0% found this document useful (0 votes)
355 views147 pages

E-Commerce & ERP MCQs with Answers

The document contains multiple-choice questions and answers related to e-commerce and ERP concepts. Key topics include definitions of e-commerce, benefits for consumers, types of e-commerce, payment processing, and marketing strategies. Each question is followed by an explanation to clarify the correct answer.

Uploaded by

sd1718804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
355 views147 pages

E-Commerce & ERP MCQs with Answers

The document contains multiple-choice questions and answers related to e-commerce and ERP concepts. Key topics include definitions of e-commerce, benefits for consumers, types of e-commerce, payment processing, and marketing strategies. Each question is followed by an explanation to clarify the correct answer.

Uploaded by

sd1718804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

UNIT 1 -5

E-Commerce & ERP


Multiple Choice Questions with
Answers
1. What does e-commerce mean?
A. Electronic communication
B. Electronic commerce
C. Electronic computer
D. Electronic calculator

Answer: B. Electronic commerce.

Explanation: E-commerce refers to buying and selling of goods and services using the internet or
other electronic means.

2. Which of the following is an example of e-commerce?

A. Buying groceries at a supermarket


B. Ordering food at a restaurant
C. Booking a hotel room online
D. Visiting a physical store to buy clothes

Answer: C. Booking a hotel room online.


Explanation: Booking a hotel room online is an example of e-commerce as it involves buying a
service online.

3. Which of the following is a benefit of e-commerce for consumers?

A. Limited product choices


B. High prices
C. Time savings
D. Limited payment options

Answer: C. Time savings.

Explanation: E-commerce allows consumers to shop from the comfort of their own homes, saving
them time and effort.

4. What is B2B e-commerce?

A. Business-to-business e-commerce
B. Business-to-consumer e-commerce
C. Consumer-to-consumer e-commerce
D. Government-to-consumer e-commerce
Answer: A. Business-to-business e-commerce.

Explanation: B2B e-commerce involves businesses selling products or services to other businesses.

5. Which of the following is a disadvantage of e-commerce for small businesses?

A. Increased visibility
B. Reduced marketing costs
C. Limited access to customer data
D. Increased competition

Answer: D. Increased competition.

Explanation: E-commerce allows small businesses to compete with larger businesses, but it also
increases competition from other small businesses.

6. What is a payment gateway?

A. A website where customers can make payments


B. A software application that processes payments
C. A physical location where payments are accepted
D. A bank that provides payment services

Answer: B. A software application that processes payments.

Explanation: A payment gateway is a software application that allows businesses to process


payments securely.

7. What is a shopping cart?

A. A physical cart used for shopping in a store


B. A virtual cart used for shopping online
C. A loyalty program offered by online retailers
D. A type of online auction

Answer: B. A virtual cart used for shopping online.


Explanation: A shopping cart is a virtual cart that allows consumers to add items to their cart
while shopping online.

8. What is a chargeback?

A. A refund issued by the seller


B. A dispute initiated by the buyer with their bank
C. A fee charged by the payment processor
D. A discount offered by the seller

Answer: B. A dispute initiated by the buyer with their bank.

Explanation: A chargeback is a dispute initiated by the buyer with their bank, requesting a refund for
a transaction.

9. What is dropshipping?

A. A type of e-commerce where the seller doesn’t hold inventory


B. A type of e-commerce where the buyer pays in installments
C. A type of e-commerce where the seller only accepts cryptocurrencies
D. A type of e-commerce where the seller only ships to certain countries

Answer: A. A type of e-commerce where the seller doesn’t hold inventory.

Explanation: Dropshipping is a type of e-commerce where the seller doesn’t hold inventory and
instead fulfills orders by purchasing products from a third-party supplier.

10. What is a fulfillment center?

A. A physical location where products are stored and shipped


B. A software application used to process orders
C. A customer service center for online orders
D. A type of payment gateway

Answer: A. A physical location where products are stored and shipped.

Explanation: A fulfillment center is a physical location where products are stored and shipped to
customers after orders are placed online.

11. What is a digital product?

A. A physical product that is sold online


B. A product that is delivered electronically
C. A product that is only available in certain regions
D. A product that is not available for purchase online

Answer: B. A product that is delivered electronically.

Explanation: A digital product is a product that is delivered electronically, such as a software


program, e-book, or music file.

12. What is a virtual storefront?


A. A physical store that also has an online presence
B. An online store that does not have a physical location
C. A store that only sells digital products
D. A store that only accepts cryptocurrency payments

Answer: B. An online store that does not have a physical location.

Explanation: A virtual storefront is an online store that does not have a physical location.

13. What is a product feed?

A. A list of products and their descriptions that can be used for advertising
B. A list of products that are out of stock
C. A list of products that are only available for a limited time
D. A list of products that are not available for purchase online

Answer: A. A list of products and their descriptions that can be used for advertising.

Explanation: A product feed is a list of products and their descriptions that can be used for
advertising on various platforms.

14. What is a sales funnel?


A. A tool used to track sales and revenue
B. A series of steps that a customer takes to make a purchase
C. A type of advertising campaign
D. A type of payment processor

Answer: B. A series of steps that a customer takes to make a purchase.

Explanation: A sales funnel is a series of steps that a customer takes to make a purchase, starting
from awareness of a product to the actual purchase.

15. What is a landing page?

A. The homepage of a website


B. A page where customers can leave feedback
C. A page where customers can view their order history
D. A page where customers land after clicking on an advertisement

Answer: D. A page where customers land after clicking on an advertisement.

Explanation: A landing page is a page where customers land after clicking on an advertisement,
designed to convert them into customers.

16. What is retargeting?

A. A type of payment method


B. A type of advertising that targets customers who have already interacted with a brand
C. A type of shipping method
D. A type of customer service technique

Answer: B. A type of advertising that targets customers who have already interacted with a brand.

Explanation: Retargeting is a type of advertising that targets customers who have already interacted
with a brand, such as by visiting their website or adding products to their cart.

17. What is an upsell?

A. A type of customer service technique


B. A type of advertising campaign
C. A technique used to increase the value of a customer’s purchase
D. A type of payment processor

Answer: C. A technique used to increase the value of a customer’s purchase.

Explanation: An upsell is a technique used to increase the value of a customer’s purchase by


suggesting additional products or services.

18. What is a cross-sell?


A. A type of payment method
B. A type of advertising campaign
C. A technique used to sell products that complement the customer’s original purchase
D. A type of shipping method

Answer: C. A technique used to sell products that complement the customer’s original purchase.
Explanation: A cross-sell is a technique used to sell products that complement the customer’s
original purchase,

19. What is a call-to-action (CTA)?

A. A button or link that prompts a customer to take a specific action


B. A type of advertising campaign
C. A type of customer service technique
D. A type of payment processor

Answer: A. A button or link that prompts a customer to take a specific action.

Explanation: A call-to-action (CTA) is a button or link that prompts a customer to take a specific
action, such as making a purchase or subscribing to a newsletter.

20. What is a checkout page?

A. The page where a customer enters their shipping and billing information to complete a purchase
B. The page where a customer selects the products they want to purchase
C. The page where a customer can leave feedback about their experience
D. The page where a customer can view their order history

Answer: A. The page where a customer enters their shipping and billing information to complete a
purchase.

Explanation: A checkout page is the page where a customer enters their shipping and billing
information to complete a purchase.

21. What is a customer persona?

A. A detailed description of a hypothetical ideal customer


B. A list of products that a customer has previously purchased
C. A type of customer service technique
D. A type of payment processor

Answer: A. A detailed description of a hypothetical ideal customer.


Explanation: A customer persona is a detailed description of a hypothetical ideal customer, including
their demographics, behaviors, and preferences.

22. What is a discount code?

A. A code that customers can enter at checkout to receive a discount on their purchase
B. A code used to track customer behavior on a website
C. A code used to identify a particular product in a product feed
D. A code used to encrypt customer data during checkout

Answer: A. A code that customers can enter at checkout to receive a discount on their purchase.

Explanation: A discount code is a code that customers can enter at checkout to receive a discount on
their purchase.

23. What is a product description?

A. A detailed written description of a product’s features and benefits


B. A list of product names and prices
C. A type of customer service technique
D. A type of payment processor

Answer: A. A detailed written description of a product’s features and benefits.

Explanation: A product description is a detailed written description of a product’s features and


benefits, typically used on a product page to inform and persuade customers.

24. What is a product category?

A. A group of products that are similar in nature and purpose


B. A type of payment processor
C. A type of advertising campaign
D. A type of customer service technique

Answer: A. A group of products that are similar in nature and purpose.

Explanation: A product category is a group of products that are similar in nature and purpose, such
as “electronics” or “apparel.”

25. What is a product variation?

A. A specific version of a product with different features or options


B. A type of payment processor
C. A type of advertising campaign
D. A type of customer service technique

Answer: A. A specific version of a product with different features or options.

Explanation: A product variation is a specific version of a product with different features or options,
such as different colors or sizes.

26. What is a product review?


A. A customer’s written evaluation of a product’s quality and usefulness
B. A list of products that are currently on sale
C. A type of customer service technique
D. A type of payment processor

Answer: A. A customer’s written evaluation of a product’s quality and usefulness.

Explanation: A product review is a customer’s written evaluation of a product’s quality and


usefulness, typically used on a product page to provide social proof and inform purchase decisions.

27. What is a customer review?

A. A customer’s written evaluation of their overall experience with an online store


B. A list of products that a customer has previously purchased
C. A type of advertising campaign
D. A type of payment processor

Answer: A. A customer’s written evaluation of their overall experience with an online store.

Explanation: A customer review is a customer’s written evaluation of their overall experience with an
online store, typically used to provide social proof and inform potential customers about the store’s
reputation.
28. What is an abandoned cart?

A. A shopping cart that a customer has filled with items but not completed the purchase
B. A type of customer service technique
C. A type of payment processor
D. A type of advertising campaign

Answer: A. A shopping cart that a customer has filled with items but not completed the purchase.

Explanation: An abandoned cart is a shopping cart that a customer has filled with items but not
completed the purchase, typically used as an opportunity to send a reminder or incentive to
complete the purchase.

29. What is a return policy?

A. A set of rules and procedures that outline how customers can return or exchange products
B. A list of products that are currently on sale
C. A type of customer service technique
D. A type of payment processor
Answer: A. A set of rules and procedures that outline how customers can return or exchange
products.
Explanation: A return policy is a set of rules and procedures that outline how customers can return
or exchange products, typically used to provide assurance and transparency for customers.

30. What is a shipping policy?

A. A set of rules and procedures that outline how products are shipped to customers
B. A list of products that are currently on sale
C. A type of customer service technique
D. A type of payment processor

Answer: A. A set of rules and procedures that outline how products are shipped to customers.

Explanation: A shipping policy is a set of rules and procedures that outline how products are shipped
to customers, typically used to provide transparency and expectation management for customers.

31. What is a dropshipping business model?

A. A model where the retailer does not keep inventory in stock, but instead transfers the order and
shipment details to a manufacturer or supplier who then ships the products directly to the customer.
B. A model where the retailer keeps large amounts of inventory in stock.
C. A model where the retailer sells products only to a specific target audience.
D. A model where the retailer sells products through a physical store only.

Answer: A. A model where the retailer does not keep inventory in stock, but instead transfers the
order and shipment details to a manufacturer or supplier who then ships the products directly to the
customer.
Explanation: In a dropshipping business model, the retailer does not keep inventory in stock, but
instead transfers the order and shipment details to a manufacturer or supplier who then ships the
products directly to the customer.

32. What is a checkout process?


A. The process by which a customer completes a purchase on an e-commerce website
B. The process of selecting products to purchase on an e-commerce website
C. A type of customer service technique
D. A type of payment processor

Answer: A. The process by which a customer completes a purchase on an e-commerce website.

Explanation: The checkout process is the process by which a customer completes a purchase on an
e-commerce website, typically involving selecting products, entering payment and shipping
information, and submitting the order for processing.

33. What is a SSL certificate?

A. A digital certificate that authenticates the identity of a website and encrypts data transmitted
between the website and its visitors
B. A type of payment processor
C. A type of advertising campaign
D. A type of customer service technique

Answer: A. A digital certificate that authenticates the identity of a website and encrypts data
transmitted between the website and its visitors.

Explanation: An SSL certificate is a digital certificate that authenticates the identity of a website and
encrypts data transmitted between the website and its visitors, typically used to ensure the security
and privacy of sensitive information transmitted online.

