Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Shivaji University, Kolhapur

Question Bank For Mar 2022 (Summer)


B.Sc. Computer Science Entire Part – III Semester – V

Subject Code:66072 Subject Name: E-Commerce

Multiple Choice questions

1. Which of the following is part of the four main types for e-commerce?
A. B2B B. B2C
C. C2B D. All of the above

2. E-commerce involves
A. Marketing B. Advertising
C. Warehousing D. All of the above

3. By Electronic Commerce we mean:


A. Commerce of electronic goods
B. Commerce which depends on electronics
C. Commerce which is based on the use of internet
D. Commerce which is based on transactions using computers connected by
telecommunication network.

4. EDI standards are


A. not universally available
B. essential for B2B commerce
C. Not required for B2B commerce
D. Still being evolved

5. What is the name of the card which can be used by the buyers during the time of
purchase and
in which the amount will be immediately debited from the buyers account?
A. E-Distributor B. Debit Card
C. Credit Card D. Power Card

6. What are NEFT and RTGS about?


A.Cheque truncation process
B. Electronic fund transfer from bank to bank
c) Electronic payment products within a bank
d) various deposit products
7. NEFT means
A. National Electronic Funds Transfer system
B. Negotiated Efficient Funds Transfer system
C. National Efficient Funds Transfer system
D. None of these

8. What is the significance of 'Real-time' in RTGS?


A. Funds will eventually be transmitted to beneficiary account
B. Funds will be settled in batches
C. Funds will be settled as soon as initiated
D. None of the above

9. Which of the following funds transfer systems is the fastest?


A. NEFT
B. RTGS
C. IMPS
D. AEPS

10. When a person’s computer is broken into to access personal information is called;
A. Hacking B. Theft
C. Stalking D. None

11. ATM stands for


A. Any time money B. Any time machine
C. Automated teller machine D. Automated Time machine

12. What is the first phase of hacking?


A. Attack B. Maintaining access
C. Gaining access D. Reconnaissance

13. What is an electronic representation of cash?


A. Digital cash B. Electronic cash
C. E-cash D. All of the above

14. Smart cards is better protected than other cards using


A. Encryption B. Firewall
C. Hub D. All of the above

15. Which one is not used as a security mechanism?


A. Encryption B. Cryptography
C. Wallets D. Digital signature

16. . Which one is not a physical threat?


A. Hacking B. Storm
C. Phishing D. None of above
17. Which one is not an online payment mode?
A. Cash on delivery B. Debit card
C. Credit card D. E-check

18. OTP stands for


A. One time password B. On time processing
C. One time processor D. None of these

19. Private key cryptography is also known as ------------ cryptography


A. Public key B. Symmetric key
C. Asymmetric key D. None of these

20. Public key cryptography is also known as ------------- cryptography


A. Private key B. Symmetric key
C. Asymmetric key D. None of these

21.The most common type of Internet crime according to the IC3 is ______.
A. Credit card fraud B. Check fraud
C. Non-delivery D. Auction fraud

22. Digital signature is


A. A bit string giving identity of a correspondent
B.A unique identification of a sender
C.An authentication of an electronic record by tying it uniquely to a key only a
sender knows.
D.An encrypted signature of a sender

23. The full form of SSL is


A. Serial Session Layer B. Secure Socket Layer
C. Session Secure Layer D. Series Socket Layer

24. By encryption of a text we mean


A. Compressing it B. Expanding it
C. Hashing it D. Scrambling it to preserve its security

25. Network layer firewall works as a __________


A. Frame filter B. Packet filter
C. Content filter D. Virus filter

26. Which of the following is / are the types of firewall?


A. Packet Filtering Firewall B. Dual Homed Gateway Firewall
C. Screen Host Firewall D. Dual Host Firewall
27. A proxy firewall filters at _________
A. Physical layer B. Data link layer
C. Network layer D. Application layer
28. Which one is not a server level threat?
A. Database threats B. Buffer overflows
C. CGI threats D. Malicious code

