Download as pdf or txt
Download as pdf or txt
You are on page 1of 159

106-DIGITAL BUSINESS MCQ

1.The scope of e-commerce is ________ than digital business.


A. Broader
B. Narrower
C. Wider
D. Hyper
ANS: B. Narrower

2.All electronically mediated information exchanges are known as ______


A. Digital Business
B. E-Business
C. E-Commerce
D. Digital Marketing
ANS: C. E-Commerce

3. _______ is NOT an example of Digital Business.


A. OYO Rooms
B. Reliance SMART
C. Ola
D. D Mart Ready
ANS:B. Reliance SMART

4. Digital business is similar to the term __________ which was first coined by IBM
corporation.
A. E-business
B. E-Commerce
C. Internet Business
D. Both A and B
ANS: A. E-business

5. Digital business Infrastructure refers to the combination of ________


A. Hardware
B. Software
C. Servers
D. All of the above
ANS: D. All of the above

6. Digital business is __________ in its scope than e-commerce.


A. Broader
B. Narrower
C. Restricted
D. Border
ANS: A. Broader

7. OLX and Quikr is an example of _________digital business model.


A. P2P
B. B2B
C. C2C
D. Both A & B
ANS: A. P2P
8. ________ is an organization that uses technology as a competitive advantage in its internal
and external operations.
A. Digital Economy
B. Digital enterprise
C. E-commerce
D. None of the above
ANS; B. Digital enterprise.

9. Customers pay a fixed amount, usually monthly, to get some type of service. This is an
examples of ________ Digital Business Model
A. Affiliate Fees
B. Transaction Fees
C. Subscription Fees
D. Licensing Fees
ANS: C. Subscription Fees

10. Adoption of digital business by established SMEs is generally ___________


A. Less than that in larger businesses
B. More than that in larger businesses.
C. Equal to larger businesses.
D. None
ANS: A. Less than that in larger businesses

11. _________describes the manner in which business is done to generate revenue and
create value.
A. Digital Business
B. Business Model
C. Ecommerce
D. CRM
ANS: B. Business Model

12.Companies charge others for allowing them to place a banner on their sites. This
Digital Business Model is known as ______
A. Transaction Fees
B. Licensing Fees
C. Affiliate Fees
D. Advertising Fees
ANS: D. Advertising Fees

13. This business model involves trade between business organisations and customers.
A. B2B
B. B2C
C. P2P
D. C2C
ANS: B. B2C

14. IoT stands for


A. Information Of Things
B. Input Output Things
C. Internet of Technology
D. Internet of Things
ANS: D. Internet of Things

15. ___________EC model is that of selling products or services online


A. Brick & Mortar
B. Online direct marketing.
C. Indirect Marketing
D. Both A & B
ANS: B. Online direct marketing.

16. Online Community is also called______


A. Internet community
B. Web community
C. Social Community
D. Both A & B
ANS: D. Both A & B

17. _______digital business model involves trade and transaction dealings between
business establishments.
A. B2C
B. C2B
C. B2B
D. P2P
ANS: C. B2B

18. When members of virtual community interacts with each other over an internet, then
it is called ___________.
A. Web Community
B. Online Commeunity
C. Internet Community
D. All of the above
ANS: D. All of the above

19. ________is the new business model aim to gain competitive advantage by using
Information Technology.
A. Digital Economy
B. Digital Enterprise
C. Internet of Things
D. E-commerce
ANS: B. Digital Enterprise

20. In online or digital ERP, ERP stands for________


A. Enterprise Resource Planning
B. Enterprise Relationship Planning
C. Enterprise Resource Process
D. Electronic Resource Planning
ANS: A. Enterprise Resource Planning

21. In eCRM system, CRM stands for_______


A. Customer Resource Management
B. Customer Retention Management
C. Customer Relationship Management
D. Customer Relationship Mapping
ANS: C. Customer Relationship Management

22. The transformation of key business processes through the use of digital or Internet
technologies is known as ____________
A. E-business
B. E-Commerce
C. Digital Business
D. Both A and C
ANS: D.Both A and C

23. A _________ community is one where the interaction takes place over a computer
network, mainly the Internet.
A. Online
B. Virtual
C. Internet
D. All of the above
ANS: D. All of the above

24. _______ is a new digital ecosystem, which can be described through five Cs: creativity,
connectivity, collaboration, convergence, & community.
A. .NET
B. Web 2.0
C. IoT
D. Webex
ANS: B. Web 2.0

25. _________ has specific objectives to increase profits when increasing its benefits to
society.
A. Digital Business
B. Social Network
C. Social Enterprise
D. Virtual Community
ANS: C. Social Enterprise

26_________includes digital wireline or wireless communication networks, computers,


software, and other related information technologies.
A. Internet Economy
B. Digital Economy
C. Social Economy
D. Both A & B
ANS:D. Both A & B

1. Which of the following examines information passing through switches,hubs, or


routers?
A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures

2. Which of the following describes e-commerce?


A. Doing business electronically
B. Doing business
C. Sale of goods
D. All of the above
3. Which of the following is part of the four main types for e-commerce?
A. B2B
B. B2C
C. C2B
D. All of the above

4. Which segment do eBay, Amazon.com belong?


A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
5. Which type of e-commerce focuses on consumers dealing with eachother?
A. B2B
B. B2C
C. C2B
D. C2C

6. Which segment is eBay an example?


A. B2B
B. C2B
C. C2C
D. None of the above

7. Which type deals with auction?


A. B2B
B. B2C
C. C2B
D. C2C

8. In which website Global Easy Buy is facilitated?


A. Ebay.com
B. Amazon.com
C. Yepme.com
D. None of these

9. The best products to sell in B2C e-commerce are:


A. Small products
B. Digital products
C. Specialty products
D. Fresh products
10. Which products are people most likely to be more uncomfortable buyingon the Internet?
A. Books
B. Furniture
C. Movies
D. All of the above

11. Which products are people most likely to be comfortable buying on theInternet?
A. Books
B. PCs
C. CDs
D. All of the above

12. Digital products are best suited for B2C e-commerce because they:
A. Are commodity like products
B. Can be mass-customised and personalised
C. Can be delivered at the time of purchase
D. All of the above

13. The solution for all business needs is


A. EDI
B. ERP
C. SCM
D. None of the above

14. All of the following are techniques B2C e-commerce companies use toattract
customers, except
A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
15. E-commerce involves
A. marketing
B. advertising
C. warehousing
D. all of the above

16. Which is not a function of E-commerce


A. marketing
B. advertising
C. warehousing
D. none of the above

17. Which term represents a count of the number of people who visit onesite, click on an
ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through
C. Spam
D. All of the above

18. What is the percentage of customers who visit a Web site and actuallybuy something
called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate

19. What are materials used in production in a manufacturing company orare placed on
the shelf for sale in a retail environment?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
20. What are materials that are necessary for running a modern corporation,but do not relate
to the company’s primary business activities?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above

21. What are ballpoint pens purchased by a clothing company?


A. Direct materials
B. Indirect materials
C. EDI
D. None of the above

22. What is another name for materials which cannot be linked to a specificproduct or
process?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above

23. What is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids until there is
only one seller left?
A. B2B marketplace
B. Intranet
C. Reverse auction
D. Internet
24. What are plastic cards the size of a credit card that contains anembedded chip on which
digital information can be stored?
A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards

25. Most individuals are familiar with which form of e-commerce?


A. B2B
B. B2C
C. C2B
D. C2C

26. Which form of e-commerce currently accounts for about 97% of all e-commerce
revenues?
A. B2B
B. B2C
C. C2B
D. C2C

27. Which of the following are advantages normally associated with B2B e-commerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
28. If the threat of substitute products or services is low it is a(n):
A. Disadvantage to the supplier
B. Advantage to the buyer
C. Advantage to the supplier
D. None of the above

29. The threat of new entrants is high when it is:


A. Hard for customers to enter the market
B. Hard for competitors to enter the market
C. Easy for competitors to enter the market
D. Easy for customers to enter the market

30. If it is easy for competitors to enter the market, the threat of new entrantsis considered:
A. High
B. Low
C. More
D. Less

31. An industry is less attractive for suppliers when the rivalry among existingcompetitors is:
A. High
B. Low
C. More
D. Less

32. Unique value auction mainly applies to?


A. New products
B. Second hand products
C. Engineering products
D. None of the above.
33. Paisapay is facilitated in
A. eBay.co.in
B. amazon.com
C. flipkart.com
D. none of the above

34. Which of the following is a useful security mechanism when consideringbusiness


strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above

35. Which of the following is not related to security mechanism


A. encryption
B. decryption
C. e-cash
D. all the above

36. A product or service that customers have come to expect from an industry, which must
be offered by new entrants if they wish to compete andsurvive, is known as a(n)?

A. Switching costs
B. Loyalty programs
C. Entry barriers
D. Affiliate programs
37. Which of the following statements accurately reflect the impact oftechnology?
A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
C. Technology has increased the threat of substitute products and services
D. all of the above

38. A business cannot be all things to all people. Instead, a business must:
A. Identify target customers
B. Identify the value of products/services as perceived by customers
C. all of the above
D. None of the above

39. How the transactions occur in e-commerce?


A. Using e-medias
B. Using computers only
C. Using mobile phones only
D. None of the above

40. Which type of products is lesser purchased using e-commerce?


A. automobiles
B. books
C. softwares
D. none

41. A business competing in a commodity like environment must focus onwhich of the
following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
42. Which of the following refers to creating products tailored to individualcustomers?
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction

43. Materials used in the normal operation of a business but not related toprimary
business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff

44. Amazon.com is well-known for which e-commerce marketing technique?


A. Banner ads
B. Pop-up ads
C. Affiliate programs
D. Viral marketing

45. What is the name given to an interactive business providing a centralised market where
many buyers and suppliers can come together for e- commerce or commerce-related
activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
46. Which form of e-marketplace brings together buyers and sellers frommultiple
industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined

47. Which form of e-marketplace brings together buyers and sellers from thesame industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined

48. Which type of add appears on a web page?


A. pop-under ad
B. Pop-up ad
C. Banner ad
D. Discount ad

49. What type of ad appears on top of a web page?


A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad

50. What type of ad appears under a web page?


A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
51. Which, if any, of the following types of ads are people most willing totolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above

52. Which of the following is an Internet-based company that makes it easyfor one person to
pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary

53. Which of the following is a method of transferring money from onepersons


account to another?
A. electronic check
B. credit card
C. e-transfer
D. none of the above

54. An electronic check is one form of what?


A. e-commerce
B. online banking
C. e-cash
D. check

55. If you need to transfer money to another person via the internet, which ofthe following
methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
56. Which of the following permits the transmission of a bill, along withpayment of that
bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above

57. A combination of software and information designed to provide securityand information


for payment is called a?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption

58. What is the name for direct computer-to-computer transfer of transactioninformation


contained in standard business documents?

A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange

59. Which of the following is used in B2B to pay for purchases?


A. e-commerce
B. financial electronic data interchange
C. electronic data exchange
D. electronic checks
60. Public key encryption uses multiple keys. One key is used to encryptdata, while
another is used to decrypt data. The key used to encrypt data is
called the key, while the key used to decrypt data is called the
key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private

61. Secure Sockets Layers does which of the following?


A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above

62. When a transaction is processed online, how can the merchant verify thecustomers
identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange

63. The practice of forging a return address on an e-mail so that the recipientis fooled into
revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
64. What is a model of a proposed product, service, or system?
A. Prototyping
B. Prototype
C. Proof-of-concept prototype
D. Selling prototype

65. What is an internal organisational Internet that is guarded against outside access by a
special security feature called a firewall (which can be software, hardware, or a combination of
the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client

66. What is an intranet that is restricted to an organisation and certainoutsiders, such


as customers and suppliers?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client

67. What is a detailed process for recovering information or an IT system inthe event of a
catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
68. What is a separate facility that does not have any computer equipmentbut is a place
where the knowledge workers can move after the disaster?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve

69. What is a separate and fully equipped facility where the company canmove
immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve

70. What charts (1) the cost to your organisation of the unavailability of information and
technology and (2) the cost to your organisation of recovering from a disaster over time?

A. Disaster recovery plan


B. Hot site
C. Cold site
D. Disaster recovery cost curve

71. Which factor determines when the IT system will be available forknowledge workers to
access?
A. Availability
B. Accessibility
C. Reliability
D. None of the above
72. Which factor determines who has the right to access different types of ITsystems and
information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability

73. Which factor ensures the IT systems are functioning correctly andproviding accurate
information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability

74. Which factor represents how well your system can adapt to increaseddemands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability

75. Which factor represents a systems ability to change quickly?


A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
76. What is a set of conditions used to measure how well a product orsystem
functions?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark

77. What determines the future IT infrastructure requirements for newequipment and
additional network capacity?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark

78. What automates business processes?


A. Workflow
B. ASP
C. Workflow system
D. EIP

79. What defines all of the steps or business rules, from beginning to end,required for a
process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA

80. What sends work assignments through an e-mail system?


A. Database-based enterprise information portal
B. Messaging-based enterprise information portal
C. Database-based workflow system
D. Messaging-based workflow system
81. Which will not harm computer resources?
A. firewall
B. Virus
C. Trojan horse
D. None of the above

82. Which is not a function of ERP?


A. Warehousing
B. sales
C. scheduling
D. None of the above

83. Which is a function of ERP?


A. Warehousing
B. sales
C. scheduling
D. all of the above

84. Which of the following is the primary characteristic of an intranet?


A. People outside the organisation can access it
B. People inside the organisation cant access it
C. People outside the organisation cant access it
D. None of the above

85. Which concept suggests that different applications and computersystems should be
able to communicate with one another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
86. Which service encompasses all technologies used to transmit andprocess information
on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services

87. Which process can prevent data from losing due to computer problemsor human
errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing

88. Which process is used to reinstall data from a copy when the originaldata has been
lost?

A. backup
B. recovery
C. benchmarking
D. data cleansing

89. What describes a process of continuously measuring results and comparing those
results to optimal performance so that actual performancemay be improved?
A. Performance
B. Capacity planning
C. Benchmarking
D. Data cleansing
90. Who protects system from external threats?
A. firewall
B. EDI
C. ERP
D. Script kiddies

91. Who breaks into other peoples computer systems and steals anddestroys
information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies

92. What is software that comes hidden in free downloadable software and tracks your
online movements, mines the information stored on your computer, or uses your computers
CPU and storage for some task you know nothing about?

A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above

93. ERP stands for


A. Enterprise resolution planning
B. Enterprise reverse planning
C. Enterprise resource planning
D. None of the above
94. Which is not a component of ERP?
A. Legacy systems
B. Bolt on applications
C. Operational database
D. Cybersoft

95. Which is not a function of ERP?


A. Human resource management
B. financial
C. warehousing
D. None of the above

96. What is a type of virus that spreads itself, not just from file to file, butfrom computer to
computer via e-mail and other Internet traffic?

A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above

97. What floods a Web site with so many requests for service that it slowsdown or
crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
98. What harnesses far-flung computers together by way of the Internet or a virtual private
network to share CPU power, databases, and database storage?

A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above

99. What consists of the identification of risks or threats, the implementation of security
measures, and the monitoring of those measures for effectiveness?
A. Risk management
B. Risk assessment
C. Security
D. None of the above

100. What is the process of evaluating IT assets, their importance to the organisation, and
their susceptibility to threats, to measure the risk exposureof these assets?
A. Risk management
B. Risk assessment
C. Security
D. None of the above

***
Answer Key

1. B
2. A
3. D
4. B
5. D

6. D
7. D
8. A
9. B
10. B

11. D
12. D
13. B
14. D
15. D

16. C
17. B
18. D
19. A
20. B

21. B
22. B
23. C
24. D
25. B

26. A
27. D
28. C
29. C
30. A
31. A
32. B
33. A
34. D
35. C

36. C
37. D
38. C
39. A
40. A

41. A
42. A
43. C
44. C
45. D

46. A
47. B
48. C
49. B
50. A

51. D
52. D
53. A
54. C
55. D

56. C
57. A
58. D
59. B
60. D
61. D
62. B
63. D
64. B
65. B

66. C
67. A
68. C
69. B
70. D

71. A
72. B
73. C
74. D
75. A

76. D
77. C
78. C
79. A
80. D

81. A
82. D
83. D
84. C
85. D

86. D
87. A
88. B
89. C
90. A
91. A
92. D
93. C
94. D
95. D

96. B
97. C
98. D
99. A
100.A
MCQ - 106 Digital Businesses
World Wide Web (WWW) was introduced in the year ……………………

(a) 1994
(b) 1996
(c) 1992
(d) 1990

) ……………….is an early form of E-commerce

(a) SCM
(b) EDI
(c) Both of these
(d) None of these

3) ………………..is concerned with the buying and selling information, products


and services over computer communication networks

(a) Commerce
(b) E-Commerce
(c) E-Business
(d) None of these

4) ………………..is a set of standards developed in the 1960s to exchange


business information and to do electronic transactions

(a) EDI
(b) Protocols
(c) TCP/IP
(d) None of these

5) Which among the following product is suitable for E-Commerce ?

(a) Books
(b) Vegetables
(c) All of these
(d) None of these
6) ……………allows a business application on the computer of one organization
to communicate directly with the business application on the computer of
another company.

(a) EDI
(b) Protocols
(c) Standards
(d) Business applications

7) Electronic Exchange of business documents in a standard format is known as


………………

(a) E-commerce
(b) E-Business
(c) EDI
(d) None of these

8) ………………. is essentially a business process that connects manufacturers,


retailers, customers and suppliers in the form of a chain to develop and deliver
products.

(a) E-commerce
(b) EDI
(c) Networking
(d) SCM

) Which of the following is not a party of SCM ?

(a) Suppliers
(b) Manufacturers
(c) Distributors
(d) Customers

10) ………………is a commercial process that includes production, distribution,


sales or delivery of goods and services through electronic means

(a) E-commerce
(b) SCM
(c) EDI
(d) None of these
_____ is the father of Modern Marketing.
 Peter Drucker

 Philip Kotler

 Lester Wunderman

 Abraham Maslow

_______is not a part of marketing mix.


A. Product

B. Purpose

C. Place

D. Price

13) Many people want BMW, only a few are able to buy” this is an example of
_______
 Need

 Want

 Demand

 Status

Want for a specific product backed by an ability to pay is called _____


 Demand

 Need

 Want

 Customer

Marketing is a process which aims at ________


 Production

 Profit-making.

 The satisfaction of customer needs

 Selling products

16) The term marketing refers to _______


 Advertising, Sales Promotion, Publicity and Public Relational activities

 A new product needs ideas, Developments, concepts and improvements.

 Sales Planning, Strategy and Implementation

 A philosophy that stresses customer value and satisfaction.

______ are the form of human needs take as shaped by culture & individual
personality.
 Wants

 Demands

 Needs

 Social Needs

Select an appropriate definition of Want


 More consumer Needs

 Needs backed by buying power

 Needs directed to the product

 Basic human requirements


The most formal and best definition of marketing is ___________
 An organizational function and a set of process for creating, communicating
and delivering, value to customers and that benefit the organization.

