E-Commerce & ERP MCQs with Answers
E-Commerce & ERP MCQs with Answers
Explanation: E-commerce refers to buying and selling of goods and services using the internet or
other electronic means.
Explanation: E-commerce allows consumers to shop from the comfort of their own homes, saving
them time and effort.
A. Business-to-business e-commerce
B. Business-to-consumer e-commerce
C. Consumer-to-consumer e-commerce
D. Government-to-consumer e-commerce
Answer: A. Business-to-business e-commerce.
Explanation: B2B e-commerce involves businesses selling products or services to other businesses.
A. Increased visibility
B. Reduced marketing costs
C. Limited access to customer data
D. Increased competition
Explanation: E-commerce allows small businesses to compete with larger businesses, but it also
increases competition from other small businesses.
8. What is a chargeback?
Explanation: A chargeback is a dispute initiated by the buyer with their bank, requesting a refund for
a transaction.
9. What is dropshipping?
Explanation: Dropshipping is a type of e-commerce where the seller doesn’t hold inventory and
instead fulfills orders by purchasing products from a third-party supplier.
Explanation: A fulfillment center is a physical location where products are stored and shipped to
customers after orders are placed online.
Explanation: A virtual storefront is an online store that does not have a physical location.
A. A list of products and their descriptions that can be used for advertising
B. A list of products that are out of stock
C. A list of products that are only available for a limited time
D. A list of products that are not available for purchase online
Answer: A. A list of products and their descriptions that can be used for advertising.
Explanation: A product feed is a list of products and their descriptions that can be used for
advertising on various platforms.
Explanation: A sales funnel is a series of steps that a customer takes to make a purchase, starting
from awareness of a product to the actual purchase.
Explanation: A landing page is a page where customers land after clicking on an advertisement,
designed to convert them into customers.
Answer: B. A type of advertising that targets customers who have already interacted with a brand.
Explanation: Retargeting is a type of advertising that targets customers who have already interacted
with a brand, such as by visiting their website or adding products to their cart.
Answer: C. A technique used to sell products that complement the customer’s original purchase.
Explanation: A cross-sell is a technique used to sell products that complement the customer’s
original purchase,
Explanation: A call-to-action (CTA) is a button or link that prompts a customer to take a specific
action, such as making a purchase or subscribing to a newsletter.
A. The page where a customer enters their shipping and billing information to complete a purchase
B. The page where a customer selects the products they want to purchase
C. The page where a customer can leave feedback about their experience
D. The page where a customer can view their order history
Answer: A. The page where a customer enters their shipping and billing information to complete a
purchase.
Explanation: A checkout page is the page where a customer enters their shipping and billing
information to complete a purchase.
A. A code that customers can enter at checkout to receive a discount on their purchase
B. A code used to track customer behavior on a website
C. A code used to identify a particular product in a product feed
D. A code used to encrypt customer data during checkout
Answer: A. A code that customers can enter at checkout to receive a discount on their purchase.
Explanation: A discount code is a code that customers can enter at checkout to receive a discount on
their purchase.
Explanation: A product category is a group of products that are similar in nature and purpose, such
as “electronics” or “apparel.”
Explanation: A product variation is a specific version of a product with different features or options,
such as different colors or sizes.
Answer: A. A customer’s written evaluation of their overall experience with an online store.
Explanation: A customer review is a customer’s written evaluation of their overall experience with an
online store, typically used to provide social proof and inform potential customers about the store’s
reputation.
28. What is an abandoned cart?
A. A shopping cart that a customer has filled with items but not completed the purchase
B. A type of customer service technique
C. A type of payment processor
D. A type of advertising campaign
Answer: A. A shopping cart that a customer has filled with items but not completed the purchase.
Explanation: An abandoned cart is a shopping cart that a customer has filled with items but not
completed the purchase, typically used as an opportunity to send a reminder or incentive to
complete the purchase.
A. A set of rules and procedures that outline how customers can return or exchange products
B. A list of products that are currently on sale
C. A type of customer service technique
D. A type of payment processor
Answer: A. A set of rules and procedures that outline how customers can return or exchange
products.
Explanation: A return policy is a set of rules and procedures that outline how customers can return
or exchange products, typically used to provide assurance and transparency for customers.
A. A set of rules and procedures that outline how products are shipped to customers
B. A list of products that are currently on sale
C. A type of customer service technique
D. A type of payment processor
Answer: A. A set of rules and procedures that outline how products are shipped to customers.
Explanation: A shipping policy is a set of rules and procedures that outline how products are shipped
to customers, typically used to provide transparency and expectation management for customers.
A. A model where the retailer does not keep inventory in stock, but instead transfers the order and
shipment details to a manufacturer or supplier who then ships the products directly to the customer.
B. A model where the retailer keeps large amounts of inventory in stock.
C. A model where the retailer sells products only to a specific target audience.
D. A model where the retailer sells products through a physical store only.
Answer: A. A model where the retailer does not keep inventory in stock, but instead transfers the
order and shipment details to a manufacturer or supplier who then ships the products directly to the
customer.
Explanation: In a dropshipping business model, the retailer does not keep inventory in stock, but
instead transfers the order and shipment details to a manufacturer or supplier who then ships the
products directly to the customer.
Explanation: The checkout process is the process by which a customer completes a purchase on an
e-commerce website, typically involving selecting products, entering payment and shipping
information, and submitting the order for processing.
A. A digital certificate that authenticates the identity of a website and encrypts data transmitted
between the website and its visitors
B. A type of payment processor
C. A type of advertising campaign
D. A type of customer service technique
Answer: A. A digital certificate that authenticates the identity of a website and encrypts data
transmitted between the website and its visitors.
Explanation: An SSL certificate is a digital certificate that authenticates the identity of a website and
encrypts data transmitted between the website and its visitors, typically used to ensure the security
and privacy of sensitive information transmitted online.
A. A model where customers pay a recurring fee to receive a product or service at regular intervals
B. A model where customers pay a one-time fee to receive a product or service
C. A model where customers can choose to pay what they want for a product or service
D. A model where customers receive a product or service for free
Answer: A. A model where customers pay a recurring fee to receive a product or service at regular
intervals.
Explanation: In a subscription model, customers pay a recurring fee to receive a product or service at
regular intervals, typically monthly or annually.
Explanation: A fraud detection system is an e-commerce system designed to detect and prevent
fraudulent transactions, typically using algorithms and other techniques to analyze transaction data
and identify suspicious behavior.
A. A strategy where a company promotes additional products or services to customers who have
already purchased something
B. A strategy where a company promotes its products or services through a network of affiliates
C. A type of customer service technique
D. A type of payment processor
Answer: A. A strategy where a company promotes additional products or services to customers who
have already purchased something.
A. A strategy where a company sells multiple products or services together as a single package
B. A strategy where a company promotes its products or services through a network of affiliates
C. A type of customer service technique
D. A type of payment processor
Answer: A. A strategy where a company sells multiple products or services together as a single
package.
Explanation: A bundling strategy is a strategy where a company sells multiple products or services
together as a single package, typically used to increase sales and offer customers greater value.
A. A statement or button that encourages a website visitor to take a specific action, such as making a
purchase or signing up for a newsletter
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign
Answer: A. A statement or button that encourages a website visitor to take a specific action, such as
making a purchase or signing up for a newsletter.
Explanation: A call to action is a statement or button that encourages a website visitor to take a
specific action, such as making a purchase or signing up for a newsletter, typically used to improve
conversion rates.
A. A method of testing two different versions of a website or marketing campaign to see which
performs better
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign
Answer: A. A method of testing two different versions of a website or marketing campaign to see
which performs better.
