Professional Documents
Culture Documents
III SEM - E-Commerce (Bcom)
III SEM - E-Commerce (Bcom)
BCom
IIISem
MultipleChoiceQuestions
1. Whichofthefollowingdescribesecommerce?
a. Doingbusinesselectronically
b. Doingbusiness
c. Saleofgoods
d. Alloftheabove
Answer:A
2. Whichofthefollowingispartofthefourmaintypesforecommerce?
a. B2B
b. B2C
c. C2B
d. Alloftheabove
Answer:D
3. WhichsegmentdoeBay,Amazon.combelong?
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer:B
4. Whichtypeofecommercefocusesonconsumersdealingwitheachother?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
5. WhichsegmentiseBayanexample?
a. B2B
b. C2B
c. C2C
d. Noneoftheabove
Answer:D
6. Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
7. InwhichwebsiteGlobalEasyBuyisfacilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8. ThebestproductstosellinB2Cecommerceare:
a. Smallproducts
b. Digitalproducts
c. Specialtyproducts
d. Freshproducts
Answer:B
9. WhichproductsarepeoplemostlikelytobemoreuncomfortablebuyingontheInternet?
a. Books
b. Furniture
c. Movies
d. Alloftheabove
Answer:B
10. WhichproductsarepeoplemostlikelytobecomfortablebuyingontheInternet?
a. Books
b. PCs
c. CDs
d. Alloftheabove
Answer:D
11. DigitalproductsarebestsuitedforB2Cecommercebecausethey:
a. Arecommoditylikeproducts
b. Canbemasscustomizedandpersonalized
c. Canbedeliveredatthetimeofpurchase
d. Alloftheabove
Answer:D
12. Thesolutionforallbusinessneedsis
a. EDI
b. ERP
c. SCM
d. Noneoftheabove
Answer:B
13. AllofthefollowingaretechniquesB2Cecommercecompaniesusetoattractcustomers,
except:
a. Registeringwithsearchengines
14.
15.
16.
17.
18.
19.
b. Viralmarketing
c. Onlineads
d. Virtualmarketing
Answer:D
WhichisafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. alloftheabove
Answer:D
WhichisnotafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. noneoftheabove
Answer:C
Whichtermrepresentsacountofthenumberofpeoplewhovisitonesite,clickonanad,and
aretakentothesiteoftheadvertiser?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Alloftheabove
Answer:B
WhatisthepercentageofcustomerswhovisitaWebsiteandactuallybuysomethingcalled?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Conversionrate
Answer:D
Whatarematerialsusedinproductioninamanufacturingcompanyorareplacedontheshelf
forsaleinaretailenvironment?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:A
Whatarematerialsthatarenecessaryforrunningamoderncorporation,butdonotrelateto
thecompany'sprimarybusinessactivities?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
20.
21.
22.
23.
24.
25.
26.
Answer:B
Whatareballpointpenspurchasedbyaclothingcompany?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
Whatisanothernamefor?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
Whatistheprocessinwhichabuyerpostsitsinterestinbuyingacertainquantityofitems,and
sellerscompeteforthebusinessbysubmittingsuccessivelylowerbidsuntilthereisonlyone
sellerleft?
a. B2Bmarketplace
b. Intranet
c. Reverseauction
d. Internet
Answer:C
Whatareplasticcardsthesizeofacreditcardthatcontainsanembeddedchiponwhichdigital
informationcanbestored?
a. Customerrelationshipmanagementsystemscards
b. Egovernmentidentitycards
c. FEDIcards
d. Smartcards
Answer:D
Mostindividualsarefamiliarwithwhichformofecommerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:B
Whichformofecommercecurrentlyaccountsforabout97%ofallecommercerevenues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:A
WhichofthefollowingareadvantagesnormallyassociatedwithB2Becommerce?
a. Shortercycletimes
27.
28.
29.
30.
31.
32.