 Improving the quality of life for consumers

 Meeting needs profitability

 Marketing is an organizational function includes the 4Ps

20) Marketing is the activity, set of ___________ & processes for creating,
communicating, delivering & exchanging offerings that have value for customers,
clients, partners & society.
 Institutions

 Organizations

 Companies

 Enterprises

Which of the following is not true about National Electronic Funds Transfer (NEFT)
system?
A) There is no limit on transaction through NEFT
B) NEFT operates in hourly batches.
C) NEFT is a payment system which facilitates one-to-one funds transfer.
D) Only bank branches which are NEFT enabled, can be a part of the NEFT funds
transfer network.
E) All of the above are correct

Which of the following is not true about Real Time Gross Settlement (RTGS)
system?
A) The minimum amount that can be received through RTGS is ` 2 lakh.
B) The banks receive the funds in real time as soon as funds are transferred by the
remitting bank.
C) The minimum amount to be remitted through RTGS is ` 2 lakh.
D) RTGS is a payment system which facilitates settlement of funds transfers
individually on an order by order basis.
Which of the following is not true about Real Time Gross Settlement (RTGS)
system?
A) The minimum amount that can be received through RTGS is ` 2 lakh.
B) The banks receive the funds in real time as soon as funds are transferred by the
remitting bank.
C) The minimum amount to be remitted through RTGS is ` 2 lakh.
D) RTGS is a payment system which facilitates settlement of funds transfers
individually on an order by order basis.
E) All of the above are correct.

Which of the following is not true about Unified Payments Interface (UPI)?
A) UPI is an instant payment system developed by the National Payments
Corporation of India (NPCI).
B) Through UPI, all payments are instant and takes place in banking hours.
C) Under UPI person will have a single identity and password for using multiple
bank accounts.
D) UPI is based on the Immediate Payment Services (IMPS) infrastructure.
E) All of the above are correct.

Which of the following is not true about Mobile Money Identifier (MMID)?
A) Mobile Money Identifier (MMID) is a seven-digit number, issued by banks for
effecting financial transactions through the user’s mobile phone.
B) The user’s mobile number MMID are uniquely linked with his bank account
number, and is one of the key inputs to facilitate fund transfer.
C) Both the remitter and the beneficiary are required to have their MMIDs to effect
a fund transfer through the mobile phone.
D) A unique MMID and mobile number combination helps in identifying the
beneficiary’s details. A single MMID can be linked to a mobile number.
E) To receive an MMID, the user is required to approach his bank and follow the
necessary procedure for obtaining the number.

26) Which of the following is not true about Payments Bank?


A) Payments bank can issue ATM/debit cards but not credit cards
B) Initial capital required for a Payments Bank is Rs 100 crore
C) Payments Bank must maintain Cash Reserve Ration (CRR) as decided by RBI.
D) Payments Bank can give a loan of up to only Rs 1 lakh.
E) Payments Bank can enable transfers and remittances through a mobile phone.
Which of the following is not true about Small Finance Bank?
A) Maximum loan size to a single person cannot exceed 10% of total capital funds;
cannot exceed 15% in the case of a group.
B) At least 50% of its loans should constitute loans and advances of up to 25 lakh.
C) Minimum paid-up equity capital requirement of Small Finance Banks is Rs 100
crore.
D) Small Finance banks must have 25% of its branches set up in unbanked areas.
E) They can set up subsidiaries to undertake non-banking financial service
activities.

Which of the following is not true about Immediate Payment Service (IMPS)?
A) IMPS offer an instant, 24X7, interbank electronic fund transfer service through
mobile phones.
B) The facility is provided by National Payments Corporation of India through its
existing NFS switch.
C) Internet Banking Account facilitates IMPS to transfer money to any account.
D) To use IMPS, both the account holder and beneficiary needs to have
Mobile Money Identifier (MMID).
E) IMPS allows instant money transfer.

Which of the following is not true about National Automated Clearing House
(NACH)?
A) It is a centralised clearing system launched by the National Payments
Corporation of India (NPCI).
B) It aims to replace and consolidate multiple existing Electronic Clearing Service
(ECS) systems across India
C) NACH platform has been created to replace the Electronic Clearing Service (ECS)
system
D) NACH have the same day presentation and settlement, including returns
processing.
E) All of the above are true.

Which of the following is not true about Bharat Interface for Money (BHIM) app?
A) BHIM is a digital payments solution app, for easy and quick transactions, based
on the Unified Payments Interface (UPI) from the National Payments Corporation of
India (NPCI).
B) Money can also be sent to non-UPI supported banks using IFSC code and
account number.
C) BHIM allows daily transaction limit of Rs 20,000.
D) Through BHIM app, a maximum of Rs 5,000 is allowed per transaction.
E) BHIM framework allows its usage without internet also.
31) What is the full form of MMID –

A. Money Massage Identity

B. Mobile Money Interface

C. Mobile Massage Identifier

D. Mobile Money Identifier

What is the full form of UPI

A. Unified Payment Interface

B. Unique Payment Interface

C. United Payment Interface

D. Unified Processing Interface

UPI is an initiative of –

A. RBI

B. SEBI

C. IRDA

D. NPCI

VPA stands for –

A. Virtual Payment Address

B. Virtual Processing Address

C. Vital Payment Authority


D. Visible Payment Authority

35) In BHIM Baroda Pay, what is the full form of BHIM

A. Bharat Intensive Mobility

B. Bharat Interface for Money

C. Bharat Intercom for Message

D. Bharat Intercom for Money

Full form of IPG

A. International Payment Gateway

B. Internet Payment Gateway

C. Internet Processing Gateway

D. Internet Payment Grid

Debit card PIN generation through BOB ATM is called

A. Pink PIN

B. Green PIN

C. Red PIN

D. Blue PIN

Baroda Travel Easy card valid for a period of __ yr from date of issue

A. 10

B. 9

C. 5
D. 1

The dimension of e-commerce that enables commerce


across national boundaries is called _______.

A. interactivity

B. global reach

C. richness

D. ubiquity

Which of the following describes e‐commerce?

A. Doing business electronically

B. Doing business

C. Sale of goods

D. All of the above

3.

Which one of the following is not one of the major types of e-


commerce?

A. C2B

B. B2C
C. B2B

D. C2C

42)
Which of the following is part of the four main types for
e‐commerce?

A. B2B

B. B2C

C. C2B

D. All of the above

43)
Which of the following is not considered to be one of the
three phases of e-commerce?

A. Innovation

B. Consolidation

C. Preservation

D. Reinvention
1.

Which of the following represents a limiting factor for the


growth of e-commerce?

A. Persistent cultural attraction of physical markets and traditional shopping experiences

B. Inadequate selection of goods compared to physical marketplaces

C. E-commerce lacks the convenience of other methods of transacting business

D. The potential audience for e-commerce is too low to support it as a widespread method of
commerce

2.

What determines the future IT infrastructure requirements for


new equipment and additional network capacity?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

3.

The fastest growing form of online advertising is _________.

A. banner ads
B. pop-up ads

C. rich media/video ads

D. pop-under ads

4.

What automates business processes?

A. Workflow

B. ASP

C. Workflow system

D. EIP

5.

All of the following are among the most common categories


of spam except ______.

A. fraud

B. commercial products

C. finance

D. health (drugs)
49) .

What defines all of the steps or business rules, from


beginning to end, required for a process to run correctly?

A. Workflow

B. EIP

C. Workflow system

D. SLA

50)

All of the following are types of social marketing except


______.

A. affiliate marketing

B. blog advertising

C. social network advertising

D. game advertising
Digital Business
1.
The dimension of e-commerce that enables commerce across
national boundaries is called _______.
A. interactivity

B. global reach

C. richness

D. ubiquity

2 Which of the following describes e‐commerce?


A. Doing business electronically

B. Doing business

C. Sale of goods

D. All of the above

3.
Which one of the following is not one of the major types of e-
commerce?
A. C2B

B. B2C

C. B2B

D. C2C
4.
Which of the following is part of the four main types for
e‐commerce?
A. B2B

B. B2C

C. C2B

D. All of the above

5.
Which of the following is not considered to be one of the
three phases of e-commerce?
A. Innovation

B. Consolidation

C. Preservation

D. Reinvention

6.
Which segment do eBay, Amazon.com belong?
A. B2Bs

B. B2Cs

C. C2Bs

D. C2Cs
7.
The idealistic market envisioned at the outset of the
development of e-commerce is called a ______.
A. Bailey market

B. Baxter market

C. Bergman market

D. Bertrand market

8.
Which type of e‐commerce focuses on consumers dealing
with each other?
A. B2B

B. B2C

C. C2B

D. C2C

9.
The primary source of financing during the early years of e-
commerce was _______.
A. bank loans

B. large retail firms

C. venture capital funds

D. initial public offerings


10.
Which segment is eBay an example?
A. B2B

B. C2B

C. C2C

D. None of the above

11.
All of the following are technologies used to gather
information about you online except ______.
A. spy ware

B. cookies

C. Gmail

D. anonymizers

12.
In which website Global Easy Buy is facilitated?
A. Ebay.com

B. Amazon.com

C. Yepme.com

D. None of these
13.
A _________ is the set of planned activities designed to
result in a profit in a marketplace.
A. business model

B. profit model

C. business plan

D. revenue model

13.
A _________ is the set of planned activities designed to
result in a profit in a marketplace.
A. business model

B. profit model

C. business plan

D. revenue model

14.
The best products to sell in B2C e‐commerce are:
A. Small products

B. Digital products

C. Specialty products

D. Fresh products
15.
Which of the following is not a key element of a business
model?
A. value proposition

B. competitive advantage

C. market strategy

D. universal standards

16.
Which products are people most likely to be more
uncomfortable buying on the Internet?
A. Books

B. Furniture

C. Movies

D. All of the above

17.
The source of revenue in a subscription revenue model is
__________.
A. Fees from advertisers in exchange for advertisements

B. Fees for business referrals

C. Fees from subscribers in exchange for access to content or services

D. Fees for enabling or execution a transaction


18.
Which products are people most likely to be comfortable
buying on the Internet?
A. Books

B. PCs

C. CDs

D. All of the above

19.
Which of the following is an example of a portal?
A. Amazon

B. eBay

C. Yahoo

D. Face book

20.
Digital products are best suited for B2C e‐commerce because
they:
A. Are commodity like products

B. Can be mass‐customized and personalized

C. Can be delivered at the time of purchase

D. All of the above


which triggers positive or negative emotions leads to purchase motivation
A.emotional appeal
B.rational appeal
C.moral appeal
D.irrational appeal

Customers in growth stage of life cycle of products are classified as


A.innovators
B.early adopters
C.middle majority customers
D.laggards

Considering non-personal communication channels, magazines, direct mail and newspapers are
considered as
A.online media
B.print media
C.broadcast media
D.display media

Product development process after analysis of business next step to be taken is


A.test marketing
B.penetration marketing
C.one chanal marketing
D.individual marketing

Product development process after analysis of business next step to be taken is


A.test marketing
B.penetration marketing
C.one chanal marketing
D.individual marketing

26) the example of business-to-business services offered by Google which gains advertising revenue.
A.Google AdWords pay per click sponsored
B.Google Apps Application Suite
C.YouTube Brand Channel
D.Google Search application providing online website
27)
What sends work assignments through an e‐mail system?
A. Database‐based enterprise information portal

B. Messaging‐based enterprise information portal

C. Database‐based workflow system

D. Messaging‐based workflow system

9.
Which of the following measures the percentage of people
exposed to an online advertisement who actually click on the
banner?
A. impression rate

B. view-through rate

C. click-through rate

D. stickiness ratio

10.
Which will not a computer resources?
A. firewall

B. Virus

C. Trojan horse

D. None of the above


11.
Which of the following is a measure of the percentage of
purchasers who return to a Web site within a year?
A. loyalty

B. reach

C. recency

D. unique visitors

12.
Which is not a function of ERP?
A. Warehousing

B. sales

C. scheduling

D. None of the above

13.
All of the following are metrics for e-mail campaigns except
_________.
A. open rate

B. delivery rate

C. bounce-back rate

D. cart conversion rate

Answer & Solution Discuss in Board Save for Later


Answer: Option D
14.
Which is a function of ERP?
A. Warehousing

B. sales

C. scheduling

D. all of the above

Answer & Solution Discuss in Board Save for Later


Answer: Option D
15.
As consumers become more accustomed to new online
advertising formats, click-through rates tend to _______.
A. remain constant

B. decrease

C. increase

D. rapidly increase

16.
Which of the following is the primary characteristic of an
intranet?
A. People outside the organization can access it

B. People inside the organization can't access it

C. People outside the organization can't access it


D. None of the above

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
People outside the organization can't access it is the primary characteristic of an intranet.
17.
The ethical principle which states that if an action is not right
for all situations, then it is not right for any situation is known
as __________.
A. The Golden Rule

B. Slippery Slope

C. No Free Lunch

D. Universalism

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
The ethical principle which states that if an action is not right for all situations, then it is not right
for any situation is known as Universalism. Universalism is defined as an action that should be
same in all the situations.
18.
Which concept suggests that different applications and
computer systems should be able to communicate with one
another?
A. Integration

B. Web services
C. Scalability

D. Interoperability

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
Interoperability concept suggests that different applications and computer systems should be able
to communicate with one another. Interoperability is the ability of different information systems,
devices or applications to connect, in a coordinated manner, within and across organizational
boundaries to access, exchange and cooperatively use data amongst stakeholders, with the goal
of optimizing the health of individuals and populations.
19.
Which of the following statements about privacy is true?
A. It is a moral right to be left alone

B. Only corporations and government need to be concerned about it

C. It has only just recently become a concern

D. It is most easily obtained on the Internet

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
Privacy is a moral right to be left alone. Privacy is the ability of an individual or group to seclude
themselves, or information about themselves, and thereby express themselves selectively. The
boundaries and content of what is considered private differ among cultures and individuals.
39 )
Which service encompasses all technologies used to
transmit and process information on an across a network?
A. Interoperability
B. Scalability

C. Benchmarking

D. Web services

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
Web services encompasses all technologies used to transmit and process information on an
across a network. Web services is a standardized way or medium to propagate communication
between the client and server applications on the World Wide Web.

21.
The ability of consumers to review and contest the accuracy
and completeness of data collected about them involves
which of the following FTC fair information practice
principles?
A. Security

B. Enforcement

C. Choice/Consent

D. Access/Participation

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
The ability of consumers to review and contest the accuracy and completeness of data collected
about them involves Access/Participation FTC fair information practice principles.
22.
Which process can preventata from lose due to computer
problems or human errors?
A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
Backup process can prevent from lose due to computer problems or human errors. Backup, or
data backup, or the process of backing up, refers to the copying into an archive file of computer
data that is already in secondary storage—so that it may be used to restore the original after a
data loss event.
23.
The __________ is the first major effort to adjust the
copyright laws to the Internet age.
A. Platform for Privacy Preferences (P3P)

B. Center for Democracy and Technology

C. Digital Millennium Copyright Act (DMCA)

D. E-Government Act of 2002

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
The Digital Millennium Copyright Act (DMCA) is the first major effort to adjust the copyright
laws to the Internet age. The Digital Millennium Copyright Act is a 1998 United States copyright
law that implements two 1996 treaties of the World Intellectual Property Organization. It
criminalizes production and dissemination of technology, devices, or services intended to
circumvent measures that control access to copyrighted works.
24.
Which process is used to reinstall data from a copy when the
original data has been lost?
A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option B
Solution:
Recovery process is used to reinstall data from a copy when the original data has been lost. Data
restore is the process of copying backup data from secondary storage and restoring it to its
original location or a new location.
25.
A patent grants the owner an exclusive monopoly on the
ideas behind the invention for ______ years.
A. 10

B. 20

C. 30

D. 40

Answer & Solution Discuss in Board Save for Later


Answer & Solution
Answer: Option B
Solution:
A patent grants the owner an exclusive monopoly on the ideas behind the invention for 20 years.

26.
What describes a process of continuously measuring results
and comparing those results to optimal performance so that
actual performance may be improved?
A. Performance

B. Capacity planning

C. Benchmarking

D. Data cleansing

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
Benchmarking describes a process of continuously measuring results and comparing those
results to optimal performance so that actual performance may be improved.
27.
The number of business methods patents granted is
___________ compared to the number of patents applied for.
A. substantially smaller

B. slightly smaller

C. close to equal
D. equal

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
The number of business methods patents granted is substantially smaller compared to the number
of patents applied for.
28.
Who protects system from external threats?
A. firewall

B. EDI

C. ERP

D. Script kiddies

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
Firewall protects system from external threats. A firewall typically establishes a barrier between
a trusted internal network and untrusted external network, such as the Internet.
29.
The redirection of traffic from a legitimate site to an infringing
site is called _______.
A. cyber squatting

B. cyber piracy

C. meta tagging

D. key wording
Answer & Solution Discuss in Board Save for Later
Answer & Solution

Answer: Option B
Solution:
The redirection of traffic from a legitimate site to an infringing site is called cyber piracy. Piracy
is the unauthorized distribution, theft, reproduction, copying, performance, storage, sale or other
use of intellectual property (IP) protected under copyright law. It is a form of copyright
infringement.
30.
Who breaks into other people's computer systems and steals
and destroys information?
A. Hackers

B. softwares

C. Hacktivists

D. Script kiddies

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
Hackers breaks into other people's computer systems and steals and destroys information.
Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks.

