E-Commerce MCQs : This section focuses on the "E-Commerce". These Multiple Choice Questions (MCQs) should be practiced to improve the E-Commerce skills required for various interviews (campus interview, walk-in interview, company interview), placement, entrance exam and other competitive examinations.
Question 1
________________ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format
A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Question 2
.__________________ is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters
A. e-commerce
B. commerce
C. both of these
D. none
Question 3
._____________________is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.
A. converging structure
B. diverging structure
C. any of these
D. none
Question 4
____ is an online retail store.
A. portal
B. service provider
C. e-tailer
D. content provider
Question 5
____ means that the information being displayed on a Web site/transmitted/received overthe Internet has not been changed in any way by an un-authorised party.
A. integrity
B. authenticity
C. authorisation
D. none of these
Question 6
_____ allows you paperless transaction.
A. edi
B. electronic market
C. e-commerce
D. internet commerce
Question 7
_____ can read the cipher text.
A. sender
B. receiver
C. any one
D. no one
Question 8
_____ changes URL from http to https.
A. ssl
B. set
C. e-commerce
D. m-commerce
Question 9
_____ is an art of attempting to acquire information by masked as trustworthy entity.
A. hacking
B. phishing
C. sniffing
D. spoofing
Question 10
_____ means converting cipher text to plain text.
A. encryption
B. decryption
C. conversion
D. de-conversion
Question 11
_____ means the information being displayed on a Web site or transmitted or receivedover the Internet has not been changed in any way by an unauthorized party.
A. integrity
B. confidentiality
C. authenticity
D. privacy
Question 12
______ are sites that creates a digital online environment where people with similarinterest can transact.
A. community provider
B. market creator
C. portal
D. service provider
Question 13
______ means converting plain text to cipher text.
A. encryption
B. decryption
C. conversion
D. de-conversion
Question 14
______ means converting readable text to unreadable text.
A. conversion
B. decryption
C. encryption
D. decoding
Question 15
______ means converting unreadable text to readable text.
A. conversion
B. decryption
C. encryption
D. decoding
Question 16
______ means found everywhere.
A. universal
B. ubiquity
C. global
D. local
Question 17
________ is an example of an auction site
A. e-bay
B. Ibibo
C. Facebook
D. Orkut
Question 18
________ is virtual representation of physical market.
A. edi
B. electronic market
C. e-commerce
D. internet commerce
Question 19
__________ is a best example of Online Stored Value System.
A. google
B. yahoo
C. paypal
D. go daddy
Question 20
____________ are networks that connect people within a company to each other and to thecompany network.
A. Internets
B. Intranets
C. Extranets
D. Components
Question 21
______________ are networks that connect people within a company to each other andto the company network.
A. bitstreams
B. extranets
C. internets
D. intranets
Question 22
______________ includes all electronics-based information exchanges within or between companies and customers.
A. E-commerce
B. E-marketing
C. E-communication
D. E-business
Question 23
______________ influence the behavior of others through their personality, skills, or otherfactors.
A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups
Question 24
______________ influence the behavior of others through their personality, skills, orother factors.
A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups
Question 25
______________ is a program that you can run from the DOS prompt in the Windowsoperating system in order to check the connection between your client and the server.
A. ping
B. telnet
C. tracert
D. ssl
Question 26
”Google” is one of the most popular____________________
A. portal
B. browser
C. search engine
D. none of these
Question 27
”Google” is one of the most popular____________________ a)Portal b)Browser c)Search Engine d)none of these50. A _______________________ presents information from diverse sources in a unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these
Question 28
______________Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 29
______________sites act as an intermediary between someone wanting a product or service andpotential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Question 30
______________sites act as an intermediary between someone wanting a product or serviceand potential providers
A. brokering sites
B. information sites
C. industry portals
D. none of these
Question 31
_________________allows the person to type ion just the main word or words and the site will come in
A. Web page
B. home page
C. domain
D. none of these
Question 32
_________________allows the person to type ion just the main word or words and the site willcome in
A. web page
B. home page
C. domain
D. none of these
Question 33
_________________e-commerce transaction has the advantage of eliminating middlemen.
A. b2g
B. b2c
C. b2b
D. b2e
Question 34
_________________e-commerce transaction has the advantage of eliminating middlemen.
A. B2G
B. B2E
C. B2B
D. B2C
Question 35
_________________focus on producing a highly integrated value proposition through a managed process.
A. hubs
B. community
C. contents
D. none of these
Question 36
_________________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.
A. debit card
B. credit card
C. electronic purse
D. any of these
Question 37
_________________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Question 38
_______________ provide security and privacy for the use of the web page content
A. HTTP
B. html
C. FTP
D. none of these
Question 39
_______________cards and ____________ cards are two ways to make payments on a web site
A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above
Question 40
_______________ is a form of supply chain where a series of assembly operations are carried out toobtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Question 41
_______________ is a form of supply chain where a series of assembly operations are carriedout to obtain the final product
A. converging supply chain
B. diverging supply chain
C. any of these
D. none
Question 42
_______________ is a systems approach to Managing the entire flow of information, materials, andservices from raw material suppliers through factories and warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Question 43
_______________ is an approach to deliver information differentiated business values called servicesby combining the system and process generally called resources
A. E-business
B. E-commerce
C. any of these
D. none
Question 44
__________________is essentially a business process that connects manufacturers, retailers,customers and suppliers in the form of a chain to develop and deliver products.
