Professional Documents
Culture Documents
E Commerce
E Commerce
A. B2G
B. B2E
C. B2B
D. P2P
Answer:B
A. SCM
B. EDI
C. Both of these
D. None of these
Answer:B
3. ………………..is concerned with the buying and selling information, products and
services over computer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Answer:B
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Answer:A
A. Books
B. Vegetables
C. All of these
D. None of these
Answer:A
A. EDI
B. Protocols
C. Standards
D. Business applications
Answer:A
A. E-commerce
B. E-Business
C. EDI
D. None of these
Answer:C
A. E-commerce
B. EDI
C. Networking
D. SCM
Answer:D
A. Suppliers
B. Manufacturers
C. Distributors
D. Customers
Answer:C
A. E-commerce
B. SCM
C. EDI
D. None of these
Answer:A
11. Among the alternate models of B2B e-commerce,……is the best means to obtain a
competitive advantage in the Market place.
A. Process based
B. strategic relationship based
C. transaction based
D. any of these
Answer:B
A. hubs
B. community
C. contents
D. none of these
Answer:A
A. B2G
B. B2E
C. B2C
D. B2B
Answer:C
A. B2G
B. B2E
C. B2B
D. B2C
Answer:D
A. clothes
B. flowers
C. airline reservation
D. none
Answer:D
A. B2G
B. B2C
C. B2B
D. B2E
Answer:B
A. B2G
B. B2E
C. B2B
D. B2C
Answer:D
A. manufacturers
B. distributors
C. Publishers
D. None
Answer:D
A. C2C
B. B2E
C. B2B
D. B2G
Answer:A
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer:D
A. B2G
B. B2E
C. B2B
D. P2P
Answer:B
Answer:D
A. SCC
B. CRM
C. CRP
D. SCM
Answer:A
24. ………………is a global web in which millions of users are communicating with each
other with the help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Answer:A
A. html
B. HTTP
C. Bothe of these
D. None of these
Answer:A
26. English physicist Tim Berner’s Lee was famous for the establishment of
…………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Answer:B
A. B2G
B. B2E
C. B2B
D. P2P
Answer:C
Answer:D
29. A company that manufacturers bicycles may use the internet to purchase tyres from
their suppliers. This is an example of-----------transaction
A. B2G
B. B2E
C. B2B
D. P2P
Answer:C
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Answer:A
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer:A
32. ………………..are general interest portals covering a wide range of topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer:B
A. i-village
B. Yahoo
C. Google
D. Net scape
Answer:A
34. 4. A portal that helps to establish relations and to conduct transactions between various
organizations is termed as………………
A. B2B portals
B. C2C portals
C. both of these
D. none of these
Answer:A
35. A …………………….is a software that scours the internet collecting data about every
website and every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Answer:B
36. Search Engines databases are selected and built by computer robot programs
called………………
A. spiders
B. Search Engines
C. robots
D. none of these
Answer:A
37. Which among the following is not an example for Search engine ?
A. Google
B. MSN
C. Alta vista
D. none of these
Answer:D
A. html
B. FTP
C. HTTP
D. None of these
Answer:A
A. html
B. FTP
C. HTTP
D. None of these
Answer:C
40. The user reaches this page when they specify the address of a website
A. Home page
B. Web page
C. Summary page
D. None of these
Answer:A
Unit 2:E-Money
Answer D
A. SCC
B. CRM
C. CRP
D. SCM
Answer A
43. ………………is a global web in which millions of users are communicating with each
other with the help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Answer A
A. C2C
B. B2E
C. B2B
D. B2C
Answer A
45. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer A
A. C2C
B. B2E
C. B2B
D. B2C
Answer A
A. C2C
B. B2E
C. B2B
D. B2C
Answer A
48. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files
A. B2C
B. B2E
C. B2B
D. P2P
Answer D
49. This is a protocol which allows files to be transferred from one computer to another
computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer B
A. Web page
B. home page
C. domain
D. none of these
Answer A
A. Web page
B. home page
C. domain
D. none of these
Answer B
A. C2C
B. B2E
C. B2B
D. B2C
Answer A
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer A
54. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.