31.
During which period of Internet governance was Network
Solutions given a monopoly to assign and track high-level
domains?
A. Government Control Period
B. Privatization

C. Self-Regulation

D. Governmental Regulation

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option B
Solution:
During Privatization period of Internet governance was Network Solutions given a monopoly to
assign and track high-level domains.
50)
What is software that comes hidden in free downloadable
software and tracks your online movements, mines the
information stored on your computer, or uses your
computer's CPU and storage for some task you know nothing
about?
A. Web log

B. Clickstream

C. Anonymous Web browsing service

D. None of the above

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
Spyware is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computer's CPU and
storage for some task you know nothing about.
DIGITAL
BUSINESS
MCQs
Hyperlinks
Chapter 1: E-Commerce
Chapter 2: Mobile Commerce, Social Commerce and IoT
Chapter 3: Digital Business Ecosystem
Chapter 4: Digital Business Applications - I
Chapter 5: Digital Business Applications - II

Efforts taken by (In Alphabetical Order)


Ajay Patidar
Ankita Singh
Ashish Verma
Prachi More
Priyanca Pareek
CHAPTER 1: E-COMMERCE

1. The term e-commerce was coined back in


a. 1950s
b. 1960s
c. 1970s
d. 1980s

2. Online shopping was invented in


a. 1977
b. 1978
c. 1979
d. 1980

3. Online shopping was invented by


a. Michael Aldrich
b. Steve Jobs
c. Michael Porter
d. Martin Cooper

4. E- Commerce was termed by


a. Michael Aldrich
b. E Jerome McCarthy
c. Robert Jacobson
d. Michael Porter

5. Peter Drucker (2002) forecasted that


a. E-commerce will never impact the business
b. E- commerce (EC) would significantly impact the way that business is done
c. E- commerce will be converted in online sales
d. E- commerce will grow with m-commerce

6. E-commerce market size value in 2020


a. USD 10.36 Trillion
b. USD 9.28 Trillion
c. USD 11.45 Trillion
d. USD 7.58 Trillion

7. Indian E-commerce market is expected to reach


a. US$ 84 billion by 2021
b. US$ 75 billion by 2021
c. US$ 95 billion by 2021
d. US$ 80 billion by 2021
8. In India, up to what extent FDI is permitted in the B2B E-commerce
a. 75%
b. 100%
c. 96%
d. 84%

9. An important component in the digital society is


a. IOT
b. Digital Customers
c. Artificial Intelligence
d. Machine Learning

10. Social Customers are also known as


a. Online Customers
b. E- Customers
c. Digital Customers
d. None of the above

11. Web 2.0 stimulated fundamental changes in consumer behavior


a. Tends to buy more online than offline
b. Expects better customer experience
c. Uses new online channels and new communication tools
d. All of the above

12. three elements of the digital world:


a. economy, enterprises, and society
b. ecosystem, education and social
c. e-business, consumer and iot
d. None of the above

13. The digital economy is based on


a. Business transaction
b. Bank transaction
c. Credit transaction
d. Online transaction

14. Sharing economy refers to


a. sharing goods and services among the participating people
b. sharing information among the participating people
c. sharing technology among the participating people
d. sharing capital among the participating people

15. Application created by Swedish Farmers


a. My farm
b. Dream Farm
c. Sweden farm
d. Holy Farm
16. Digital enterprise example
a. Google
b. Facebook
c. Amazon
d. All of the above

17. When were smartphones introduced in India?


a. 2007
b. 2008
c. 2009
d. 2006

18. Virtual community is one


a. where the interaction takes place over the Internet.
b. Where the interaction takes place over the phone.
c. Where the interaction takes place in person.
d. None of the above

19. When was Facebook introduced?


a. 2002
b. 2003
c. 2004
d. 2005

20. When was first Indian OTT platform was launched?


a. 2008
b. 2006
c. 2007
d. 2009

21. First Indian OTT platform:


a. Amazon prime
b. Netflix
c. BigFlix
d. Digivive

22. First Indian OTT mobile app and in:


a. Netflix,2010
b. Amazon Prime,2010
c. Hotstar,2010
d. Nexgtv,2010

23. Pure E- commerce means:


a. All dimensions are digital
b. Payment should be digital
c. Product should be digital
d. All of the above
24. Partial E- commerce means:
a. Include a mix of digital and physical dimensions
b. Include only physical dimension
c. Include only physical payment option
d. Include online ordering

25. Purely physical organisation refers to as:


a. Brick-and-mortar
b. Click-and-mortar
c. Click-and-brick
d. All of the above

26. Business-to-business (B2B) EC refers to


a. transactions between and among organizations.
b. transactions between and among customers.
c. transactions between and among government.
d. transactions between and among people.

27. Business-to-consumer (B2C) EC includes


a. retail transactions of products or services from businesses to organisation.
b. retail transactions of products or services from businesses to individual
shoppers.
c. retail transactions of products or services from businesses to business.
d. retail transactions of products or services from businesses to government.

28. Consumer-to-business (C2B) EC,


a. people use the Internet to sell products or services to organizations
b. people use the calling to sell products or services to individuals and organizations
c. people use the Internet to sell products or services to individuals
d. people use the Internet to sell products or services to individuals and
organizations

29. Individuals use C2B


a. to bid on products or services.
b. to sell products and services.
c. Both (a) & (b)
d. None of the above

30. Intrabusiness EC category refers to


a. EC transactions among various organizational departments and individuals in two
company
b. EC transactions among various organizational departments and individuals
in one company
c. EC transactions among various organizational departments and individuals in
many company
d. EC transactions among single organizational departments and individuals in one
company
31. The business-to-employees (B2E) category refers to
a. the delivery of services, information, or products from organizations to their
employees
b. the delivery of services, information, or products from organizations to their
customers
c. the delivery of services, information, or products from organizations to their
suppliers
d. the delivery of services, information, or products from organizations to another
organisation

32. consumer-to-consumer (C2C) EC category:


a. individual consumers sell to or buy from government
b. individual consumers sell to or buy from another organisation
c. individual consumers sell to or buy from other consumers
d. individual consumers sell to or buy from another website

33. Collaborative commerce (c-commerce) refers to


a. online activities and communications done by parties working to attain different
goal
b. online activities and communications done by parties working to attain the
same goal
c. online activities and communications done by parties working to attain the
different organisational goal
d. offline activities and communications done by parties working to attain the same
goal

34. In e-government EC,


a. a government agency buys or provides goods, services or information
b. a government agency buys or provides goods, services, or information from or to
businesses (G2B)
c. a government agency buys or provides goods, services, or information from
or to businesses (G2B) or from or to individual citizens (G2C) and with other
government also(G2G)
d. a private agency buys or provides goods, services, or information from or to
businesses (G2B) or from or to individual citizens (G2C).

35. A value proposition refers to


a. the benefits, including the intangible ones that a company hopes to derive from
using its managing model.
b. the benefits, not including the intangible ones that a company hopes to derive
from using its business model.
c. the benefits, including the intangible ones that a company hopes to derive
from using its business model.
d. the losses, including the intangible ones that a company hopes to derive from
using its business model.
36. Marketplace is a place
a. where sellers and buyers exchange goods and services for money (or for other
goods and services) online.
b. where sellers and buyers exchange goods and services for money (or for other
goods and services) physically.
c. None of the above
d. All of the above

37. Marketspace is
a. a marketplace in which sellers and buyers exchange goods and services for
money (or for other goods and services) but do so electronically
b. a marketplace in which sellers and buyers exchange goods and services for money
(or for other goods and services) but do so physically
c. none of the above
d. all of the above

38. The term Web 2.0 was coined by


a. O‘Reilly Media
b. Jeff Bezos
c. Mark Zuckerberg
d. Elon Musk

39. The term Web 2.0 was coined in


a. 2002
b. 2003
c. 2004
d. 2005

40. Why Do People Buy Online?


a. Lower Prices
b. Accessibility & convenience
c. Wider Choice
d. All of the above

41. Why Do Businesses Sell Online?


a. Higher Margins
b. Scalability
c. Consumer Insight
d. All of the above

42. Full form of UPI:


a. Universal Public Identity
b. Universal Payment Interface
c. Unique Per Industry
d. United Payment Identity
43. When was UPI introduced in India?
a. 2015
b. 2016
c. 2017
d. 2014

44. Social computing refers to


a. a computing system that involves social interactions and behaviours
b. a traditional system that involves social interactions and behaviours
c. a banking system that involves social interactions and behaviours
d. a system that involves social interactions and behaviours

45. Social media involves


a. user-generated online text, image, audio, and video content that are delivered
via Web 2.0 platforms and tools
b. blogging or having a presence in a social network
c. Provides a platform for sharing photos and videos
d. None of the above

46. Social commerce (SC), also known as social business


a. refers to e-commerce transactions delivered via social media.
b. Refers to e-commerce transactions delivered online
c. Refers to business performed online
d. Refers to business transaction performed offline

47. The digital economy also known as


a. The Internet economy
b. The online economy
c. The national economy
d. All of the above

48. Corporate portal is a


a. gateway for customers, employees, and partners to reach government information
and to communicate with the company
b. gateway for customers, employees, and partners to reach information
c. gateway for customers, employees, and partners to reach corporate
information and to communicate with the company.
d. None of the above

49. The major elements of the digital world


a. The digital economy,
b. The digital enterprises,
c. The digital society
d. All of the above

50. The limitations of E- Commerce


a. the resistance to new technology
b. fear from fraud
c. integration with other IT systems may be difficult
d. All of the above
CHAPTER 2: MOBILE COMMERCE, SOCIAL COMMERCE AND IoT

1.Mobile Commerce is any transaction, involving the transfer of ______________ to use goods and
services, which is initiated and/or completed by using mobile access to computer-mediated networks
with the help of an electronic device.
A. ownership or rights
B. business
C. partnership
D. none of the above

2. What social media marketing do?


A. It can help to communicate with customers in a less time-consuming manner.
B. It can help to create visual interaction between products and customers.
C. It can help to advertise a product and services to many customers at once.
D. All of the above

3. Social media marketing focuses on _.


A. Social platform
B. Individual shop
C. Whole sale
D. All of the above

4. Social media marketing is one of the best advertising resources to grab consumer's attention.
A. True
B. False

5. Identify the platform for Social media marketing?


A. Instagram
B. Twitter
C. Facebook
D. All of the above

6. What are the most essential 7 M's in marketing?


A. Man, Money, Machine, Market, Management, Message, Mission
B. Mindset, Measure, Model, Map, Make, Modify, And Monetize
C. Both A and B
D. None of the above
7. What is the full form of SMM?
A. Social market marketing
B. Social media marketing
C. Social media management
D. None of the above

8. Identify the different types of E-commerce?


A. B2B
B. B2C
C. C2B
D. All of the above

9. E-Commerce refers to the trading of goods and services with the help of the internet.
A. Yes
B. No

10. Is Social commerce related with the social network’s platform as well as the seller's website?
A. Yes
B. No

11. E-commerce is related to the seller's website.


A. True
B. False

12. Which term adopted for updates by Twitter users?


A. Tweets
B. Posts
C. Opinion Polls
D. Quizzes

13. Which of the following is valuable in increasing a page rank?


A. Paying for placement
B. Static content
C. Quantity of links from other highly ranked pages to your site
D. No contact information
14. What is meant by "micro-blogging"?
A. Post Very Short Entries
B. Blogs Which Are Posted By Companies, Not Individuals
C. Post Very Long Entries
D. Blogging From Mobile Devices

15. What is “social media optimization”?


A. Creating content which easily creates publicity via social networks
B. Writing clear content
C. Creating short content which is easily indexed
D. Hiring people to create content for social networks

16. What is the benefit of Social media marketing?


A. It can show your brand in front of people much more quickly and easily.
B. Increased traffic
C. Higher conversion rates
D. All of the above

17. Social networks have an enormous information sharing capacity. As such, they are a great
distribution channel for __.
A. customer feedback
B. viral content
C. exclusive coupons
D. marketing messages

18. Which one is the best choice for purchasing through social media marketing or traditional
marketing?
A. It depends upon the customer's point of view due to the lack of time and money or their
satisfaction.
B. Social media marketing
C. Traditional Marketing
D. None of the above

19. _________ includes sales, market research, customer service, and advertising, all supported by
mobile computing
A. Mobile Marketing
B. Ecommerce Marketing
C. Social media marketing
D. Search Engine Optimization
20.What is Social Media Marketing?
A. A way to communicate with customers on social media platforms to increase the
performance of the business
B. Software
C. Hardware
D. All of the above

21.__________ has become the most important part of the marketing strategy. It is an instant and
direct channel that company can communicate with its audience anytime and everywhere
A. Mobile Marketing
B. . Social media marketing

22._________can also be deployed to the mobile platforms. This is called viral mobile marketing. A
typical approach is to develop and distribute apps for mobile devices
A. Viral marketing
B. Location based marketing

23.IBM has been recognized by the research company______ as the market share leader in social
software platform providers
A. IDC
B. IFC

24.The concept of social business is frequently equated to and sometimes confused with the term
_________
A. Social Enterprise
B. Business Enterprise
C. Private Enterprise
D. Public Enterprise

25. Social media uses _____and its tools and technologies, the _____concept includes the philosophy
of connected people, the interactions among them, the social support provided, the digital content that
is created by users, and so forth.
A. Web2.0 and Social Media
B. Social Commerce and Enterprise 2.0
C. Web 2.0 & Enterprise 2.0
D. SMM & SEO

26. A _________is a social entity composed of nodes (which are generally individuals, groups, or
organizations) that are connected by links such as hobbies, friendship or profession.
A. SOCIAL NETWORK
B. SOCIAL ENTERPRISE
27.The creation of user generated content in the enterprise, which is accessible to all (e.g.,
slideshare.net, youtube.com) is known as
A. Social publishing
B. Private Publishing
C. Broadcasting
D. Web Display

28: Collaborative work and problem-solving using wikis, blogs, instant messaging, collaborative
office documents, and other special purpose Web-based collaboration platforms such as Labor nova
(laboranova.com).
A. Societal Collaboration
B. Social collaboration
C. Stake Holders Collaboration
D. All of the above

29.Gathering ideas, insights, and feedback from crowds (e.g., employees, customers, and business
partners).
A. Crowdsourcing
B. Crowd Pulling
C. Crowded Area
D. Cloud Networking

30.Conducting networking and community building involving employees, executives, business


partners, and customers.
A. Networking and community building
B. Network Marketing
C. Community Chain Reaction
D. All of the above

PART 2: INTERNET OF THINGS


1) IOT stands for ..........
a) internet of telegram
b) interest of things
c) intelligent of things
d) intercommunication of things
2) An equation of internet of things ..........
a) physical object + controller sensor and actuator + internet
b) controller sensor and actuator + internet
c) physical object + internet
d) Physical object + controller + internet

3) A ....... tends to convert physical attribute to an electrical signal.


a) actuator
b) compiler
c) sensor
d) motors

4) A ...... tends to convert electrical signal to physical action.


a) actuator
b) compiler
c) sensor
d) motors

5) ........ is also often refer to as ambient computer.


a) ubicomp
b) micro comp
c) mega comp
d) sensor and actuator

6) ........ is a technology where the interaction between technology and its user is
designing to occurs in the users Periphery rather than constantly at the center of
attention.
a) calm technology
b) IOT
c) Arduino
d) ambient computer
7) choose correct principle of IOT
a) focus on the value
b) focus on the machine
c) build a strong machine
d) neither one

8) SAAS stands for ........


a) software as a service
b) service as a software
c) service as a service
d) software as a software

9) PAAS stands for .........


a) principal as a service
b) platform as a service
c) physical computing as a service
d) principal as a software

10) IAAS stands for ........


a) infrastructure as a service
b) instructions as a service
c) inter communication as a service
d) internet as a service

11) ...... involves delivering different types of services over the Internet.
a) physical computing
b) chemical computing
c) mechanism
d) cloud computing
12) ......... is a structured data which is stored in MB, GB, TB and always locally present.
a) big data
b) small data
c) physical computing
d) cloud computing

13) ...... means large set of structured, unstructured and semi structured data.
a) big data
b) small data
c) physical computing
d) cloud computing

14) ........ helps in collaborate in IOT development.


a) physical computing
b) chemical computing
c) mechanism
d) cloud computing

15) IOT and cloud computing has ........ relationship.


a) physically
b) graphically
c) complementary
d) coding

16) ........ is uses certain protocols to aid sensors in connecting with real time machine to machine
network.
a) real time analytics
b) data collection
c) device integration
d) real time collection
17) .........software supporting integration binds all system devices to create body of IOT a system.
a) real time analytics
b) data collection
c) device integration
d) real time collection

18) The application data or input from various devices and convert it into viable actions are clear
patterns human analysis is called ......
a) real time analytics
b) data collection
c) device integration
d) real time collection

19) ....... suggest likeness between object and ideas.


a) metaphor
b) data
c) iot
d) code

20) A ......... is an established set of rules that determines how data is transmitted between different
device in the same network.
a) network connection
b) TCP IP protocol
c) network protocol
d) TCP protocol

21) TCP stands for .........


a) transmission control protocol
b) telecommunication control protocol
c) temperature control protocol
d) transmission and communication protocol
22) IP stands for ..........
a) intelligent protocol
b) internet protocol
c) intercommunication protocol
d) ideal protocol

23) UDP stands for .......


a) user datagram protocol
b) user diagram protocol
c) user detection protocol
d) user device protocol

24) DNS stands for ...........


a) determine name system
b) domain name system
c) device name system
d) development name system

25) The process of building iot hardware and devices enhanced with smart sensors and embedded
system using many of the shelf components like sensors, circuits and microcontrollers are called .......
a) prototyping
b) casting
c) protocasting
d) protocol typing

26) SOC stands for ....


a) system on chip
b) system on change
c) source on chip
d) source on change
27) A ........ combined a required electronic circuit of various computer components onto a single
integrated chip.
a) system on chip
b) system on change
c) source on chip
d) source on change

28 GPU stands for .........


a) graphical processing unit
b) generally processing unit
c) graphically program unit
d) general programming unit

29) ........ is an open source electronic platform base on easy to use hardware and?
software.
a) servo motor
b) Arduino
c) CPU
d) GPU

30) RISC stands for ...........


a) reduced instruction set architecture
b) rare information set architecture
c) reduce information set architecture
d) rare instruction set architecture

31) CISC stands for ........


a) complex instruction set architecture
b) common instruction set architecture
c) complex information set architecture
d) common information set architecture
32) .......... reduce the cycles per instruction at the cost of the number of instructions per program.
a) RISC
b) DISC
c) CISC
d) MISC

33) The ......... approach attempts to minimize the number of instructions per
program but at the cost of increase in number of cycles per instruction.
a) RISC
b) DISC
c) CISC
d) MISC

34) The ......... is a way to connecting electronic components to each other without having solder, them
together.
a) servo motor
b) Arduino
c) Breadboard
d) GPU

35) ....... and ....... are main components of raspberry pi.


a) LED, USB
b) USB, HDMI

36) ......... is a capable little device that enables people of all ages to explore computing and to learn
how to program in languages like Scratch and Python.
a) raspberry pi
b) python programming
c) Linux
d) web programming
37) where to Find MAC-address .........
a) settings > Wi-Fi networks > wireless control
b) settings > wireless control > Wi-Fi settings
c) Wi-Fi networks > wireless control > settings
d) settings > wireless control

38) API stands for ..........


a) application programming interface
b) Android programming interface
c) Arduino protocol information
d) application protocol interface

39) ....... is the process of making a physical representation of an idea.


a) physical proto casting
b) physical prototyping

40) RFID stands for .........


a) radio frequency identification
b) raspberry pi identification
c) radius frequency identification
d) radio flexible information
CHAPTER 3: DIGITAL BUSINESS ECOSYSTEM

1. EC activities are divided here into ___ categories


1. 4
2. 5
3. 6
4. 7

2. Electronic commerce mechanisms exist for


1. Payment
2. Order fulfillment
3. Security
4. All of the above

3. Which of the following describes e‐commerce?


1. Doing business electronically
2. Doing business
3. Sale of goods
4. All of the above

4. In which website Global Easy Buy is facilitated?


1. Ebay.com
2. Amazon.com
3. Yepme.com
4. None of these

5. ____ is an electronic space where sellers and buyers meet and conduct different types of
transactions.
1. E-marketplace
2. Virtual market
3. Marketspace
4. All of the above

6. Which of the following permits the transmission of a bill, along with payment of that bill,
to be conducted over the Internet?
1. financial cybermediary
2. electronic check
3. Electronic bill presentment and payment.
4. all of the above

7. A combination of software and information designed to provide security and information


for payment is called a what?
1. Digital wallet
2. Pop up ad
3. Shopping cart
4. Encryption
8. What is the name for direct computer‐to‐computer transfer of transaction information
contained in standard business documents?
1. Internet commerce
2. e‐commerce
3. transaction information transfer
4. electronic data interchange

9. Which of the following is used in B2B to pay for purchases?


1. e‐commerce
2. financial electronic data interchange
3. electronic data exchange
4. electronic checks

10. When a transaction is processed online, how can the merchant verify the customer's
identity?
1. use secure sockets layers
2. use secure electronic transactions
3. use electronic data interchange
4. use financial electronic data interchange

11. Which form of e‐commerce currently accounts for about 97% of all e‐commerce
revenues?
1. B2B
2. B2C
3. C2B
4. C2C

12. The major types of EC searches are


1. Internet/Web Search.
2. Enterprise Search
3. Desktop Search.
4. All of these

13. Which is the primary search engine in China?


1. Google
2. Yahoo
3. Baidu
4. MSN

14. Which is the most popular search engines in the USA?


1. Bing
2. Yahoo
3. MSN
4. None
15. The basic elements of website is
1. Home page
2. Web pages
3. Links and banners
4. All the above

16. Which one is a threat for E-Commerce?


1. Trojan horse
2. Firewall
3. Encryption

17. Secure communication means?


1. Protect transmission of credit card number
2. Guarantee privacy of customer
3. Unauthorized access of payment details
4. All the above

18. Which one is not an offline payment mode?


1. Cash on delivery
2. Cash before delivery
3. Demand drafts
4. e‐cheque

19. Which one is an offline payment mode?


1. Cash on delivery
2. Cash before delivery
3. Credit card
4. Both a and b

20. Which one is not an E‐payment method used in India?


1. Debit card
2. Credit card
3. e‐cheque
4. none

21. OTP stands for?


1. On Time Password
2. On Time processing
3. One time processor
4. None

22. Which type deals with auction?


1. B2B
2. B2C
3. C2B
4. C2C
23. During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐
1. Integrity
2. Security
3. Confidentiality
4. All the above

24.___are only built after the order is actually in hand. ?