Explanation: A/B testing is a method of testing two different versions of a website or marketing
campaign to see which performs better, typically used to improve conversion rates and optimize
marketing efforts.
A. The percentage of website visitors who leave a site without taking any action
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign
Answer: A. The percentage of website visitors who leave a site without taking any action.
Explanation: A bounce rate is the percentage of website visitors who leave a site without taking any
action, typically used as a measure of website effectiveness and user engagement.
A. The percentage of website visitors who take a specific action, such as making a purchase or filling
out a form
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign
Answer: A. The percentage of website visitors who take a specific action, such as making a purchase
or filling out a form.
Explanation: A conversion rate is the percentage of website visitors who take a specific action, such
as making a purchase or filling out a form, typically used to measure the effectiveness of marketing
campaigns and website optimization efforts.
Explanation: PCI compliance refers to a set of security standards for credit card transactions, typically
required by payment processors and credit card companies to protect customer payment
information.
A. A label affixed to a package that includes shipping information such as the recipient’s address and
tracking number
B. A type of payment processor
C. A type of customer service technique
D. A type of advertising campaign
Answer: A. A label affixed to a package that includes shipping information such as the recipient’s
address and tracking number.
Explanation: A shipping label is a label affixed to a package that includes shipping information such
as the recipient’s address and tracking number, typically used to facilitate the shipping and delivery
process.
B. doing business
C. sale of goods
-
2. Which of the following is part of the four main types for e-commerce?
A. b2b
B. b2c
C. c2b
A. b2bs
B. b2cs
C. c2bs
D. c2cs
Answer» B. b2cs
A. b2b
B. b2c
C. c2b
D. c2c
Answer» D. c2c
A. b2b
B. c2b
C. c2c
-
6. Which type deals with auction?
A. b2b
B. b2c
C. c2b
D. c2c
Answer» D. c2c
A. ebay.com
B. amazon.com
C. yepme.com
D. none of these
Answer» A. ebay.com
A. small products
B. digital products
C. specialty products
D. fresh products
9. Which products are people most likely to be more uncomfortable buying on the Internet?
A. books
B. furniture
C. movies
Answer» B. furniture
-
10. Which products are people most likely to be comfortable buying on the Internet?
A. books
B. pcs
C. cds
11. Digital products are best suited for B2C e-commerce because they:
A. edi
B. erp
C. scm
Answer» B. erp
13. All of the following are techniques B2C e-commerce companies use to attract customers, except:
B. viral marketing
C. online ads
D. virtual marketing
-
14. Which is a function of E-commerce
A. marketing
B. advertising
C. warehousing
A. marketing
B. advertising
C. warehousing
- (4)
16. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to th
A. affiliate programs
B. click-through
C. spam
Answer» B. click-through
17. What is the percentage of customers who visit a Web site and actually buy something called?
A. affiliate programs
B. click-through
C. spam
D. conversion rate
-
18. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a ret
A. direct materials
B. indirect materials
C. edi
19. What are materials that are necessary for running a modern corporation, but do not relate to the company's p
A. direct materials
B. indirect materials
C. edi
A. direct materials
B. indirect materials
C. edi
21. What is another name for materials which cannot be linked to a specific product or process?
A. Direct materials
B. Indirect materials
C. EDI
-
22. What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compe
successively lower bids until there is only one seller left?
A. b2b marketplace
B. intranet
C. reverse auction
D. internet
23. What are plastic cards the size of a credit card that contains an embedded chip on which digital information c
C. fedi cards
D. smart cards
A. b2b
B. b2c
C. c2b
D. c2c
Answer» B. b2c
25. Which form of e-commerce currently accounts for about 97% of all e-commerce revenues?
A. b2b
B. b2c
C. c2b
D. c2c
Answer» A. b2b
-
26. Which of the following are advantages normally associated with B2B e-commerce?
B. reduction in costs
29. If it is easy for competitors to enter the market, the threat of new entrants is considered:
A. high
B. low
C. more
D. less
Answer» A. high
-
30. An industry is less attractive for suppliers when the rivalry among existing competitors is:
A. high
B. low
C. more
D. less
Answer» A. high
A. new products
C. engineering products
A. ebay.co.in
B. amazon.com
C. flipkart.com
Answer» A. ebay.co.in
33. Which of the following is a useful security mechanism when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
-
34. Which of the following is not related to security mechanism
A. encryption
B. decryption
C. e-cash
Answer» C. e-cash
35. A product or service that customers have come to expect from an industry, which must be offered by new ent
is known as a(n)?
A. switching costs
B. loyalty programs
C. entry barriers
D. affiliate programs
36. Which of the following statements accurately reflect the impact of technology?
37. A business cannot be all things to all people. Instead, a business must:
-
38. How the transactions occur in e-commerce?
A. using e-medias
A. automobiles
B. books
C. softwares
D. none
Answer» A. automobiles
40. A business competing in a commodity like environment must focus on which of the following?
A. price
C. ease of ordering
41. Which of the following refers to creating products tailored to individual customers?
A. customization
B. aggregation
C. direct materials
D. reverse auction
Answer» A. customization
-
42. Materials used in the normal operation of a business but not related to primary business operations are called
A. supplies
B. direct materials
C. indirect materials
D. daily stuff
A. banner ads
B. pop-up ads
C. affiliate programs
D. viral marketing
44. What is the name given to an interactive business providing a centralized market where many buyers and sup
commerce-related activities?
A. direct marketplace
B. b2b
C. b2c
D. electronic marketplace
- (1)
45. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO mate
A. horizontal
B. vertical
C. integrated
D. inclined
Answer» A. horizontal
-
46. Which form of e-marketplace brings together buyers and sellers from the same industry?
A. horizontal
B. vertical
C. integrated
D. inclined
Answer» B. vertical
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Answer» C. banner ad
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Answer» B. pop-up ad
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Answer» A. pop-under ad
-
50. Which, if any, of the following types of ads are people most willing to tolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
51. Which of the following is an Internet-based company that makes it easy for one person to pay another over th
A. electronic check
C. conversion rates
D. financial cybermediary
52. Which of the following is a method of transferring money from one person's account to another?
A. electronic check
B. credit card
C. e-transfer
53. If you need to transfer money to another person via the internet, which of the following methods could you u
A. financial cybermediary
B. electronic check
-
54. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted ove
A. financial cybermediary
B. electronic check
55. A combination of software and information designed to provide security and information for payment is calle
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
56. What is the name for direct computer-to-computer transfer of transaction information contained in standard
A. internet commerce
B. e-commerce
A. e-commerce
D. electronic checks
-
58. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt da
the _____ key, while the key used to decrypt data is called the _____ key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
B. encrypts information
60. When a transaction is processed online, how can the merchant verify the customer's identity?
61. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private infor
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer» D. spoofing
-
62. What is a model of a proposed product, service, or system?
A. prototyping
B. prototype
C. proof-of-concept prototype
D. selling prototype
Answer» B. prototype
63. What is an internal organizational Internet that is guarded against outside access by a special security feature
hardware, or a combination of the two)?