33.
b. Reductionincosts
c. Reacheswideraudiences
d. alloftheabove
Answer:D
Ifthethreatofsubstituteproductsorservicesislowitisa(n):
a. Disadvantagetothesupplier
b. Advantagetothebuyer
c. Advantagetothesupplier
d. Noneoftheabove
Answer:C
Thethreatofnewentrantsishighwhenitis:
a. Hardforcustomerstoenterthemarket
b. Hardforcompetitorstoenterthemarket
c. Easyforcompetitorstoenterthemarket
d. Easyforcustomerstoenterthemarket
Answer:C
Ifitiseasyforcompetitorstoenterthemarket,thethreatofnewentrantsisconsidered:
a. High
b. Low
c. More
d. Less
Answer:A
Anindustryislessattractiveforsupplierswhentherivalryamongexistingcompetitorsis:
a. High
b. Low
c. More
d. Less
Answer:A
Uniquevalueauctionismainlyappliesto?
a. Newproducts
b. Secondhandproducts
c. Engineeringproducts
d. Noneoftheabove
i. Answer:B
Paisapayisfacilitatedin
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. noneoftheabove
Answer:A
Whichofthefollowingisausefulsecuritymechanismwhenconsideringbusinessstrategyand
IT?
encryption
decryption
firewall
alltheabove
Answer:D
34. Whichofthefollowingisnotrelatedtosecuritymechanism
a. encryption
b. decryption
c. ecash
d. alltheabove
a.
b.
c.
d.
35.
36.
37.
38.
39.
Answer:C
Aproductorservicethatcustomershavecometoexpectfromanindustry,whichmustbe
offeredbynewentrantsiftheywishtocompeteandsurvive,isknownasa(n)?
a. Switchingcosts
b. Loyaltyprograms
c. Entrybarriers
d. Affiliateprograms
Answer:C
Whichofthefollowingstatementsaccuratelyreflecttheimpactoftechnology?
a. Technologyhascausedbuyerpowertoincrease
b. Technologyhaslessenedtheentrybarriersformanyindustries
c. Technologyhasincreasedthethreatofsubstituteproductsandservices
d. alloftheabove
Answer:D
Abusinesscannotbeallthingstoallpeople.Instead,abusinessmust:
a. Identifytargetcustomers
b. Identifythevalueofproducts/servicesasperceivedbycustomers
c. alloftheabove
d. Noneoftheabove
Answer:C
Howthetransactionsoccurinecommerce?
a. Usingemedias
b. Using computers only
c. Usingmobilephonesonly
d. Noneoftheabove
Answer:A
Whichtypeofproductsislesserpurchasedusingecommerce?
a. automobiles
b. books
c. softwares
d. none
40.
41.
42.
43.
44.
45.
46.
Answer:A
Abusinesscompetinginacommoditylikeenvironmentmustfocusonwhichofthefollowing?
a. Price
b. Ease/speedofdelivery
c. Easeofordering
d. alloftheabove
Answer:D
Whichofthefollowingreferstocreatingproductstailoredtoindividualcustomers?
a. customization
b. aggregation
c. Directmaterials
d. Reverseauction
Answer:A
Materialsusedinthenormaloperationofabusinessbutnotrelatedtoprimarybusiness
operationsarecalledwhat?
a. Supplies
b. Directmaterials
c. Indirectmaterials
d. Dailystuff
Answer:C
Amazon.comiswellknownforwhichecommercemarketingtechnique?
a. Bannerads
b. Popupads
c. Affiliateprograms
d. Viralmarketing
Answer:C
Whatisthenamegiventoaninteractivebusinessprovidingacentralizedmarketwheremany
buyersandsupplierscancometogetherforecommerceorcommercerelatedactivities?
a. Directmarketplace
b. B2B
c. B2C
d. Electronicmarketplace
Answer:D
Whichformofemarketplacebringstogetherbuyersandsellersfrommultipleindustries,often
forMROmaterials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
Whichformofemarketplacebringstogetherbuyersandsellersfromthesameindustry?
a. horizontal
47.
48.
49.
50.
51.