1. ETO
2. MTO
3. ATO
4. MTS

25 In ____ products are built to customer specifications from a stock of existing components.
1. ETO
2. MTO
3. ATO
4. MTS

26. In _______ product is built against a sales forecast and sold to the customer from finished
goods.
1. MTS
2. ATO
3. MTO
4. DC

27. In ____ where products are digital assets and inventory is created from a digital master.
1. DC
2. BTO
3. MTO
4. DCO

28. Clothing and apparel, (packaged) food, and electronics equipment are the largest selling B2C
categories, the most frequently used models are
1. ETO and MTO
2. MTO and BTO
3. MTS and ATO
4. DC and ATO

29. Who initiated the concept of “next day” delivery?


1. FedEx
2. Wefast
3. Shiprocket
4. Bluedart
30. FedEx initiated the concept of ―next day‖ delivery in?
1. 1971
2. 1972
3. 1973
4. 1974

31. Who introduced its “next-morning delivery” service?


1. FedEx
2. Wefast
3. Shiprocket
4. Bluedart

32. Amazon originally touted that Delivery by Drones would come true in?
1. 2013
2. 2015
3. 2025
4. 2026

33. ____ is starting same-day delivery of everything in several large cities


1. Amazon
2. Flipkart
3. Snapdeal
4. Myntra

34. Which company bought a robot company called Kiva Systems?


1. Flipkart
2. Alibaba
3. Amazon
4. Ajio

35. In ______ Amazon bought a robot company called Kiva Systems


1. 2010
2. 2011
3. 2012
4. 2013

36. Kiva system was also being used by other retailers like
1. Walgreens
2. Staples
3. Crate & Barrel
4. All of the above

37. ______was a pioneer in providing customized products to end consumers in a timely and cost-
effective fashion.
1. HP
2. Dell
3. Lenovo
38. There are _____ distinct types of smart cards.
1. Two
2. Three
3. Four
4. Five

39. A card where a monetary value is prepaid and can be loaded on the card once or several times.

1. Stored-value cards

2. Smart cards

3. Contact card

4. Payment card

40. Payments from a single consumer are accumulated and processed periodically, or as a certain
level is reached are called

1. Aggregation

2. Stored-value cards

3. Direct payments

4. Subscription

41. A single payment provides access to content is

1. Direct payment

2. Subscription

3. Aggregation

4. A’la carte

42. The oldest and one of the biggest payment gateway providers in India?

1. Instamojo

2. CC Avenue

3. Citrus

4. Billdesk

43. CDM stands for

1. Chronic Disease Management

2. Continuous and Diagnostic and Mitigation

3. Cash Deposit Machine


44. What is the full form of AEPS?

1. Aadhar Enabled Payment System

2. Aadhar Electronic Payment System

3. Advanced Enable Payment System

4. None

45. Receiving money from a costumer in exchange for goods and services are called

1. Consumer

2. Merchant

3. Person to Person (P2P)

4. None

46. Incepted in 2000 in Mumbai and provides payment gateway solutions to customers and
merchants in e-commerce ,retail etc.

1. Citrus

2. Billdesk

3. Instamojo

4. None of the above

47. Mobile P2P company that was part of Braintree?

1. Padiant

2. Xoom

3. Venmo

4. None of the above

48. An aggregation is used but the micropayments are processed with an existing monthly bill.

1. Stored value

2. Direct payment

3. Subscriptions

4. A’ la carte
49. RTGS stands for

1. Real Time Gross Settlement

2. Real Type General Scheme

3. Real Type Gross Settlement

4. Real Time Gross System

50. Which one is also known as plastic money?

1. Credit card

2. Debit card

3. Paper cash

4. All of the above


CHAPTER 4: DIGITAL BUSINESS APPLICATIONS - I
1. Despite the failure of many dot-com companies, the amount and percentage of goods
and services sold on the ________ is increasing rapidly.
a) Facebook
b) Internet
c) E-Commerce
d) Instagram

2. A ________ is a sales intermediary between manufacturers and customers.


a) Wholesaler
b) Middleman
c) Retailer
d) Jobber

3. Which sales technique offer companies the opportunity to reach more customers and
give customers a chance to buy from home?
a) Catalog
b) Consultative
c) Insight
d) Social

4. sellers who conduct retail business online are called _______


a) E-tailing
b) E-tailer
c) merchant
d) supplier

5. Factor: Increase of sales volume: : Retailors:_____ :: e-tailers: Going out of their area
and even globally to find customers
a) Face to face stable contacts
b) Expansion of location, stores, and space
c) Local area customer
d) Ordering, payment, fulfillment system

6. Factor: Adaptability to market trends: : Retailers: Slow: : e-Tailers:______


a) Rapid
b) Slow
c) Popular
d) Expensive

7. Which is not the limitation of e-tailing?


a) Not all customers have access to the web.
b) Ease of use is a problem.
c) Find it unnecessary to go to the store.
d) Trust, security, and privacy concerns prevail.
8. The malls which include many stores on one website is called______
a) Strip malls
b) Internet (online) malls
c) Outlet malls
d) Regional Malls

9. Which type of business model has both online (website) and offline (physical store)
operation?
a) Brick-and-Mortar
b) Click-and-Mortar
c) Pure-play e-tailers
d) None of these

10. _______ads at the mall site advertise the products or vendors.


a) Banner
b) In-App
c) Text
d) Native

11. The major advantage of online directories is that if you change your business name,
address, contact details, you can easily keep it up to date in the directory.
a) True
b) False
c) Cannot determine

12. In online malls with shared services, a consumer can


a) Find a product.
b) Order and pay for the product.
c) Arrange for shipment.
d) All the above

13. _______ is a crossroads between social media and eCommerce.


a) Group shopping
b) Shared shopping
c) Social Shopping
d) Marketplace shopping

14. Examples of the flash deals are


a) Groupon
b) dealradar.com
c) myhabit.com
d) All the above
15. The B2C model in which sales are designed to meet the needs of special events is
called_______
a) Private shopping clubs
b) Personalized event shopping
c) Group gifting online
d) None of the above

16. The Personalized event shopping model may be combined with group purchasing to
a) Maximize the customers’ cost
b) Lower the customers’ cost
c) Both A and B
d) None of the above

17. An online private shopping club, like an off-line shopping club enables members to
shop at a discount, frequently for short periods of time (just few hours or days).
a) True
b) False
c) Cannot determine.

18. Location-based e-commerce (l-commerce) is a _______technology used by vendors


to send advertisements relevant to the location where customers are at a given time by
using GPS.
a) Wired based
b) Connected
c) Wireless based
d) Cabled

19. Which is not the benefit of Social shopping?


a) You can socialize while shopping.
b) You cannot discover products/services you never knew existed
c) You can interact with vendor (brand) representatives easily and quickly
d) You can shop together with people like you.

20. A large number of people visiting social networks attracts_________


a) Customers
b) Buyers
c) Advertisers
d) Business

21. ________ is a sale of goods at greatly reduced prices, lasting for only a short period
of time.
a) Flash Sales
b) Samples
c) Coupons
d) Rebates
22. Recommended products, services, etc. are ________ so members of social networks
can easily find them.
a) Looped
b) Bookmarked
c) Clipped
d) Highlighted

23. ___________ are based on finding people with similar profiles.


a) Referral Programs
b) Matching Algorithms
c) Customer rating and reviews
d) Personal social recommendations

24. _______ programs (e.g., Amazon) pay people for referring customers.
a) Recommendation
b) Affiliate
c) Both A and B
d) Sponsored

25. _______ are algorithms used to solve graph matching problems in graph theory.
a) Matching algorithms
b) Greedy algorithms
c) Backtracking algorithms
d) Recursive algorithms

26. Which marketing method enabling brands to listen and gain unique customer insights
while also providing value to the user?
a) Referral
b) Conversational
c) Cross-promote.
d) Network

27. The term _________ refers to a marketplace that uses social media tools and
platforms and acts as an online intermediary between buyers and sellers.
a) Social Marketplace
b) Social shopping aids
c) Real-time online shopping
d) None of the above

28. examples of social marketplaces include:


a) Craigslist
b) Fotolia
c) ShopSocially
d) All the above
29. Which is the type of shopping where, shoppers can log onto a site and then connect
with another social network instantly from a smartphone or computer?
a) Offline Shopping
b) Real-time online Shopping
c) Both A and B
d) None of the above

30. _________ ‘invented’ online shopping using videotex, a two-way message service, it
revolutionized businesses. We now know this as e-commerce.
a) Michael Aldrich
b) Ray Tomlinson
c) Adam Weinrich
d) Sylvan Goldman

31. Which is the essential type of e-commerce feature?


a) Ease to use
b) Site speed
c) gateway Variety of payment
d) User reviews
e) All the above

32. _________ allows the customers to return product bought over internet, to the
physical location of the store for more convenient return process.
a) Brick-and-Mortar
b) Pure Click
c) Brick and Click
d) None of the above

33. Offering _______ products allow brands connect with customers as co-creators,
increasing loyalty and margins.
a) mass product
b) Off-the-peg
c) Generic
d) Customized

34. ________ mean use of any technology or digital instrument which makes a Financial
task of an individual or Business easier.
a) Online DSA
b) Fintech
c) NBFC
d) None
35. For banks, __________ offers a rapid and inexpensive strategy to acquire out-of-the-
area customers.
a) E-banking
b) Mobile banking
c) Pure virtual bank
d) P2P lending

36. ___________ in general, has been embraced worldwide, including developing


countries.
a) Commercial bank
b) Investment bank
c) Online bank
d) Credit union

37. Customers can use _________ to view their account balance, make instant fund
transfers and pay bills, etc.
a) Internet banking
b) Mobile banking
c) Online banking
d) All the above

38. The European company called PayBox supported financially by Deutsche Bank,
in _______ started mobile banking.
a) 1996
b) 2000
c) 1999
d) 2002

39. What allows you to save time by depositing your checks remotely?
a) Time deposit
b) ATM deposit
c) Counter deposit
d) Mobile check deposit

40. Which banks do not have physical location and conduct only online transactions?
a) Savings and loans
b) Mutual
c) Credit unions
d) Virtual

41. ____________ was the first such bank to offer secure banking transactions on the
Web.
a) Security First Network Bank (SFNB)
b) Ally bank
c) Quantic bank
d) Discover bank
42. Which model allows people to lend money and to borrow from each other via the
Internet?
a) Microfinance: Credit Lending Models
b) P2P lending
c) Co-Operative Model
d) Community banking model

43. The benefit of buying car insurance policy online is ________


a) tailor-made
b) The cost of life insurance
c) Zero Paperwork
d) Planning ahead

44. Insurance online is also known as


a) Fintech
b) Insurtech
c) Financial protection
d) Safeguard

45. The commission for an online trade is between


a) $1 and $15 (dirt cheap brokers) to $15–$30 (mid-priced discount brokers)
b) $15 and $30 (dirt cheap brokers) to $30–$340 (mid-priced discount brokers)
c) $1 and $5 (dirt cheap brokers) to $5–$15 (mid-priced discount brokers)
d) $20 and $30 (dirt cheap brokers) to $30–$40 (mid-priced discount brokers)

46. With online trading, there are no busy telephone lines, and the chance to err is small,
because there is no oral communication in a frequently noisy environment.
a) True
b) False
c) Cannot determine.

47. __________ major objective is to bring public sector institutions into the digital age.
a) E-commerce’s
b) Digital Government’s
c) E-tailing’s
d) None of the above

48. Which e-government category create a friendly single point of access to government
services for individual?
a) G2B
b) G2E
c) G2G
d) G2C
49. The basic idea of G2C is to enable citizens to interact electronically with the
_________ from anywhere and at any time.
a) Businesses
b) Manufacturers
c) Government
d) Employees

50. Which software does the government or politicians to assign inquiries and problem
cases to appropriate staff members?
a) CRM-type
b) System
c) Artificial Intelligence
d) Embedded

51. In India Facilities like PMAY, Sukanya Yojna, scholarships, Subsidies are not
provided to Citizens directly.
a) True
b) False

52. _______ Increase the ability for businesses to find, view, and comment on rules and
regulations.
a) G2C
b) G2E
c) G2B
d) G2G

53. Two key G2B activities are


a) e-procurement and the auctioning of government surpluses
b) e-tailing and e-Way Bill
c) e-portfolio and e-procurement
d) none of the above

54. Group purchasing is a principal strategy by which companies in many sectors achieve
_________
a) growth
b) new customers
c) cost containment
d) many customers
55. In forward auction, buyer
a) Pay lowest price and seller gain quick and easy business
b) Pay highest price and seller achieve maximum revenue for their product
c) Both A and B
d) None of the above
56. The ___________ category consists of EC activities between different units of
governments, including those within one governmental body.
a) G2B
b) G2C
c) G2E
d) G2G

57. Government-to-employees (G2E) applications refer to which activities between the


government and its employees.
a) E-tailing
b) E-commerce
c) E-procurement
d) E-filling

58. ________ Increase availability of training programs for government employees.


a) IT
b) Internal Efficiency and Effectiveness
c) Government
d) None of the above

59. _______ refers to government policies that aim to harness collaborative technologies
and interactive Internet tools to create an open-source computing platform in which
government, citizens, and innovative companies can improve transparency and
efficiency.
a) Government websites
b) Policy agenda
c) Government 2.0
d) Linkage institute

60. Governments are using _______ tools mainly for collaboration, dissemination of
information, e-learning, and citizen engagement.
a) Website
b) Web 2.0
c) Social media
d) None of the above

61. _________ is the implementation of e-government applications using wireless


platforms and mobile devices, especially smartphones.
a) E-commerce
b) E-government
c) Gov 2.0
d) M-Government
62. The world's first M-Government work initiated by ________ in Japan at the M-
GovLab.
a) Professor Ibrahim Kushchu
b) Vinton Cerf
c) Bob Khan
d) Sidney Pressey

63. Which is not the benefit of M-Government?


a) Cost reduction
b) Modernizing the operations of the government
c) Employees cannot bring their own mobile devices to work
d) Providing quality, flexible services to the public

64. _______ is broader than the term online learning.


a) Traditional learning
b) E-learning
c) Verbal learning
d) Aural learning

65. E-learning includes _________ that is used when the material is delivered wirelessly
to smartphones, tablets, or other mobile devices.
a) Internet
b) Devices
c) M-learning
d) Software

66. Examples of e-learning are


a) Toppr
b) Byjus
c) National Digital Library (NDL)
d) All the above

67. Which is not an advantage of e-learning?


a) Learning and training time reduction
b) Measurement and assessment of progress
c) Rigidity
d) Self-paced and motivation learning

68. What are the limitations of the e-learning?


a) Lack of face-to-face interaction and campus lifestyle.
b) Need for instructor retraining
c) Assessments and examinations
d) All the above
69. ________ refers to education where the teacher and students are in different locations.
a) Traditional learning
b) Distance learning
c) E-learning
d) In school learning

70. Who launched the first distance education course?


a) Adam Weinrich
b) Sidney Pressey
c) Sir Isaac Pitman
d) Horace mann

71. Online corporate training is the type of training that is accessed and delivered over
the internet for ________ purposes
a) Updating
b) Leadership
c) Business development
d) Leveraging skills set

72. What are the examples of online corporate training?


a) Google Digital Unlocked
b) ApnaCourse training
c) NSE training modules and Marketing
d) Sales and Negotiation
e) All the above

73. _______ also known as economic simulation games or tycoon games, are games that
focus on the management of economic processes, usually in the form of a business.
a) Business simulation games
b) Management games
c) Capitallism
d) Airline Tycoon

74. Which game is developed by Marriott International for help in recruiting and training?
a) Marriott hotel
b) My Marriott Hotel
c) Capitalism
d) None of the above
75. Social environments facilitate ________ training, making it possible for learners to
share their experiences with others.
a) high-tech-based
b) social
c) Software based
d) Strategic

76. social networking has been interrelated with


a) networking
b) shopping
c) learning
d) updating

77. Some companies use __________ to engage employees in group learning via
knowledge sharing.
a) Social media
b) Blogging
c) Websites
d) Referral groups

78. Which social network site is dedicated to international education?


a) Linkedin.com
b) Learningmedia.com
c) Youtube.com
d) learnhub.com

79. Generation X and Millennial workers use _______ tools extensively for interacting
among themselves and with others.
a) Web 2.0
b) Social media
c) Web 1.0
d) Web 3.0

80. Social networking was born one day in ______, when the first email was sent.
a) 1952
b) 1960
c) 1971
d) 1999

81. when the first email was sent, the message said
a) “abstyuiop”
b) “Linksted”
c) “xteryuiop”
d) “qwertyuiop”
82. The __________ concept emerged directly from e-Learning.
a) E-tailing
b) E-study
c) Learning Management System
d) None of the above

83. Which capabilities does the LMS exhibits?


a) Provide effective student–instructor interactions.
b) Centralize and automate program administration.
c) Enable the use of self-service and self-guided e-learning services.
d) Provide a single point of access to all e-learning online materials.
e) All the above