A. E-commerce
B. EDI
C. SCM
D. Networking
Question 45
____________________is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Question 46
____________________is a kind of payment card that transfers fund directly from theconsumer’s bank account to the merchants account
A. debit card
B. electronic purse
C. credit card
D. any of these
Question 47
____________________is a set of standards developed in the 1960s to exchange business informationand to do electronic transactions
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Question 48
____________________are general interest portals covering a wide range of topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 49
____________________is concerned with the buying and selling information, products and services overcomputer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Question 50
____________________is concerned with the buying and selling information, products andservices over computer communication networks
A. commerce
B. e-commerce
C. e-business
D. none of these
Question 51
____________________is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 52
__________________ acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 53
__________________ always operate on intranet
A. e--commerce
B. e-business
C. edi
D. none of these
Question 54
__________________ and _____________________ were the enabling technologies that laid the ground work for E- commerce
A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these
Question 55
__________________ in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer
Question 56
__________________ is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. merchant
D. acquirer
Question 57
__________________ is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.
A. customer
B. issuer
C. merchant
D. acquirer
Question 58
_______________________are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Question 59
__________________ is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Question 60
_______________________are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.
A. network firewall
B. computer virus
C. both of these
D. none of these
Question 61
__________________ is an early form of E-commerce
A. scm
B. edi
C. both of these
D. none of these
Question 62
_______________________is an unsolicited e-mail sent to every e-mail address that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 63
__________________ is the exchange of goods or items or commodities and services or applicationsused for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none
Question 64
_______________________is the buying and selling of goods and services through wireless handleddevices such as cellular phone and Personal Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Question 65
__________________ is the most common way for purchasing an online advertising
A. CPM
B. CPC
C. Any of these
D. none of these
Question 66
_____________________ ads take up the entire screen and are more powerful than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 67
_____________________ are interactive online ads that require the user to respond intermittently inorder to wade through the message before reaching the intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Question 68
_____________________ e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network
A. B2G
B. B2E
C. B2B
D. B2C
Question 69
_____________________ e-commerce involves customers gathering information, purchasing andreceiving products over an electronic network
A. b2g
B. b2e
C. b2b
D. b2c
Question 70
_____________________ e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.
A. c2c
B. b2e
C. b2b
D. b2g
Question 71
_____________________ e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.
A. B2G
B. B2E
C. B2B
D. C2C
Question 72
_____________________ is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Question 73
_____________________ is a financial instrument which can be used more than once to borrowmoney or buy products and services on credit.
A. credit card
B. e-cheques
C. e-cash
D. none of these
Question 74
_____________________ is an internet network that allows users with the same network in software toconnect to each other’s hard disks and exchange files
A. P2P
B. B2E
C. B2B
D. B2C
Question 75
_____________________ is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files
A. b2c
B. b2e
C. b2b
D. p2p
Question 76
_____________________ is the first page of a web site.
A. web page
B. home page
C. domain
D. none of these
Question 77
_____________________ is the reverse process of encryption, to make the information readable onceagain
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Question 78
__________________________card is a model of IPS
A. Smart
B. Debit
C. Credit
D. All the above
Question 79
__________________________e-commerce consists of the sale of products or services from a business tothe general public
A. B2G
B. B2E
C. B2B
D. B2C
Question 80
__________________________e-commerce consists of the sale of products or services from abusiness to the general public
A. b2g
B. b2e
C. b2b
D. b2c
Question 81
__________________________streamlines the flow of information and self service capabilities throughautomation
A. SCC
B. CRM
C. CRP
D. SCM
Question 82
________________________card is a card with a built-in chip capable of storing information in itsmemory
A. Debit
B. Credit
C. Smart
D. None of the above
Question 83
__________________________streamlines the flow of information and self service capabilitiesthrough automation
A. scc
B. crm
C. crp
D. scm
Question 84
________________________ is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Question 85
________________________ is an online auctioning site that facilitates the trade of privatelyowned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Question 86
________________________ website is one that changes or customizes itself frequently and automaticallybased on certain criteria
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Question 87
______________________________________ads appears as rectangular graphics near the top of the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 88
_________________________________is an application of smart card
A. ATM
B. Telecommunication
C. Transportation
D. None of the above
Question 89
___________________________cards directly transfer funds from consumers bank account to themerchant’s
A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above
Question 90
___________________________ allows the transfer of money itself
A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above
Question 91
___________________________ credit card gives all the advantages of a normal credit card without worryingabout the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Question 92
___________________________ credit card gives all the advantages of a normal credit cardwithout worrying about the interest charges
A. prepaid
B. post paid
C. both of these
D. none of these
Question 93
___________________________ is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Question 94
________________________are special type of software meant for limiting the risks of being hit bycomputer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 95
________________________encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Question 96
________________________encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.
A. ssl
B. set
C. both of these
D. none of these
Question 97
________________________facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Question 98
________________________facility helps the customer to pay only a small amount of the totaloutstanding and revolve the rest of the payment to the next month.
A. cash advance
B. revolver
C. tele draft
D. none of these
Question 99
________________________is a form of supply chain where a wide variety of finished goods are producedwith limited number of raw material or components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Question 100
________________________is basically a TV commercial that runs in the browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 101
________________________is the exchange of services, information or product from one business to agovernment agency
A. B2G
B. B2E
C. B2B
D. P2P
Question 102
________________________is the exchange of services, information or product from onebusiness to a government agency
A. b2g
B. b2e
C. b2b
D. p2p
Question 103
______________________________ is a form of advertisement on the web that appears between web pagesthat the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 104
_____________________is the process of making information unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Question 105
_____________________is a class of advertising methods which are considered unethical and may evenbe illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Question 106
__________________are animated full screen ads placed at the entry of a site before a user reachesthe intended content.
A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Question 107
_____________________is an application layer protocol for distributed, collaborative, hypermedia information systems.
A. html
B. http
C. bothe of these
D. none of these
Question 108
_____________________is an application layer protocol for distributed, collaborative, hypermediainformation systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Question 109
_____________________is basically a concept of online marketing and distributing of products andservices over the internet
A. B2G
B. B2E
C. B2B
D. B2C
Question 110
__________________attacks are difficult and are only successful if the attacker knows somethingabout the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Question 111
_____________________is basically a concept of online marketing and distributing of productsand services over the internet
A. b2g
B. b2e
C. b2c
D. b2b
Question 112
__________________is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means
A. E-commerce
B. SCM
C. EDI
D. None of these
Question 113
__________________is a commercial process that includes production, distribution, sales ordelivery of goods and services through electronic means
A. e-commerce
B. scm
C. edi
D. none of these
Question 114
__________________is a global web in which millions of users are communicating with each other withthe help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Question 115
__________________is a global web in which millions of users are communicating with eachother with the help of computers.