52.
b. Vertical
c. Integrated
d. Inclined
Answer:B
Whichtypeofaddappearsonawebpage?
a. popunderad
b. Popupad
c. Bannerad
d. Discountad
Answer:C
Whattypeofadappearsontopofawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:B
Whattypeofadappearsunderawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:A
Which,ifany,ofthefollowingtypesofadsarepeoplemostwillingtotolerate?
a. popunderad
b. popupad
c. bannerad
d. noneoftheabove
Answer:D
WhichofthefollowingisanInternetbasedcompanythatmakesiteasyforonepersontopay
anotherovertheInternet?
a. electroniccheck
b. electronicbillpresentmentandpayment
c. conversionrates
d. financialcybermediary
Answer:D
Whichofthefollowingisamethodoftransferringmoneyfromoneperson'saccountto
another?
a. electroniccheck
b. creditcard
c. etransfer
d. noneoftheabove
Answer:A
53. Anelectroniccheckisoneformofwhat?
a. ecommerce
b. onlinebanking
c. ecash
d. check
54. Ifyouneedtotransfermoneytoanotherpersonviatheinternet,whichofthefollowing
methodscouldyouuse?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:D
55. Whichofthefollowingpermitsthetransmissionofabill,alongwithpaymentofthatbill,tobe
conductedovertheInternet?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:C
56. Acombinationofsoftwareandinformationdesignedtoprovidesecurityandinformationfor
paymentiscalledawhat?
a. digitalwallet
b. popupad
c. shoppingcart
d. encryption
Answer:A
57. Whatisthenamefordirectcomputertocomputertransferoftransactioninformation
containedinstandardbusinessdocuments?
a. internetcommerce
b. ecommerce
c. transactioninformationtransfer
d. electronicdatainterchange
Answer:D
58. WhichofthefollowingisusedinB2Btopayforpurchases?
a. ecommerce
b. financialelectronicdatainterchange
c. electronicdataexchange
d. electronicchecks
Answer:B
59. Publickeyencryptionusesmultiplekeys.Onekeyisusedtoencryptdata,whileanotherisused
todecryptdata.Thekeyusedtoencryptdataiscalledthe_____key,whilethekeyusedto
decryptdataiscalledthe_____key.
encryption,decryption
private,public
encryption,public
public,private
Answer:D
SecureSocketsLayersdoeswhichofthefollowing?
a. createsasecure,privateconnectiontoawebserver
b. encryptsinformation
c. sendsinformationovertheinternet
d. alloftheabove
Answer:D
Whenatransactionisprocessedonline,howcanthemerchantverifythecustomer'sidentity?
a. usesecuresocketslayers
b. usesecureelectronictransactions
c. useelectronicdatainterchange
d. usefinancialelectronicdatainterchange
Answer:B
Thepracticeofforgingareturnaddressonanemailsothattherecipientisfooledinto
revealingprivateinformationistermed?
a. hacking
b. cracking
c. dumpsterdiving
d. spoofing
Answer:D
Whatisamodelofaproposedproduct,service,orsystem?
a. Prototyping
b. Prototype
c. Proofofconceptprototype
d. Sellingprototype
Answer:B
WhatisaninternalorganizationalInternetthatisguardedagainstoutsideaccessbyaspecial
securityfeaturecalledafirewall(whichcanbesoftware,hardware,oracombinationofthe
two)?
a. Client/servernetwork
b. Intranet
c. Extranet
d. Thinclient
Answer:B
Whatisanintranetthatisrestrictedtoanorganizationandcertainoutsiders,suchascustomers
andsuppliers?
a. Client/servernetwork
b. Intranet
a.
b.
c.
d.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
c. Extranet
d. Thinclient
Answer:C
WhatisadetailedprocessforrecoveringinformationoranITsystemintheeventofa
catastrophicdisastersuchasafireorflood?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:A
Whatisaseparatefacilitythatdoesnothaveanycomputerequipmentbutisaplacewherethe
knowledgeworkerscanmoveafterthedisaster?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:C
Whatisaseparateandfullyequippedfacilitywherethecompanycanmoveimmediatelyafter
thedisasterandresumebusiness?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:B
Whatcharts(1)thecosttoyourorganizationoftheunavailabilityofinformationandtechnology
and(2)thecosttoyourorganizationofrecoveringfromadisasterovertime?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:D
WhichfactordetermineswhenyourITsystemwillbeavailableforknowledgeworkersto
access?
a. Availability
b. Accessibility
c. Reliability
d. Noneoftheabove
Answer:A
71. WhichfactordetermineswhohastherighttoaccessdifferenttypesofITsystemsand
information?
a.
b.
c.
d.