34. What is a subscription model?

A. A model where customers pay a recurring fee to receive a product or service at regular intervals
B. A model where customers pay a one-time fee to receive a product or service
C. A model where customers can choose to pay what they want for a product or service
D. A model where customers receive a product or service for free

Answer: A. A model where customers pay a recurring fee to receive a product or service at regular
intervals.

Explanation: In a subscription model, customers pay a recurring fee to receive a product or service at
regular intervals, typically monthly or annually.

35. What is a fraud detection system?

A. An e-commerce system designed to detect and prevent fraudulent transactions


B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. An e-commerce system designed to detect and prevent fraudulent transactions.

Explanation: A fraud detection system is an e-commerce system designed to detect and prevent
fraudulent transactions, typically using algorithms and other techniques to analyze transaction data
and identify suspicious behavior.

36. What is an affiliate program?


A. A program where third-party websites or individuals promote a company’s products or services in
exchange for a commission on sales
B. A program where customers receive a commission on their own purchases
C. A type of payment processor
D. A type of customer service technique

Answer: A. A program where third-party websites or individuals promote a company’s products or


services in exchange for a commission on sales.

Explanation: An affiliate program is a program where third-party websites or individuals promote a


company’s products or services in exchange for a commission on sales, typically used to increase
brand awareness and drive sales.

37. What is a cross-selling strategy?

A. A strategy where a company promotes additional products or services to customers who have
already purchased something
B. A strategy where a company promotes its products or services through a network of affiliates
C. A type of customer service technique
D. A type of payment processor

Answer: A. A strategy where a company promotes additional products or services to customers who
have already purchased something.

Explanation: A cross-selling strategy is a strategy where a company promotes additional products or


services to customers who have already purchased something, typically used to increase sales and
customer loyalty.

38. What is a bundling strategy?

A. A strategy where a company sells multiple products or services together as a single package
B. A strategy where a company promotes its products or services through a network of affiliates
C. A type of customer service technique
D. A type of payment processor

Answer: A. A strategy where a company sells multiple products or services together as a single
package.

Explanation: A bundling strategy is a strategy where a company sells multiple products or services
together as a single package, typically used to increase sales and offer customers greater value.

39. What is a lead magnet?

A. An incentive offered by a company in exchange for a potential customer’s contact information


B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. An incentive offered by a company in exchange for a potential customer’s contact


information.

Explanation: A lead magnet is an incentive offered by a company in exchange for a potential


customer’s contact information, typically used to build an email list and generate leads for future
sales and marketing efforts.
40. What is a call to action?

A. A statement or button that encourages a website visitor to take a specific action, such as making a
purchase or signing up for a newsletter
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. A statement or button that encourages a website visitor to take a specific action, such as
making a purchase or signing up for a newsletter.

Explanation: A call to action is a statement or button that encourages a website visitor to take a
specific action, such as making a purchase or signing up for a newsletter, typically used to improve
conversion rates.

41. What is A/B testing?

A. A method of testing two different versions of a website or marketing campaign to see which
performs better
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. A method of testing two different versions of a website or marketing campaign to see
which performs better.

Explanation: A/B testing is a method of testing two different versions of a website or marketing
campaign to see which performs better, typically used to improve conversion rates and optimize
marketing efforts.

42. What is a bounce rate?

A. The percentage of website visitors who leave a site without taking any action
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. The percentage of website visitors who leave a site without taking any action.

Explanation: A bounce rate is the percentage of website visitors who leave a site without taking any
action, typically used as a measure of website effectiveness and user engagement.

43. What is a conversion rate?

A. The percentage of website visitors who take a specific action, such as making a purchase or filling
out a form
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. The percentage of website visitors who take a specific action, such as making a purchase
or filling out a form.
Explanation: A conversion rate is the percentage of website visitors who take a specific action, such
as making a purchase or filling out a form, typically used to measure the effectiveness of marketing
campaigns and website optimization efforts.

44. What is PCI compliance?

A. A set of security standards for credit card transactions


B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. A set of security standards for credit card transactions.

Explanation: PCI compliance refers to a set of security standards for credit card transactions, typically
required by payment processors and credit card companies to protect customer payment
information.

45. What is a shipping label?

A. A label affixed to a package that includes shipping information such as the recipient’s address and
tracking number
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign

Answer: A. A label affixed to a package that includes shipping information such as the recipient’s
address and tracking number.

Explanation: A shipping label is a label affixed to a package that includes shipping information such
as the recipient’s address and tracking number, typically used to facilitate the shipping and delivery
process.

SOME OTHER QUESTIONS


1. Which of the following describes e-commerce?

A. doing business electronically

B. doing business

C. sale of goods

D. all of the above

Answer» A. doing business electronically

-
2. Which of the following is part of the four main types for e-commerce?

A. b2b

B. b2c

C. c2b

D. all of the above

Answer» D. all of the above

3. Which segment do eBay, Amazon.com belong?

A. b2bs

B. b2cs

C. c2bs

D. c2cs

Answer» B. b2cs

4. Which type of e-commerce focuses on consumers dealing with each other?

A. b2b

B. b2c

C. c2b

D. c2c

Answer» D. c2c

5. Which segment is eBay an example?

A. b2b

B. c2b

C. c2c

D. none of the above

Answer» D. none of the above

-
6. Which type deals with auction?

A. b2b

B. b2c

C. c2b

D. c2c

Answer» D. c2c

7. In which website Global Easy Buy is facilitated?

A. ebay.com

B. amazon.com

C. yepme.com

D. none of these

Answer» A. ebay.com

8. The best products to sell in B2C e-commerce are:

A. small products

B. digital products

C. specialty products

D. fresh products

Answer» B. digital products

9. Which products are people most likely to be more uncomfortable buying on the Internet?

A. books

B. furniture

C. movies

D. all of the above

Answer» B. furniture

-
10. Which products are people most likely to be comfortable buying on the Internet?

A. books

B. pcs

C. cds

D. all of the above

Answer» D. all of the above

11. Digital products are best suited for B2C e-commerce because they:

A. are commodity like products

B. can be mass-customized and personalized

C. can be delivered at the time of purchase

D. all of the above

Answer» D. all of the above

12. The solution for all business needs is

A. edi

B. erp

C. scm

D. none of the above

Answer» B. erp

13. All of the following are techniques B2C e-commerce companies use to attract customers, except:

A. registering with search engines

B. viral marketing

C. online ads

D. virtual marketing

Answer» D. virtual marketing

-
14. Which is a function of E-commerce

A. marketing

B. advertising

C. warehousing

D. all of the above

Answer» D. all of the above

15. Which is not a function of E-commerce

A. marketing

B. advertising

C. warehousing

D. none of the above

Answer» D. none of the above

- (4)

16. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to th

A. affiliate programs

B. click-through

C. spam

D. all of the above

Answer» B. click-through

17. What is the percentage of customers who visit a Web site and actually buy something called?

A. affiliate programs

B. click-through

C. spam

D. conversion rate

Answer» D. conversion rate

-
18. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a ret

A. direct materials

B. indirect materials

C. edi

D. none of the above

Answer» A. direct materials

19. What are materials that are necessary for running a modern corporation, but do not relate to the company's p

A. direct materials

B. indirect materials

C. edi

D. none of the above

Answer» B. indirect materials

20. What are ballpoint pens purchased by a clothing company?

A. direct materials

B. indirect materials

C. edi

D. none of the above

Answer» B. indirect materials

21. What is another name for materials which cannot be linked to a specific product or process?

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer» B. Indirect materials

-
22. What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compe
successively lower bids until there is only one seller left?

A. b2b marketplace

B. intranet

C. reverse auction

D. internet

Answer» C. reverse auction

23. What are plastic cards the size of a credit card that contains an embedded chip on which digital information c

A. customer relationship management systems cards

B. e-government identity cards

C. fedi cards

D. smart cards

Answer» D. smart cards

24. Most individuals are familiar with which form of e-commerce?

A. b2b

B. b2c

C. c2b

D. c2c

Answer» B. b2c

25. Which form of e-commerce currently accounts for about 97% of all e-commerce revenues?

A. b2b

B. b2c

C. c2b

D. c2c

Answer» A. b2b

-
26. Which of the following are advantages normally associated with B2B e-commerce?

A. shorter cycle times

B. reduction in costs

C. reaches wider audiences

D. all of the above

Answer» D. all of the above

27. If the threat of substitute products or services is low it is a(n):

A. disadvantage to the supplier

B. advantage to the buyer

C. advantage to the supplier

D. none of the above

Answer» C. advantage to the supplier

28. The threat of new entrants is high when it is:

A. hard for customers to enter the market

B. hard for competitors to enter the market

C. easy for competitors to enter the market

D. easy for customers to enter the market

Answer» C. easy for competitors to enter the market

29. If it is easy for competitors to enter the market, the threat of new entrants is considered:

A. high

B. low

C. more

D. less

Answer» A. high

-
30. An industry is less attractive for suppliers when the rivalry among existing competitors is:

A. high

B. low

C. more

D. less

Answer» A. high

31. Unique value auction is mainly applies to?

A. new products

B. second hand products

C. engineering products

D. none of the above

Answer» B. second hand products

32. Paisapay is facilitated in

A. ebay.co.in

B. amazon.com

C. flipkart.com

D. none of the above

Answer» A. ebay.co.in

33. Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption

B. decryption

C. firewall

D. all the above

Answer» D. all the above

-
34. Which of the following is not related to security mechanism

A. encryption

B. decryption

C. e-cash

D. all the above

Answer» C. e-cash

35. A product or service that customers have come to expect from an industry, which must be offered by new ent
is known as a(n)?

A. switching costs

B. loyalty programs

C. entry barriers

D. affiliate programs

Answer» C. entry barriers

36. Which of the following statements accurately reflect the impact of technology?

A. technology has caused buyer power to increase

B. technology has lessened the entry barriers for many industries

C. technology has increased the threat of substitute products and services

D. all of the above

Answer» D. all of the above

37. A business cannot be all things to all people. Instead, a business must:

A. identify target customers

B. identify the value of products/services as perceived by customers

C. all of the above

D. none of the above

Answer» C. all of the above

-
38. How the transactions occur in e-commerce?

A. using e-medias

B. using computers only

C. using mobile phones only

D. none of the above

Answer» A. using e-medias

39. Which type of products is lesser purchased using ecommerce?

A. automobiles

B. books

C. softwares

D. none

Answer» A. automobiles

40. A business competing in a commodity like environment must focus on which of the following?

A. price

B. ease / speed of delivery

C. ease of ordering

D. all of the above

Answer» D. all of the above

41. Which of the following refers to creating products tailored to individual customers?

A. customization

B. aggregation

C. direct materials

D. reverse auction

Answer» A. customization

-
42. Materials used in the normal operation of a business but not related to primary business operations are called

A. supplies

B. direct materials

C. indirect materials

D. daily stuff

Answer» C. indirect materials

43. Amazon.com is well-known for which e-commerce marketing technique?

A. banner ads

B. pop-up ads

C. affiliate programs

D. viral marketing

Answer» C. affiliate programs

44. What is the name given to an interactive business providing a centralized market where many buyers and sup
commerce-related activities?

A. direct marketplace

B. b2b

C. b2c

D. electronic marketplace

Answer» D. electronic marketplace

- (1)

45. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO mate

A. horizontal

B. vertical

C. integrated

D. inclined

Answer» A. horizontal

-
46. Which form of e-marketplace brings together buyers and sellers from the same industry?

A. horizontal

B. vertical

C. integrated

D. inclined

Answer» B. vertical

47. Which type of add appears on a web page?

A. pop-under ad

B. pop-up ad

C. banner ad

D. discount ad

Answer» C. banner ad

48. What type of ad appears on top of a web page?

A. pop-under ad

B. pop-up ad

C. banner ad

D. discount ad

Answer» B. pop-up ad

49. What type of ad appears under a web page?

A. pop-under ad

B. pop-up ad

C. banner ad

D. discount ad

Answer» A. pop-under ad

-
50. Which, if any, of the following types of ads are people most willing to tolerate?

A. pop-under ad

B. pop-up ad

C. banner ad

D. none of the above

Answer» D. none of the above

51. Which of the following is an Internet-based company that makes it easy for one person to pay another over th

A. electronic check

B. electronic bill presentment and payment

C. conversion rates

D. financial cybermediary

Answer» D. financial cybermediary

52. Which of the following is a method of transferring money from one person's account to another?

A. electronic check

B. credit card

C. e-transfer

D. none of the above

Answer» A. electronic check

53. If you need to transfer money to another person via the internet, which of the following methods could you u

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer» D. all of the above

-
54. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted ove

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer» C. electronic bill presentment and payment

55. A combination of software and information designed to provide security and information for payment is calle

A. digital wallet

B. pop up ad

C. shopping cart

D. encryption

Answer» A. digital wallet

56. What is the name for direct computer-to-computer transfer of transaction information contained in standard

A. internet commerce

B. e-commerce

C. transaction information transfer

D. electronic data interchange

Answer» D. electronic data interchange

57. Which of the following is used in B2B to pay for purchases?

A. e-commerce

B. financial electronic data interchange

C. electronic data exchange

D. electronic checks

Answer» B. financial electronic data interchange

-
58. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt da
the _____ key, while the key used to decrypt data is called the _____ key.

