You are on page 1of 113

Multiple Choice Questions - E-Commerce [BCA-603]

S.No. Question A B C D Answer


reach out to larger
1 Which of the below is/are goals of E-Commerce? 24×7
audience
time saving all of the above D

In which one of the following type of E-Commerce,


2
consumer sells to consumer directly?
C2B B2C B2B C2C D

................ is the electronic transmission of business


Transaction
3 transaction documents directly between the computers Encapsulation EDI ERP
processing
B
of trading partners in a standard message format
Electronic Data E-Commerce Data Electronic Data Electronic Data
4 What does EDI stand for?
Interface Interface Interaction Interchange
D

When a company buys some raw material from some


5
other company, then it will come under:
B2B B2C C2B C2C A

In traditional commerce, people buy goods and services Both online & None of the
6
:
over the internet physical visit
offline mentioned
B

All of the
7 Promotion of products in e-commerce can be done by Social media Online Ads Blog
mentioned
D

Which of the following is not a dimension of e-


8
commerce security provided by encryption ?
availability integrity non-repudiation confidentiality A

Conversion of Plain text to Cipher Text is


9
called………………
Encryption Decryption Cryptography none of these A

In Porter's Five Forces, the 'threat of new entrants'


10
relates to:
Barriers to entry Substitutes Switching costs Buyer power A
The physical Flow of cash Exchange of
Which of the following is true for supply chain material moves backwards through information
11
management?
All of the above D
in the direction the chain moves in both the
Logistics is the part of a supply chain involved with the
12
forward and reverse flow of
goods services cash All of the above D
Multiple Choice Questions - E-Commerce [BCA-603]
S.No. Question A B C D Answer
Aligning Maintaining a Establishing and
13 BPM is about: business process view of the maintaining an All of the above D
processes to organisation rather environment of
organisational than a functional continuous
Customer Customer Customer Consumer
14 CRM is : Relationship Relationship Recovery Relation A
600

15 The best products to sell in B2C e-commerce are: Small Products Digital Products Special Products Fresh Products B

Which form of e-commerce currently accounts for


16
about 97% of all e-commerce revenues?
B2B B2C C2B C2C A

Which of the following is a useful security mechanism All of the


17
when considering business strategy and IT?
encryption decryption firewall
mentioned
D

Which type of products is lesser purchased using e- None of the


18
commerce?
automobiles books groceries
mentioned
A

None of the
19 Which is not the application area of e-commerce? E-Learning E-Banking E-Auction
mentioned
D

20 In which year the IT Act was introduced? 2000 2020 2001 2010 A

Both SCM & None of the


21 is an early form of E-Commerce. SCM EDI
EDI mentioned
B

Which of the following is not related to security All of the


22
mechanism?
encryption decryption e-cash
mentioned
C

Digital Products are best suited for B2C e-commerce Are commodity Can be mass- Can be delivered All of the
23
because they: like products customized and at the time of mentioned
D

Which type of e-commerce focuses on consumers


24
dealing with each other?
B2B B2C C2B C2C D
Multiple Choice Questions - E-Commerce [BCA-603]
S.No. Question A B C D Answer
Which of the following is part of the four main types of All of the
25
e-commerce?
B2B B2C C2B
mentioned
D

The dimension of E-Commerce that enables commerce


26
across the boundaries is called
interactivity global reach richness ubiquity B

Goods are The customers


27 Reverse logistics is required because
defective
Goods are unsold simply change All of the above D
provide improve quality of a integrating supply increase
28 The purpose of supply chain management is customer product and demand production
C

Switching costs Differentiation is Requirement for Access to


29 Barriers to entry into an industry are likely to be high if:
are low low economies of distribution C
A digital signature is required …..
30 i) to tie an electronic message to the sender’s identity i and ii i, ii and iii i, ii, iii and iv ii, iii and iv B
616 ii) for non repudiation of communication by a sender
ECOMMERCE

The following are the components of

1. Consumer access equipment


2. Local on-ramps
3. Global information distribution networks

A. I-WAY B. Information superhighway

C. both a or b D. none of the above

Answer is : C

Any successful e-commerce application requires

A. I-way B. highway network

C. carry goods from point to point D. none of the above

Answer is : A

_________and ________ contents determine what type of vehicle is needed for I-way vehicular
traffic.

A. Information and multimedia B. data and processed information

C. both a and b D. a only.

Answer is : A

Integration of various industries such as entertainment, publication and communication media is


called as

A. cross-concept convergence B. cross-media convergence

C. cross-commerce convergence D. none

Answer is : B

Disadvantages of e-Commerce in India are


ECOMMERCE

(i) internet access is not universally available

(ii) (ii) Credit card payment security is not yet guaranteed

(iii) (iii) Transactions are de-personalized and human contact is missing

(iv) (iv) Cyber laws are not in place

A. i and ii B. ii and iii

C. i, ii, iii D. i, ii, iii, iv

Answer is : C

Electronic Data Interchange is necessary in

A. B2C e-Commerce B. C2C e-Commerce

C. B2B e-Commerce D. Commerce using internet

Answer is : C

EDI standard

defines several hundred transaction sets for


A. is not easily available B.
various business forms
C. is not popular D. defines only a transmission protocol

Answer is : B

For secure EDI transmission on internet

A. MIME is used B. S/MIME is used

C. PGP is used D. TCP/IP is used

Answer is : B
ECOMMERCE

Expand VANs

A. Value Addition Networks B. Value Added Networks

C. Value Access Networks D. Value Added Netway

Answer is : B

Linking all the Components of the I -Way require large captital investments in "open Systems
and insatalling gateways between various networks

A. True B. False

Answer is : TRUE

Expand CPE

A. Customer Premises Equipment B. Consumer Premises Equipment

C. Customer Process Equipment D. None of the above

Answer is : A

The set_top box is really a special purpose computer computer with powerful graphics and
communications features but limited versatility

A. True B. False

Answer is : TRUE

Expand IXCs

A. Inter Exchange Counter B. Inter Exchange Carriers

C. Internet Exchange Counter D. Inter Exchange Council

Answer is : B
ECOMMERCE

SMR-Expand

Special Mobile Ratio


A. Specialized Mobile Radio B.

C. Special Marketting Ratio D. Special Mobile Route

Answer is : A

Global Information Distribution networks represent the infrastructure criss-crossing countries


and continents

A. True B. False

Answer is : TRUE

ARPANET was established to counter the launch of ___________.

A. Gazprom B. Sputnik

C. INSAT D. Zenit

Answer is : B

Mesh network uses ______ switching.

A. Packet B. Circuit

C. PoE D. Stackable

Answer is : A
ECOMMERCE

The ARPANET researchers created ______.

A. National Communication Protocol B. Internet Protocol

C. Network Communication protocol D. Transport Control Protocol

Answer is : C

TCP/IP is capable of connecting multiple independent networks through _______.

A. routers B. switches

C. hubs D. cables

Answer is : A

CSNET included ARPANET and PHONENET

A. True B. False

Answer is : TRUE

The NSFNET backbone service was the largest single government investment in the NSF-
funded program.

A. True B. False

Answer is : TRUE

The internet, cable TV, computer networks are applications of _____.

A. Information Super highway B. ARPANET

C. ESNET D. EBONE

Answer is : A
ECOMMERCE

Present NSFNET is an example of _____.

A. BITNET B. National Research & Education Network

C. Early NSFNET D. Privatization & Commercialization

Answer is : D

ARPA funded the development of ______.

A. LINUX B. Berkeley UNIX

C. MULTICS D. UNICS

Answer is : B

National Information Infrastructure is also called as _____.

A. Modern NSFNET B. Broad band

C. I-way D. High-performance computer

Answer is : C
225 Questions

EFT stands for

A. Electronic fund transmission B. Electronic foreign transmission

C. Electronic feature transfer D. Electronic feature transmit

Answer is : A

Abbreviate EDI

A. Electronic data interface B. Electronic datatype interface

C. Electronic devic interface D. Electronic data integer

Answer is : A
ECOMMERCE

SSL stands for

A. Socket secure layer B. Secondary segment layer

C. Secure sockets layer D. Secure system layer

Answer is : C

SET is

A. System Electronic Transmit B. Secure electronic transaction

C. System Elemental transmission D. Symmetric electronic transfer

Answer is : B

MIME is

A. Multiple intranet mail extension B. multimedia internet mail execution

C. Multiple interconnect mail extension D. Multipurpose internet mail extension

Answer is : D

Cable TV set-top boxes, computer-based telephone, hubs, wiring closets and routers & digital
switches are called

A. CPE B. terminal equipment

C. both a or b D. none of the above

Answer is : C
ECOMMERCE

________is a special-purpose computer with powerful graphics and communication features but
with limited versatility

A. Computer-based telephone B. routers & digital switches

C. set-top boxes D. I-way

Answer is : C

_________ is available via coaxial or fiber owned by IXC

A. Long-distance networks B. satellite networks

C. wi-fi D. none of the above

Answer is : A

__________ consists of various government networks, regional networks, campus networks and
some international networks.

A. Academic internet B. Core internet

C. Both a or b D. None of the above

Answer is : C

________ is the premier group of research IP networks in United states

A. NSFNET B. EBONE

C. UUNET D. PSINet

Answer is : A
ECOMMERCE

EDI is

A. Electronic data interchange B. Electronic data interface

C. Electronic data interrupt D. Electronic data intermodule

Answer is : A

EFT is

A. Electronic fragmentation time B. Electronic funds tester

C. Electronic funds transfer D. None of the above

Answer is : C

CORBA is

Controlled object response broker Common Object Request Broker


A. B.
architecture Architecture
Controlled object Request broker
C. Common object response broker architecture D.
architecture

Answer is : B

The success of web hypertext publishing is aided by which of the following

A. More powerful workstations B. High-resolution graphic displays

C. Faster network communication D. All the above

Answer is : D
ECOMMERCE

_____ is an approach to information management in which data are stored in a network of


documents connected by links.

A. Hypertext B. Linked text

C. Hyperdata D. none

Answer is : A

______ is a system which is made of nodes and links

A. hypermedia B. webpage

C.  web document D. all the above

Answer is : D

The node from which a link originates is called as

A. reference B. anchor

C. both a or b D. none

Answer is : C

_________is a unique call number that provides the exact location of every data in the universal
network

A. URL B. http

C. www D. none

Answer is : A
ECOMMERCE

HTML enables document creation for the web by embedding control codes in __________ text.

A. ASCII B. ANSI

C. ANSI C D. none

Answer is : A

Entertainment, financial services, essential services, education and training etc can be termed as

A.  consumer-oriented applications B.  consumer-oriented services

C. a only D. both a and b

Answer is : D

________ includes search and discovery for a set of products in the larger information space
capable of meeting customer requirements and products

A. pre-purchase preparation phase B. purchase consummation phase

C. post-purchase interaction phase D. none

Answer is : A
ECOMMERCE

_____ includes mercantile protocols that specify the flow of information and documents
associated with purchasing.

A. pre-purchase preparation phase B. purchase consummation phase

C.  post-purchase interaction phase D. none

Answer is : B

________ includes customer service and support to address customer complaints, product
returns, and product defects.

A. pre-purchase preparation phase B.  purchase consummation phase

C.  post-purchase interaction phase D. none

Answer is : C
ECOMMERCE

To facilitate better consumer and organizational search, software intermediaries called

A. information brokers B.  brokerages

C.  information interfaces D. interface brokers

Answer is : A

50.The following are the components of ________

1. e-cash
2. e-cheque
3. credit card
4. debit card

A.  electronic payment systems B.  electronic funds transfer

C.  electronic money system D. none of the above

Answer is : A
250 Questions

51.The following list can be termed as

1. large-scale or wholesale payments (bank-to-bank transfer


ECOMMERCE

2. small-scale or retail payments


3. home banking

A.  Banking and financial payments B.  Retailing payments

C.  On-line electronic commerce payments D. Credit card-based payments systems

Answer is : A

The following list can be termed as

1. Credit cards
2. Private label credit/debit cards
3. Charge cards

A.  Banking and financial payments B.  Retailing payments

C.  On-line electronic commerce payments D. Credit card-based payments systems

Answer is : B

The following list can be termed as

1. Token-based payment systems


2. Electronic cash
3. Electronic cheque
4. Smart cards or debit cards

A. B.
 Banking and financial payments  Retailing payments
ECOMMERCE

C.  On-line electronic commerce payments D. Credit card-based payments systems

Answer is : C

An example of on-line currency exchange is

A. e-cash B. debit or prepaid

C. credit or postpaid D. none

Answer is : A

Users pay in advance for the privilege of getting information or service

A. debit B. credit

C.  real-time D. none

Answer is : A

The server authenticates the customers and verifies with the bank that funds are adequate before
purchase

A.  debit B. credit

C. real-time D. none
ECOMMERCE

Answer is : B

_____ are credit and debit cards and other card products enhanced with microprocessors capable
of holding more information than traditional magnetic stripe

A.  smart cards B. enhanced credit cards

C. optimized debit cards D. none

Answer is : A

RGTS is

A. Real Time Gross Settlement B. Revenue Teller Gross Settlement

C.  Real Time Gross Service D. none

Answer is : A

NEFT is

 Node based Electronic Funds Transfer  Node based Electronic Funds Transfer
A. B.
System Service

1. National Electronics Funds Transfer


C. Service D. National Electronics Funds Transfer System

Answer is : D
ECOMMERCE

IMPS is

A.  Immediate Payment Service B.  Intermediate Payment System

1. Immediate Payment System


C. D. Intermediate Payment Service.

Answer is : A

DES is

A. Digital Evaluation System B. Digital Encryption Standard

C. Digital Encryption System D. Double Encryption Standard

Answer is : B

Which one of the following is not one of the major types of e-commerce?

