E-Com Internal-2 QB
E-Com Internal-2 QB
Unit 1
F ill In The Blanks:
1) E-Commerce stands for ___________________________ .
2) E-Commerce is doing_____________________ online.
3) E-commerce leads to ______________in cost.
4) Internet Technology is available _____________across the world.
5) Website is one of the main ___________ of e-commerce.
6) The lack of _______________ is one of the biggest concerns for Internet Consumers.
7) E-Commerce increases purchasing opportunities for _____________________
8) The service of Middleman in e-commerce is _____________________
9) E-Banking is a form of _____________________ Commerce.
10)E-Bay is the example of __________________of commerce.
11) C2G stands for _________________.
12) M-Commerce means _______________.
13) WWW stands for _______________________.
14) Internet is _______________________.
15) Amazon comes under __________________business classification.
Answers:
multiple Choices:
1
a) Business b) Research c) Logging d) Chatting
3) Which of the following is the advantage of e-commerce? [ ]
a) 24x7 coverage b)geographic reach c) Information Sharing d) All of above
4) Which of the following is not E-commerce activity [ ]
a)A2B b) C2C c) B2B d) G2G
5) EDI means [ ]
a) Electronic Data Exchange b) Electronic Data Interchange
c) Ecommerce Direct Entry d)None
6) Amazon.com comes under the following model [ ]
a) B2B b) B2C c) C2C d) C2B
7) Which of the following is the major problem of E-Commerce [ ]
a) Information b) Security c)Sharing d)None of above
8) What is P2P E-commerce business classification [ ]
a) Peer to Peer b) Point to Peer c) Point to Peer d)None of above
9) Which of the following is not B2C e-commerce [ ]
a)Amazon.com b) E-bay.com c) Dell.com d) lastminute.com
10) Which of the following type of e-commerce allow customer to sell product directly to another
customer [ ]
a) C2C b) C2B c) C2G d) C2P
11) Which of the following is not a model of e-commerce? [ ]
a) D2D b) B2B c) C2C d) B2C
12) EFT Stands for ________________ [ ]
a) Emerging Financial Transfer b) Electronic Fund Transfer
c) Electronic Financial Transfer d) Emerging Fund Transfer
13) E-Marketing increases __________________ [ ]
a) Interactivity b) Risk c) Cost d) None of these
14) E-marketing provides: [ ]
a) Local coverage b) Global Coverage c) National Coverage d) None of these
15) Which of the following is the method of E-marketing? [ ]
a) Blogging b) Social Media c) Email d) All of these
Answers:
1) a 6)b 11) a
2) a 7) b 12) b
3) d 8) a 13) a
4) a 9) b 14) b
5) b 10) a 15) d
Short Questions:
2
1) What is E-Commerce?
E-commerce is the activity of buying or selling of products on online services or over the
Internet.Electronic commerce draws on technologies such as mobile ...
2) What is E-Business?
E-business (electronic business) is the conduct of business processes on the internet. These
e-business processes include buying and selling products, supplies and services; servicing
customers; processing payments; managing production control; collaborating with business
partners
3) What is E-Marketing?
Online marketing is the practice of leveraging web-based channels to spread a message
about a company's brand, products, or services to its potential customers.
4) What is M-Commerce?
M-Commerce also called as Mobile Commerce involves the online transactions through the
wireless handheld devices such as mobile phone, laptop,
5) What is B2B?
Businesss 2 Business
Unit 2
Fill in the blanks
1) TCP stands for _____________________
2) E-Security stands for ________________ security.
3) Firewall can be implemented both hardware and _____________________.
4) SSL stands for _______________________.
5) M-Commerce stands for _____________________.
6) The two types of encryption are ________________ and ____________________
7) There are __________________ classes in IP Address
8) S-HTTP stands for _______________________
9) There are ________________ in OSI
10) ______________ harms your computer.
11) In computers, a ________ is a piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
12) An attempt to make a computer resource unavailable to its intended users is called ____ attack
13) The encryption algorithms and digital signature schemes are ____________
14) A ______ is defined as personal trait that can be used to identify or verify the claimed identity of
an individual
15) Finger print recognition and facial recognition are examples of ___________Security system.
4
10) Virus 13) Crypotographic
11) Virus 14) Bio-metric
12) DoS 15) Bio-metric
2) a 7) a 12) c
3) b 8) a 13) c
4) d 9) c 14) b
5) a 10) a 15) b
UNIT 3
Multiple Choice Questions
5
3) Debit Card also known as [ ]
a) 2 b) 3 c) 4 d) 5
6
2) ____________________ is a financial exchange that takes place online between buyers
and sellers.
