Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Unit 1:E- Commerce and Business Model Concepts

1. Companies use………………………networks to automate employee related Corporate


processes.

A. B2G
B. B2E
C. B2B
D. P2P

Answer:B

2. ……………….is an early form of E-commerce

A. SCM
B. EDI
C. Both of these
D. None of these

Answer:B

3. ………………..is concerned with the buying and selling information, products and
services over computer communication networks

A. Commerce
B. E-Commerce
C. E-Business
D. None of these

Answer:B

4. ………………..is a set of standards developed in the 1960s to exchange business


information and to do electronic transactions

A. EDI
B. Protocols
C. TCP/IP
D. None of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:A

5. Which among the following product is suitable for E-Commerce ?

A. Books
B. Vegetables
C. All of these
D. None of these

Answer:A

6. ……………allows a business application on the computer of one organization to


communicate directly with the business application on the computer of another company.

A. EDI
B. Protocols
C. Standards
D. Business applications

Answer:A

7. Electronic Exchange of business documents in a standard format is known as


………………

A. E-commerce
B. E-Business
C. EDI
D. None of these

Answer:C

8. ………………. is essentially a business process that connects manufacturers, retailers,


customers and suppliers in the form of a chain to develop and deliver products.

A. E-commerce
B. EDI
C. Networking
D. SCM

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:D

9. Which of the following is not a party of SCM ?

A. Suppliers
B. Manufacturers
C. Distributors
D. Customers

Answer:C

10. ………………is a commercial process that includes production, distribution, sales or


delivery of goods and services through electronic means

A. E-commerce
B. SCM
C. EDI
D. None of these

Answer:A

11. Among the alternate models of B2B e-commerce,……is the best means to obtain a
competitive advantage in the Market place.

A. Process based
B. strategic relationship based
C. transaction based
D. any of these

Answer:B

12. ……………..focus on producing a highly integrated value proposition through a


managed process.

A. hubs
B. community
C. contents
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:A

13. …………………is basically a concept of online marketing and distributing of products


and services over the internet

A. B2G
B. B2E
C. B2C
D. B2B

Answer:C

14. ……………………..e-commerce consists of the sale of products or services from a


business to the general public

A. B2G
B. B2E
C. B2B
D. B2C

Answer:D

15. Which of the following is not suitable for a B2C transaction ?

A. clothes
B. flowers
C. airline reservation
D. none

Answer:D

16. ……………..e-commerce transaction has the advantage of eliminating middlemen.

A. B2G
B. B2C
C. B2B
D. B2E

Answer:B

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

17………………….e-commerce involves customers gathering information, purchasing and


receiving products over an electronic network

A. B2G
B. B2E
C. B2B
D. B2C

Answer:D

18. Which among the following is not an user of B2C e-commerce ?

A. manufacturers
B. distributors
C. Publishers
D. None

Answer:D

19. ………………….e-commerce involves the electronic facilitation of transaction between


customers through some third party.

A. C2C
B. B2E
C. B2B
D. B2G

Answer:A

20. Which among the following is an example of C2C ?

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:D

21. Companies use………………………networks to automate employee related corporate


processes.

A. B2G
B. B2E
C. B2B
D. P2P

Answer:B

22. Which among the following is not a B2E application

A. Online Insurance policy management


B. Online supply requests
C. Special employee offers
D. Locate application and tax forms

Answer:D

23. ……………………..streamlines the flow of information and self service capabilities


through automation

A. SCC
B. CRM
C. CRP
D. SCM

Answer:A

24. ………………is a global web in which millions of users are communicating with each
other with the help of computers.

A. Internet
B. WWW
C. both of these
D. None of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:A

25. …………………is an application layer protocol for distributed, collaborative,


hypermedia information systems.

