0% found this document useful (0 votes)
5 views37 pages

E Bussises QN

The document consists of multiple-choice questions, matching items, fill-in-the-blanks, and scenario-based questions related to e-business, finance, and technology. It covers topics such as e-payment systems, mobile commerce, cybersecurity, and the impact of e-taxation in Tanzania. Additionally, it includes composition questions that require analysis of mobile commerce and e-taxation systems in transforming economies and improving tax compliance.

Uploaded by

Meshack Msangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views37 pages

E Bussises QN

The document consists of multiple-choice questions, matching items, fill-in-the-blanks, and scenario-based questions related to e-business, finance, and technology. It covers topics such as e-payment systems, mobile commerce, cybersecurity, and the impact of e-taxation in Tanzania. Additionally, it includes composition questions that require analysis of mobile commerce and e-taxation systems in transforming economies and improving tax compliance.

Uploaded by

Meshack Msangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

BACHELOR DEGREE STUDENTS

REVIEW QUESTION
ACCOUNTS AND TRANSPORT
FINANCE

E – BUSINESS
SECTION A: MULTIPLE CHOICE QUESTIONS (MCQs).
Choose the correct answer and shade the corresponding letter.

1. Which of the following is a core function of an e-business storefront on the buyer side?
A. Verifying credit cards
B. Processing orders
C. Discovering and evaluating products
D. Updating web content

2. Which of these is a mobile payment method widely used in Tanzania?


A. ACH transfer
B. QR code via mobile money apps
C. SWIFT international payment
D. Point-of-sale credit

3. One of the critical issues in electronic payment systems includes:


A. Ease of use
B. Internet dependency
C. Security and privacy
D. Delivery tracking

4. A major advantage of e-taxation systems is:


A. Manual form processing
B. Multiple bureaucratic steps
C. Real-time tax filing and assessment
D. In-person verification of VAT
5. The Tanzania National e-Procurement System (TANePS) primarily supports:
A. Internal payroll automation
B. Government-to-government communications
C. Transparent public procurement bidding
D. Private sector inventory management

SECTION B: MATCHING ITEMS


Match the items in List A with the correct descriptions in List B
List A List B

. SSL Encryption A. Used to determine future market


behaviors
ii. CRM Systems B. Government system for e-filing and tax
return
iii. Predictive Analytics C. Communication protection in e-
payment transactions
iv. TRA e-Filing Portal D. Automates marketing, sales, and
customer support
v. ACH Transfer E. Batch-based electronic funds transfer
between banks

SECTION C: FILL-IN-THE-BLANKS.
Complete the sentences with the most appropriate terms.
6. __________ is a form of malicious software that monitors user activity and sends data to
attackers.
7. In public key encryption, the __________ is kept secret while the other key is shared.
8. In Tanzania, the government uses __________ to manage business payments for public
services.
9. An __________ auction involves sellers competing to offer the lowest price to the buyer.
10. A __________ is a web-based data gathering tool used to manage client purchasing behavior.
SECTION D: SCENARIO-BASED QUESTION
Case Study:
Mkubwa Traders is a Tanzanian SME specializing in agricultural inputs. They’ve recently
transitioned to an e-business platform with a storefront and mobile money integration. They've
experienced phishing attacks and data loss due to a recent malware incident. Management wants
to implement strong cybersecurity and digital marketing strategies.
Question:
Explain four specific steps Mkubwa Traders should take to (i) strengthen e-business security and
(ii) enhance customer engagement using digital tools.

