100% found this document useful (1 vote)
124 views

E-Com Internal-2 QB

This document contains a practice question bank for the subject of E-Commerce from Aurora's Degree & PG College. It includes various types of questions to test understanding of key concepts related to E-Commerce. There are fill in the blank questions, multiple choice, and short answer questions. The questions cover topics such as the definition of E-Commerce, different models of E-Commerce like B2B, B2C and C2C, E-marketing, E-security issues like encryption, firewalls and viruses, and mobile commerce.

Uploaded by

Munna
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
124 views

E-Com Internal-2 QB

This document contains a practice question bank for the subject of E-Commerce from Aurora's Degree & PG College. It includes various types of questions to test understanding of key concepts related to E-Commerce. There are fill in the blank questions, multiple choice, and short answer questions. The questions cover topics such as the definition of E-Commerce, different models of E-Commerce like B2B, B2C and C2C, E-marketing, E-security issues like encryption, firewalls and viruses, and mobile commerce.

Uploaded by

Munna
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Aurora’s Degree & PG College

(ACCREDITED BY NAAC WITH 'B++' GRADE)


Chikkadpally, Hyderabad 500020
Internal – II Question Bank
B.Com -(Computers / Applications), III year VI- Semester
Subject: E-Commerce

Unit 1
F ill In The Blanks:
1) E-Commerce stands for ___________________________ .
2) E-Commerce is doing_____________________ online.
3) E-commerce leads to ______________in cost.
4) Internet Technology is available _____________across the world.
5) Website is one of the main ___________ of e-commerce.
6) The lack of _______________ is one of the biggest concerns for Internet Consumers.
7) E-Commerce increases purchasing opportunities for _____________________
8) The service of Middleman in e-commerce is _____________________
9) E-Banking is a form of _____________________ Commerce.
10)E-Bay is the example of __________________of commerce.
11) C2G stands for _________________.
12) M-Commerce means _______________.
13) WWW stands for _______________________.
14) Internet is _______________________.
15) Amazon comes under __________________business classification.

Answers:

1) Electronic Commerce 6) C2C 11) Consumer 2 Government


7)Buyers 12)Mobile Commerce
2) Business
8)Not Required 13)World Wide Web
3) Decrease
9)Electronics 14) Networking of Network
4) 24 Hours
10) C2C 15) B2C
5) Elements

multiple Choices:

1) E-Commerce stands for [ ]


a) Electronic Commerce b) Electronic Buys c)Electronic Purchase d)None of above
2) E-Commerce means doing on Internet. [ ]

1
a) Business b) Research c) Logging d) Chatting
3) Which of the following is the advantage of e-commerce? [ ]
a) 24x7 coverage b)geographic reach c) Information Sharing d) All of above
4) Which of the following is not E-commerce activity [ ]
a)A2B b) C2C c) B2B d) G2G
5) EDI means [ ]
a) Electronic Data Exchange b) Electronic Data Interchange
c) Ecommerce Direct Entry d)None
6) Amazon.com comes under the following model [ ]
a) B2B b) B2C c) C2C d) C2B
7) Which of the following is the major problem of E-Commerce [ ]
a) Information b) Security c)Sharing d)None of above
8) What is P2P E-commerce business classification [ ]
a) Peer to Peer b) Point to Peer c) Point to Peer d)None of above
9) Which of the following is not B2C e-commerce [ ]
a)Amazon.com b) E-bay.com c) Dell.com d) lastminute.com
10) Which of the following type of e-commerce allow customer to sell product directly to another
customer [ ]
a) C2C b) C2B c) C2G d) C2P
11) Which of the following is not a model of e-commerce? [ ]
a) D2D b) B2B c) C2C d) B2C
12) EFT Stands for ________________ [ ]
a) Emerging Financial Transfer b) Electronic Fund Transfer
c) Electronic Financial Transfer d) Emerging Fund Transfer
13) E-Marketing increases __________________ [ ]
a) Interactivity b) Risk c) Cost d) None of these
14) E-marketing provides: [ ]
a) Local coverage b) Global Coverage c) National Coverage d) None of these
15) Which of the following is the method of E-marketing? [ ]
a) Blogging b) Social Media c) Email d) All of these

Answers:
1) a 6)b 11) a

2) a 7) b 12) b

3) d 8) a 13) a

4) a 9) b 14) b

5) b 10) a 15) d

Short Questions:

