Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Set A

1. The dimension of e-commerce that enables commerce across national boundaries is called ……
A. interactivity. B. global reach. C. richness. D. ubiquity.
2. _______________ is the encompassing term that involves the use of electronic platforms -
intranets, extranets and the Internet - to conduct a company's business.
A. E-marketing. B. E-business C. E-procurement. D. E-commerce
3. Which one of the following is not one of the major types of e-commerce?
A. C2B. B. B2C. C. B2B. D. C2C.
4. All of the following are technologies used to gather information about you online except ______.
A. spy ware. B. cookies. C. Gmail. D. anonymizers.
5. ___ is a feature provided for ensuring that the transaction is completed with regard to the
business rules set by the management.
a. Advocacy b. Authorization c. Signature d. Policy formulation
6. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ____
A. phishing. B. pharming. C. a Denial of Service (DoS) attack. D. spoofing.
7. All of the following are examples of 2G wireless phone technologies except _______.
A. CDMA. B. W-CDMA. C. TDMA. D. GSM.
8. A _________ describes the flow of information at your e-commerce site and the infrastructure
that will be used in the system.
A. system design. B. logical design. C. tactical design D. physical design.
9. The Bitcoin was introduced in this world by?
A. Stuart Haber B. W. Scott Stornetta C. Satoshi Nakamoto D. Dave Bayer
10. The only payment system that is instantly convertible without intermediation is _______.
A. Credit card. B. Accumulating balance. C. Stored value. D. Cash.
Set B
1. The architecture of the MIS plan provides:
a. A way to handle the system or subsystem by way of simplificatio0n, coupling, and
decoupling of subsystems.
b. For preparing the schedule of the system in the overall information requirement
c. Online information on the stocks markets and the accounts balance
d. None of these
2. In the e-commerce security environment, which of the following constitutes the inner-most
layer?
a. people. B. data. C. technology solutions. D. organizational policies and procedures.
3. All of the following are major categories of computer viruses except _____.
a. Macro viruses. B. File-infecting viruses. C. Script viruses. D. Trojan viruses.
4. A worm is designed to spread _________.
a. from computer to computer. B. from file to file on a computer. C. from Web site to Web
site. D. from Web site to computer
5. E-business can be defined as_______.
a. the uninhibited flow of information and goods on the Web. B. the use of the Internet
and the Web to transact business. C. digitally enabled transactions and processes within
an organization. D. commercial transactions involving electronic goods
6. Firewalls perform all of the following functions except ______.
a. Forbids communications from untrustworthy sources. B. Allows communications from
trustworthy sources. C. Eliminates viruses and other malicious attacks. D. Filters traffic
based on packet attributes.
7. The only payment system that is instantly convertible without intermediation is _______.
a. Credit card. B. Accumulating balance. C. Stored value. D. Cash.
8. ___ is an organized portfolio of formal systems for obtaining processing and delivering
information in support of the business operations and management of an organization.
a. MIS b. DSS c. MRS d. None of the above
9. Why wireless communication is used?
i. It enables billions of people to connect to the Internet
ii. Lowers the cost of network infrastructure
iii. Makes services more inexpensive
iv. All of the mentioned
10. Which of the following statement is true about bitcoin?
i. There is no central server; the bitcoin network is peer-to-peer
ii. There is no central storage; the bitcoin ledger is distributed
iii. The ledger is public; anybody can store it on their computer
iv. All of the above

You might also like