 C2B
A. B. B2C

C. B2B D. C2C

Answer is : A
ECOMMERCE

Which of the following refers to creating products tailored to individual customers?

A.  Customization B. Aggregation

C.  Direct materials D. Reverse auction

Answer is : A

What web server functionality allows to verify username and password and process certificates
and encryption information

A.  Processing of HTTP request B.  File transfer protocol

1. Data capture
C. D. Security services

Answer is : D

The fastest growing form of online advertising is_______

A.  Banner ads B.  Pop-up ads

C. Rich media/video ads D. Pop-under ads

Answer is : D

The term EDI stands for ---------------Data Interchange

A. Electric B. Electronic
ECOMMERCE

C. Elementary D. Extended

Answer is : B

Which of the following is coming under EDI?

A. Business B. Data Processing

C. Data communication D. All the above

Answer is : D

SMTP stands for

A. Small B. Simple

C. Simulated D. Symmetric

Answer is : B

EDI requires a business process as it deals with business forms exange.

A. True B. False

Answer is : TRUE

VAN stands for ------------------- Added Networks

A. Vast B. Variable

C. Value D. Vulnerability

Answer is : C
ECOMMERCE

EDI concept makes use of direct human intervention

A. True B. False

DI

A. True B. False

Answer is : FALSE

EDI is -----------------

A. Fast B. Inexpensive

C. Safe D. All the above

Answer is : D

Electronic commerce is a subset of Electronic Data Intercahnge.

A. True B. False

Answer is : FALSE

Electronic Data interchange is a subset of electronic commerce

A. True B. False

Answer is : TRUE

Fax is primarily ---------------------

A. Paper Based B. Requires Human interface

C. A and B D. A or B
ECOMMERCE

Answer is : C

275 Questions

Fax machines accept non standard data types

A. True B. False

Answer is : TRUE

EDI requires stanadrad message formats between trading partners.

A. True B. False

Answer is : TRUE

EFT stands for Electronic Funds ----------------

A. Trading B. Transmission

C. Transport D. Transfe

Answer is : A

EFTS is ------------------- tansfer between banks.

A. Debit B. Credit
A and B
C. D. None

Answer is : B
ECOMMERCE

Fed wire is a funds Transfer service in-------------------

A. India B. United States

C. Dubai D. Australia

Answer is : B

ACH transfers are used to process ---------------------------- payments for settlement in one or two
business days

A. high voulme B. small dollar


A and B
C. D. A or B

Answer is : C

Communication lines are not necessary for Electronic fund Transfer

A. True B. False

Answer is : FALSE

In EDI, Quick response means ----------------

better service
A. B. availability of wider products

Both A and B
C. D. None

Answer is : C

The clock pulses regulate the rate and timing of the data flow.

A. True B. False

Answer is : TRUE
ECOMMERCE

X.435 is not a protocol.

A. True B. False

Answer is : FALSE

MTA stands for --------Transfer Agent

A. Modem B. Message

C. Modern D. More

Answer is : B

Confidentiality is concerned with the unauthorized viewing of confidential or proprietary data

A. True B. False

Answer is : TRUE

Encryption prevents ------------------ from viewing data that is transmitted over


telecommunications channels

A. snoopers B. other prying seyes

C. hackers D. All the above

Answer is : D

There are --------------- basic encryption schemes.

A. four B. five
two
C. D. three
ECOMMERCE

Answer is : C

Private-key encryption requires that both sending and receiving parties do not have the same
private-encryption keys

A. True B. False

Answer is : FALSE

With public-key encryption, a message recipient generates a matched set of keys, one public key
and one private key

A. True B. False

Answer is : TRUE

Data ----------------- is a guarantee that what was sent by the sender is actually what is received
by the receiver

A. Integrity B. Reliability
Consistency
C. D. Clarity

Answer is : A

VAN increases the need for paper transfers.

A. True B. False

Answer is : FALSE

SCM stands for --------- Chain Management

A. Supplier B. Supply
Surplus
C. D. Score

Answer is : B
ECOMMERCE

Which of the following is a graphic display on a web page used for advertising?

A. portal B. shopping cart

C. icon D. banner ad

Answer is : D

The best products to sell in B2C e-commerce are

A. Small products B. Specialty products

C. Digital products D. Fresh products

Answer is : C

VAN stands for

A. Value added network B. Value aero network

C. Value access network D. Value addressed network

Answer is : A

TCL is

A. Tool calling language B. Tool comment language

C. Tool comments language D. Tool casting language

Answer is : B

Which of these functions is called to display the output of an applet

A. display() B. PrintApplet()

C. paint() D. displayApplet()

Answer is : C
ECOMMERCE

100.Which of these methods can be used to output a string in an applet

A. dispaly() B. Print()

C. drawString() D. transient()

Answer is : C
300 Questions

Which of these method is a part of Abtract Window Toolkit(AWT)?

A. display() B. paint()

C. drawString() D. transient()

Answer is : B

Which of these modifiers can be used for a variable so that it can be accessed from any thread or
part of a program ?

A. Transient B. volatile

C. global D. No motifier is need

Answer is : B

Which of these operators can be used to get run time information about an object ?

A. getinfo B. info

C. instanceof D. getinfoof

Answer is : C

Which of the following is/are required to allow computer to communicate over a network ?

A. communications programs B. Network communicators

C. Communications services D. Network Services


ECOMMERCE

Answer is : D

Presentations can be made live over the internet to group of people using which of the following
?

A. E-mail B. Collaborative conferencing

C. Videoconferencing D. Webcasting

Answer is : D

Electronic data interchange ,EDI , uses which of the following to allow the computer of two
different companies to 'talk' to one another ?

A. Application software B. Interaction software

C. Translation software D. None of the above

Answer is : C

The _______________ typology is a circular network with a computer in the centre

A. Star B. Ring

C. Line D. Bus

Answer is : A

Which of the following companies is common carrier ?

A. IBM B. AOL

C. Microsoft D. AT&T

Answer is : D

A network connection that is described as broadband is:


ECOMMERCE

A. Slower than modem connection B. Achieved over satellite connections

C. Fast enough for multimedia transmissions D. None of the above

Answer is : C

LANs can operate over:

A. Fiber lines. B. microwaves

C. T1 lines D. Co-axial cables

Answer is : D

Which of the following is a physical channel ?

A. Satellite B. Twisted pair

C. Microwave D. All of the above

Answer is : B

A network that is used by the general public but runs over commen carrier lines is called a:

A. Circuit switched network B. packet switched network

C. Private network D. Public-access network

Answer is : B

Which of the following lines can be used to create a private connection over the internet using
lines owned by a common carrier ?

A. Reserved line B. Private line

C. Dedicated line D. None of the above

Answer is : C
ECOMMERCE

A company that provides private computer network support services to other companies is
called:

A. Backbone network B. Private network

C. public network D. Value-added network

Answer is : D

Which of the following device that forwards information packets to their destination

A. Bridge B. Transmitter

C. Modem D. Router

Answer is : D

_______________ is a telecommunication standard that is used in the united states and uses
circuit switching to transmit message.

A. CDMA B. TDMA

C. GPRS D. 3G services

Answer is : A

Which of the following are characteristics of a multi-user computer system?

A. Shared printers. B. Shared software

C. Shared information D. All of the above

Answer is : D
ECOMMERCE

Which of the following is need for a computer network?

A. Application software B. Network operating system

C. operating system D. System software

Answer is : B

World wide web (WWW) was introduced in the year _______

A. 1994 B. 1996

C. 1992 D. 1990

Answer is : A

___________ is an early from of E-commerce

A. SCM B. EDI

C. Both of these D. None of these

Answer is : B

____________ is concerned with the buying and selling information products and services over
computer communication network

A. Commerce B. E-commerce

C. E-business D. None of the above

Answer is : B

___________ is concerned with the buying and selling information products and services over
computer communication network
ECOMMERCE

A. Commerce B. E-commerce

C. E-business D. None of the above

Answer is : B

____________ is a set os standard developed in the 1960s to exchange business information and
to do electronic transactions

A. EDI B. Protocol

C. TCP/IP D. None o these

Answer is : A

Which among the following product is suitable for E-commerce?

A. Book B. Vegetables

C. All of these D. None of these

Answer is : A

_______ allows a business application on the computer of one organization to communicate


directly with business application on the computer of another company.

A. EDI B. Protocols

C. Standards D. Business applications

325 Questions Answer is : A

Electronic exchange of business documet in a standard format is known as ________

A. E-commerce B. E-business

C. EDI D. None of the above


ECOMMERCE

Answer is : C

___________ is essentially a business process that connects manufactures,retailers,customer and


supply in the form a chain to develop and deliver products.

A. E-commerce B. EDI

C. Networking D. SCM

Answer is : D

Which of the following is not a party of SCM?

A. Suppiers B. Manufacturers

C. Distributers D. Customers

Answer is : C

____________ is a commercial process that include production, distribution,sales or delivery of


good and services though electronic means

A. E-commerce B. SCM

C. EDI D. None of these

Answer is : A

Among the alternate models of B2B e-commerce __________ is the best means to obtain a
competitive advantage in the market place.

A. Process based B. strategic relationship based

C. Transaction based D. Any of these

Answer is : B
ECOMMERCE

_______________ focus on producing a highly intergraded value proposition through a


managed process .

A. Hubs B. Community

C. content D. None of these

Answer is : A

_______ is basically a concept of online marketing and distribution of product and services over
the internet.

A. B2G B. B2E

C. B2C D. B2B

Answer is : C

________ E-commerce consists of the sale of product or service s from a business to the general
public.

A. B2G B. B2E

C. B2B D. B2C

Answer is : D

Which of the following os not suitable for a B2C transaction ?

A. Clothes B. Flowers

C. Airline reservation D. None

Answer is : D

______________ e-commerce transaction has the advantage of eliminating middlemen.

A. B2G B. B2C

C. B2B D. B2E
ECOMMERCE

Answer is : B

_________ e-commerce involves customers gathering information purchasing and receiving


products over an electronic network

A. B2G B. B2E

C. B2B D. B2C

Answer is : D

Which of the following is not an user of B2C e-commerce

A. Manufacture B. Distributers

C. Publishers D. None

Answer is : D

______________ e-commerce involves the electronic facilitation of transaction between


customers through some third party

A. C2C B. B2E
C
B2B D. B2G
.

Answer is : A

Which among the following is an example of C2C ?

A. e-Bay B. Amazon.com

C. Rentalic.com D. All of these

Answer is : D

Firefox is a

A. Web browser B. Web development

C. Web liker D. Web analytics


ECOMMERCE

Answer is : A

Set of instructions which called a

A. program B. Prompt

C. Control D. Group instraction

Answer is : A

E-commerce is

A. Electronic commerce B. Electric commerce

C. Electro commerce D. None of these

Answer is : A

342 Questions
Ecommerce MCQ

1. Which of the following is a part of the


four main types for e-commerce ?