A. internet
B. www
C. both of these
D. none of these
Question 116
__________________is a type of EPS
A. Credit card
B. Debit card
C. Smart card
D. All the above
Question 117
_______________is an example for a software that visits suggested pages and return the appropriateinformation to be indexed by the search Engine
A. Robot
B. Spiders
C. Ants
D. All
Question 118
__________________is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networkswith the help of an electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Question 119
__________________is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
A. biometrics
B. pin
C. both of these
D. none of these
Question 120
__________________is basically a secure gate between our organization data and internet.
A. network firewall
B. antivirus
C. both of these
D. none of these
Question 121
__________________site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Question 122
__________________type of payment system is highly useful to those customers who would like tocontrol overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Question 123
__________________type of payment system is highly useful to those customers who wouldlike to control overspending,
A. prepaid
B. post paid
C. both of these
D. none of these
Question 124
__________________were the first to establish prominent E-commerce Brands
A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these
Question 125
_______________allows a business application on the computer of one organization to communicatedirectly with the business application on the computer of another company.
A. EDI
B. Protocols
C. Standards
D. Business applications
Question 126
_______________allows a business application on the computer of one organization tocommunicate directly with the business application on the computer of another company.
A. edi
B. protocols
C. standards
D. business applications
Question 127
_________refers to a kind of e-commerce which refers to a company selling or buying from othercompany
A. B2G
B. B2E
C. B2B
D. P2P
Question 128
_________refers to a kind of e-commerce which refers to a company selling or buyingfrom other company
A. b2g
B. b2e
C. b2b
D. p2p
Question 129
A portal that helps to establish relations and to conduct transactions between variousorganizations is termed as__________________
A. b2b portals
B. c2c portals
C. both of these
D. none of these
Question 130
A ______________ is the set of planned activities designed to result in a profit in amarketplace.
A. business model
B. profit model
C. business plan
D. revenue model
Question 131
A __________________ is a document, typically written in plain text interspersed with formattinginstructions of html
A. Web page
B. home page
C. domain
D. none of these
Question 132
A __________________ is a document, typically written in plain text interspersed withformatting instructions of html
A. web page
B. home page
C. domain
D. none of these
Question 133
A _______________________ presents information from diverse sources in a unified way in aweb site
A. web portal
B. link page
C. both of these
D. none of these
Question 134
A _______________________ Presents information from diverse sources in a unified way in aweb site.
A. web portal
B. link page
C. both of these
D. none of these
Question 135
A ________________________ is a software that scours the internet collecting data about every websiteand every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Question 136
A ________________________ is a software that scours the internet collecting data about everywebsite and every webpage within it
A. spiders
B. search engines
C. robots
D. none of these
Question 137
A __________________is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Question 138
A __________________is an electronic file that uniquely identifies individuals and websites onthe internet and enables secure confidential communications
A. digital signature
B. digital certificates
C. ssl
D. none of these
Question 139
A combination of software and information designed to provide security and information for payment is called a what?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Question 140
A combination of software and information designed to provide securityand information for payment is called a?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Question 141
A business cannot be all things to all people. Instead, a business must:
A. identify target customers
B. identify the value of products/services as perceived by customers
C. all of the above
D. none of the above
Question 142
A business competing in a commodity like environment must focus on which of the following?
A. price
B. ease / speed of delivery
C. ease of ordering
D. all of the above
Question 143
A business competing in a commodity like environment must focus onwhich of the following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
Question 144
A company that manufacturers bicycles may use the internet to purchase tyres from theirsuppliers. This is an example of___________transaction.
A. B2G
B. B2E
C. B2B
D. P2P
Question 145
A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of___________transaction
A. b2g
B. b2e
C. b2b
D. p2p
Question 146
A digital signature is required _____i) to tie an electronic message to the sender’s identityii) for non repudiation of communication by a sender
A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv
Question 147
A hardened firewall host on an Intranet is
A. a software which runs in any of the computers in the intranet
B. a software which runs on a special reserved computer on the intranet
C. a stripped-down computer connected to the intranet
D. a mainframe connected to the intranet to ensure security
Question 148
A materials requirements planning (MRP) system is an example of ______________.
A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange
Question 149
A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?
A. switching costs
B. loyalty programs
C. entry barriers
D. affiliate programs
Question 150
A security plan begins with a(n) is ______________.
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Question 151
A strength of social media and viral marketing is:
A. Cannot be ignored in user's inbox
B. Considered credible
C. It is possible to reach a large number at relatively low cost
D. Highly targeted with controlled costs
Question 152
A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as:
A. Value chain and marketplace positioning
B. Value proposition
C. Online business model
D. Revenue model and cost base
Question 153
A web page is transferred to users computer through __________________________
A. html
B. ftp
C. http
D. none of these
Question 154
A website offering content created by third party transparently to customers is anexample of ______________.
A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order
Question 155
A(n) __________ is a private corporate network that uses standard Internet protocolsand interfaces.
A. ethernet
B. extranet
C. local area network
D. intranet
Question 156
A(n) ______________ represents data as two-dimensional tables with recordsorganized in rows and attributes in columns.
A. database management system
B. data warehouse
C. sql query
D. relational database
Question 157
A__________________ is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Question 158
A_____________________ provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Question 159
A_______________portal is a specialized entry point to a specific market place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 160
A_______________portal is a specialized entry point to a specific market place or industryniche.
A. vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 161
ACH is
A. Acid consistency house
B. Automated clearing house
C. Automated consistency house
D. None of the above
Question 162
Acid testis a set of properties of money transfer that include
A. Atomicity and isolation
B. Consistency and durability
C. Both (a) and (b)
D. None of the above
Question 163
Advantage of e-com is
A. Lower cost
B. Economy
C. Higher margins
D. All of the above
Question 164
Advantages of B2C commerce are(i) Business gets a wide reach to customers(ii) Payment for services easy(iii) Shop can be open 24 hours a day seven days a week(iv) Privacy of transaction always maintained
A. i and ii
B. ii and iii
C. i and iii
D. iii and iv
Question 165
Advantages of e-commerce are
A. Low cost
B. Economical
C. Productivity gains
D. All the above
Question 166
Advertisements take the form of a website copy are called______________________________
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 167
Affiliate revenue is also called as _______.
A. commission
B. brokerage
C. referral fee
D. discount
Question 168
All of the following are major categories of computer viruses except ______________.
A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses
Question 169
All of the following are techniques B2C e-commerce companies use to attract customers, except:
A. registering with search engines
B. viral marketing
C. online ads
D. virtual marketing
Question 170
All of the following are techniques B2C e-commerce companies use toattract customers, except
A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
Question 171
All of the following are technologies used to gather information about you onlineexcept ______________.