A. html
B. HTTP
C. Bothe of these
D. None of these

Answer:A

26. English physicist Tim Berner’s Lee was famous for the establishment of
…………………..in 1990.

A. internet
B. WWW
C. Intranet
D. none of these

Answer:B

27. ………refers to a kind of e-commerce which refers to a company selling or buying


from other company

A. B2G
B. B2E
C. B2B
D. P2P

Answer:C

28. Which of the following is not an example for B2B e-commerce ?

A. Sending and receiving orders


B. Invoice and shopping
C. all of these
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:D

29. A company that manufacturers bicycles may use the internet to purchase tyres from
their suppliers. This is an example of-----------transaction

A. B2G
B. B2E
C. B2B
D. P2P

Answer:C

30. …………..sites act as an intermediary between someone wanting a product or service


and potential providers

A. brokering sites
B. Information sites
C. industry portals
D. none of these

Answer:A

31. A……………portal is a specialized entry point to a specific market place or industry


niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

Answer:A

32. ………………..are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:B

33. Which among the following is an example for vertical portal ?

A. i-village
B. Yahoo
C. Google
D. Net scape

Answer:A

34. 4. A portal that helps to establish relations and to conduct transactions between various
organizations is termed as………………

A. B2B portals
B. C2C portals
C. both of these
D. none of these

Answer:A

35. A …………………….is a software that scours the internet collecting data about every
website and every webpage within it

A. spiders
B. Search Engines
C. robots
D. none of these

Answer:B

36. Search Engines databases are selected and built by computer robot programs
called………………

A. spiders
B. Search Engines
C. robots
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer:A

37. Which among the following is not an example for Search engine ?

A. Google
B. MSN
C. Alta vista
D. none of these

Answer:D

38. Web pages are prepared using their language as…………………

A. html
B. FTP
C. HTTP
D. None of these

Answer:A

39. A web page is transferred to users computer through ……………………..

A. html
B. FTP
C. HTTP
D. None of these

Answer:C

40. The user reaches this page when they specify the address of a website

A. Home page
B. Web page
C. Summary page
D. None of these

Answer:A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Unit 2:E-Money

41. Which among the following is not a B2E application

A. Online Insurance policy management


B. Online supply requests
C. Special employee offers
D. Locate application and tax forms

Answer D

42.……………………..streamlines the flow of information and self service capabilities


through automation

A. SCC
B. CRM
C. CRP
D. SCM

Answer A

43. ………………is a global web in which millions of users are communicating with each
other with the help of computers.

A. Internet
B. WWW
C. both of these
D. None of these

Answer A

44. Peer to Peer [P2P] is also used to describe ………………………

A. C2C
B. B2E
C. B2B
D. B2C

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer A

45. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

Answer A

46. Monster.com is an example of ……………………..website

A. C2C
B. B2E
C. B2B
D. B2C

Answer A

47. Monster.com is an example of ……………………..website

A. C2C
B. B2E
C. B2B
D. B2C

Answer A

48. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files

A. B2C
B. B2E
C. B2B
D. P2P

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer D

49. This is a protocol which allows files to be transferred from one computer to another
computer

A. TCP/IP
B. FTP
C. HTTP
D. none of these

Answer B

50. A ……………….is a document, typically written in plain text interspersed with


formatting instructions of html

A. Web page
B. home page
C. domain
D. none of these

Answer A

51. ………………….is the first page of a web site.

A. Web page
B. home page
C. domain
D. none of these

Answer B

52. Peer to Peer [P2P] is also used to describe ………………………

A. C2C
B. B2E
C. B2B
D. B2C

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer A

53.…………………….is an online auctioning site that facilitates the trade of privately


owned items between individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

Answer A

54. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.

A. Debit Card
B. credit card
C. Electronic purse
D. any of these

Answer C

55. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these

Answer B

56. ………………are automated methods of recognizing a person based on a physiological


or behavioral characteristic.

A. Biometrics
B. PIN
C. both of these
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer A

57. Companies use………………………networks to automate employee related corporate


processes.

