business strategy
D. E-business responsibility
Discussion
C. E-business strategy
526. A(n) __________ is a private corporate network that uses
standard Internet protocols
and interfaces.
A. ethernet
B. extranet
C. local area network
D. intranet
Discussion
D. intranet

527. When measuring the effectiveness on an online


advertisement, the __________ is the percentage of visitors to
a page who click on an advertisement.
A. click ratio
B. click rate
C. click-through rate
D. hit ratio
Discussion
C. click-through rate

528. RACE is a practical framework to help marketers


manage and improve the commercial value gained from
digital marketing. The term stands for Reach, Act, C, Engage.
What does 'C' refer to?
A. Collaborate
B. Collect
C. Consolidate
D. Convert
Discussion
D. Convert

529. A strength of social media and viral marketing is:


A. Cannot be ignored in user's inbox
B. Considered credible
C. It is possible to reach a large number at relatively low cost
D. Highly targeted with controlled costs
Discussion
C. It is possible to reach a large number at relatively low cost

530. In future, some suggest that the task of searching for


suppliers and products may be taken over by computer
programmes which have defined rules or some degree of
intelligence that replicates human neural functioning. These
programmes are known as:
A. Spider search engines
B. HTML
C. E-marketplace search engines
D. Software intelligent agents
Discussion
D. Software intelligent agents

531. Security is a serious concern for e-business managers and


there are many potential risks concerning unauthorized access
to customer and company data. One way this occurs is
through misleading users through setting up a bogus website
and gaining user details online. What is this method known
as?
A. Denial of service
B. Phishing
C. Malware
D. Firewalling
Discussion
B. Phishing

532. The fastest-growing application for the Internet is


A. going shopping
B. conducting research
C. playing games, reading, and listening to music
D. using e-mail
Discussion
A. going shopping

533. The most common method for gaining access to the


Internet is through a __________.
A. dumb terminal
B. virtual provider or computer
C. point-to-point computer
D. provider or host computer
Discussion
D. provider or host computer

534. The term ISP refers to


A. internal software protocol
B. international shareware pool
C. Internet service provider
D. interface standard protocol
Discussion
C. Internet service provider

535. These types of commercial Internet service providers are


the most widely used
A. national service providers
B. regional service providers
C. centralized service providers
D. decentralized service providers
Discussion
A. national service providers

536. When surfing the Web, the browser interprets the HTML
command found in a document file, and displays it as a(n)
A. Applet page
B. Java page
C. Web page
D. Domain page
Discussion
C. Web page

537. Which of the following are not required to send and


receive e-mail?
A. e-mail account
B. Web page
C. access to the Internet
D. e-mail program
Discussion
B. Web page

538. ______________ includes all electronics-based


information exchanges within or between companies and
customers.
A. E-commerce
B. E-marketing
C. E-communication
D. E-business
Discussion
D. E-business

539. The flip side of e-marketing is:


A. e-advertising
B. e-selling
C. e-commerce
D. e-purchasing
Discussion
D. e-purchasing

540. Which of the following describes e‐commerce?


A. Doing business electronically
B. Doing business
C. Sale of goods
D. All the above
Discussion
A. Doing business electronically

541. Which segments do eBay, Amazon.com belong?


A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
Discussion
B. B2Cs

542. Which type of e‐commerce focuses on consumers


dealing with each other?
A. B2B
B. B2C
C. C2B
D. C2C
Discussion
D. C2C

Next »

You might also like