A. spy ware
B. cookies
C. gmail
D. anonymizers
Question 172
All of the following are types of social marketing except ______________.
A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising
Question 173
An electronic check is one form of what?
A. e-commerce
B. online banking
C. e-cash
D. check
Question 174
An industry is less attractive for suppliers when the rivalry among existing competitors is:
A. high
B. low
C. more
D. less
Question 175
An industry is less attractive for suppliers when the rivalry among existingcompetitors is:
A. High
B. Low
C. More
D. Less
Question 176
An online retail store is called as _____.
A. trader
B. retailer
C. e-tailer
D. amazon
Question 177
Applications of smart card are:
A. Government
B. Identification
C. Health care
D. All the above
Question 178
B2B2C is a model of
A. E-commerce
B. E-business
C. Data mining
D. None of the above
Question 179
Barriers to entry into an industry are likely to be high if:
A. Switching costs are low
B. Differentiation is low
C. Requirement for economies of
D. Access to distribution
Question 180
Before developing any type of strategy, a management team needs to agree the process they will follow for generating and then implementing the strategy. A framework that gives a logical sequence to follow to ensure inclusion of all key activities of an ebusiness strategic development is generally known as:
A. An E-channel strategy
B. E- business stratification process
C. A strategy process model
D. Multi-channel e-business strategy
Question 181
BitTorrent.Com is an example of _____
A. b2b
B. b2c
C. c2c
D. p2p
Question 182
BPM is about:
A. Aligning business processes toorganisational
B. Maintaining a process view of the organisation ratherthan a functional
C. Establishing and maintaining an environment ofcontinuous
D. All of the above
Question 183
By electronic commerce we mean:
A. Commerce of electronic goods
B. Commerce which depends on electronics
C. Commerce which is based on the use of internet
D. None of the above
Question 184
Complete price transparency in a perfect information marketplace is necessary for______________ to take effect.
A. bertrand\s law
B. the law of universal prices
C. the law of one price
D. the law of perfect commerce
Question 185
Companies use___________________________networks to automate employee related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Question 186
Companies use___________________________networks to automate employee related Corporateprocesses.
A. b2g
B. b2e
C. b2b
D. p2p
Question 187
Conversion of Plain text to Cipher Text is called__________________
A. Encryption
B. Decryption
C. Cryptography
D. none of these
Question 188
Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as______________________________.
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Question 189
Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Question 190
Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
A. versioning
B. bundling.
C. transitive content
D. price discrimination
Question 191
Credit cards _______________convenient for making small purchases
A. Are
B. Are not
C. Both (a) and (b)
D. None of the above
Question 192
CRM is :
A. Customer Relationship
B. Customer Relationship
C. Customer Recovery
D. Consumer Relation
Question 193
Currency used in e-business transactions around the world
A. Dollars
B. Rupees
C. None of the above
D. All the above
Question 194
Debit card is used for
A. On line transactions
B. Off line transaction
C. Both (a) and (b)
D. None of the above
Question 195
Digital Accumulating Balance Payment System is generally used for ______ payments.
A. micro
B. macro
C. credit card
D. debit card
Question 196
Digital products are best suited for B2C e-commerce because they:
A. are commodity like products
B. can be mass-customized and personalized
C. can be delivered at the time of purchase
D. all of the above
Question 197
Digital Products are best suited for B2C e-commerce because they:
A. Are commodity like products
B. Can be mass- customized and
C. Can be delivered at the time of
D. All of the mentioned
Question 198
Digital products are best suited for B2C e-commerce because they:
A. Are commodity like products
B. Can be mass-customised and personalised
C. Can be delivered at the time of purchase
D. All of the above
Question 199
Disadvantages of e-Commerce in India are(i) internet access is not universally available(ii) credit card payment security is not yet guaranteed(iii) transactions are de-personalized and human contact is missing(iv) cyberlaws are not in place
A. i and ii
B. ii and iii
C. i, ii, iii
D. i, ii, iii, iv
Question 200
E-commerce involves
A. marketing
B. advertising
C. warehousing
D. all of the above
Question 201
E-commerce is
A. B2C
B. B2B
C. C2B
D. All the above
Question 202
E-Commerce Lacks _______ touch.
A. social
B. smooth
C. personal
D. communication
Question 203
E-commerce technologies have improved upon traditional commerce technologies in______________.
A. richness
B. reach
C. both richness and reach
D. neither richness nor reach
Question 204
EFT is a computer based system
A. TRUE
B. FALSE
C. none
D. all
Question 205
Electronic Exchange of business documents in a standard format is known as __________________
A. E-commerce
B. E-Business
C. EDI
D. None of these
Question 206
Electronic Exchange of business documents in a standard format is known as__________________
A. e-commerce
B. e-business
C. edi
D. none of these
Question 207
Electronic payment is a financial transaction made ____________The use of paper documents
A. With
B. Without
C. Both (a) and (b)
D. None of the above
Question 208
Electronic payment media can be grouped into
A. Trusted third party type
B. Notational fund transfers related type
C. Authentication type
D. All the above
Question 209
E-mail which contain useless material is termed as___________________________
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Question 210
E-mail which contains useless material is termed as_______________
A. spam
B. useless mail
C. trunk mail
D. junk mail
Question 211
E-money has_______________.types
A. 3
B. 4
C. 5
D. 6
Question 212
E-money is a _______________medium for making payments
A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above
Question 213
EFT is
A. Electronic Fund Transfer
B. Electrical fund transfer
C. Electronic fast transfer
D. None of the above
Question 214
English physicist Tim Berner’s Lee was famous for the establishment of _______________________in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Question 215
English physicist Tim Berner’s Lee was famous for the establishment of_______________________in 1990.
A. internet
B. www
C. intranet
D. none of these
Question 216
ERP stands for
A. enterprise resolution planning
B. enterprise reverse planning
C. enterprise resource planning
D. none of the above
Question 217
E-tailer can be Pure Plays or _______ .
A. impure plays
B. indirect plays
C. bricks & clicks
D. direct plays
Question 218
E-Tailer revenue model is ______ revenue.
A. sales
B. subscription
C. advertising
D. affiliate
Question 219
Flipkart.com is an example of _______.