A. B2G
B. B2E
C. B2B
D. P2P

Answer B

58. Which among the following is not a B2E application

A. Online Insurance policy management


B. Online supply requests
C. Special employee offers
D. Locate application and tax forms

Answer D

59. ……………………..streamlines the flow of information and self service capabilities


through automation

A. SCC
B. CRM
C. CRP
D. SCM

Answer A

60. …………..sites act as an intermediary between someone wanting a product or service


and potential providers

A. brokering sites
B. Information sites
C. industry portals
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer A

61. SET means ………………

A. Standard Electronic Technology


B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these

Answer C

62. The verification of credit card is done by using…………….. with a communications link
to the merchants acquiring bank

A. Credit card payment terminal


B. Point of Sale
C. All of these
D. none of these

Answer C

63. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments

A. customer
B. issuer
C. Merchant
D. Acquirer

Answer D

64. In …………………..type of payment system customer is allowed to spend only up to the


amount that have pre deposited into account.

A. Prepaid
B. Post paid
C. both of these
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer A

65. ………………type of payment system is highly useful to those customers who would
like to control overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer A

66. ……………………….credit card gives all the advantages of a normal credit card
without worrying about the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer A

67. ……………………facility helps the customer to pay only a small amount of the total
outstanding and revolve the rest of the payment to the next month.

A. Cash advance
B. Revolver
C. Tele draft
D. None of these

Answer B

68. …………………..is the system of purchasing cash credits in relatively small amounts,
storing the credits in our computer, and then spending them, when making electronic
purchases over the internet.

A. E-cash
B. Digicash
C. Cyber cash

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

D. any of these

Answer D

69. ………………….is a financial instrument which can be used more than once to borrow
money or buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these

Answer A

70. To accept a credit card for payment, we have to open a …………………account with
our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these

Answer C

71. A……………………..is a device that includes an embedded integrated circuit Chip


[ICC] that can be either a secure micro controller or equivalent intelligence with internal
memory or a memory chip alone.

A. smart Cards
B. E-Cheques
C. E-cash
D. none of these

Answer A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

72. ………………..is a kind of payment card that transfers fund directly from the
consumer’s bank account to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

Answer A

73. A ………………is an electronic file that uniquely identifies individuals and websites on
the internet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these

Answer B

74. The information Technology Act [IT ACT] came into effect on

A. 16th November 2000


B. 15th December 2000
C. 17th October 2000
D. none of these

Answer C

75. Information sent over the Internet commonly uses the set of rules
called……………………

A. TCP/IP
B. FTP
C. HTTP
D. gopher

Answer A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

76.……………………….is a person who breaks in or trespasses a computer system

A. Hacker
B. Snooper
C. operator
D. spoofer

Answer A

77. E-mail which contains useless material is termed as……………

A. Spam
B. useless mail
C. trunk mail
D. Junk mail

Answer D

78. India has enacted the first IT Act in the year……………………

A. 2001
B. 2002
C. 2009
D. 2000

Answer D

79. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these

Answer D

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Unit 3:E-Marketing

80. Trade mark, copyright, patent law etc comes under the purview of……………………

A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None

Answer: C

81. Which one of the following is not a principle of e-commerce ?

A. privacy
B. integrity
C. authentication
D. none of these

Answer: D

82. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.

A. Debit Card
B. credit card
C. Electronic purse
D. any of these

Answer: C

83. ………………is basically a secure gate between our organization data and internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer: A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

84. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these

Answer: B

85. ………………is automated methods of recognizing a person based on a physiological or


behavioral characteristic.

A. Biometrics
B. PIN
C. both of these
D. none of these

Answer: A

86. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments.

A. customer
B. issuer
C. Merchant
D. Acquirer

Answer: D

87. In …………………..type of payment system customer is allowed to spend only up to the


amount that have pre deposited into account.

A. Prepaid
B. Post paid
C. both of these
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer: A

88. ………………type of payment system is highly useful to those customers who would
like to control overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer: A

89. In …………………..type of payment system customer is allowed to spend only up to the


amount that have pre deposited into account.

A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer: A

90. …………………..is the system of purchasing cash credits in relatively small amounts,
storing the credits in our computer, and then spending them, when making electronic
purchases over the internet.

A. E-cash
B. Digicash
C. Cyber cash
D. any of these

Answer: D

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

91. To accept a credit card for payment, we have to open a …………………account with
our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these

Answer: C

92. A……………………..is a device that includes an embedded integrated circuit Chip


[ICC] that can be either a secure micro controller or equivalent intelligence with internal
memory or a memory chip alone.