29. Main function of proxy application gateway firewall is


A.To allow corporate users to use efficiently all internet services
B. To allow intranet users to securely use specified internet services
C. To allow corporate users to use all internet services
D. To prevent corporate users from using internet services

30. Certification of Digital signature by an independent authority is needed because


A. it is safe
B. It gives confidence to a business
C. The authority checks and assures customers that the public key indeed
belongs to the business which claims its ownership
D. Private key claimed by a sender may not be actually his

31. Viruses can be detected and prevented using ____________


A. System Software
B. Digital Certificate
C. Antivirus Software
D. Application Software

32. OLX is example of __________


A. B2B
B. B2C
C. C2B
D. C2C
33. _________ is process; plain text is converted into random text or cipher text.
E. Encryption
F. Decryption
G. Source Code
H. Program

34. Companies like Flipkart, Shopclues and Myntra belongs to __________ E-


Commerce segment.
A. B2B
B. P2P
C. B2C
D. C2B
35. Which is function of E-Commerce __________.
A. Marketing
B. Advertising
C. Warehousing
D. All of above

36. The dimension of e-commerce that enables commerce across national boundaries
is called ___________.
A. interactivity B. global reach C. richness D. ubiquity

37. E-commerce is described by ___________.


A. Doing business electronically
B. Doing business
C. Sale of goods
D. All of the above

38. The first computer virus is __________.


A. I Love
B. YouBlaster
C. Sasser
D.Creeper

39. In the following products are people most likely to be more uncomfortable buying
on the Internet.
A. Books
B. Furniture
C. Movies
D. All of the above

40. Amazon.com is well-known for which e-commerce marketing technique________.

A. Banner ads
B. Pop-up ads
C. Affiliate programs
D. Viral marketing

Question for 8 Marks

1. Define E-Commerce? Explain advantage and disadvantage of E-Commerce.


2. What is EDI? State and explain working mechanism of EDI.
3. Define E-Payment? Explain types of Electronic payment.
4. What is e-commerce? Discuss B2B, B2C and C2B model giving proper examples.
5. Explain Secure Transactions in brief.
6. What is EDI? Explain advantages and dis advantages of EDI.
7. What is an EDI? Explain how business transaction can take place in an EDI.
8. Discuss in detail about Internet Service provider’s role in E-Commerce.
9. Explain post-paid payment system.
10.Explain the strategies used in e-business.
11.What are the challenges in e-commerce?
12. What is e-payment? Discuss in detail various methods of e-payment
13. Explain changing retail industry dynamics.
14.What is e-banking? Explain home banking in detail.
15. What is e-payment? Discuss in detail various methods of e-payment.
16. Explain the concept of EDI with business.
17. What are the opportunities in e-commerce?
18. Explain any four Business Models

Question for 4 Marks

1. Short Note on Electronic Fund Transfer.


2. Encryption and Decryption.
3. Advantage and Disadvantage of EDI
4. Define B2B and B2C model.
5. Component of E-Commerce.
6. Short note on Pre-paid and post-paid payment.
7. Short note on Computer Crime
8. Short Note on Electronic Fund Transfer.
9. Short Note on Cryptography.
10.Short Note on Computer Crime
11.Goals of E-Commerce.
12.Short Note on Digital Signature.
13.Write benefits of EDI.
14. Explain the concept of electronic cheque.
15. Compare open models versus closed model.
16. Explain concept of electronic newspaper.
17. List the opportunities in e-commerce.
18. Explain B2B Business model.
19. Explain technological & marketing strategy of banking industry.
20. What is electronic cash?
21. List the benefits of EDI.
22. Explain concept of virtual auctions.
23. List the management issues in online banking.
24. Explain B2C Business model.
25. Explain any four consumer legal and business issues.
26. What is digital cash?
27. Explain technological & marketing strategy of banking industry.
28. Compare open models versus closed model.
29. List the advantages and disadvantages of E-commerce.
30. Explain C2C Business model.

You might also like