A. b2b
B. b2c
C. c2c
D. p2p
Question 220
Gain entry into the user’s system and scan your file system for personal information isknown as__________________.
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Question 221
Google.com is an example of a:
A. Destination site
B. Portal
C. Search engine
D. None of the above
Question 222
he dimension of e-commerce that enables commerce across national boundaries is called______________.
A. interactivity
B. global reach
C. richness
D. ubiquity
Question 223
How the transactions occur in e-commerce?
A. using e-medias
B. using computers only
C. using mobile phones only
D. none of the above
Question 224
Identify the identity of a person or entity with whom you are dealing on Internet is knownas ______.
A. integrity
B. authenticity
C. authorisation
D. none of these
Question 225
amazon.com is an example of ______
A. b2b
B. b2c
C. c2c
D. p2p
Question 226
Amazon.com is well-known for which e-commerce marketing technique?
A. banner ads
B. pop-up ads
C. affiliate programs
D. viral marketing
Question 227
Among the alternate models of B2B e-commerce,______is the best means to obtain acompetitive advantage in the Market place.
A. process based
B. strategic relationship based
C. transaction based
D. any of these
Question 228
If it is easy for competitors to enter the market, the threat of new entrants is considered:
A. high
B. low
C. more
D. less
Question 229
If it is easy for competitors to enter the market, the threat of new entrantsis considered:
A. High
B. Low
C. More
D. Less
Question 230
If the threat of substitute products or services is low it is a(n):
A. disadvantage to the supplier
B. advantage to the buyer
C. advantage to the supplier
D. none of the above
Question 231
If you need to transfer money to another person via the internet, which of the following methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Question 232
If you need to transfer money to another person via the internet, which ofthe following methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Question 233
In ____ server-side authentication is compulsory.
A. ssl
B. set
C. e-commerce
D. m-commerce
Question 234
In _______ user can share files and computer resources directly.
A. b2b
B. b2c
C. c2c
D. p2p
Question 235
In _______, one consumer deals with another consumer.
A. c2c
B. b2c
C. b2b
D. p2p
Question 236
In ________ encryption is performed with session key.
A. public key
B. private key
C. ssl
D. set
Question 237
In _______________________type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
A. prepaid
B. post paid
C. both of these
D. none of these
Question 238
In Biometrics,______________________________ID system is designed to prevent more than one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Question 239
In Biometrics,______________________________ID system is designed to prevent one person from usingmore than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Question 240
In Biometrics,______________________________ID system is designed to prevent one personfrom using more than one identity
A. positive id system
B. negative id system
C. both of these
D. none of these
Question 241
In Porter's Five Forces, the 'threat of new entrants' relates to:
A. Barriers to entry
B. Substitutes
C. Switching costs
D. Buyer power
Question 242
In Public Key Encryption ______ key is used for Decryption.
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
Question 243
In Public Key Encryption ______ key is used for Encryption.
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
Question 244
In public key encryption ______ keys are used.
A. public and private
B. only public
C. only private
D. session
Question 245
In SSL _______ key is used for encryption.
A. public
B. private
C. session
D. otp
Question 246
In SSL encryption is done using ____ key.
A. public
B. private
C. session
D. symmetric
Question 247
In SSL URL will change from HTTP to _______.
A. cipher text
B. https
C. shttp
D. smtp
Question 248
In traditional commerce, people buy goods and services:
A. over the internet
B. physical visit
C. Both online & offline
D. None of the mentioned
Question 249
In which one of the following type of E-Commerce, consumer sells to consumer directly?
A. C2B
B. B2C
C. B2B
D. C2C
Question 250
In which website Global Easy Buy is facilitated?
A. ebay.com
B. amazon.com
C. yepme.com
D. none of these
Question 251
In which year the IT Act was introduced?
A. 2000
B. 2020
C. 2001
D. 2010
Question 252
In_____________________., each transaction must be independent
A. Consistency
B. Isolation
C. Durability
D. None of the above
Question 253
India has enacted the first IT Act in the year________________________
A. 2001
B. 2002
C. 2009
D. 2000
Question 254
India has enacted the first IT Act in the year__________________________________________
A. 2001
B. 2002
C. 2009
D. 2000
Question 255
Industry structure is defined as ______________.
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company\s product or service fulfills the needs of customers
Question 256
Information sent over the Internet commonly uses the set of rules called_____________________________
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Question 257
Information sent over the Internet commonly uses the set of rulescalled________________________
A. tcp/ip
B. ftp
C. http
D. gopher
Question 258
Internet users account for about ______________ of the world's population.
A. 7%
B. 17%
C. 27%
D. 47%
Question 259
Logistics is the part of a supply chain involved with the forward and reverse flow of
A. goods
B. services
C. cash
D. All of the above
Question 260
Main models of internet based payment system are:
A. Electronic currency
B. Credit card
C. Debit card
D. All the above
Question 261
Materials used in the normal operation of a business but not related to primary business operations are called what?
A. supplies
B. direct materials
C. indirect materials
D. daily stuff
Question 262
Materials used in the normal operation of a business but not related toprimary business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Question 263
Mobile commerce is same as
A. E-commerce
B. E-business
C. Data mining
D. None of the above
Question 264
Monster.com is an example of __________________________website
A. c2c
B. b2e
C. b2b
D. b2c
Question 265
Most common uses of the Internet and the Web include communicating, shopping,
A. searching, entertainment, and education
B. e-commerce, e-mail, and searching
C. e-mail, entertainment, and education
D. e -commerce, e-mail, and education
Question 266
Most individuals are familiar with which form of e-commerce?
A. b2b
B. b2c
C. c2b
D. c2c
Question 267
Moving from one Web site to another is called
A. jumping
B. moving
C. surfing
D. applying
Question 268
Normally in M-commerce language used to create web pages is _______.
A. html
B. wml
C. vb
D. xml
Question 269
olx.com is an example of ________
A. b2b
B. b2c
C. c2c
D. p2p
Question 270
Once segments have been identified, organizations need to define how best to position their online services relative to competitors according to four main variables: product quality, service quality, and fulfillment time. Which variable is missing?