A. client/server network
B. intranet
C. extranet
D. thin client
Answer» B. intranet
64. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers
A. client/server network
B. intranet
C. extranet
D. thin client
Answer» C. extranet
65. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster su
B. hot site
C. cold site
-
66. What is a separate facility that does not have any computer equipment but is a place where the knowledge w
B. hot site
C. cold site
67. What is a separate and fully equipped facility where the company can move immediately after the disaster an
B. hot site
C. cold site
68. Which factor determines who has the right to access different types of IT systems and information?
A. availability
B. accessibility
C. reliability
D. scalability
Answer» B. accessibility
69. Which factor ensures your IT systems are functioning correctly and providing accurate information?
A. availability
B. accessibility
C. reliability
D. scalability
Answer» C. reliability
-
70. Which factor represents how well your system can adapt to increased demands?
A. availability
B. accessibility
C. reliability
D. scalability
Answer» D. scalability
A. flexibility
B. performance
C. capacity planning
D. benchmark
Answer» A. flexibility
72. What is a set of conditions used to measure how well a product or system functions?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Answer» D. benchmark
73. What determines the future IT infrastructure requirements for new equipment and additional network capac
A. flexibility
B. performance
C. capacity planning
D. benchmark
-
74. What automates business processes?
A. workflow
B. asp
C. workflow system
D. eip
75. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
A. workflow
B. eip
C. workflow system
D. sla
Answer» A. workflow
A. firewall
B. virus
C. trojan horse
Answer» A. firewall
-
78. Which is not a function of ERP?
A. warehousing
B. sales
C. scheduling
A. warehousing
B. sales
C. scheduling
81. Which concept suggests that different applications and computer systems should be able to communicate wit
A. integration
B. web services
C. scalability
D. interoperability
Answer» D. interoperability
-
82. Which process can prevent data from lose due to computer problems or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» A. backup
83. Which process is used to reinstall data from a copy when the original data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» B. recovery
84. What describes a process of continuously measuring results and comparing those results to optimal performa
improved?
A. performance
B. capacity planning
C. benchmarking
D. data cleansing
Answer» C. benchmarking
A. firewall
B. edi
C. erp
D. script kiddies
Answer» A. firewall
-
86. Who breaks into other people's computer systems and steals and destroys information?
A. hackers
B. softwares
C. hacktivists
D. script kiddies
Answer» A. hackers
87. What is software that comes hidden in free downloadable software and tracks your online movements, mines
or uses your computer's CPU and storage for some task you know nothing about?
A. web log
B. clickstream
A. legacy systems
B. bolt on applications
C. operational database
D. cybersoft
Answer» D. cybersoft
-
90. Which is not a function of ERP?
B. financial
C. warehousing
91. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail
A. computer virus
B. worm
C. denial-of-service attack
Answer» B. worm
92. What floods a Web site with so many requests for service that it slows down or crashes?
A. computer virus
B. worm
C. denial-of-service attack
93. What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU
A. computer virus
B. worm
C. denial-of-service attack
-
94. What consists of the identification of risks or threats, the implementation of security measures, and the moni
A. risk management
B. risk assessment
C. security
95. What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to th
assets?
A. risk management
B. risk assessment
C. security
96. What is the process of making a copy of the information stored on a computer?
A. backup
B. anti-virus
C. firewall
D. biometrics
Answer» A. backup
A. b2g
B. b2e
C. b2b
D. p2p
Answer» B. b2e
-
98. ……………….is an early form of E-commerce
A. scm
B. edi
C. both of these
D. none of these
Answer» B. edi
99. ………………..is concerned with the buying and selling information, products and services over computer comm
A. commerce
B. e-commerce
C. e-business
D. none of these
Answer» B. e-commerce
A. books
B. vegetables
C. all of these
D. none of these
Answer» A. books
101. ……………allows a business application on the computer of one organization to communicate directly with the
another company.
A. edi
B. protocols
C. standards
D. business applications
Answer» A. edi
-
102. Electronic Exchange of business documents in a standard format is known as ………………
A. e-commerce
B. e-business
C. edi
D. none of these
Answer» C. edi
A. suppliers
B. manufacturers
C. distributors
D. customers
Answer» C. distributors
104. ………………is a commercial process that includes production, distribution, sales or delivery of goods and servic
A. e-commerce
B. scm
C. edi
D. none of these
Answer» A. e-commerce
105. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in t
A. process based
C. transaction based
D. any of these
-
106. …………………is basically a concept of online marketing and distributing of products and services over the intern
A. b2g
B. b2e
C. b2c
D. b2b
Answer» C. b2c
107. ……………………..e-commerce consists of the sale of products or services from a business to the general public
A. b2g
B. b2e
C. b2b
D. b2c
Answer» D. b2c
A. clothes
B. flowers
C. airline reservation
D. none
Answer» D. none
A. b2g
B. b2c
C. b2b
D. b2e
Answer» B. b2c
-
110. ………………….e-commerce involves customers gathering information, purchasing and receiving products over a
A. b2g
B. b2e
C. b2b
D. b2c
Answer» D. b2c
A. manufacturers
B. distributors
C. publishers
D. none
Answer» D. none
112. ………………….e-commerce involves the electronic facilitation of transaction between customers through some
A. c2c
B. b2e
C. b2b
D. b2g
Answer» A. c2c
-
114. ……………………..streamlines the flow of information and self service capabilities through automation
A. scc
B. crm
C. crp
D. scm
Answer» A. scc
115. …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.
A. html
B. http
C. bothe of these
D. none of these
Answer» B. http
116. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.
A. internet
B. www
C. intranet
D. none of these
Answer» B. www
117. ………refers to a kind of e-commerce which refers to a company selling or buying from other company
A. b2g
B. b2e
C. b2b
D. p2p
Answer» C. b2b
-
118. A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an
A. b2g
B. b2e
C. b2b
D. p2p
Answer» C. b2b
119. …………..sites act as an intermediary between someone wanting a product or service and potential providers
A. brokering sites
B. information sites
C. industry portals
D. none of these
120. A……………portal is a specialized entry point to a specific market place or industry niche.
A. vertical portal
B. horizontal portal
C. both of these
D. none of these
A. i-village
B. yahoo
C. google
D. net scape
Answer» A. i-village
-
122. 4. A portal that helps to establish relations and to conduct transactions between various organizations is term
A. b2b portals
B. c2c portals
C. both of these
D. none of these
123. A …………………….is a software that scours the internet collecting data about every website and every webpage
A. spiders
B. search engines
C. robots
D. none of these
124. Which among the following is not an example for Search engine ?
A. google
B. msn
C. alta vista
D. none of these
A. html
B. ftp
C. http
D. none of these
Answer» A. html
-
126. A web page is transferred to users computer through ……………………..
A. html
B. ftp
C. http
D. none of these
Answer» C. http
127. The user reaches this page when they specify the address of a website
A. home page
B. web page
C. summary page
D. none of these
128. ……………………..streamlines the flow of information and self service capabilities through automation
A. scc
B. crm
C. crp
D. scm
Answer» A. scc
129. ………………is a global web in which millions of users are communicating with each other with the help of comp
A. internet
B. www
C. both of these
D. none of these
Answer» A. internet
-
130. …………………….is an online auctioning site that facilitates the trade of privately owned items between individu
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Answer» A. e-bay
A. c2c
B. b2e
C. b2b
D. b2c
Answer» A. c2c
132. This is a protocol which allows files to be transferred from one computer to another computer
A. tcp/ip
B. ftp
C. http
D. none of these
Answer» B. ftp
133. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html
A. web page
B. home page
C. domain
D. none of these
-
134. ………………….is the first page of a web site.