A. Debit Card
B. credit card
C. Electronic purse
D. any of these
Answer C
55. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Answer B
A. Biometrics
B. PIN
C. both of these
D. none of these
Answer A
A. B2G
B. B2E
C. B2B
D. P2P
Answer B
Answer D
A. SCC
B. CRM
C. CRP
D. SCM
Answer A
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Answer A
Answer C
62. The verification of credit card is done by using…………….. with a communications link
to the merchants acquiring bank
Answer C
63. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer D
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer A
65. ………………type of payment system is highly useful to those customers who would
like to control overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer A
66. ……………………….credit card gives all the advantages of a normal credit card
without worrying about the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer A
67. ……………………facility helps the customer to pay only a small amount of the total
outstanding and revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer B
68. …………………..is the system of purchasing cash credits in relatively small amounts,
storing the credits in our computer, and then spending them, when making electronic
purchases over the internet.
A. E-cash
B. Digicash
C. Cyber cash
D. any of these
Answer D
69. ………………….is a financial instrument which can be used more than once to borrow
money or buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer A
70. To accept a credit card for payment, we have to open a …………………account with
our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer C
A. smart Cards
B. E-Cheques
C. E-cash
D. none of these
Answer A
72. ………………..is a kind of payment card that transfers fund directly from the
consumer’s bank account to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer A
73. A ………………is an electronic file that uniquely identifies individuals and websites on
the internet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer B
74. The information Technology Act [IT ACT] came into effect on
Answer C
75. Information sent over the Internet commonly uses the set of rules
called……………………
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer A
A. Hacker
B. Snooper
C. operator
D. spoofer
Answer A
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer D
A. 2001
B. 2002
C. 2009
D. 2000
Answer D
79. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer D
Unit 3:E-Marketing
80. Trade mark, copyright, patent law etc comes under the purview of……………………
A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer: C
A. privacy
B. integrity
C. authentication
D. none of these
Answer: D
82. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.
A. Debit Card
B. credit card
C. Electronic purse
D. any of these
Answer: C
83. ………………is basically a secure gate between our organization data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer: A
84. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Answer: B
A. Biometrics
B. PIN
C. both of these
D. none of these
Answer: A
86. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments.
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer: D
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer: A
88. ………………type of payment system is highly useful to those customers who would
like to control overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer: A
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer: A
90. …………………..is the system of purchasing cash credits in relatively small amounts,
storing the credits in our computer, and then spending them, when making electronic
purchases over the internet.
A. E-cash
B. Digicash
C. Cyber cash
D. any of these
Answer: D
91. To accept a credit card for payment, we have to open a …………………account with
our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer: C
A. smart Cards
B. E-Cheques
C. E-cash
D. none of these
Answer: A
A. E-commerce
B. Commerce
C. Both of these
D. None
Answer: B
A. E-business
B. E-commerce
C. any of these
D. none
Answer: A
A. E--commerce
B. E-Business
C. EDI
D. None of these
Answer: B
A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these
Answer: C
A. Baazar.com
B. E-bay and Amazon
C. E-trade.com
D. none of these
Answer:B
A. CRM
B. SRM
C. EDI
D. SCM
Answer:D
99. …………….is a form of supply chain where a series of assembly operations are carried
out to obtain the final product
Answer:A
100. .…………………is a form of supply chain where a wide variety of finished goods are
produced with limited number of raw material or components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Answer:B
A. B2G
B. B2E
C. B2B
D. P2P
Answer:C
A. C2C
B. B2E
C. B2B
D. B2C
Answer:A
103. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer:A
A. C2C
B. B2E
C. B2B
D. B2C
Answer:A
105. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files
A. B2C
B. B2E
C. B2B
D. P2P
Answer:D
106. This is a protocol which allows files to be transferred from one computer to another
computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer:B
A. Web page
B. home page
C. domain
D. none of these
Answer: A
A. Web page
B. home page
C. domain
D. none of these
Answer: B
109. ……………..allows the person to type ion just the main word or words and the site will
come in
A. Web page
B. home page
C. domain
D. none of these
Answer: C
A. Portal
B. Browser
C. Search Engine
D. none of these
Answer: C
A. Web portal
B. Link page
C. Both of these
D. none of these
Answer: C
112. A ………………is an electronic file that uniquely identifies individuals and websites on
the internet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer: B
113. Information sent over the Internet commonly uses the set of rules
called……………………
A. TCP/IP
B. FTP
C. HTTP
D. Gopher
Answer: A
A. Hacker
B. Snooper
C. operator
D. spoofer
Answer: A
A. C2C
B. B2E
C. B2B
D. B2C
Answer: A
116. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer: A
117. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files
A. B2C
B. B2E
C. B2B
D. P2P
Answer: D
118. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files
A. B2C
B. B2E
C. B2B
D. P2P
Answer: D
119. This is a protocol which allows files to be transferred from one computer to another
computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer: B
A. Web page
B. home page
C. domain
D. none of these
Answer: A
A. Web page
B. home page
C. domain
D. none of these
Answer: B
122. ……………..allows the person to type ion just the main word or words and the site will
come in
A. Web page
B. home page
C. domain
D. none of these
Answer: C
A. Web portal
B. Link page
C. Both of these
D. none of these
Answer: C
124. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.