A. encryption, decryption

B. private, public

C. encryption, public

D. public, private

Answer» D. public, private

59. Secure Sockets Layers does which of the following?

A. creates a secure, private connection to a web server

B. encrypts information

C. sends information over the internet

D. all of the above

Answer» D. all of the above

60. When a transaction is processed online, how can the merchant verify the customer's identity?

A. use secure sockets layers

B. use secure electronic transactions

C. use electronic data interchange

D. use financial electronic data interchange

Answer» B. use secure electronic transactions

61. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private infor

A. hacking

B. cracking

C. dumpster diving

D. spoofing

Answer» D. spoofing

-
62. What is a model of a proposed product, service, or system?

A. prototyping

B. prototype

C. proof-of-concept prototype

D. selling prototype

Answer» B. prototype

63. What is an internal organizational Internet that is guarded against outside access by a special security feature
hardware, or a combination of the two)?

A. client/server network

B. intranet

C. extranet

D. thin client

Answer» B. intranet

64. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers

A. client/server network

B. intranet

C. extranet

D. thin client

Answer» C. extranet

65. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster su

A. disaster recovery plan

B. hot site

C. cold site

D. disaster recovery cost curve

Answer» A. disaster recovery plan

-
66. What is a separate facility that does not have any computer equipment but is a place where the knowledge w

A. disaster recovery plan

B. hot site

C. cold site

D. disaster recovery cost curve

Answer» C. cold site

67. What is a separate and fully equipped facility where the company can move immediately after the disaster an

A. disaster recovery plan

B. hot site

C. cold site

D. disaster recovery cost curve

Answer» B. hot site

68. Which factor determines who has the right to access different types of IT systems and information?

A. availability

B. accessibility

C. reliability

D. scalability

Answer» B. accessibility

69. Which factor ensures your IT systems are functioning correctly and providing accurate information?

A. availability

B. accessibility

C. reliability

D. scalability

Answer» C. reliability

-
70. Which factor represents how well your system can adapt to increased demands?

A. availability

B. accessibility

C. reliability

D. scalability

Answer» D. scalability

71. Which factor represents a system's ability to change quickly?

A. flexibility

B. performance

C. capacity planning

D. benchmark

Answer» A. flexibility

72. What is a set of conditions used to measure how well a product or system functions?

A. flexibility

B. performance

C. capacity planning

D. benchmark

Answer» D. benchmark

73. What determines the future IT infrastructure requirements for new equipment and additional network capac

A. flexibility

B. performance

C. capacity planning

D. benchmark

Answer» C. capacity planning

-
74. What automates business processes?

A. workflow

B. asp

C. workflow system

D. eip

Answer» C. workflow system

75. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

A. workflow

B. eip

C. workflow system

D. sla

Answer» A. workflow

76. What sends work assignments through an e-mail system?

A. database-based enterprise information portal

B. messaging-based enterprise information portal

C. database-based workflow system

D. messaging-based workflow system

Answer» D. messaging-based workflow system

77. Which will not harm computer resources

A. firewall

B. virus

C. trojan horse

D. none of the above

Answer» A. firewall

-
78. Which is not a function of ERP?

A. warehousing

B. sales

C. scheduling

D. none of the above

Answer» D. none of the above

79. Which is a function of ERP?

A. warehousing

B. sales

C. scheduling

D. all of the above

Answer» D. all of the above

80. Which of the following is the primary characteristic of an intranet?

A. people outside the organization can access it

B. people inside the organization can\t access it

C. people outside the organization can\t access it

D. none of the above

Answer» C. people outside the organization can\t access it

81. Which concept suggests that different applications and computer systems should be able to communicate wit

A. integration

B. web services

C. scalability

D. interoperability

Answer» D. interoperability

-
82. Which process can prevent data from lose due to computer problems or human errors?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer» A. backup

83. Which process is used to reinstall data from a copy when the original data has been lost?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer» B. recovery

84. What describes a process of continuously measuring results and comparing those results to optimal performa
improved?

A. performance

B. capacity planning

C. benchmarking

D. data cleansing

Answer» C. benchmarking

85. Who protects system from external threats?

A. firewall

B. edi

C. erp

D. script kiddies

Answer» A. firewall

-
86. Who breaks into other people's computer systems and steals and destroys information?

A. hackers

B. softwares

C. hacktivists

D. script kiddies

Answer» A. hackers

87. What is software that comes hidden in free downloadable software and tracks your online movements, mines
or uses your computer's CPU and storage for some task you know nothing about?

A. web log

B. clickstream

C. anonymous web browsing service

D. none of the above

Answer» D. none of the above

88. ERP stands for

A. enterprise resolution planning

B. enterprise reverse planning

C. enterprise resource planning

D. none of the above

Answer» C. enterprise resource planning

89. Which is not a component of ERP?

A. legacy systems

B. bolt on applications

C. operational database

D. cybersoft

Answer» D. cybersoft

-
90. Which is not a function of ERP?

A. human resource management

B. financial

C. warehousing

D. none of the above

Answer» D. none of the above

91. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail

A. computer virus

B. worm

C. denial-of-service attack

D. none of the above

Answer» B. worm

92. What floods a Web site with so many requests for service that it slows down or crashes?

A. computer virus

B. worm

C. denial-of-service attack

D. none of the above

Answer» C. denial-of-service attack

93. What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU

A. computer virus

B. worm

C. denial-of-service attack

D. none of the above

Answer» D. none of the above

-
94. What consists of the identification of risks or threats, the implementation of security measures, and the moni

A. risk management

B. risk assessment

C. security

D. none of the above

Answer» A. risk management

95. What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to th
assets?

A. risk management

B. risk assessment

C. security

D. none of the above

Answer» B. risk assessment

96. What is the process of making a copy of the information stored on a computer?

A. backup

B. anti-virus

C. firewall

D. biometrics

Answer» A. backup

97. Companies use………………………networks to automate employee related Corporate processes.

A. b2g

B. b2e

C. b2b

D. p2p

Answer» B. b2e

-
98. ……………….is an early form of E-commerce

A. scm

B. edi

C. both of these

D. none of these

Answer» B. edi

99. ………………..is concerned with the buying and selling information, products and services over computer comm

A. commerce

B. e-commerce

C. e-business

D. none of these

Answer» B. e-commerce

100. Which among the following product is suitable for E-Commerce ?

A. books

B. vegetables

C. all of these

D. none of these

Answer» A. books

101. ……………allows a business application on the computer of one organization to communicate directly with the
another company.

A. edi

B. protocols

C. standards

D. business applications

Answer» A. edi

-
102. Electronic Exchange of business documents in a standard format is known as ………………

A. e-commerce

B. e-business

C. edi

D. none of these

Answer» C. edi

103. Which of the following is not a party of SCM ?

A. suppliers

B. manufacturers

C. distributors

D. customers

Answer» C. distributors

104. ………………is a commercial process that includes production, distribution, sales or delivery of goods and servic

A. e-commerce

B. scm

C. edi

D. none of these

Answer» A. e-commerce

105. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in t

A. process based

B. strategic relationship based

C. transaction based

D. any of these

Answer» B. strategic relationship based

-
106. …………………is basically a concept of online marketing and distributing of products and services over the intern

A. b2g

B. b2e

C. b2c

D. b2b

Answer» C. b2c

107. ……………………..e-commerce consists of the sale of products or services from a business to the general public

A. b2g

B. b2e

C. b2b

D. b2c

Answer» D. b2c

108. Which of the following is not suitable for a B2C transaction ?

A. clothes

B. flowers

C. airline reservation

D. none

Answer» D. none

109. ……………..e-commerce transaction has the advantage of eliminating middlemen.

A. b2g

B. b2c

C. b2b

D. b2e

Answer» B. b2c

-
110. ………………….e-commerce involves customers gathering information, purchasing and receiving products over a

A. b2g

B. b2e

C. b2b

D. b2c

Answer» D. b2c

111. Which among the following is not an user of B2C e-commerce ?

A. manufacturers

B. distributors

C. publishers

D. none

Answer» D. none

112. ………………….e-commerce involves the electronic facilitation of transaction between customers through some

A. c2c

B. b2e

C. b2b

D. b2g

Answer» A. c2c

113. Which among the following is not a B2E application

A. online insurance policy management

B. online supply requests

C. special employee offers

D. locate application and tax forms

Answer» D. locate application and tax forms

-
114. ……………………..streamlines the flow of information and self service capabilities through automation

A. scc

B. crm

C. crp

D. scm

Answer» A. scc

115. …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.

A. html

B. http

C. bothe of these

D. none of these

Answer» B. http

116. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.

A. internet

B. www

C. intranet

D. none of these

Answer» B. www

117. ………refers to a kind of e-commerce which refers to a company selling or buying from other company

A. b2g

B. b2e

C. b2b

D. p2p

Answer» C. b2b

-
118. A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an

A. b2g

B. b2e

C. b2b

D. p2p

Answer» C. b2b

119. …………..sites act as an intermediary between someone wanting a product or service and potential providers

A. brokering sites

B. information sites

C. industry portals

D. none of these

Answer» A. brokering sites

120. A……………portal is a specialized entry point to a specific market place or industry niche.

A. vertical portal

B. horizontal portal

C. both of these

D. none of these

Answer» A. vertical portal

121. Which among the following is an example for vertical portal ?

A. i-village

B. yahoo

C. google

D. net scape

Answer» A. i-village

-
122. 4. A portal that helps to establish relations and to conduct transactions between various organizations is term

A. b2b portals

B. c2c portals

C. both of these

D. none of these

Answer» A. b2b portals

123. A …………………….is a software that scours the internet collecting data about every website and every webpage

A. spiders

B. search engines

C. robots

D. none of these

Answer» B. search engines

124. Which among the following is not an example for Search engine ?

A. google

B. msn

C. alta vista

D. none of these

Answer» D. none of these

125. Web pages are prepared using their language as…………………

A. html

B. ftp

C. http

D. none of these

Answer» A. html

-
126. A web page is transferred to users computer through ……………………..

A. html

B. ftp

C. http

D. none of these

Answer» C. http

127. The user reaches this page when they specify the address of a website

A. home page

B. web page

C. summary page

D. none of these

Answer» A. home page

128. ……………………..streamlines the flow of information and self service capabilities through automation

A. scc

B. crm

C. crp

D. scm

Answer» A. scc

129. ………………is a global web in which millions of users are communicating with each other with the help of comp

A. internet

B. www

C. both of these

D. none of these

Answer» A. internet

-
130. …………………….is an online auctioning site that facilitates the trade of privately owned items between individu

A. e-bay

B. amazon.com

C. rentalic.com

D. all of these

Answer» A. e-bay

131. Monster.com is an example of ……………………..website

A. c2c

B. b2e

C. b2b

D. b2c

Answer» A. c2c

132. This is a protocol which allows files to be transferred from one computer to another computer

A. tcp/ip

B. ftp

C. http

D. none of these

Answer» B. ftp

133. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html

A. web page

B. home page

C. domain

D. none of these

Answer» A. web page

-
134. ………………….is the first page of a web site.