A. After sales service
B. Brand perception
C. Customer value
D. Price
Question 271
Paisapay is facilitated in
A. ebay.co.in
B. amazon.com
C. flipkart.com
D. none of the above
Question 272
Paisapay is facilitated in__________________
A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above
Question 273
Payment systems via the internet include
A. Cyber cash
B. First virtual
C. Both (a) and (b)
D. None of the above
Question 274
Peer to Peer [P2P] is also used to describe ___________________________
A. c2c
B. b2e
C. b2b
D. b2c
Question 275
Peer to Peer [P2P] is also used to describe______________________________.
A. C2C
B. B2E
C. B2B
D. B2C
Question 276
Promotion of products in e-commerce can be done by
A. Social media
B. Online Ads
C. Blog
D. All of the mentioned
Question 277
Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt dataThe key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Question 278
Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt dataThe key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Question 279
RACE is a practical framework to help marketers manage and improve the commercial value gained from digital marketingThe term stands for Reach, Act, C, Engage. What does 'C' refer to?
A. Collaborate
B. Collect
C. Consolidate
D. Convert
Question 280
Reverse logistics is required because
A. Goods are defective
B. Goods are unsold
C. The customers simply change
D. All of the above
Question 281
Rules for exchanging data between computers are called
A. programs
B. procedures
C. protocols
D. hyperlinks
Question 282
Scope of E-Commerce is ______.
A. local
B. global
C. within own country
D. within own state
Question 283
Search Engines databases are selected and built by computer robot programscalled___________________________
A. spiders
B. Search Engines
C. robots
D. none of these
Question 284
Secure Sockets Layers does which of the following?
A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above
Question 285
Security is a serious concern for e-business managers and there are many potential risks concerning unauthorized access to customer and company data. One way this occurs is through misleading users through setting up a bogus website and gaining user details online. What is this method known as?
A. Denial of service
B. Phishing
C. Malware
D. Firewalling
Question 286
SET is developed by association led by _________.
A. master card and visa
B. master card
C. visa
D. rupay
Question 287
SET means __________________
A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these
Question 288
SET means _________________________________.
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Question 289
Smart card is same as______.
A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above
Question 290
Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category?
A. Portal, publisher or media sites
B. Brand-building sites
C. Transactional e-commerce sites
D. Services-orientated relationship-building websites
Question 291
SSL can be used only with _____.
A. ftp
B. http
C. pop
D. smtp
Question 292
Standards of EDI are decided by ______
A. ascii
B. ansi
C. usa
D. government
Question 293
The __________ is the multimedia interface to resources available on the Internet.
A. Web
B. ISP
C. browser
D. URL
Question 294
The ability to change the product to better fit the needs of the customer is called______________.
A. customization
B. personalization
C. privacy
D. accessibility
Question 295
The approach by which applications of internal and external electronic communications can support and influence strategy is a definition of:
A. Corporate Strategy
B. E-channel strategy
C. E-business strategy
D. E-business responsibility
Question 296
is an early form of E-Commerce.
A. SCM
B. EDI
C. Both SCM & EDI
D. None of the mentioned
Question 297
The best products to sell in B2C e-commerce are:
A. small products
B. digital products
C. specialty products
D. fresh products
Question 298
The best products to sell in B2C e-commerce are:
A. Small Products
B. Digital Products
C. Special Products
D. Fresh Products
Question 299
The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________.
A. tcp
B. ip
C. the network layer
D. the application layer
Question 300
The dimension of E-Commerce that enables commerce across the boundaries is called
A. interactivity
B. global reach
C. richness
D. ubiquity
Question 301
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as:
A. Business to Business (B2B).
B. Consumer to Business (C2B).
C. Business to Consumer (B2C).
D. Consumer to Consumer (C2C).
Question 302
The E-commerce domain that involves business activity initiated by the consumer andtargeted to businesses is known as ______________.
A. business to business (b2b)
B. consumer to consumer (c2c)
C. consumer to business (c2b)
D. business to consumer (b2c)
Question 303
The ethical principle which states that if an action is not right for all situations, then itis not right for any situation is known as ______________
A. the golden rule
B. slippery slope
C. no free lunch
D. universalism
Question 304
The fastest-growing application for the Internet is
A. going shopping
B. conducting research
C. playing games, reading, and listening to music
D. using e-mail
Question 305
The flip side of e-marketing is:
A. e-advertising
B. e-selling
C. e-commerce
D. e-purchasing
Question 306
The information Technology Act [IT ACT] came into effect on
A. 16th november 2000
B. 15th december 2000
C. 17th october 2000
D. none of these
Question 307
The majority of job seekers rely on which of the following?
A. word-of-mouth leads
B. employment agencies
C. internet and newspapers equally
D. internet only
Question 308
The most common method for gaining access to the Internet is through a __________.
A. dumb terminal
B. virtual provider or computer
C. point-to-point computer
D. provider or host computer
Question 309
The most common type of Internet crime according to the IC3 is ______________.
A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud
Question 310
The most prevalent online payment method is ______________.
A. paypal
B. checks
C. credit cards
D. debit
Question 311
The multimedia interface to the resources available on the Net is called the
A. World Wide Web
B. Internet
C. GUI interface
D. Server
Question 312
The percentage of people who visit web site and buy something is known as _____
A. hits
B. conversion rate
C. affiliate
D. walk-in-customer
Question 313
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Question 314
The practice of forging a return address on an e-mail so that the recipientis fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Question 315
In future, some suggest that the task of searching for suppliers and products may be taken over by computer programmes which have defined rules or some degree of intelligence that replicates human neural functioningThese programmes are known as:
A. Spider search engines
B. HTML
C. E-marketplace search engines
D. Software intelligent agents
Question 316
In ICES test, C means
A. Consistency
B. Complexity
C. Conservation
D. None of the above
Question 317
The primary source of financing during the early years of e-commerce was______________.
A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Question 318
The process of getting customers to pass along a company's marketing message tofriends, family, and colleagues is known as ______________
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Question 319
The purpose of __________________page is to provide links to other pages
A. Home page
B. Web page
C. Summary page
D. None of these
Question 320
The purpose of supply chain management is
A. provide customer
B. improve quality of a product
C. integrating supply and demand
D. increase production
Question 321
The redirection of traffic from a legitimate site to an infringing site is called______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Question 322
The sender and receiver will have the same key in _____ Key Encryption.
A. symmetric
B. asymmetric
C. public
D. private
Question 323
The solution for all business needs is
A. edi
B. erp
C. scm
D. none of the above
Question 324
The source of revenue in a subscription revenue model is ______________.
