Professional Documents
Culture Documents
Digital Business
Digital Business
4. Digital business is similar to the term __________ which was first coined by IBM
corporation.
A. E-business
B. E-Commerce
C. Internet Business
D. Both A and B
ANS: A. E-business
9. Customers pay a fixed amount, usually monthly, to get some type of service. This is an
examples of ________ Digital Business Model
A. Affiliate Fees
B. Transaction Fees
C. Subscription Fees
D. Licensing Fees
ANS: C. Subscription Fees
11. _________describes the manner in which business is done to generate revenue and
create value.
A. Digital Business
B. Business Model
C. Ecommerce
D. CRM
ANS: B. Business Model
12.Companies charge others for allowing them to place a banner on their sites. This
Digital Business Model is known as ______
A. Transaction Fees
B. Licensing Fees
C. Affiliate Fees
D. Advertising Fees
ANS: D. Advertising Fees
13. This business model involves trade between business organisations and customers.
A. B2B
B. B2C
C. P2P
D. C2C
ANS: B. B2C
17. _______digital business model involves trade and transaction dealings between
business establishments.
A. B2C
B. C2B
C. B2B
D. P2P
ANS: C. B2B
18. When members of virtual community interacts with each other over an internet, then
it is called ___________.
A. Web Community
B. Online Commeunity
C. Internet Community
D. All of the above
ANS: D. All of the above
19. ________is the new business model aim to gain competitive advantage by using
Information Technology.
A. Digital Economy
B. Digital Enterprise
C. Internet of Things
D. E-commerce
ANS: B. Digital Enterprise
22. The transformation of key business processes through the use of digital or Internet
technologies is known as ____________
A. E-business
B. E-Commerce
C. Digital Business
D. Both A and C
ANS: D.Both A and C
23. A _________ community is one where the interaction takes place over a computer
network, mainly the Internet.
A. Online
B. Virtual
C. Internet
D. All of the above
ANS: D. All of the above
24. _______ is a new digital ecosystem, which can be described through five Cs: creativity,
connectivity, collaboration, convergence, & community.
A. .NET
B. Web 2.0
C. IoT
D. Webex
ANS: B. Web 2.0
25. _________ has specific objectives to increase profits when increasing its benefits to
society.
A. Digital Business
B. Social Network
C. Social Enterprise
D. Virtual Community
ANS: C. Social Enterprise
11. Which products are people most likely to be comfortable buying on theInternet?
A. Books
B. PCs
C. CDs
D. All of the above
12. Digital products are best suited for B2C e-commerce because they:
A. Are commodity like products
B. Can be mass-customised and personalised
C. Can be delivered at the time of purchase
D. All of the above
14. All of the following are techniques B2C e-commerce companies use toattract
customers, except
A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
15. E-commerce involves
A. marketing
B. advertising
C. warehousing
D. all of the above
17. Which term represents a count of the number of people who visit onesite, click on an
ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through
C. Spam
D. All of the above
18. What is the percentage of customers who visit a Web site and actuallybuy something
called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
19. What are materials used in production in a manufacturing company orare placed on
the shelf for sale in a retail environment?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
20. What are materials that are necessary for running a modern corporation,but do not relate
to the company’s primary business activities?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
22. What is another name for materials which cannot be linked to a specificproduct or
process?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
23. What is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids until there is
only one seller left?
A. B2B marketplace
B. Intranet
C. Reverse auction
D. Internet
24. What are plastic cards the size of a credit card that contains anembedded chip on which
digital information can be stored?
A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards
26. Which form of e-commerce currently accounts for about 97% of all e-commerce
revenues?
A. B2B
B. B2C
C. C2B
D. C2C
27. Which of the following are advantages normally associated with B2B e-commerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
28. If the threat of substitute products or services is low it is a(n):
A. Disadvantage to the supplier
B. Advantage to the buyer
C. Advantage to the supplier
D. None of the above
30. If it is easy for competitors to enter the market, the threat of new entrantsis considered:
A. High
B. Low
C. More
D. Less
31. An industry is less attractive for suppliers when the rivalry among existingcompetitors is:
A. High
B. Low
C. More
D. Less
36. A product or service that customers have come to expect from an industry, which must
be offered by new entrants if they wish to compete andsurvive, is known as a(n)?
A. Switching costs
B. Loyalty programs
C. Entry barriers
D. Affiliate programs
37. Which of the following statements accurately reflect the impact oftechnology?
A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
C. Technology has increased the threat of substitute products and services
D. all of the above
38. A business cannot be all things to all people. Instead, a business must:
A. Identify target customers
B. Identify the value of products/services as perceived by customers
C. all of the above
D. None of the above
41. A business competing in a commodity like environment must focus onwhich of the
following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
42. Which of the following refers to creating products tailored to individualcustomers?
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
43. Materials used in the normal operation of a business but not related toprimary
business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
45. What is the name given to an interactive business providing a centralised market where
many buyers and suppliers can come together for e- commerce or commerce-related
activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
46. Which form of e-marketplace brings together buyers and sellers frommultiple
industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
47. Which form of e-marketplace brings together buyers and sellers from thesame industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
52. Which of the following is an Internet-based company that makes it easyfor one person to
pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
55. If you need to transfer money to another person via the internet, which ofthe following
methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
56. Which of the following permits the transmission of a bill, along withpayment of that
bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
62. When a transaction is processed online, how can the merchant verify thecustomers
identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
63. The practice of forging a return address on an e-mail so that the recipientis fooled into
revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
64. What is a model of a proposed product, service, or system?
A. Prototyping
B. Prototype
C. Proof-of-concept prototype
D. Selling prototype
65. What is an internal organisational Internet that is guarded against outside access by a
special security feature called a firewall (which can be software, hardware, or a combination of
the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
67. What is a detailed process for recovering information or an IT system inthe event of a
catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
68. What is a separate facility that does not have any computer equipmentbut is a place
where the knowledge workers can move after the disaster?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
69. What is a separate and fully equipped facility where the company canmove
immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
70. What charts (1) the cost to your organisation of the unavailability of information and
technology and (2) the cost to your organisation of recovering from a disaster over time?
71. Which factor determines when the IT system will be available forknowledge workers to
access?
A. Availability
B. Accessibility
C. Reliability
D. None of the above
72. Which factor determines who has the right to access different types of ITsystems and
information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
73. Which factor ensures the IT systems are functioning correctly andproviding accurate
information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
74. Which factor represents how well your system can adapt to increaseddemands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
77. What determines the future IT infrastructure requirements for newequipment and
additional network capacity?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
79. What defines all of the steps or business rules, from beginning to end,required for a
process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
85. Which concept suggests that different applications and computersystems should be
able to communicate with one another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
86. Which service encompasses all technologies used to transmit andprocess information
on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
87. Which process can prevent data from losing due to computer problemsor human
errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
88. Which process is used to reinstall data from a copy when the originaldata has been
lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
89. What describes a process of continuously measuring results and comparing those
results to optimal performance so that actual performancemay be improved?
A. Performance
B. Capacity planning
C. Benchmarking
D. Data cleansing
90. Who protects system from external threats?
A. firewall
B. EDI
C. ERP
D. Script kiddies
91. Who breaks into other peoples computer systems and steals anddestroys
information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
92. What is software that comes hidden in free downloadable software and tracks your
online movements, mines the information stored on your computer, or uses your computers
CPU and storage for some task you know nothing about?
A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above
96. What is a type of virus that spreads itself, not just from file to file, butfrom computer to
computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
97. What floods a Web site with so many requests for service that it slowsdown or
crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
98. What harnesses far-flung computers together by way of the Internet or a virtual private
network to share CPU power, databases, and database storage?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
99. What consists of the identification of risks or threats, the implementation of security
measures, and the monitoring of those measures for effectiveness?
A. Risk management
B. Risk assessment
C. Security
D. None of the above
100. What is the process of evaluating IT assets, their importance to the organisation, and
their susceptibility to threats, to measure the risk exposureof these assets?
A. Risk management
B. Risk assessment
C. Security
D. None of the above
***
Answer Key
1. B
2. A
3. D
4. B
5. D
6. D
7. D
8. A
9. B
10. B
11. D
12. D
13. B
14. D
15. D
16. C
17. B
18. D
19. A
20. B
21. B
22. B
23. C
24. D
25. B
26. A
27. D
28. C
29. C
30. A
31. A
32. B
33. A
34. D
35. C
36. C
37. D
38. C
39. A
40. A
41. A
42. A
43. C
44. C
45. D
46. A
47. B
48. C
49. B
50. A
51. D
52. D
53. A
54. C
55. D
56. C
57. A
58. D
59. B
60. D
61. D
62. B
63. D
64. B
65. B
66. C
67. A
68. C
69. B
70. D
71. A
72. B
73. C
74. D
75. A
76. D
77. C
78. C
79. A
80. D
81. A
82. D
83. D
84. C
85. D
86. D
87. A
88. B
89. C
90. A
91. A
92. D
93. C
94. D
95. D
96. B
97. C
98. D
99. A
100.A
MCQ - 106 Digital Businesses
World Wide Web (WWW) was introduced in the year ……………………
(a) 1994
(b) 1996
(c) 1992
(d) 1990
(a) SCM
(b) EDI
(c) Both of these
(d) None of these
(a) Commerce
(b) E-Commerce
(c) E-Business
(d) None of these
(a) EDI
(b) Protocols
(c) TCP/IP
(d) None of these
(a) Books
(b) Vegetables
(c) All of these
(d) None of these
6) ……………allows a business application on the computer of one organization
to communicate directly with the business application on the computer of
another company.
(a) EDI
(b) Protocols
(c) Standards
(d) Business applications
(a) E-commerce
(b) E-Business
(c) EDI
(d) None of these
(a) E-commerce
(b) EDI
(c) Networking
(d) SCM
(a) Suppliers
(b) Manufacturers
(c) Distributors
(d) Customers
(a) E-commerce
(b) SCM
(c) EDI
(d) None of these
_____ is the father of Modern Marketing.
Peter Drucker
Philip Kotler
Lester Wunderman
Abraham Maslow
B. Purpose
C. Place
D. Price
13) Many people want BMW, only a few are able to buy” this is an example of
_______
Need
Want
Demand
Status
Need
Want
Customer
Profit-making.