A. web page

B. home page

C. domain

D. none of these

Answer» B. home page

135. …………………….is an online auctioning site that facilitates the trade of privately owned items between individu

A. e-bay

B. amazon.com

C. rentalic.com

D. all of these

Answer» A. e-bay

136. ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending m

A. debit card

B. credit card

C. electronic purse

D. any of these

Answer» C. electronic purse

137. ……………………encrypts payment card transaction data and verifies that both parties in the transaction are gen

A. ssl

B. set

C. both of these

D. none of these

Answer» B. set

-
138. SET means ………………

A. standard electronic technology

B. standard electronic transfer

C. secure electronic transaction

D. none of these

Answer» C. secure electronic transaction

139. The verification of credit card is done by using…………….. with a communications link to the merchants acquiri

A. credit card payment terminal

B. point of sale

C. all of these

D. none of these

Answer» C. all of these

140. ……………….is a financial institution that establishes an account with a merchant and processes payment card a

A. customer

B. issuer

C. merchant

D. acquirer

Answer» D. acquirer

141. ………………type of payment system is highly useful to those customers who would like to control overspending

A. prepaid

B. post paid

C. both of these

D. none of these

Answer» A. prepaid

-
142. ……………………….credit card gives all the advantages of a normal credit card without worrying about the intere

A. prepaid

B. post paid

C. both of these

D. none of these

Answer» A. prepaid

143. ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the r

A. cash advance

B. revolver

C. tele draft

D. none of these

Answer» B. revolver

144. ………………….is a financial instrument which can be used more than once to borrow money or buy products an

A. credit card

B. e-cheques

C. e-cash

D. none of these

Answer» A. credit card

145. To accept a credit card for payment, we have to open a …………………account with our bank

A. savings bank

B. current account

C. merchant account

D. any of these

Answer» C. merchant account

-
146. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the me

A. debit card

B. electronic purse

C. credit card

D. any of these

Answer» A. debit card

147. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables s

A. digital signature

B. digital certificates

C. ssl

D. none of these

Answer» B. digital certificates

148. The information Technology Act [IT ACT] came into effect on

A. 16th november 2000

B. 15th december 2000

C. 17th october 2000

D. none of these

Answer» C. 17th october 2000

149. Information sent over the Internet commonly uses the set of rules called……………………

A. tcp/ip

B. ftp

C. http

D. gopher

Answer» A. tcp/ip

-
150. ……………………….is a person who breaks in or trespasses a computer system

A. hacker

B. snooper

C. operator

D. spoofer

Answer» A. hacker

151. E-mail which contains useless material is termed as……………

A. spam

B. useless mail

C. trunk mail

D. junk mail

Answer» D. junk mail

152. India has enacted the first IT Act in the year……………………

A. 2001

B. 2002

C. 2009

D. 2000

Answer» D. 2000

153. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. cyber terrorism

B. child pornography

C. video voyeurism

D. none of these

Answer» D. none of these

-
154. Trade mark, copyright, patent law etc comes under the purview of……………………

A. data protection

B. telecommunication laws

C. intellectual property laws

D. none

Answer» C. intellectual property laws

155. Which one of the following is not a principle of e-commerce ?

A. privacy

B. integrity

C. authentication

D. none of these

Answer» D. none of these

156. ………………is basically a secure gate between our organization data and internet.

A. network firewall

B. antivirus

C. both of these

D. none of these

Answer» A. network firewall

157. ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic

A. biometrics

B. pin

C. both of these

D. none of these

Answer» A. biometrics

-
158. ……………….is a financial institution that establishes an account with a merchant and processes payment card a

A. customer

B. issuer

C. merchant

D. acquirer

Answer» D. acquirer

159. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre de

A. prepaid

B. post paid

C. both of these

D. none of these

Answer» A. prepaid

160. .……………….is the exchange of goods or items or commodities and services or applications used for money and

A. e-commerce

B. commerce

C. both of these

D. none

Answer» B. commerce

161. ……………….always operate on intranet

A. e--commerce

B. e-business

C. edi

D. none of these

Answer» B. e-business

-
162. Which among the following is not an example for E-commerce

A. amazon.com

B. baazar.com

C. e-trade.com

D. none of these

Answer» C. e-trade.com

163. ………………were the first to establish prominent E-commerce Brands

A. baazar.com

B. e-bay and amazon

C. e-trade.com

D. none of these

Answer» B. e-bay and amazon

164. …………….is a form of supply chain where a series of assembly operations are carried out to obtain the final pr

A. converging supply chain

B. diverging supply chain

C. any of these

D. none

Answer» A. converging supply chain

165. .…………………is a form of supply chain where a wide variety of finished goods are produced with limited numb

A. converging structure

B. diverging structure

C. any of these

D. none

Answer» B. diverging structure

-
166. ……………………is the exchange of services, information or product from one business to a government agency

A. b2g

B. b2e

C. b2b

D. p2p

Answer» A. b2g

- (1)

167. ………………….is an internet network that allows users with the same network in software to connect to each o

A. b2c

B. b2e

C. b2b

D. p2p

Answer» D. p2p

168. ”Google” is one of the most popular………………..

A. portal

B. browser

C. search engine

D. none of these

Answer» C. search engine

169. A ………………….. Presents information from diverse sources in a unified way in a web site.

A. web portal

B. link page

C. both of these

D. none of these

Answer» C. both of these

-
170. ……………………….is a person who breaks in or trespasses a computer system

A. hacker

B. snooper

C. operator

D. spoofer

Answer» A. hacker

171. Peer to Peer [P2P] is also used to describe ………………………

A. c2c

B. b2e

C. b2b

D. b2c

Answer» A. c2c

172. ……………..allows the person to type ion just the main word or words and the site will come in

A. web page

B. home page

C. domain

D. none of these

Answer» C. domain

173. A ………………….. presents information from diverse sources in a unified way in a web site

A. web portal

B. link page

C. both of these

D. none of these

Answer» C. both of these

-
174. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identit

A. positive id system

B. negative id system

C. both of these

D. none of these

Answer» B. negative id system

175. …………………..are program developed by some dishonest people to destroy the computer system and the valua

A. network firewall

B. computer virus

C. both of these

D. none of these

Answer» B. computer virus

176. he dimension of e-commerce that enables commerce across national boundaries is called ______________.

A. interactivity

B. global reach

C. richness

D. ubiquity

Answer» B. global reach

177. The primary source of financing during the early years of e-commerce was ______________.

A. bank loans

B. large retail firms

C. venture capital funds

D. initial public offerings

Answer» C. venture capital funds

-
178. The source of revenue in a subscription revenue model is ______________.

A. fees from advertisers in exchange for advertisements

B. fees for business referrals

C. fees from subscribers in exchange for access to content or services

D. fees for enabling or execution a transaction

Answer» C. fees from subscribers in exchange for access to content or services

179. Industry structure is defined as ______________.

A. the nature of the players in an industry and their relative bargaining power

B. a set of plans for achieving long term returns on the capital invested in a business firm

C. set of planned activities designed to result in a profit in a marketplace

D. how a company\s product or service fulfills the needs of customers

Answer» A. the nature of the players in an industry and their relative bargaining power

180. The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual del

A. tcp

B. ip

C. the network layer

D. the application layer

Answer» B. ip

181. Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone

B. network architecture limitations

C. insufficient reach

D. best-efforts qos

Answer» C. insufficient reach

-
182. Internet users account for about ______________ of the world's population.

A. 7%

B. 17%

C. 27%

D. 47%

Answer» B. 17%

183. The most common type of Internet crime according to the IC3 is ______________.

A. credit card fraud

B. check fraud

C. non-delivery

D. auction fraud

Answer» D. auction fraud

184. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.

A. phishing

B. pharming

C. a denial of service (dos) attack

D. spoofing

Answer» C. a denial of service (dos) attack

185. ______________ influence the behavior of others through their personality, skills, or other factors.

A. opinion leaders

B. direct reference groups

C. indirect reference groups

D. lifestyle groups

Answer» A. opinion leaders

-
186. A(n) ______________ represents data as two-dimensional tables with records organized in rows and attribute

A. database management system

B. data warehouse

C. sql query

D. relational database

Answer» D. relational database

187. Creating multiple versions of information goods and selling essentially the same product to different market s
called______________.

A. versioning

B. bundling.

C. transactive content

D. price discrimination

Answer» A. versioning

188. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

A. loyalty

B. reach

C. recency

D. unique visitors

Answer» A. loyalty

189. Which of the following statements about privacy is true?

A. it is a moral right to be left alone

B. only corporations and government need to be concerned about it

C. it has only just recently become a concern

D. it is most easily obtained on the internet

Answer» A. it is a moral right to be left alone

-
190. The redirection of traffic from a legitimate site to an infringing site is called ______________.

A. cybersquatting

B. cyber piracy

C. met tagging

D. key wording

Answer» B. cyber piracy

191. A security plan begins with a(n) is ______________.

A. security policy

B. risk assessment

C. implementation plan

D. security organization

Answer» B. risk assessment

192. ______________ influence the behavior of others through their personality, skills, or other factors.

A. opinion leaders

B. direct reference groups

C. indirect reference groups

D. lifestyle groups

Answer» A. opinion leaders

193. Creating multiple versions of information goods and selling essentially the same product to different market s
called______________.

A. versioning

B. bundling.

C. transitive content

D. price discrimination

Answer» A. versioning

-
194. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

A. loyalty

B. reach

C. regency

D. unique visitors

Answer» A. loyalty

195. ______________ are networks that connect people within a company to each other and to the company netw

A. bitstreams

B. extranets

C. internets

D. intranets

Answer» D. intranets

196. A website offering content created by third party transparently to customers is an example of _____________

A. reinter mediation

B. syndication

C. virtual manufacturing

D. build-to-order

Answer» B. syndication

197. E-commerce technologies have improved upon traditional commerce technologies in ______________.

A. richness

B. reach

C. both richness and reach

D. neither richness nor reach

Answer» C. both richness and reach

-
198. All of the following are technologies used to gather information about you online except ______________.

A. spy ware

B. cookies

C. gmail

D. anonymizers

Answer» D. anonymizers

199. ______________ is a program that you can run from the DOS prompt in the Windows operating system in ord
client and the server.

A. ping

B. telnet

C. tracert

D. ssl

Answer» A. ping

200. Which of the following is a new and disruptive Web feature or service?

A. xml

B. diffserv

C. blogs

D. cdma

Answer» C. blogs

201. What Web server functionality allows it verify usernames and passwords and process certificates and encrypti

A. processing of http requests

B. file transfer protocol

C. data capture

D. security services

Answer» D. security services

-
202. The ability to change the product to better fit the needs of the customer is called ______________.

A. customization

B. personalization

C. privacy

D. accessibility

Answer» A. customization

203. All of the following are major categories of computer viruses except ______________.

A. macro viruses

B. file-infecting viruses

C. script viruses

D. trojan viruses

Answer» D. trojan viruses

204. The most prevalent online payment method is ______________.

A. paypal

B. checks

C. credit cards

D. debit

Answer» C. credit cards

205. Complete price transparency in a perfect information marketplace is necessary for ______________ to take eff

A. bertrand\s law

B. the law of universal prices

C. the law of one price

D. the law of perfect commerce

Answer» C. the law of one price

-
206. The process of getting customers to pass along a company's marketing message to friends, family, and colleag

A. affiliate marketing

B. viral marketing

C. permission marketing

D. blog marketing

Answer» B. viral marketing

207. All of the following are types of social marketing except ______________.

A. affiliate marketing

B. blog advertising

C. social network advertising

D. game advertising

Answer» A. affiliate marketing

208. The ethical principle which states that if an action is not right for all situations, then it is not right for any situa

A. the golden rule

B. slippery slope

C. no free lunch

D. universalism

Answer» D. universalism

209. What is the first step in a P3P-enabled transaction?

A. send web page

B. http get request web page

C. send p3p policy files

D. http get request p3p policy files

Answer» B. http get request web page

-
210. The majority of job seekers rely on which of the following?

A. word-of-mouth leads

B. employment agencies

C. internet and newspapers equally

D. internet only

Answer» C. internet and newspapers equally

211. Which of the following best describes predicted growth in C2C and B2C auction spending?

A. b2c spending will overtake c2c spending

B. both types of spending will increase

C. c2c spending will decrease while b2c increases

D. both types of spending will decline at similar rates

Answer» B. both types of spending will increase

212. A materials requirements planning (MRP) system is an example of ______________.

A. spot purchasing

B. a multi-tier supply chain

C. a legacy computer system

D. electronic data interchange

Answer» C. a legacy computer system

213. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses

A. business to business (b2b)

B. consumer to consumer (c2c)

C. consumer to business (c2b)

D. business to consumer (b2c)

Answer» C. consumer to business (c2b)

-
214. Why would a merchant want to customize products?

A. to charge a higher price

B. to decrease costs

C. it is required in ec

D. customers will only accept customized products

Answer» A. to charge a higher price

215. A ______________ is the set of planned activities designed to result in a profit in a marketplace.

A. business model

B. profit model

C. business plan

D. revenue model

Answer» A. business model

216. Affiliate revenue is also called as _______.

A. commission

B. brokerage

C. referral fee

D. discount

Answer» C. referral fee

217. Standards of EDI are decided by ______

A. ascii

B. ansi

C. usa

D. government

Answer» B. ansi

-
218. ______ means converting readable text to unreadable text.

A. conversion

B. decryption

C. encryption

D. decoding

Answer» C. encryption

219. ______ means converting unreadable text to readable text.

A. conversion

B. decryption

C. encryption

D. decoding

Answer» B. decryption

220. _____ changes URL from http to https.