Availability
Accessibility
Reliability
Scalability
Answer:B
72. WhichfactorensuresyourITsystemsarefunctioningcorrectlyandprovidingaccurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:C
73. Whichfactorrepresentshowwellyoursystemcanadapttoincreaseddemands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:D
74. Whichfactorrepresentsasystem'sabilitytochangequickly?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:A
75. Whatisasetofconditionsusedtomeasurehowwellaproductorsystemfunctions?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:D
76. WhatdeterminesthefutureITinfrastructurerequirementsfornewequipmentandadditional
networkcapacity?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:C
77. Whatautomatesbusinessprocesses?
Workflow
ASP
Workflowsystem
EIP
Answer:C
Whatdefinesallofthestepsorbusinessrules,frombeginningtoend,requiredforaprocessto
runcorrectly?
a. Workflow
b. EIP
c. Workflowsystem
d. SLA
Answer:A
Whatsendsworkassignmentsthroughanemailsystem?
a. Databasebasedenterpriseinformationportal
b. Messagingbasedenterpriseinformationportal
c. Databasebasedworkflowsystem
d. Messagingbasedworkflowsystem
Answer:D
Whichwillnotharmcomputerresources
a. firewall
b. Virus
c. Trojanhorse
d. Noneoftheabove
Answer:A
WhichisnotafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. Noneoftheabove
Answer:D
WhichisafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. alloftheabove
Answer:D
Whichofthefollowingistheprimarycharacteristicofanintranet?
a. Peopleoutsidetheorganizationcanaccessit
b. Peopleinsidetheorganizationcan'taccessit
c. Peopleoutsidetheorganizationcan'taccessit
d. Noneoftheabove
Answer:C
a.
b.
c.
d.
78.
79.
80.
81.
82.
83.
84. Whichconceptsuggeststhatdifferentapplicationsandcomputersystemsshouldbeableto
communicatewithoneanother?
a. Integration
b. Webservices
c. Scalability
d. Interoperability
Answer:D
85. Whichserviceencompassesalltechnologiesusedtotransmitandprocessinformationonan
acrossanetwork?
a. Interoperability
b. Scalability
c. Benchmarking
d. Webservices
Answer:D
86. Whichprocesscanpreventdatafromloseduetocomputerproblemsorhumanerrors?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:A
87. Whichprocessisusedtoreinstalldatafromacopywhentheoriginaldatahasbeenlost?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:B
88. Whatdescribesaprocessofcontinuouslymeasuringresultsandcomparingthoseresultsto
optimalperformancesothatactualperformancemaybeimproved?
a. Performance
b. Capacityplanning
c. Benchmarking
d. Datacleansing
Answer:C
89. Whoprotectssystemfromexternalthreats?
a. firewall
b. EDI
c. ERP
d. Scriptkiddies
Answer:A
90. Whobreaksintootherpeople'scomputersystemsandstealsanddestroysinformation?
a. Hackers
b. softwares
91.
92.
93.
94.
95.
96.
c. Hacktivists
d. Scriptkiddies
Answer:a
Whatissoftwarethatcomeshiddeninfreedownloadablesoftwareandtracksyouronline
movements,minestheinformationstoredonyourcomputer,orusesyourcomputer'sCPUand
storageforsometaskyouknownothingabout?
a. Weblog
b. Clickstream
c. AnonymousWebbrowsingservice
d. Noneoftheabove
Answer:D
ERPstandsfor
a. Enterpriseresolutionplanning
b. Enterprisereverseplanning
c. Enterpriseresourceplanning
d. Noneoftheabove
Answer:C
WhichisnotacomponentofERP?
a. Legacysystems
b. Boltonapplications
c. Operationaldatabase
d. Cybersoft
Answer:D
WhichisnotafunctionofERP?
a. Humanresourcemanagement
b. financial
c. warehousing
d. Noneoftheabove
Answer:D
Whatisatypeofvirusthatspreadsitself,notjustfromfiletofile,butfromcomputerto
computerviaemailandotherInternettraffic?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:B
WhatfloodsaWebsitewithsomanyrequestsforservicethatitslowsdownorcrashes?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:C
97. WhatharnessesfarflungcomputerstogetherbywayoftheInternetoravirtualprivatenetwork
toshareCPUpower,databases,anddatabasestorage?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:D
98. Whatconsistsoftheidentificationofrisksorthreats,theimplementationofsecuritymeasures,
andthemonitoringofthosemeasuresforeffectiveness?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:A
99. WhatistheprocessofevaluatingITassets,theirimportancetotheorganization,andtheir
susceptibilitytothreats,tomeasuretheriskexposureoftheseassets?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:B
100.