A. web page
B. home page
C. domain
D. none of these
135. …………………….is an online auctioning site that facilitates the trade of privately owned items between individu
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Answer» A. e-bay
136. ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending m
A. debit card
B. credit card
C. electronic purse
D. any of these
137. ……………………encrypts payment card transaction data and verifies that both parties in the transaction are gen
A. ssl
B. set
C. both of these
D. none of these
Answer» B. set
-
138. SET means ………………
D. none of these
139. The verification of credit card is done by using…………….. with a communications link to the merchants acquiri
B. point of sale
C. all of these
D. none of these
140. ……………….is a financial institution that establishes an account with a merchant and processes payment card a
A. customer
B. issuer
C. merchant
D. acquirer
Answer» D. acquirer
141. ………………type of payment system is highly useful to those customers who would like to control overspending
A. prepaid
B. post paid
C. both of these
D. none of these
Answer» A. prepaid
-
142. ……………………….credit card gives all the advantages of a normal credit card without worrying about the intere
A. prepaid
B. post paid
C. both of these
D. none of these
Answer» A. prepaid
143. ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the r
A. cash advance
B. revolver
C. tele draft
D. none of these
Answer» B. revolver
144. ………………….is a financial instrument which can be used more than once to borrow money or buy products an
A. credit card
B. e-cheques
C. e-cash
D. none of these
145. To accept a credit card for payment, we have to open a …………………account with our bank
A. savings bank
B. current account
C. merchant account
D. any of these
-
146. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the me
A. debit card
B. electronic purse
C. credit card
D. any of these
147. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables s
A. digital signature
B. digital certificates
C. ssl
D. none of these
148. The information Technology Act [IT ACT] came into effect on
D. none of these
149. Information sent over the Internet commonly uses the set of rules called……………………
A. tcp/ip
B. ftp
C. http
D. gopher
Answer» A. tcp/ip
-
150. ……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Answer» A. hacker
A. spam
B. useless mail
C. trunk mail
D. junk mail
A. 2001
B. 2002
C. 2009
D. 2000
Answer» D. 2000
153. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these
-
154. Trade mark, copyright, patent law etc comes under the purview of……………………
A. data protection
B. telecommunication laws
D. none
A. privacy
B. integrity
C. authentication
D. none of these
156. ………………is basically a secure gate between our organization data and internet.
A. network firewall
B. antivirus
C. both of these
D. none of these
157. ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic
A. biometrics
B. pin
C. both of these
D. none of these
Answer» A. biometrics
-
158. ……………….is a financial institution that establishes an account with a merchant and processes payment card a
A. customer
B. issuer
C. merchant
D. acquirer
Answer» D. acquirer
159. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre de
A. prepaid
B. post paid
C. both of these
D. none of these
Answer» A. prepaid
160. .……………….is the exchange of goods or items or commodities and services or applications used for money and
A. e-commerce
B. commerce
C. both of these
D. none
Answer» B. commerce
A. e--commerce
B. e-business
C. edi
D. none of these
Answer» B. e-business
-
162. Which among the following is not an example for E-commerce
A. amazon.com
B. baazar.com
C. e-trade.com
D. none of these
Answer» C. e-trade.com
A. baazar.com
C. e-trade.com
D. none of these
164. …………….is a form of supply chain where a series of assembly operations are carried out to obtain the final pr
C. any of these
D. none
165. .…………………is a form of supply chain where a wide variety of finished goods are produced with limited numb
A. converging structure
B. diverging structure
C. any of these
D. none
-
166. ……………………is the exchange of services, information or product from one business to a government agency
A. b2g
B. b2e
C. b2b
D. p2p
Answer» A. b2g
- (1)
167. ………………….is an internet network that allows users with the same network in software to connect to each o
A. b2c
B. b2e
C. b2b
D. p2p
Answer» D. p2p
A. portal
B. browser
C. search engine
D. none of these
169. A ………………….. Presents information from diverse sources in a unified way in a web site.
A. web portal
B. link page
C. both of these
D. none of these
-
170. ……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Answer» A. hacker
A. c2c
B. b2e
C. b2b
D. b2c
Answer» A. c2c
172. ……………..allows the person to type ion just the main word or words and the site will come in
A. web page
B. home page
C. domain
D. none of these
Answer» C. domain
173. A ………………….. presents information from diverse sources in a unified way in a web site
A. web portal
B. link page
C. both of these
D. none of these
-
174. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identit
A. positive id system
B. negative id system
C. both of these
D. none of these
175. …………………..are program developed by some dishonest people to destroy the computer system and the valua
A. network firewall
B. computer virus
C. both of these
D. none of these
176. he dimension of e-commerce that enables commerce across national boundaries is called ______________.
A. interactivity
B. global reach
C. richness
D. ubiquity
177. The primary source of financing during the early years of e-commerce was ______________.
A. bank loans
-
178. The source of revenue in a subscription revenue model is ______________.
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
Answer» A. the nature of the players in an industry and their relative bargaining power
180. The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual del
A. tcp
B. ip
Answer» B. ip
C. insufficient reach
D. best-efforts qos
-
182. Internet users account for about ______________ of the world's population.
A. 7%
B. 17%
C. 27%
D. 47%
Answer» B. 17%
183. The most common type of Internet crime according to the IC3 is ______________.
B. check fraud
C. non-delivery
D. auction fraud
184. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.
A. phishing
B. pharming
D. spoofing
185. ______________ influence the behavior of others through their personality, skills, or other factors.
A. opinion leaders
D. lifestyle groups
-
186. A(n) ______________ represents data as two-dimensional tables with records organized in rows and attribute
B. data warehouse
C. sql query
D. relational database
187. Creating multiple versions of information goods and selling essentially the same product to different market s
called______________.
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Answer» A. versioning
188. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
A. loyalty
B. reach
C. recency
D. unique visitors
Answer» A. loyalty
-
190. The redirection of traffic from a legitimate site to an infringing site is called ______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
A. security policy
B. risk assessment
C. implementation plan
D. security organization
192. ______________ influence the behavior of others through their personality, skills, or other factors.
A. opinion leaders
D. lifestyle groups
193. Creating multiple versions of information goods and selling essentially the same product to different market s
called______________.
A. versioning
B. bundling.
C. transitive content
D. price discrimination
Answer» A. versioning
-
194. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
A. loyalty
B. reach
C. regency
D. unique visitors
Answer» A. loyalty
195. ______________ are networks that connect people within a company to each other and to the company netw
A. bitstreams
B. extranets
C. internets
D. intranets
Answer» D. intranets
196. A website offering content created by third party transparently to customers is an example of _____________
A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order
Answer» B. syndication
197. E-commerce technologies have improved upon traditional commerce technologies in ______________.
A. richness
B. reach
-
198. All of the following are technologies used to gather information about you online except ______________.
A. spy ware
B. cookies
C. gmail
D. anonymizers
Answer» D. anonymizers
199. ______________ is a program that you can run from the DOS prompt in the Windows operating system in ord
client and the server.
A. ping
B. telnet
C. tracert
D. ssl
Answer» A. ping
200. Which of the following is a new and disruptive Web feature or service?
A. xml
B. diffserv
C. blogs
D. cdma
Answer» C. blogs
201. What Web server functionality allows it verify usernames and passwords and process certificates and encrypti
C. data capture
D. security services
-
202. The ability to change the product to better fit the needs of the customer is called ______________.
A. customization
B. personalization
C. privacy
D. accessibility
Answer» A. customization
203. All of the following are major categories of computer viruses except ______________.
A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses
A. paypal
B. checks
C. credit cards
D. debit
205. Complete price transparency in a perfect information marketplace is necessary for ______________ to take eff
A. bertrand\s law
-
206. The process of getting customers to pass along a company's marketing message to friends, family, and colleag
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
207. All of the following are types of social marketing except ______________.
A. affiliate marketing
B. blog advertising
D. game advertising
208. The ethical principle which states that if an action is not right for all situations, then it is not right for any situa
B. slippery slope
C. no free lunch
D. universalism
Answer» D. universalism
-
210. The majority of job seekers rely on which of the following?
A. word-of-mouth leads
B. employment agencies
D. internet only
211. Which of the following best describes predicted growth in C2C and B2C auction spending?
A. spot purchasing
213. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses
-
214. Why would a merchant want to customize products?
B. to decrease costs
C. it is required in ec
215. A ______________ is the set of planned activities designed to result in a profit in a marketplace.
A. business model
B. profit model
C. business plan
D. revenue model
A. commission
B. brokerage
C. referral fee
D. discount
A. ascii
B. ansi
C. usa
D. government
Answer» B. ansi
-
218. ______ means converting readable text to unreadable text.