Selling products
______ are the form of human needs take as shaped by culture & individual
personality.
Wants
Demands
Needs
Social Needs
20) Marketing is the activity, set of ___________ & processes for creating,
communicating, delivering & exchanging offerings that have value for customers,
clients, partners & society.
Institutions
Organizations
Companies
Enterprises
Which of the following is not true about National Electronic Funds Transfer (NEFT)
system?
A) There is no limit on transaction through NEFT
B) NEFT operates in hourly batches.
C) NEFT is a payment system which facilitates one-to-one funds transfer.
D) Only bank branches which are NEFT enabled, can be a part of the NEFT funds
transfer network.
E) All of the above are correct
Which of the following is not true about Real Time Gross Settlement (RTGS)
system?
A) The minimum amount that can be received through RTGS is ` 2 lakh.
B) The banks receive the funds in real time as soon as funds are transferred by the
remitting bank.
C) The minimum amount to be remitted through RTGS is ` 2 lakh.
D) RTGS is a payment system which facilitates settlement of funds transfers
individually on an order by order basis.
Which of the following is not true about Real Time Gross Settlement (RTGS)
system?
A) The minimum amount that can be received through RTGS is ` 2 lakh.
B) The banks receive the funds in real time as soon as funds are transferred by the
remitting bank.
C) The minimum amount to be remitted through RTGS is ` 2 lakh.
D) RTGS is a payment system which facilitates settlement of funds transfers
individually on an order by order basis.
E) All of the above are correct.
Which of the following is not true about Unified Payments Interface (UPI)?
A) UPI is an instant payment system developed by the National Payments
Corporation of India (NPCI).
B) Through UPI, all payments are instant and takes place in banking hours.
C) Under UPI person will have a single identity and password for using multiple
bank accounts.
D) UPI is based on the Immediate Payment Services (IMPS) infrastructure.
E) All of the above are correct.
Which of the following is not true about Mobile Money Identifier (MMID)?
A) Mobile Money Identifier (MMID) is a seven-digit number, issued by banks for
effecting financial transactions through the user’s mobile phone.
B) The user’s mobile number MMID are uniquely linked with his bank account
number, and is one of the key inputs to facilitate fund transfer.
C) Both the remitter and the beneficiary are required to have their MMIDs to effect
a fund transfer through the mobile phone.
D) A unique MMID and mobile number combination helps in identifying the
beneficiary’s details. A single MMID can be linked to a mobile number.
E) To receive an MMID, the user is required to approach his bank and follow the
necessary procedure for obtaining the number.
Which of the following is not true about Immediate Payment Service (IMPS)?
A) IMPS offer an instant, 24X7, interbank electronic fund transfer service through
mobile phones.
B) The facility is provided by National Payments Corporation of India through its
existing NFS switch.
C) Internet Banking Account facilitates IMPS to transfer money to any account.
D) To use IMPS, both the account holder and beneficiary needs to have
Mobile Money Identifier (MMID).
E) IMPS allows instant money transfer.
Which of the following is not true about National Automated Clearing House
(NACH)?
A) It is a centralised clearing system launched by the National Payments
Corporation of India (NPCI).
B) It aims to replace and consolidate multiple existing Electronic Clearing Service
(ECS) systems across India
C) NACH platform has been created to replace the Electronic Clearing Service (ECS)
system
D) NACH have the same day presentation and settlement, including returns
processing.
E) All of the above are true.
Which of the following is not true about Bharat Interface for Money (BHIM) app?
A) BHIM is a digital payments solution app, for easy and quick transactions, based
on the Unified Payments Interface (UPI) from the National Payments Corporation of
India (NPCI).
B) Money can also be sent to non-UPI supported banks using IFSC code and
account number.
C) BHIM allows daily transaction limit of Rs 20,000.
D) Through BHIM app, a maximum of Rs 5,000 is allowed per transaction.
E) BHIM framework allows its usage without internet also.
31) What is the full form of MMID –
UPI is an initiative of –
A. RBI
B. SEBI
C. IRDA
D. NPCI
A. Pink PIN
B. Green PIN
C. Red PIN
D. Blue PIN
Baroda Travel Easy card valid for a period of __ yr from date of issue
A. 10
B. 9
C. 5
D. 1
A. interactivity
B. global reach
C. richness
D. ubiquity
B. Doing business
C. Sale of goods
3.
A. C2B
B. B2C
C. B2B
D. C2C
42)
Which of the following is part of the four main types for
e‐commerce?
A. B2B
B. B2C
C. C2B
43)
Which of the following is not considered to be one of the
three phases of e-commerce?
A. Innovation
B. Consolidation
C. Preservation
D. Reinvention
1.
D. The potential audience for e-commerce is too low to support it as a widespread method of
commerce
2.
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
3.
A. banner ads
B. pop-up ads
D. pop-under ads
4.
A. Workflow
B. ASP
C. Workflow system
D. EIP
5.
A. fraud
B. commercial products
C. finance
D. health (drugs)
49) .
A. Workflow
B. EIP
C. Workflow system
D. SLA
50)
A. affiliate marketing
B. blog advertising
D. game advertising
Digital Business
1.
The dimension of e-commerce that enables commerce across
national boundaries is called _______.
A. interactivity
B. global reach
C. richness
D. ubiquity
B. Doing business
C. Sale of goods
3.
Which one of the following is not one of the major types of e-
commerce?
A. C2B
B. B2C
C. B2B
D. C2C
4.
Which of the following is part of the four main types for
e‐commerce?
A. B2B
B. B2C
C. C2B
5.
Which of the following is not considered to be one of the
three phases of e-commerce?
A. Innovation
B. Consolidation
C. Preservation
D. Reinvention
6.
Which segment do eBay, Amazon.com belong?
A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
7.
The idealistic market envisioned at the outset of the
development of e-commerce is called a ______.
A. Bailey market
B. Baxter market
C. Bergman market
D. Bertrand market
8.
Which type of e‐commerce focuses on consumers dealing
with each other?
A. B2B
B. B2C
C. C2B
D. C2C
9.
The primary source of financing during the early years of e-
commerce was _______.
A. bank loans
B. C2B
C. C2C
11.
All of the following are technologies used to gather
information about you online except ______.
A. spy ware
B. cookies
C. Gmail
D. anonymizers
12.
In which website Global Easy Buy is facilitated?
A. Ebay.com
B. Amazon.com
C. Yepme.com
D. None of these
13.
A _________ is the set of planned activities designed to
result in a profit in a marketplace.
A. business model
B. profit model
C. business plan
D. revenue model
13.
A _________ is the set of planned activities designed to
result in a profit in a marketplace.
A. business model
B. profit model
C. business plan
D. revenue model
14.
The best products to sell in B2C e‐commerce are:
A. Small products
B. Digital products
C. Specialty products
D. Fresh products
15.
Which of the following is not a key element of a business
model?
A. value proposition
B. competitive advantage
C. market strategy
D. universal standards
16.
Which products are people most likely to be more
uncomfortable buying on the Internet?
A. Books
B. Furniture
C. Movies
17.
The source of revenue in a subscription revenue model is
__________.
A. Fees from advertisers in exchange for advertisements
B. PCs
C. CDs
19.
Which of the following is an example of a portal?
A. Amazon
B. eBay
C. Yahoo
D. Face book
20.
Digital products are best suited for B2C e‐commerce because
they:
A. Are commodity like products
Considering non-personal communication channels, magazines, direct mail and newspapers are
considered as
A.online media
B.print media
C.broadcast media
D.display media
26) the example of business-to-business services offered by Google which gains advertising revenue.
A.Google AdWords pay per click sponsored
B.Google Apps Application Suite
C.YouTube Brand Channel
D.Google Search application providing online website
27)
What sends work assignments through an e‐mail system?
A. Database‐based enterprise information portal
9.
Which of the following measures the percentage of people
exposed to an online advertisement who actually click on the
banner?
A. impression rate
B. view-through rate
C. click-through rate
D. stickiness ratio
10.
Which will not a computer resources?
A. firewall
B. Virus
C. Trojan horse
B. reach
C. recency
D. unique visitors
12.
Which is not a function of ERP?
A. Warehousing
B. sales
C. scheduling
13.
All of the following are metrics for e-mail campaigns except
_________.
A. open rate
B. delivery rate
C. bounce-back rate
B. sales
C. scheduling
B. decrease
C. increase
D. rapidly increase
16.
Which of the following is the primary characteristic of an
intranet?
A. People outside the organization can access it
Answer: Option C
Solution:
People outside the organization can't access it is the primary characteristic of an intranet.
17.
The ethical principle which states that if an action is not right
for all situations, then it is not right for any situation is known
as __________.
A. The Golden Rule
B. Slippery Slope
C. No Free Lunch
D. Universalism
Answer: Option D
Solution:
The ethical principle which states that if an action is not right for all situations, then it is not right
for any situation is known as Universalism. Universalism is defined as an action that should be
same in all the situations.
18.
Which concept suggests that different applications and
computer systems should be able to communicate with one
another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer: Option D
Solution:
Interoperability concept suggests that different applications and computer systems should be able
to communicate with one another. Interoperability is the ability of different information systems,
devices or applications to connect, in a coordinated manner, within and across organizational
boundaries to access, exchange and cooperatively use data amongst stakeholders, with the goal
of optimizing the health of individuals and populations.
19.
Which of the following statements about privacy is true?
A. It is a moral right to be left alone
Answer: Option A
Solution:
Privacy is a moral right to be left alone. Privacy is the ability of an individual or group to seclude
themselves, or information about themselves, and thereby express themselves selectively. The
boundaries and content of what is considered private differ among cultures and individuals.
39 )
Which service encompasses all technologies used to
transmit and process information on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer: Option D
Solution:
Web services encompasses all technologies used to transmit and process information on an
across a network. Web services is a standardized way or medium to propagate communication
between the client and server applications on the World Wide Web.
21.
The ability of consumers to review and contest the accuracy
and completeness of data collected about them involves
which of the following FTC fair information practice
principles?
A. Security
B. Enforcement
C. Choice/Consent
D. Access/Participation
Answer: Option D
Solution:
The ability of consumers to review and contest the accuracy and completeness of data collected
about them involves Access/Participation FTC fair information practice principles.
22.