A. ssl

B. set

C. e-commerce

D. m-commerce

Answer» A. ssl

221. In ____ server-side authentication is compulsory.

A. ssl

B. set

C. e-commerce

D. m-commerce

Answer» A. ssl

-
222. An online retail store is called as _____.

A. trader

B. retailer

C. e-tailer

D. amazon

Answer» C. e-tailer

223. In _______, one consumer deals with another consumer.

A. c2c

B. b2c

C. b2b

D. p2p

Answer» A. c2c

224. amazon.com is an example of ______

A. b2b

B. b2c

C. c2c

D. p2p

Answer» B. b2c

225. In SSL encryption is done using ____ key.

A. public

B. private

C. session

D. symmetric

Answer» C. session

-
226. ____ is an online retail store.

A. portal

B. service provider

C. e-tailer

D. content provider

Answer» C. e-tailer

227. Identify the identity of a person or entity with whom you are dealing on Internet is known as ______.

A. integrity

B. authenticity

C. authorisation

D. none of these

Answer» B. authenticity

228. ____ means that the information being displayed on a Web site/transmitted/received over the Internet has n
authorised party.

A. integrity

B. authenticity

C. authorisation

D. none of these

Answer» A. integrity

229. In public key encryption ______ keys are used.

A. public and private

B. only public

C. only private

D. session

Answer» A. public and private

-
230. SET is developed by association led by _________.

A. master card and visa

B. master card

C. visa

D. rupay

Answer» A. master card and visa

231. The technology behind M-commerce is based on ______.

A. http

B. https

C. wap

D. pop

Answer» C. wap

232. ________ is virtual representation of physical market.

A. edi

B. electronic market

C. e-commerce

D. internet commerce

Answer» B. electronic market

233. _____ allows you paperless transaction.

A. edi

B. electronic market

C. e-commerce

D. internet commerce

Answer» A. edi

-
234. _____ means the information being displayed on a Web site or transmitted or received over the Internet has n
unauthorized party.

A. integrity

B. confidentiality

C. authenticity

D. privacy

Answer» A. integrity

235. In ________ encryption is performed with session key.

A. public key

B. private key

C. ssl

D. set

Answer» C. ssl

236. olx.com is an example of ________

A. b2b

B. b2c

C. c2c

D. p2p

Answer» C. c2c

237. ______ are sites that creates a digital online environment where people with similar interest can transact.

A. community provider

B. market creator

C. portal

D. service provider

Answer» A. community provider

-
238. Flipkart.com is an example of _______.

A. b2b

B. b2c

C. c2c

D. p2p

Answer» B. b2c

239. Normally in M-commerce language used to create web pages is _______.

A. html

B. wml

C. vb

D. xml

Answer» B. wml

240. _____ is an art of attempting to acquire information by masked as trustworthy entity.

A. hacking

B. phishing

C. sniffing

D. spoofing

Answer» B. phishing

241. SSL can be used only with _____.

A. ftp

B. http

C. pop

D. smtp

Answer» B. http

-
242. _____ means converting cipher text to plain text.

A. encryption

B. decryption

C. conversion

D. de-conversion

Answer» B. decryption

243. ______ means converting plain text to cipher text.

A. encryption

B. decryption

C. conversion

D. de-conversion

Answer» A. encryption

244. In Public Key Encryption ______ key is used for Encryption.

A. receiver’s public

B. receiver’s private

C. sender’s public

D. sender’s private

Answer» C. sender’s public

245. In Public Key Encryption ______ key is used for Decryption.

A. receiver’s public

B. receiver’s private

C. sender’s public

D. sender’s private

Answer» B. receiver’s private

-
246. _____ can read the cipher text.

A. sender

B. receiver

C. any one

D. no one

Answer» D. no one

247. When message & data are available only to those who are authorized to view them is known as ______ .

A. integrity

B. confidentiality

C. authenticity

D. privacy

Answer» B. confidentiality

248. Digital Accumulating Balance Payment System is generally used for ______ payments.

A. micro

B. macro

C. credit card

D. debit card

Answer» A. micro

249. Scope of E-Commerce is ______.

A. local

B. global

C. within own country

D. within own state

Answer» B. global

-
250. ______ means found everywhere.

A. universal

B. ubiquity

C. global

D. local

Answer» B. ubiquity

251. E-Commerce Lacks _______ touch.

A. social

B. smooth

C. personal

D. communication

Answer» C. personal

252. In SSL _______ key is used for encryption.

A. public

B. private

C. session

D. otp

Answer» C. session

253. To handle credit card transaction on internet _____ is developed by Visa and Master card.

A. ssl

B. set

C. sat

D. encryption

Answer» B. set

-
254. The sender and receiver will have the same key in _____ Key Encryption.

A. symmetric

B. asymmetric

C. public

D. private

Answer» A. symmetric

255. In SSL URL will change from HTTP to _______.

A. cipher text

B. https

C. shttp

D. smtp

Answer» B. https

256. __________ is a best example of Online Stored Value System.

A. google

B. yahoo

C. paypal

D. go daddy

Answer» C. paypal

257. BitTorrent.Com is an example of _____

A. b2b

B. b2c

C. c2c

D. p2p

Answer» D. p2p

- (2)
258. E-Tailer revenue model is ______ revenue.

A. sales

B. subscription

C. advertising

D. affiliate

Answer» A. sales

259. The percentage of people who visit web site and buy something is known as _____

A. hits

B. conversion rate

C. affiliate

D. walk-in-customer

Answer» B. conversion rate

260. In _______ user can share files and computer resources directly.

A. b2b

B. b2c

C. c2c

D. p2p

Answer» D. p2p

261. E-tailer can be Pure Plays or _______ .

A. impure plays

B. indirect plays

C. bricks & clicks

D. direct plays

Answer» C. bricks & clicks

-
262. World Wide Web (WWW) was introduced in the year ……………………

A. 1994

B. 1996

C. 1992

D. 1990

Answer» A. 1994

263. ……………….is an early form of E-commerce

A. SCM

B. EDI

C. Both of these

D. None of these

Answer» B. EDI

264. ………………..is concerned with the buying and selling information, products and services over computer comm

A. Commerce

B. E-Commerce

C. E-Business

D. None of these

Answer» B. E-Commerce

265. ………………..is a set of standards developed in the 1960s to exchange business information and to do electroni

A. EDI

B. Protocols

C. TCP/IP

D. None of these

Answer» A. EDI

-
266. Which among the following product is suitable for E-Commerce ?

A. Books

B. Vegetables

C. All of these

D. None of these

Answer» A. Books

267. ……………allows a business application on the computer of one organization to communicate directly with the
another company.

A. EDI

B. Protocols

C. Standards

D. Business applications

Answer» A. EDI

268. Electronic Exchange of business documents in a standard format is known as ………………

A. E-commerce

B. E-Business

C. EDI

D. None of these

Answer» C. EDI

269. ………………. is essentially a business process that connects manufacturers, retailers, customers and suppliers in
products.

A. E-commerce

B. EDI

C. SCM

D. Networking

Answer» C. SCM

-
270. Which of the following is not a party of SCM ?

A. Suppliers

B. Manufacturers

C. Distributors

D. Customers

Answer» C. Distributors

271. ………………is a commercial process that includes production, distribution, sales or delivery of goods and servic

A. E-commerce

B. SCM

C. EDI

D. None of these

Answer» A. E-commerce

272. ……………….is the exchange of goods or items or commodities and services or applications used for money and

A. E-commerce

B. Commerce

C. Both of these

D. none

Answer» B. Commerce

273. …………….is an approach to deliver information differentiated business values called services by combining the
resources

A. E-business

B. E-commerce

C. any of these

D. none

Answer» A. E-business

-
274. ……………….always operate on intranet

A. E--commerce

B. E-Business

C. EDI

D. None of these

Answer» B. E-Business

275. Which among the following is not an example for E-commerce

A. Amazon.com

B. Baazar.com

C. E-trade.com

D. None of these

Answer» C. E-trade.com

276. ……………….and ………………… were the enabling technologies that laid the ground work for E- commerce

A. SET and SCL

B. SCM and ERP

C. EDI and EFT

D. None of these

Answer» C. EDI and EFT

277. ………………were the first to establish prominent E-commerce Brands

A. Baazar.com

B. E-bay and Amazon

C. E-trade.com

D. none of these

Answer» B. E-bay and Amazon

-
278. …………….is a systems approach to Managing the entire flow of information, materials, and services from raw
warehouses to the end customer.

A. CRM

B. SRM

C. EDI

D. SCM

Answer» D. SCM

279. …………….is a form of supply chain where a series of assembly operations are carried out to obtain the final pr

A. Converging supply chain

B. Diverging supply chain

C. Any of these

D. None

Answer» A. Converging supply chain

280. ……………………is a form of supply chain where a wide variety of finished goods are produced with limited num

A. Converging structure

B. Diverging structure

C. Any of these

D. None

Answer» B. Diverging structure

281. ……………………is the exchange of services, information or product from one business to a government agency

A. B2G

B. B2E

C. B2B

D. P2P

Answer» C. B2B

-
282. Companies use………………………networks to automate employee related corporate processes.

A. B2G

B. B2E

C. B2B

D. P2P

Answer» B. B2E

283. Which among the following is not a B2E application

A. Online Insurance policy management

B. Online supply requests

C. Special employee offers

D. Locate application and tax forms

Answer» D. Locate application and tax forms

284. ……………………..streamlines the flow of information and self service capabilities through automation

A. SCC

B. CRM

C. CRP

D. SCM

Answer» A. SCC

285. ………………is a global web in which millions of users are communicating with each other with the help of comp

A. Internet

B. WWW

C. both of these

D. None of these

Answer» A. Internet

-
286. …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.

A. html

B. HTTP

C. Bothe of these

D. None of these

Answer» A. html

287. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.

A. internet

B. WWW

C. Intranet

D. none of these

Answer» B. WWW

288. ………refers to a kind of e-commerce which refers to a company selling or buying from other company

A. B2G

B. B2E

C. B2B

D. P2P

Answer» C. B2B

289. Which of the following is not an example for B2B e-commerce ?

A. Sending and receiving orders

B. Invoice and shopping

C. all of these

D. none of these

Answer» D. none of these

-
290. A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an

A. B2G

B. B2E

C. B2B

D. P2P

Answer» C. B2B

291. …………..sites act as an intermediary between someone wanting a product or service and potential providers

A. brokering sites

B. Information sites

C. industry portals

D. none of these

Answer» A. brokering sites

292. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in t

A. Process based

B. strategic relationship based

C. transaction based

D. any of these

Answer» B. strategic relationship based

293. ……………..focus on producing a highly integrated value proposition through a managed process.

A. hubs

B. community

C. contents

D. none of these

Answer» A. hubs

-
294. …………………is basically a concept of online marketing and distributing of products and services over the intern

A. B2G

B. B2E

C. B2B

D. B2C

Answer» D. B2C

295. ……………………..e-commerce consists of the sale of products or services from a business to the general public

A. B2G

B. B2E

C. B2B

D. B2C

Answer» D. B2C

296. Which of the following is not suitable for a B2C transaction ?

A. clothes

B. flowers

C. airline reservation

D. none

Answer» D. none

297. ……………..e-commerce transaction has the advantage of eliminating middlemen.

A. B2G

B. B2E

C. B2B

D. B2C

Answer» D. B2C

-
298. ………………….e-commerce involves customers gathering information, purchasing and receiving products over a

A. B2G

B. B2E

C. B2B

D. B2C

Answer» D. B2C

299. Which among the following is not an user of B2C e-commerce ?

A. manufacturers

B. distributors

C. Publishers

D. none

Answer» D. none

300. ………………….e-commerce involves the electronic facilitation of transaction between customers through some

A. B2G

B. B2E

C. B2B

D. C2C

Answer» D. C2C

301. Which among the following is an example of C2C ?

A. e-Bay

B. Amazon.com

C. Rentalic.com

D. all of these

Answer» D. all of these

-
302. Peer to Peer [P2P] is also used to describe………………………….

A. C2C

B. B2E

C. B2B

D. B2C

Answer» A. C2C

303. …………………….is an online auctioning site that facilitates the trade of privately owned items between individu

A. e-Bay

B. Amazon.com

C. Rentalic.com

D. all of these

Answer» A. e-Bay

304. Monster.com is an example of ……………………..website

A. C2C

B. B2E

C. B2B

D. B2C

Answer» A. C2C

305. ………………….is an internet network that allows users with the same network in software to connect to each o

A. P2P

B. B2E

C. B2B

D. B2C

Answer» A. P2P

-
306. This is a protocol which allows files to be transferred from one computer to another computer

A. TCP/IP

B. FTP

C. HTTP

D. none of these

Answer» B. FTP

307. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html

A. Web page

B. home page

C. domain

D. none of these

Answer» A. Web page

308. ………………….is the first page of a web site.