(A) B2B
(B) B2C
(C) C2B
(D) All of the above
SHOW ANSWER
Answer : D
2. The dimension of e-commerce that
enables commerce across national
boundaries.

(A) Interactivity
(B) Global Reach
(C) Richness
(D) Equility
SHOW ANSWER
Answer : B

3. Which of the following is not considered


to be one of the three phases of e-
commerce.
(A) Innovation
(B) Consolidation
(C) Preservation
(D) Reinvention
SHOW ANSWER
Answer : C

4. Which segment do eBay, Amazon.com


belong

(A) B2Bs
(B) B2Cs
(C) C2Bs
(D) C2Cs
SHOW ANSWER
Answer : B

5. Which segment is an example of eBay

(A) B2B
(B) C2B
(C) C2C
(D) None of the above
SHOW ANSWER
Answer : D
6. The best product to sell in B2C e-
commerce are-

(A) Small Products


(B) Digital Products
(C) Specially Products
(D) Fresh Products
SHOW ANSWER
Answer : B

7. In which website global easy buy is


facilitated
(A) Ebay.com
(B) Amazon.com
(C) Yepme.com
(D) None of these
SHOW ANSWER
Answer : A

8. Which products are people most likely to


be comfortable buying on the Internet.

(A) Books
(B) PCs
(C) CDs
(D) All of the above
SHOW ANSWER
Answer : D

9. Digital products are best suited for B2C e-


commerce because they

(A) Are commodity like product


(B) Can be mass-customized
(C) Can be delivered at the time of purchase
(D) All of the above
SHOW ANSWER
625 Answer : D

10. Which of the following is an example of


portal.

(A) Amazon
(B) Ebay
(C) Yahoo
(D) Facebook
SHOW ANSWER
Answer : C
11. Business model solution is related with

(A) SCM
(B) EDI
(C) ERP
(D) None of these
SHOW ANSWER
Answer : C

12. Compared to Internet users, The


number of cell Phage subscribe is

(A) About the same


(B) Slightly fewer
(C) Much fewer
(D) Much longer
SHOW ANSWER
Answer : D

13. The percentage of customer who visit a


website and actively by some thing is
defined.

(A) Spam
(B) Mail
(C) Conversion rate
(D) Click
SHOW ANSWER
Answer : C

14. Which of the following is not a


horizontal portal.

(A) AOL
(B) Yahoo
(C) Sailnet
(D) MSN
SHOW ANSWER
Answer : C
15. What are materials used in production
in a manufacturing company.

(A) Direct Material


(B) Indirect Material
(C) EDI
(D) None of these
SHOW ANSWER
Answer : A
16. The strategy designed to complete in all
market around the globe is called.

(A) Cost Strategy


(B) Focus Strategy
(C) scope
(D) None of these
SHOW ANSWER
Answer : C

17. The company equipment that the


system uses to achieve its e-commerce
functionality is.
(A) Hardware Platform
(B) Transaction Platform
(C) Content Platform
(D) None of these
SHOW ANSWER
Answer : A

18. Amazon.com is well known for which e-


commerce marketing technique.

(A) Banner ads


(B) Pop us ads
(C) Affiliate program
(D) Virtual Marketing
SHOW ANSWER
Answer : C

19. Redundant navigation refers to

(A) Load quickly


(B) Product offering
(C) Foll Proof navigation
(D) Alternative navigation of the same
content
SHOW ANSWER
Answer : D

20. Which form of e-market place brings


togather buyer and sellers from the same
industry

(A) Horizontal
(B) Vertical
(C) Integrated
(D) Inclined
SHOW ANSWER
Answer : B
636
E‐Commerce
BCA 603 N

VI SEM

Multiple Choice Questions 
 
1. Which of the following describes e‐commerce? 
a. Doing business electronically
b. Doing business 
c. Sale of goods 
d. All of the above 
Answer: A 
2. Which of the following is part of the four main types for e‐commerce? 
a. B2B 
b. B2C 
c. C2B 
d. All of the above 
Answer: D    
3. Which segment do eBay, Amazon.com belong? 
a. B2Bs 
b. B2Cs 
c. C2Bs 
d. C2Cs 
Answer: B   
4. Which type of e‐commerce focuses on consumers dealing with each other? 
a. B2B 
b. B2C 
c. C2B 
d. C2C 
Answer: D    
5. Which segment is eBay an example? 
a. B2B 
b. C2B 
c. C2C 
d. None of the above 
  Answer: D    
6. Which type deals with auction? 
a. B2B 
b. B2C 
c. C2B 
d. C2C 
Answer: D   
7. In which website Global Easy Buy is facilitated? 
a. Ebay.com 
b. Amazon.com
c. Yepme.com
d. None of these
Answer: A    
8. The best products to sell in B2C e‐commerce are: 
a. Small products 
b. Digital products 
c. Specialty products 
d. Fresh products 
Answer: B    
9. Which products are people most likely to be more uncomfortable buying on the Internet? 
a. Books 
b. Furniture 
c. Movies 
d. All of the above  
    Answer: B   
10. Which products are people most likely to be comfortable buying on the Internet? 
a. Books 
b. PCs 
c. CDs 
d. All of the above 
Answer: D    
11. Digital products are best suited for B2C e‐commerce because they: 
a. Are commodity like products 
b. Can be mass‐customized and personalized 
c. Can be delivered at the time of purchase 
d. All of the above 
Answer: D    
12. The solution for all business needs is
a. EDI
b. ERP
c. SCM
d. None of the above
Answer: B
13. All of the following are techniques B2C e‐commerce companies use to attract customers, 
except: 
a. Registering with search engines 
b. Viral marketing 
c. Online ads 
d. Virtual marketing 
Answer: D    
14. Which  is  a function of E‐commerce
a. marketing
b. advertising
c. warehousing
d. all of the above 
Answer: D
15.  Which  is not  a function of E‐commerce
a. marketing
b. advertising
c. warehousing
d. none of the above 
Answer: C    
16. Which term represents a count of the number of people who visit one site, click on an ad, and 
are taken to the site of the advertiser? 
a. Affiliate programs 
b. Click‐through 
c. Spam 
d. All of the above 
Answer: B    
17. What is the percentage of customers who visit a Web site and actually buy something called? 
a. Affiliate programs 
b. Click‐through 
c. Spam 
d. Conversion rate 
Answer: D    
18. What are materials used in production in a manufacturing company or are placed on the shelf 
for sale in a retail environment? 
a. Direct materials 
b. Indirect materials 
c. EDI 
d. None of the above 
Answer: A   
19. What are materials that are necessary for running a modern corporation, but do not relate to 
the company's primary business activities? 
a. Direct materials 
b. Indirect materials 
c. EDI 
d. None of the above 
Answer: B    
20. What are ballpoint pens purchased by a clothing company? 
a. Direct materials 
b. Indirect materials 
c. EDI 
d. None of the above 
Answer: B    
21. What is another name for? 
a. Direct materials 
b. Indirect materials 
c. EDI 
d. None of the above 
Answer: B    
22. What is the process in which a buyer posts its interest in buying a certain quantity of items, and 
sellers compete for the business by submitting successively lower bids until there is only one 
seller left? 
a. B2B marketplace 
b. Intranet 
c. Reverse auction 
d. Internet 
Answer: C   
23. What are plastic cards the size of a credit card that contains an embedded chip on which digital 
information can be stored? 
a. Customer relationship management systems cards 
b. E‐government identity cards 
c. FEDI cards 
d. Smart cards 
Answer: D    
24. Most individuals are familiar with which form of e‐commerce? 
a. B2B 
b. B2C 
c. C2B 
d. C2C 
Answer: B    
25. Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? 
a. B2B 
b. B2C 
c. C2B 
25 Questions d. C2C 
Answer: A    
26. Which of the following are advantages normally associated with B2B e‐commerce? 
a. Shorter cycle times 
b. Reduction in costs 
c. Reaches wider audiences 
d. all of the above 
Answer: D    
27. If the threat of substitute products or services is low it is a(n): 
a. Disadvantage to the supplier 
b. Advantage to the buyer 
c. Advantage to the supplier 
d. None of the above 
Answer: C    
28. The threat of new entrants is high when it is: 
a. Hard for customers to enter the market 
b. Hard for competitors to enter the market 
c. Easy for competitors to enter the market 
d. Easy for customers to enter the market 
Answer: C    
29. If it is easy for competitors to enter the market, the threat of new entrants is considered: 
a. High 
b. Low 
c. More 
d. Less 
Answer: A    
30. An industry is less attractive for suppliers when the rivalry among existing competitors is: 
a. High 
b. Low 
c. More 
d. Less 
Answer: A    
31. Unique value auction is mainly applies to? 
a. New products
b. Second hand products
c. Engineering products
d. None of the above
i. Answer: B  
32. Paisapay is facilitated in
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. none of the above 
Answer: A    
33. Which of the following is a useful security mechanism when considering business strategy and 
IT? 
a.encryption
b.decryption
c.firewall
d.all the above
Answer: D 
34. Which of the following is not related to security mechanism 
a. encryption
b. decryption
c. e‐cash
d. all the above