Whatistheprocessofmakingacopyoftheinformationstoredonacomputer?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:A
101.
Whatsoftwaredetectsandremovesorquarantinescomputerviruses?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:B
102.
Whatishardwareand/orsoftwarethatprotectscomputersfromintruders?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:C
103.
Whatistheuseofphysicalcharacteristicssuchasyourfingerprint,thebloodvessels
intheretinaofyoureye,thesoundofyourvoice,orperhapsevenyourbreathtoprovide
identification?
Backup
Antivirus
Firewall
Biometrics
Answer:D
104.
Allofthefollowingareconsideredbiometrics,except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105.
Whatscramblesthecontentsofafilesoyoucan'treaditwithouthavingtheright
decryptionkey?
a. Encryption
b. Intrusiondetectionsoftware
c. Securityauditingsoftware
d. Alloftheabove
Answer:A
106.
Whatisanencryptionsystemthatusestwokeys:apublickeythateveryonecanhave
andaprivatekeyforonlytherecipient?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:B
107.
Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting
suspiciously?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:C
108.
Whatchecksoutyourcomputerornetworkforpotentialweaknesses?
a. Encryption
b. Publickeyencryption
c. Securityauditingsoftware
d. Noneoftheabove
Answer:C
109.
Whichofthefollowingtovirusesharm?
a. Yourkeyboard
b. Yourmonitor
c. Yourprocessor
a.
b.
c.
d.
110.
111.
112.
113.
114.
115.
116.
d. Virusesdonotharmanyoftheabove
Answer:D
Whichofthefollowingcanavirusdo?
a. Hurtyourhardware
b. Hurtanyfilestheyweren'tdesignedtoattack
c. Infectfilesonwriteprotecteddisks
d. Noneoftheabove
Answer:D
Insimpleterms,whatdoesriskassessmentask?
a. Whatcangowrong?
b. Howlikelyisittogowrong?
c. Whatarethepossibleconsequencesifitdoesgowrong?
d. Alloftheabove
Answer:D
Whichofthefollowingisacharacteristicofafirewall?
a. Examineseachmessageasitseeksentrancetothenetwork
b. Blocksmessageswithoutthecorrectmarkingsfromenteringthenetwork
c. DetectscomputerscommunicatingwiththeInternetwithoutapproval
d. Alloftheabove
Answer:D
Whichofthefollowingarewaystoproveaccessrights?
a. Whatyouknow,likeapassword
b. Whatyouhave,likeanATMcard
c. Whatyoulooklike
d. Alloftheabove
Answer:D
Whichitemcanapasswordbeusedtoprotect?
a. Network
b. File
c. Folder
d. Alloftheabove
Answer:D
WhichisthemostimportantcomponentofIT?
a. Information
b. People
c. Informationtechnology
d. Computers
Answer:B
Whichofthefollowingappliestotheimplementationofanidea?
a. Copyright
b. Intellectualproperty
c. Patent
d. Denialofserviceattack
Answer:C
117.
Whenyoupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?
a. ThecostoftheCDs,manuals,anddevelopmentofthesoftware
b. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopment
c. Ashareofthecostofsoftwaredevelopment
d. Alloftheabove
Answer:D
118.
Whichofthefollowingisnotadimensionofprivacy?
a. Needforpersonalspace
b. Needtofeelincontrolofourpossessions
c. Needtofeelincontrolofourpersonalinformation
d. Alloftheabovearedimensionsofprivacy
Answer:D
119.
Whichofthefollowingcapturesscreenimages?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencapturesoftware
Answer:D
120.
Whichofthefollowingexaminesinformationpassingthroughswitches,hubs,or
routers?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:B
121.
Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:C
122.
Emailmessagesmaybestoredonwhichofthefollowingcomputers?
a. Sender'scomputer
b. Sender'sserver
c. Recipient'sserver
d. Alloftheabove
Answer:D
123.
Whatmightidentitythievesdowithyouridentity?
a. Applyforandusecreditcards
b. Applyforaloan
c. Changetheiridentity
d. Alloftheabove
Answer:D
124.