A. conversion
B. decryption
C. encryption
D. decoding
Answer» C. encryption
A. conversion
B. decryption
C. encryption
D. decoding
Answer» B. decryption
A. ssl
B. set
C. e-commerce
D. m-commerce
Answer» A. ssl
A. ssl
B. set
C. e-commerce
D. m-commerce
Answer» A. ssl
-
222. An online retail store is called as _____.
A. trader
B. retailer
C. e-tailer
D. amazon
Answer» C. e-tailer
A. c2c
B. b2c
C. b2b
D. p2p
Answer» A. c2c
A. b2b
B. b2c
C. c2c
D. p2p
Answer» B. b2c
A. public
B. private
C. session
D. symmetric
Answer» C. session
-
226. ____ is an online retail store.
A. portal
B. service provider
C. e-tailer
D. content provider
Answer» C. e-tailer
227. Identify the identity of a person or entity with whom you are dealing on Internet is known as ______.
A. integrity
B. authenticity
C. authorisation
D. none of these
Answer» B. authenticity
228. ____ means that the information being displayed on a Web site/transmitted/received over the Internet has n
authorised party.
A. integrity
B. authenticity
C. authorisation
D. none of these
Answer» A. integrity
B. only public
C. only private
D. session
-
230. SET is developed by association led by _________.
B. master card
C. visa
D. rupay
A. http
B. https
C. wap
D. pop
Answer» C. wap
A. edi
B. electronic market
C. e-commerce
D. internet commerce
A. edi
B. electronic market
C. e-commerce
D. internet commerce
Answer» A. edi
-
234. _____ means the information being displayed on a Web site or transmitted or received over the Internet has n
unauthorized party.
A. integrity
B. confidentiality
C. authenticity
D. privacy
Answer» A. integrity
A. public key
B. private key
C. ssl
D. set
Answer» C. ssl
A. b2b
B. b2c
C. c2c
D. p2p
Answer» C. c2c
237. ______ are sites that creates a digital online environment where people with similar interest can transact.
A. community provider
B. market creator
C. portal
D. service provider
-
238. Flipkart.com is an example of _______.
A. b2b
B. b2c
C. c2c
D. p2p
Answer» B. b2c
A. html
B. wml
C. vb
D. xml
Answer» B. wml
A. hacking
B. phishing
C. sniffing
D. spoofing
Answer» B. phishing
A. ftp
B. http
C. pop
D. smtp
Answer» B. http
-
242. _____ means converting cipher text to plain text.
A. encryption
B. decryption
C. conversion
D. de-conversion
Answer» B. decryption
A. encryption
B. decryption
C. conversion
D. de-conversion
Answer» A. encryption
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
-
246. _____ can read the cipher text.
A. sender
B. receiver
C. any one
D. no one
Answer» D. no one
247. When message & data are available only to those who are authorized to view them is known as ______ .
A. integrity
B. confidentiality
C. authenticity
D. privacy
Answer» B. confidentiality
248. Digital Accumulating Balance Payment System is generally used for ______ payments.
A. micro
B. macro
C. credit card
D. debit card
Answer» A. micro
A. local
B. global
Answer» B. global
-
250. ______ means found everywhere.
A. universal
B. ubiquity
C. global
D. local
Answer» B. ubiquity
A. social
B. smooth
C. personal
D. communication
Answer» C. personal
A. public
B. private
C. session
D. otp
Answer» C. session
253. To handle credit card transaction on internet _____ is developed by Visa and Master card.
A. ssl
B. set
C. sat
D. encryption
Answer» B. set
-
254. The sender and receiver will have the same key in _____ Key Encryption.
A. symmetric
B. asymmetric
C. public
D. private
Answer» A. symmetric
A. cipher text
B. https
C. shttp
D. smtp
Answer» B. https
A. google
B. yahoo
C. paypal
D. go daddy
Answer» C. paypal
A. b2b
B. b2c
C. c2c
D. p2p
Answer» D. p2p
- (2)
258. E-Tailer revenue model is ______ revenue.
A. sales
B. subscription
C. advertising
D. affiliate
Answer» A. sales
259. The percentage of people who visit web site and buy something is known as _____
A. hits
B. conversion rate
C. affiliate
D. walk-in-customer
260. In _______ user can share files and computer resources directly.
A. b2b
B. b2c
C. c2c
D. p2p
Answer» D. p2p
A. impure plays
B. indirect plays
D. direct plays
-
262. World Wide Web (WWW) was introduced in the year ……………………
A. 1994
B. 1996
C. 1992
D. 1990
Answer» A. 1994
A. SCM
B. EDI
C. Both of these
D. None of these
Answer» B. EDI
264. ………………..is concerned with the buying and selling information, products and services over computer comm
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Answer» B. E-Commerce
265. ………………..is a set of standards developed in the 1960s to exchange business information and to do electroni
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Answer» A. EDI
-
266. Which among the following product is suitable for E-Commerce ?
A. Books
B. Vegetables
C. All of these
D. None of these
Answer» A. Books
267. ……………allows a business application on the computer of one organization to communicate directly with the
another company.
A. EDI
B. Protocols
C. Standards
D. Business applications
Answer» A. EDI
A. E-commerce
B. E-Business
C. EDI
D. None of these
Answer» C. EDI
269. ………………. is essentially a business process that connects manufacturers, retailers, customers and suppliers in
products.
A. E-commerce
B. EDI
C. SCM
D. Networking
Answer» C. SCM
-
270. Which of the following is not a party of SCM ?
A. Suppliers
B. Manufacturers
C. Distributors
D. Customers
Answer» C. Distributors
271. ………………is a commercial process that includes production, distribution, sales or delivery of goods and servic
A. E-commerce
B. SCM
C. EDI
D. None of these
Answer» A. E-commerce
272. ……………….is the exchange of goods or items or commodities and services or applications used for money and
A. E-commerce
B. Commerce
C. Both of these
D. none
Answer» B. Commerce
273. …………….is an approach to deliver information differentiated business values called services by combining the
resources
A. E-business
B. E-commerce
C. any of these
D. none
Answer» A. E-business
-
274. ……………….always operate on intranet
A. E--commerce
B. E-Business
C. EDI
D. None of these
Answer» B. E-Business
A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these
Answer» C. E-trade.com
276. ……………….and ………………… were the enabling technologies that laid the ground work for E- commerce
D. None of these
A. Baazar.com
C. E-trade.com
D. none of these
-
278. …………….is a systems approach to Managing the entire flow of information, materials, and services from raw
warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Answer» D. SCM
279. …………….is a form of supply chain where a series of assembly operations are carried out to obtain the final pr
C. Any of these
D. None
280. ……………………is a form of supply chain where a wide variety of finished goods are produced with limited num
A. Converging structure
B. Diverging structure
C. Any of these
D. None
281. ……………………is the exchange of services, information or product from one business to a government agency
A. B2G
B. B2E
C. B2B
D. P2P
Answer» C. B2B
-
282. Companies use………………………networks to automate employee related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Answer» B. B2E
284. ……………………..streamlines the flow of information and self service capabilities through automation
A. SCC
B. CRM
C. CRP
D. SCM
Answer» A. SCC
285. ………………is a global web in which millions of users are communicating with each other with the help of comp
A. Internet
B. WWW
C. both of these
D. None of these
Answer» A. Internet
-
286. …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Answer» A. html
287. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Answer» B. WWW
288. ………refers to a kind of e-commerce which refers to a company selling or buying from other company
A. B2G
B. B2E
C. B2B
D. P2P
Answer» C. B2B
C. all of these
D. none of these
-
290. A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an
A. B2G
B. B2E
C. B2B
D. P2P
Answer» C. B2B
291. …………..sites act as an intermediary between someone wanting a product or service and potential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
292. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in t
A. Process based
C. transaction based
D. any of these
293. ……………..focus on producing a highly integrated value proposition through a managed process.