Answer: C 
35. A product or service that customers have come to expect from an industry, which must be 
offered by new entrants if they wish to compete and survive, is known as a(n)? 
a. Switching costs 
b. Loyalty programs 
c. Entry barriers 
d. Affiliate programs 
Answer: C    
36. Which of the following statements accurately reflect the impact of technology? 
a. Technology has caused buyer power to increase 
b. Technology has lessened the entry barriers for many industries 
c. Technology has increased the threat of substitute products and services 
d. all of the above 
Answer: D   
37. A business cannot be all things to all people. Instead, a business must: 
a. Identify target customers 
b. Identify the value of products/services as perceived by customers 
c. all of the above 
d. None of the above 
Answer: C    
38. How the transactions occur in e‐commerce? 
a. Using e‐medias 
b. Using computers only
c. Using mobile phones only
d. None of the above
Answer: A    
39. Which type of products is lesser purchased using ecommerce? 
a. automobiles
b. books
c. softwares
d. none
Answer: A 
40. A business competing in a commodity like environment must focus on which of the following? 
a. Price 
b. Ease / speed of delivery 
c. Ease of ordering 
d. all of the above 
Answer: D   
41. Which of the following refers to creating products tailored to individual customers? 
a. customization 
b. aggregation 
c. Direct materials 
d. Reverse auction 
Answer: A    
42. Materials used in the normal operation of a business but not related to primary business 
operations are called what? 
a. Supplies 
b. Direct materials 
c. Indirect materials 
d. Daily stuff 
Answer: C    
43. Amazon.com is well‐known for which e‐commerce marketing technique? 
a. Banner ads 
b. Pop‐up ads 
c. Affiliate programs 
d. Viral marketing 
Answer: C    
44. What is the name given to an interactive business providing a centralized market where many 
buyers and suppliers can come together for e‐commerce or commerce‐related activities? 
a. Direct marketplace 
b. B2B 
c. B2C 
d. Electronic marketplace 
Answer: D    
45. Which form of e‐marketplace brings together buyers and sellers from multiple industries, often 
for MRO materials? 
a. horizontal 
b. Vertical 
c. Integrated 
d. Inclined 
Answer: A   
46. Which form of e‐marketplace brings together buyers and sellers from the same industry? 
a. horizontal 
b. Vertical 
c. Integrated 
d. Inclined 
Answer: B   
47. Which type of add appears on a web page? 
a. pop‐under ad 
b. Pop‐up ad 
c. Banner ad 
d. Discount ad  
Answer: C    
48. What type of ad appears on top of a web page? 
a. pop‐under ad 
b. pop‐up ad 
c. banner ad 
d. discount ad 
Answer: B    
49. What type of ad appears under a web page? 
a. pop‐under ad 
b. pop‐up ad 
c. banner ad 
d. discount ad 
Answer: A    
50. Which, if any, of the following types of ads are people most willing to tolerate? 
a. pop‐under ad 
b. pop‐up ad 
c. banner ad 
d. none of the above 
50 Questions
Answer: D   
51. Which of the following is an Internet‐based company that makes it easy for one person to pay 
another over the Internet? 
a. electronic check 
b. electronic bill presentment and payment 
c. conversion rates 
d. financial cybermediary 
Answer: D    
52. Which of the following is a method of transferring money from one person's account to 
another? 
a. electronic check 
b. credit card 
c. e‐transfer 
d. none of the above 
Answer: A    
53. An electronic check is one form of what? 
a. e‐commerce 
b. online banking 
c. e‐cash 
d. check 
54. If you need to transfer money to another person via the internet, which of the following 
methods could you use? 
a. financial cybermediary 
b. electronic check 
c. electronic bill presentment and payment 
d. all of the above 
Answer: D    
55. Which of the following permits the transmission of a bill, along with payment of that bill, to be 
conducted over the Internet? 
a. financial cybermediary 
b. electronic check 
c. electronic bill presentment and payment 
d. all of the above 
Answer: C   
56. A combination of software and information designed to provide security and information for 
payment is called a what? 
a. digital wallet 
b. pop up ad 
c. shopping cart 
d. encryption 
Answer: A    
57. What is the name for direct computer‐to‐computer transfer of transaction information 
contained in standard business documents? 
a. internet commerce 
b. e‐commerce 
c. transaction information transfer 
d. electronic data interchange 
Answer: D    
58. Which of the following is used in B2B to pay for purchases? 
a. e‐commerce 
b. financial electronic data interchange 
c. electronic data exchange 
d. electronic checks 
Answer: B    
59. Public key encryption uses multiple keys.  One key is used to encrypt data, while another is used 
to decrypt data.  The key used to encrypt data is called the _____ key, while the key used to 
decrypt data is called the _____ key. 
a. encryption, decryption 
b. private, public 
c. encryption, public 
d. public, private 
Answer: D    
60. Secure Sockets Layers does which of the following? 
a. creates a secure, private connection to a web server 
b. encrypts information 
c. sends information over the internet 
d. all of the above 
Answer: D   
61. When a transaction is processed online, how can the merchant verify the customer's identity? 
a. use secure sockets layers 
b. use secure electronic transactions 
c. use electronic data interchange 
d. use financial electronic data interchange 
Answer: B    
62. The practice of forging a return address on an e‐mail so that the recipient is fooled into 
revealing private information is termed? 
a. hacking 
b. cracking 
c. dumpster diving 
d. spoofing 
Answer: D   
63. What is a model of a proposed product, service, or system? 
a. Prototyping 
b. Prototype 
c. Proof‐of‐concept prototype 
d. Selling prototype 
Answer: B    
64. What is an internal organizational Internet that is guarded against outside access by a special 
security feature called a firewall (which can be software, hardware, or a combination of the 
two)? 
a. Client/server network 
b. Intranet 
c. Extranet 
d. Thin client 
Answer: B    
65. What is an intranet that is restricted to an organization and certain outsiders, such as customers 
and suppliers? 
a. Client/server network 
b. Intranet 
c. Extranet 
d. Thin client 
Answer: C    
66. What is a detailed process for recovering information or an IT system in the event of a 
catastrophic disaster such as a fire or flood? 
a. Disaster recovery plan 
b. Hot site 
c. Cold site 
d. Disaster recovery cost curve 
Answer: A   
67. What is a separate facility that does not have any computer equipment but is a place where the 
knowledge workers can move after the disaster? 
a. Disaster recovery plan 
b. Hot site 
c. Cold site 
d. Disaster recovery cost curve 
Answer: C   
68. What is a separate and fully equipped facility where the company can move immediately after 
the disaster and resume business? 
a. Disaster recovery plan 
b. Hot site 
c. Cold site 
d. Disaster recovery cost curve 
Answer: B    
69. What charts (1) the cost to your organization of the unavailability of information and technology 
and (2) the cost to your organization of recovering from a disaster over time? 
a. Disaster recovery plan 
b. Hot site 
c. Cold site 
d. Disaster recovery cost curve 
Answer: D    
70. Which factor determines when your IT system will be available for knowledge workers to 
access? 
a. Availability 
b. Accessibility 
c. Reliability 
d. None of the above 

Answer: A  

71. Which factor determines who has the right to access different types of IT systems and 
information? 
a. Availability 
b. Accessibility 
c. Reliability 
d. Scalability 

Answer: B    

72. Which factor ensures your IT systems are functioning correctly and providing accurate 
information? 
a. Availability 
b. Accessibility 
c. Reliability 
d. Scalability 

Answer: C    

73. Which factor represents how well your system can adapt to increased demands? 
a. Availability 
b. Accessibility 
c. Reliability 
d. Scalability 

Answer: D   

74. Which factor represents a system's ability to change quickly? 
a. Flexibility 
b. Performance 
c. Capacity planning 
d. Benchmark 
Answer: A    
75. What is a set of conditions used to measure how well a product or system functions? 
a. Flexibility 
b. Performance 
c. Capacity planning 
75 Questions
d. Benchmark 
Answer: D    
76. What determines the future IT infrastructure requirements for new equipment and additional 
network capacity? 
a. Flexibility 
b. Performance 
c. Capacity planning 
d. Benchmark 
Answer: C    
77. What automates business processes? 
a. Workflow 
b. ASP 
c. Workflow system 
d. EIP 
Answer: C    
78. What defines all of the steps or business rules, from beginning to end, required for a process to 
run correctly? 
a. Workflow 
b. EIP 
c. Workflow system 
d. SLA 
Answer: A    
79. What sends work assignments through an e‐mail system? 
a. Database‐based enterprise information portal 
b. Messaging‐based enterprise information portal 
c. Database‐based workflow system 
d. Messaging‐based workflow system 
Answer: D   
80. Which will not  harm  computer resources  
a. firewall
b. Virus
c. Trojan horse
d. None of the above 
Answer: A  
81. Which is not a function of ERP?  
a. Warehousing
b. sales
c. scheduling
d. None of the above 
Answer: D 
82. Which is a function of ERP?  
a. Warehousing
b. sales
c. scheduling
d. all of the above 
Answer: D
83. Which of the following is the primary characteristic of an intranet? 
a. People outside the organization can access it 
b. People inside the organization can't access it 
c. People outside the organization can't access it 
d. None of the above 
Answer: C    
84. Which concept suggests that different applications and computer systems should be able to 
communicate with one another? 
a. Integration 
b. Web services 
c. Scalability 
d. Interoperability 
Answer: D   
85. Which service encompasses all technologies used to transmit and process information on an 
across a network? 
a. Interoperability 
b. Scalability 
c. Benchmarking 
d. Web services 
Answer: D   
86. Which process can prevent  data from lose due to computer problems or human errors? 
a. backup 
b. recovery 
c. benchmarking 
d. data cleansing 
Answer: A   
87. Which process is used to reinstall data from a copy when the original data has been lost? 
a. backup 
b. recovery 
c. benchmarking 
d. data cleansing 
Answer: B   
88. What describes a process of continuously measuring results and comparing those results to 
optimal performance so that actual performance may be improved? 
a. Performance 
b. Capacity planning 
c. Benchmarking 
d. Data cleansing 
Answer: C   
89. Who protects system from external threats? 
a. firewall
b. EDI
c. ERP
d. Script kiddies 
Answer: A   
90. Who breaks into other people's computer systems and steals and destroys information? 
a. Hackers
b. softwares
c. Hacktivists 
d. Script kiddies 
Answer: a
91. What is software that comes hidden in free downloadable software and tracks your online 
movements, mines the information stored on your computer, or uses your computer's CPU and 
storage for some task you know nothing about? 
a. Web log 
b. Clickstream 
c. Anonymous Web browsing service 
d. None of the above 
Answer: D   
92. ERP stands for
a. Enterprise resolution planning
b. Enterprise reverse planning
c. Enterprise resource planning
d. None of the above
Answer: C
93. Which is not a component of ERP? 
a. Legacy systems
b. Bolt on applications
c. Operational database
d. Cybersoft
Answer: D   
94. Which is not a function of ERP? 
a. Human resource management
b. financial
c. warehousing
d. None of the above 
Answer: D   
95. What is a type of virus that spreads itself, not just from file to file, but from computer to 
computer via e‐mail and other Internet traffic? 
a. Computer virus 
b. Worm 
c. Denial‐of‐service attack 
d. None of the above 
Answer: B   
96. What floods a Web site with so many requests for service that it slows down or crashes? 
a. Computer virus 
b. Worm 
c. Denial‐of‐service attack 
d. None of the above 
Answer: C    
97. What harnesses far‐flung computers together by way of the Internet or a virtual private network 
to share CPU power, databases, and database storage? 
a. Computer virus 
b. Worm 
c. Denial‐of‐service attack 
d. None of the above 
Answer: D    
98. What consists of the identification of risks or threats, the implementation of security measures, 
and the monitoring of those measures for effectiveness? 
a. Risk management 
b. Risk assessment 
c. Security 
d. None of the above 
Answer: A   
99. What is the process of evaluating IT assets, their importance to the organization, and their 
susceptibility to threats, to measure the risk exposure of these assets? 
a. Risk management 
b. Risk assessment 
c. Security 
d. None of the above 
Answer: B   
100. What is the process of making a copy of the information stored on a computer? 
a. Backup 
b. Anti‐virus 
c. Firewall 
d. Biometrics 
100 Questions Answer: A   
101. What software detects and removes or quarantines computer viruses? 
a. Backup 
b. Anti‐virus 
c. Firewall 
d. Biometrics 
Answer: B   
102. What is hardware and/or software that protects computers from intruders? 
a. Backup 
b. Anti‐virus 
c. Firewall 
d. Biometrics 
Answer: C   
103. What is the use of physical characteristics — such as your fingerprint, the blood vessels 
in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide 
identification? 
a. Backup 
b. Anti‐virus 
c. Firewall 
d. Biometrics 
Answer: D   
104. All of the following are considered biometrics, except: 
a. Fingerprint 
b. Retina 
c. Password 
d. Voice 
Answer: C 
105. What scrambles the contents of a file so you can't read it without having the right 
decryption key? 
a. Encryption 
b. Intrusion‐detection software 
c. Security‐auditing software 
d. All of the above 
Answer: A   
106. What is an encryption system that uses two keys: a public key that everyone can have 
and a private key for only the recipient? 
a. Encryption 
b. Public key encryption 
c. Intrusion‐detection software 
d. Security‐auditing software 
Answer: B   
107. What looks for people on the network who shouldn't be there or who are acting 
suspiciously? 
a. Encryption 
b. Public key encryption 
c. Intrusion‐detection software 
d. Security‐auditing software 
Answer: C   
108. What checks out your computer or network for potential weaknesses? 
a. Encryption 
b. Public key encryption 
c. Security‐auditing software 
d. None of the above 
Answer: C   
109. Which of the following to viruses harm? 
a. Your keyboard 
b. Your monitor 
c. Your processor 
d. Viruses do not harm any of the above 
Answer: D   
110. Which of the following can a virus do? 
a. Hurt your hardware 
b. Hurt any files they weren't designed to attack 
c. Infect files on write‐protected disks 
d. None of the above 
Answer: D   
111. In simple terms, what does risk assessment ask? 
a. What can go wrong? 
b. How likely is it to go wrong? 
c. What are the possible consequences if it does go wrong? 
d. All of the above 
Answer: D   
112. Which of the following is a characteristic of a firewall? 
a. Examines each message as it seeks entrance to the network 
b. Blocks messages without the correct markings from entering the network 
c. Detects computers communicating with the Internet without approval 
d. All of the above 
Answer: D   
113. Which of the following are ways to prove access rights? 
a. What you know, like a password 
b. What you have, like an ATM card 
c. What you look like 
d. All of the above 
Answer: D   
114. Which item can a password be used to protect? 
a. Network 
b. File 
c. Folder 
d. All of the above 
Answer: D   
115. Which is the most important component of IT? 
a. Information 
b. People 
c. Information technology 
d. Computers 
Answer: B   
116. Which of the following applies to the implementation of an idea? 
a. Copyright 
b. Intellectual property 
c. Patent 
d. Denial‐of‐service attack 
Answer: C   
117. When you purchase copyrighted software, what actually are you paying for? 
a. The cost of the CDs, manuals, and development of the software 
b. The cost of the CDs, manuals, and a share of the cost of the software development 
c. A share of the cost of software development 
d. All of the above 
Answer: D   
118. Which of the following is not a dimension of privacy? 
a. Need for personal space 
b. Need to feel in control of our possessions 
c. Need to feel in control of our personal information 
d. All of the above are dimensions of privacy 
Answer: D   
119. Which of the following captures screen images? 
a. Key logger 
b. Packet sniffer 
c. Log analysis tools 
d. Screen capture software 
Answer: D 
120. Which of the following examines information passing through switches, hubs, or 
routers? 
a. Key logger 
b. Packet sniffer 
c. Log analysis tools 
d. Screen captures 
Answer: B   
121. Which of the following records logons and deletions? 
a. Key logger 
b. Packet sniffer 
c. Log analysis tools 
d. Screen captures 
Answer: C   
122. E‐mail messages may be stored on which of the following computers? 
a. Sender's computer 
b. Sender's server 
c. Recipient's server 
d. All of the above 
Answer: D   
123. What might identity thieves do with your identity? 
a. Apply for and use credit cards 
b. Apply for a loan 
c. Change their identity 
d. All of the above 
Answer: D   
124. Which of the following is not a common approach to phishing? 
a. Send an official‐looking e‐mail asking for confidential information 
b. Ask people to fill out and return a fake letter using postal mail 
c. Ask people to click a link in an e‐mail to open a submission form on a web page 
d. All of the above are uncommon approaches to phishing 
Answer: B   
125. A technique used to gain personal information for the purpose of identity theft, often by 
e‐mail, is called? 
a. Phishing 
b. Carding 
c. Brand spoofing 
125 Questions d. All of the above 
Answer: D   
126. Companies can gather information about employees and potential employees from 
which of the following places? 
a. Job applications 
b. Credit reports 
c. Companies that track Web surfers 
d. All of the above 