Whichofthefollowingisnotacommonapproachtophishing?
a. Sendanofficiallookingemailaskingforconfidentialinformation
b. Askpeopletofilloutandreturnafakeletterusingpostalmail
c. Askpeopletoclickalinkinanemailtoopenasubmissionformonawebpage
d. Alloftheaboveareuncommonapproachestophishing
Answer:B
125.
Atechniqueusedtogainpersonalinformationforthepurposeofidentitytheft,oftenby
email,iscalled?
a. Phishing
b. Carding
c. Brandspoofing
d. Alloftheabove
Answer:D
126.
Companiescangatherinformationaboutemployeesandpotentialemployeesfrom
whichofthefollowingplaces?
a. Jobapplications
b. Creditreports
c. CompaniesthattrackWebsurfers
d. Alloftheabove
Answer:D
127.
a.
b.
c.
d.
128.
a.
b.
c.
d.
129.
a.
b.
c.
d.
Cyberslackingconsistsofwhatactivities?
Visitinginappropriatewebsites
Visitingnewssites
Chattingonlinewithothersaboutnonworktopics
Alloftheabove
Answer:D
Cookiesareusedtodowhichofthefollowing?
StoreyourIDandpasswordforsubsequentlogonstothesite
Storecontentsofelectronicshoppingcarts
Totrackwebactivity
Alloftheaboveandmore
Answer:D
Unsolicitedemailiscalledwhat?
Junkmail
Spam
Extramail
Noneoftheabove
130.
a.
b.
c.
d.
Answer:B
WhatisthenameofthenewantiSpambill?
NoSpam
CANSpam
SpamAway
StopSpam
Answer:B
131.
Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
132.
Whatistheunauthorizeduse,duplication,distributionorsaleofcopyrightedsoftware?
a. FairUseDoctrine
b. Piratedsoftware
c. Counterfeitsoftware
d. Privacy
Answer:B
133.
Whatisaprogram,wheninstalledonacomputer,recordseverykeystrokeandmouse
click?
a. Keyloggersoftware
b. Hardwarekeylogger
c. Cookie
d. Adware
Answer:A
134.
Whatissoftwareyoudon'twanthiddeninsidesoftwareyoudowant?
a. Adware
b. Trojanhorsesoftware
c. Spyware
d. Alloftheabove
Answer:D
135.
Whatisanelectronicrepresentationofcash?
a. Digitalcash
b. Electroniccash
c. Ecash
d. Alloftheabove
Answer:D
136.
Whatisafullyequippedcomputerthatyouwearasapieceofclothingorattachedtoa
pieceofclothingsimilartothewayyouwouldcarryyourcellphoneonyourbelt?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:A
137.
Whatisatechnologyenabledmicrochipimplantedintothehumanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:C
138.
Whichofthefollowingisnotareasonwhydigitalcashhasturnedouttobeextremely
difficult?
a. Ifyoursystemcrashesyouloseyourmoney
b. Thereisonlyonestandard
c. Digitalcashmakesmoneylaunderingeasy
d. DigitalcashtravelsacrossthevastInternetandissusceptibletobeginstolen
Answer:B
139.
Smartcardisbetterprotectedthanothercardsusing
a. Encryption
b. Firewall
c. Hub
d. Alltheabove
Answer:A
140.
Trustcardisintroducedby
a. BSNLanditzcash
b. BSNLandoxicash
c. BSNLonly
d. None
Answer:A
141.
PaisaPayisofferedonlyby
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none
Answer:B
142.
TheEpaymentmechanismwidelyusedinB2Bis
a. Creditcard
b. Debitcard
c. Mastercard
d. Echeque
143.
144.
145.
146.
147.
148.
149.