SECTION E: COMPOSITION/ESSAY QUESTION


Answer in not less than 200 words.
Discuss the role of mobile commerce in transforming rural economies in East Africa. Use
examples from Tanzania, including mobile financial services like M-Pesa or Tigo Pesa.
Highlight both benefits and limitations.
PAPER 02
SECTION A: MULTIPLE CHOICE QUESTIONS
1. Which of the following technologies is commonly used for inventory management in e-
business logistics?
A. GPS tracking systems
B. RFID systems
C. CRM platforms
D. ACH payment gateways

2. What is the primary function of a payment gateway in e-business?


A. To store customer data
B. To encrypt and process financial transactions
C. To manage product catalogs
D. To track customer behavior

3. Which of the following is an example of “dynamic pricing” in e-commerce?


A. Fixed product prices across all platforms
B. Discounts applied during checkout
C. Prices adjusted based on demand and supply
D. Seasonal promotions

4. The “Uniform Customs and Practice for Documentary Credits (UCP)” is primarily associated
with:
A. E-taxation systems
B. E-payment platforms
C. Electronic letters of credit
D. Mobile commerce applications

5. Which of the following is a “security measure” used to protect sensitive data in e-business?
A. Responsive design
B. SSL encryption
C. Predictive analytics
D. Shopping cart integration

SECTION B: MATCHING ITEMS


Match the items in List A with the correct descriptions in List B

List A List B

TANePS Enables secure payment processing

QR Code Payments B. Government e-procurement system

ACH Debit Transfer C. Allows users to scan and pay via mobile apps

Payment Gateway D. Withdraws funds from sender’s account

EFD Machines E. Used for tax compliance in retail businesses

SECTION C:
Complete the sentences with the most appropriate terms.
6. __________ is a type of malware that replicates itself without needing activation by the host.
7. In Tanzania, the __________ system is used for electronic customs management.
8. A __________ is a digital tool used to track customer interactions and improve marketing
strategies.
9. __________ authentication uses fingerprints or facial recognition for secure transactions.
10. The __________ auction model involves buyers competing to offer the highest price for a
product.

SECTION D: SCENARIO-BASED QUESTION


Case Study:
A Tanzanian logistics company, Safari Freight, is struggling with inefficiencies in tracking
shipments and managing warehouse inventory. They are considering adopting RFID technology
and GPS tracking systems to improve operations.
Question:
Describe three benefits Safari Freight could gain from implementing RFID and GPS
technologies in their logistics operations.

SECTION E: COMPOSITION/ESSAY QUESTION


Answer in not less than 200 words.
Analyze the impact of e-taxation systems like TRA’s e-filing portal on improving tax
compliance and reducing fraud in Tanzania. Include examples of features such as electronic
fiscal devices (EFDs) and online tax return filing.
1. Which of the following is a key advantage of e-business systems?
A. Increased operational costs
B. Limited customer reach
C. Enhanced global accessibility
D. Dependency on manual processes

2. What is the primary purpose of encryption in e-business?


A. To compress large files
B. To protect sensitive data from unauthorized access
C. To improve website loading speed
D. To automate customer service

3. Which of the following is an example of business-to-business (B2B) e-commerce?


A. A customer purchasing groceries online
B. A company buying raw materials from a supplier’s website
C. A student subscribing to an online learning platform
D. A retailer selling products to individual customers

4. What does RFID stand for in logistics and inventory management?


A. Radio Frequency Identification
B. Real-time Freight Integration Device
C. Remote File Information Database
D. Rapid Freight Inventory Deployment
5. Which of the following is a challenge associated with mobile commerce in Tanzania?
A. High smartphone penetration
B. Limited internet connectivity in rural areas
C. Availability of mobile payment platforms
D. Integration with global e-commerce systems
UNIVERSITY OF EAST AFRICA
E-BUSINESS MODULE
SECTION A: MULTIPLE CHOICE QUESTIONS (15 Marks)
1. What is the process of converting plain text into unreadable code to protect sensitive
information?
A. Decryption
B. Encryption
C. Compression
D. Authentication

2. What is a unique identifier used to track and manage products in inventory systems?
A. QR Code
B. Barcode
C. SKU
D. Serial Number

3. What is the term for the illegal acquisition of sensitive information through deceptive emails
or websites?
A. Hacking
B. Spoofing
C. Phishing
D. Spamming

4. What is a secure platform that facilitates online financial transactions in e-commerce?


A. CRM System
B. Inventory Manager
C. Shopping Cart
D. Payment Gateway
5. What type of malware encrypts files and demands payment for their decryption?
A. Trojan
B. Spyware
C. Adware
D. Ransomware