Which process can preventata from lose due to computer
problems or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer: Option A
Solution:
Backup process can prevent from lose due to computer problems or human errors. Backup, or
data backup, or the process of backing up, refers to the copying into an archive file of computer
data that is already in secondary storage—so that it may be used to restore the original after a
data loss event.
23.
The __________ is the first major effort to adjust the
copyright laws to the Internet age.
A. Platform for Privacy Preferences (P3P)
Answer: Option C
Solution:
The Digital Millennium Copyright Act (DMCA) is the first major effort to adjust the copyright
laws to the Internet age. The Digital Millennium Copyright Act is a 1998 United States copyright
law that implements two 1996 treaties of the World Intellectual Property Organization. It
criminalizes production and dissemination of technology, devices, or services intended to
circumvent measures that control access to copyrighted works.
24.
Which process is used to reinstall data from a copy when the
original data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer: Option B
Solution:
Recovery process is used to reinstall data from a copy when the original data has been lost. Data
restore is the process of copying backup data from secondary storage and restoring it to its
original location or a new location.
25.
A patent grants the owner an exclusive monopoly on the
ideas behind the invention for ______ years.
A. 10
B. 20
C. 30
D. 40
26.
What describes a process of continuously measuring results
and comparing those results to optimal performance so that
actual performance may be improved?
A. Performance
B. Capacity planning
C. Benchmarking
D. Data cleansing
Answer: Option C
Solution:
Benchmarking describes a process of continuously measuring results and comparing those
results to optimal performance so that actual performance may be improved.
27.
The number of business methods patents granted is
___________ compared to the number of patents applied for.
A. substantially smaller
B. slightly smaller
C. close to equal
D. equal
Answer: Option A
Solution:
The number of business methods patents granted is substantially smaller compared to the number
of patents applied for.
28.
Who protects system from external threats?
A. firewall
B. EDI
C. ERP
D. Script kiddies
Answer: Option A
Solution:
Firewall protects system from external threats. A firewall typically establishes a barrier between
a trusted internal network and untrusted external network, such as the Internet.
29.
The redirection of traffic from a legitimate site to an infringing
site is called _______.
A. cyber squatting
B. cyber piracy
C. meta tagging
D. key wording
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option B
Solution:
The redirection of traffic from a legitimate site to an infringing site is called cyber piracy. Piracy
is the unauthorized distribution, theft, reproduction, copying, performance, storage, sale or other
use of intellectual property (IP) protected under copyright law. It is a form of copyright
infringement.
30.
Who breaks into other people's computer systems and steals
and destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer: Option A
Solution:
Hackers breaks into other people's computer systems and steals and destroys information.
Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks.
31.
During which period of Internet governance was Network
Solutions given a monopoly to assign and track high-level
domains?
A. Government Control Period
B. Privatization
C. Self-Regulation
D. Governmental Regulation
Answer: Option B
Solution:
During Privatization period of Internet governance was Network Solutions given a monopoly to
assign and track high-level domains.
50)
What is software that comes hidden in free downloadable
software and tracks your online movements, mines the
information stored on your computer, or uses your
computer's CPU and storage for some task you know nothing
about?
A. Web log
B. Clickstream
Answer: Option D
Solution:
Spyware is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computer's CPU and
storage for some task you know nothing about.
DIGITAL
BUSINESS
MCQs
Hyperlinks
Chapter 1: E-Commerce
Chapter 2: Mobile Commerce, Social Commerce and IoT
Chapter 3: Digital Business Ecosystem
Chapter 4: Digital Business Applications - I
Chapter 5: Digital Business Applications - II
37. Marketspace is
a. a marketplace in which sellers and buyers exchange goods and services for
money (or for other goods and services) but do so electronically
b. a marketplace in which sellers and buyers exchange goods and services for money
(or for other goods and services) but do so physically
c. none of the above
d. all of the above
1.Mobile Commerce is any transaction, involving the transfer of ______________ to use goods and
services, which is initiated and/or completed by using mobile access to computer-mediated networks
with the help of an electronic device.
A. ownership or rights
B. business
C. partnership
D. none of the above
4. Social media marketing is one of the best advertising resources to grab consumer's attention.
A. True
B. False
9. E-Commerce refers to the trading of goods and services with the help of the internet.
A. Yes
B. No
10. Is Social commerce related with the social network’s platform as well as the seller's website?
A. Yes
B. No
17. Social networks have an enormous information sharing capacity. As such, they are a great
distribution channel for __.
A. customer feedback
B. viral content
C. exclusive coupons
D. marketing messages
18. Which one is the best choice for purchasing through social media marketing or traditional
marketing?
A. It depends upon the customer's point of view due to the lack of time and money or their
satisfaction.
B. Social media marketing
C. Traditional Marketing
D. None of the above
19. _________ includes sales, market research, customer service, and advertising, all supported by
mobile computing
A. Mobile Marketing
B. Ecommerce Marketing
C. Social media marketing
D. Search Engine Optimization
20.What is Social Media Marketing?
A. A way to communicate with customers on social media platforms to increase the
performance of the business
B. Software
C. Hardware
D. All of the above
21.__________ has become the most important part of the marketing strategy. It is an instant and
direct channel that company can communicate with its audience anytime and everywhere
A. Mobile Marketing
B. . Social media marketing
22._________can also be deployed to the mobile platforms. This is called viral mobile marketing. A
typical approach is to develop and distribute apps for mobile devices
A. Viral marketing
B. Location based marketing
23.IBM has been recognized by the research company______ as the market share leader in social
software platform providers
A. IDC
B. IFC
24.The concept of social business is frequently equated to and sometimes confused with the term
_________
A. Social Enterprise
B. Business Enterprise
C. Private Enterprise
D. Public Enterprise
25. Social media uses _____and its tools and technologies, the _____concept includes the philosophy
of connected people, the interactions among them, the social support provided, the digital content that
is created by users, and so forth.
A. Web2.0 and Social Media
B. Social Commerce and Enterprise 2.0
C. Web 2.0 & Enterprise 2.0
D. SMM & SEO
26. A _________is a social entity composed of nodes (which are generally individuals, groups, or
organizations) that are connected by links such as hobbies, friendship or profession.
A. SOCIAL NETWORK
B. SOCIAL ENTERPRISE
27.The creation of user generated content in the enterprise, which is accessible to all (e.g.,
slideshare.net, youtube.com) is known as
A. Social publishing
B. Private Publishing
C. Broadcasting
D. Web Display
28: Collaborative work and problem-solving using wikis, blogs, instant messaging, collaborative
office documents, and other special purpose Web-based collaboration platforms such as Labor nova
(laboranova.com).
A. Societal Collaboration
B. Social collaboration
C. Stake Holders Collaboration
D. All of the above
29.Gathering ideas, insights, and feedback from crowds (e.g., employees, customers, and business
partners).
A. Crowdsourcing
B. Crowd Pulling
C. Crowded Area
D. Cloud Networking
6) ........ is a technology where the interaction between technology and its user is
designing to occurs in the users Periphery rather than constantly at the center of
attention.
a) calm technology
b) IOT
c) Arduino
d) ambient computer
7) choose correct principle of IOT
a) focus on the value
b) focus on the machine
c) build a strong machine
d) neither one
11) ...... involves delivering different types of services over the Internet.
a) physical computing
b) chemical computing
c) mechanism
d) cloud computing
12) ......... is a structured data which is stored in MB, GB, TB and always locally present.
a) big data
b) small data
c) physical computing
d) cloud computing
13) ...... means large set of structured, unstructured and semi structured data.
a) big data
b) small data
c) physical computing
d) cloud computing
16) ........ is uses certain protocols to aid sensors in connecting with real time machine to machine
network.
a) real time analytics
b) data collection
c) device integration
d) real time collection
17) .........software supporting integration binds all system devices to create body of IOT a system.
a) real time analytics
b) data collection
c) device integration
d) real time collection
18) The application data or input from various devices and convert it into viable actions are clear
patterns human analysis is called ......
a) real time analytics
b) data collection
c) device integration
d) real time collection
20) A ......... is an established set of rules that determines how data is transmitted between different
device in the same network.
a) network connection
b) TCP IP protocol
c) network protocol
d) TCP protocol
25) The process of building iot hardware and devices enhanced with smart sensors and embedded
system using many of the shelf components like sensors, circuits and microcontrollers are called .......
a) prototyping
b) casting
c) protocasting
d) protocol typing
29) ........ is an open source electronic platform base on easy to use hardware and?
software.
a) servo motor
b) Arduino
c) CPU
d) GPU
33) The ......... approach attempts to minimize the number of instructions per
program but at the cost of increase in number of cycles per instruction.
a) RISC
b) DISC
c) CISC
d) MISC
34) The ......... is a way to connecting electronic components to each other without having solder, them
together.
a) servo motor
b) Arduino
c) Breadboard
d) GPU
36) ......... is a capable little device that enables people of all ages to explore computing and to learn
how to program in languages like Scratch and Python.
a) raspberry pi
b) python programming
c) Linux
d) web programming
37) where to Find MAC-address .........
a) settings > Wi-Fi networks > wireless control
b) settings > wireless control > Wi-Fi settings
c) Wi-Fi networks > wireless control > settings
d) settings > wireless control
5. ____ is an electronic space where sellers and buyers meet and conduct different types of
transactions.
1. E-marketplace
2. Virtual market
3. Marketspace
4. All of the above
6. Which of the following permits the transmission of a bill, along with payment of that bill,
to be conducted over the Internet?
1. financial cybermediary
2. electronic check
3. Electronic bill presentment and payment.
4. all of the above
10. When a transaction is processed online, how can the merchant verify the customer's
identity?
1. use secure sockets layers
2. use secure electronic transactions
3. use electronic data interchange
4. use financial electronic data interchange
11. Which form of e‐commerce currently accounts for about 97% of all e‐commerce
revenues?
1. B2B
2. B2C
3. C2B
4. C2C
25 In ____ products are built to customer specifications from a stock of existing components.
1. ETO
2. MTO
3. ATO
4. MTS
26. In _______ product is built against a sales forecast and sold to the customer from finished
goods.