A. Web page

B. home page

C. domain

D. none of these

Answer» B. home page

309. ……………..allows the person to type ion just the main word or words and the site will come in

A. Web page

B. home page

C. domain

D. none of these

Answer» C. domain

-
310. A ………………….. presents information from diverse sources in a unified way on a website.

A. Web portal

B. Link page

C. Both of these

D. none of these

Answer» C. Both of these

311. A……………portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal

B. horizontal portal

C. both of these

D. none of these

Answer» A. Vertical portal

312. ………………..are general interest portals covering a wide range of topics and features

A. Vertical portal

B. horizontal portal

C. both of these

D. none of these

Answer» B. horizontal portal

313. Which among the following is an example for vertical portal ?

A. i-village

B. Yahoo

C. Google

D. Net scape

Answer» A. i-village

-
314. A portal that helps to establish relations and to conduct transactions between various organizations is termed

A. B2B portals

B. C2C portals

C. both of these

D. none of these

Answer» A. B2B portals

315. A …………………….is a software that scours the internet collecting data about every website and every webpage

A. spiders

B. Search Engines

C. robots

D. none of these

Answer» B. Search Engines

316. Search Engines databases are selected and built by computer robot programs called………………………

A. spiders

B. Search Engines

C. robots

D. none of these

Answer» A. spiders

317. Which among the following is not an example for Search engine ?

A. Google

B. MSN

C. Alta vista

D. none of these

Answer» D. none of these

-
318. Web pages are prepared using their language as…………………

A. html

B. FTP

C. HTTP

D. None of these

Answer» A. html

319. A web page is transferred to users computer through ……………………..

A. html

B. FTP

C. HTTP

D. None of these

Answer» C. HTTP

320. The user reaches this page when they specify the address of a website

A. Home page

B. Web page

C. Summary page

D. None of these

Answer» A. Home page

321. The purpose of ………………page is to provide links to other pages

A. Home page

B. Web page

C. Summary page

D. None of these

Answer» A. Home page

-
322. ……………is an example for a software that visits suggested pages and return the appropriate information to be

A. Robot

B. Spiders

C. Ants

D. All

Answer» D. All

323. ………………………………..ads appears as rectangular graphics near the top of the page

A. Banner ads

B. floating ads

C. interstitials

D. Unicast ads

Answer» A. Banner ads

324. ………………….ads take up the entire screen and are more powerful than banner ads.

A. Banner ads

B. floating ads

C. interstitials

D. Unicast ads

Answer» B. floating ads

325. ………………………….is a form of advertisement on the web that appears between web pages that the user reque

A. Banner ads

B. floating ads

C. interstitials

D. Unicast ads

Answer» C. interstitials

-
326. ……………………is basically a TV commercial that runs in the browser window.

A. Banner ads

B. floating ads

C. interstitials

D. Unicast ads

Answer» D. Unicast ads

327. Advertisements take the form of a website copy are called…………………………

A. Advertorials

B. pop-up ads

C. Spam e-mail

D. none of these

Answer» A. Advertorials

328. ………………..is the most unwanted of online advertising methods.

A. Advertorials

B. pop-up ads

C. Spam e-mail

D. none of these

Answer» B. pop-up ads

329. …………………..is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorials

B. pop-up ads

C. Spam e-mail

D. none of these

Answer» C. Spam e-mail

-
330. …………………..is the buying and selling of goods and services through wireless handled devices such as cellular

A. Mobile Commerce

B. e-commerce

C. both of these

D. none of these

Answer» A. Mobile Commerce

331. …………………is a class of advertising methods which are considered unethical and may even be illegal

A. Advertorials

B. pop-up ads

C. Spam e-mail

D. malware

Answer» D. malware

332. ……………….is the most common way for purchasing an online advertising

A. CPM

B. CPC

C. Any of these

D. none of these

Answer» C. Any of these

333. ………………are animated full screen ads placed at the entry of a site before a user reaches the intended conten

A. Intromercials

B. pop-up ads

C. Spam e-mail

D. malware

Answer» A. Intromercials

-
334. ………………….are interactive online ads that require the user to respond intermittently in order to wade throug
intended content.

A. Ultramercials

B. pop-up ads

C. Spam e-mail

D. malware

Answer» A. Ultramercials

335. ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and o
computer mediated networks with the help of an electronic device.

A. Mobile Commerce

B. e-commerce

C. both of these

D. none of these

Answer» A. Mobile Commerce

336. …………….provide security and privacy for the use of the web page content

A. HTTP

B. html

C. FTP

D. none of these

Answer» A. HTTP

337. …………………….website is one that changes or customizes itself frequently and automatically based on certain

A. Dynamic website

B. (Static Website

C. phish site

D. none of these

Answer» A. Dynamic website

-
338. ………………site is created to fraudulently acquire sensitive information such as pass words and credit card deta
person or business.

A. Dynamic website

B. (Static Website

C. phish site

D. none of these

Answer» C. phish site

339. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issu

A. customer

B. issuer

C. Merchant

D. Acquirer

Answer» A. customer

340. ……………….is a financial institution that establishes an account with a merchant and processes payment card a

A. customer

B. issuer

C. Merchant

D. Acquirer

Answer» D. Acquirer

341. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre de

A. Prepaid

B. Post paid

C. both of these

D. none of these

Answer» A. Prepaid

-
342. ………………type of payment system is highly useful to those customers who would like to control overspending

A. Prepaid

B. Post paid

C. both of these

D. none of these

Answer» A. Prepaid

343. ……………………….credit card gives all the advantages of a normal credit card without worrying about the intere

A. Prepaid

B. Post paid

C. both of these

D. none of these

Answer» A. Prepaid

344. ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the r

A. Cash advance

B. Revolver

C. Tele draft

D. None of these

Answer» B. Revolver

345. ………………….is a financial instrument which can be used more than once to borrow money or buy products an

A. Credit card

B. E-Cheques

C. E-cash

D. none of these

Answer» A. Credit card

-
346. To accept a credit card for payment, we have to open a …………………account with our bank

A. Savings Bank

B. Current account

C. Merchant account

D. any of these

Answer» C. Merchant account

347. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the me

A. Debit Card

B. Electronic purse

C. credit card

D. any of these

Answer» A. Debit Card

348. ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending m

A. Debit Card

B. Electronic purse

C. credit card

D. any of these

Answer» B. Electronic purse

349. ………………is basically a secure gate between our organization data and internet.

A. Network firewall

B. Antivirus

C. both of these

D. none of these

Answer» A. Network firewall

-
350. ……………………encrypts payment card transaction data and verifies that both parties in the transaction are gen

A. SSL

B. SET

C. both of these

D. none of these

Answer» B. SET

351. ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic

A. Biometrics

B. PIN

C. both of these

D. none of these

Answer» A. Biometrics

352. In Biometrics,…………………………ID system is designed to prevent more than one person from using a single ide

A. Positive ID system

B. Negative ID system

C. both of these

D. none of these

Answer» A. Positive ID system

353. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identit

A. Positive ID system

B. Negative ID system

C. both of these

D. none of these

Answer» B. Negative ID system

-
354. …………………..are program developed by some dishonest people to destroy the computer system and the valua

A. Network firewall

B. computer virus

C. both of these

D. none of these

Answer» B. computer virus

355. Which among the following is not an example for computer virus ?

A. Chernobyl

B. Melissa

C. I Love You

D. None of these

Answer» D. None of these

356. ……………………are special type of software meant for limiting the risks of being hit by computer viruses

A. Network firewall

B. Antivirus

C. both of these

D. none of these

Answer» B. Antivirus

357. A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or

A. Hacker

B. spoofer

C. operator

D. none of these

Answer» A. Hacker

-
358. ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the

A. Network firewall

B. Antivirus

C. both of these

D. none of these

Answer» A. Network firewall

359. …………..Prevents unauthorized communication into and out of the network, allowing the organization to enfo
network and the internet.

A. Network firewall

B. Antivirus

C. both of these

D. none of these

Answer» A. Network firewall

360. SET means …………………………….

A. Standard Electronic Technology

B. Standard Electronic Transfer

C. Secure Electronic Transaction

D. None of these

Answer» C. Secure Electronic Transaction

361. The verification of credit card is done by using…………….. with a communications link to the merchants acquiri

A. Credit card payment terminal

B. Point of Sale

C. All of these

D. none of these

Answer» C. All of these

-
362. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is

A. Spoofing

B. Snooping

C. Sniffing

D. None of these

Answer» A. Spoofing

363. Gain entry into the user’s system and scan your file system for personal information is known as……………….

A. Spoofing

B. Snooping

C. Sniffing

D. None of these

Answer» B. Snooping

364. ………………attacks are difficult and are only successful if the attacker knows something about the shopper

A. Spoofing

B. Snooping

C. Sniffing

D. Guessing passwords

Answer» D. Guessing passwords

365. …………………is the process of making information unintelligible to the unauthorized user.

A. Spoofing

B. Snooping

C. Sniffing

D. Cryptography

Answer» D. Cryptography

-
366. ………………….is the reverse process of encryption, to make the information readable once again

A. Spoofing

B. Decryption

C. Sniffing

D. Cryptography

Answer» B. Decryption

367. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary si

A. cyber signature

B. Digital signature

C. SSL

D. none of these

Answer» B. Digital signature

368. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables s

A. Digital signature

B. Digital certificates

C. SSL

D. none of these

Answer» B. Digital certificates

369. The information Technology Act [IT ACT] came into effect on

A. 16th November 2000

B. 15th December 2000

C. 17th October 2000

D. none of these

Answer» C. 17th October 2000

-
370. Information sent over the Internet commonly uses the set of rules called………………………..

A. TCP/IP

B. FTP

C. HTTP

D. gopher

Answer» A. TCP/IP

371. E-mail which contain useless material is termed as………………………

A. Spam

B. useless mail

C. trunk mail

D. Junk mail

Answer» D. Junk mail

372. India has enacted the first IT Act in the year……………………………………

A. 2001

B. 2002

C. 2009

D. 2000

Answer» D. 2000

373. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. Cyber terrorism

B. Child pornography

C. Video voyeurism

D. None of these

Answer» D. None of these

-
374. Trade mark, copyright, patent law etc comes under the purview of……………………

A. Data protection

B. Telecommunication laws

C. Intellectual property laws

D. None

Answer» C. Intellectual property laws

375. ……………….is a programme designed o replicate and spread generally with the victim being oblivious to its exi

A. hacker

B. software

C. Computer virus

D. none of these

Answer» C. Computer virus

376. Which one of the following is not a principle of e-commerce ?

A. privacy

B. integrity

C. authentication

D. none of these

Answer» D. none of these

377. Which of the below is/are goals of E-Commerce?

A. 24×7

B. reach out to larger audience

C. time saving

D. all of the above

Answer» D. all of the above

-
378. In which one of the following type of E-Commerce, consumer sells to consumer directly?

A. C2B

B. B2C

C. B2B

D. C2C

Answer» D. C2C

379. ................ is the electronic transmission of business transaction documents directly between the computers o
format

A. Encapsulation

B. EDI

C. ERP

D. Transaction processing

Answer» B. EDI

380. What does EDI stand for?

A. Electronic Data Interface

B. E-Commerce Data Interface

C. Electronic Data Interaction

D. Electronic Data Interchange

Answer» D. Electronic Data Interchange

381. When a company buys some raw material from some other company, then it will come under:

A. B2B

B. B2C

C. C2B

D. C2C

Answer» A. B2B

-
382. In traditional commerce, people buy goods and services :

A. over the internet

B. physical visit

C. Both online & offline

D. None of the mentioned

Answer» B. physical visit

383. Promotion of products in e-commerce can be done by

A. Social media

B. Online Ads

C. Blog

D. All of the mentioned

Answer» D. All of the mentioned

384. Which of the following is not a dimension of e- commerce security provided by encryption ?

A. availability

B. integrity

C. non-repudiation

D. confidentiality

Answer» A. availability

385. Conversion of Plain text to Cipher Text is called………………

A. Encryption

B. Decryption

C. Cryptography

D. none of these

Answer» A. Encryption

-
386. In Porter's Five Forces, the 'threat of new entrants' relates to:

A. Barriers to entry

B. Substitutes

C. Switching costs

D. Buyer power

Answer» A. Barriers to entry

387. Which of the following is true for supply chain management?

A. The physical material moves in the direction

B. Flow of cash backwards through the chain

C. Exchange of information moves in both the

D. All of the above

Answer» D. All of the above

388. Logistics is the part of a supply chain involved with the forward and reverse flow of

A. goods

B. services

C. cash

D. All of the above

Answer» D. All of the above

389. BPM is about:

A. Aligning business processes to organisational

B. Maintaining a process view of the organisation rather than a functional

C. Establishing and maintaining an environment of continuous

D. All of the above

Answer» D. All of the above

-
390. CRM is :

A. Customer Relationship

B. Customer Relationship

C. Customer Recovery

D. Consumer Relation

Answer» A. Customer Relationship

391. The best products to sell in B2C e-commerce are:

A. Small Products

B. Digital Products

C. Special Products

D. Fresh Products

Answer» B. Digital Products

392. Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption

B. decryption

C. firewall

D. All of the mentioned

Answer» D. All of the mentioned

393. Which type of products is lesser purchased using e- commerce?

A. automobiles

B. books

C. groceries

D. None of the mentioned

Answer» A. automobiles

-
394. Which is not the application area of e-commerce?