2
1) What is E-Commerce?
E-commerce is the activity of buying or selling of products on online services or over the
Internet.Electronic commerce draws on technologies such as mobile ...
2) What is E-Business?
E-business (electronic business) is the conduct of business processes on the internet. These
e-business processes include buying and selling products, supplies and services; servicing
customers; processing payments; managing production control; collaborating with business
partners
3) What is E-Marketing?
Online marketing is the practice of leveraging web-based channels to spread a message
about a company's brand, products, or services to its potential customers.
4) What is M-Commerce?
M-Commerce also called as Mobile Commerce involves the online transactions through the
wireless handheld devices such as mobile phone, laptop,
5) What is B2B?
Businesss 2 Business

Unit 2
Fill in the blanks
1) TCP stands for _____________________
2) E-Security stands for ________________ security.
3) Firewall can be implemented both hardware and _____________________.
4) SSL stands for _______________________.
5) M-Commerce stands for _____________________.
6) The two types of encryption are ________________ and ____________________
7) There are __________________ classes in IP Address
8) S-HTTP stands for _______________________
9) There are ________________ in OSI
10) ______________ harms your computer.
11) In computers, a ________ is a piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
12) An attempt to make a computer resource unavailable to its intended users is called ____ attack
13) The encryption algorithms and digital signature schemes are ____________
14) A ______ is defined as personal trait that can be used to identify or verify the claimed identity of
an individual
15) Finger print recognition and facial recognition are examples of ___________Security system.

Multiple Choice Questions:


1) Which of the following is the advantage of E-Banking [ ]
a) Availability b) Convenience c) Transactional Speed d) All the above
3
2) The most basic security activity is [ ]
a) Authentication b) Fire walls
c) Password Protection d) Encryption
3) E-Marketing is available [ ]
a) Only working hours b) 24 hours a day c) Only week days d)None
4) Who can become a member of a stock exchange? [ ]
a) Individual b) A partnership firm c) Corporate d) All of the above
5) What is FTP? [ ]
a) File Transfer Protocol b) Field Transfer Protocol c)File Trading Protocol d) None of these
6) IP stands for [ ]
a) Internet Protocol b) Immediate Protocol c) Internet Proto d)none of these
7) ______________ is to protect data and passwords [ ]
a) Encryption b) Authentication c) Authorization d) Non-repudiation
8) A virus is a [ ]
a) Software program b) Hardware Program c)Both of these d)None
9) Which of them is security threat to E-Commerce [ ]
a) Pharming b) Phishing c) Malware d) All of these
10) HTTP stands for [ ]
a) Hypertext Transfer Protocol c) Hypermedia Transfer Protocol
b) Hyper Text Trading Protocol d) None of above
11) Keys are used for : [ ]
a) Encoding b) Decoding c) Both of these d) None of these
12) Public key is made available to the _____________ [ ]
a) Recipients b) Sender c) Everyone who is involved d) None of these
13) Risks posed to a security include: [ ]
a) Unauthorized Access b) Theft of data c) Both of these d) None of these
14) Encryption can be done [ ]
a) Only on textual data c) only on ASCII coded data
b) On any bit string d) only on mnemonic data
15) Digital signature is: [ ]
a) Scanned Signature on Computer b) Code number of the sender
b) Software to recognize signature d) Public key Encryption

Answers: fill in the blanks

1) Transmission Control Protocol 6)Symmetric and Asymmetric (public and


2)Electronic private)
3) Software 7) 5
4) Secure Socket Layer 8) Secure Hypertext Transfer Protocol
5) Mobile Commerce 9)7 Layers

4
10) Virus 13) Crypotographic
11) Virus 14) Bio-metric
12) DoS 15) Bio-metric

Answers: multiple choices


1) d 6) a 11) c

2) a 7) a 12) c

3) b 8) a 13) c

4) d 9) c 14) b

5) a 10) a 15) b

Short Questions & Answers


1) What is HTTP?
Ans. Hyper text Transfer Protocol
2) What is FTP?
Ans: File Transfer Protocol
3) List the layers of E-commerce framework
a) Application Services
b) Interactive Services
c) Middleware Services
d) Network Services
e) Secure Messaging
4) What is a Protocol?
Ans: Protocol is a standard controls or enables the connection, communication and data exchange
within or between computers.
5) What is Cryptography?
Ans: Cryptography is a technique of secret writing especially code as cipher systems, method of
storing and transmission data in an unreadable format by any one.