4) ______________ card immediately transfer the amount of charges from the card holders
5) _________ card has a present spending limit based on the users credit limit.
8) ______________ is used for transferring money from one bank account directly toanother
without any proper money changing hands.
11) ___________________ is an interaction model between consumer and merchants for online
commerce.
13) ____________ allows consumer to store multiple credit cards, debit card and bank a/c number.
Answers:
Multiple Choice – Answers
5)c 10)d
Short Questions
Digital currency is a form of currency that is available only in digital or electronic form, and not in
physical form. It is also called digital money, electronic money, electronic currency, or cyber
cash.
4) What is E-Cheque?
An electronic version or representation of a paper cheque. The account holder writes an e-
check (or e-cheque) using a computer or other type of electronic device and transmits the e-
cheque to the payee electronically. Like paper cheques, e-checks are signed by the payer and
endorsed by the payee.
smart card, chip card, or integrated circuit card (ICC) is a physical electronic authorization device,
used to control access to a resource. It is typically a plastic credit card-sized card with an
embedded integrated circuit chip.Many smart cards include a pattern of metal contacts to
electrically connect to the internal chip.
UNIT 4
1) EDI means [ ]
3) EDI is necessary in [ ]
8
a) B2C e-commerce b) C2C e-commerce
7) EDI uses which of the following to allow the computers of two different companies to talk to one
another [ ]
15) SFTP
9
Fill the Blanks
Computer system.
2) EDI over internet uses ____________ to attach EDI forms to e-mail messages.
6) EDI regarded as the standard for the _____________ exchange of documents from
8) EDI ____________ allows you to exchange data directly with back office system.
9) Internet based EDI solutions are normally hosted by a company and you merly access this through
a __________________.
10) Direct EDI establishes a _____________ secure line between trading partners.
15) the EDI VAN allows for ________________ access to electronic mailbox.
ANSWERS:
Multiple choice:
1. a 8. a
2. c 9. d
3. c 10. a
4. c 11. c
5. d 12. b
6. d 13) b
7. c 14) a
8) Software
Short Questions
1) What is EDI?
Electronic Data Interchange (EDI) is the electronic interchange of business information using a
standardized format; a process which allows one company to send information to another company
electronically rather than with paper. Business entities conducting business electronically are called
trading partners.
Direct EDI, which is sometimes called Point-to-Point EDI, has been used by companies for years. It
was viewed historically as an alternative to a VAN. It establishes a single secure line between two
business partners. In this approach, an organization must communicate with each business partner
individually, which can mean managing Hundreds or thousands of separate connections.
• Companies that deal with EDI should take the services of a lawyer during the design
intermediary to enable EDI connectivity between trading partners and other VANs a searchable
index of the Web.
UNIT 5
11
Multiple Choice Questions
4)The process of optimising search result to improve search engine rankings is__________
6)A ___________ in Internet marketing is an e-mail that attempts to make recipients to copy or
share or reproduce it.
9)A ____________ is a starting web page used to attract attention for a short time, before directing
to the website’s home page.
12
a) local coverage b) global coverage c) national coverage d) none of these
c) both a and b
d) none of these
2)_______________ has reformed the whole marketing economy by offering new platforms and
media formats for marketers.
3)______________ is the Computer programme that searches databases and Internet sites for the
documents containing keywords specified by a user.
4)_____________is a software component that traverses the web to gather information in search
engine.
5)_____________is the process of making a list of all the occurrence of keyword phrases in
individual website.
6)____________is the process of increasing the quantity and quality of traffic to a business website
through organic search engine results.
8)A___________ that places the customer as the centre of attention,with information flows passing
from a business to its customer for all its operations.
9)______________is a marketing technique that involves the use of the Internet as a medium to
obtain website traffic and target and deliver marketing messages to the right customers.
Answers:
13
1)b 6)d 11) c
7)Chain letter
14
Short Questions
1) What is E-Marketing?
2) What is E-advertising?
E-Advertising is a marketing strategy that involves the use of the Internet as a medium to
obtain website traffic and target and deliver marketing messages to the right customers. E-
advertising is geared toward defining markets through unique and useful applications.
3) What is Portal?
Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or
proposes to be a major starting site for users when they get connected to the Web or that
users tend to visit as an anchor site. A number of large access providers offer portals to the
Web for their own users.
Email spam, also known as junk email, is unsolicited bulk messages sent through email. ...
Recipients of spam often have had their email addresses obtained by spambots, which are
automated programs that crawl the internet looking for email addresses. Spammers use
spambots to create email distribution lists.
A search engine is a web-based tool that enables users to locate information on the World
Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search. ...
The information gathered by the spiders is used to create a searchable index of the Web.
15