84. The first LMS was developed in


a) 1900
b) 1850
c) 1966
d) 1924

85. Who invented the first ‘teaching machine’?


a) Sidney Pressey
b) Donald L. Bitzer
c) Horace Mann
d) John Thomas Riedl

86. What are examples of LMS?


a) Moodle
b) SAP Litmos
c) Google classroom
d) All the above

87. ______ is a book in digital format that can be read on a computer screen, mobile
device, or on a dedicated device known as an e-reader.
a) E-solution
b) E-book
c) E-LMS
d) E-filling

88. The e-books can be read


a) Via a dedicated reader.
b) Via web access
c) Via web download and smart phones
d) Via a web server
e) All the above
89. Which nook the Web access cannot download?
a) National Digital Library
b) Kindle
c) Both A and B
d) None of the above

90. The contents of a book are stored on a ____________ and downloaded for print-on
demand
a) Library
b) Catalog
c) Web server
d) None of the above

91. To buy kindle copy from Amazon.com readers have to pay before they download a
book
a) True
b) False

92. The e-book, e-newspaper are expensive than the hard-copy version.
a) True
b) False

93. Which is the major device used to read an e-book?


a) Server
b) Mobile
c) E-reader
d) E-stories

94. Microsoft ClearType and CoolType from Adobe can be used to improve screen
display, colors, and font sizes.
a) True
b) False
c) May be

95. Glowing screens can help you read in the ____


a) Day
b) Dark
c) Both A and B
d) None of the above

96. E-book can store hundreds of books on a small mobile device.


a) True
b) False
97. What are the advantages of e-book?
a) Lower cost to buyers.
b) Searchable text
c) Instant delivery via downloads from anywhere
d) Ability to enlarge the font size for easy reading and to add light if needed.
e) All the above

98. One of the biggest drawbacks of e-books is its


a) screen luminance.
b) Portability
c) Cost
d) durability

99. E-books do not have a defined ____-


a) Font
b) size
c) Life
d) None of the above

100. An eBook should always be converted into a format that ensures it is


a) Readable
b) Editable
c) Un editable
d) None of the above
CHAPTER 5: DIGITAL BUSINESS APPLICATIONS - II
1. Which e-commerce segment is considered as the most flourishing in online travel.
a) C2B
b) B2C
c) C2C
d) B2B

2. MakeMyTrip was founded by , headquartered in and year of establishment


a) Ashish Kashyap, Gurgaon Haryana, 2007
b) Ashwin Dhamera, Mumbai, 2005
c) Dhruv Shringi, Gurugram Haryana, 2006
d) Deep Kalra, Gurugram Haryana, 2000

3. Yatra.com was founded by, headquartered in and year of establishment


a) Dhruv Shringi, Gurugram Haryana, 2006
b) Nishant Pitti, New Delhi, 2008
c) Ashish Kashyap, Gurgaon Haryana, 2007
d) Ashwin Dhamera, Mumbai, 2005

4. Goibibo was founded by, headquartered in and year of establishment


a) Jarad Fisher, Mumbai, 2005
b) Nishant Pitti, New Delhi, 2008
c) Ashish Kashyap, Gurgaon Haryana, 2007
d) Deep Kalra, Gurugram Haryana, 2000

5. Main Characteristics of online travel


a) Systematic Method
b) Inventory Control
c) Managed Payment Risk
d) All the above
6. How income can be obtained with the help of online travel services
a) Advertising Fees
b) Subscription Fees
c) Lead Generation Payment
d) All the above

7. The benefits of online travel services to travelers and travel providers are
a) Free information is voluminous
b) Accessible at any time and place.
c) Shoppers find lowest price.
d) All the above.
8. OTA stands for

a) Online Travel Agent


b) Offline Travel Agent
c) Online Tourism Agent
d) Offline Tourism Agent
9. O20 stands for
a) Offline to Online

b) Online to Offline
c) Neither (a) nor (b)
d) None of the Above
10. Service providers operate their own websites by
a) Associate website
b) Promote website
c) Advertisement

d) All the above


11. As per which report year 2020 travel market cross over $400 billion.

a) CAP Ventures

b) Allied Business Intelligence

c) Phocuswright

d) Advito

12. US online travel agent is expected to figure around in the year 2020.

a) 31%

b) 50%

c) 41%

d) 48%
13. Additional travelling cost can be saved by the companies with help of

a) Online Optimization Tools

b) Offline Optimization Tools

c) Either (a) or (b)

d) Neither (a) nor (b)

14. Job services is considered as one of the online services provided over internet

a) Online Job Market

b) E-Employment

c) Online Employment

d) All The Above

15. E-recruitment, also known as online recruitment refers to using _ web-based


resources and other technology to find, attract, interview and hire new
personnel.

a) cloud-based recruitment software

b) Jazz

c) Job Adder

d) PC Recruiter

16. Employers and job seekers to connect via Facebook is through a company called

a) Jobseeker.com

b)Findemployment.com

c) Jobportal.com

d) Jobcastnet.com

17. Facebook has features that help people find jobs and help employer find
candidates.

a) jobportal.com

b) Jobseeker.com

c) Jobcastnet.com

d) Findemployment.com
18. As per ______ social media is utilized as the main source of job search.

a) Del Castillo (2016)

b) Del Castillo (2014)

c) Del Castillo (2015)

d) Del Castillo (2017)

19. The problem of searching the correct candidate for the right job is sorted out by the
sites.

a) Job research networking

b) Job social networking

c) Job referral social networking

d) Job networking

20. Who defines E-health as E-health is the transfer of health resources and health care
by electronic means.

a) UNICEF

b) WHO

c) UNESCO

d) FAO

21. EHR stands for

a) Electronic health research

b) Electronic health records

c) Electronic health remote

d) Electronic human record

22. EMR stands for

a) Electronic multiple record

b) Electronic multiple research

c) Electronic medical research

d) Electronic medical records


23. Which system can directly contact specialist, order medication from pharmacies,
discharge patience in remote areas and even can review testing results from remote
locations.

a) Patient service

b) EMR

c) EHR

d) Doctor’s system

24. In the UK, was the first online health site to offer both a diagnosis and prescriptions
to patients over the Internet.

a) E-med

b) EMR

c) EHR

d) E- Health

25. E-med was established in by Dr. Julian Eden, In 2010, Dr Thom claimed to have
100,000 patients visit their site.

a) January 2000

b) February 2000

c) March 2000

d) April 2000

26. What does PMS stand for

a) Patient medical service

b) Patient multiple service

c) Patient monitoring system

d) Patient monitoring service

27. Large numbers of medical devices are used in the health industry.

a) ECG

b) EC

c) EMR

d) EHR
28. What does DRM stands for

a) Digital random management

b) Digital right managerial

c) Digital right measurement

d) Digital right management

29. Internet TV, also known as

a) E- TV

b) OTT/ Streaming TV

c) Mobile Internet

d) E-commerce

30. In which year Wishpond Technologies Ltd. shows how smartphone shoppers use
their devices for different shopping related activities.

a) 2012

b) 2013

c) 2015

d) 2014

31. Since when apple has offered consumers the ability to download songs and videos
from the Apple iTunes store.

a) 2000

b) 2001

c) 2002

d) 2003

32. When apple announced that it is teaming up with a major car maker for its Car Play
system.

a) March 2010

b) March 2012

c) March 2014

d) March 2016
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

MCQs: [106] – [Digital Business]

1. The dimension of e-commerce that enables commerce across national B


boundaries is called _______.
A. Interactivity.
B. Global reach.
C. Richness.
D. Ubiquity.

2. E-commerce technologies have improved upon traditional commerce C


technologies in______.
A. Richness.
B. Reach.
C. Both richness and reach.
D. Neither richness nor reach.

3. Which one of the following is not one of the major types of e-commerce? A
A. C2B.
B. B2C.
C. B2B.
D. C2C.

4. Compared to B2C e-commerce, B2B e-commerce is ______. D


A. Of equal size.
B. Slightly smaller.
C. Slightly larger.
D. Much larger

5. Which of the following is not considered to be one of the three phases of e- C


commerce?
A. Innovation.
B. Consolidation.
C. Preservation.
D. Reinvention

6. The primary source of financing during the early years of e-commerce was C
_______.
A. Bank loans.
B. Large retail firms.
C. Venture capital funds.
D. Initial public offerings

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

7. A
The type of firms that benefited the most during the consolidation period of
e-commerce were _______.
A. Large, traditional firms.
B. First movers.
C. Pure online companies.
D. ISPs

8. All of the following are technologies used to gather information about you D
online except ______.
A. Spy ware.
B. Cookies.
C. Gmail.
D. Anonymizers
9. A _________ is the set of planned activities designed to result in a profit in a A
marketplace.
A. Business model.
B. Profit model.
C. Business plan.
D. Revenue model.

10. Which of the following is not a key element of a business model? D


A. Value proposition.
B. Competitive advantage.
C. Market strategy.
D. Universal standards.

11. The source of revenue in a subscription revenue model is _____. C


A. Fees from advertisers in exchange for advertisements.
B. Fees for business referrals.
C. Fees from subscribers in exchange for access to content or services.
D. Fees for enabling or execution a transaction.

12. Which of the following is an example of a portal? C


A. Amazon.
B. eBay.
C. Yahoo.
D. Face book

13. All of the following are major B2C business models except ______. B
A. Content provider.
B. Industry consortium.
C. Transaction broker.
D. Service provider.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

14. The _________ business model involves an independently owned vertical B


digital marketplace for direct inputs.
A. E-distributor.
B. Exchange.
C. E-procurement.
D. Private industrial network.

15. Compared to Internet users, the number of cell phone subscribers is D


_________.
A. About the same.
B. Slightly fewer.
C. Much fewer.
D. Much larger.

16. Industry structure is defined as _____. A


A. The nature of the players in an industry and their relative bargaining
power.
B. A set of plans for achieving long term returns on the capital invested in a
business firm.
C. Set of planned activities designed to result in a profit in a marketplace.
D. How a company's product or service fulfills the needs of customers.

17. The area of actual or potential commercial value in which a company intends A
to operate is a _______.
A. Market space.
B. Marketplace.
C. Perfect market.
D. Bertrand market.

18. Which of the following is not a horizontal portal? C


A. AOL.
B. Yahoo.
C. Sailnet.
D. MSN/Windows Live.

19. A situation where there are no differences among products or services, and D
the only basis of choosing
product is price is known as ______.
A. A value web.
B. Value chain.
C. Profit.
D. Commoditization.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

20. A strategy designed to compete in all markets around the globe is called a A
_____ strategy.
A. Scope.
B. Differentiation.
C. Cost.
D. Focus.

21. Which of the following is not one of the stages of the development of the C
Internet?
A. Innovation.
B. Institutionalization.
C. Globalization.
D. Commercialization.

22. In 1961, __________ published a paper on "packet switching" networks. A


A. Leonard Kleinrock.
B. Ray Tomlinson.
C. Bob Metcalfe.
D. Vint Cerf.

23. The component of TCP/IP that provides the Internet's addressing scheme B
and is responsible for the
actual delivery of packets is ______.
A. TCP.
B. IP.
C. the Network Layer.
D. the Application Layer

24. Which protocol permits users to transfer files from the server to their client D
computer, and vice versa?
A. HTTP.
B. SMTP.
C. IMAP.
D. FTP.

25. Broadband is generally considered to be any communication technology A


allowing streaming audio and video at or above _____.
A. 100 Kbps.
B. 56.6 Kbps.
C. 30 Kbps.
D. 10 Kbps

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

26. Which of the following is not a limitation of the current Internet? C


A. Insufficient capacity throughout the backbone.
B. Network architecture limitations.
C. Insufficient reach.
D. Best-efforts QOS.

27. All of the following are goals of Internet2 except ______. B


A. Creating a leading-edge very high-speed network capability for the
national research community.
B. Eliminating censorship from the Internet.
C. Enabling revolutionary Internet applications.
D. Ensuring the rapid transfer of new network services and applications to
the broader Internet
community.

28. Which of the following is a new and disruptive Web feature or service? C
A. XML.
B. Diffserv.
C. Blogs.
D. CDMA.

29. All of the following are examples of 2G wireless phone technologies except B
_______.
A. CDMA.
B. W-CDMA.
C. TDMA.
D. GSM.

30. All of the following are wireless Internet access network technologies except D
________.
A. Wi-Fi
B. Bluetooth.
C. Zigbee.
D. GigaPoP.

31. Which of the following was the first commercial Web browser? C
A. Mosaic.
B. Mozilla.
C. Netscape Navigator.
D. Internet Explorer

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

32. All of the following are steps in the systems development life cycle except D
______.
A. Systems Design.
B. Testing.
C. Implementation.
D. Debugging.
ANSWER:

33. A _________ describes the flow of information at your e-commerce site and B
the infrastructure that will be used in the system.
A. System design.
B. Logical design.
C. Tactical design
D. Physical design.

34. All of the following are factors in optimizing Web site performance except A
_____.
A. Page retrieval.
B. Page generation.
C. Page delivery.
D. Page content.

35. The largest component of a Web site budget is_____. A


A. System maintenance.
B. System development.
C. Content design and development.
D. Telecommunications.

36. What Web server functionality allows it verify usernames and passwords and D
process certificates and encryption information?
A. Processing of HTTP requests.
B. File Transfer Protocol.
C. Data capture.
D. Security services.

37. The underlying computing equipment that the system uses to achieve its e- A
commerce functionality is called a ______.
A. Hardware platform.
B. Content platform.
C. Transaction platform.
D. Scalability platform.

38. Redundant navigation refers to _________. D


A. pages that work, load quickly, and point the customer toward your
product offerings.
B. Simple, fool-proof navigation.
C. A site working with the most popular browsers.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

D. Alternative navigation to the same content.

39. E-commerce merchant server software includes all of the following A


except_______.
A. online e-mail.
B. online catalog.
C. online shopping cart.
D. online credit card processing.

40. The ability to change the product to better fit the needs of the customer is A
called ________.
A. Customization.
B. Personalization.
C. Privacy.
D. Accessibility.

41. All of the following are tools for optimizing a Web site's location in search D
engine listings except
______.
A. Keywords and page titles.
B. Identifying market niches.
C. Buying ads.
D. Benchmarking.

42. The most common type of Internet crime according to the IC3 is ______. D
A. Credit card fraud.
B. Check fraud.
C. Non-delivery.
D. Auction fraud.
:

43. In the e-commerce security environment, which of the following constitutes B


the inner-most layer?
A. People.
B. Data.
C. Technology solutions.
D. Organizational policies and procedures.

44. All of the following are major categories of computer viruses except _____. D
A. Macro viruses.
B. File-infecting viruses.
C. Script viruses.
D. Trojan viruses.

45. A worm is designed to spread _________. A

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

A. From computer to computer.


B. From file to file on a computer.
C. From Web site to Web site.
D. From Web site to computer

46 . When hackers flood a Web site with useless traffic to overwhelm the C
network, it is called ______.
A. phishing.
B. pharming.
C. a Denial of Service (DoS) attack.
D. spoofing.

47. Which of the following is not a dimension of e-commerce security provided A


by encryption?
A. availability.
B. message integrity.
C. nonrepudiation.
D. confidentiality.

48. The most widely used encryption standard is ______. A


A. Advanced Encryption Standard (AES).
B. Data Encryption Standard (DES).
C. Universal Encryption Standard (UES).
D. Optimal Encryption Standard (OES).
:
49. The most common form of securing channels is through ______. :C
A. S-HTTP.
B. VPNs.
C. SSL.
D. PPTP.

50. Firewalls perform all of the following functions except ______. C


A. Forbids communications from untrustworthy sources.
B. Allows communications from trustworthy sources.
C. Eliminates viruses and other malicious attacks.
D. Filters traffic based on packet attributes.

51. A security plan begins with a(n) is ______. B


A. Security policy.
B. Risk assessment.
C. Implementation plan.
D. Security organization.

52. The only payment system that is instantly convertible without D


intermediation is _______.
A. Credit card.
B. Accumulating balance.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

C. Stored value.
D. Cash.

53. The most prevalent online payment method is ______. C


A. PayPal.
B. checks.
C. Credit cards.
D. Debit.
:

54. What is the name of the division of the U.S. Department of Homeland A
Security that coordinates cyber incident warnings and responses across
government and private sectors?
A. US-CERT.
B. OECD.
C. IC3.
D. P3P.

55. After sending e-mail, which of the following activities is most common C
among Internet users?
A. Sending instant messages.
B. Reading someone else's blog.
C. Using a search engine to find information.
D. Getting news.

56. __________ influences the behavior of others through their personality, A


skills, or other factors.
A. Opinion leaders.
B. Direct reference groups.
C. Indirect reference groups.
D. Lifestyle groups.

57. All of the following are reasons more people don't shop online except B
________.
A. Lack of trust in online merchants.
B. Lack of convenience.
C. Inability to touch and feel the product.
D. Fear of misuse of personal information.

58. A good or service for which there are many dealers supplying the same A
product, and all products in the segment are essentially identical is known as
_______.
A. Commodity.
B. Core product.
C. Actual product.
D. Augmented product.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

59. Complete price transparency in a perfect information marketplace is C


necessary for ____________ to
take effect.
A. Bertrand's Law.
B. The Law of Universal Prices.
C. The Law of One Price.
D. The Law of Perfect Commerce.

60. A(n) _________ represents data as two-dimensional tables with records D


organized in rows and
attributes in columns.
A. Database management system.
B. Data warehouse.
C. SQL query.
D. Relational database.

61. All of the following are types of data mining except ______. A
A. Selective data mining.
B. Query-driven data mining.
C. Model-driven data mining.
D. Rule-based data mining.

62. Which of the following market entry strategies are the most common for C
existing firms?
A. First mover
B. Fast follower.
C. Brand extender.
D. Alliances.

63. The process of getting customers to pass along a company's marketing B


message to friends, family, and colleagues is known as _______.
A. Affiliate marketing.
B. Viral marketing.
C. Permission marketing.
D. Blog marketing.

64. The per-product price consumers are willing to pay for a bundle B
____________ as the number of goods in the bundle increases.
A. decreases.
B. increases.
C. varies from product to product.
D. stays the same.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

65. Creating multiple versions of information goods and selling essentially the A
same product to different market segments at different prices is
called_______.
A. Versioning.
B. Bundling.
C. Transactive content.
D. Price discrimination.

66. All of the following are examples of intelligent agent technology except D
________.
A. Automated response systems.
B. Automatic shipping confirmation.
C. Order status reports.
D. Online web bugs.

67. E-business can be defined as_______. C


A. The uninhibited flow of information and goods on the Web.
B. The use of the Internet and the Web to transact business.
C. Digitally enabled transactions and processes within an organization.
D. Commercial transactions involving electronic goods.

68. The set of applications and technologies that allow users to create, edit, and D
distribute content online is known as______.
A. Internet.
B. social networking.
C. virtual life.
D. Web 2.0.

69. A
Which of the following represents a limiting factor for the growth of e-
commerce?
A. Persistent cultural attraction of physical markets and traditional shopping
experiences.
B. Inadequate selection of goods compared to physical marketplaces.
C. E-commerce lacks the convenience of other methods of transacting
business.
D. The potential audience for e-commerce is too low to support it as a
widespread method of commerce.