Answer: D   

127. Cyber slacking consists of what activities? 
a. Visiting “inappropriate” web sites 
b. Visiting news sites 
c. Chatting online with others about non‐work topics 
d. All of the above 
Answer: D   
128. Cookies are used to do which of the following? 
a. Store your ID and password for subsequent logons to the site 
b. Store contents of electronic shopping carts 
c. To track web activity 
d. All of the above and more 
Answer: D   
129. Unsolicited e‐mail is called what? 
a. Junk mail 
b. Spam 
c. Extra mail 
d. None of the above 
Answer: B   
130. What is the name of the new anti‐Spam bill? 
a. No‐Spam 
b. CAN‐Spam 
c. Spam‐Away 
d. Stop Spam 

Answer: B   

131. What is the legal protection afforded an expression of an idea, such as a song, video 
game, and some types of proprietary documents? 
a. Ethics 
b. Intellectual property 
c. Copyright 
d. Fair Use Doctrine 
Answer: C   
132. What is the unauthorized use, duplication, distribution or sale of copyrighted software? 
a. Fair Use Doctrine 
b. Pirated software 
c. Counterfeit software 
d. Privacy 
Answer: B   
133. What is a program, when installed on a computer, records every keystroke and mouse 
click? 
a. Key logger software 
b. Hardware key logger 
c. Cookie 
d. Adware 
Answer: A   
134. What is software you don't want hidden inside software you do want? 
a. Adware 
b. Trojan‐horse software 
c. Spyware 
d. All of the above 
Answer: D   
135. What is an electronic representation of cash? 
a. Digital cash 
b. Electronic cash 
c. E‐cash 
d. All of the above 
Answer: D   
136. What is a fully‐equipped computer that you wear as a piece of clothing or attached to a 
piece of clothing similar to the way you would carry your cell phone on your belt? 
a. Wearable computer 
b. GPS 
c. Implant chip 
d. None of the above 
Answer: A    
137. What is a technology‐enabled microchip implanted into the human body? 
a. Wearable computer 
b. GPS 
c. Implant chip 
d. None of the above 
Answer: C   

138. Which of the following is not a reason why digital cash has turned out to be extremely 
difficult? 
a. If your system crashes you lose your money 
b. There is only one standard 
c. Digital cash makes money laundering easy 
d. Digital cash travels across the vast Internet and is susceptible to begin stolen 
Answer: B   
139. Smart card is better protected than other cards using 
a. Encryption 
b. Firewall 
c. Hub 
d. All the above 
Answer: A 
140. Trust card is introduced by 
a. BSNL and itzcash 
b. BSNL and oxicash 
c. BSNL only 
d. None 
Answer: A 
141. PaisaPay is offered only by 
a. Homeshop18.com 
b. eBay.in 
c. amazon.com 
d. none 
Answer: B 
142. The E‐payment mechanism widely used in B2B is 
a. Credit card 
b. Debit card 
c. Master card 
d. E‐cheque 
Answer: D 
143. Which type of technology will increase portability and mobility? 
a. Implant chips 
b. Micro‐payments 
c. Internet phone calls 
d. All of the above 
Answer: D   
144. Which of the following an accurate statement about internet phone calls? 
a. They are possible but not yet free 
b. They are not possible 
c. They are currently standard practice 
d. None of the above is an accurate statement about internet phone calls 
Answer: A   
145. What are the most commonly used input devices today? 
a. Keyboard 
b. Mouse 
c. All of the above 
d. None of the above 
Answer: C   
146. Which of the following can be used to help identify people in a crowd? 
a. Biochip 
b. Implant chip 
c. Facial recognition software 
d. Vision chip 
Answer: C 
147. Which one is also known as plastic money? 
a. Credit card 
b. Debit card 
c. Paper cash 
d. All of the above 
Answer: A 
148. E‐cheques are ………………… 
a. Prepaid 
b. Postpaid 
c. Both prepaid and postpaid 
Answer: A                    
149. Digital signature is a 
a. Digital id,send as an attachment to a web page/e‐mail/message 
b. Is used for verifying the attachments send using web 
c. Both a and b 
d. None of these 
Answer: C 

150. Which one is the component of cybercash payment system 
a. CC user software 
b. CC merachant software 
c. CC Server Software 
150 Questions d. All of the above 
Answer: D 
151. The presence  of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. 
a. Memory 
b. Microchip 
c. E‐cash 
d. None of the above 
Answer: B 
152. The smart card which use antenna for reading and writing data 
a) Contact smart card 
b) Contactless smart card 
c) Proximity smart card 
d) Both B and C 
Answer: D 
153. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only. 
a) Contact smart card 
b) Contactless smart card 
c) Proximity smart card 
d) Both B and C 
Answer: C 
154. Which of the smart card uses a sim like structure for reading and writing data 
a) Contact smart card 
b) Contactless smart card 
c) Proximity smart card 
d) Both B and C 

  Answer: A   

155. Which is not a feature of ecommerce 
a. SCM 
b. EDI 
c. WWW 
d. BPR 
Answer: D 
156. What is I stands in CIA of smart card? 
a. International 
b. Integrity 
c. Identity 
d. None of the above 
Answer: B 
 
157. What is A stands in CIA of smart card? 
a. auditing 
b. authenticity 
c. authorized 
d. None of the above 
Answer: B 
158. What is C stands in CIA of smart card? 
a. confidentiality 
b. conference 
c. congress 
d. None of the above 
Answer :A 
159. Which one is the third party payment providers who offer digital wallets for E‐
merchants 
a. Oxicash 
b. PayMate 
c. PayPass 
d. All the above 
Answer: D 
160. Which is used to identify mobile money 
a. MCID 
b. MMID 
c. RSID 
d. NONE OF THE ABOVE 
Answer: B 
161. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. 
a. Threat 
b. Danger 
c. Error 
d. None of the above 
Answer: A 
162. Which one is not a encryption technique 
a. RSA 
b. DES 
c. AES 
d. NONE OF THE ABOVE 
Answer: D 

163. Which one is not used as a security mechanism? 
a. Encryption 
b. Cryptography 
c. Wallets 
d. Digital signature 
Answer :C 
164. Which e‐government arena is being used when governmental agencies send out and 
accept bids for work? 
a) G2G  
b) G2B 
c) G2C 
d) G2G 

Answer: B 

165. Secret key is used for 
a. Public key cryptography 
b. Private key cryptography 
c. Asymmetric key cryptography 
d. None of these 
Answer: B 
166. Which one is  a communication channel threat? 
a. Sniffer programs 
b. Cyber vandalism 
c. Integrity threats 
d. All of the above 
Answer: D 
167. Which one is  a communication channel security protocol? 
a. SSL 
b. S‐HTTP 
c. SET 
d. ALL OF THE ABOVE 
Answer: D 
168. The protocol which allows the file transfer between computers is 
a. TCP/IP 
b. FTP 
c. HTTP 
d. SOA 
Answer: B 
169. E‐Banking is also known as 
a. ATMs 
b. Net banking 
c. Traditional banking 
d. None of these 
Answer: B 
170. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce 
a. EFT 
b. EPS 
c. PayPal 
d. None of these 
Answer: B 
171. Which one is a client level threat? 
a. Malicious code 
b. Viruses 
c. Active contents 
d. All the above   
Answer: D 
172. Which one is not an encryption technique? 
a. RSA 
b. DES 
c. AES 
d. FTP 
Answer: D 
173. Which one is  an encryption technique? 
a. RSA 
b. DES 
c. AES 
d. All of the above 
Answer: D 
174. Which one is not a server level threat? 
a. Malicious code 
b. CGI threats 
c. Database threats 
d. Buffer overflows 
Answer: A 
175. Which one is not a physical threat? 
a. Hacking 
b. Storm 
c. Phishing 
d. None of the above 
Answer: A 

175 Questions
176. Which one is a physical threat? 
a. Phishing 
b. Storm 
c. Earthquake 
d. All the above 
Answer: D 
177. Which one is a logical threat? 
a. Hacking 
b. Storm 
c. Phishing 
d. None of the above 
Answer: A 
178. The basic elements of website is 
a. Home page 
b. Web pages 
c. Links and banners 
d. All the above 
Answer: D 
179. Which one is  a threat for E‐commerce 
a. Trojan horse 
b. firewall 
c. encryption 
d. None 
Answer: A 
180. Secure communication means 
a. Protect transmission of credit card number 
b. Guarantee privacy of customer 
c. Unauthorized access of payment details 
d. All the above 
Answer: D 
181. Which one is not an offline payment mode? 
a. Cash on delivery 
b. Cash before delivery 
c. Demand drafts 
d. e‐cheque 
Answer: D    
182. Which one is  an offline payment mode? 
a. Cash on delivery 
b. Cash before delivery 
c. Credit card 
d. Both a and b 
Answer: D 
183. Which one is not an online payment mode? 
a. Cash on delivery 
b. Debit card 
c. Credit card 
d. e‐cheque 
Answer: A 
184. Which one is  an online payment mode? 
a. Cash on delivery 
b. Cash before delivery 
c. Demand drafts 
d. e‐cheque 
Answer: D 
185. which one is not an E‐payment method used in India 
a. Debit card 
b. Credit card 
c. e‐cheque 
d. none 
Answer: D 
186. OTP stands for 
a. On Time Password 
b. On Time processing 
c. One time processor 
d. None 
Answer: A 
187. Which one is not a threat for E‐commerce 
a. Trojan horse 
b. Viruses 
c. Worm 
d. None 
Answer: D 
188. Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. 
a. Public key 
b. Symmetric 
c. Asymmetric 
d. None 
Answer: B 
189. Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. 
a. Private key 
b. Symmetric 
c. Asymmetric 
d. None 
Answer: C 
190. What is the legal protection afforded an expression of an idea, such as a song, video 
game, and some types of proprietary documents? 
a. Ethics 
b. Intellectual property 
c. Copyright 
d. Fair Use Doctrine 
Answer: C    
191. Cyber slacking consists of what activities? 
a. Visiting “inappropriate” web sites 
b. Visiting news sites 
c. Chatting online with others about non‐work topics 
d. All of the above 
Answer: D    
192. What is an arrangement made between e‐commerce sites that direct users from one 
site to the other? 
a. Spam 
b. Viral marketing 
c. Affiliate programs 
d. None of the above 
Answer: C    
193. Which type deals with auction? 
a. B2B 
b. B2C 
c. C2B 
d. C2C 
Answer: D   
194. Which one is not  a layer of E‐commerce infrastructure 
a. Physical layer 
b. Product layer 
c. Service layer 
d. None 

      Answer: D 

195. Which will harm  computer resources  
a. Worm 
b. Virus 
c. Trojan horse 
d. All the above 

      Answer: D 

196. The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 
a. Decryption 
b. Cryptography 
c. Firewall 
d. All the above 
Answer: B 
197. During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ 
a. Integrity 
b. Security 
c. Confidentiality 
d. All the above 
Answer: D 
198. The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 
a. Macro 
b. Trojan horse 
c. Script virus 
d. None of the above 