A. Debit Card
B. credit card
C. Electronic purse
D. any of these
Answer: C
125. ………………is basically a secure gate between our organization data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer: A
126. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Answer: B
A. Biometrics
B. PIN
C. both of these
none of these
Answer: A
128. In Biometrics,ID system is designed to prevent more than one person from using a
single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer: A
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer: B
A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer: B
131. he dimension of e-commerce that enables commerce across national boundaries is called
______________.
A. interactivity
B. global reach
C. richness
D. ubiquity
Answer: B
132. The dimension of e-commerce that enables commerce across national boundaries is
called ______________.
A. interactivity
B. global reach
C. richness
D. ubiquityans
Answer: B
133. The primary source of financing during the early years of e-commerce was
______________.
A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Answer: C
Answer: C
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company's product or service fulfills the needs of customers
Answer: A
136. A situation where there are no differences among products or services, and the only
basis of choosing products is price is known as ______________.
A. a value web
B. value chain
C. profit
D. commoditization
Answer: D
137. The component of TCP/IP that provides the Internet's addressing scheme and is
responsible for the actual delivery of packets is ______________.
A. TCP
B. IP
C. the Network Layer
D. the Application Layer
Answer: B
Answer: C
139. Internet users account for about ______________ of the world's population.
A. 7%
B. 17%
C. 27%
D. 47%
Answer: B
140. The largest component of a Web site budget is ______________.
A. system maintenance
B. system development
C. content design and development
D. telecommunications
Answer: A
150. The set of standards for communication between a browser and a program running on
a server that allows for interaction between the user and the server is known as
______________.
Answer: C
151. The most common type of Internet crime according to the IC3 is ______________.
Answer: D
152. When hackers flood a Web site with useless traffic to overwhelm the network, it is
called ______________.
A. phishing
B. pharming
C. a Denial of Service (DoS) attack
D. spoofing
Answer: C
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer :B
154. ______________ influence the behavior of others through their personality, skills, or other
factors.
A. Opinion leaders
B. Direct reference groups
C. Indirect reference groups
D. Lifestyle groups
Answer: A
Answer :D
156. Creating multiple versions of information goods and selling essentially the same
product to different market segments at different prices is called______________.
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Answer :A
157. Which of the following represents a limiting factor for the growth of e-commerce?
Answer :A
158. Which of the following is a measure of the percentage of purchasers who return to a
Web site within a year?
A. loyalty
B. reach
C. recency
D. unique visitors
Answer :A
Answer :A
160. The redirection of traffic from a legitimate site to an infringing site is called
______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Answer: B
161. The most common type of Internet crime according to the IC3 is ______________.
Answer: D
162. When hackers flood a Web site with useless traffic to overwhelm the network, it is
called ______________.
A. phishing
B. pharming
C. a Denial of Service (DoS) attack
D. spoofing
Answer: C
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer: B
164. ______________ influence the behavior of others through their personality, skills, or
other factors.