6. Which protocol ensures secure communication between a web browser and a server?
A. SMTP
B. FTP
C. SSL
D. HTTP

7. What is the process of analyzing customer data to predict future purchasing behavior?
A. Market Research
B. Customer Profiling
C. Data Mining
D. Predictive Analytics

8. What is a digital tool used to manage customer relationships and interactions?


A. Payment Gateway
B. ERP System
C. Inventory Manager
D. CRM System
9. What is a marketing strategy that involves promoting products through social media
platforms?
A. Affiliate Marketing
B. Social Media Marketing
C. Content Marketing
D. Email Marketing

10. Which e-commerce model involves businesses selling products directly to consumers?
A. B2B
B. B2C
C. C2C
D. C2B

11. What technology enables contactless payments using smartphones or smart cards?
A. Bluetooth
B. RFID
C. Wi-Fi
D. NFC

12. What is a document that provides detailed information about a product, including its price
and specifications?
A. Invoice
B. Catalog
C. Product Sheet
D. Quotation
13. What is the process of ensuring that a website is optimized for mobile devices?
A. SEO
B. Web Development
C. Responsive Design
D. Mobile Optimization

14. In logistics, what refers to the process of moving goods from one location to another?
A. Warehousing
B. Inventory Management
C. Transportation
D. Order Fulfillment

15. What type of fraud involves attackers intercepting and altering communication between two
parties without their knowledge?
A. Social Engineering
B. Spoofing
C. Man-in-the-Middle Attack
D. Phishing
SECTION B: MULTIPLE CHOICE QUESTIONS (15 Marks)
1. What is the process of converting data into a format that can only be read by authorized users?
A. Compression
B. Encryption
C. Decryption
D. Authentication
2. What is a unique identifier used to track shipments in logistics systems?
A. QR Code
B. Tracking Number
C. SKU
D. Barcode
3. What is the term for the unauthorized access and use of someone’s personal data?
A. Identity Theft
B. Phishing
C. Hacking
D. Spoofing
4. What is a tool that verifies and processes online payments securely in e-commerce?
A. Shopping Cart
B. CRM System
C. Payment Gateway
D. Inventory Manager
5. What type of malware disguises itself as legitimate software to gain access to systems?
A. Spyware
B. Trojan
C. Ransomware
D. Adware
6. Which protocol is used to transfer files securely over the internet?
A. HTTP
B. SFTP
C. SMTP
D. FTP
7. What is the process of segmenting customers based on their purchasing behavior?
A. Market Research
B. Customer Segmentation
C. Data Mining
D. Predictive Analytics
8. What is a digital tool used to automate marketing campaigns and track their performance?
A. CRM System
B. Marketing Automation Software
C. ERP System
D. Payment Gateway
9. What is a strategy that involves using influencers to promote products on social media?
A. Affiliate Marketing
B. Influencer Marketing
C. Content Marketing
D. Social Media Marketing
10. Which e-commerce model involves businesses selling products directly to other businesses?
A. B2B
B. B2C
C. C2C
D. C2B
11. What technology uses near-field communication for secure transactions?
A. RFID
B. NFC
C. Bluetooth
D. Wi-Fi
12. What is a document that outlines the terms and conditions of a business agreement?
A. Invoice
B. Contract
C. Product Sheet
D. Quotation
13. What is the process of ensuring that a website ranks higher in search engine results?
A. Web Development
B. SEO
C. Mobile Optimization
D. Content Marketing
14. In logistics, what refers to the process of storing goods in warehouses before distribution?
A. Transportation
B. Inventory Management
C. Warehousing
D. Order Fulfillment
15. What type of cyberattack involves attackers using fake websites to steal sensitive
information?
A. Spoofing
B. Phishing
C. Man-in-the-Middle Attack
D. Social Engineering
SECTION C: MULTIPLE CHOICE QUESTIONS (15 Marks)
1. What is the process of converting a message into a secret code to prevent unauthorized access?
A. Compression
B. Encryption
C. Decryption
D. Authentication
2. What is a unique identifier used to track and manage assets in a business?
A. Barcode
B. QR Code
C. Asset Tag
D. SKU
3. What is the term for the practice of sending fraudulent messages to trick individuals into
revealing sensitive information?
A. Spoofing
B. Phishing
C. Hacking
D. Spamming
4. What is a secure platform that allows customers to make payments online?
A. CRM System
B. Inventory Manager
C. **Payment Gateway**
D. Shopping Cart
5. What type of malware is designed to spy on users and collect their personal information?
A. Trojan
B. Spyware
C. Ransomware
D. Adware
6. Which protocol is used to send emails over the internet?
A. HTTP
B. FTP
C. SMTP
D. SSL
7. What is the process of analyzing large datasets to discover patterns and trends?
A. Predictive Analytics
B. Market Research
C. Data Mining
D. Customer Profiling
8. What is a digital tool used to track and manage a company’s inventory?
A. CRM System
B. Inventory Management Software
C. ERP System
D. Payment Gateway
9. What is a marketing strategy that involves creating valuable content to attract customers?
A. Affiliate Marketing
B. Content Marketing
C. Social Media Marketing
D. Email Marketing
10. Which e-commerce model involves consumers selling products directly to other consumers?
A. B2B
B. B2C
C. C2C
D. C2B
11. What technology is commonly used for tracking shipments in logistics?
A. NFC
B. RFID
C. Bluetooth
D. Wi-Fi
12. What is a document that provides an estimate of the cost of goods or services?
A. Invoice
B. Product Sheet
C. Quotation
D. Contract
13. What is the process of designing a website to adapt to different screen sizes and devices?
A. Mobile Optimization
B. Responsive Design
C. SEO
D. Web Development
14. In logistics, what refers to the process of fulfilling customer orders?
A. Warehousing
B. Inventory Management
C. Transportation
D. Order Fulfillment
15. What type of cyberattack involves attackers pretending to be a trusted entity to gain sensitive
information?
A. Spoofing
B. Phishing
C. Man-in-the-Middle Attack
D. Social Engineering