    Answer: A 

199. The virus that are attached with vb and java files are called 
a. Macro 
b. Trojan horse 
c. Script virus 
d. None of the above 

      Answer: C 

200. The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ 
a. Mails 
b. Pen drives and cds 
c. Websites 
d. All the above 
Answer: D 

200 Questions
AXIS COLLEGES, KANPUR
Axis Institute of Higher Education (KN-115)
B.C.A Department

Semester: VI Course Code: BCA 603 N Course Name: E-Commerce

UNIT-1 to 5 Faculty Name : Mr. Mohit Singh

UNIT- I
Q. No. Question Options Answer
a) Doing business electronically

Which of the following describes e- b) Doing business


1 A
commerce? c) Sale of goods
d) All of the above
a) B2B

Which of the following is part of the four main b) B2C


2 D
types for e-commerce? c) C2B
d) All of the above
a) Books

Which products are people most likely to be b) PCs


3 D
comfortable buying on the Internet? c) CDs
d) All of the above
a) interactivity
The dimension of e-commerce that enables b) global reach
4 commerce across national boundaries is B
called c) richness
d) ubiquity
a) Small products

The best products to sell in B2C e‐commerce b) Digital products


5 B
are c) Specialty products
d) Fresh products
a) Electronic Data Interchange
What does EDI stand for? b) Electronic Document Interchange
6 A
c) Electric Document Interchange
d) Engineering Data Interchange
a) Commerce
………………..is concerned with the buying
and selling information, products and b) E-Commerce
7 B
services over computer communication c) E-Business
networks
d) None of these
a) Amazon
Which of the following is an example for
8 b) irctc A
online bookstore?
350 c) Gmail
d) yahoo
a) Speed

Which of the following is a disadvantage of b) Privacy


9 B
E-commerce? c) Improved Customer Service
d) Conduct business 24 x 7
a) Customer to Customer
b) Consumer to Consumer
10 Full form of C2C is B
c) Client to Consumer
d) Client to Customer
a) ebay.com
b) OLX.com
11 Example of C2C website is D
c) Quikr.com
d) All of these
a) Electronic advertising
b) E-payment system is followed
12 An E-commerce feature is D
c) Reduces the per transaction cost
d) All of these
a) Gender
b) Generation
13 In 4G “G” Stands for B
c) G-mail
d) Game
a) Approach

Which of the following is not a part of b) Pre approach


14 D
traditional selling strategy? c) Presentation
d) Online sales
a)B2B

Which segment do eBay, Amazon.com b)B2C


15 B
belong c)C2B
d)C2C
a) Are commodity like products
b) Can be mass-customized and
personalized
Digital products are best suited for B2C e-
16 commerce because they: c) Can be delivered at the time of D
purchase

d) All of the above

a) E-commerce
Electronic Exchange of business documents b) E-Business
17 in a standard format is known as C
……………… c) EDI
d) None of these

………………. is essentially a business a) E-commerce


18 C
process that connects manufacturers, b) EDI
retailers, customers and suppliers in the form c) SCM
of a chain to develop and deliver products.
d) Networking
a) Amazon.com

Which among the following is not an example b) Baazar.com


19 C
for E-commerce c) E-trade.com
d) None of these
a) B2B

Which type of e-commerce focuses on b) B2C


20 D
consumers dealing with each other? c) C2B
d) C2C
a) Registering with search engines
All of the following are techniques B2C e- b) Viral marketing
21 commerce companies use to attract D
customers, except: c) Online ads
d) Virtual marketing
a) Direct materials
What are materials used in production in a b) Indirect materials
22 manufacturing company or are placed on the A
shelf for sale in a retail environment? c) EDI
d) None of the above
a) automobiles

Which type of products is lesser purchased b) books


23 A
using ecommerce? c) soft wares
d) none
a) Affiliate programs
Which term represents a count of the number b) Click-through
24 of people who visit one site, click on an ad, B
and are taken to the site of the advertiser? c) Spam
d) All of the above

What is the name given to an interactive a) Direct marketplace


business providing a centralized market b) B2B
25 where many buyers and suppliers can come D
together for e‐commerce or c) B2C
commerce‐related activities? d) Electronic marketplace
UNIT- II
Q. No. Question Options Answer
a) American National Standard Institute
b) International Standard Institute
1 ANSI X.12 is a standard developed by c) European Common Market A

d) United Nations Economic Commission


for Europe
a) e-Bay
…………………….is an online auctioning site b) Amazon.com
2 that facilitates the trade of privately owned A
items between individuals. c) Rentalic.com
d) all of these
a) Marketing
Which of the following is the process of b) Auction
3 buying and selling products by offering the B
customers to bid the price? c) Bookshop
d) Booking
a) New products
b) Second hand products
4 Unique value auction is mainly applies to? B
c) Engineering products
d) None of the above
a) internet commerce
What is the name for direct computer-to- b) e-commerce
5 computer transfer of transaction information D
contained in standard business documents? c) transaction information transfer
d) electronic data interchange
a) use secure sockets layers

When a transaction is processed online, how b) use secure electronic transactions


6 can the merchant verify the customer's c) use electronic data interchange B
identity?
d) use financial electronic data
interchange
a) Flexibility

Which factor represents a system's ability to b) Performance


7 A
change quickly? c) Capacity planning
d) Benchmark
a) B2B
b) B2C
8 Which type deals with auction? D
c) C2B
375
d) C2C
a) customization

Which of the following refers to creating b) aggregation


9 A
products tailored to individual customers? c) Direct materials
d) Reverse auction
a) Enterprise resolution planning
10 ERP stands for C
b) Enterprise reverse planning
c) Enterprise resource planning
d) None of the above
a) Computer virus
What is a type of virus that spreads itself, not
just from file to file, but from computer to b) Worm
11 B
computer via e-mail and other Internet c) Denial-of-service attack
traffic?
d) None of the above
a) EDI
b) ERP
12 The solution for all business needs is: B
c) SCM
d) None of These
a) Hacking

When a person’s computer is broken into to b) stalking


13 A
access personal information is called; c) Theft
d)All of the above
a) Modem

To have an internet connection one needs to b) Telephone or TV


14 D
have following arrangements; c) Computer & ISP connection
d) All of above
a) Any time money
b) Any time machine
15 ATM stands for C
c) Automated teller machine
d) Automated Time machine
a) Avoid disclosing personal information

Which of the following terms as prevention b) Avoid sending photograph to strangers


16 D
measures for cyber crime; c) Avoid sending credit card numbers
d) All of above
a) internet commerce
What is the name for direct computer-to- b) e-commerce
17 computer transfer of transaction information D
contained in standard business documents? c) transaction information transfer
d) electronic data interchange
a) General Motors, Ford
Automotive Network Exchange is the b) Microsoft
18 private extranet initially set up and A
maintained by the c) Google
d)None of these
a)Modem
The equipment needed to allow home b)Gateway
19 computers to connect to the internet is called A
a c)Monitor
d)Peripheral
a) Increase the speed of exchanging
The use of EDI helps companies to documents
20 D
b) Improve the accuracy of the
information exchanged
c) Reduce both process and operational
related costs
d) All of the above
a)representation of common business
documents in computer readable forms
b)data entry operators by receivers
21 EDI requires c)special value added network A

d)special hardware at co-operating


business partners

a) Wide Access Network


b) Wide Area Network
22 What is the full form of "WAN" B
c) Wifi Access Network
d) Wifi Assigned Network
a) Presentation
Which of the following activity is explaining b) Follow-up
23 how the product meets that person or A
company’s need? c) Qualifying
d) Prospective
a)Developer structural Language
b)Data Sequence Latency
24 What is the full Form of DSL D
c)Design system language
d)Digital Subscriber Line
a) Interface Program
b) Internet Program
25 In TCP/IP what is the full form of IP C
c) Internet Protocol
d) Interface Protocol

UNIT- III
Q. No. Question Options Answer
a) Cash on delivery
b) Debit card
1 Which one is not an online payment mode? A
c) Credit card
d) e-cheque
a) People outside the organization can
access it
b) People inside the organization can't
Which of the following is the primary access it
2 C
characteristic of an intranet?
c) People outside the organization can't
access it
d) None of the above
a) Secure Electronic Transaction
3 SET protocol on internet stands for: b) Secure Internet Transaction A
c) Secure Establish Transaction
d) Secure Electronic Transmission
a) Anonymity
b) Security
4 Digital Cash has following characteristic D
c) Confidentiality
d) All of Above
a) e-mail address
A computer on internet is identified by: b) street address
5 C
c) IP address
d) None of the above
a) Electronic Funds Transfer
b) Efficient Funds Transfer
6 What is the full form of EFT? A
c) Effective Funds Transfer
d) Electronic Foreign Transfer
a) Mosaic

Which of the following was the first b) Mozilla


7 C
commercial Web browser? c) Netscape Navigator
d) Internet Explorer
a) Operating System

Internet explorer falls under b) Compiler


8 C
c) Browser
400
d) IP address
a) Web page

………………….is the first page of a web b) home page


9 B
site. c) domain
d) none of these
a)shopping
b) paying bills
10 Today, internet is being used by people for D
c) banking
d) All of these

What is an internal organizational Internet a) Client/server network


that is guarded against outside access by a b) Intranet
11 special security feature called a firewall B
(which can be software, hardware, or a c) Extranet
combination of the two)? d) Thin client
a) Flash
b) Google
12 _____________ is a search engine B
c) Internet explorer
d) Fire Fox
a) News group

Which one of the following is not the feature b) Designing


13 B
of internet? c) E-mail
d) Chat
a) World Wide Web
b) Wide World Web
14 WWW means A
c) Web Wide World
d) World Web Wide
a) Customer relationship management
What are plastic cards the size of a credit systems cards

15 card that contains an embedded chip on b) E-government identity cards D


which digital information can be stored? c) FEDI cards
d) Smart cards
a)Create secure ,private connection to
web server

16 Secure Socket layer does the following? b)Encrypts information D


c)Sends information over the internet
d)All of the above
a)Digital cash

Which is an electronic representation of b)Electronic cash


17 D
cash? c)E-cash
d)All of the above
a)Memory

The presence of ……..makes the smart card b)Microchip


18 B
smart c)E-cash
d)None of the above
a)ATMs
b)Net Banking
19 E-Banking is known as B
c)Traditional Banking
d)None of these
a)Home page
b)Web page
20 The basic elements of website is D
c)Links and banners
d)All of the above
a)Cash on delivery
b)Cash before delivery
21 Which of the following is offline payment? D
c)Credit card
d)Both a and b
a)Integrity

During E-commerce transaction should b)Security


22 D
ensure? c)Confidentiality
d)All of the above

What is the process in which a buyer posts a) B2B marketplace


its interest in buying a certain quantity of b) Intranet
23 items, and sellers compete for the business C
by submitting successively lower bids until c) Reverse auction
there is only one seller left? d) Internet
a) Using e-medias
b) Using computers only
24 How the transactions occur in e-commerce? A
c) Using mobile phones only
d) None of the above
a) Availability
Which factor determines who has the right to b) Accessibility
25 access different types of IT systems and B
information? c) Reliability
d) None of the above

UNIT- IV
Q. No. Question Options Answer
a)Copyright

Which of the following applies to the b)Intellectual property


1 C
implementation of an idea c)Patent
d)Denial of service attack
a)Encryption

Which of the following is not a security b)Cryptography


2 C
mechanism c)Wallets
d)Digital Signature
a)Public Key cryptography
b)Private Key cryptography
3 Secret key is used for B
c)Asymmetric Key cryptography
d)None of the above
a)Decryption
b)Cryptography
4 The study of encryption is called B
c)Firewall
d)All of the above
a) Data protection

Trade mark, copyright, patent law etc comes b) Telecommunication laws


5 C
under the purview of…………………… c) Intellectual property laws
d) None
a) cyber signature
A………………….provides a way to b) Digital signature
6 associate the message with the sender and B
is the equivalent of an ordinary signature. c) SSL
d) none of these
a) creates a secure, private connection to
a web server
Secure Sockets Layers does which of the
7 D
following? b) encrypts information
c) sends information over the internet
d) all of the above
a)Censorship
The suppression or prohibition of any parts of
books, films, news, etc. that are considered b)Taxation
8 A
obscene, politically unacceptable, or a threat c)Contract
425
to security.
d)None of these
a)Gambling
b)IPR
9 Play games of chance for money; bet. A
c)Encryption
d)All of the above
a)Intellectual Property Right