A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
D. fees for enabling or execution a transaction
Question 325
The technology behind M-commerce is based on ______.
A. http
B. https
C. wap
D. pop
Question 326
The term ISP refers to
A. internal software protocol
B. international shareware pool
C. Internet service provider
D. interface standard protocol
Question 327
The threat of new entrants is high when it is:
A. hard for customers to enter the market
B. hard for competitors to enter the market
C. easy for competitors to enter the market
D. easy for customers to enter the market
Question 328
The types of Business to Business e-commerce are ________________
A. Direct selling and support to Business
B. Industry portals
C. Information sites about a industry
D. All the above
Question 329
The user reaches this page when they specify the address of a website
A. home page
B. web page
C. summary page
D. none of these
Question 330
The verification of credit card is done by using_________________ with a communications link to themerchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Question 331
The verification of credit card is done by using_________________ with a communications linkto the merchants acquiring bank
A. credit card payment terminal
B. point of sale
C. all of these
D. none of these
Question 332
The way to hide digital information is through______
A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above
Question 333
These types of commercial Internet service providers are the most widely used
A. national service providers
B. regional service providers
C. centralized service providers
D. decentralized service providers
Question 334
This is a protocol which allows files to be transferred from one computer to another computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Question 335
This is a protocol which allows files to be transferred from one computer to anothercomputer
A. tcp/ip
B. ftp
C. http
D. none of these
Question 336
To accept a credit card for payment, we have to open a _____________________account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Question 337
To accept a credit card for payment, we have to open a _____________________account withour bank
A. savings bank
B. current account
C. merchant account
D. any of these
Question 338
To handle credit card transaction on internet _____ is developed by Visa and Master card.
A. ssl
B. set
C. sat
D. encryption
Question 339
Trade mark, copyright, patent law etc comes under the purview of________________________
A. data protection
B. telecommunication laws
C. intellectual property laws
D. none
Question 340
Unique value auction is mainly applies to?
A. new products
B. second hand products
C. engineering products
D. none of the above
Question 341
Unique value auction mainly applies to?
A. New products
B. Second hand products
C. Engineering products
D. None of the above.
Question 342
Web pages are prepared using their language as_____________________
A. html
B. ftp
C. http
D. none of these
Question 343
What are ballpoint pens purchased by a clothing company?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Question 344
What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Question 345
What are materials that are necessary for running a modern corporation,but do not relate to the company’s primary business activities?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Question 346
What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Question 347
What are materials used in production in a manufacturing company orare placed on the shelf for sale in a retail environment?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Question 348
What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and GoogleChrome examples of?
A. Web servers
B. Web browsers
C. Web application servers
D. All of the above
Question 349
What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
A. customer relationship management systems cards
B. e-government identity cards
C. fedi cards
D. smart cards
Question 350
What are plastic cards the size of a credit card that contains anembedded chip on which digital information can be stored?
A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards
Question 351
What automates business processes?
A. workflow
B. asp
C. workflow system
D. eip
Question 352
What charts (1) the cost to your organisation of the unavailability ofinformation and technology and (2) the cost to your organisation of recovering from a disaster over time?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Question 353
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?
A. risk management
B. risk assessment
C. security
D. none of the above
Question 354
What could be an implication for an organization if an e-business strategy is not clearlydefined?
A. Clear direction of e-business strategy
B. Effective integration of e-business at a technical level
C. Greater opportunities from evaluation of opportunities
D. None of the above are applicable
Question 355
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
A. workflow
B. eip
C. workflow system
D. sla
Question 356
What defines all of the steps or business rules, from beginning to end,required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
Question 357
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
A. performance
B. capacity planning
C. benchmarking
D. data cleansing
Question 358
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Question 359
What determines the future IT infrastructure requirements for newequipment and additional network capacity?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Question 360
What does EDI stand for?
A. Electronic Data Interface
B. E-Commerce Data Interface
C. Electronic Data Interaction
D. Electronic Data Interchange
Question 361
What floods a Web site with so many requests for service that it slows down or crashes?
A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Question 362
What floods a Web site with so many requests for service that it slowsdown or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
Question 363
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Question 364
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Question 365
What is a detailed process for recovering information or an IT system inthe event of a catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Question 366
What is a model of a proposed product, service, or system?
A. prototyping
B. prototype
C. proof-of-concept prototype
D. selling prototype
Question 367
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Question 368
What is a separate and fully equipped facility where the company canmove immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Question 369
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Question 370
What is a separate facility that does not have any computer equipmentbut is a place where the knowledge workers can move after the disaster?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Question 371
What is a set of conditions used to measure how well a product or system functions?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Question 372
What is a set of conditions used to measure how well a product orsystem functions?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Question 373
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?
A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Question 374
What is a type of virus that spreads itself, not just from file to file, butfrom computer to computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
Question 375
What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Question 376
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
A. client/server network
B. intranet
C. extranet
D. thin client
Question 377
What is an intranet that is restricted to an organisation and certainoutsiders, such as customers and suppliers?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Question 378
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
A. client/server network
B. intranet
C. extranet
D. thin client
Question 379
What is another name for materials which cannot be linked to a specificproduct or process?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Question 380
What is another name for?
A. direct materials
B. indirect materials
C. edi
D. none of the above
Question 381
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about?
A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above
Question 382
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?
A. web log
B. clickstream
C. anonymous web browsing service
D. none of the above
Question 383
What is the first step in a P3P-enabled transaction?
A. send web page
B. http get request web page
C. send p3p policy files
D. http get request p3p policy files
Question 384
What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?
A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
Question 385
What is the name for direct computer-to-computer transfer of transactioninformation contained in standard business documents?
A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
Question 386
What is the name given to an interactive business providing a centralisedmarket where many buyers and suppliers can come together for ecommerce or commerce-related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Question 387
What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e-commerce or commerce-related activities?
A. direct marketplace
B. b2b
C. b2c
D. electronic marketplace
Question 388
What is the percentage of customers who visit a Web site and actually buy something called?
A. affiliate programs
B. click-through
C. spam
D. conversion rate
Question 389
What is the percentage of customers who visit a Web site and actuallybuy something called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
Question 390
What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?
A. b2b marketplace
B. intranet
C. reverse auction
D. internet
Question 391
What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets?