SECTION D: MULTIPLE CHOICE QUESTIONS (15 Marks)


1. What is the process of decoding encrypted data to make it readable again?
A. Compression
B. Decryption
C. Encryption
D. Authentication
2. What is a unique identifier used to track and manage products in a warehouse?
A. QR Code
B. SKU
C. Barcode
D. Serial Number
3. What is the term for the unauthorized use of computer systems to steal sensitive information?
A. Hacking
B. Phishing
C. Spoofing
D. Spamming
4. What is a secure platform that facilitates online transactions between buyers and sellers?
A. CRM System
B. Inventory Manager
C. Payment Gateway
D. Shopping Cart
5. What type of malware displays unwanted advertisements on a user’s device?
A. Trojan
B. Spyware
C. Adware
D. Ransomware

6. Which protocol is used to securely transfer data over the internet?


A. HTTP
B. FTP
C. HTTPS
D. SMTP

7. What is the process of analyzing customer data to improve marketing strategies?


A. Market Research
B. Customer Profiling
C. Data Mining
D. Predictive Analytics
8. What is a digital tool used to manage a company’s financial transactions?
A. CRM System
B. Accounting Software
C. ERP System
D. Payment Gateway
9. What is a marketing strategy that involves promoting products through affiliate websites?
A. Affiliate Marketing
B. Social Media Marketing
C. Content Marketing
D. Email Marketing
10. Which e-commerce model involves consumers selling products directly to businesses?
A. B2B
B. B2C
C. C2C
D. C2B
11. What technology is commonly used for contactless payments?
A. RFID
B. NFC
C. Bluetooth
D. Wi-Fi
12. What is a document that provides detailed specifications of a product?
A. Invoice
B. Product Sheet
C. Catalog
D. Quotation
13. What is the process of optimizing a website to improve its visibility in search engine results?
A. Web Development
B. SEO
C. Mobile Optimization
D. Responsive Design
14. In logistics, what refers to the process of managing stock levels to meet customer demand?
A. Warehousing
B. Inventory Management
C. Transportation
D. Order Fulfillment
15. What type of cyberattack involves attackers intercepting communication between two
parties?
A. Social Engineering
B. Spoofing
C. Man-in-the-Middle Attack
D. Phishing