A. hubs
B. community
C. contents
D. none of these
Answer» A. hubs
-
294. …………………is basically a concept of online marketing and distributing of products and services over the intern
A. B2G
B. B2E
C. B2B
D. B2C
Answer» D. B2C
295. ……………………..e-commerce consists of the sale of products or services from a business to the general public
A. B2G
B. B2E
C. B2B
D. B2C
Answer» D. B2C
A. clothes
B. flowers
C. airline reservation
D. none
Answer» D. none
A. B2G
B. B2E
C. B2B
D. B2C
Answer» D. B2C
-
298. ………………….e-commerce involves customers gathering information, purchasing and receiving products over a
A. B2G
B. B2E
C. B2B
D. B2C
Answer» D. B2C
A. manufacturers
B. distributors
C. Publishers
D. none
Answer» D. none
300. ………………….e-commerce involves the electronic facilitation of transaction between customers through some
A. B2G
B. B2E
C. B2B
D. C2C
Answer» D. C2C
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
-
302. Peer to Peer [P2P] is also used to describe………………………….
A. C2C
B. B2E
C. B2B
D. B2C
Answer» A. C2C
303. …………………….is an online auctioning site that facilitates the trade of privately owned items between individu
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer» A. e-Bay
A. C2C
B. B2E
C. B2B
D. B2C
Answer» A. C2C
305. ………………….is an internet network that allows users with the same network in software to connect to each o
A. P2P
B. B2E
C. B2B
D. B2C
Answer» A. P2P
-
306. This is a protocol which allows files to be transferred from one computer to another computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer» B. FTP
307. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html
A. Web page
B. home page
C. domain
D. none of these
A. Web page
B. home page
C. domain
D. none of these
309. ……………..allows the person to type ion just the main word or words and the site will come in
A. Web page
B. home page
C. domain
D. none of these
Answer» C. domain
-
310. A ………………….. presents information from diverse sources in a unified way on a website.
A. Web portal
B. Link page
C. Both of these
D. none of these
311. A……………portal is a specialized entry point to a specific market place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
312. ………………..are general interest portals covering a wide range of topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
A. i-village
B. Yahoo
C. Google
D. Net scape
Answer» A. i-village
-
314. A portal that helps to establish relations and to conduct transactions between various organizations is termed
A. B2B portals
B. C2C portals
C. both of these
D. none of these
315. A …………………….is a software that scours the internet collecting data about every website and every webpage
A. spiders
B. Search Engines
C. robots
D. none of these
316. Search Engines databases are selected and built by computer robot programs called………………………
A. spiders
B. Search Engines
C. robots
D. none of these
Answer» A. spiders
317. Which among the following is not an example for Search engine ?
A. Google
B. MSN
C. Alta vista
D. none of these
-
318. Web pages are prepared using their language as…………………
A. html
B. FTP
C. HTTP
D. None of these
Answer» A. html
A. html
B. FTP
C. HTTP
D. None of these
Answer» C. HTTP
320. The user reaches this page when they specify the address of a website
A. Home page
B. Web page
C. Summary page
D. None of these
A. Home page
B. Web page
C. Summary page
D. None of these
-
322. ……………is an example for a software that visits suggested pages and return the appropriate information to be
A. Robot
B. Spiders
C. Ants
D. All
Answer» D. All
323. ………………………………..ads appears as rectangular graphics near the top of the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
324. ………………….ads take up the entire screen and are more powerful than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
325. ………………………….is a form of advertisement on the web that appears between web pages that the user reque
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer» C. interstitials
-
326. ……………………is basically a TV commercial that runs in the browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» A. Advertorials
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
329. …………………..is an unsolicited e-mail sent to every e-mail address that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
-
330. …………………..is the buying and selling of goods and services through wireless handled devices such as cellular
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
331. …………………is a class of advertising methods which are considered unethical and may even be illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Answer» D. malware
332. ……………….is the most common way for purchasing an online advertising
A. CPM
B. CPC
C. Any of these
D. none of these
333. ………………are animated full screen ads placed at the entry of a site before a user reaches the intended conten
A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer» A. Intromercials
-
334. ………………….are interactive online ads that require the user to respond intermittently in order to wade throug
intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer» A. Ultramercials
335. ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and o
computer mediated networks with the help of an electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
336. …………….provide security and privacy for the use of the web page content
A. HTTP
B. html
C. FTP
D. none of these
Answer» A. HTTP
337. …………………….website is one that changes or customizes itself frequently and automatically based on certain
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
-
338. ………………site is created to fraudulently acquire sensitive information such as pass words and credit card deta
person or business.
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
339. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issu
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» A. customer
340. ……………….is a financial institution that establishes an account with a merchant and processes payment card a
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» D. Acquirer
341. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre de
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
-
342. ………………type of payment system is highly useful to those customers who would like to control overspending
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
343. ……………………….credit card gives all the advantages of a normal credit card without worrying about the intere
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
344. ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the r
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer» B. Revolver
345. ………………….is a financial instrument which can be used more than once to borrow money or buy products an
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
-
346. To accept a credit card for payment, we have to open a …………………account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
347. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the me
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
348. ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending m
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
349. ………………is basically a secure gate between our organization data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
-
350. ……………………encrypts payment card transaction data and verifies that both parties in the transaction are gen
A. SSL
B. SET
C. both of these
D. none of these
Answer» B. SET
351. ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic
A. Biometrics
B. PIN
C. both of these
D. none of these
Answer» A. Biometrics
352. In Biometrics,…………………………ID system is designed to prevent more than one person from using a single ide
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
353. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identit
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
-
354. …………………..are program developed by some dishonest people to destroy the computer system and the valua
A. Network firewall
B. computer virus
C. both of these
D. none of these
355. Which among the following is not an example for computer virus ?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
356. ……………………are special type of software meant for limiting the risks of being hit by computer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
357. A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or
A. Hacker
B. spoofer
C. operator
D. none of these
Answer» A. Hacker
-
358. ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the
A. Network firewall
B. Antivirus
C. both of these
D. none of these
359. …………..Prevents unauthorized communication into and out of the network, allowing the organization to enfo
network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
D. None of these
361. The verification of credit card is done by using…………….. with a communications link to the merchants acquiri
B. Point of Sale
C. All of these
D. none of these
-
362. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» A. Spoofing
363. Gain entry into the user’s system and scan your file system for personal information is known as……………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» B. Snooping
364. ………………attacks are difficult and are only successful if the attacker knows something about the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
365. …………………is the process of making information unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Answer» D. Cryptography
-
366. ………………….is the reverse process of encryption, to make the information readable once again