70. The fastest growing form of online advertising is _________. C


A. Banner ads.
B. Pop-up ads
C. Rich media/video ads.
D. Pop-under ads.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

71. All of the following are among the most common categories of spam except A
______.
A. Fraud.
B. Commercial products.
C. Finance.
D. Health (drugs).

72. All of the following are types of social marketing except ______. A
A. Affiliate marketing.
B. Blog advertising
C. Social network advertising.
D. Game advertising.

73. Which of the following measures the percentage of people exposed to an C


online advertisement who actually click on the banner?
A. Impression rate.
B. View-through rate.
C. Click-through rate.
D. Stickiness ratio.

74. Which of the following is a measure of the percentage of purchasers who A


return to a Web site within a year?
A. Loyalty.
B. Reach.
C. Decency
D. Unique visitors.

75. All of the following are metrics for e-mail campaigns except ______. D
A. Open rate.
B. Delivery rate.
C. Bounce-back rate.
D. Cart conversion rate.

76. As consumers become more accustomed to new online advertising formats, B


click-through rates tend to_______.
A. Remain constant.
B. Decrease.
C. Increase.
D. Rapidly increase.

77. Malicious hackers who act with the intention of causing harm are B
__________.
A. White hats.
B. Black hats.
C. Grey hats.
D. Brown hats.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

78. The ethical principle which states that if an action is not right for all D
situations, then it is not right for
any situation is known as ______.
A. The Golden Rule.
B. Slippery Slope.
C. No Free Lunch.
D. Universalism.

79. Which of the following statements about privacy is true? A


A. It is a moral right to be left alone.
B. Only corporations and government need to be concerned about it.
C. It has only just recently become a concern.
D. It is most easily obtained on the Internet.

80. The ability of consumers to review and contest the accuracy and D
completeness of data collected about them involves which of the following
FTC fair information practice principles?
A. Security.
B. Enforcement.
C. Choice/Consent.
D. Access/Participation.

81. The __________ is the first major effort to adjust the copyright laws to the C
Internet age.
A. Platform for Privacy Preferences (P3P).
B. Center for Democracy and Technology.
C. Digital Millennium Copyright Act (DMCA).
D. E-Government Act of 2002.

82. A patent grants the owner an exclusive monopoly on the ideas behind the B
invention for ______ years.
A. 10
B. 20
C. 30
D. 40

83. The number of business methods patents granted is ___________ compared A


to the number of patents applied for.
A. Substantially smaller.
B. Slightly smaller.
C. Close to equal.
D. Equal.

84. The redirection of traffic from a legitimate site to an infringing site is called B
_______.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

A. Cybersquatting.
B. Cyberpiracy.
C. Metatagging.
D. keywording.

85. During which period of Internet governance was Network Solutions given a B
monopoly to assign and
track high-level domains?
A. Government Control Period.
B. Privatization.
C. Self-Regulation.
D. Governmental Regulation.

86. The taxation system for e-commerce sales is best described as ______. A
A. complex.
B. streamlined.
C. universal.
D. standardized.

87. All of the following are acts Congress has passed or attempted to pass to A
protect children online except ______.
A. Video Privacy Protection Act.
B. Children's Online Protection Act.
C. Communications Decency Act.
D. Children's Internet Protection Act.

88. Which of the following is a privacy advocacy group that is a foundation- and A
business-supported group with a legislative focus?
A. Cdt.org
B. PrivacyInternational org.
C. Epic.org
D. Privacy.org

89. What is the first step in a P3P-enabled transaction? B


A. Send Web page.
B. http GET request Web page.
C. Send P3P policy files.
D. http GET request P3P policy files.

90. All of the following are types of intellectual property protection C


except_______.
A. Patents.
B. Trademarks.
C. Governance.
D. Copyrights.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

91. All of the following are challenges to online retail except ______. D
A. Consumer concerns about the security of transactions.
B. Consumer concerns about the privacy of personal information given to
Web sites.
C. Delays in delivery of goods when compared to store shopping.
D. Inability to change prices nearly instantly.

92. Which of the following is an industry strategic factor that relates to whether A
new entrants face a disadvantage when attempting to enter an industry?
A. Barriers to entry
B. Power of suppliers.
C. Power of consumers.
D. Industry value chain.
ANSWER:

93. Companies that have a network of physical stores as their primary retail B
channel, but also have introduced online offerings are called ______.
A. Virtual merchants.
B. Click and Morter.
C. Catalog merchants.
D. Manufacturer-direct.

94. Products are made to prior to orders received based on estimated demand A
under a ______.
A. Supply-push model.
B. Demand-push model.
C. Supply-pull model.
D. Demand-pull model.

95. The major impact of Internet real estate sites is in ______. B


A. Completing property transactions online.
B. Influencing offline decisions
C. Reducing commissions.
D. E-mail marketing to consumers.

96. The largest segment in the recruitment business is_____. A


A. General job recruitment.
B. Executive search.
C. Specialized job placement services.
D. Managerial recruitment

97. The majority of job seekers rely on which of the following? C


A. Word-of-mouth leads.
B. Employment agencies.
C. Internet and newspapers equally.
D. Internet only.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

98. The most popular type of media in terms of total hours of consumption per A
year is _____.
A. Television.
B. Radio.
C. Internet.
D. Newspaper.

99. Which of the following describes paid content's relation to free user- C
generated content?
A. Free content jeopardizes paid content
B. Paid content jeopardizes free content
C. Free content and paid content can both work in tandem cooperatively.
D. Paid content is viable now but will not be in the future.

100. Which of the following is not a type of media convergence? D


A. Technological convergence.
B. Content convergence.
C. Industry convergence
D. Community convergence.

101. The online content revenue model in which free content drives offline A
revenues is called the ______.
A. Marketing model.
B. Advertising model.
C. Pay-per-view model.
D. Subscription model.

102. The combination of technical and legal means for protecting digital content A
from unlimited reproduction without permission is known as _____.
A. Digital rights management.
B. Digital protection schemes.
C. Digital distribution regulation.
D. Digital rights protection.

103. What is the most commonly offered interactive feature of newspaper Web C
sites?
A. Video.
B. Comments on blogs.
C. RSS feeds.
D. Podcasts.

104. Which of the following is an advantage of e-books? A


A. Reduced transaction costs for the user.
B. Requirement of expensive devices to use.
C. Portability compared to print books.
D. Copyright management.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

105. After television, the next largest major player in the commercial D
entertainment industry is ______.
A. Video games.
B. Music.
C. Radio.
D. Film.

106. Which of the following is not an entertainment industry value chain model? B
A. Content owner direct model.
B. User distribution model.
C. Aggregator model.
D. Internet innovator model.

107. Technologies that help enhance resolution of e-book reader display screens D
are known as ______.
A. High-res pixel formatting.
B. Screen resolution technologies.
C. Sub-screen smoothing technologies.
D. Sub-pixel display technologies.

108. All of the following are characteristics of a social network except _______. C
A. Involves a group of people.
B. Features shared social interaction.
C. Always feature shared goals and purposes.
D. Common ties among members.

109. Social networking sites primarily earn their revenue through ______. A
A. Advertising.
B. Subscriptions.
C. Donations.
D. Service fees.

110. The type of social network described as a community built around a D


common interest such as games, sports, music, and so on is called _____.
A. General community.
B. Practice network.
C. Affinity community.
D. Interest-based social network.

111. Auction sites like eBay tend to use _______ pricing. A


A. Dynamic.
B. Fixed.
C. Trigger.
D. Utilization.

112. Which of the following is not considered to be a drawback of Internet A


auctions?

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

A. Market inefficiency.
B. Trust risks.
C. Fulfillment costs.
D. Delayed consumption costs.

113. The marketplace for auction sites is best described as _____. D


A. Many sites attaining similar levels of profitability.
B. Easy to enter due to minimal barriers.
C. Populated mostly with small, thriving specialty sites.
D. Dominated by a handful of sites with established networks.

114. A dynamically priced market that features few buyers and many sellers is a B
market that exhibits
______.
A. Market neutrality.
B. Buyer bias.
C. Seller bias.
D. Owner bias.

115. Which of the following is not a primary function of a portal? B


A. Navigation of the Web.
B. Social networking.
C. Commerce.
D. Content.

116. Which portal business model best describes Yahoo? A


A. General purpose portal.
B. Affinity group based vertical market.
C. Focused content based vertical market.
D. None of the above.

117. Which of the following portal revenue models involves charging for premium C
content?
A. ISP services.
B. General advertising.
C. Subscription fees.
D. Tenancy deals.

118. Which of the following best describes predicted growth in C2C and B2C B
auction spending?
A. B2C spending will overtake C2C spending.
B. Both types of spending will increase.
C. C2C spending will decrease while B2C increases.
D. Both types of spending will decline at similar rates.

119. An auction that has multiple winners that all pay the same price is an A
example of________.

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

A. Uniform pricing.
B. Discriminatory pricing.
C. Bid rigging.
D. Price matching.

120. The communication standard for sharing business documents and B


settlement information that emerged in the 1970s is called_____.
A. ECD.
B. EDI.
C. IDE.
D. BCB.

121. All of the following are potential benefits of B2B e-commerce A


except_________.
A. reduced amount of 'first-mover' advantages.
B. decreased product cycle time.
C. increased opportunities for collaborating with suppliers and distributors.
D. increased production flexibility.

122. Goods directly involved in the production process are known as _____. D
A. MRO goods.
B. Procured goods.
C. Indirect goods.
D. Direct goods.

123. A materials requirements planning (MRP) system is an example of ______. C


A. Spot purchasing.
B. A multi-tier supply chain.
C. A legacy computer system.
D. Electronic data interchange.

124. The foundation for contemporary supply chain management systems D


includes all of the following
except _____.
A. Supply chain simplification.
B. Continuous inventory replenishment.
C. ERP systems.
D. B2B electronic storefronts.

125. The two main types of Internet-based B2B commerce are______. D


A. Net marketplaces and private industrial networks.
B. EDI and collaborative commerce.
C. Net marketplaces and collaborative commerce.
D. EDI and private industrial networks.

126. The type of Net marketplace characterized by indirect inputs and spot C
purchasing is called an

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

_______.
A. Industry consortium.
B. Independent exchange.
C. E-distributor.
D. E-procurement marketplace.

127. The most common and easily understood type of Net marketplace is ______. B
A. E-procurement marketplace.
B. E-distributors.
C. Industry consortia.
D. Independent exchanges.

128. All of the following are objectives of private industrial networks except B
________.
A. Developing efficient purchasing and selling business processes industry-
wide.
B. Operating on a local scale.
C. Creating increased supply chain visibility.
D. Reducing industry risk.

129. _____________ are networks that connect people within a company to each D
other and to the company network.
A. Bitstreams.
B. Extranets.
C. Internets.
D. Intranets.

130. _______________ is the encompassing term that involves the use of B


electronic platforms - intranets, extranets and the Internet - to conduct a
company's business.
A. E-marketing.
B. E-business
C. E-procurement.
D. E-commerce.

131. Which of the following is not one of the benefits of e-commerce to sellers? D
A. E-commerce offers greater flexibility in meeting customer needs.
B. E-commerce is a powerful tool for customer relationship building.
C. E-commerce can help to reduce costs.
D. E-commerce increases the net cost per contact.

132. The E-commerce domain that involves business activity initiated by the C
consumer and targeted to businesses is known as ______.
A. Business to Business (B2B).
B. Consumer to Consumer (C2C).
C. Consumer to Business (C2B).
D. Business to Consumer (B2C).

Prof. Hrishikesh Dhumale www.dimr.edu.in


DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH

133. A _________ is a B2B trading network that links a particular seller with its D
own trading partners.
A. Bitstream.
B. Virtual network.
C. Web community.
D. Private trading network.

134. The type of website that is designed to build customer goodwill and to D
supplement other sales channels rather than sell the company's products
directly is known as a ______________ website.
A. Marketing.
B. Click-and-mortar.
C. Customer service.
D. Corporate.

135. When preparing a website, designers should ensure that the site enables B
user-to-user communication. This design feature is known as ___________.
A. Context.
B. Community.
C. Commerce.
D. Connection.

136 . ______________ marketing is the Internet version of word-of-mouth C


marketing.
A. Visceral.
B. Virile.
C. Viral.
D. Virtual.

137. Why would a merchant want to customize products? A


A. To charge a higher price.
B. To decrease costs.
C. It is required in EC.
D. Customers will only accept customized products.

138. A website offering content created by third party transparently to customers B


is an example of ______.
A. Reintermediation.
B. Syndication.
C. Virtual Manufacturing.
D. Build-to-order.

Prof. Hrishikesh Dhumale www.dimr.edu.in


Course: MBA Sem-I
Subject : Digital Business [106]
Type: MCQs

Unit-01
Sr. No. Question Option (a) Option (b) Option (c) Option (d) Answer
1 Which of the following describes e-commerce? Doing business electroni Doing business Sale of goods All of the above a
2 Which of the following is part of the four main types for e-commerce? B2B B2C C2B All of the above d
3 Which segment do eBay, Amazon.com belong? B2Bs B2Cs C2Bs C2Cs b
4 Which type of e-commerce focuses on consumers dealing with each other? B2B B2C C2B C2C d
5 Which segment is eBay an example? B2B C2B C2C None of the above d
6 Which type deals with auction? B2B B2C C2B C2C d
7 In which website Global Easy Buy is facilitated? Ebay.com Amazon.com Yepme.com None of these a
8 The best products to sell in B2C e-commerce are: Small products Digital products Specialty produ Fresh products b
9 Which products are people most likely to be more uncomfortable buying on the Internet? Books Furniture Movies All of the above b
10 Which products are people most likely to be comfortable buying on the Internet? Books PCs CDs All of the above d
11 Digital products are best suited for B2C e-commerce because they: Are commodity like prodCan be mass-custoCan be deliveredAll of the above d
12 The solution for all business needs is EDI ERP SCM None of the above b
13 All of the following are techniques B2C e-commerce companies use to attract customers, except: Registering with search Viral marketing Online ads Virtual marketing d
14 Which is a function of E-commerce marketing advertising warehousing all of the above d
15 Which is not a function of E-commerce marketing advertising warehousing none of the above c
16 Which term represents a count of the number of people who visit one site, click on an ad, and are takAffiliate programs Click-through Spam All of the above b
17 What is the percentage of customers who visit a Web site and actually buy something called? Affiliate programs Click-through Spam Conversion rate d
18 What are materials used in production in a manufacturing company or are placed on the shelf for sa Direct materials Indirect materials EDI None of the above a
19 What are materials that are necessary for running a modern corporation, but do not relate to the com
Direct materials Indirect materials EDI None of the above b
20 What are ballpoint pens purchased by a clothing company? Direct materials Indirect materials EDI None of the above b
21 What is another name for? Direct materials Indirect materials EDI None of the above b
22 What is the process in which a buyer posts its interest in buying a certain quantity of items, and selle B2B marketplace Intranet Reverse auction Internet c
23 What are plastic cards the size of a credit card that contains an embedded chip on which digital inforCustomer relationship mE-government ide FEDI cards Smart cards d
24 Most individuals are familiar with which form of e-commerce? B2B B2C C2B C2C b
25 Which form of e-commerce currently accounts for about 97% of all e-commerce revenues? B2B B2C C2B C2C a
26 Which of the following are advantages normally associated with B2B e-commerce? Shorter cycle times Reduction in costsReaches wider a all of the above d
27 If the threat of substitute products or services is low it is a(n): Disadvantage to the sup Advantage to the Advantage to th None of the above c
28 The threat of new entrants is high when it is: Hard for customers to enHard for competitEasy for compet Easy for customer c
29 If it is easy for competitors to enter the market, the threat of new entrants is considered: High Low More Less a
30 An industry is less attractive for suppliers when the rivalry among existing competitors is: High Low More Less a
31 Unique value auction is mainly applies to? New products Second hand prodEngineering pro None of the above b
32 Paisapay is facilitated in eBay.co.in amazon.com flipkart.com none of the above a
33 Which of the following is a useful security mechanism when considering business strategy and IT? encryption decryption firewall all the above d
34 Which of the following is not related to security mechanism encryption decryption e-cash all the above c
35 A product or service that customers have come to expect from an industry, which must be offered by Switching costs Loyalty programs Entry barriers Affiliate program c
36 How the transactions occur in e-commerce? Using e-medias Using computers Using mobile ph None of the above a
37 Which type of products is lesser purchased using ecommerce? automobiles books softwares none a
38 A business competing in a commodity like environment must focus on which of the following? Price Ease / speed of de Ease of orderingall of the above d
39 Which of the following refers to creating products tailored to individual customers? customization aggregation Direct materials Reverse auction a
40 Materials used in the normal operation of a business but not related to primary business operations a Supplies Direct materials Indirect materia Daily stuff c
41 Amazon.com is well-known for which e-commerce marketing technique? Banner ads Pop-up ads Affiliate programViral marketing c
42 What is the name given to an interactive business providing a centralized market where many buyersDirect marketplace B2B B2C Electronic market d
43 Which form of e-marketplace brings together buyers and sellers from multiple industries, often for Mhorizontal Vertical Integrated Inclined a
44 Which form of e-marketplace brings together buyers and sellers from the same industry? horizontal Vertical Integrated Inclined b
45 Which type of add appears on a web page? pop-under ad Pop-up ad Banner ad Discount ad c
46 What type of ad appears on top of a web page? pop-under ad Pop-up ad Banner ad Discount ad b
47 What type of ad appears under a web page? pop-under ad Pop-up ad Banner ad Discount ad a
48 Which, if any, of the following types of ads are people most willing to tolerate? pop-under ad Pop-up ad Banner ad Discount ad d
49 The dominant Web server software is ______. Zeus. B. Apache. C. Microsoft IISD. Google. b
50 The underlying computing equipment that the system uses to achieve its e-commerce functionhardware platform. content platformtransaction pla scalability platfo a
51 The set of standards for communication between a browser and a program running on a serveActive Server Pages (A Java Server Page Common GatewVBScript. c