……….include patents, copyright, industrial b)Contract


10 A
design rights, trademarks c)Ethics
d)None of these
Public key encryption uses multiple a) encryption, decryption
keys. One key is used to encrypt data, while
b) private, public
another is used to decrypt data. The key
11 D
used to encrypt data is called the _____ key, c) encryption, public
while the key used to decrypt data is called
the _____ key. d) public, private
a) RSA
b) DES
12 Which one is not a encryption technique D
c) AES
d) NONE OF THE ABOVE
a) SSL

Which one is a communication channel b) S‐ HTTP


13 D
security protocol? c) SET
d) ALL OF THE ABOVE
a) Ethics
b) Intellectual property
What is the legal protection afforded an
expression of an idea, such as a song, video c) Copyright
14 C
game, and some types of proprietary
documents?
d) Fair Use Doctrine

a) Price
A business competing in a commodity like b) Ease / speed of delivery
15 environment must focus on which of the D
following? c) Ease of ordering
d) all of the above
a) Booking

Which of the following activity is offered by b) Seats selection


16 D
online airline services? c) Automated flight status
d) All of the above

Web pages are prepared using their a) html


17 A
language as………………… b) FTP
c) HTTP
d) None of these
a) Dynamic website
…………………….website is one that b) Static Website
18 changes or customizes itself frequently and A
automatically based on certain criteria c) phish site
d) none of these
a) Biometrics
………………are automated methods of b) PIN
19 recognizing a person based on a A
physiological or behavioral characteristic. c) both of these
d) none of these
a) Network firewall
……………………are special type of b) Antivirus
20 software meant for limiting the risks of being B
hit by computer viruses c) both of these
d) none of these
a) Home page

The user reaches this page when they b) Web page


21 A
specify the address of a website c) Summary page
d) None of these
a) Network firewall

………………is basically a secure gate b) Antivirus


22 A
between our organization data and internet. c) both of these
d) none of these
a) Network firewall
…………………..are program developed by
some dishonest people to destroy the b) computer virus
23 B
computer system and the valuable c) both of these
information in it.
d) none of these
a) Spoofing
Gain entry into the user’s system and scan b) Snooping
24 your file system for personal information is B
known as………………. c) Sniffing
d) None of these
a) Hyper Text Markup Language
b) High Text Markup Language
25 HTML stands for A
c) Hyper Tabular Markup Language
d) None of these
UNIT- V
Q. No. Question Options Answer
a) Backup

What is the process of making a copy of the b) Anti-virus


1 A
information stored on a computer? c) Firewall
d) Biometrics
a) Hackers
Who breaks into other people's computer b) Softwares
2 systems and steals and destroys A
information? c) Hacktivists
d) Script kiddies
a) firewall
b) EDI
3 Who protects system from external threats? A
c) ERP
d) Script kiddies
a) backup

Which process is used to reinstall data from b) recovery


4 B
a copy when the original data has been lost? c) benchmarking
d) data cleansing
a) Uniform Resource Locator
b) Universal Resource Locator
5 URL stands for: A
c) Universal Random Locator
d) Uniform Random Locator
a) Computer virus

What floods a website with so many request b) Worm


6 C
for service that it slows down or crashes: c) Denial of service attack
d) None of above
a) HTTP
Which protocol permits users to transfer files b) SMTP
7 from the server to their client computer, and D
vice versa? c) IMAP
d) FTP
a) Interstate policy

The term ISP is the abbreviation of the full b) Incoming state policy
8 C
phrase c) Internet service provider
450
d) None of these
a) Home maker

Which of the following term refers to cyber b) Hacker


9 B
crime? c) Holiday
d) House keeping
10 HTTP stands for a) Hyper Text Transport Protocol D
b) Hyper Text Transport Planning
c) Hyper Text Transfer Planning
d) Hyper Text Transfer Protocol
a)Encryption
Which of the following is useful security b)Decryption
11 mechanism when considering business D
strategy and IT c)Firewall
d)All of the above
a) New group

What is the term used for talking on net with b) E-mail


12 C
the help of typed text? c) Chatting
d) None of the above
a)firewall
b)Virus
13 Which will not harm computer resources A
c)Trojan horse
d)None of these
a)Backup

Which software detects and removes or b)Antivirus


14 B
quarantines computer viruses? c)Firewall
d)Biometrics
a)Fingerprint

All of the following are considered biometrics b)Retina


15 C
except c)Password
d)Voice
a)Mails
b)Pen drive
16 The viruses spread through D
c)Websites
d)All of the above
a) Domain Name System
b) Dynamic Network Service
17 DNS stands for A
c) Detail Name Server
d) All of above
a) Spam

E-mail which contain useless material is b) useless mail


18 D
termed as…………… c) trunk mail
d) Junk mail
a) Windows with Wallet
b) World Wide West
19 What is the full form of "WWW" D
c) World Web Wide
d) world wide web
a) Turn around Control Policy
20 What is the full form of "TCP" C
b) Terminating and Controlling Processing
c) Transmission Control Protocol
d) True and Coverge Protocol
a) Internal Project
b) Internet Protocol
21 IP stands for B
c) Instrument Protocol
d) Individual Performance
a) Visual Private Network
b) Virtual Protocol Network
22 VPN is abbreviated as __________ C
c) Virtual Intranet Network
d) Virtual Protocol Networking
a) Firewall

_________ are also used for hides user’s b) Antivirus


23 D
physical location. c) Incognito mode
d) VPN
a) firewall
b) Virus
24 Which will not harm computer resources A
c) Trojan horse
d) None of the above
a) Adware

What is software you don't want hidden b) Trojan‐horse software


25 D
inside software you do want? c) Spyware
d) All of the above

466
School of Distance Education

UNIVERSITY OF CALICUT

SCHOOL OF DISTANCE EDUCATION

UG-CBCSS
(2019 Admission Onwards)

V Semester

Open Course

(For candidates with Programmes other than BBA and B Com)

E-COMMERCE

QUESTION BANK

1) World Wide Web (WWW) was introduced in the year ……………………


(a)1994 (b)1996 (c)1992 (d)1990

2) ……………….is an early form of E-commerce


(a)SCM (b)EDI (c)Both of these (d)None of these

3) ………………..is concerned with the buying and selling information, products and services over
computer communication networks
(a)Commerce (b) E-Commerce (c) E-Business (d) None of these

4) ………………..is a set of standards developed in the 1960s to exchange business information


and to do electronic transactions
(a)EDI (b)Protocols (c)TCP/IP (d)None of these

E- Commerce Page 1
School of Distance Education

5) Which among the following product is suitable for E-Commerce ?


(a)Books (b)Vegetables (c)All of these (d)None of these

6) ……………allows a business application on the computer of one organization to communicate


directly with the business application on the computer of another company.
(a)EDI (b)Protocols (c) Standards (d) Business applications

7) Electronic Exchange of business documents in a standard format is known as ………………


(a)E-commerce (b)E-Business (c)EDI (d)None of these

8) ………………. is essentially a business process that connects manufacturers, retailers,


customers and suppliers in the form of a chain to develop and deliver products.
(a)E-commerce (b)EDI (c)SCM (d)Networking

9) Which of the following is not a party of SCM ?


(a) Suppliers (b) Manufacturers (c)Distributors (d)Customers
475

10) ………………is a commercial process that includes production, distribution, sales or delivery
of goods and services through electronic means
(a)E-commerce (b)SCM (c)EDI (d)None of these

11) ……………….is the exchange of goods or items or commodities and services or applications
used for money and deals the money matters
(a)E-commerce (b)Commerce (c)Both of these (d)none

12) …………….is an approach to deliver information differentiated business values called services
by combining the system and process generally called resources
(a)E-business (b)E-commerce (c)any of these (d)none

13) ……………….always operate on intranet


(a) E--commerce (b)E-Business (c)EDI (d)None of these

14) Which among the following is not an example for E-commerce


(a)Amazon.com (b)Baazar.com (c)E-trade.com (d)None of these

E- Commerce Page 2
School of Distance Education

15) ……………….and ………………… were the enabling technologies that laid the ground work for E-
commerce
(a)SET and SCL (b)SCM and ERP (c)EDI and EFT (d) None of these

16) ………………were the first to establish prominent E-commerce Brands


(a) Baazar.com (b)E-bay and Amazon (c)E-trade.com (d)none of these

17) …………….is a systems approach to Managing the entire flow of information, materials, and
services from raw material suppliers through factories and warehouses to the end customer.
(a) CRM (b)SRM (c)EDI (d)SCM

18) …………….is a form of supply chain where a series of assembly operations are carried out to
obtain the final product
(a)Converging supply chain (b)Diverging supply chain
(c)Any of these (d)None

19) ……………………is a form of supply chain where a wide variety of finished goods are produced
with limited number of raw material or components.
(a)Converging structure (b)Diverging structure
(c)Any of these (d)None

20 ……………………is the exchange of services, information or product from one business to a


government agency
a)B2G b)B2E c)B2B d)P2P

21. Companies use………………………networks to automate employee related corporate processes.


a)B2G b)B2E c)B2B d)P2P

22. Which among the following is not a B2E application


a)Online Insurance policy management b)Online supply requests
c)Special employee offers d)Locate application and tax forms

23 ……………………..streamlines the flow of information and self service capabilities through


automation
a)SCC b)CRM c)CRP d)SCM

E- Commerce Page 3
School of Distance Education

24 ………………is a global web in which millions of users are communicating with each other with
the help of computers.
a)Internet b)WWW c)both of these d)None of these

25 …………………is an application layer protocol for distributed, collaborative, hypermedia


information systems.
a)html b)HTTP c)Bothe of these d)None of these

26. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.
a)internet b)WWW c)Intranet d)none of these

27 ………refers to a kind of e-commerce which refers to a company selling or buying from other
company
a)B2G b)B2E c)B2B d)P2P

28. Which of the following is not an example for B2B e-commerce ?


a)Sending and receiving orders b)Invoice and shopping
c)all of these d)none of these

29. A company that manufacturers bicycles may use the internet to purchase tyres from their
suppliers. This is an example of-----------transaction.
a)B2G b)B2E c)B2B d)P2P

30 …………..sites act as an intermediary between someone wanting a product or service and


potential providers
a)brokering sites b)Information sites c)industry portals d)none of these

31. Among the alternate models of B2B e-commerce,……is the best means to obtain a
competitive advantage in the Market place.
a)Process based b)strategic relationship based
c)transaction based d)any of these

32 ……………..focus on producing a highly integrated value proposition through a managed process.


a)hubs b)community c)contents d)none of these

33 …………………is basically a concept of online marketing and distributing of products and


services over the internet
a)B2G b)B2E c)B2B d)B2C

E- Commerce Page 4
School of Distance Education

34 ……………………..e-commerce consists of the sale of products or services from a business to


the general public
a)B2G b)B2E c)B2B d)B2C
500

35. Which of the following is not suitable for a B2C transaction ?


a)clothes b)flowers c)airline reservation d)none

36 ……………..e-commerce transaction has the advantage of eliminating middlemen.


a)B2G b)B2E c)B2B d)B2C

37………………….e-commerce involves customers gathering information, purchasing and receiving


products over an electronic network
a)B2G b)B2E c)B2B d)B2C

38. Which among the following is not an user of B2C e-commerce ?


a)manufacturers b)distributors c)Publishers d)none
39 ………………….e-commerce involves the electronic facilitation of transaction between
customers through some third party.
a)B2G b)B2E c)B2B d)C2C

40. Which among the following is an example of C2C ?


a)e-Bay b)Amazon.com c)Rentalic.com d)all of these

41. Peer to Peer [P2P] is also used to describe………………………….


a)C2C b)B2E c)B2B d)B2C

42 …………………….is an online auctioning site that facilitates the trade of privately owned items
between individuals.
a)e-Bay b)Amazon.com c)Rentalic.com d)all of these

43. Monster.com is an example of ……………………..website


a)C2C b)B2E c)B2B d)B2C

44 ………………….is an internet network that allows users with the same network in software to
connect to each other’s hard disks and exchange files