Answer:D
Whichtypeoftechnologywillincreaseportabilityandmobility?
a. Implantchips
b. Micropayments
c. Internetphonecalls
d. Alloftheabove
Answer:D
Whichofthefollowinganaccuratestatementaboutinternetphonecalls?
a. Theyarepossiblebutnotyetfree
b. Theyarenotpossible
c. Theyarecurrentlystandardpractice
d. Noneoftheaboveisanaccuratestatementaboutinternetphonecalls
Answer:A
Whatarethemostcommonlyusedinputdevicestoday?
a. Keyboard
b. Mouse
c. Alloftheabove
d. Noneoftheabove
Answer:C
Whichofthefollowingcanbeusedtohelpidentifypeopleinacrowd?
a. Biochip
b. Implantchip
c. Facialrecognitionsoftware
d. Visionchip
Answer:C
Whichoneisalsoknownasplasticmoney?
a. Creditcard
b. Debitcard
c. Papercash
d. Alloftheabove
Answer:A
Echequesare
a. Prepaid
b. Postpaid
c. Bothprepaidandpostpaid
Answer:A
Digitalsignatureisa
a. Digitalid,sendasanattachmenttoawebpage/email/message
b. Isusedforverifyingtheattachmentssendusingweb
c. Bothaandb
d. Noneofthese
Answer:C
150.
a.
b.
c.
d.
151.
a.
b.
c.
d.
152.
a)
b)
c)
d)
Whichoneisthecomponentofcybercashpaymentsystem
CCusersoftware
CCmerachantsoftware
CCServerSoftware
Alloftheabove
Answer:D
Thepresenceofmakethesmartcardsmart.
Memory
Microchip
Ecash
Noneoftheabove
Answer:B
Thesmartcardwhichuseantennaforreadingandwritingdata
Contactsmartcard
Contactlesssmartcard
Proximitysmartcard
BothBandC
Answer:D
153.
cardisreadonly.
a) Contactsmartcard
154.
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
Answer:C
Whichofthesmartcardusesasimlikestructureforreadingandwritingdata
a) Contactsmartcard
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
155.
a.
b.
c.
d.
156.
Answer:A
Whichisnotafeatureofecommerce
SCM
EDI
WWW
BPR
Answer:D
WhatisIstandsinCIAofsmartcard?
a.
b.
c.
d.
International
Integrity
Identity
Noneoftheabove
Answer:B
157.
WhatisAstandsinCIAofsmartcard?
a. auditing
b. authenticity
c. authorized
d. Noneoftheabove
Answer:B
158.
WhatisCstandsinCIAofsmartcard?
a. confidentiality
b. conference
c. congress
d. Noneoftheabove
Answer:A
159.
WhichoneisthethirdpartypaymentproviderswhoofferdigitalwalletsforE
merchants
a. Oxicash
b. PayMate
c. PayPass
d. Alltheabove
Answer:D
160.
Whichisusedtoidentifymobilemoney
a. MCID
b. MMID
c. RSID
d. NONEOFTHEABOVE
Answer:B
161.
isanactthatposesdangertocomputerassets.
a. Threat
b. Danger
c. Error
d. Noneoftheabove
Answer:A
162.
Whichoneisnotaencryptiontechnique
a. RSA
b. DES
c. AES
d. NONEOFTHEABOVE
Answer:D
163.
Whichoneisnotusedasasecuritymechanism?
a. Encryption
b. Cryptography
c. Wallets
d. Digitalsignature
Answer:C
164.
Whichegovernmentarenaisbeingusedwhengovernmentalagenciessendoutand
acceptbidsforwork?
a) G2G
b) G2B
c) G2C
d) G2G
Answer:B
165.
a.
b.
c.
d.
166.
a.
b.
c.
d.
167.
a.
b.
c.
d.
168.
a.
b.
c.
d.
Secretkeyisusedfor
Publickeycryptography
Privatekeycryptography
Asymmetrickeycryptography
Noneofthese
Answer:B
Whichoneisacommunicationchannelthreat?
Snifferprograms
Cybervandalism
Integritythreats
Alloftheabove
Answer:D
Whichoneisacommunicationchannelsecurityprotocol?
SSL
SHTTP
SET
ALLOFTHEABOVE
Answer:D
Theprotocolwhichallowsthefiletransferbetweencomputersis
TCP/IP
FTP
HTTP
SOA
Answer:B
169.
a.
b.
c.
d.
170.
a.
b.
c.
d.
171.
a.
b.
c.
d.
172.
a.
b.
c.
d.
173.
a.
b.
c.
d.
174.
a.
b.
c.
d.
175.
a.
b.
c.
d.
EBankingisalsoknownas
ATMs
Netbanking
Traditionalbanking
Noneofthese
Answer:B
isbackboneofallEpaymentsinEcommerce
EFT
EPS
PayPal
Noneofthese
Answer:B
Whichoneisaclientlevelthreat?