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Answer» B. Decryption
367. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary si
A. cyber signature
B. Digital signature
C. SSL
D. none of these
368. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables s
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
369. The information Technology Act [IT ACT] came into effect on
D. none of these
-
370. Information sent over the Internet commonly uses the set of rules called………………………..
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer» A. TCP/IP
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
A. 2001
B. 2002
C. 2009
D. 2000
Answer» D. 2000
373. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
-
374. Trade mark, copyright, patent law etc comes under the purview of……………………
A. Data protection
B. Telecommunication laws
D. None
375. ……………….is a programme designed o replicate and spread generally with the victim being oblivious to its exi
A. hacker
B. software
C. Computer virus
D. none of these
A. privacy
B. integrity
C. authentication
D. none of these
A. 24×7
C. time saving
-
378. In which one of the following type of E-Commerce, consumer sells to consumer directly?
A. C2B
B. B2C
C. B2B
D. C2C
Answer» D. C2C
379. ................ is the electronic transmission of business transaction documents directly between the computers o
format
A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Answer» B. EDI
381. When a company buys some raw material from some other company, then it will come under:
A. B2B
B. B2C
C. C2B
D. C2C
Answer» A. B2B
-
382. In traditional commerce, people buy goods and services :
B. physical visit
A. Social media
B. Online Ads
C. Blog
384. Which of the following is not a dimension of e- commerce security provided by encryption ?
A. availability
B. integrity
C. non-repudiation
D. confidentiality
Answer» A. availability
A. Encryption
B. Decryption
C. Cryptography
D. none of these
Answer» A. Encryption
-
386. In Porter's Five Forces, the 'threat of new entrants' relates to:
A. Barriers to entry
B. Substitutes
C. Switching costs
D. Buyer power
388. Logistics is the part of a supply chain involved with the forward and reverse flow of
A. goods
B. services
C. cash
-
390. CRM is :
A. Customer Relationship
B. Customer Relationship
C. Customer Recovery
D. Consumer Relation
A. Small Products
B. Digital Products
C. Special Products
D. Fresh Products
392. Which of the following is a useful security mechanism when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
A. automobiles
B. books
C. groceries
Answer» A. automobiles
-
394. Which is not the application area of e-commerce?
A. E-Learning
B. E-Banking
C. E-Auction
A. 2000
B. 2020
C. 2001
D. 2010
Answer» A. 2000
A. SCM
B. EDI
Answer» B. EDI
A. encryption
B. decryption
C. e-cash
Answer» C. e-cash
-
398. Digital Products are best suited for B2C e-commerce because they:
399. Which of the following is part of the four main types of e-commerce?
A. B2B
B. B2C
C. C2B
400. The dimension of E-Commerce that enables commerce across the boundaries is called
A. interactivity
B. global reach
C. richness
D. ubiquity
-
402. The purpose of supply chain management is
A. provide customer
D. increase production
B. Differentiation is low
D. Access to distribution
A. i and ii
B. i, ii and iii
405. Which of the following examines information passing through switches, hubs, or routers?
A. Key logger
B. Packet sniffer
D. Screen captures
-
406. Which type of e-commerce focuses on consumers dealing with each other?
A. B2B
B. B2C
C. C2B
D. C2C
Answer» D. C2C
407. Which products are people most likely to be more uncomfortable buying on the Internet?
A. Books
B. Furniture
C. Movies
Answer» B. Furniture
408. Which products are people most likely to be comfortable buying on the Internet?
A. Books
B. PCs
C. CDs
409. Digital products are best suited for B2C e-commerce because they:
-
410. All of the following are techniques B2C e-commerce companies use to attract customers, except
B. Viral marketing
C. Online ads
D. Virtual marketing
A. marketing
B. advertising
C. warehousing
412. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to th
A. Affiliate programs
B. Click-through
C. Spam
Answer» B. Click-through
413. What is the percentage of customers who visit a Web site and actually buy something called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
-
414. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a ret
A. Direct materials
B. Indirect materials
C. EDI
415. What are materials that are necessary for running a modern corporation, but do not relate to the company’s
A. Direct materials
B. Indirect materials
C. EDI
416. What is another name for materials which cannot be linked to a specific product or process?
A. Direct materials
B. Indirect materials
C. EDI
417. What are plastic cards the size of a credit card that contains an embedded chip on which digital information c
C. FEDI cards
D. Smart cards
-
418. Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?
A. B2B
B. B2C
C. C2B
D. C2C
Answer» A. B2B
419. Which of the following are advantages normally associated with B2B ecommerce?
B. Reduction in costs
420. If it is easy for competitors to enter the market, the threat of new entrants is considered:
A. High
B. Low
C. More
D. Less
Answer» A. High
421. An industry is less attractive for suppliers when the rivalry among existing competitors is:
A. High
B. Low
C. More
D. Less
Answer» A. High
-
422. Unique value auction mainly applies to?
A. New products
C. Engineering products
423. Which of the following is a useful security mechanism when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
424. Which of the following statements accurately reflect the impact of technology?
A. automobiles
B. books
C. softwares
D. none
Answer» A. automobiles
-
426. A business competing in a commodity like environment must focus on which of the following?
A. Price
C. Ease of ordering
427. Which of the following refers to creating products tailored to individual customers?
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
Answer» A. customisation
428. Materials used in the normal operation of a business but not related to primary business operations are called
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
429. What is the name given to an interactive business providing a centralised market where many buyers and sup
commerce-related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
-
430. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO mate
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» A. horizontal
431. Which form of e-marketplace brings together buyers and sellers from the same industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» B. Vertical
432. Which, if any, of the following types of ads are people most willing to tolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
433. Which of the following is an Internet-based company that makes it easy for one person to pay another over th
A. electronic check
C. conversion rates
D. financial cybermediary
-
434. Which of the following is a method of transferring money from one persons account to another?
A. electronic check
B. credit card
C. e-transfer
A. e-commerce
B. online banking
C. e-cash
D. check
436. If you need to transfer money to another person via the internet, which of the following methods could you u
A. financial cybermediary
B. electronic check
437. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted ove
A. financial cybermediary
B. electronic check
-
438. A combination of software and information designed to provide security and information for payment is calle
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
439. What is the name for direct computer-to-computer transfer of transaction information contained in standard
A. internet commerce
B. e-commerce
440. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt da
the _____ key, while the key used to decrypt data is called the _____n key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
441. When a transaction is processed online, how can the merchant verify the customers identity?
-
442. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private infor
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer» D. spoofing
443. What is an internal organisational Internet that is guarded against outside access by a special security feature
hardware, or a combination of the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer» B. Intranet
444. What is an intranet that is restricted to an organisation and certain outsiders, such as customers and suppliers
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer» C. Extranet
445. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster su
B. Hot site
C. Cold site
-
446. What is a separate facility that does not have any computer equipment but is a place where the knowledge w
B. Hot site
C. Cold site
447. What is a separate and fully equipped facility where the company can move immediately after the disaster an
B. Hot site
C. Cold site
448. What charts (1) the cost to your organisation of the unavailability of information and technology and (2) the c
a disaster over time?
B. Hot site
C. Cold site
449. Which factor determines when the IT system will be available for knowledge workers to access?
A. Availability
B. Accessibility
C. Reliability
Answer» A. Availability
-
450. Which factor determines who has the right to access different types of IT systems and information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» B. Accessibility
451. Which factor ensures the IT systems are functioning correctly and providing accurate information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» C. Reliability
452. Which factor represents how well your system can adapt to increased demands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» D. Scalability
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» A. Flexibility
-
454. What is a set of conditions used to measure how well a product or system functions?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» D. Benchmark
455. What determines the future IT infrastructure requirements for new equipment and additional network capac
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
456. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
Answer» A. Workflow
A. firewall
B. Virus
C. Trojan horse
Answer» A. firewall
-
458. Which of the following is the primary characteristic of an intranet?
459. Which concept suggests that different applications and computer systems should be able to communicate wit
A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer» D. Interoperability
460. Which service encompasses all technologies used to transmit and process information on an across a network
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
461. Which process can prevent data from losing due to computer problems or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» A. backup
-
462. Which process is used to reinstall data from a copy when the original data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» B. recovery
463. Who breaks into other peoples computer systems and steals and destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer» A. Hackers
464. What is software that comes hidden in free downloadable software and tracks your online movements, mine
or uses your computers CPU and storage for some task you know nothing about?