SECTION E: MULTIPLE CHOICE QUESTIONS (15 Marks)


1. What is the process of compressing data to reduce its size for storage or transmission?
A. Compression
B. Encryption
C. Decryption
D. Authentication
2. What is a unique identifier used to track shipments in logistics systems?
A. QR Code
B. Tracking Number
C. SKU
D. Barcode
3. What is the term for the unauthorized access and use of someone’s personal data?
A. Identity Theft
B. Phishing
C. Hacking
D. Spoofing
4. What is a tool that verifies and processes online payments securely in e-commerce?
A. Shopping Cart
B. CRM System
C. Payment Gateway
D. Inventory Manager
5. What type of malware disguises itself as legitimate software to gain access to systems?
A. Spyware
B. Trojan
C. Ransomware
D. Adware
6. Which protocol is used to transfer files securely over the internet?
A. HTTP
B. SFTP
C. SMTP
D. FTP
7. What is the process of segmenting customers based on their purchasing behavior?
A. Market Research
B. Customer Segmentation
C. Data Mining
D. Predictive Analytics
8. What is a digital tool used to automate marketing campaigns and track their performance?
A. CRM System
B. Marketing Automation Software
C. ERP System
D. Payment Gateway
9. What is a strategy that involves using influencers to promote products on social media?
A. Affiliate Marketing
B. Influencer Marketing
C. Content Marketing
D. Social Media Marketing
10. Which e-commerce model involves businesses selling products directly to other businesses?
A. B2B
B. B2C
C. C2C
D. C2B
11. What technology uses near-field communication for secure transactions?
A. RFID
B. NFC
C. Bluetooth
D. Wi-Fi
12. What is a document that outlines the terms and conditions of a business agreement?
A. Invoice
B. Contract
C. Product Sheet
D. Quotation
13. What is the process of ensuring that a website ranks higher in search engine results?
A. Web Development
B. SEO
C. Mobile Optimization
D. Content Marketing
14. In logistics, what refers to the process of storing goods in warehouses before distribution?
A. Transportation
B. Inventory Management
C. Warehousing
D. Order Fulfillment
15. What type of cyberattack involves attackers using fake websites to steal sensitive
information?
A. Spoofing
B. Phishing
C. Man-in-the-Middle Attack
D. Social Engineering

SECTION G: MULTIPLE CHOICE QUESTIONS (15 Marks)