1. MTS
2. ATO
3. MTO
4. DC
27. In ____ where products are digital assets and inventory is created from a digital master.
1. DC
2. BTO
3. MTO
4. DCO
28. Clothing and apparel, (packaged) food, and electronics equipment are the largest selling B2C
categories, the most frequently used models are
1. ETO and MTO
2. MTO and BTO
3. MTS and ATO
4. DC and ATO
32. Amazon originally touted that Delivery by Drones would come true in?
1. 2013
2. 2015
3. 2025
4. 2026
36. Kiva system was also being used by other retailers like
1. Walgreens
2. Staples
3. Crate & Barrel
4. All of the above
37. ______was a pioneer in providing customized products to end consumers in a timely and cost-
effective fashion.
1. HP
2. Dell
3. Lenovo
38. There are _____ distinct types of smart cards.
1. Two
2. Three
3. Four
4. Five
39. A card where a monetary value is prepaid and can be loaded on the card once or several times.
1. Stored-value cards
2. Smart cards
3. Contact card
4. Payment card
40. Payments from a single consumer are accumulated and processed periodically, or as a certain
level is reached are called
1. Aggregation
2. Stored-value cards
3. Direct payments
4. Subscription
1. Direct payment
2. Subscription
3. Aggregation
4. A’la carte
42. The oldest and one of the biggest payment gateway providers in India?
1. Instamojo
2. CC Avenue
3. Citrus
4. Billdesk
4. None
45. Receiving money from a costumer in exchange for goods and services are called
1. Consumer
2. Merchant
4. None
46. Incepted in 2000 in Mumbai and provides payment gateway solutions to customers and
merchants in e-commerce ,retail etc.
1. Citrus
2. Billdesk
3. Instamojo
1. Padiant
2. Xoom
3. Venmo
48. An aggregation is used but the micropayments are processed with an existing monthly bill.
1. Stored value
2. Direct payment
3. Subscriptions
4. A’ la carte
49. RTGS stands for
1. Credit card
2. Debit card
3. Paper cash
3. Which sales technique offer companies the opportunity to reach more customers and
give customers a chance to buy from home?
a) Catalog
b) Consultative
c) Insight
d) Social
5. Factor: Increase of sales volume: : Retailors:_____ :: e-tailers: Going out of their area
and even globally to find customers
a) Face to face stable contacts
b) Expansion of location, stores, and space
c) Local area customer
d) Ordering, payment, fulfillment system
9. Which type of business model has both online (website) and offline (physical store)
operation?
a) Brick-and-Mortar
b) Click-and-Mortar
c) Pure-play e-tailers
d) None of these
11. The major advantage of online directories is that if you change your business name,
address, contact details, you can easily keep it up to date in the directory.
a) True
b) False
c) Cannot determine
16. The Personalized event shopping model may be combined with group purchasing to
a) Maximize the customers’ cost
b) Lower the customers’ cost
c) Both A and B
d) None of the above
17. An online private shopping club, like an off-line shopping club enables members to
shop at a discount, frequently for short periods of time (just few hours or days).
a) True
b) False
c) Cannot determine.
21. ________ is a sale of goods at greatly reduced prices, lasting for only a short period
of time.
a) Flash Sales
b) Samples
c) Coupons
d) Rebates
22. Recommended products, services, etc. are ________ so members of social networks
can easily find them.
a) Looped
b) Bookmarked
c) Clipped
d) Highlighted
24. _______ programs (e.g., Amazon) pay people for referring customers.
a) Recommendation
b) Affiliate
c) Both A and B
d) Sponsored
25. _______ are algorithms used to solve graph matching problems in graph theory.
a) Matching algorithms
b) Greedy algorithms
c) Backtracking algorithms
d) Recursive algorithms
26. Which marketing method enabling brands to listen and gain unique customer insights
while also providing value to the user?
a) Referral
b) Conversational
c) Cross-promote.
d) Network
27. The term _________ refers to a marketplace that uses social media tools and
platforms and acts as an online intermediary between buyers and sellers.
a) Social Marketplace
b) Social shopping aids
c) Real-time online shopping
d) None of the above
30. _________ ‘invented’ online shopping using videotex, a two-way message service, it
revolutionized businesses. We now know this as e-commerce.
a) Michael Aldrich
b) Ray Tomlinson
c) Adam Weinrich
d) Sylvan Goldman
32. _________ allows the customers to return product bought over internet, to the
physical location of the store for more convenient return process.
a) Brick-and-Mortar
b) Pure Click
c) Brick and Click
d) None of the above
33. Offering _______ products allow brands connect with customers as co-creators,
increasing loyalty and margins.
a) mass product
b) Off-the-peg
c) Generic
d) Customized
34. ________ mean use of any technology or digital instrument which makes a Financial
task of an individual or Business easier.
a) Online DSA
b) Fintech
c) NBFC
d) None
35. For banks, __________ offers a rapid and inexpensive strategy to acquire out-of-the-
area customers.
a) E-banking
b) Mobile banking
c) Pure virtual bank
d) P2P lending
37. Customers can use _________ to view their account balance, make instant fund
transfers and pay bills, etc.
a) Internet banking
b) Mobile banking
c) Online banking
d) All the above
38. The European company called PayBox supported financially by Deutsche Bank,
in _______ started mobile banking.
a) 1996
b) 2000
c) 1999
d) 2002
39. What allows you to save time by depositing your checks remotely?
a) Time deposit
b) ATM deposit
c) Counter deposit
d) Mobile check deposit
40. Which banks do not have physical location and conduct only online transactions?
a) Savings and loans
b) Mutual
c) Credit unions
d) Virtual
41. ____________ was the first such bank to offer secure banking transactions on the
Web.
a) Security First Network Bank (SFNB)
b) Ally bank
c) Quantic bank
d) Discover bank
42. Which model allows people to lend money and to borrow from each other via the
Internet?
a) Microfinance: Credit Lending Models
b) P2P lending
c) Co-Operative Model
d) Community banking model
46. With online trading, there are no busy telephone lines, and the chance to err is small,
because there is no oral communication in a frequently noisy environment.
a) True
b) False
c) Cannot determine.
47. __________ major objective is to bring public sector institutions into the digital age.
a) E-commerce’s
b) Digital Government’s
c) E-tailing’s
d) None of the above
48. Which e-government category create a friendly single point of access to government
services for individual?
a) G2B
b) G2E
c) G2G
d) G2C
49. The basic idea of G2C is to enable citizens to interact electronically with the
_________ from anywhere and at any time.
a) Businesses
b) Manufacturers
c) Government
d) Employees
50. Which software does the government or politicians to assign inquiries and problem
cases to appropriate staff members?
a) CRM-type
b) System
c) Artificial Intelligence
d) Embedded
51. In India Facilities like PMAY, Sukanya Yojna, scholarships, Subsidies are not
provided to Citizens directly.
a) True
b) False
52. _______ Increase the ability for businesses to find, view, and comment on rules and
regulations.
a) G2C
b) G2E
c) G2B
d) G2G
54. Group purchasing is a principal strategy by which companies in many sectors achieve
_________
a) growth
b) new customers
c) cost containment
d) many customers
55. In forward auction, buyer
a) Pay lowest price and seller gain quick and easy business
b) Pay highest price and seller achieve maximum revenue for their product
c) Both A and B
d) None of the above
56. The ___________ category consists of EC activities between different units of
governments, including those within one governmental body.
a) G2B
b) G2C
c) G2E
d) G2G
59. _______ refers to government policies that aim to harness collaborative technologies
and interactive Internet tools to create an open-source computing platform in which
government, citizens, and innovative companies can improve transparency and
efficiency.
a) Government websites
b) Policy agenda
c) Government 2.0
d) Linkage institute
60. Governments are using _______ tools mainly for collaboration, dissemination of
information, e-learning, and citizen engagement.
a) Website
b) Web 2.0
c) Social media
d) None of the above
65. E-learning includes _________ that is used when the material is delivered wirelessly
to smartphones, tablets, or other mobile devices.
a) Internet
b) Devices
c) M-learning
d) Software
71. Online corporate training is the type of training that is accessed and delivered over
the internet for ________ purposes
a) Updating
b) Leadership
c) Business development
d) Leveraging skills set
73. _______ also known as economic simulation games or tycoon games, are games that
focus on the management of economic processes, usually in the form of a business.
a) Business simulation games
b) Management games
c) Capitallism
d) Airline Tycoon
74. Which game is developed by Marriott International for help in recruiting and training?
a) Marriott hotel
b) My Marriott Hotel
c) Capitalism
d) None of the above
75. Social environments facilitate ________ training, making it possible for learners to
share their experiences with others.
a) high-tech-based
b) social
c) Software based
d) Strategic
77. Some companies use __________ to engage employees in group learning via
knowledge sharing.
a) Social media
b) Blogging
c) Websites
d) Referral groups
79. Generation X and Millennial workers use _______ tools extensively for interacting
among themselves and with others.
a) Web 2.0
b) Social media
c) Web 1.0
d) Web 3.0
80. Social networking was born one day in ______, when the first email was sent.
a) 1952
b) 1960
c) 1971
d) 1999
81. when the first email was sent, the message said
a) “abstyuiop”
b) “Linksted”
c) “xteryuiop”
d) “qwertyuiop”
82. The __________ concept emerged directly from e-Learning.
a) E-tailing
b) E-study
c) Learning Management System
d) None of the above
87. ______ is a book in digital format that can be read on a computer screen, mobile
device, or on a dedicated device known as an e-reader.
a) E-solution
b) E-book
c) E-LMS
d) E-filling
90. The contents of a book are stored on a ____________ and downloaded for print-on
demand
a) Library
b) Catalog
c) Web server
d) None of the above
91. To buy kindle copy from Amazon.com readers have to pay before they download a
book
a) True
b) False
92. The e-book, e-newspaper are expensive than the hard-copy version.
a) True
b) False
94. Microsoft ClearType and CoolType from Adobe can be used to improve screen
display, colors, and font sizes.
a) True
b) False
c) May be
7. The benefits of online travel services to travelers and travel providers are
a) Free information is voluminous
b) Accessible at any time and place.
c) Shoppers find lowest price.
d) All the above.