UNIT 3
Multiple Choice Questions

1) E-Payments stand for: [ ]

a) Emerging Payment b) Electronic Payment

c) Economic Payment d) Entertain Payment

2) Which of the following is the E-Payment [ ]

a) E-Cash b) ED-Cheque c)Credit Card d)All the above

5
3) Debit Card also known as [ ]

a) Check Card b)ATM card c) Bothea and b d) None

4) Smart Cards use [ ]

a) Magnetic Stripe technology b) Integrated Circuitc)Bothe of the above d) None

5) A Credit card holder can [ ]

a) Purchase from shop b)Online Purchase c)Bothe of thesed) None of above

6) Smart Cards can be used for [ ]

a)Purchase b)Storing Telephone Number c) Paying fares d)All the above

7) E-Check also called [ ]

a)Electronic Cheque b)Internet payment c)Web payment d)All above

8) ATM stands for [ ]

a) Automatic Teller Machine b) Automatic Transfer Money

c) Automatic Transfer Money d) None of above

9) The method of payment online consumer is: [ ]

a) E-Cash b) Credit Card/Debit c) E-Cheque d)All the above

10) Security Component of E-payment is [ ]

a)Authenticity b)Confidentiality c)Integrity d)All the above

11) How many models we have in mercantile process [ ]

a) 2 b) 3 c) 4 d) 5

12) ________ is a device to which smart card is connected [ ]

a) smart card port b) smart card reader

c) smart card cable d) none

13) what is an advantage of smart card [ ]

a) secure transaction b) reusable c) reconfigurable d) all

14) EFT stands for

a) Electronic fixes transfer b) electronic fixes transfer

b) Electronic fund transfer d) none

Fill The Blanks

1) E-Payments stand for______________.

6
2) ____________________ is a financial exchange that takes place online between buyers

and sellers.

3) E-Payment is doing payment ______________.

4) ______________ card immediately transfer the amount of charges from the card holders

account and transfer it to the seller’s bank.

5) _________ card has a present spending limit based on the users credit limit.

6) Digital signature are used to secure __________ from tampering.

7) Most of the consumer use _____________

8) ______________ is used for transferring money from one bank account directly toanother
without any proper money changing hands.

9) The processing of e-payment mode is _____________ as compared to traditionalpayment.

10)Debit card is also known as _______________.

11) ___________________ is an interaction model between consumer and merchants for online
commerce.

12) Electronic version of paper cheque is called ______________

13) ____________ allows consumer to store multiple credit cards, debit card and bank a/c number.

14) ____________ card embedded with microchip.

15) ACH stands for ________________________

Answers:
Multiple Choice – Answers

1)b 6)d 11) a

2)d 7)a 12) b

3)b 8)a 13) d

4)a 9)d 14) c

5)c 10)d

Fill in the blanks - Answers:

1) Electronic 5) Credit 9) Low

2) Electronic payment 6) E-Cheque 10) ATM Card

3) Online 7) Credit 11) Mercantile process

4) Debit 8) EFT 12) E-Cheque


7
13) E-wallet 14) Smart 15) Automatic fund house

Short Questions

1) What is Mercantile Model?


mercantile process is an interaction model between consumer and Merchants for online
commerce. • This is necessary to buy and sell goods, a buyer, a seller, and other parties should
follow some standard business processes.
2) What is EFT?
Electronic Funds Transfer (EFT) is a system of transferring money from one bank account
directly to another without any paper money changing hands.
3) What is Digital Currency?

Digital currency is a form of currency that is available only in digital or electronic form, and not in
physical form. It is also called digital money, electronic money, electronic currency, or cyber
cash.

4) What is E-Cheque?
An electronic version or representation of a paper cheque. The account holder writes an e-
check (or e-cheque) using a computer or other type of electronic device and transmits the e-
cheque to the payee electronically. Like paper cheques, e-checks are signed by the payer and
endorsed by the payee.

5) What is Smart Card?

 smart card, chip card, or integrated circuit card (ICC) is a physical electronic authorization device,
used to control access to a resource. It is typically a plastic credit card-sized card with an
embedded integrated circuit  chip.Many smart cards include a pattern of metal contacts to
electrically connect to the internal chip. 