1. What is the process of verifying the identity of a user before granting access to a system?
A. Encryption
B. Authentication
C. Authorization
D. Compression
2. What is a unique identifier used to track and manage products in a retail store?
A. QR Code
B. Barcode
C. SKU
D. Serial Number
3. What is the term for the practice of creating fake websites to steal sensitive information?
A. Spoofing
B. Phishing
C. Hacking
D. Spamming
4. What is a secure platform that facilitates online transactions between buyers and sellers?
A. CRM System
B. Inventory Manager
C. Payment Gateway
D. Shopping Cart
5. What type of malware encrypts a user’s data and demands payment for its release?
A. Trojan
B. Spyware
C. Ransomware
D. Adware
6. Which protocol is used to securely transfer data over the internet?
A. HTTP
B. FTP
C. HTTPS
D. SMTP
7. What is the process of analyzing customer data to predict future purchasing behavior?
A. Market Research
B. Customer Profiling
C. Predictive Analytics
D. Data Mining
8. What is a digital tool used to manage a company’s customer relationships?
A. CRM System
B. Accounting Software
C. ERP System
D. Payment Gateway
9. What is a marketing strategy that involves promoting products through email campaigns?
A. Affiliate Marketing
B. Social Media Marketing
C. Content Marketing
D. Email Marketing
10. Which e-commerce model involves businesses selling products directly to consumers?
A. B2B
B. B2C
C. C2C
D. C2B
11. What technology is commonly used for tracking inventory in warehouses?
A. NFC
B. RFID
C. Bluetooth
D. Wi-Fi
12. What is a document that provides detailed specifications of a product?
A. Invoice
B. Product Sheet
C. Catalog
D. Quotation
13. What is the process of optimizing a website to improve its visibility in search engine results?
A. Web Development
B. SEO
C. Mobile Optimization
D. Responsive Design
14. In logistics, what refers to the process of managing stock levels to meet customer demand?
A. Warehousing
B. Inventory Management
C. Transportation
D. Order Fulfillment
UNIVERSITY OF EAST AFRICA
E-BUSINESS MODULE
SECTION A: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms.
1. __________ is a type of malware that encrypts files and demands payment for
decryption.
2. In Tanzania, the __________ system is used for electronic customs management.
3. A __________ is a digital tool used to track customer interactions and improve
marketing strategies.
4. __________ authentication uses fingerprints or facial recognition for secure
transactions.
5. The __________ auction model involves buyers competing to offer the highest price for
a product.
6.
SECTION: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms.
1. __________ is the process of converting data into a secure format to prevent unauthorized
access.
2. In e-commerce, a __________ is a virtual shopping cart where customers can store items
before purchasing.
3. __________ is a technology that uses small chips to track and manage inventory in real time.
4. The __________ model in e-commerce involves businesses selling products or services
directly to other businesses.
5. __________ is a type of cyberattack where attackers trick users into revealing sensitive
information by posing as a trustworthy entity.
6. In Tanzania, the __________ platform is used for electronic public procurement processes.
7. __________ is the practice of analyzing customer data to predict future purchasing behavior.
8. A __________ is a unique identifier used to track shipments in logistics systems.
9. __________ is a mobile payment platform widely used in Tanzania for peer-to-peer
transactions.
10. The __________ protocol is used to secure communication between a web browser and a
server.
11. __________ is a type of auction where the price decreases until a buyer accepts the offer.
12. In e-business, a __________ is a software application used to manage customer relationships
and interactions.
13. __________ is the process of verifying the identity of a user before granting access to a
system.
14. A __________ is a digital ledger used to record transactions in blockchain technology.
15. __________ is a marketing strategy that involves sending promotional messages directly to
customers via email.

SECTION: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms.
1. __________ is the process of converting plain text into unreadable code to protect sensitive
information.
2. A __________ is a software tool that allows businesses to analyze and visualize data for
decision-making.
3. __________ is the term used to describe the illegal copying and distribution of digital content.
4. In e-commerce, a __________ is a secure online platform that facilitates financial transactions
between buyers and sellers.
5. __________ is a type of malware that locks users out of their systems until a ransom is paid.
6. The __________ system is used in Tanzania for electronic customs declarations and
management.
7. __________ is the process of tailoring online content and advertisements to individual users
based on their preferences.
8. A __________ is a unique code that identifies a specific product in inventory management
systems.
9. __________ is the practice of using social media platforms to promote products and engage
with customers.
10. The __________ model in e-commerce involves customers selling products or services
directly to other customers.
11. __________ is a technology that enables contactless payments using smartphones or smart
cards.
12. A __________ is a document that provides detailed information about a product, including
its price and specifications.
13. __________ is the process of ensuring that a website is optimized for mobile devices.
14. In logistics, __________ refers to the process of moving goods from one location to another.
15. __________ is a type of fraud where attackers intercept and alter communication between
two parties without their knowledge.

SECTION: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms.
1. __________ is the process of converting plain text into unreadable code to protect sensitive
information during transmission.
2. A __________ is a unique identifier used to track and manage products in inventory systems.
3. __________ is the term for the illegal acquisition of sensitive information through deceptive
emails or websites.
4. In e-commerce, a __________ is a secure platform that facilitates online financial transactions.
5. __________ is a type of malware that encrypts files and demands payment for their
decryption.
6. The __________ protocol ensures secure communication between a web browser and a server.
7. __________ is the process of analyzing customer data to predict future purchasing behavior.
8. A __________ is a digital tool used to manage customer relationships and interactions.
9. __________ is a marketing strategy that involves promoting products through social media
platforms.
10. The __________ model in e-commerce involves businesses selling products directly to
consumers.
11. __________ is a technology that enables contactless payments using smartphones or smart
cards.
12. A __________ is a document that provides detailed information about a product, including
its price and specifications.
13. __________ is the process of ensuring that a website is optimized for mobile devices.
14. In logistics, __________ refers to the process of moving goods from one location to another.
15. __________ is a type of fraud where attackers intercept and alter communication between
two parties without their knowledge.