A. smart Cards
B. E-Cheques
C. E-cash
D. none of these

Answer: A

93. .……………….is the exchange of goods or items or commodities and services or


applications used for money and deals the money matters

A. E-commerce
B. Commerce
C. Both of these
D. None

Answer: B

94. …………….is an approach to deliver information differentiated business values called


services by combining the system and process generally called resources

A. E-business
B. E-commerce
C. any of these
D. none

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer: A

95. ……………….always operate on intranet

A. E--commerce
B. E-Business
C. EDI
D. None of these

Answer: B

96. Which among the following is not an example for E-commerce

A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these

Answer: C

97. ………………were the first to establish prominent E-commerce Brands

A. Baazar.com
B. E-bay and Amazon
C. E-trade.com
D. none of these

Answer:B

98. …………….is a systems approach to Managing the entire flow of information,


materials, and services from raw material suppliers through factories and warehouses to
the end customer.

A. CRM
B. SRM
C. EDI

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

D. SCM

Answer:D

99. …………….is a form of supply chain where a series of assembly operations are carried
out to obtain the final product

A. Converging supply chain


B. Diverging supply chain
C. Any of these
D. None

Answer:A

100. .…………………is a form of supply chain where a wide variety of finished goods are
produced with limited number of raw material or components.

A. Converging structure
B. Diverging structure
C. Any of these
D. None

Answer:B

101. ……………………is the exchange of services, information or product from one


business to a government agency

A. B2G
B. B2E
C. B2B
D. P2P

Answer:C

102. Peer to Peer [P2P] is also used to describe ………………………

A. C2C
B. B2E

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

C. B2B
D. B2C

Answer:A

103. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

Answer:A

104. Monster.com is an example of ……………………..website

A. C2C
B. B2E
C. B2B
D. B2C

Answer:A

105. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files

A. B2C
B. B2E
C. B2B
D. P2P

Answer:D

106. This is a protocol which allows files to be transferred from one computer to another
computer

A. TCP/IP

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

B. FTP
C. HTTP
D. none of these

Answer:B

107. A ……………….is a document, typically written in plain text interspersed with


formatting instructions of html

A. Web page
B. home page
C. domain
D. none of these

Answer: A

108. ………………….is the first page of a web site.

A. Web page
B. home page
C. domain
D. none of these

Answer: B

109. ……………..allows the person to type ion just the main word or words and the site will
come in

A. Web page
B. home page
C. domain
D. none of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer: C

110. ”Google” is one of the most popular………………..

A. Portal
B. Browser
C. Search Engine
D. none of these

Answer: C

111. A ………………….. Presents information from diverse sources in a unified way in a


web site.

A. Web portal
B. Link page
C. Both of these
D. none of these

Answer: C

112. A ………………is an electronic file that uniquely identifies individuals and websites on
the internet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these

Answer: B

113. Information sent over the Internet commonly uses the set of rules
called……………………

A. TCP/IP
B. FTP

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

C. HTTP
D. Gopher

Answer: A

114. ……………………….is a person who breaks in or trespasses a computer system

A. Hacker
B. Snooper
C. operator
D. spoofer

Answer: A

115. Peer to Peer [P2P] is also used to describe ………………………

A. C2C
B. B2E
C. B2B
D. B2C

Answer: A

116. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

Answer: A

117. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files

A. B2C
B. B2E

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

C. B2B
D. P2P

Answer: D

118. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files

A. B2C
B. B2E
C. B2B
D. P2P

Answer: D

119. This is a protocol which allows files to be transferred from one computer to another
computer

A. TCP/IP
B. FTP
C. HTTP
D. none of these

Answer: B

120. A ……………….is a document, typically written in plain text interspersed with


formatting instructions of html

A. Web page
B. home page
C. domain
D. none of these

Answer: A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Unit 4:Cyber Law Concepts

121. ………………….is the first page of a web site.

