Professional Documents
Culture Documents
E-Commerce (Set 2)
E-Commerce (Set 2)
2 of 6 sets
……………… o m
102. Electronic Exchange of business documents in a standard format is known as
A. e-commerce . c
B. e-business te
a
C. edi
D. none of these
q M
Answer:C c
M
103. Which of the following is not a party of SCM ?
A. suppliers
B. manufacturers
C. distributors
D. customers
Answer:C
116. English physicist Tim Berner’s Lee was famous for the establishment of
…………………..in 1990.
A. internet
B. www
C. intranet
D. none of these
Answer:B
118. A company that manufacturers bicycles may use the internet to purchase
tyres from their suppliers. This is an example of-----------transaction
A. b2g
B. b2e
C. b2b
D. p2p
Answer:C
124. Which among the following is not an example for Search engine ?
A. google
B. msn
C. alta vista
D. none of these
Answer:D
127. The user reaches this page when they specify the address of a website
A. home page
B. web page
C. summary page
D. none of these
Answer:A
132. This is a protocol which allows files to be transferred from one computer to
another computer
A. tcp/ip
B. ftp
C. http
D. none of these
Answer:B
136. ……………..is a card with a microchip that can be used instead of cash and
coins for everything from vending machines to public transportation.
A. debit card
B. credit card
C. electronic purse
D. any of these
Answer:C
144. ………………….is a financial instrument which can be used more than once
to borrow money or buy products and services on credit.
A. credit card
B. e-cheques
C. e-cash
D. none of these
Answer:A
146. ………………..is a kind of payment card that transfers fund directly from the
consumer’s bank account to the merchants account
A. debit card
B. electronic purse
C. credit card
D. any of these
Answer:A
148. The information Technology Act [IT ACT] came into effect on
A. 16th november 2000
B. 15th december 2000
C. 17th october 2000
D. none of these
Answer:C
149. Information sent over the Internet commonly uses the set of rules
called……………………
A. tcp/ip
B. ftp
C. http
D. gopher
Answer:A
153. Which of the following crimes were not covered under IT (Amendment) Act,
2008 ?
A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these
Answer:D
154. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. data protection
B. telecommunication laws
C. intellectual property laws
D. none
Answer:C
156. ………………is basically a secure gate between our organization data and
internet.
A. network firewall
B. antivirus
167. ………………….is an internet network that allows users with the same
network in software to connect to each other’s hard disks and exchange files
A. b2c
B. b2e
C. b2b
D. p2p
Answer:D
172. ……………..allows the person to type ion just the main word or words and the
site will come in
A. web page
B. home page
C. domain
D. none of these
Answer:C
177. The primary source of financing during the early years of e-commerce was
______________.
A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Answer:C
180. The component of TCP/IP that provides the Internet's addressing scheme and
is responsible for the actual delivery of packets is ______________.
A. tcp
B. ip
C. the network layer
D. the application layer
Answer:B
182. Internet users account for about ______________ of the world's population.
A. 7%
B. 17%
C. 27%
D. 47%
Answer:B
183. The most common type of Internet crime according to the IC3 is
______________.
A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud
Answer:D
184. When hackers flood a Web site with useless traffic to overwhelm the network,
it is called ______________.
A. phishing
B. pharming
187. Creating multiple versions of information goods and selling essentially the
same product to different market segments at different prices is
called______________.
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Answer:A
190. The redirection of traffic from a legitimate site to an infringing site is called
______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Answer:B
193. Creating multiple versions of information goods and selling essentially the
same product to different market segments at different prices is
called______________.
A. versioning
B. bundling.
C. transitive content
195. ______________ are networks that connect people within a company to each
other and to the company network.
A. bitstreams
B. extranets
C. internets
D. intranets
Answer:D
199. ______________ is a program that you can run from the DOS prompt in the
Windows operating system in order to check the connection between your client
and the server.
A. ping
B. telnet
C. tracert
D. ssl
Answer:A
200. Which of the following is a new and disruptive Web feature or service?
A. xml
B. diffserv
C. blogs
D. cdma
Answer:C