SECTION: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms.
1. __________ is the process of converting data into a secure format to prevent unauthorized
access.
2. A __________ is a software tool that allows businesses to analyze and visualize data for
decision-making.
3. __________ is the term used to describe the illegal copying and distribution of digital content.
4. In e-commerce, a __________ is a secure online platform that facilitates financial transactions
between buyers and sellers.
5. __________ is a type of malware that locks users out of their systems until a ransom is paid.
6. The __________ system is used in Tanzania for electronic customs declarations and
management.
7. __________ is the process of tailoring online content and advertisements to individual users
based on their preferences.
8. A __________ is a unique code that identifies a specific product in inventory management
systems.
9. __________ is the practice of using social media platforms to promote products and engage
with customers.
10. The __________ model in e-commerce involves customers selling products or services
directly to other customers.
11. __________ is a technology that enables contactless payments using smartphones or smart
cards.
12. A __________ is a document that provides detailed information about a product, including
its price and specifications.
13. __________ is the process of ensuring that a website is optimized for mobile devices.
14. In logistics, __________ refers to the process of moving goods from one location to another.
15. __________ is a type of fraud where attackers intercept and alter communication between
two parties without their knowledge.
SECTION: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms
1. __________ is the process of analyzing large datasets to uncover patterns and trends.
2. A __________ is a unique identifier used to track shipments in logistics systems.
3. __________ is the term for the unauthorized access and use of someone’s personal data.
4. In e-commerce, a __________ is a tool that verifies and processes online payments securely.
5. __________ is a type of malware that disguises itself as legitimate software to gain access to
systems.
6. The __________ protocol is used to transfer files securely over the internet.
7. __________ is the process of segmenting customers based on their purchasing behavior.
8. A __________ is a digital tool used to automate marketing campaigns and track their
performance.
9. __________ is a strategy that involves using influencers to promote products on social media.
10. The __________ model in e-commerce involves businesses selling products directly to other
businesses.
11. __________ is a technology that uses near-field communication for secure transactions.
12. A __________ is a document that outlines the terms and conditions of a business agreement.
13. __________ is the process of ensuring that a website ranks higher in search engine results.
14. In logistics, __________ refers to the process of storing goods in warehouses before
distribution.
15. __________ is a type of cyberattack where attackers use fake websites to steal sensitive
information.
SECTION: FILL-IN-THE-BLANKS
Complete the sentences with the most appropriate terms.
1. __________ is the process of converting plain text into unreadable code to protect sensitive
information during transmission.
2. A __________ is a unique identifier used to track and manage products in inventory systems.
3. __________ is the term for the illegal acquisition of sensitive information through deceptive
emails or websites.
4. In e-commerce, a __________ is a secure platform that facilitates online financial transactions.
5. __________ is a type of malware that encrypts files and demands payment for their
decryption.
6. The __________ protocol ensures secure communication between a web browser and a server.
7. __________ is the process of analyzing customer data to predict future purchasing behavior.
8. A __________ is a digital tool used to manage customer relationships and interactions.
9. __________ is a marketing strategy that involves promoting products through social media
platforms.
10. The __________ model in e-commerce involves businesses selling products directly to
consumers.
11. __________ is a technology that enables contactless payments using smartphones or smart
cards.
12. A __________ is a document that provides detailed information about a product, including
its price and specifications.
13. __________ is the process of ensuring that a website is optimized for mobile devices.
14. In logistics, __________ refers to the process of moving goods from one location to another.
15. __________ is a type of fraud where attackers intercept and alter communication between
two parties without their knowledge.
UNIVERSITY OF EAST AFRICA
E-BUSINESS MODULE

SECTION D: TRUE/FALSE QUESTIONS


Indicate whether the following statements are True (T) or False (F).
11. TANePS is a platform used for managing government payroll systems.
12. SSL encryption ensures secure communication between a user’s browser and a website.
13. Predictive analytics is used to analyze past data and forecast future trends.
14. EFD machines are primarily used for inventory management in warehouses.
15. Mobile money platforms like M-Pesa are examples of peer-to-peer payment systems.