A. Web log
B. Clickstream
465. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail
A. Computer virus
B. Worm
C. Denial-of-service attack
Answer» B. Worm
-
466. What floods a Web site with so many requests for service that it slows down or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
467. What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to th
assets?
A. Risk management
B. Risk assessment
C. Security
468. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses
-
470. E-commerce is
A. B2C
B. B2B
C. C2B
Answer» A. B2C
A. Low cost
B. Economical
C. Productivity gains
Answer» B. Economical
A. E-commerce
B. E-business
C. Data mining
A. E-commerce
B. E-business
C. Data mining
Answer» B. E-business
-
474. The types of Business to Business e-commerce are ................
B. Industry portals
475. Which of the following is not the example of business to consumer (B to C) e-commerce?
A. Amazon.com
B. e-bay.com
C. dell.com
D. lastminute.com
Answer» B. e-bay.com
A. Digital Convergence
B. 24/7 availability
C. Profit margins
A. Lower cost
B. Economy
C. Higher margins
-
478. Which model of e commerce deals with virtual auction?
A. Aggregator Model
B. Info-mediary model
C. Community Model
D. Brokerage Model
479. When you look at e-commerce and e-business, which is the most realistic relationship between these two con
480. Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce
which category?
B. Brand-building sites
481. A summary of how a company will generate a profit identifying its core product, target customers, position in
revenue and costs is known as:
B. Value proposition
-
482. While search engines index registered sites which users search by inputting key words, which type of intermed
text but can include video or audio delivered through RSS feeds?
A. Directory
B. Publisher site
C. Blog
D. Access portal
Answer» C. Blog
483. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome examples of?
A. Web servers
B. Web browsers
A. i and ii
B. ii and iii
C. i and iii
485. Advantages of B2C commerce are
(i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii) Shop can be open 24 hours a day seven days a week
(iv) Privacy of transaction always maintained
D. iii and iv
A. i and ii
B. ii and iii
C. i, ii, iii
D. i, ii, iii, iv
487. Most common uses of the Internet and the Web include communicating, shopping,
488. The __________ is the multimedia interface to resources available on the Internet.
A. Web
B. ISP
C. browser
D. URL
Answer» A. Web
-
489. The multimedia interface to the resources available on the Net is called the
B. Internet
C. GUI interface
D. Server
A. programs
B. procedures
C. protocols
D. hyperlinks
Answer» C. protocols
A. jumping
B. moving
C. surfing
D. applying
Answer» C. surfing
492. ____________ are networks that connect people within a company to each other and to the company networ
A. Internets
B. Intranets
C. Extranets
D. Components
Answer» B. Intranets
-
493. E-money is a ……………. medium for making payments
A. Digital
B. Electronic
Answer» A. Digital
A. Consistency
B. Isolation
C. Durability
Answer» B. Isolation
A. Consistency
B. Complexity
C. Conservation
Answer» A. Consistency
-
497. Electronic payment is a financial transaction made …………. the use of paper documents
A. With
B. Without
Answer» B. Without
C. Authentication type
A. Credit card
B. Debit card
C. Smart card
A. Credit card
B. Debit card
A. On line transactions
502. ……………………. card is a card with a built-in chip capable of storing information in its memory
A. Debit
B. Credit
C. Smart
Answer» C. Smart
A. Government
B. Identification
C. Health care
A. ATM
B. Telecommunication
C. Transportation
Answer» A. ATM
-
505. EFT is a computer based system
A. True
B. False
C. none
D. all
Answer» A. True
506. EFT is
507. …………….cards and ………….cards are two ways to make payments on a web site
A. Digital cash
B. Electronic money
-
509. E-money has…………….types
A. 3
B. 4
C. 5
D. 6
Answer» A. 3
A. Amazon.com
B. eBay.co.in
C. Flipkart.com
Answer» B. eBay.co.in
A. Cryptography
B. Digital certificate
C. Digital signature
Answer» A. Cryptography
A. Electronic currency
B. Credit card
C. Debit card
-
513. ……………………..card is a model of IPS
A. Smart
B. Debit
C. Credit
A. Cyber cash
B. First virtual
515. ………………………cards directly transfer funds from consumers bank account to the merchant’s
A. Debit
B. Credit
Answer» A. Debit
A. Are
B. Are not
Answer» A. Are
-
517. ACH is
A. Destination site
B. Portal
C. Search engine
A. Dollars
B. Rupees
A. e-bay
B. Ibibo
C. Facebook
D. Orkut
Answer» A. e-bay
-
521. What items are traded in e-business
A. Consumer durables
B. Pharmaceutical products
C. Industrial goods
522. Once segments have been identified, organizations need to define how best to position their online services r
main variables: product quality, service quality, and fulfillment time. Which variable is missing?
B. Brand perception
C. Customer value
D. Price
Answer» D. Price
523. What could be an implication for an organization if an e-business strategy is not clearly defined?
524. Before developing any type of strategy, a management team needs to agree the process they will follow for g
strategy. A framework that gives a logical sequence to follow to ensure inclusion of all key activities of an ebu
known as:
A. An E-channel strategy
525. The approach by which applications of internal and external electronic communications can support and influ
A. Corporate Strategy
B. E-channel strategy
C. E-business strategy
D. E-business responsibility
526. A(n) __________ is a private corporate network that uses standard Internet protocols and interfaces.
A. ethernet
B. extranet
D. intranet
Answer» D. intranet
527. When measuring the effectiveness on an online advertisement, the __________ is the percentage of visitors t
A. click ratio
B. click rate
C. click-through rate
D. hit ratio
528. RACE is a practical framework to help marketers manage and improve the commercial value gained from digit
Act, C, Engage. What does 'C' refer to?
A. Collaborate
B. Collect
C. Consolidate
D. Convert
Answer» D. Convert
-
B. Considered credible
530. In future, some suggest that the task of searching for suppliers and products may be taken over by computer
some degree of intelligence that replicates human neural functioning. These programmes are known as:
B. HTML
531. Security is a serious concern for e-business managers and there are many potential risks concerning unauthor
One way this occurs is through misleading users through setting up a bogus website and gaining user details o
A. Denial of service
B. Phishing
C. Malware
D. Firewalling
Answer» B. Phishing
A. going shopping
B. conducting research
D. using e-mail
532. The fastest-growing application for the Internet is
533. The most common method for gaining access to the Internet is through a __________.
A. dumb terminal
C. point-to-point computer
535. These types of commercial Internet service providers are the most widely used
536. When surfing the Web, the browser interprets the HTML command found in a document file, and displays it a
A. Applet page
B. Java page
C. Web page
D. Domain page
536. When surfing the Web, the browser interprets the HTML command found in a document file, and displays it a
537. Which of the following are not required to send and receive e-mail?
A. e-mail account
B. Web page
D. e-mail program
538. ______________ includes all electronics-based information exchanges within or between companies and cust
A. E-commerce
B. E-marketing
C. E-communication
D. E-business
Answer» D. E-business
A. e-advertising
B. e-selling
C. e-commerce
D. e-purchasing
Answer» D. e-purchasing
B. Doing business
C. Sale of goods
A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
Answer» B. B2Cs
542. Which type of e-commerce focuses on consumers dealing with each other?
A. B2B
B. B2C
C. C2B
D. C2C
Answer» D. C2C
A. Portal
B. Browser
C. Search Engine
D. none of these