8. OTA stands for
b) Online to Offline
c) Neither (a) nor (b)
d) None of the Above
10. Service providers operate their own websites by
a) Associate website
b) Promote website
c) Advertisement
a) CAP Ventures
c) Phocuswright
d) Advito
12. US online travel agent is expected to figure around in the year 2020.
a) 31%
b) 50%
c) 41%
d) 48%
13. Additional travelling cost can be saved by the companies with help of
14. Job services is considered as one of the online services provided over internet
b) E-Employment
c) Online Employment
b) Jazz
c) Job Adder
d) PC Recruiter
16. Employers and job seekers to connect via Facebook is through a company called
a) Jobseeker.com
b)Findemployment.com
c) Jobportal.com
d) Jobcastnet.com
17. Facebook has features that help people find jobs and help employer find
candidates.
a) jobportal.com
b) Jobseeker.com
c) Jobcastnet.com
d) Findemployment.com
18. As per ______ social media is utilized as the main source of job search.
19. The problem of searching the correct candidate for the right job is sorted out by the
sites.
d) Job networking
20. Who defines E-health as E-health is the transfer of health resources and health care
by electronic means.
a) UNICEF
b) WHO
c) UNESCO
d) FAO
a) Patient service
b) EMR
c) EHR
d) Doctor’s system
24. In the UK, was the first online health site to offer both a diagnosis and prescriptions
to patients over the Internet.
a) E-med
b) EMR
c) EHR
d) E- Health
25. E-med was established in by Dr. Julian Eden, In 2010, Dr Thom claimed to have
100,000 patients visit their site.
a) January 2000
b) February 2000
c) March 2000
d) April 2000
27. Large numbers of medical devices are used in the health industry.
a) ECG
b) EC
c) EMR
d) EHR
28. What does DRM stands for
a) E- TV
b) OTT/ Streaming TV
c) Mobile Internet
d) E-commerce
30. In which year Wishpond Technologies Ltd. shows how smartphone shoppers use
their devices for different shopping related activities.
a) 2012
b) 2013
c) 2015
d) 2014
31. Since when apple has offered consumers the ability to download songs and videos
from the Apple iTunes store.
a) 2000
b) 2001
c) 2002
d) 2003
32. When apple announced that it is teaming up with a major car maker for its Car Play
system.
a) March 2010
b) March 2012
c) March 2014
d) March 2016
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH
3. Which one of the following is not one of the major types of e-commerce? A
A. C2B.
B. B2C.
C. B2B.
D. C2C.
6. The primary source of financing during the early years of e-commerce was C
_______.
A. Bank loans.
B. Large retail firms.
C. Venture capital funds.
D. Initial public offerings
7. A
The type of firms that benefited the most during the consolidation period of
e-commerce were _______.
A. Large, traditional firms.
B. First movers.
C. Pure online companies.
D. ISPs
8. All of the following are technologies used to gather information about you D
online except ______.
A. Spy ware.
B. Cookies.
C. Gmail.
D. Anonymizers
9. A _________ is the set of planned activities designed to result in a profit in a A
marketplace.
A. Business model.
B. Profit model.
C. Business plan.
D. Revenue model.
13. All of the following are major B2C business models except ______. B
A. Content provider.
B. Industry consortium.
C. Transaction broker.
D. Service provider.
17. The area of actual or potential commercial value in which a company intends A
to operate is a _______.
A. Market space.
B. Marketplace.
C. Perfect market.
D. Bertrand market.
19. A situation where there are no differences among products or services, and D
the only basis of choosing
product is price is known as ______.
A. A value web.
B. Value chain.
C. Profit.
D. Commoditization.
20. A strategy designed to compete in all markets around the globe is called a A
_____ strategy.
A. Scope.
B. Differentiation.
C. Cost.
D. Focus.
21. Which of the following is not one of the stages of the development of the C
Internet?
A. Innovation.
B. Institutionalization.
C. Globalization.
D. Commercialization.
23. The component of TCP/IP that provides the Internet's addressing scheme B
and is responsible for the
actual delivery of packets is ______.
A. TCP.
B. IP.
C. the Network Layer.
D. the Application Layer
24. Which protocol permits users to transfer files from the server to their client D
computer, and vice versa?
A. HTTP.
B. SMTP.
C. IMAP.
D. FTP.
28. Which of the following is a new and disruptive Web feature or service? C
A. XML.
B. Diffserv.
C. Blogs.
D. CDMA.
29. All of the following are examples of 2G wireless phone technologies except B
_______.
A. CDMA.
B. W-CDMA.
C. TDMA.
D. GSM.
30. All of the following are wireless Internet access network technologies except D
________.
A. Wi-Fi
B. Bluetooth.
C. Zigbee.
D. GigaPoP.
31. Which of the following was the first commercial Web browser? C
A. Mosaic.
B. Mozilla.
C. Netscape Navigator.
D. Internet Explorer
32. All of the following are steps in the systems development life cycle except D
______.
A. Systems Design.
B. Testing.
C. Implementation.
D. Debugging.
ANSWER:
33. A _________ describes the flow of information at your e-commerce site and B
the infrastructure that will be used in the system.
A. System design.
B. Logical design.
C. Tactical design
D. Physical design.
34. All of the following are factors in optimizing Web site performance except A
_____.
A. Page retrieval.
B. Page generation.
C. Page delivery.
D. Page content.
36. What Web server functionality allows it verify usernames and passwords and D
process certificates and encryption information?
A. Processing of HTTP requests.
B. File Transfer Protocol.
C. Data capture.
D. Security services.
37. The underlying computing equipment that the system uses to achieve its e- A
commerce functionality is called a ______.
A. Hardware platform.
B. Content platform.
C. Transaction platform.
D. Scalability platform.
40. The ability to change the product to better fit the needs of the customer is A
called ________.
A. Customization.
B. Personalization.
C. Privacy.
D. Accessibility.
41. All of the following are tools for optimizing a Web site's location in search D
engine listings except
______.
A. Keywords and page titles.
B. Identifying market niches.
C. Buying ads.
D. Benchmarking.
42. The most common type of Internet crime according to the IC3 is ______. D
A. Credit card fraud.
B. Check fraud.
C. Non-delivery.
D. Auction fraud.
:
44. All of the following are major categories of computer viruses except _____. D
A. Macro viruses.
B. File-infecting viruses.
C. Script viruses.
D. Trojan viruses.
46 . When hackers flood a Web site with useless traffic to overwhelm the C
network, it is called ______.
A. phishing.
B. pharming.
C. a Denial of Service (DoS) attack.
D. spoofing.
C. Stored value.
D. Cash.
54. What is the name of the division of the U.S. Department of Homeland A
Security that coordinates cyber incident warnings and responses across
government and private sectors?
A. US-CERT.
B. OECD.
C. IC3.
D. P3P.
55. After sending e-mail, which of the following activities is most common C
among Internet users?
A. Sending instant messages.
B. Reading someone else's blog.
C. Using a search engine to find information.
D. Getting news.
57. All of the following are reasons more people don't shop online except B
________.
A. Lack of trust in online merchants.
B. Lack of convenience.
C. Inability to touch and feel the product.
D. Fear of misuse of personal information.
58. A good or service for which there are many dealers supplying the same A
product, and all products in the segment are essentially identical is known as
_______.
A. Commodity.
B. Core product.
C. Actual product.
D. Augmented product.
61. All of the following are types of data mining except ______. A
A. Selective data mining.
B. Query-driven data mining.
C. Model-driven data mining.
D. Rule-based data mining.
62. Which of the following market entry strategies are the most common for C
existing firms?
A. First mover
B. Fast follower.
C. Brand extender.
D. Alliances.
64. The per-product price consumers are willing to pay for a bundle B
____________ as the number of goods in the bundle increases.
A. decreases.
B. increases.
C. varies from product to product.
D. stays the same.
65. Creating multiple versions of information goods and selling essentially the A
same product to different market segments at different prices is
called_______.
A. Versioning.
B. Bundling.
C. Transactive content.
D. Price discrimination.
66. All of the following are examples of intelligent agent technology except D
________.
A. Automated response systems.
B. Automatic shipping confirmation.
C. Order status reports.
D. Online web bugs.
68. The set of applications and technologies that allow users to create, edit, and D
distribute content online is known as______.
A. Internet.
B. social networking.
C. virtual life.
D. Web 2.0.
69. A
Which of the following represents a limiting factor for the growth of e-
commerce?
A. Persistent cultural attraction of physical markets and traditional shopping
experiences.
B. Inadequate selection of goods compared to physical marketplaces.
C. E-commerce lacks the convenience of other methods of transacting
business.
D. The potential audience for e-commerce is too low to support it as a
widespread method of commerce.
71. All of the following are among the most common categories of spam except A
______.
A. Fraud.
B. Commercial products.
C. Finance.
D. Health (drugs).
72. All of the following are types of social marketing except ______. A
A. Affiliate marketing.
B. Blog advertising
C. Social network advertising.
D. Game advertising.
75. All of the following are metrics for e-mail campaigns except ______. D
A. Open rate.
B. Delivery rate.
C. Bounce-back rate.
D. Cart conversion rate.
77. Malicious hackers who act with the intention of causing harm are B
__________.
A. White hats.
B. Black hats.
C. Grey hats.
D. Brown hats.
78. The ethical principle which states that if an action is not right for all D
situations, then it is not right for
any situation is known as ______.
A. The Golden Rule.
B. Slippery Slope.
C. No Free Lunch.
D. Universalism.
80. The ability of consumers to review and contest the accuracy and D
completeness of data collected about them involves which of the following
FTC fair information practice principles?
A. Security.
B. Enforcement.
C. Choice/Consent.
D. Access/Participation.
81. The __________ is the first major effort to adjust the copyright laws to the C
Internet age.
A. Platform for Privacy Preferences (P3P).
B. Center for Democracy and Technology.
C. Digital Millennium Copyright Act (DMCA).
D. E-Government Act of 2002.
82. A patent grants the owner an exclusive monopoly on the ideas behind the B
invention for ______ years.
A. 10
B. 20
C. 30
D. 40
84. The redirection of traffic from a legitimate site to an infringing site is called B
_______.
A. Cybersquatting.
B. Cyberpiracy.
C. Metatagging.
D. keywording.
85. During which period of Internet governance was Network Solutions given a B
monopoly to assign and
track high-level domains?
A. Government Control Period.
B. Privatization.
C. Self-Regulation.
D. Governmental Regulation.
86. The taxation system for e-commerce sales is best described as ______. A
A. complex.
B. streamlined.
C. universal.
D. standardized.
87. All of the following are acts Congress has passed or attempted to pass to A
protect children online except ______.