UNIT 4

Multiple Choice Questions

1) EDI means [ ]

a) Electronic Data Interchange b) Economic Data Interchange

c)Electrical Data Interchange d) None of above

2) EDI compliance is the ability to [ ]

a)Only Sending b)Only receiving

c)Both a and b d)None of above

3) EDI is necessary in [ ]

8
a) B2C e-commerce b) C2C e-commerce

c) B2B e-commerce d) none of above

4) Which of the following is NOT an EDI communications [ ]

a)Data Element b) Segment c)Envelope d)parcel

5) Which of the following is NOT an EDI communication standard? [ ]

a)FTP b)HTTPS c)EDIFACT d)X400

6) For secure EDI transmission on internet [ ]

a) MIME is used b)S/MIME is used

c) PGP is used d)TCP/IP used

7) EDI uses which of the following to allow the computers of two different companies to talk to one
another [ ]

a) Application Software b) Interaction Software

c) Translation Software d)None

8) Which of the following is not an EDI document standard? [ ]

a)ANSI ASC X12 b)SWIFT c)EDIFACT d)TCP/IP

9) How many types of EDI? [ ]

a) One b)Two c) Three 4) None

10)In Fully EDI system ________ is not involved [ ]

a) Human Interference b) SMS c) E-Commerce d) None

11) _____ protocol used at network layer. [ ]

a) http b) TCP c) IP d) FTP

12) Financial EDI is also termed as [ ]

a) E-Banking b) EFT c) M-Banking d) digital cash

13) VPN stands for [ ]

a) Virtual public network b) virtual private network

c) Void public network d) void private network

14) AS2 stands for [ ]

a) Applicability statement 2 b) accessibility statements 2

c) Both a and b d) none

15) SFTP
9
Fill the Blanks

1)EDI allows exchange of ____________ between senders computer and receiver

Computer system.

2) EDI over internet uses ____________ to attach EDI forms to e-mail messages.

3) ______________ connection is required to deploy web EDI.

4) ______________ is a set of standards designed for EDI developed by the United

nations Economic Commission for Europe.

5) EDI significantly ___________ partner communication.

6) EDI regarded as the standard for the _____________ exchange of documents from

one company to another.

7) VAN is _______________ network where EDI traffic is exchanged security.

8) EDI ____________ allows you to exchange data directly with back office system.

9) Internet based EDI solutions are normally hosted by a company and you merly access this through
a __________________.

10) Direct EDI establishes a _____________ secure line between trading partners.

11) in EdI seller’s computers sends _________________ to buyers computers.

12) VAN stands for _________________________

13) ____________ EDI has limited adoption.

14) ANSI stands for _______________________________

15) the EDI VAN allows for ________________ access to electronic mailbox.

ANSWERS:

Multiple choice:

1. a 8. a

2. c 9. d

3. c 10. a

4. c 11. c

5. d 12. b

6. d 13) b

7. c 14) a

Fill in the blanks


10
1) Documents 9) Web Browser

2) MIME 10) Dedicated

3) Internet 11) Invoice

4) EDIFACT 12) value added network

5) Reduces 13) mobile

6) Electronic 14) American National Standard Institution

7) Private 15) 24X7

8) Software

Short Questions

1) What is EDI?

Electronic Data Interchange (EDI) is the electronic interchange of business information using a
standardized format; a process which allows one company to send information to another company
electronically rather than with paper. Business entities conducting business electronically are called
trading partners.

2) What is Direct EDI?

Direct EDI, which is sometimes called Point-to-Point EDI, has been used by companies for years. It
was viewed historically as an alternative to a VAN. It establishes a single secure line between two
business partners. In this approach, an organization must communicate with each business partner
individually, which can mean managing Hundreds or thousands of separate connections.

3) Write Legal issues of EDI?

• In EDI, legal issues and computer security are important.

• Companies that deal with EDI should take the services of a lawyer during the design

ofEDIapplications, so that evidentiary/admissibility safeguards are implemented.

4) What is Mobile EDI?

Exchange of EDI with the help of mobile.

5) What is EDI VAN?

A Value Added Network — or VAN — is a secure private network which acts as an

intermediary to enable EDI connectivity between trading partners and other VANs a searchable
index of the Web.