Unit-02
1 Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to de encryption, decryption private, public encryption, pub public, private d
2 Secure Sockets Layers does which of the following? creates a secure, privateencrypts informatsends informatioall of the above d
3 When a transaction is processed online, how can the merchant verify the customer's identity? use secure sockets layersuse secure electro use electronic dause financial elect b
4 The practice of forging a return address on an e-mail so that the recipient is fooled into revealing privhacking cracking dumpster divingspoofing d
5 What is a model of a proposed product, service, or system? Prototyping Prototype Proof-of-concept Selling prototype b
6 What is an internal organizational Internet that is guarded against outside access by a special securit Client/server network Intranet Extranet Thin client b
7 What is an intranet that is restricted to an organization and certain outsiders, such as customers and Client/server network Intranet Extranet Thin client c
8 What is a detailed process for recovering information or an IT system in the event of a catastrophic d Disaster recovery plan Hot site Cold site Disaster recovery a
9 Which factor determines when your IT system will be available for knowledge workers to access? Availability Accessibility Reliability None of the above a
10 Which factor determines who has the right to access different types of IT systems and information? Availability Accessibility Reliability Scalability b
11 Which factor ensures your IT systems are functioning correctly and providing accurate information? Availability Accessibility Reliability Scalability c
12 Which factor represents how well your system can adapt to increased demands? Availability Accessibility Reliability Scalability d
13 What is a set of conditions used to measure how well a product or system functions? Flexibility Performance Capacity planninBenchmark d
14 What determines the future IT infrastructure requirements for new equipment and additional netwo Flexibility Performance Capacity planninBenchmark c
15 What automates business processes? Workflow ASP Workflow systemEIP c
16 What defines all of the steps or business rules, from beginning to end, required for a process to run c Workflow ASP Workflow systemLA a
17 What sends work assignments through an e-mail system? Database-based enterpriMessaging-based Database-based Messaging-based d
18 Which will not harm computer resources firewall Virus Trojan horse None of the above a
19 Which is not a function of ERP? Warehousing sales scheduling None of the above d
20 Which is a function of ERP? Warehousing sales scheduling all of the above d
21 Which of the following is the primary characteristic of an intranet? People outside the organPeople inside the oPeople outside thNone of the above c
22 Which concept suggests that different applications and computer systems should be able to communiIntegration Web services Scalability Interoperability d
23 Which service encompasses all technologies used to transmit and process information on an across a Interoperability Scalability Benchmarking Web services d
24 Which process can prevent data from lose due to computer problems or human errors? backup recovery benchmarking data cleansing a
25 What describes a process of continuously measuring results and comparing those results to optimal pPerformance Capacity planningBenchmarking Data cleansing c
26 Who protects system from external threats? firewall EDI ERP Script kiddies a
27 Who breaks into other people's computer systems and steals and destroys information? Hackers softwares Hacktivists Script kiddies a
28 What is software that comes hidden in free downloadable software and tracks your online movementWeb log Clickstream Anonymous WebNone of the above d
29 ERP stands for Enterprise resolution plaEnterprise revers Enterprise resouNone of the above c
30 Which is not a component of ERP? Legacy systems Bolt on applicatio Operational dataCybersoft d
31 What is a type of virus that spreads itself, not just from file to file, but from computer to computer vi Computer virus Worm Denial-of-serviceNone of the above b
32 What harnesses far-flung computers together by way of the Internet or a virtual private network to s Computer virus Worm Denial-of-serviceNone of the above d
33 What consists of the identification of risks or threats, the implementation of security measures, and thRisk management Risk assessment Security None of the above a
34 What is the process of evaluating IT assets, their importance to the organization, and their susceptibi Risk management Risk assessment Security None of the above b
35 What is the process of making a copy of the information stored on a computer? Backup Anti-virus Firewall Biometrics a
36 What software detects and removes or quarantines computer viruses? Backup Anti-virus Firewall Biometrics b
37 What is hardware and/or software that protects computers from intruders? Backup Anti-virus Firewall Biometrics a
38 What is the use of physical characteristics ù such as your fingerprint, the blood vessels in the retina o Backup Anti-virus Firewall Biometrics d
39 All of the following are considered biometrics, except: Fingerprint Retina Password Voice c
40 What scrambles the contents of a file so you can't read it without having the right decryption key? Encryption Intrusion-detectio Security-auditin All of the above a
41 What is an encryption system that uses two keys: a public key that everyone can have and a private kEncryption Public key encryp Intrusion-detect Security-auditing b
42 What looks for people on the network who shouldn't be there or who are acting suspiciously? Encryption Public key encryp Intrusion-detect Security-auditing c
43 What checks out your computer or network for potential weaknesses? Encryption Public key encryp Security-auditin None of the above c
44 Which of the following to viruses harm? Your keyboard Your monitor Your processor Viruses do not ha d
45 Which of the following can a virus do? Hurt your hardware Hurt any files theyInfect files on wrNone of the above d
46 In simple terms, what does risk assessment ask? What can go wrong? How likely is it to What are the po All of the above d
47 Which of the following are ways to prove access rights? What you know, like a p What you have, li What you look l All of the above d
48 Which item can a password be used to protect? Network File Folder All of the above d
49 Which is the most important component of IT? Information People Information techComputers b
50 Which of the following applies to the implementation of an idea? Copyright Intellectual prope Patent Denial-of-service a c
51 Which of the following captures screen images? Key logger Packet sniffer Log analysis too Screen capture so d
52 Which of the following examines information passing through switches, hubs, or routers? Key logger Packet sniffer Log analysis too Screen captures b
53 Which of the following records logons and deletions? Key logger Packet sniffer Log analysis too Screen captures c
54 E-mail messages may be stored on which of the following computers? Sender's computer Sender's server Recipient's serveAll of the above d
55 What might identity thieves do with your identity? Apply for and use creditApply for a loan Change their ideAll of the above d
56 Companies can gather information about employees and potential employees from which of the follow
Job applications Credit reports Companies that All of the above d
57 Cyber slacking consists of what activities? Visiting ôinappropriateöVisiting news sites Chatting online w
Chatting online w d
58 Cookies are used to do which of the following? Store your ID and passwStore contents of To track web actAll of the above a d
59 Unsolicited e-mail is called what? Junk mail Spam Extra mail None of the above b
60 What is the name of the new anti-Spam bill? No-Spam CAN-Spam Spam-Away Stop Spam b
61 What is the legal protection afforded an expression of an idea, such as a song, video game, and some Ethics Intellectual prope Copyright Fair Use Doctrine c
62 What is the unauthorized use, duplication, distribution or sale of copyrighted software? Fair Use Doctrine Pirated software Counterfeit softwPrivacy b
63 What is a program, when installed on a computer, records every keystroke and mouse click? Key logger software Hardware key log Cookie Adware a
64 What is software you don't want hidden inside software you do want? Adware Trojan-horse softwSpyware All of the above d
65 piece of clothing similar to the way you would carry your cell phone on your belt? Wearable computer GPS Implant chip None of the above a

Unit-03

1 What is an electronic representation of cash? Digital cash Electronic cash E-cash All of the above d
2 What is a technology-enabled microchip implanted into the human body? Wearable computer GPS Implant chip None of the above c
3 Which of the following is not a reason why digital cash has turned out to be extremely difficult? If your system crashes y There is only one Digital cash makDigital cash trave b
4 Smart card is better protected than other cards using Encryption Firewall Hub All the above a
5 Trust card is introduced by BSNL and itzcash BSNL and oxicashBSNL only None a
6 PaisaPay is offered only by Homeshop18.com eBay.in amazon.com none b
7 The E-payment mechanism widely used in B2B is Credit card Debit card Master card E-cheque d
8 Which type of technology will increase portability and mobility? Implant chips Micro-payments Internet phone cAll of the above d
9 Which of the following an accurate statement about internet phone calls? They are possible but noThey are not poss They are curren None of the above a
10 What are the most commonly used input devices today? Keyboard Mouse All of the above None of the above c
11 Which of the following can be used to help identify people in a crowd? Biochip Implant chip Facial recognitioFacial recognition c
12 Which one is also known as plastic money? Credit card Debit card Paper cash All of the above a
13 Which one is the component of cybercash payment system CC user software CC merachant sof CC Server Softw All of the above d
14 The smart card which use antenna for reading and writing data Contact smart card Contactless smart Proximity smart Both B and C d
15 Which of the smart card uses a sim like structure for reading and writing data Contact smart card Contactless smart Proximity smart Both B and C a
16 Which is not a feature of ecommerce SCM EDI WWW BPR d
17 What is I stands in CIA of smart card? International Integrity Identity None of the above b
18 What is A stands in CIA of smart card? auditing authenticity authorized None of the above b
19 What is C stands in CIA of smart card? confidentiality conference congress congress a
20 Which one is the third party payment providers who offer digital wallets for E- merchants Oxicash PayMate PayPass All the above d
21 Which is used to identify mobile money MCID MMID RSID NONE OF THE AB b
22 Which one is not a encryption technique RSA DES AES NONE OF THE AB d
23 Which one is not used as a security mechanism? Encryption Cryptography Wallets Digital signature c
24 Which e-government arena is being used when governmental agencies send out and accept bids for wG2G G2B G2C G2G b
25 Secret key is used for Public key cryptographyPublic key cryptogAsymmetric key None of these b
26 Which one is a communication channel threat? Sniffer programs Cyber vandalism Integrity threatsAll of the above d
27 Which one is a communication channel security protocol? SSL S-HTTP SET ALL OF THE ABO d
28 The protocol which allows the file transfer between computers is TCP/IP FTP HTTP SOA b
29 E-Banking is also known as ATMs Net banking Traditional bankNone of these b
30 Which one is a client level threat? Malicious code Viruses Active contents All the above d
31 Which one is not an encryption technique? RSA DES AES FTP d
32 Which one is an encryption technique? RSA DES AES All of the above d
33 Which one is not a server level threat? Malicious code CGI threats Database threat Buffer overflows a
34 Which one is not a physical threat? Hacking Storm Phishing None of the above a
35 Which one is a logical threat? Hacking Storm Phishing None of the above a
36 The basic elements of website is Home page Web pages Links and banneAll the above d
37 Which one is a threat for E-commerce Trojan horse firewall encryption None a
38 Secure communication means Protect transmission of cGuarantee privacyUnauthorized acAll the above d
39 Which one is not an offline payment mode? Cash on delivery Cash before deliveDemand drafts e-cheque d
40 Which one is an offline payment mode? Cash on delivery Cash before deliveCredit card Both a and b d
41 Which one is not an online payment mode? Cash on delivery Debit card Credit card e-cheque a
42 Which one is an online payment mode? Cash on delivery Cash before deliveDemand drafts e-cheque d
43 which one is not an E-payment method used in India Debit card Credit card e-cheque none d
44 OTP stands for On Time Password On Time processinOne time proces None a
45 Which one is not a threat for E-commerce Trojan horse Viruses Worm None d
46 Private Key cryptography is also known as ---------------cryptography. Public key Symmetric Asymmetric None
47 Public key cryptography is also known as ---------------cryptography. Private key Symmetric Asymmetric None c
48 What is the legal protection afforded an expression of an idea, such as a song, video game, and some Ethics Intellectual prope Copyright Fair Use Doctrine c
49 Cyber slacking consists of what activities? Visiting appropriate webVisiting news sites Chatting online w
All of the above d
50 What is an arrangement made between e-commerce sites that direct users from one site to the other? Spam Viral marketing Affiliate programNone of the above c
51 Which type deals with auction? B2B B2C C2B C2C d
52 Which one is not a layer of E-commerce infrastructure Physical layer Product layer Service layer None d
53 Which will harm computer resources Worm Worm Trojan horse All the above Ans d
54 The study of encryption is called--------------- Decryption Cryptography Firewall All the above b
55 During E-commerce transaction we should ensure------------- Integrity Security Confidentiality All the above d
56 The virus that are commonly found in word documents are called-------------- Macro Trojan horse Script virus None of the above a
57 The virus that are attached with vb and java files are called Macro Trojan horse Script virus None of the above c
58 The viruses spreads through------------- Mails Pen drives and cd Websites All the above d
59 Which of the following is an Internet-based company that makes it easy for one person to pay anothe electronic check electronic bill pre conversion ratesfinancial cyberme d
60 Which of the following is a method of transferring money from one person's account to another? electronic check credit card e-transfer none of the above a
61 An electronic check is one form of what? e-commerce online banking e-cash check c
62 If you need to transfer money to another person via the internet, which of the following methods cou financial cybermediary electronic check electronic bill prall of the above d
63 Which of the following permits the transmission of a bill, along with payment of that bill, to be condu financial cybermediary electronic check electronic bill prall of the above c
64 What is the name for direct computer-to-computer transfer of transaction information contained in s internet commerce e-commerce transaction inforelectronic data in d
65 Which of the following is used in B2B to pay for purchases? e-commerce financial electronielectronic data eelectronic checks b

UNIT 4 Option A Option B Option C Option D Answer


The dimension of e-commerce that enables commerce across national boundaries is called
interactivity. global reach. richness. ubiquity. B
1 _______.
neither
both richness
E-commerce technologies have improved upon traditional commerce technologies in______. richness. reach. richness nor C
and reach.
2 reach.
3 Which one of the following is not one of the major types of e-commerce? C2B. B2C. B2B. C2C. A
slightly slightly
Compared to B2C e-commerce, B2B e-commerce is ______. of equal size. much larger. D
4 smaller. larger.
5 Which of the following is not considered to be one of the three phases of e-commerce? Innovation. Consolidation. Preservation. Reinvention. C
The idealistic market envisioned at the outset of the development of e-commerce is called a Bergman Bertrand
Bailey market. Baxter market. D
6 ______. market. market.
large retail venture initial public
The primary source of financing during the early years of e-commerce was _______. bank loans. C
7 firms. capital funds. offerings.
............. a business model used by merchants to operate both an online store and a physical
none of the
retail outlet. In other terms, the retailers give their customers both an online and offline brick and click pro and cons yes and no A
above
8 channel to do their shopping.
..............-only companies are those companies who have a website/online presence without a brick and none of the
Click brick A
9 physical store. They sell their products through their website only. click above
Digital government services also called .......................are defined as service delivery none of the
e Government M government e tailing A
10 within government  above
.................is a product designed for the purposes of online banking that enables you to have none of the
e banking M government Click A
11 easy and safe access to your bank account.  above
If you safeguarded your personal ................. and reported the loss immediately, the bank is
loss profit information report C
12 likely to reimburse your account, according to Bankrate.
e-banking has made life much ............ and banking much faster for both customers
difficult easier crucial safe B
13 and banks.
“......................... is training provided via a computer or other digital device, allowing
e Government m government e tailing e learning D
14 technology to facilitate learning anytime, anywhere.”
none of the
It is a very efficient way of delivering courses ........... offline online in school B
15 above
Everyone, who are part time students or are working full time, can take advantage web-based learning. e learning click model all of these
of ................
16 D
.......... requires strong self-motivation and time management skills. e banking e learning none of the
offline
17 above B
The area of actual or potential commercial value in which a company intends to operate is a perfect Bertrand
market space. marketplace. A
18 _______. market. market.
A perfect market is one in which _____. One firm develops an One participant there are no competition is C
19
advantage based on a in the market competitive at a minimum
MSN/Windows
Which of the following is not a horizontal portal? AOL. Yahoo. Sailnet. C
20 Live.
A situation where there are no differences among products or services, and the only basis of commoditizatio
a value web. value chain. profit. D
21 choosing products is price is known as ______. n.
22 A strategy designed to compete in all markets around the globe is called a _____ strategy. scope. differentiation. cost. focus. A
Institutionaliza Commercializat
Which of the following is not one of the stages of the development of the Internet? Innovation. Globalization. C
23 tion. ion.
24 In 1961, __________ published a paper on "packet switching" networks. Leonard Kleinrock. Ray Tomlinson. Bob Metcalfe. Vint Cerf. A
The component of TCP/IP that provides the Internet's addressing scheme and is responsible the Network the Application
TCP. IP. B
25 for the actual delivery of packets is ______. Layer. Layer
2Which protocol permits users to transfer files from the server to their client computer, and
HTTP. SMTP. IMAP. FTP. D
26 vice versa?
__________ is a program that you can run from the DOS prompt in the Windows operating
Ping  Telnet  Tracert  SSL  A
27 system in order to check the connection between your client and the server.
Broadband is generally considered to be any communication technology allowing streaming
100 Kbps. 56.6 Kbps. 30 Kbps. 10 Kbps A
28 audio and video at or above _____.
29 Which of the following connections allows the fastest download speeds? DSL. cable modem. T T3. D
insufficient capacity network
insufficient best-efforts
Which of the following is not a limitation of the current Internet? throughout the architecture C
reach. QOS.
30 backbone. limitations.
Ensuring the
rapid transfer
Enabling of new
Eliminating
Creating a leading-edge very high-speed network capability for the national research revolutionary network
censorship from the community. B
community. Internet services and
Internet.
applications. applications
to the broader
31 Internet
32 Which of the following is a new and disruptive Web feature or service? XML. diffserv. blogs. CDMA. C
33 All of the following are examples of 2G wireless phone technologies except _______. CDMA. W-CDMA. TDMA. GSM. B
34 All of the following are wireless Internet access network technologies except ________. Wi-Fi Bluetooth. Zigbee.  GigaPoP. D
35 Internet users account for about ________ of the world's population. 7% 17% 27% 47% B
Netscape Internet
Which of the following was the first commercial Web browser? Mosaic. Mozilla. C
36 Navigator. Explorer
Implementati
All of the following are steps in the systems development life cycle except ______. Systems Design. Testing. Debugging. D
37 on.
A _________ describes the flow of information at your e-commerce site and the infrastructure physical
system design. logical design. tactical design B
38 that will be used in the system. design.
page
All of the following are factors in optimizing Web site performance except _____. page retrieval. page delivery. page content. A
39 generation.
content
system telecommunica
The largest component of a Web site budget is_____. system maintenance. design and A
development. tions.
40 development.
  Microsoft
The dominant Web server software is ______. Zeus.   Apache.    Google.   B
41 IIS.
What Web server functionality allows it verify usernames and passwords and process Processing of HTTP File Transfer Security
Data capture. D
42 certificates and encryption information? requests. Protocol. services.
The underlying computing equipment that the system uses to achieve its e-commerce content transaction scalability
hardware platform. A
43 functionality is called a ______. platform. platform. platform.
pages that work, load
a site working alternative
quickly, and point the simple,
with the most navigation to
Redundant navigation refers to _________. customer toward fool-proof D
popular the same
your product navigation.
browsers. content.
44 offerings.
Common
The set of standards for communication between a browser and a program running on a Active Server Pages Java Server Gateway
VBScript. C
server that allows for interaction between the user and the server is known as _______. (ASP). Pages (JSP). Interface
45 (CGI).
online credit
online
E-commerce merchant server software includes all of the following except_______. online e-mail. online catalog. card A
shopping cart.
46 processing.
WebTrends IBM
Microsoft Commerce Broadvision
Which of the following is not a widely used midrange or high-end e-commerce suite? Marketing WebSphere A
Server. Commerce.
47 Lab2. Commerce.
personalization
The ability to change the product to better fit the needs of the customer is called ________. customization. privacy. accessibility. A 
48 .
All of the following are tools for optimizing a Web site's location in search engine listings keywords and page identifying
buying ads. benchmarking. D
49 except ______. titles. market niches.
50 The most common type of Internet crime according to the IC3 is ______. Credit card fraud. Check fraud. Non-delivery. Auction fraud. D