Maliciouscode
Viruses
Activecontents
Alltheabove
Answer:D
Whichoneisnotanencryptiontechnique?
RSA
DES
AES
FTP
Answer:D
Whichoneisanencryptiontechnique?
RSA
DES
AES
Alloftheabove
Answer:D
Whichoneisnotaserverlevelthreat?
Maliciouscode
CGIthreats
Databasethreats
Bufferoverflows
Answer:A
Whichoneisnotaphysicalthreat?
Hacking
Storm
Phishing
Noneoftheabove
Answer:A
176.
a.
b.
c.
d.
177.
a.
b.
c.
d.
178.
a.
b.
c.
d.
179.
a.
b.
c.
d.
180.
a.
b.
c.
d.
181.
a.
b.
c.
d.
182.
a.
b.
c.
d.
Whichoneisaphysicalthreat?
Phishing
Storm
Earthquake
Alltheabove
Answer:D
Whichoneisalogicalthreat?
Hacking
Storm
Phishing
Noneoftheabove
Answer:A
Thebasicelementsofwebsiteis
Homepage
Webpages
Linksandbanners
Alltheabove
Answer:D
WhichoneisathreatforEcommerce
Trojanhorse
firewall
encryption
None
Answer:A
Securecommunicationmeans
Protecttransmissionofcreditcardnumber
Guaranteeprivacyofcustomer
Unauthorizedaccessofpaymentdetails
Alltheabove
Answer:D
Whichoneisnotanofflinepaymentmode?
Cashondelivery
Cashbeforedelivery
Demanddrafts
echeque
Answer:D
Whichoneisanofflinepaymentmode?
Cashondelivery
Cashbeforedelivery
Creditcard
Bothaandb
Answer:D
183.
a.
b.
c.
d.
184.
a.
b.
c.
d.
185.
a.
b.
c.
d.
186.
a.
b.
c.
d.
187.
a.
b.
c.
d.
188.
a.
b.
c.
d.
189.
a.
b.
c.
d.
Whichoneisnotanonlinepaymentmode?
Cashondelivery
Debitcard
Creditcard
echeque
Answer:A
Whichoneisanonlinepaymentmode?
Cashondelivery
Cashbeforedelivery
Demanddrafts
echeque
Answer:D
whichoneisnotanEpaymentmethodusedinIndia
Debitcard
Creditcard
echeque
none
Answer:D
OTPstandsfor
OnTimePassword
OnTimeprocessing
Onetimeprocessor
None
Answer:A
WhichoneisnotathreatforEcommerce
Trojanhorse
Viruses
Worm
None
Answer:D
PrivateKeycryptographyisalsoknownascryptography.
Publickey
Symmetric
Asymmetric
None
Answer:B
Publickeycryptographyisalsoknownascryptography.
Privatekey
Symmetric
Asymmetric
None
Answer:C
190.
Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
191.
Cyberslackingconsistsofwhatactivities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d. Alloftheabove
Answer:D
192.
Whatisanarrangementmadebetweenecommercesitesthatdirectusersfromone
sitetotheother?
a. Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193.
Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
194.
WhichoneisnotalayerofEcommerceinfrastructure
a. Physicallayer
b. Productlayer
c. Servicelayer
d. None
195.
196.
Answer:D
Whichwillharmcomputerresources
a. Worm
b. Virus
c. Trojanhorse
d. Alltheabove
Answer:D
Thestudyofencryptioniscalled
a.
b.
c.
d.
197.
a.
b.
c.
d.
198.
a.
b.
c.
d.
199.
a.
b.
c.
d.
Decryption
Cryptography
Firewall
Alltheabove
Answer:B
DuringEcommercetransactionweshouldensure
Integrity
Security
Confidentiality
Alltheabove
Answer:D
Thevirusthatarecommonlyfoundinworddocumentsarecalled
Macro
Trojanhorse
Scriptvirus
Noneoftheabove
Thevirusthatareattachedwithvbandjavafilesarecalled
Macro
Trojanhorse
Scriptvirus
Noneoftheabove
200.
a.
b.
c.
d.
Answer:A
Answer:C
Thevirusesspreadsthrough
Mails
Pendrivesandcds
Websites
Alltheabove
Answer:D