A. E-Learning

B. E-Banking

C. E-Auction

D. None of the mentioned

Answer» D. None of the mentioned

395. In which year the IT Act was introduced?

A. 2000

B. 2020

C. 2001

D. 2010

Answer» A. 2000

396. is an early form of E-Commerce.

A. SCM

B. EDI

C. Both SCM & EDI

D. None of the mentioned

Answer» B. EDI

397. Which of the following is not related to security mechanism?

A. encryption

B. decryption

C. e-cash

D. All of the mentioned

Answer» C. e-cash

-
398. Digital Products are best suited for B2C e-commerce because they:

A. Are commodity like products

B. Can be mass- customized and

C. Can be delivered at the time of

D. All of the mentioned

Answer» D. All of the mentioned

399. Which of the following is part of the four main types of e-commerce?

A. B2B

B. B2C

C. C2B

D. All of the mentioned

Answer» D. All of the mentioned

400. The dimension of E-Commerce that enables commerce across the boundaries is called

A. interactivity

B. global reach

C. richness

D. ubiquity

Answer» B. global reach

401. Reverse logistics is required because

A. Goods are defective

B. Goods are unsold

C. The customers simply change

D. All of the above

Answer» D. All of the above

-
402. The purpose of supply chain management is

A. provide customer

B. improve quality of a product

C. integrating supply and demand

D. increase production

Answer» C. integrating supply and demand

403. Barriers to entry into an industry are likely to be high if:

A. Switching costs are low

B. Differentiation is low

C. Requirement for economies of

D. Access to distribution

Answer» C. Requirement for economies of

404. A digital signature is required …..


i) to tie an electronic message to the sender’s identity
ii) for non repudiation of communication by a sender

A. i and ii

B. i, ii and iii

C. i, ii, iii and iv

D. ii, iii and iv

Answer» B. i, ii and iii

405. Which of the following examines information passing through switches, hubs, or routers?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen captures

Answer» B. Packet sniffer

-
406. Which type of e-commerce focuses on consumers dealing with each other?

A. B2B

B. B2C

C. C2B

D. C2C

Answer» D. C2C

407. Which products are people most likely to be more uncomfortable buying on the Internet?

A. Books

B. Furniture

C. Movies

D. All of the above

Answer» B. Furniture

408. Which products are people most likely to be comfortable buying on the Internet?

A. Books

B. PCs

C. CDs

D. All of the above

Answer» D. All of the above

409. Digital products are best suited for B2C e-commerce because they:

A. Are commodity like products

B. Can be mass-customised and personalised

C. Can be delivered at the time of purchase

D. All of the above

Answer» D. All of the above

-
410. All of the following are techniques B2C e-commerce companies use to attract customers, except

A. Registering with search engines

B. Viral marketing

C. Online ads

D. Virtual marketing

Answer» D. Virtual marketing

411. E-commerce involves

A. marketing

B. advertising

C. warehousing

D. all of the above

Answer» D. all of the above

412. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to th

A. Affiliate programs

B. Click-through

C. Spam

D. All of the above

Answer» B. Click-through

413. What is the percentage of customers who visit a Web site and actually buy something called?

A. Affiliate programs

B. Click-through

C. Spam

D. Conversion rate

Answer» D. Conversion rate

-
414. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a ret

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer» A. Direct materials

415. What are materials that are necessary for running a modern corporation, but do not relate to the company’s

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer» B. Indirect materials

416. What is another name for materials which cannot be linked to a specific product or process?

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer» B. Indirect materials

417. What are plastic cards the size of a credit card that contains an embedded chip on which digital information c

A. Customer relationship management systems cards

B. E-government identity cards

C. FEDI cards

D. Smart cards

Answer» D. Smart cards

-
418. Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?

A. B2B

B. B2C

C. C2B

D. C2C

Answer» A. B2B

419. Which of the following are advantages normally associated with B2B ecommerce?

A. Shorter cycle times

B. Reduction in costs

C. Reaches wider audiences

D. all of the above

Answer» D. all of the above

420. If it is easy for competitors to enter the market, the threat of new entrants is considered:

A. High

B. Low

C. More

D. Less

Answer» A. High

421. An industry is less attractive for suppliers when the rivalry among existing competitors is:

A. High

B. Low

C. More

D. Less

Answer» A. High

-
422. Unique value auction mainly applies to?

A. New products

B. Second hand products

C. Engineering products

D. None of the above.

Answer» B. Second hand products

423. Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption

B. decryption

C. firewall

D. all the above

Answer» D. all the above

424. Which of the following statements accurately reflect the impact of technology?

A. Technology has caused buyer power to increase

B. Technology has lessened the entry barriers for many industries

C. Technology has increased the threat of substitute products and services

D. all of the above

Answer» D. all of the above

425. Which type of products is lesser purchased using e-commerce?

A. automobiles

B. books

C. softwares

D. none

Answer» A. automobiles

-
426. A business competing in a commodity like environment must focus on which of the following?

A. Price

B. Ease / speed of delivery

C. Ease of ordering

D. all of the above

Answer» D. all of the above

427. Which of the following refers to creating products tailored to individual customers?

A. customisation

B. aggregation

C. Direct materials

D. Reverse auction

Answer» A. customisation

428. Materials used in the normal operation of a business but not related to primary business operations are called

A. Supplies

B. Direct materials

C. Indirect materials

D. Daily stuff

Answer» C. Indirect materials

429. What is the name given to an interactive business providing a centralised market where many buyers and sup
commerce-related activities?

A. Direct marketplace

B. B2B

C. B2C

D. Electronic marketplace

Answer» D. Electronic marketplace

-
430. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO mate

A. horizontal

B. Vertical

C. Integrated

D. Inclined

Answer» A. horizontal

431. Which form of e-marketplace brings together buyers and sellers from the same industry?

A. horizontal

B. Vertical

C. Integrated

D. Inclined

Answer» B. Vertical

432. Which, if any, of the following types of ads are people most willing to tolerate?

A. pop-under ad

B. pop-up ad

C. banner ad

D. none of the above

Answer» D. none of the above

433. Which of the following is an Internet-based company that makes it easy for one person to pay another over th

A. electronic check

B. electronic bill presentment and payment

C. conversion rates

D. financial cybermediary

Answer» D. financial cybermediary

-
434. Which of the following is a method of transferring money from one persons account to another?

A. electronic check

B. credit card

C. e-transfer

D. none of the above

Answer» A. electronic check

435. An electronic check is one form of what?

A. e-commerce

B. online banking

C. e-cash

D. check

Answer» B. online banking

436. If you need to transfer money to another person via the internet, which of the following methods could you u

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer» D. all of the above

437. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted ove

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer» C. electronic bill presentment and payment

-
438. A combination of software and information designed to provide security and information for payment is calle

A. digital wallet

B. pop up ad

C. shopping cart

D. encryption

Answer» A. digital wallet

439. What is the name for direct computer-to-computer transfer of transaction information contained in standard

A. internet commerce

B. e-commerce

C. transaction information transfer

D. electronic data interchange

Answer» D. electronic data interchange

440. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt da
the _____ key, while the key used to decrypt data is called the _____n key.

A. encryption, decryption

B. private, public

C. encryption, public

D. public, private

Answer» D. public, private

441. When a transaction is processed online, how can the merchant verify the customers identity?

A. use secure sockets layers

B. use secure electronic transactions

C. use electronic data interchange

D. use financial electronic data interchange

Answer» B. use secure electronic transactions

-
442. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private infor

A. hacking

B. cracking

C. dumpster diving

D. spoofing

Answer» D. spoofing

443. What is an internal organisational Internet that is guarded against outside access by a special security feature
hardware, or a combination of the two)?

A. Client/server network

B. Intranet

C. Extranet

D. Thin client

Answer» B. Intranet

444. What is an intranet that is restricted to an organisation and certain outsiders, such as customers and suppliers

A. Client/server network

B. Intranet

C. Extranet

D. Thin client

Answer» C. Extranet

445. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster su

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer» A. Disaster recovery plan

-
446. What is a separate facility that does not have any computer equipment but is a place where the knowledge w

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer» C. Cold site

447. What is a separate and fully equipped facility where the company can move immediately after the disaster an

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer» B. Hot site

448. What charts (1) the cost to your organisation of the unavailability of information and technology and (2) the c
a disaster over time?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer» D. Disaster recovery cost curve

449. Which factor determines when the IT system will be available for knowledge workers to access?

A. Availability

B. Accessibility

C. Reliability

D. None of the above

Answer» A. Availability

-
450. Which factor determines who has the right to access different types of IT systems and information?

A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer» B. Accessibility

451. Which factor ensures the IT systems are functioning correctly and providing accurate information?

A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer» C. Reliability

452. Which factor represents how well your system can adapt to increased demands?

A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer» D. Scalability

453. Which factor represents a systems ability to change quickly?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer» A. Flexibility

-
454. What is a set of conditions used to measure how well a product or system functions?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer» D. Benchmark

455. What determines the future IT infrastructure requirements for new equipment and additional network capac

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer» C. Capacity planning

456. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

A. Workflow

B. EIP

C. Workflow system

D. SLA

Answer» A. Workflow

457. Which will not harm computer resources?

A. firewall

B. Virus

C. Trojan horse

D. None of the above

Answer» A. firewall

-
458. Which of the following is the primary characteristic of an intranet?

A. People outside the organisation can access it

B. People inside the organisation cant access it

C. People outside the organisation cant access it

D. None of the above

Answer» C. People outside the organisation cant access it

459. Which concept suggests that different applications and computer systems should be able to communicate wit

A. Integration

B. Web services

C. Scalability

D. Interoperability

Answer» D. Interoperability

460. Which service encompasses all technologies used to transmit and process information on an across a network

A. Interoperability

B. Scalability

C. Benchmarking

D. Web services

Answer» D. Web services

461. Which process can prevent data from losing due to computer problems or human errors?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer» A. backup

-
462. Which process is used to reinstall data from a copy when the original data has been lost?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer» B. recovery

463. Who breaks into other peoples computer systems and steals and destroys information?

A. Hackers

B. softwares

C. Hacktivists

D. Script kiddies

Answer» A. Hackers

464. What is software that comes hidden in free downloadable software and tracks your online movements, mine
or uses your computers CPU and storage for some task you know nothing about?

A. Web log

B. Clickstream

C. Anonymous Web browsing service

D. None of the above

Answer» D. None of the above

465. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail

A. Computer virus

B. Worm

C. Denial-of-service attack

D. None of the above

Answer» B. Worm

-
466. What floods a Web site with so many requests for service that it slows down or crashes?

A. Computer virus

B. Worm

C. Denial-of-service attack

D. None of the above

Answer» C. Denial-of-service attack

467. What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to th
assets?

A. Risk management

B. Risk assessment

C. Security

D. None of the above

Answer» A. Risk management

468. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses

A. Business to Business (B2B).

B. Consumer to Business (C2B).

C. Business to Consumer (B2C).

D. Consumer to Consumer (C2C).

Answer» B. Consumer to Business (C2B).

469. By electronic commerce we mean:

A. Commerce of electronic goods

B. Commerce which depends on electronics

C. Commerce which is based on the use of internet

D. None of the above

Answer» D. None of the above

-
470. E-commerce is

A. B2C

B. B2B

C. C2B

D. All the above

Answer» A. B2C

471. Advantages of e-commerce are

A. Low cost

B. Economical

C. Productivity gains

D. All the above

Answer» B. Economical

472. B2B2C is a model of

A. E-commerce

B. E-business

C. Data mining

D. None of the above

Answer» C. Data mining

473. Mobile commerce is same as

A. E-commerce

B. E-business

C. Data mining

D. None of the above

Answer» B. E-business

-
474. The types of Business to Business e-commerce are ................