A. Web page
B. home page
C. domain
D. none of these

Answer: B

122. ……………..allows the person to type ion just the main word or words and the site will
come in

A. Web page
B. home page
C. domain
D. none of these

Answer: C

123. A ………………….. presents information from diverse sources in a unified way in a


web site

A. Web portal
B. Link page
C. Both of these
D. none of these

Answer: C

124. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.

A. Debit Card
B. credit card
C. Electronic purse
D. any of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer: C

125. ………………is basically a secure gate between our organization data and internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer: A

126. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these

Answer: B

127. ………………are automated methods of recognizing a person based on a physiological


or behavioral characteristic.

A. Biometrics
B. PIN
C. both of these

none of these

Answer: A

128. In Biometrics,ID system is designed to prevent more than one person from using a
single identity

A. Positive ID system
B. Negative ID system
C. both of these

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

D. none of these

Answer: A

129. In Biometrics,…………………………ID system is designed to prevent one person


from using more than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

Answer: B

130. …………………..are program developed by some dishonest people to destroy the


computer system and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these

Answer: B

131. he dimension of e-commerce that enables commerce across national boundaries is called
______________.

A. interactivity
B. global reach
C. richness
D. ubiquity

Answer: B

132. The dimension of e-commerce that enables commerce across national boundaries is
called ______________.

A. interactivity

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

B. global reach
C. richness
D. ubiquityans

Answer: B

133. The primary source of financing during the early years of e-commerce was
______________.

A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings

Answer: C

134. The source of revenue in a subscription revenue model is ______________.

A. Fees from advertisers in exchange for advertisements


B. Fees for business referrals
C. Fees from subscribers in exchange for access to content or services
D. Fees for enabling or execution a transaction

Answer: C

135. Industry structure is defined as ______________.

A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company's product or service fulfills the needs of customers

Answer: A

136. A situation where there are no differences among products or services, and the only
basis of choosing products is price is known as ______________.

A. a value web
B. value chain

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

C. profit
D. commoditization

Answer: D

137. The component of TCP/IP that provides the Internet's addressing scheme and is
responsible for the actual delivery of packets is ______________.

A. TCP
B. IP
C. the Network Layer
D. the Application Layer

Answer: B

138. Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone


B. network architecture limitations
C. insufficient reach
D. best-efforts QOS

Answer: C

139. Internet users account for about ______________ of the world's population.

A. 7%
B. 17%
C. 27%
D. 47%

Answer: B
140. The largest component of a Web site budget is ______________.

A. system maintenance
B. system development
C. content design and development
D. telecommunications

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer: A

Unit 5: Cyber Jurisprudence

150. The set of standards for communication between a browser and a program running on
a server that allows for interaction between the user and the server is known as
______________.

A. Active Server Pages (ASP)


B. Java Server Pages (JSP)
C. Common Gateway Interface (CGI)
D. VBScript

Answer: C

151. The most common type of Internet crime according to the IC3 is ______________.

A. Credit card fraud


B. Check fraud
C. Non-delivery
D. Auction fraud

Answer: D

152. When hackers flood a Web site with useless traffic to overwhelm the network, it is
called ______________.

A. phishing
B. pharming
C. a Denial of Service (DoS) attack
D. spoofing

Answer: C

153. A security plan begins with a(n) is ______________.

A. security policy
B. risk assessment

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

C. implementation plan
D. security organization

Answer :B

154. ______________ influence the behavior of others through their personality, skills, or other
factors.

A. Opinion leaders
B. Direct reference groups
C. Indirect reference groups
D. Lifestyle groups

Answer: A

155. A(n) ______________ represents data as two-dimensional tables with records


organized in rows and attributes in columns.

A. database management system


B. data warehouse
C. SQL query
D. relational database

Answer :D

156. Creating multiple versions of information goods and selling essentially the same
product to different market segments at different prices is called______________.