UNIT 5

11
Multiple Choice Questions

1)___________________ is a time period in which information has become a commodity that is


quickly and widely disseminated

a)21st Century b)Information Age c)Technology Age d)None of these

2)A software programme that is used to search information on WWW is called__________

a)Search Engine b)System Software c)Application S/W d)Module

3)Search Engine contains__________

a)Web crawler b)Database c)Interface d)All of these

4)The process of optimising search result to improve search engine rankings is__________

a)Search Engine Optimisation b)Search Engine development

c)Search Engine improvisation d)Search Engine planning

5)An online listing of businesses is called____________

a)Social media b)E-Marketing c)Directories d)Portal

6)A ___________ in Internet marketing is an e-mail that attempts to make recipients to copy or
share or reproduce it.

a)Banner b)Portal c)Spam mail d)E-mail chain letter

7)A ___________ is a good service that a business offers to its customers.

a)Place b)Price c)Product d)Promotion

8)In the 5 P’s of E-Marketing, Place is referred to ________.

a)Distribution b)Promotion c)Patent d)Price

9)A ____________ is a starting web page used to attract attention for a short time, before directing
to the website’s home page.

a)Banner b)Interstitials c)Splash screen d)Renting Space

10)An __________refers to a discount code or number that can be redeemed on a website.

a)Banner b)Online coupon c)Interstitials d)Splash Screen

11) which of the following is not a P of e-marketing

a) place b) price c) producer d) product

12) the alternative name of e-marketing is

a) web marketing b) internet marketing c) online marketing d) all of these

13) e-marketing provides:

12
a) local coverage b) global coverage c) national coverage d) none of these

14)e marketing is related with

a) online sales and purchases of securities

b) sale and purchases of goods and services through internet

c) both a and b

d) none of these

15) SEO stands for

a) Search engine optimizer b) Search engine optimization

c) Both a and b d) none

Fill in the blanks:

1)The WORLD WIDE WEB was developed by ___________________.

2)_______________ has reformed the whole marketing economy by offering new platforms and
media formats for marketers.

3)______________ is the Computer programme that searches databases and Internet sites for the
documents containing keywords specified by a user.

4)_____________is a software component that traverses the web to gather information in search
engine.

5)_____________is the process of making a list of all the occurrence of keyword phrases in
individual website.

6)____________is the process of increasing the quantity and quality of traffic to a business website
through organic search engine results.

7)_____________ in Internet Marketing is an e-mail that attempts to make recipients to copy or


share or reproduce it.

8)A___________ that places the customer as the centre of attention,with information flows passing
from a business to its customer for all its operations.

9)______________is a marketing technique that involves the use of the Internet as a medium to
obtain website traffic and target and deliver marketing messages to the right customers.

10)____________is an Activity while Digital Marketing is a process.

11) PPC stands for ______________________________

12) __________ is an example for search engine.

13) Branding is concerned with ______________ component of five P.

Answers:

13
1)b 6)d 11) c

2)a 7)c 12) d

3)d 8)a 13) b

4)a 9)c 14) b

5)c 10)b 15) b

Fill in the blanks.

1)Tim Berners Lee 8)Customer oriented value chain

2)Digital Marketing 9)Online advertising

3)Search Engine 10)Digital Advertising

4)Web crawler 11) pay per click

5)Indexing 12) google

6)Search Engine Optimisation(SEO) 13) product

7)Chain letter

14
Short Questions

1) What is E-Marketing?

E-marketing is the process ofmarketing a product or service using the Internet.


markerting not only includes marketing on the Internet, but also includes marketing done
via e-mail and wireless media. It uses a range of technologies to help connect
businesses to their customers.

2) What is E-advertising?

E-Advertising is a marketing strategy that involves the use of the Internet as a medium to
obtain website traffic and target and deliver marketing messages to the right customers. E-
advertising is geared toward defining markets through unique and useful applications.

3) What is Portal?

 Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or
proposes to be a major starting site for users when they get connected to the Web or that
users tend to visit as an anchor site. A number of large access providers offer portals to the
Web for their own users.

4) What is Spam Mail?

Email spam, also known as junk email, is unsolicited bulk messages sent through email. ...
Recipients of spam often have had their email addresses obtained by spambots, which are
automated programs that crawl the internet looking for email addresses. Spammers use
spambots to create email distribution lists.

5) What is Search Engine?

A search engine is a web-based tool that enables users to locate information on the World
Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search. ...
The information gathered by the spiders is used to create a searchable index of the Web.

15

You might also like