A. Direct selling and support to Business

B. Industry portals

C. Information sites about a industry

D. All the above

Answer» D. All the above

475. Which of the following is not the example of business to consumer (B to C) e-commerce?

A. Amazon.com

B. e-bay.com

C. dell.com

D. lastminute.com

Answer» B. e-bay.com

476. Which driver promote E-commerce

A. Digital Convergence

B. 24/7 availability

C. Profit margins

D. None of the above

Answer» A. Digital Convergence

477. Advantage of e-com is

A. Lower cost

B. Economy

C. Higher margins

D. All of the above

Answer» A. Lower cost

-
478. Which model of e commerce deals with virtual auction?

A. Aggregator Model

B. Info-mediary model

C. Community Model

D. Brokerage Model

Answer» D. Brokerage Model

479. When you look at e-commerce and e-business, which is the most realistic relationship between these two con

A. E-commerce is broadly equivalent to e-business

B. E-commerce has some overlap with e-business

C. E-commerce is a subset of e-business

D. E-business is a subset of e-commerce

Answer» C. E-commerce is a subset of e-business

480. Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce
which category?

A. Portal, publisher or media sites

B. Brand-building sites

C. Transactional e-commerce sites

D. Services-orientated relationship-building websites

Answer» A. Portal, publisher or media sites

481. A summary of how a company will generate a profit identifying its core product, target customers, position in
revenue and costs is known as:

A. Value chain and marketplace positioning

B. Value proposition

C. Online business model

D. Revenue model and cost base

Answer» C. Online business model

-
482. While search engines index registered sites which users search by inputting key words, which type of intermed
text but can include video or audio delivered through RSS feeds?

A. Directory

B. Publisher site

C. Blog

D. Access portal

Answer» C. Blog

483. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome examples of?

A. Web servers

B. Web browsers

C. Web application servers

D. All of the above

Answer» B. Web browsers

484. A hardened firewall host on an Intranet is

A. a software which runs in any of the computers in the intranet

B. a software which runs on a special reserved computer on the intranet

C. a stripped-down computer connected to the intranet

D. a mainframe connected to the intranet to ensure security

Answer» B. a software which runs on a special reserved computer on the intranet

485. Advantages of B2C commerce are


(i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii) Shop can be open 24 hours a day seven days a week
(iv) Privacy of transaction always maintained

A. i and ii

B. ii and iii

C. i and iii
485. Advantages of B2C commerce are
(i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii) Shop can be open 24 hours a day seven days a week
(iv) Privacy of transaction always maintained

D. iii and iv

Answer» C. i and iii

486. Disadvantages of e-Commerce in India are


(i) internet access is not universally available
(ii) credit card payment security is not yet guaranteed
(iii) transactions are de-personalized and human contact is missing
(iv) cyberlaws are not in place

A. i and ii

B. ii and iii

C. i, ii, iii

D. i, ii, iii, iv

Answer» C. i, ii, iii

487. Most common uses of the Internet and the Web include communicating, shopping,

A. searching, entertainment, and education

B. e-commerce, e-mail, and searching

C. e-mail, entertainment, and education

D. e -commerce, e-mail, and education

Answer» A. searching, entertainment, and education

488. The __________ is the multimedia interface to resources available on the Internet.

A. Web

B. ISP

C. browser

D. URL

Answer» A. Web
-

489. The multimedia interface to the resources available on the Net is called the

A. World Wide Web

B. Internet

C. GUI interface

D. Server

Answer» A. World Wide Web

490. Rules for exchanging data between computers are called

A. programs

B. procedures

C. protocols

D. hyperlinks

Answer» C. protocols

491. Moving from one Web site to another is called

A. jumping

B. moving

C. surfing

D. applying

Answer» C. surfing

492. ____________ are networks that connect people within a company to each other and to the company networ

A. Internets

B. Intranets

C. Extranets

D. Components

Answer» B. Intranets

-
493. E-money is a ……………. medium for making payments

A. Digital

B. Electronic

C. Both (a) and (b)

D. None of the above

Answer» A. Digital

494. Acid testis a set of properties of money transfer that include

A. Atomicity and isolation

B. Consistency and durability

C. Both (a) and (b)

D. None of the above

Answer» C. Both (a) and (b)

495. In…………………., each transaction must be independent

A. Consistency

B. Isolation

C. Durability

D. None of the above

Answer» B. Isolation

496. In ICES test, C means

A. Consistency

B. Complexity

C. Conservation

D. None of the above

Answer» A. Consistency

-
497. Electronic payment is a financial transaction made …………. the use of paper documents

A. With

B. Without

C. Both (a) and (b)

D. None of the above

Answer» B. Without

498. Electronic payment media can be grouped into

A. Trusted third party type

B. Notational fund transfers related type

C. Authentication type

D. All the above

Answer» D. All the above

499. ………………is a type of EPS

A. Credit card

B. Debit card

C. Smart card

D. All the above

Answer» D. All the above

500. Smart card is same as…….

A. Credit card

B. Debit card

C. Both (a) and (b)

D. None of the above

Answer» C. Both (a) and (b)

501. Debit card is used for


500. Smart card is same as…….

A. On line transactions

B. Off line transaction

C. Both (a) and (b)

D. None of the above

Answer» C. Both (a) and (b)

502. ……………………. card is a card with a built-in chip capable of storing information in its memory

A. Debit

B. Credit

C. Smart

D. None of the above

Answer» C. Smart

503. Applications of smart card are:

A. Government

B. Identification

C. Health care

D. All the above

Answer» D. All the above

504. ……………………………is an application of smart card

A. ATM

B. Telecommunication

C. Transportation

D. None of the above

Answer» A. ATM

-
505. EFT is a computer based system

A. True

B. False

C. none

D. all

Answer» A. True

506. EFT is

A. Electronic Fund Transfer

B. Electrical fund transfer

C. Electronic fast transfer

D. None of the above

Answer» A. Electronic Fund Transfer

507. …………….cards and ………….cards are two ways to make payments on a web site

A. Debit and smart

B. Credit and debit

C. Credit and smart

D. None of the above

Answer» B. Credit and debit

508. ……………………….allows the transfer of money itself

A. Digital cash

B. Electronic money

C. Both (a) and (b)

D. None of the above

Answer» A. Digital cash

-
509. E-money has…………….types

A. 3

B. 4

C. 5

D. 6

Answer» A. 3

510. Paisapay is facilitated in………………

A. Amazon.com

B. eBay.co.in

C. Flipkart.com

D. None of the above

Answer» B. eBay.co.in

511. The way to hide digital information is through……

A. Cryptography

B. Digital certificate

C. Digital signature

D. None of the above

Answer» A. Cryptography

512. Main models of internet based payment system are:

A. Electronic currency

B. Credit card

C. Debit card

D. All the above

Answer» D. All the above

-
513. ……………………..card is a model of IPS

A. Smart

B. Debit

C. Credit

D. All the above

Answer» D. All the above

514. Payment systems via the internet include

A. Cyber cash

B. First virtual

C. Both (a) and (b)

D. None of the above

Answer» C. Both (a) and (b)

515. ………………………cards directly transfer funds from consumers bank account to the merchant’s

A. Debit

B. Credit

C. Both (a) and (b)

D. None of the above

Answer» A. Debit

516. Credit cards ……………. convenient for making small purchases

A. Are

B. Are not

C. Both (a) and (b)

D. None of the above

Answer» A. Are

-
517. ACH is

A. Acid consistency house

B. Automated clearing house

C. Automated consistency house

D. None of the above

Answer» B. Automated clearing house

518. Google.com is an example of a:

A. Destination site

B. Portal

C. Search engine

D. None of the above

Answer» C. Search engine

519. Currency used in e-business transactions around the world

A. Dollars

B. Rupees

C. None of the above

D. All the above

Answer» C. None of the above

520. ________ is an example of an auction site

A. e-bay

B. Ibibo

C. Facebook

D. Orkut

Answer» A. e-bay

-
521. What items are traded in e-business

A. Consumer durables

B. Pharmaceutical products

C. Industrial goods

D. All the above

Answer» D. All the above

522. Once segments have been identified, organizations need to define how best to position their online services r
main variables: product quality, service quality, and fulfillment time. Which variable is missing?

A. After sales service

B. Brand perception

C. Customer value

D. Price

Answer» D. Price

523. What could be an implication for an organization if an e-business strategy is not clearly defined?

A. Clear direction of e-business strategy

B. Effective integration of e-business at a technical level

C. Greater opportunities from evaluation of opportunities

D. None of the above are applicable

Answer» D. None of the above are applicable

524. Before developing any type of strategy, a management team needs to agree the process they will follow for g
strategy. A framework that gives a logical sequence to follow to ensure inclusion of all key activities of an ebu
known as:

A. An E-channel strategy

B. E- business stratification process

C. A strategy process model

D. Multi-channel e-business strategy

Answer» C. A strategy process model


-

525. The approach by which applications of internal and external electronic communications can support and influ

A. Corporate Strategy

B. E-channel strategy

C. E-business strategy

D. E-business responsibility

Answer» C. E-business strategy

526. A(n) __________ is a private corporate network that uses standard Internet protocols and interfaces.

A. ethernet

B. extranet

C. local area network

D. intranet

Answer» D. intranet

527. When measuring the effectiveness on an online advertisement, the __________ is the percentage of visitors t

A. click ratio

B. click rate

C. click-through rate

D. hit ratio

Answer» C. click-through rate

528. RACE is a practical framework to help marketers manage and improve the commercial value gained from digit
Act, C, Engage. What does 'C' refer to?

A. Collaborate

B. Collect

C. Consolidate

D. Convert

Answer» D. Convert
-

529. A strength of social media and viral marketing is:

A. Cannot be ignored in user's inbox

B. Considered credible

C. It is possible to reach a large number at relatively low cost

D. Highly targeted with controlled costs

Answer» C. It is possible to reach a large number at relatively low cost

530. In future, some suggest that the task of searching for suppliers and products may be taken over by computer
some degree of intelligence that replicates human neural functioning. These programmes are known as:

A. Spider search engines

B. HTML

C. E-marketplace search engines

D. Software intelligent agents

Answer» D. Software intelligent agents

531. Security is a serious concern for e-business managers and there are many potential risks concerning unauthor
One way this occurs is through misleading users through setting up a bogus website and gaining user details o

A. Denial of service

B. Phishing

C. Malware

D. Firewalling

Answer» B. Phishing

532. The fastest-growing application for the Internet is

A. going shopping

B. conducting research

C. playing games, reading, and listening to music

D. using e-mail
532. The fastest-growing application for the Internet is

Answer» A. going shopping

533. The most common method for gaining access to the Internet is through a __________.

A. dumb terminal

B. virtual provider or computer

C. point-to-point computer

D. provider or host computer

Answer» D. provider or host computer

534. The term ISP refers to

A. internal software protocol

B. international shareware pool

C. Internet service provider

D. interface standard protocol

Answer» C. Internet service provider

535. These types of commercial Internet service providers are the most widely used

A. national service providers

B. regional service providers

C. centralized service providers

D. decentralized service providers

Answer» A. national service providers

536. When surfing the Web, the browser interprets the HTML command found in a document file, and displays it a

A. Applet page

B. Java page

C. Web page

D. Domain page
536. When surfing the Web, the browser interprets the HTML command found in a document file, and displays it a

Answer» C. Web page

537. Which of the following are not required to send and receive e-mail?

A. e-mail account

B. Web page

C. access to the Internet

D. e-mail program

Answer» B. Web page

538. ______________ includes all electronics-based information exchanges within or between companies and cust

A. E-commerce

B. E-marketing

C. E-communication

D. E-business

Answer» D. E-business

539. The flip side of e-marketing is:

A. e-advertising

B. e-selling

C. e-commerce

D. e-purchasing

Answer» D. e-purchasing

540. Which of the following describes e-commerce?

A. Doing business electronically

B. Doing business

C. Sale of goods

D. All the above


540. Which of the following describes e-commerce?

Answer» A. Doing business electronically

541. Which segments do eBay, Amazon.com belong?

A. B2Bs

B. B2Cs

C. C2Bs

D. C2Cs

Answer» B. B2Cs

542. Which type of e-commerce focuses on consumers dealing with each other?

A. B2B

B. B2C

C. C2B

D. C2C

Answer» D. C2C

543. ”Google” is one of the most popular………………..

A. Portal

B. Browser

C. Search Engine

D. none of these

Answer» C. Search Engine

You might also like