E- Commerce Page 5
School of Distance Education

a)P2P b)B2E c)B2B d)B2C

45. This is a protocol which allows files to be transferred from one computer to another computer
a)TCP/IP b)FTP c)HTTP d)none of these
46. A ……………….is a document, typically written in plain text interspersed with formatting
instructions of html
a)Web page b)home page c)domain d)none of these

47 ………………….is the first page of a web site.


a)Web page b)home page c)domain d)none of these

48 ……………..allows the person to type ion just the main word or words and the site will come in
a)Web page b)home page c)domain d)none of these

49. ”Google” is one of the most popular………………..


a)Portal b)Browser c)Search Engine d)none of these

50. A ………………….. presents information from diverse sources in a unified way in a web site.
a)Web portal b)Link page c) Both of these d) none of these

51. A……………portal is a specialized entry point to a specific market place or industry niche.
a)Vertical portal b)horizontal portal c)both of these d)none of these

52 ………………..are general interest portals covering a wide range of topics and features
a)Vertical portal b)horizontal portal c)both of these d)none of these

53. Which among the following is an example for vertical portal ?


a) i-village b)Yahoo c) Google d)Net scape

54. A portal that helps to establish relations and to conduct transactions between various
organizations is termed as………………
a)B2B portals b)C2C portals c)both of these d)none of these

55 A …………………….is a software that scours the internet collecting data about every website
and every webpage within it
a)spiders b)Search Engines c)robots d)none of these

E- Commerce Page 6
School of Distance Education

56. Search Engines databases are selected and built by computer robot programs
called………………………
a)spiders b)Search Engines c)robots d)none of these

57. Which among the following is not an example for Search engine ?
a)Google b)MSN c)Alta vista d)none of these

58. Web pages are prepared using their language as…………………


a)html b)FTP c)HTTP d) None of these

59. A web page is transferred to users computer through ……………………..


a)html b)FTP c)HTTP d) None of these
525

60. The user reaches this page when they specify the address of a website
a)Home page b)Web page c)Summary page d) None of these

61. The purpose of ………………page is to provide links to other pages


a)Home page b)Web page c)Summary page d) None of these

62 ……………is an example for a software that visits suggested pages and return the appropriate
information to be indexed by the search Engine
a)Robot b)Spiders c)Ants d)All

63 ………………………………..ads appears as rectangular graphics near the top of the page


a)Banner ads b)floating ads c)interstitials d)Unicast ads

64 ………………….ads take up the entire screen and are more powerful than banner ads.
a)Banner ads b)floating ads c)interstitials d)Unicast ads

65 ………………………….is a form of advertisement on the web that appears between web pages
that the user requests.
a)Banner ads b)floating ads c)interstitials d)Unicast ads

66 ……………………is basically a TV commercial that runs in the browser window.


a)Banner ads b)floating ads c)interstitials d)Unicast ads

E- Commerce Page 7
School of Distance Education

67. Advertisements take the form of a website copy are called…………………………


a)Advertorials b)pop-up ads c)Spam e-mail d)none of these

68 ………………..is the most unwanted of online advertising methods.


a)Advertorials b)pop-up ads c)Spam e-mail d)none of these

69 …………………..is an unsolicited e-mail sent to every e-mail address that a business can find
a)Advertorials b)pop-up ads c)Spam e-mail d)none of these

70 …………………..is the buying and selling of goods and services through wireless handled
devices such as cellular phone and Personal Digital Assistants
a)Mobile Commerce b)e-commerce c)both of these d)none of these

71 …………………is a class of advertising methods which are considered unethical and may even
be illegal
a)Advertorials b)pop-up ads c)Spam e-mail d)malware

72 ……………….is the most common way for purchasing an online advertising


a)CPM b)CPC c)Any of these d)none of these

73 ………………are animated full screen ads placed at the entry of a site before a user reaches
the intended content.
a)Intromercials b)pop-up ads c)Spam e-mail d)malware

74 ………………….are interactive online ads that require the user to respond intermittently in
order to wade through the message before reaching the intended content.
a)Ultramercials b)pop-up ads c)Spam e-mail d)malware

75 ……………facilitates transactions between buyer and sellers by providing comprehensive


information and ancillary services, without being involved in the actual exchange of goods
and services between the parties.
a)Metamediary b)Intermediary c)middlemen d)all of these

76 ………………is any transaction, involving the transfer or rights to use goods and services,
which is initiated and or completed by using mobile access to computer mediated networks
with the help of an electronic device.
a)Mobile Commerce b)e-commerce c)both of these d)none of these

E- Commerce Page 8
School of Distance Education

77 …………….provide security and privacy for the use of the web page content
a)HTTP b)html c)FTP d)none of these

78 …………………….website is one that changes or customizes itself frequently and automatically


based on certain criteria
a)Dynamic website b)(Static Website c)phish site d)none of these

79 ………………site is created to fraudulently acquire sensitive information such as pass words


and credit card details, by masquerading as a trustworthy person or business.
a)Dynamic website b)(Static Website c)phish site d)none of these

80 ……………….in the e-commerce may be a holder of a payment card such as credit card or
debit card from an issuer
a)customer b)issuer c)Merchant d)Acquirer

81 ……………….is a financial institution that establishes an account with a merchant and


processes payment card authorization and payments
a)customer b)issuer c)Merchant d)Acquirer

82. In …………………..type of payment system customer is allowed to spend only up to the


amount that have pre deposited into account.
a)Prepaid b)Post paid c)both of these d)none of these

83 ………………type of payment system is highly useful to those customers who would like to
control overspending,
a)Prepaid b)Post paid c)both of these d)none of these

84 ……………………….credit card gives all the advantages of a normal credit card without worrying
about the interest charges
a)Prepaid b)Post paid c)both of these d)none of these
550

85 ……………………facility helps the customer to pay only a small amount of the total outstanding
and revolve the rest of the payment to the next month.
a)Cash advance b)Revolver c)Tele draft d)None of these
86 …………………..is the system of purchasing cash credits in relatively small amounts, storing the
credits in our computer, and then spending them, when making electronic purchases over the
internet.

E- Commerce Page 9
School of Distance Education

a)E-cash b)Digicash c)Cyber cash d)any of these

87 ………………….is a financial instrument which can be used more than once to borrow money
or buy products and services on credit.
a)Credit card b)E-Cheques c)E-cash d)none of these

88. To accept a credit card for payment, we have to open a …………………account with our bank
a)Savings Bank b)Current account c)Merchant account d)any of these

89. A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that
can be either a secure micro controller or equivalent intelligence with internal memory
or a memory chip alone.
a) smart Cards b)E-Cheques c)E-cash d)none of these

90 ………………..is a kind of payment card that transfers fund directly from the consumer’s bank
account to the merchants account
a)Debit Card b)Electronic purse c)credit card d)any of these

91 ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.
a)Debit Card b)Electronic purse c)credit card d)any of these

92 ………………is basically a secure gate between our organization data and internet.
a)Network firewall b)Antivirus c)both of these d)none of these

93 ……………………encrypts payment card transaction data and verifies that both parties in the
transaction are genuine.
a)SSL b)SET c)both of these d)none of these

94 ………………is automated methods of recognizing a person based on a physiological or


behavioral characteristic.
a)Biometrics b)PIN c)both of these d)none of these

95. In Biometrics,…………………………ID system is designed to prevent more than one person from
using a single identity
a)Positive ID system b)Negative ID system c)both of these d)none of these

E- Commerce Page 10
School of Distance Education

96. In Biometrics,…………………………ID system is designed to prevent one person from using


more than one identity
a)Positive ID system b)Negative ID system
c)both of these d)none of these

97 …………………..are program developed by some dishonest people to destroy the computer


system and the valuable information in it.
a)Network firewall b)computer virus c)both of these d)none of these

98. Which among the following is not an example for computer virus ?
a)Chernobyl b)Melissa c)I Love You d)None of these

99 ……………………are special type of software meant for limiting the risks of being hit by
computer viruses
a)Network firewall b)Antivirus c)both of these d)none of these

100. A……………….is a person who gains unauthorized access to a computer network for profit,
criminal mischief or personal pleasure.
a)Hacker b)spoofer c)operator d)none of these

101 ……………….acts like a gate keeper that examines each users identification before allowing
them to enter to the organization’s internal networks.
a)Network firewall b)Antivirus c)both of these d)none of these

102 …………..Prevents unauthorized communication into and out of the network, allowing the
organization to enforce a security policy on traffic between its network and the internet.
a)Network firewall b)Antivirus c)both of these d)none of these

103. SET means …………………………….


a)Standard Electronic Technology b)Standard Electronic Transfer
c)Secure Electronic Transaction d)None of these

104. The verification of credit card is done by using…………….. with a communications link to the
merchants acquiring bank
a)Credit card payment terminal b)Point of Sale
c)All of these d)none of these

E- Commerce Page 11
School of Distance Education

105. Creating illegitimate sites that appear to be published by established organizations by


unscrupulous artists is termed as………………………….
a)Spoofing b)Snooping c)Sniffing d)None of these

106. Gain entry into the user’s system and scan your file system for personal information is
known as……………….
a)Spoofing b)Snooping c)Sniffing d)None of these

107 ………………attacks are difficult and are only successful if the attacker knows something
about the shopper
a)Spoofing b)Snooping c)Sniffing d)Guessing passwords

108 …………………is the process of making information unintelligible to the unauthorized user.
a)Spoofing b)Snooping c)Sniffing d)Cryptography

109 ………………….is the reverse process of encryption, to make the information readable once
again
a)Spoofing b)Decryption c)Sniffing d)Cryptography
575

110. A………………….provides a way to associate the message with the sender and is the
equivalent of an ordinary signature.
a)cyber signature b)Digital signature c)SSL d)none of these

111. A ………………is an electronic file that uniquely identifies individuals and websites on the
internet and enables secure confidential communications
a)Digital signature b)Digital certificates c)SSL d)none of these

112. The information Technology Act [IT ACT] came into effect on
a)16th November 2000 b)15th December 2000
th
c)17 October 2000 d)none of these

113. Information sent over the Internet commonly uses the set of rules called………………………..
a)TCP/IP b)FTP c)HTTP d)gopher

114 ……………………….is a person who breaks in or trespasses a computer system


a)Hacker b)Snooper c)operator d)spoofer
E- Commerce Page 12
School of Distance Education

115. E-mail which contain useless material is termed as………………………


a)Spam b)useless mail c)trunk mail d)Junk mail

116. India has enacted the first IT Act in the year……………………………………


a)2001 b)2002 c)2009 d)2000

117. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
a)Cyber terrorism b)Child pornography c)Video voyeurism d)None of these

118. Trade mark, copyright, patent law etc comes under the purview of……………………
a)Data protection b)Telecommunication laws
c)Intellectual property laws d)None

119 ……………….is a programme designed o replicate and spread generally with the victim being
oblivious to its existence
a)hacker b)software c)Computer virus d)none of these

120. Which one of the following is not a principle of e-commerce ?


586 a)privacy b)integrity c)authentication d)none of these

E- Commerce Page 13
School of Distance Education

ANSWER KEY

1.a 21.b 41.a 61.a 81.d 101.a


2.b 22.d 42.a 62.d 82.a 102.a
3.b 23.a 43.a 63.a 83.a 103.c
4.a 24.a 44.a 64.b 84.a 104.c
5.a 25.a 45.b 65.c 85.b 105.a
6.a 26.b 46.a 66.d 86.d 106.b
7.c 27.c 47.b 67.a 87.a 107.d
8.c 28.d 48.c 68.b 88.c 108.d
9.c 29.c 49.c 69.c 89.a 109.b
10.a 30.a 50.c 70.a 90.a 110.b
11.b 31.b 51.a 71.d 91.b 111.b
12.a 32.a 52.b 72.c 92.a 112.c
13.b 33.d 53.a 73.a 93.b 113.a
14.c 34.d 54.a 74.a 94.a 114.a
15.c 35.d 55.b 75.a 95.a 115.d
16.b 36. d 56.a 76.a 96.b 116.d
17.d 37. d 57.d 77.a 97.b 117.d
18.a 38.d 58.a 78.a 98.d 118.c
19.b 39.d 59.c 79.c 99.b 119.c
20.c 40.d 60.a 80.a 100.a 120.d

©
Reserved

E- Commerce Page 14

You might also like