SECTION: TRUE/FALSE QUESTIONS


Indicate whether the following statements are True (T) or False (F).
1. Predictive analytics is used to analyze past data and forecast future trends.
2. SSL encryption ensures secure communication between a user’s browser and a website.
3. EFD machines are primarily used for inventory management in warehouses.
4. TANePS is a platform used for managing government payroll systems.
5. Mobile money platforms like M-Pesa are examples of peer-to-peer payment systems.
6. Blockchain technology is used to create decentralized and secure digital ledgers.
7. QR code payments require users to scan a code using a mobile device to complete
transactions.
8. Phishing is a type of cyberattack that involves encrypting files and demanding payment for
decryption.
9. CRM systems are used to manage customer relationships and interactions.
10. A payment gateway is responsible for encrypting and processing financial transactions in e-
commerce.
11. RFID technology is used to track inventory and shipments using radio frequency signals.
12. The B2C model in e-commerce involves businesses selling products directly to other
businesses.
13. TANePS is Tanzania’s electronic public procurement system.
14. Ransomware is a type of malware that locks users out of their systems until a ransom is paid.
15. Social media marketing involves promoting products and engaging with customers through
social media platforms.]

SECTION: TRUE/FALSE QUESTIONS


Indicate whether the following statements are True (T) or False (F).
1. Encryption is the process of converting data into a secure format to prevent unauthorized
access.
2. Predictive analytics is used to analyze customer data and predict future purchasing behavior.
3. TANePS is Tanzania’s electronic customs management system.
4. QR code payments allow users to scan a code using a mobile device to complete transactions.
5. A payment gateway is a tool used to manage inventory in e-commerce systems.
6. Phishing is a type of cyberattack where attackers trick users into revealing sensitive
information.
7. CRM systems are used to track and manage customer interactions.
8. Blockchain technology is used to create centralized digital ledgers.
9. Ransomware is a type of malware that encrypts files and demands payment for decryption.
10. Social media marketing involves sending promotional messages directly to customers via
email.
11. RFID technology is used to track inventory and shipments using radio frequency signals.
12. The B2B model in e-commerce involves businesses selling products directly to other
businesses.
13. SSL encryption ensures secure communication between a web browser and a server.
14. Mobile money platforms like M-Pesa are examples of peer-to-peer payment systems.
15. EFD machines are used for tax compliance in retail businesses.
SECTION: TRUE/FALSE QUESTIONS (15 Marks)
1. TANePS is designed to support private sector e-commerce sales platforms.
2. SSL encryption helps ensure that data transmitted between a browser and server remains
secure.
3. A customer profile in CRM software typically includes purchase history, preferences, and
contact information.
4. QR code payments can only be completed using a desktop computer.
5. Predictive analytics can help a business anticipate customer needs and adjust marketing
strategies accordingly.
6. A barcode and an RFID tag perform exactly the same function in inventory tracking.
7. M-Pesa and Tigo Pesa are examples of electronic procurement systems.
8. Malware refers to any software designed to perform beneficial functions for the user.
9. Responsive web design ensures that a website adapts well across smartphones, tablets, and
desktops.
10. A denial-of-service (DoS) attack can make an e-business site temporarily inaccessible to
customers.
11. EFD machines are required in many Tanzanian retail outlets to support accurate tax
reporting.
12. Customer segmentation allows businesses to target specific groups with tailored messaging.
13. Mobile apps are not considered part of the e-business ecosystem.
14. Phishing scams often involve emails or websites pretending to be trusted sources.
15. The B2B e-commerce model includes transactions between consumers and businesses.

You might also like