A. Video Privacy Protection Act.
B. Children's Online Protection Act.
C. Communications Decency Act.
D. Children's Internet Protection Act.
88. Which of the following is a privacy advocacy group that is a foundation- and A
business-supported group with a legislative focus?
A. Cdt.org
B. PrivacyInternational org.
C. Epic.org
D. Privacy.org
91. All of the following are challenges to online retail except ______. D
A. Consumer concerns about the security of transactions.
B. Consumer concerns about the privacy of personal information given to
Web sites.
C. Delays in delivery of goods when compared to store shopping.
D. Inability to change prices nearly instantly.
92. Which of the following is an industry strategic factor that relates to whether A
new entrants face a disadvantage when attempting to enter an industry?
A. Barriers to entry
B. Power of suppliers.
C. Power of consumers.
D. Industry value chain.
ANSWER:
93. Companies that have a network of physical stores as their primary retail B
channel, but also have introduced online offerings are called ______.
A. Virtual merchants.
B. Click and Morter.
C. Catalog merchants.
D. Manufacturer-direct.
94. Products are made to prior to orders received based on estimated demand A
under a ______.
A. Supply-push model.
B. Demand-push model.
C. Supply-pull model.
D. Demand-pull model.
98. The most popular type of media in terms of total hours of consumption per A
year is _____.
A. Television.
B. Radio.
C. Internet.
D. Newspaper.
99. Which of the following describes paid content's relation to free user- C
generated content?
A. Free content jeopardizes paid content
B. Paid content jeopardizes free content
C. Free content and paid content can both work in tandem cooperatively.
D. Paid content is viable now but will not be in the future.
101. The online content revenue model in which free content drives offline A
revenues is called the ______.
A. Marketing model.
B. Advertising model.
C. Pay-per-view model.
D. Subscription model.
102. The combination of technical and legal means for protecting digital content A
from unlimited reproduction without permission is known as _____.
A. Digital rights management.
B. Digital protection schemes.
C. Digital distribution regulation.
D. Digital rights protection.
103. What is the most commonly offered interactive feature of newspaper Web C
sites?
A. Video.
B. Comments on blogs.
C. RSS feeds.
D. Podcasts.
105. After television, the next largest major player in the commercial D
entertainment industry is ______.
A. Video games.
B. Music.
C. Radio.
D. Film.
106. Which of the following is not an entertainment industry value chain model? B
A. Content owner direct model.
B. User distribution model.
C. Aggregator model.
D. Internet innovator model.
107. Technologies that help enhance resolution of e-book reader display screens D
are known as ______.
A. High-res pixel formatting.
B. Screen resolution technologies.
C. Sub-screen smoothing technologies.
D. Sub-pixel display technologies.
108. All of the following are characteristics of a social network except _______. C
A. Involves a group of people.
B. Features shared social interaction.
C. Always feature shared goals and purposes.
D. Common ties among members.
109. Social networking sites primarily earn their revenue through ______. A
A. Advertising.
B. Subscriptions.
C. Donations.
D. Service fees.
A. Market inefficiency.
B. Trust risks.
C. Fulfillment costs.
D. Delayed consumption costs.
114. A dynamically priced market that features few buyers and many sellers is a B
market that exhibits
______.
A. Market neutrality.
B. Buyer bias.
C. Seller bias.
D. Owner bias.
117. Which of the following portal revenue models involves charging for premium C
content?
A. ISP services.
B. General advertising.
C. Subscription fees.
D. Tenancy deals.
118. Which of the following best describes predicted growth in C2C and B2C B
auction spending?
A. B2C spending will overtake C2C spending.
B. Both types of spending will increase.
C. C2C spending will decrease while B2C increases.
D. Both types of spending will decline at similar rates.
119. An auction that has multiple winners that all pay the same price is an A
example of________.
A. Uniform pricing.
B. Discriminatory pricing.
C. Bid rigging.
D. Price matching.
122. Goods directly involved in the production process are known as _____. D
A. MRO goods.
B. Procured goods.
C. Indirect goods.
D. Direct goods.
126. The type of Net marketplace characterized by indirect inputs and spot C
purchasing is called an
_______.
A. Industry consortium.
B. Independent exchange.
C. E-distributor.
D. E-procurement marketplace.
127. The most common and easily understood type of Net marketplace is ______. B
A. E-procurement marketplace.
B. E-distributors.
C. Industry consortia.
D. Independent exchanges.
128. All of the following are objectives of private industrial networks except B
________.
A. Developing efficient purchasing and selling business processes industry-
wide.
B. Operating on a local scale.
C. Creating increased supply chain visibility.
D. Reducing industry risk.
129. _____________ are networks that connect people within a company to each D
other and to the company network.
A. Bitstreams.
B. Extranets.
C. Internets.
D. Intranets.
131. Which of the following is not one of the benefits of e-commerce to sellers? D
A. E-commerce offers greater flexibility in meeting customer needs.
B. E-commerce is a powerful tool for customer relationship building.
C. E-commerce can help to reduce costs.
D. E-commerce increases the net cost per contact.
132. The E-commerce domain that involves business activity initiated by the C
consumer and targeted to businesses is known as ______.
A. Business to Business (B2B).
B. Consumer to Consumer (C2C).
C. Consumer to Business (C2B).
D. Business to Consumer (B2C).
133. A _________ is a B2B trading network that links a particular seller with its D
own trading partners.
A. Bitstream.
B. Virtual network.
C. Web community.
D. Private trading network.
134. The type of website that is designed to build customer goodwill and to D
supplement other sales channels rather than sell the company's products
directly is known as a ______________ website.
A. Marketing.
B. Click-and-mortar.
C. Customer service.
D. Corporate.
135. When preparing a website, designers should ensure that the site enables B
user-to-user communication. This design feature is known as ___________.
A. Context.
B. Community.
C. Commerce.
D. Connection.
Unit-01
Sr. No. Question Option (a) Option (b) Option (c) Option (d) Answer
1 Which of the following describes e-commerce? Doing business electroni Doing business Sale of goods All of the above a
2 Which of the following is part of the four main types for e-commerce? B2B B2C C2B All of the above d
3 Which segment do eBay, Amazon.com belong? B2Bs B2Cs C2Bs C2Cs b
4 Which type of e-commerce focuses on consumers dealing with each other? B2B B2C C2B C2C d
5 Which segment is eBay an example? B2B C2B C2C None of the above d
6 Which type deals with auction? B2B B2C C2B C2C d
7 In which website Global Easy Buy is facilitated? Ebay.com Amazon.com Yepme.com None of these a
8 The best products to sell in B2C e-commerce are: Small products Digital products Specialty produ Fresh products b
9 Which products are people most likely to be more uncomfortable buying on the Internet? Books Furniture Movies All of the above b
10 Which products are people most likely to be comfortable buying on the Internet? Books PCs CDs All of the above d
11 Digital products are best suited for B2C e-commerce because they: Are commodity like prodCan be mass-custoCan be deliveredAll of the above d
12 The solution for all business needs is EDI ERP SCM None of the above b
13 All of the following are techniques B2C e-commerce companies use to attract customers, except: Registering with search Viral marketing Online ads Virtual marketing d
14 Which is a function of E-commerce marketing advertising warehousing all of the above d
15 Which is not a function of E-commerce marketing advertising warehousing none of the above c
16 Which term represents a count of the number of people who visit one site, click on an ad, and are takAffiliate programs Click-through Spam All of the above b
17 What is the percentage of customers who visit a Web site and actually buy something called? Affiliate programs Click-through Spam Conversion rate d
18 What are materials used in production in a manufacturing company or are placed on the shelf for sa Direct materials Indirect materials EDI None of the above a
19 What are materials that are necessary for running a modern corporation, but do not relate to the com
Direct materials Indirect materials EDI None of the above b
20 What are ballpoint pens purchased by a clothing company? Direct materials Indirect materials EDI None of the above b
21 What is another name for? Direct materials Indirect materials EDI None of the above b
22 What is the process in which a buyer posts its interest in buying a certain quantity of items, and selle B2B marketplace Intranet Reverse auction Internet c
23 What are plastic cards the size of a credit card that contains an embedded chip on which digital inforCustomer relationship mE-government ide FEDI cards Smart cards d
24 Most individuals are familiar with which form of e-commerce? B2B B2C C2B C2C b
25 Which form of e-commerce currently accounts for about 97% of all e-commerce revenues? B2B B2C C2B C2C a
26 Which of the following are advantages normally associated with B2B e-commerce? Shorter cycle times Reduction in costsReaches wider a all of the above d
27 If the threat of substitute products or services is low it is a(n): Disadvantage to the sup Advantage to the Advantage to th None of the above c
28 The threat of new entrants is high when it is: Hard for customers to enHard for competitEasy for compet Easy for customer c
29 If it is easy for competitors to enter the market, the threat of new entrants is considered: High Low More Less a
30 An industry is less attractive for suppliers when the rivalry among existing competitors is: High Low More Less a
31 Unique value auction is mainly applies to? New products Second hand prodEngineering pro None of the above b
32 Paisapay is facilitated in eBay.co.in amazon.com flipkart.com none of the above a
33 Which of the following is a useful security mechanism when considering business strategy and IT? encryption decryption firewall all the above d
34 Which of the following is not related to security mechanism encryption decryption e-cash all the above c
35 A product or service that customers have come to expect from an industry, which must be offered by Switching costs Loyalty programs Entry barriers Affiliate program c
36 How the transactions occur in e-commerce? Using e-medias Using computers Using mobile ph None of the above a
37 Which type of products is lesser purchased using ecommerce? automobiles books softwares none a
38 A business competing in a commodity like environment must focus on which of the following? Price Ease / speed of de Ease of orderingall of the above d
39 Which of the following refers to creating products tailored to individual customers? customization aggregation Direct materials Reverse auction a
40 Materials used in the normal operation of a business but not related to primary business operations a Supplies Direct materials Indirect materia Daily stuff c
41 Amazon.com is well-known for which e-commerce marketing technique? Banner ads Pop-up ads Affiliate programViral marketing c
42 What is the name given to an interactive business providing a centralized market where many buyersDirect marketplace B2B B2C Electronic market d
43 Which form of e-marketplace brings together buyers and sellers from multiple industries, often for Mhorizontal Vertical Integrated Inclined a
44 Which form of e-marketplace brings together buyers and sellers from the same industry? horizontal Vertical Integrated Inclined b