A. versioning
B. bundling.
C. transactive content
D. price discrimination

Answer :A

157. Which of the following represents a limiting factor for the growth of e-commerce?

A. Persistent cultural attraction of physical markets and traditional shopping experiences

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

B. Inadequate selection of goods compared to physical marketplaces.


C. E-commerce lacks the convenience of other methods of transacting business
D. The potential audience for e-commerce is too low to support it as a widespread method
of commerce

Answer :A

158. Which of the following is a measure of the percentage of purchasers who return to a
Web site within a year?

A. loyalty
B. reach
C. recency
D. unique visitors

Answer :A

159. Which of the following statements about privacy is true?

A. It is a moral right to be left alone


B. Only corporations and government need to be concerned about it
C. It has only just recently become a concern
D. It is most easily obtained on the Internet

Answer :A

160. The redirection of traffic from a legitimate site to an infringing site is called
______________.

A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording

Answer: B

161. The most common type of Internet crime according to the IC3 is ______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. Credit card fraud


B. Check fraud
C. Non-delivery
D. Auction fraud

Answer: D

162. When hackers flood a Web site with useless traffic to overwhelm the network, it is
called ______________.

A. phishing
B. pharming
C. a Denial of Service (DoS) attack
D. spoofing

Answer: C

163. A security plan begins with a(n) is ______________.

A. security policy
B. risk assessment
C. implementation plan
D. security organization

Answer: B

164. ______________ influence the behavior of others through their personality, skills, or
other factors.

A. Opinion leaders
B. Direct reference groups
C. Indirect reference groups
D. Lifestyle groups

Answer: A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

165. A(n) ______________ represents data as two-dimensional tables with records


organized in rows and attributes in columns.

A. database management system


B. data warehouse
C. SQL query
D. relational database

Answer: D

166. Creating multiple versions of information goods and selling essentially the same
product to different market segments at different prices is called______________.

A. versioning
B. Bundling.
C. transitive content
D. price discrimination

Answer: A

167. Which of the following represents a limiting factor for the growth of e-commerce?

A. Persistent cultural attraction of physical markets and traditional shopping experiences


B. Inadequate selection of goods compared to physical marketplaces.
C. E-commerce lacks the convenience of other methods of transacting business
D. The potential audience for e-commerce is too low to support it as a widespread method of
commerce

Answer: A

168. Which of the following is a measure of the percentage of purchasers who return to a
Web site within a year?

A. loyalty
B. reach
C. regency
D. unique visitors

Answer: A

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

169. Which of the following statements about privacy is true?

A. It is a moral right to be left alone


B. Only corporations and government need to be concerned about it
C. It has only just recently become a concern
D. It is most easily obtained on the Internet

Answer: A

170. The redirection of traffic from a legitimate site to an infringing site is called
______________.

A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording

Answer: B

171. ______________ are networks that connect people within a company to each other and
to the company network.

A. Bitstreams
B. Extranets
C. Internets
D. Intranets

Answer: D

172. The type of website that is designed to build customer goodwill and to supplement
other sales channels rather then sell the company's products directly is known as a
______________ website.

A. marketing
B. click-and-mortar
C. customer service
D. corporate

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

Answer : D

173. A website offering content created by third party transparently to customers is an


example of ______________.

A. Reinter mediation
B. Syndication
C. Virtual Manufacturing
D. Build-to-order

Answer: B

174. E-commerce technologies have improved upon traditional commerce technologies in


______________.

A. richness
B. reach
C. both richness and reach
D. neither richness nor reach

Answer :C

175. All of the following are technologies used to gather information about you online
except ______________.

A. spy ware
B. cookies
C. Gmail
D. Anonymizers

Answer : D

176. All of the following are major B2C business models except ______________.

A. content provider
B. industry consortium

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

C. transaction broker
D. service provider

Answer :B

177. A perfect market is one in which ______________.

A. One firm develops an advantage based on a factor of production that other firms cannot
purchase
B. One participant in the market has more resources than the others
C. there are no competitive advantages or asymmetries because all firms have equal access
to all the factors to production
D. competition is at a minimum, as each niche market within an industry is served by the
company with the greatest competitive advantage

Answer : C

178. ______________ is a program that you can run from the DOS prompt in the Windows
operating system in order to check the connection between your client and the server.