UNIT 5 Option A Option B Option C Option D Answer


organizational
In the e-commerce security environment, which of the following constitutes the inner-most technology
people. data. policies and B
layer? solutions.
1 procedures.
File-infecting
All of the following are major categories of computer viruses except _____. Macro viruses. Script viruses. Trojan viruses. D
2 viruses.
from computer to from file to file from Web site from Web site
A worm is designed to spread _________. A
3 computer. on a computer. to Web site. to computer
4 Malicious hackers who act with the intention of causing harm are __________. White hats. Black hats. Grey hats. Brown hats. B
a Denial of
When hackers flood a Web site with useless traffic to overwhelm the network, it is called
phishing. pharming. Service (DoS) spoofing. C
______.
5 attack.
message nonrepudiati
Which of the following is not a dimension of e-commerce security provided by encryption? availability. confidentiality. A
6 integrity. on.
Universal
Data Optimal
Advanced Encryption Encryption
The most widely used encryption standard is ______. Encryption Encryption A
Standard (AES). Standard
Standard (DES). Standard (OES).
7 (UES).
8 The most common form of securing channels is through ______. S-HTTP. VPNs. SSL. PPTP. C
Allows Eliminates
Forbids Filters traffic
communication viruses and
communications based on
Firewalls perform all of the following functions except ______. s from other C
from untrustworthy packet
trustworthy malicious
sources. attributes.
9 sources. attacks.
risk implementati security
A security plan begins with a(n) is ______. security policy. B
10 assessment. on plan. organization.
Accumulating
The only payment system that is instantly convertible without intermediation is _______. Credit card. Stored value. Cash. D
11 balance.
12 The most prevalent online payment method is ______. PayPal. checks. credit cards. debit. C
What is the name of the division of the U.S. Department of Homeland Security that
US-CERT. OECD. IC3. P3P. A
13 coordinates cyber incident warnings and responses across government and private sectors?
reading using a search
After sending e-mail, which of the following activities is most common among Internet sending instant
someone else's engine to find getting news. C
users? messages.
14 blog. information.
none of the
............... entertainment is distinct from social networking websites Cultural social regular A
15 above
............. is effective when it is used to encourage learners to progress through content,
Gamificvation e learning social media m government A
16 motivate action, influence behavior, and drive innovation.
none of the
The gamification of learning is an ................... approach social educational cultural B
17 above
The rise of ........................in marketing has been made possible in part due to the increased
Gamificvation e learning social media m government A
18 use of social media and interactive content by brands.
A(n) _________ represents data as two-dimensional tables with records organized in rows and database data relational
SQL query. D
19 attributes in columns. management system. warehouse. database.
query-driven model-driven rule-based data
All of the following are types of data mining except ______. selective data mining. A
20 data mining. data mining. mining.
brand
Which of the following market entry strategies are the most common for existing firms? first mover fast follower. alliances. C
21 extender.
The process of getting customers to pass along a company's marketing message to friends, viral permission
affiliate marketing. blog marketing. B
22 family, and colleagues is known as _______. marketing. marketing.
varies from
The per-product price consumers are willing to pay for a bundle ____________ as the number
decreases. increases. product to stays the same. B
of goods in the bundle increases.
23 product.
Creating multiple versions of information goods and selling essentially the same product to transactive price
versioning. bundling. A
24 different market segments at different prices is called_______. content. discrimination.
All of the following are examples of intelligent agent technology except ________. automated response automatic order status online web D
25
systems shipping reports bugs
E-business can be defined as_______. the uninhibited flow the use of the digitally commercial C
26
of information and Internet and enabled transactions
The set of applications and technologies that allow users to create, edit, and distribute Internet. social virtual life. Web 2.0. D
27
content online is known as networking
Which of the following represents a limiting factor for the growth of e-commerce? Persistent cultural Inadequate E-commerce The potential A
28
attraction of physical selection of lacks the audience for
The fastest growing form of online advertising is _________. banner ads. pop-up ads rich media/ pop-under ads. C
29
video ads
All of the following are among the most common categories of spam except ______. fraud. commercial finance. health (drugs). A
30
products
All of the following are types of social marketing except ______. affiliate marketing. blog social game A
31
advertising network advertising
Which of the following measures the percentage of people exposed to an online view-through click-through
impression rate. stickiness ratio. C
32 advertisement who actually click on the banner? rate. rate.
Which of the following is a measure of the percentage of purchasers who return to a Web unique
loyalty. reach. recency A
33 site within a year? visitors.
bounce-back cart conversion
All of the following are metrics for e-mail campaigns except ______. open rate. delivery rate. D
34 rate. rate.
As consumers become more accustomed to new online advertising formats, click-through rapidly
remain constant. decrease. increase. B
35 rates tend to _______. increase.
The ethical principle which states that if an action is not right for all situations, then it is not No Free
The Golden Rule. Slippery Slope. Universalism. D
36 right for any situation is known as ______. Lunch.
Which of the following statements about privacy is true? It is a moral right to Only It has only It is most easily A
37 be left alone corporations just recently obtained on
The ability of consumers to review and contest the accuracy and completeness of data
Choice/ Access/
collected about them involves which of the following FTC fair information practice Security. Enforcement. D
Consent. Participation.
38 principles?
Platform for Privacy Center for Digital E-Government
The __________ is the first major effort to adjust the copyright laws to the Internet age. C
39 Preferences (P3P). Democracy and Millennium Act of 2002.
A patent grants the owner an exclusive monopoly on the ideas behind the invention for
10 20 30 40 B
40 ______ years.
The number of business methods patents granted is applied for.___________ compared to the slightly
substantially smaller. close to equal. equal. A
41 number of patents smaller.
42 The redirection of traffic from a legitimate site to an infringing site is called _______. cybersquatting. cyberpiracy. metatagging. keywording. B
During which period of Internet governance was Network Solutions given a monopoly to Government Control Self-Regulatio Governmental
Privatization. B
43 assign and track high-level domains? Period. n. Regulation.
44 The taxation system for e-commerce sales is best described as ______. complex. streamlined. universal. standardized. A
Children's Communicati Children's
All of the following are acts Congress has passed or attempted to pass to protect children Video Privacy
Online ons Decency Internet A
online except ______. Protection Act.
45 Protection Act. Act. Protection Act.
Privacy
Which of the following is a privacy advocacy group that is a foundation- and
Cdt org. International Epic org. Privacy org   A 
business-supported group with a legislative focus?
46 org.
http GET http GET
Send P3P
What is the first step in a P3P-enabled transaction? send Web page. request Web request P3P B
policy files.
47 page. policy files.
48 All of the following are types of intellectual property protection except_______. patents. trademarks. governance. copyrights. C
All of the following are challenges to online retail except ______. Consumer concerns Consumer Delays in Inability to D
49
about the security of concerns about delivery of change prices
Which of the following is an industry strategic factor that relates to whether new entrants power of power of industry value
barriers to entry A
50 face a disadvantage when attempting to enter an industry? suppliers. consumers. chain.
Sinhgad Institute of Management and Computer Application

106 Digital Business

MCQ for practice


OLX is an example of this type of model *
a) Consumer-to-Business
b) Consumer-to-Consumer
c) Business-to-Business
d) Collaborative Commerce

What social media marketing do?


a) It can help to communicate with customers in a less time-consuming manner.
b) It can help to create visual interaction between products and customers.
c) It can help to advertise a product and services to many customers at once.
d) All of the above

Identify the platform for Social media marketing?


a) Instagram
b) Twitter
c) Facebook
d) All of the above

Which term adopted for updates by Twitter users?


a) Tweets
b) Twoots
c) Twinks
d) Posts

Companies that are engaged only in e-commerce are considered as ……….. organizations.
a) click-and-mortar
b) Virtual/ Pure play
c) brick-and-mortar
d) None of these

What is the benefit of Social media marketing?


a) It can show your brand in front of people much more quickly and easily.
b) increased traffic
c) higher conversion rates
d) All of the above

Companies that have a network of physical stores as their primary retail channel, but also have
introduced online offerings are called ______________. *
a) Virtual merchants
b) Bricks and clicks
c) technology solutions
d) Bertrand market

Social networks have an enormous information sharing capacity. As such, they are a great
distribution channel for ____.
a) customer feedback
b) viral content
c) exclusive coupons
d) marketing messages

…………. is a corporate or government internal network that uses Internet tools *


a) Electronic market
b) Web 2.0
c) An extranet
d) An intranet

________ empowers IoT by bringing together everyday objects.


a) Intelligence
b) Connectivity
c) Dynamic Nature
d) Enormous Scale

________ Provide the means to create capability that reflects true awareness of the physical
world and people.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity

Buy-side e-commerce is different from sell-side e-commerce in that it involves: *


a) Any electronically mediated communication between an organization and its stakeholders
b) An organization using electronic media to purchase from to its suppliers
c) The use of electronic communications for all business processes
d) None of the above

Voice recognition software and virtual assistant programs offer for ________ and _________
a) Communication and hardware
b) Communication and Entertainment
c) Entertainment and software
d) Communication and Software

Digital India is a campaign launched by the Government of India in order to ensure the
Government's services are made available to citizens electronically by improved online
infrastructure and by increasing Internet connectivity When was this campaign launched? *
a) 2013
b) 2014
c) 2015
d) 2016

Who forecasted in 2002 that e-commerce would significantly impact the way that business is
done? *
a) Peter Drucker
b) Philip Kotler
c) Steve Jobs
d) Henry Fayol

________ is an organization that uses technology as a competitive advantage in its internal and
external operations.
a) Digital Economy
b) Digital enterprise
c) E-commerce
d) None of the above

Digital business Infrastructure refers to the combination of ________


a) Hardware
b) Software
c) Servers
d) All of the above

Which one of the following is not one of the major types of e-commerce? *
a) C2B
b) B2C
c) B2B
d) C2C

E-commerce activities that are conducted in social networks by using social software are referred
to as ……….. *
a) mobile commerce
b) social commerce
c) collaborative commerce
d) e commerce

Which category finds an increase in applications targeting health and fitness?


a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT

E Commerce 5C Model is *
a) Commerce,Collaboration,corelation,Connection,Computation
b) Community,Collaboration,Communication,Connection,Computation
c) Commerce,Collaboration,Communication,cordination,Computation
d) Commerce,Collaboration,Communication,Connection,Computation

Which category is used in the context of connected cars?


a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT

If Amazon:fashion then Flipkart: *


a) snapdeal
b) Tabitha simmonns
c) Jabong
d) Bewakoof.com.

Digital businesses use _____ to create new______ in business models *


a) technology, value
b) technology,customer
c) future, evolution
d) technology, ventures

Which category could be used by citizens to contribute to a smart city?


a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT

Digital Transformation is the use of________ to solve problems often utilizing cloud computing
a) old, fast and frequently changing digital technology
b) new, fast and frequently changing digital technology
c) innovative, fast and frequently changing digital technology
d) new, fast and stable digital technology

Digital economy is a term that merely refers to a country’s economy that’s based on
________technologies *
a) Online payment
b) Mobile payment
c) digital payment
d) secure

Which category is used for business to consumer process?


a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT
A digital enterprise is an organization that uses _____ as a ___________ in its internal and
external operations. *
a) computers,competitive advantage
b) technology, Long term advantage
c) technology,competitive advantage
d) Mobiles, Biggest advantage

A ___________ is a social network of individuals who interact through specific social media,
potentially crossing geographical and political boundaries in order to pursue mutual interests or
goals
a) Facebook community
b) Linkedin Community
c) social community
d) virtual community

___________allow brands to mobilize their most passionate, loyal customers. *


a) Social communities
b) Support communities
c) Advocate communities
d) Insight communities

Sunsilk Gang of Girls includes all the below mentioned things EXCEPT on the virtual
community
a) styling tips
b) blogs
c) contests
d) competitive information

WIPRO using internal network for its business operations is an example of ____ *
a) Internet
b) Extranet
c) Intranet
d) Local Area Network

Delivery of information, products or services or payment by electronic means ___________ of


Ecommerce
a) A Business Process Perspective
b) A Service Perspective
c) A Communication Perspective
d) A Online perspective

While there are obvious e-business advantages and opportunities, there are also risks and
barriers. These include:
a) Spikes Causing Websites To Fail At Peak Timesption 1
b) Contravention Of Customer Privacy
c) Internet Hackers Penetrating Company Security
d) All Of The Above

Four common communications models described by the Internet Architecture Board include: *
a) Device-to-Mobile, Device-to-Cloud, Device-to-Gateway, and Back-End Data-Sharing
b) Device-to-Device, Device-to-Cloud, Device-to-Gateway, and Back-End Data-Sharing
c) Device-to-Device, Device-to-Cloud, Device-to-server, and Back-End Data-Sharing
d) Device-to-Device, Device-to-Front end , Device-to-Gateway, and Back-End Data-
Sharing

The transformation of key business processes through the use of digital or Internet technologies
is known as ____________

a) E-business
b) E-Commerce
c) Digital Business
d) Both A and C

What is "social media optimization"?


a) Creating content which easily creates publicity via social networks
b) Writing clear content
c) Creating short content which is easily indexed
d) Hiring people to create content for social networks

Leading verticals with demand for IOT solutions are *


a) Banking and Manufacturing
b) Utilities and Manufacturing
c) Utilities and Automobile
d) Serviecs and Manufacturing

Indian IOT market size by 2020 is *


a) USD 90 Billion1
b) USD 2 Billion
c) USD 9 Billion
d) USD 45 Billion

ZigBee operates in a _______________network *


a) Wired
b) Bluetooth
c) Infrared
d) Mesh

_______ is a new digital ecosystem, which can be described through five Cs: creativity,
connectivity, collaboration, convergence, & community.
a) .NET
b) Web 2.0
c) IoT
d) Webex

A _________ community is one where the interaction takes place over a computer network,
mainly the Internet.
a) Online
b) Virtual
c) Internet
d) All of the above

All of following are the big users of ZigBee in the smart home EXCEPT
a) Honeywell
b) Comcast
c) Huawei
d) Flipkart

The global wearable computing is expected to reach approximately USD ______ by 2023
a) 25 Billion
b) 15 Billion
c) 35 Billion
d) 45 Billion

Based on technology, the wearable computing market is sub-segmented into _________ and
networking technologies and other technologies *
a) visibility
b) display
c) Weight
d) smartness

Based on Merriam-Webster, the definition of ‘____' is a small mechanical or electronic device


with a practical use but often thought of as novelty
a) Mobile
b) Computer
c) laptop
d) Gadget

Echo Dot is a ________ smart speaker that works with Alexa


a) sound- controlled
b) voice-controlled
c) eye-controlled
d) temperature-controlled

Customers pay a fixed amount, usually monthly, to get some type of service. This is an examples
of ________ Digital Business Model
a) Affiliate Fees
b) Transaction Fees
c) Subscription Fees
d) Licensing Fees

Digital business is __________ in its scope than e-commerce.


a) Broader
b) Narrower
c) Restricted
d) Border

_________ was the leader in the streaming stick category with its Fire TV stick *
a) Snapdeal
b) Flipkart
c) Amazon
d) Xiomi

A smart city is a framework, predominantly composed of ____________, to develop, deploy,


and promote sustainable development practices to address growing urbanization challenges *
a) Information Technology
b) cloud computing Technology
c) Information and Communication Technologies
d) Internet Technology

In online or digital ERP, ERP stands for________


a) Enterprise Resource Planning
b) Enterprise Relationship Planning
c) Enterprise Resource Process
d) Electronic Resource Planning

In eCRM system, CRM stands for_______


a) Customer Resource Management
b) Customer Retention Management
c) Customer Relationship Management
d) Customer Relationship Mapping

In 4G “G” stands for *


a) Gap
b) Global
c) Generation
d) Gmail

Municipal governments are leveraging cellular and___________to connect and improve


infrastructure *
a) Metreopolitan Area Network (MAN) technologies
b) Local Area Network (LAN) technologies
c) Wide Area network (WAN) technologies
d) Low Power Wide Area (LPWAN) wireless technologies

By application, the global smart home market has been segmented into all of the following
EXCEPT *
a) lighting control
b) security & access control,
c) HVAC control
d) crowd control

E-business actually stands for: *

a) Any Electronically Mediated Communication Between An Organisation And Its


Stakeholders
b) An Organisation Using Electronic Media To Purchase From To Its Suppliers
c) An Organisation Using Electronic Media To Sell Direct To Its Customers
d) Electronic Business

Which of the following is a cost efficiency driver for e-business? *


a) Increasing speed with which goods can be despatched
b) Reduced sales and marketing costs
c) Increasing speed with which supplies can be obtained
d) All of the above are correct

Digital transformation is the use of ___ by utilizing ___


a) Cloud Computing ,Digital Technology
b) Digital Computing ,Cloud Technology
c) Digital Technology ,Cloud Computing
d) Digital System, Cloud System

The website offers bidding facility to people who want to buy tickets immediately ,identify the
type of e-commerce model *
a) B2B
b) B2C
c) C2B
d) B2G

The digital revolution is the shift from ___ & ___ to digital electronics *
a) Electrical And Analog
b) Mechanical And Analog
c) Electronics And Analog
d) Component And Analog

.___ refers to the application of marketing principles and techniques via electronic media and
internet *
a) E-marketing
b) Indirect marketing
c) Viral marketing
d) None of the above

A collection of web services which facilitate certain behaviours online such as community
participation and user generated content, rating and tagging is commonly known as: *
a) Facebook
b) Customer Journey
c) Web 2.0 Concept
d) World Wide Web

Which one is not the e-commerce platform ? *


a) Customer Experience Platform
b) Digital Platform
c) Iot Platform
d) Ecosystem Platform

The Amazon site belongs in which category of website? *


a) Relationship-building Website
b) Media Or Publisher Site
c) Transactional Website
d) Brand-building Website

When Wal-Mart uses the internet to purchase inventory items from a vendor company, it is using
the _______ e-commerce model
a) C2C
b) B2B
c) B2G
d) B2C

PDA stands for............. *


a) Personal Database
b) Personal Digital Assistant
c) personal Download Assistant
d) Personal Donate Assistant

Mobile commerce provide ...............feature. *


a) convenience
b) inconvenience
c) publishing
d) programming

.... shows the mobile commerce application. *


a) Mobile marketing and advertisement
b) Ticket through mobiles
c) Mobile auction
d) All of these

A wireless technology that allows manufacturers to attach tags with antennas and computer chips
to goods and then track their movement through radio signals *
a) Near-Field Communication (NFC)
b) Wireless Sensor Networks (WSN)
c) Wireless Fidelity (WiFi)
d) Radio-Frequency Identification (RFID) Technology

A portal that aggregate and provides content and services for mobile users *
a) Mobile Portal
b) Mobile Wallet
c) Voice Portal
d) Mobile Computing

Adoption of digital business by established SMEs is generally ___________


a) Less than that in larger businesses
b) More than that in larger businesses.
c) Equal to larger businesses.
d) None

_________describes the manner in which business is done to generate revenue and create value.
a) Digital Business
b) Business Model
c) Ecommerce
d) CRM

Companies charge others for allowing them to place a banner on their sites. This Digital
Business Model is known as ______
a) Transaction Fees
b) Licensing Fees
c) Affiliate Fees
d) Advertising Fees

IoT stands for


a) Information Of Things
b) Input Output Things
c) Internet of Technology
d) Internet of Things

When members of virtual community interacts with each other over an internet, then it is called
___________.
a) Web Community
b) Online Commeunity
c) Internet Community
d) All of the above

Online Community is also called______


a) Internet community
b) Web community
c) Social Community
d) Both A & B

You might also like