45 Which type of add appears on a web page? pop-under ad Pop-up ad Banner ad Discount ad c
46 What type of ad appears on top of a web page? pop-under ad Pop-up ad Banner ad Discount ad b
47 What type of ad appears under a web page? pop-under ad Pop-up ad Banner ad Discount ad a
48 Which, if any, of the following types of ads are people most willing to tolerate? pop-under ad Pop-up ad Banner ad Discount ad d
49 The dominant Web server software is ______. Zeus. B. Apache. C. Microsoft IISD. Google. b
50 The underlying computing equipment that the system uses to achieve its e-commerce functionhardware platform. content platformtransaction pla scalability platfo a
51 The set of standards for communication between a browser and a program running on a serveActive Server Pages (A Java Server Page Common GatewVBScript. c
Unit-02
1 Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to de encryption, decryption private, public encryption, pub public, private d
2 Secure Sockets Layers does which of the following? creates a secure, privateencrypts informatsends informatioall of the above d
3 When a transaction is processed online, how can the merchant verify the customer's identity? use secure sockets layersuse secure electro use electronic dause financial elect b
4 The practice of forging a return address on an e-mail so that the recipient is fooled into revealing privhacking cracking dumpster divingspoofing d
5 What is a model of a proposed product, service, or system? Prototyping Prototype Proof-of-concept Selling prototype b
6 What is an internal organizational Internet that is guarded against outside access by a special securit Client/server network Intranet Extranet Thin client b
7 What is an intranet that is restricted to an organization and certain outsiders, such as customers and Client/server network Intranet Extranet Thin client c
8 What is a detailed process for recovering information or an IT system in the event of a catastrophic d Disaster recovery plan Hot site Cold site Disaster recovery a
9 Which factor determines when your IT system will be available for knowledge workers to access? Availability Accessibility Reliability None of the above a
10 Which factor determines who has the right to access different types of IT systems and information? Availability Accessibility Reliability Scalability b
11 Which factor ensures your IT systems are functioning correctly and providing accurate information? Availability Accessibility Reliability Scalability c
12 Which factor represents how well your system can adapt to increased demands? Availability Accessibility Reliability Scalability d
13 What is a set of conditions used to measure how well a product or system functions? Flexibility Performance Capacity planninBenchmark d
14 What determines the future IT infrastructure requirements for new equipment and additional netwo Flexibility Performance Capacity planninBenchmark c
15 What automates business processes? Workflow ASP Workflow systemEIP c
16 What defines all of the steps or business rules, from beginning to end, required for a process to run c Workflow ASP Workflow systemLA a
17 What sends work assignments through an e-mail system? Database-based enterpriMessaging-based Database-based Messaging-based d
18 Which will not harm computer resources firewall Virus Trojan horse None of the above a
19 Which is not a function of ERP? Warehousing sales scheduling None of the above d
20 Which is a function of ERP? Warehousing sales scheduling all of the above d
21 Which of the following is the primary characteristic of an intranet? People outside the organPeople inside the oPeople outside thNone of the above c
22 Which concept suggests that different applications and computer systems should be able to communiIntegration Web services Scalability Interoperability d
23 Which service encompasses all technologies used to transmit and process information on an across a Interoperability Scalability Benchmarking Web services d
24 Which process can prevent data from lose due to computer problems or human errors? backup recovery benchmarking data cleansing a
25 What describes a process of continuously measuring results and comparing those results to optimal pPerformance Capacity planningBenchmarking Data cleansing c
26 Who protects system from external threats? firewall EDI ERP Script kiddies a
27 Who breaks into other people's computer systems and steals and destroys information? Hackers softwares Hacktivists Script kiddies a
28 What is software that comes hidden in free downloadable software and tracks your online movementWeb log Clickstream Anonymous WebNone of the above d
29 ERP stands for Enterprise resolution plaEnterprise revers Enterprise resouNone of the above c
30 Which is not a component of ERP? Legacy systems Bolt on applicatio Operational dataCybersoft d
31 What is a type of virus that spreads itself, not just from file to file, but from computer to computer vi Computer virus Worm Denial-of-serviceNone of the above b
32 What harnesses far-flung computers together by way of the Internet or a virtual private network to s Computer virus Worm Denial-of-serviceNone of the above d
33 What consists of the identification of risks or threats, the implementation of security measures, and thRisk management Risk assessment Security None of the above a
34 What is the process of evaluating IT assets, their importance to the organization, and their susceptibi Risk management Risk assessment Security None of the above b
35 What is the process of making a copy of the information stored on a computer? Backup Anti-virus Firewall Biometrics a
36 What software detects and removes or quarantines computer viruses? Backup Anti-virus Firewall Biometrics b
37 What is hardware and/or software that protects computers from intruders? Backup Anti-virus Firewall Biometrics a
38 What is the use of physical characteristics ù such as your fingerprint, the blood vessels in the retina o Backup Anti-virus Firewall Biometrics d
39 All of the following are considered biometrics, except: Fingerprint Retina Password Voice c
40 What scrambles the contents of a file so you can't read it without having the right decryption key? Encryption Intrusion-detectio Security-auditin All of the above a
41 What is an encryption system that uses two keys: a public key that everyone can have and a private kEncryption Public key encryp Intrusion-detect Security-auditing b
42 What looks for people on the network who shouldn't be there or who are acting suspiciously? Encryption Public key encryp Intrusion-detect Security-auditing c
43 What checks out your computer or network for potential weaknesses? Encryption Public key encryp Security-auditin None of the above c
44 Which of the following to viruses harm? Your keyboard Your monitor Your processor Viruses do not ha d
45 Which of the following can a virus do? Hurt your hardware Hurt any files theyInfect files on wrNone of the above d
46 In simple terms, what does risk assessment ask? What can go wrong? How likely is it to What are the po All of the above d
47 Which of the following are ways to prove access rights? What you know, like a p What you have, li What you look l All of the above d
48 Which item can a password be used to protect? Network File Folder All of the above d
49 Which is the most important component of IT? Information People Information techComputers b
50 Which of the following applies to the implementation of an idea? Copyright Intellectual prope Patent Denial-of-service a c
51 Which of the following captures screen images? Key logger Packet sniffer Log analysis too Screen capture so d
52 Which of the following examines information passing through switches, hubs, or routers? Key logger Packet sniffer Log analysis too Screen captures b
53 Which of the following records logons and deletions? Key logger Packet sniffer Log analysis too Screen captures c
54 E-mail messages may be stored on which of the following computers? Sender's computer Sender's server Recipient's serveAll of the above d
55 What might identity thieves do with your identity? Apply for and use creditApply for a loan Change their ideAll of the above d
56 Companies can gather information about employees and potential employees from which of the follow
Job applications Credit reports Companies that All of the above d
57 Cyber slacking consists of what activities? Visiting ôinappropriateöVisiting news sites Chatting online w
Chatting online w d
58 Cookies are used to do which of the following? Store your ID and passwStore contents of To track web actAll of the above a d
59 Unsolicited e-mail is called what? Junk mail Spam Extra mail None of the above b
60 What is the name of the new anti-Spam bill? No-Spam CAN-Spam Spam-Away Stop Spam b
61 What is the legal protection afforded an expression of an idea, such as a song, video game, and some Ethics Intellectual prope Copyright Fair Use Doctrine c
62 What is the unauthorized use, duplication, distribution or sale of copyrighted software? Fair Use Doctrine Pirated software Counterfeit softwPrivacy b
63 What is a program, when installed on a computer, records every keystroke and mouse click? Key logger software Hardware key log Cookie Adware a
64 What is software you don't want hidden inside software you do want? Adware Trojan-horse softwSpyware All of the above d
65 piece of clothing similar to the way you would carry your cell phone on your belt? Wearable computer GPS Implant chip None of the above a
Unit-03
1 What is an electronic representation of cash? Digital cash Electronic cash E-cash All of the above d
2 What is a technology-enabled microchip implanted into the human body? Wearable computer GPS Implant chip None of the above c
3 Which of the following is not a reason why digital cash has turned out to be extremely difficult? If your system crashes y There is only one Digital cash makDigital cash trave b
4 Smart card is better protected than other cards using Encryption Firewall Hub All the above a
5 Trust card is introduced by BSNL and itzcash BSNL and oxicashBSNL only None a
6 PaisaPay is offered only by Homeshop18.com eBay.in amazon.com none b
7 The E-payment mechanism widely used in B2B is Credit card Debit card Master card E-cheque d
8 Which type of technology will increase portability and mobility? Implant chips Micro-payments Internet phone cAll of the above d
9 Which of the following an accurate statement about internet phone calls? They are possible but noThey are not poss They are curren None of the above a
10 What are the most commonly used input devices today? Keyboard Mouse All of the above None of the above c
11 Which of the following can be used to help identify people in a crowd? Biochip Implant chip Facial recognitioFacial recognition c
12 Which one is also known as plastic money? Credit card Debit card Paper cash All of the above a
13 Which one is the component of cybercash payment system CC user software CC merachant sof CC Server Softw All of the above d
14 The smart card which use antenna for reading and writing data Contact smart card Contactless smart Proximity smart Both B and C d
15 Which of the smart card uses a sim like structure for reading and writing data Contact smart card Contactless smart Proximity smart Both B and C a
16 Which is not a feature of ecommerce SCM EDI WWW BPR d
17 What is I stands in CIA of smart card? International Integrity Identity None of the above b
18 What is A stands in CIA of smart card? auditing authenticity authorized None of the above b
19 What is C stands in CIA of smart card? confidentiality conference congress congress a
20 Which one is the third party payment providers who offer digital wallets for E- merchants Oxicash PayMate PayPass All the above d
21 Which is used to identify mobile money MCID MMID RSID NONE OF THE AB b
22 Which one is not a encryption technique RSA DES AES NONE OF THE AB d