A. Opinion leaders
B. Direct reference groups
C. Indirect reference groups
D. Lifestyle groups
Answer: A
Answer: D
166. Creating multiple versions of information goods and selling essentially the same
product to different market segments at different prices is called______________.
A. versioning
B. Bundling.
C. transitive content
D. price discrimination
Answer: A
167. Which of the following represents a limiting factor for the growth of e-commerce?
Answer: A
168. Which of the following is a measure of the percentage of purchasers who return to a
Web site within a year?
A. loyalty
B. reach
C. regency
D. unique visitors
Answer: A
Answer: A
170. The redirection of traffic from a legitimate site to an infringing site is called
______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Answer: B
171. ______________ are networks that connect people within a company to each other and
to the company network.
A. Bitstreams
B. Extranets
C. Internets
D. Intranets
Answer: D
172. The type of website that is designed to build customer goodwill and to supplement
other sales channels rather then sell the company's products directly is known as a
______________ website.
A. marketing
B. click-and-mortar
C. customer service
D. corporate
Answer : D
A. Reinter mediation
B. Syndication
C. Virtual Manufacturing
D. Build-to-order
Answer: B
A. richness
B. reach
C. both richness and reach
D. neither richness nor reach
Answer :C
175. All of the following are technologies used to gather information about you online
except ______________.
A. spy ware
B. cookies
C. Gmail
D. Anonymizers
Answer : D
176. All of the following are major B2C business models except ______________.
A. content provider
B. industry consortium
C. transaction broker
D. service provider
Answer :B
A. One firm develops an advantage based on a factor of production that other firms cannot
purchase
B. One participant in the market has more resources than the others
C. there are no competitive advantages or asymmetries because all firms have equal access
to all the factors to production
D. competition is at a minimum, as each niche market within an industry is served by the
company with the greatest competitive advantage
Answer : C
178. ______________ is a program that you can run from the DOS prompt in the Windows
operating system in order to check the connection between your client and the server.
A. Ping
B. Telnet
C. Tracert
D. SSL
Answer : A
179. Which of the following is a new and disruptive Web feature or service?
A. XML
B. diffserv
C. blogs
D. CDMA
Answer C
180. All of the following are steps in the systems development life cycle except
______________.
A. Systems Design
B. Testing
C. Implementation
D. Debugging
Answer : D
181. What Web server functionality allows it verify usernames and passwords and process
certificates and encryption information?
Answer : D
182. The ability to change the product to better fit the needs of the customer is called
______________.
A. customization
B. personalization
C. privacy
D. accessibility
Answer : A
183. All of the following are major categories of computer viruses except ______________.
A. Macro viruses
B. File-infecting viruses
C. Script viruses
D. Trojan viruses
Answer : D
Answer : A
A. PayPal
B. checks
C. credit cards
D. debit
Answer : C
A. Bertrand's Law
B. the Law of Universal Prices
C. the Law of One Price
D. the Law of Perfect Commerce
Answer :C
187. The process of getting customers to pass along a company's marketing message to
friends, family, and colleagues is known as ______________.
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Answer : B
Answer : C
189. All of the following are types of social marketing except ______________.
A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising
Answer : A
190. The ethical principle which states that if an action is not right for all situations, then it
is not right for any situation is known as ______________.
Answer : D
Answer : B
192. Products are made to prior to orders received based on estimated demand under a
______________.
A. supply-push model
B. demand-push model
C. supply-pull model
D. demand-pull model
Answer : A
A. Word-of-mouth leads
B. Employment agencies
C. Internet and newspapers equally
D. Internet only
Answer : C
194. Which of the following best describes predicted growth in C2C and B2C auction
spending?
answer :B
A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange
answer :C
196. All of the following are objectives of private industrial networks except
______________.
View answer : B
197. The E-commerce domain that involves business activity initiated by the consumer and
targeted to businesses is known as ______________.
Answer: (C)
Answer: (A)
A. business model
B. profit model
C. business plan
D. revenue model
Answer: (A)
200. Compared to Internet users, the number of cell phone subscribers is ______________.
Answer: (D)