A. Ping
B. Telnet
C. Tracert
D. SSL

Answer : A

179. Which of the following is a new and disruptive Web feature or service?

A. XML
B. diffserv
C. blogs
D. CDMA

Answer C

180. All of the following are steps in the systems development life cycle except
______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. Systems Design
B. Testing
C. Implementation
D. Debugging

Answer : D

181. What Web server functionality allows it verify usernames and passwords and process
certificates and encryption information?

A. Processing of HTTP requests


B. File Transfer Protocol
C. Data capture
D. Security services

Answer : D

182. The ability to change the product to better fit the needs of the customer is called
______________.

A. customization
B. personalization
C. privacy
D. accessibility

Answer : A

183. All of the following are major categories of computer viruses except ______________.

A. Macro viruses
B. File-infecting viruses
C. Script viruses
D. Trojan viruses

Answer : D

184. The most widely used encryption standard is ______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. Advanced Encryption Standard (AES)


B. Data Encryption Standard (DES)
C. Universal Encryption Standard (UES)
D. Optimal Encryption Standard (OES)

Answer : A

185. The most prevalent online payment method is ______________.

A. PayPal
B. checks
C. credit cards
D. debit

Answer : C

186. Complete price transparency in a perfect information marketplace is necessary for


______________ to take effect.

A. Bertrand's Law
B. the Law of Universal Prices
C. the Law of One Price
D. the Law of Perfect Commerce

Answer :C

187. The process of getting customers to pass along a company's marketing message to
friends, family, and colleagues is known as ______________.

A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing

Answer : B

188. E-business can be defined as ______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. the uninhibited flow of information and goods on the Web


B. the use of the Internet and the Web to transact business
C. digitally enabled transactions and processes within an organization
D. commercial transactions involving electronic goods

Answer : C

189. All of the following are types of social marketing except ______________.

A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising

Answer : A

190. The ethical principle which states that if an action is not right for all situations, then it
is not right for any situation is known as ______________.

A. The Golden Rule


B. Slippery Slope
C. No Free Lunch
D. Universalism

Answer : D

191. What is the first step in a P3P-enabled transaction?

A. send Web page


B. http GET request Web page
C. Send P3P policy files
D. http GET request P3P policy files

Answer : B

192. Products are made to prior to orders received based on estimated demand under a
______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. supply-push model
B. demand-push model
C. supply-pull model
D. demand-pull model

Answer : A

193. The majority of job seekers rely on which of the following?

A. Word-of-mouth leads
B. Employment agencies
C. Internet and newspapers equally
D. Internet only

Answer : C

194. Which of the following best describes predicted growth in C2C and B2C auction
spending?

A. B2C spending will overtake C2C spending


B. Both types of spending will increase
C. C2C spending will decrease while B2C increases
D. Both types of spending will decline at similar rates

answer :B

195. A materials requirements planning (MRP) system is an example of ______________.

A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange

answer :C

196. All of the following are objectives of private industrial networks except
______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. developing efficient purchasing and selling business processes industry-wide


B. operating on a local scale
C. creating increased supply chain visibility
D. reducing industry risk

View answer : B

197. The E-commerce domain that involves business activity initiated by the consumer and
targeted to businesses is known as ______________.

A. Business to Business (B2B)


B. Consumer to Consumer (C2C)
C. Consumer to Business (C2B)
D. Business to Consumer (B2C)

Answer: (C)

198. Why would a merchant want to customize products?

A. To charge a higher price


B. To decrease costs
C. It is required in EC
D. Customers will only accept customized products

Answer: (A)

199. A ______________ is the set of planned activities designed to result in a profit in a


marketplace.

A. business model
B. profit model
C. business plan
D. revenue model

Answer: (A)

200. Compared to Internet users, the number of cell phone subscribers is ______________.

Prof. Gayatri A.Amate www.dacc.edu.in


DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45

Subject: E-Commerce (604) CLASS: TYBBA VI SEM (2013 PATTERN)

A. about the same


B. slightly fewer
C. much fewer
D. much larger

Answer: (D)

Prof. Gayatri A.Amate www.dacc.edu.in

You might also like