23 Which one is not used as a security mechanism? Encryption Cryptography Wallets Digital signature c
24 Which e-government arena is being used when governmental agencies send out and accept bids for wG2G G2B G2C G2G b
25 Secret key is used for Public key cryptographyPublic key cryptogAsymmetric key None of these b
26 Which one is a communication channel threat? Sniffer programs Cyber vandalism Integrity threatsAll of the above d
27 Which one is a communication channel security protocol? SSL S-HTTP SET ALL OF THE ABO d
28 The protocol which allows the file transfer between computers is TCP/IP FTP HTTP SOA b
29 E-Banking is also known as ATMs Net banking Traditional bankNone of these b
30 Which one is a client level threat? Malicious code Viruses Active contents All the above d
31 Which one is not an encryption technique? RSA DES AES FTP d
32 Which one is an encryption technique? RSA DES AES All of the above d
33 Which one is not a server level threat? Malicious code CGI threats Database threat Buffer overflows a
34 Which one is not a physical threat? Hacking Storm Phishing None of the above a
35 Which one is a logical threat? Hacking Storm Phishing None of the above a
36 The basic elements of website is Home page Web pages Links and banneAll the above d
37 Which one is a threat for E-commerce Trojan horse firewall encryption None a
38 Secure communication means Protect transmission of cGuarantee privacyUnauthorized acAll the above d
39 Which one is not an offline payment mode? Cash on delivery Cash before deliveDemand drafts e-cheque d
40 Which one is an offline payment mode? Cash on delivery Cash before deliveCredit card Both a and b d
41 Which one is not an online payment mode? Cash on delivery Debit card Credit card e-cheque a
42 Which one is an online payment mode? Cash on delivery Cash before deliveDemand drafts e-cheque d
43 which one is not an E-payment method used in India Debit card Credit card e-cheque none d
44 OTP stands for On Time Password On Time processinOne time proces None a
45 Which one is not a threat for E-commerce Trojan horse Viruses Worm None d
46 Private Key cryptography is also known as ---------------cryptography. Public key Symmetric Asymmetric None
47 Public key cryptography is also known as ---------------cryptography. Private key Symmetric Asymmetric None c
48 What is the legal protection afforded an expression of an idea, such as a song, video game, and some Ethics Intellectual prope Copyright Fair Use Doctrine c
49 Cyber slacking consists of what activities? Visiting appropriate webVisiting news sites Chatting online w
All of the above d
50 What is an arrangement made between e-commerce sites that direct users from one site to the other? Spam Viral marketing Affiliate programNone of the above c
51 Which type deals with auction? B2B B2C C2B C2C d
52 Which one is not a layer of E-commerce infrastructure Physical layer Product layer Service layer None d
53 Which will harm computer resources Worm Worm Trojan horse All the above Ans d
54 The study of encryption is called--------------- Decryption Cryptography Firewall All the above b
55 During E-commerce transaction we should ensure------------- Integrity Security Confidentiality All the above d
56 The virus that are commonly found in word documents are called-------------- Macro Trojan horse Script virus None of the above a
57 The virus that are attached with vb and java files are called Macro Trojan horse Script virus None of the above c
58 The viruses spreads through------------- Mails Pen drives and cd Websites All the above d
59 Which of the following is an Internet-based company that makes it easy for one person to pay anothe electronic check electronic bill pre conversion ratesfinancial cyberme d
60 Which of the following is a method of transferring money from one person's account to another? electronic check credit card e-transfer none of the above a
61 An electronic check is one form of what? e-commerce online banking e-cash check c
62 If you need to transfer money to another person via the internet, which of the following methods cou financial cybermediary electronic check electronic bill prall of the above d
63 Which of the following permits the transmission of a bill, along with payment of that bill, to be condu financial cybermediary electronic check electronic bill prall of the above c
64 What is the name for direct computer-to-computer transfer of transaction information contained in s internet commerce e-commerce transaction inforelectronic data in d
65 Which of the following is used in B2B to pay for purchases? e-commerce financial electronielectronic data eelectronic checks b
Companies that are engaged only in e-commerce are considered as ……….. organizations.
a) click-and-mortar
b) Virtual/ Pure play
c) brick-and-mortar
d) None of these
Companies that have a network of physical stores as their primary retail channel, but also have
introduced online offerings are called ______________. *
a) Virtual merchants
b) Bricks and clicks
c) technology solutions
d) Bertrand market
Social networks have an enormous information sharing capacity. As such, they are a great
distribution channel for ____.
a) customer feedback
b) viral content
c) exclusive coupons
d) marketing messages
________ Provide the means to create capability that reflects true awareness of the physical
world and people.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
Voice recognition software and virtual assistant programs offer for ________ and _________
a) Communication and hardware
b) Communication and Entertainment
c) Entertainment and software
d) Communication and Software
Digital India is a campaign launched by the Government of India in order to ensure the
Government's services are made available to citizens electronically by improved online
infrastructure and by increasing Internet connectivity When was this campaign launched? *
a) 2013
b) 2014
c) 2015
d) 2016
Who forecasted in 2002 that e-commerce would significantly impact the way that business is
done? *
a) Peter Drucker
b) Philip Kotler
c) Steve Jobs
d) Henry Fayol
________ is an organization that uses technology as a competitive advantage in its internal and
external operations.
a) Digital Economy
b) Digital enterprise
c) E-commerce
d) None of the above
Which one of the following is not one of the major types of e-commerce? *
a) C2B
b) B2C
c) B2B
d) C2C
E-commerce activities that are conducted in social networks by using social software are referred
to as ……….. *
a) mobile commerce
b) social commerce
c) collaborative commerce
d) e commerce
E Commerce 5C Model is *
a) Commerce,Collaboration,corelation,Connection,Computation
b) Community,Collaboration,Communication,Connection,Computation
c) Commerce,Collaboration,Communication,cordination,Computation
d) Commerce,Collaboration,Communication,Connection,Computation
Digital Transformation is the use of________ to solve problems often utilizing cloud computing
a) old, fast and frequently changing digital technology
b) new, fast and frequently changing digital technology
c) innovative, fast and frequently changing digital technology
d) new, fast and stable digital technology
Digital economy is a term that merely refers to a country’s economy that’s based on
________technologies *
a) Online payment
b) Mobile payment
c) digital payment
d) secure
A ___________ is a social network of individuals who interact through specific social media,
potentially crossing geographical and political boundaries in order to pursue mutual interests or
goals
a) Facebook community
b) Linkedin Community
c) social community
d) virtual community
Sunsilk Gang of Girls includes all the below mentioned things EXCEPT on the virtual
community
a) styling tips
b) blogs
c) contests
d) competitive information
WIPRO using internal network for its business operations is an example of ____ *
a) Internet
b) Extranet
c) Intranet
d) Local Area Network
While there are obvious e-business advantages and opportunities, there are also risks and
barriers. These include:
a) Spikes Causing Websites To Fail At Peak Timesption 1
b) Contravention Of Customer Privacy
c) Internet Hackers Penetrating Company Security
d) All Of The Above
Four common communications models described by the Internet Architecture Board include: *
a) Device-to-Mobile, Device-to-Cloud, Device-to-Gateway, and Back-End Data-Sharing
b) Device-to-Device, Device-to-Cloud, Device-to-Gateway, and Back-End Data-Sharing
c) Device-to-Device, Device-to-Cloud, Device-to-server, and Back-End Data-Sharing
d) Device-to-Device, Device-to-Front end , Device-to-Gateway, and Back-End Data-
Sharing
The transformation of key business processes through the use of digital or Internet technologies
is known as ____________
a) E-business
b) E-Commerce
c) Digital Business
d) Both A and C
_______ is a new digital ecosystem, which can be described through five Cs: creativity,
connectivity, collaboration, convergence, & community.
a) .NET
b) Web 2.0
c) IoT
d) Webex
A _________ community is one where the interaction takes place over a computer network,
mainly the Internet.
a) Online
b) Virtual
c) Internet
d) All of the above
All of following are the big users of ZigBee in the smart home EXCEPT
a) Honeywell
b) Comcast
c) Huawei
d) Flipkart
The global wearable computing is expected to reach approximately USD ______ by 2023
a) 25 Billion
b) 15 Billion
c) 35 Billion
d) 45 Billion
Based on technology, the wearable computing market is sub-segmented into _________ and
networking technologies and other technologies *
a) visibility
b) display
c) Weight
d) smartness
Customers pay a fixed amount, usually monthly, to get some type of service. This is an examples
of ________ Digital Business Model
a) Affiliate Fees
b) Transaction Fees
c) Subscription Fees
d) Licensing Fees
_________ was the leader in the streaming stick category with its Fire TV stick *
a) Snapdeal
b) Flipkart
c) Amazon
d) Xiomi
By application, the global smart home market has been segmented into all of the following
EXCEPT *
a) lighting control
b) security & access control,
c) HVAC control
d) crowd control
The website offers bidding facility to people who want to buy tickets immediately ,identify the
type of e-commerce model *
a) B2B
b) B2C
c) C2B
d) B2G
The digital revolution is the shift from ___ & ___ to digital electronics *
a) Electrical And Analog
b) Mechanical And Analog
c) Electronics And Analog
d) Component And Analog
.___ refers to the application of marketing principles and techniques via electronic media and
internet *
a) E-marketing
b) Indirect marketing
c) Viral marketing
d) None of the above
A collection of web services which facilitate certain behaviours online such as community
participation and user generated content, rating and tagging is commonly known as: *
a) Facebook
b) Customer Journey
c) Web 2.0 Concept
d) World Wide Web
When Wal-Mart uses the internet to purchase inventory items from a vendor company, it is using
the _______ e-commerce model
a) C2C
b) B2B
c) B2G
d) B2C
A wireless technology that allows manufacturers to attach tags with antennas and computer chips
to goods and then track their movement through radio signals *
a) Near-Field Communication (NFC)
b) Wireless Sensor Networks (WSN)
c) Wireless Fidelity (WiFi)
d) Radio-Frequency Identification (RFID) Technology
A portal that aggregate and provides content and services for mobile users *
a) Mobile Portal
b) Mobile Wallet
c) Voice Portal
d) Mobile Computing
_________describes the manner in which business is done to generate revenue and create value.
a) Digital Business
b) Business Model
c) Ecommerce
d) CRM
Companies charge others for allowing them to place a banner on their sites. This Digital
Business Model is known as ______
a) Transaction Fees
b) Licensing Fees
c) Affiliate Fees
d) Advertising Fees
When members of virtual community interacts with each other over an internet, then it is called
___________.
a) Web Community
b) Online Commeunity
c) Internet Community
d) All of the above