A. Risk management
B. Risk assessment
C. Security
D. None of the above
Question 392
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
A. risk management
B. risk assessment
C. security
D. none of the above
Question 393
What is the process of making a copy of the information stored on a computer?
A. backup
B. anti-virus
C. firewall
D. biometrics
Question 394
What items are traded in e-business
A. Consumer durables
B. Pharmaceutical products
C. Industrial goods
D. All the above
Question 395
What sends work assignments through an e-mail system?
A. database-based enterprise information portal
B. messaging-based enterprise information portal
C. database-based workflow system
D. messaging-based workflow system
Question 396
What type of ad appears on top of a web page?
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Question 397
What type of ad appears under a web page?
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Question 398
What Web server functionality allows it verify usernames and passwords and processcertificates and encryption information?
A. processing of http requests
B. file transfer protocol
C. data capture
D. security services
Question 399
When a company buys some raw material from some other company, then it will come under:
A. B2B
B. B2C
C. C2B
D. C2C
Question 400
When a transaction is processed online, how can the merchant verify the customer's identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Question 401
When a transaction is processed online, how can the merchant verify thecustomers identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Question 402
When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________
A. phishing
B. pharming
C. a denial of service (dos) attack
D. spoofing
Question 403
When measuring the effectiveness on an online advertisement, the __________ is the percentage of visitors to a page who click on an advertisement.
A. click ratio
B. click rate
C. click-through rate
D. hit ratio
Question 404
When message & data are available only to those who are authorized to view them isknown as ______ .
A. integrity
B. confidentiality
C. authenticity
D. privacy
Question 405
When surfing the Web, the browser interprets the HTML command found in a document file, and displays it as a(n)
A. Applet page
B. Java page
C. Web page
D. Domain page
Question 406
When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts?
A. E-commerce is broadly equivalent to e-business
B. E-commerce has some overlap with e-business
C. E-commerce is a subset of e-business
D. E-business is a subset of e-commerce
Question 407
Which among the following is an example for vertical portal ?
A. i-village
B. yahoo
C. google
D. net scape
Question 408
Which among the following is an example of C2C ?
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Question 409
Which among the following is not a B2E application
A. online insurance policy management
B. online supply requests
C. special employee offers
D. locate application and tax forms
Question 410
Which among the following is not an example for computer virus ?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Question 411
Which among the following is not an example for E-commerce
A. amazon.com
B. baazar.com
C. e-trade.com
D. none of these
Question 412
Which among the following is not an example for Search engine ?
A. google
B. msn
C. alta vista
D. none of these
Question 413
Which among the following is not an user of B2C e-commerce ?
A. manufacturers
B. distributors
C. publishers
D. none
Question 414
Which among the following product is suitable for E-Commerce ?
A. books
B. vegetables
C. all of these
D. none of these
Question 415
Which concept suggests that different applications and computer systems should be able to communicate with one another?
A. integration
B. web services
C. scalability
D. interoperability
Question 416
Which concept suggests that different applications and computersystems should be able to communicate with one another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
Question 417
Which driver promote E-commerce
A. Digital Convergence
B. 24/7 availability
C. Profit margins
D. None of the above
Question 418
Which factor determines when the IT system will be available forknowledge workers to access?
A. Availability
B. Accessibility
C. Reliability
D. None of the above
Question 419
Which factor determines who has the right to access different types of IT systems and information?
A. availability
B. accessibility
C. reliability
D. scalability
Question 420
Which factor determines who has the right to access different types of ITsystems and information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Question 421
Which factor ensures the IT systems are functioning correctly andproviding accurate information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Question 422
Which factor ensures your IT systems are functioning correctly and providing accurate information?
A. availability
B. accessibility
C. reliability
D. scalability
Question 423
Which factor represents a systems ability to change quickly?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Question 424
Which factor represents a system's ability to change quickly?
A. flexibility
B. performance
C. capacity planning
D. benchmark
Question 425
Which factor represents how well your system can adapt to increased demands?
A. availability
B. accessibility
C. reliability
D. scalability
Question 426
Which factor represents how well your system can adapt to increaseddemands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Question 427
Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?
A. B2B
B. B2C
C. C2B
D. C2C
Question 428
Which form of e-commerce currently accounts for about 97% of all e-commerce revenues?
A. b2b
B. b2c
C. c2b
D. c2c
Question 429
Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO materials?
A. horizontal
B. vertical
C. integrated
D. inclined
Question 430
Which form of e-marketplace brings together buyers and sellers from the same industry?
A. horizontal
B. vertical
C. integrated
D. inclined
Question 431
Which form of e-marketplace brings together buyers and sellers from thesame industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Question 432
Which form of e-marketplace brings together buyers and sellers frommultiple industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Question 433
Which is a function of E-commerce
A. marketing
B. advertising
C. warehousing
D. all of the above
Question 434
Which is a function of ERP?
A. warehousing
B. sales
C. scheduling
D. all of the above
Question 435
Which is not a component of ERP?
A. legacy systems
B. bolt on applications
C. operational database
D. cybersoft
Question 436
Which is not a function of E-commerce
A. marketing
B. advertising
C. warehousing
D. none of the above
Question 437
Which is not a function of ERP?
A. warehousing
B. sales
C. scheduling
D. none of the above
Question 438
Which is not a function of ERP?
A. human resource management
B. financial
C. warehousing
D. none of the above
Question 439
Which is not the application area of e-commerce?
A. E-Learning
B. E-Banking
C. E-Auction
D. None of the mentioned
Question 440
Which model of e commerce deals with virtual auction?
A. Aggregator Model
B. Info-mediary model
C. Community Model
D. Brokerage Model
Question 441
Which of the below is/are goals of E-Commerce?
A. 24×7
B. reach out to larger audience
C. time saving
D. all of the above
Question 442
Which of the following are advantages normally associated with B2B ecommerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
Question 443
Which of the following are advantages normally associated with B2B e-commerce?
A. shorter cycle times
B. reduction in costs
C. reaches wider audiences
D. all of the above
Question 444
Which of the following are not required to send and receive e-mail?
A. e-mail account
B. Web page
C. access to the Internet
D. e-mail program
Question 445
Which of the following best describes predicted growth in C2C and B2C auctionspending?
A. b2c spending will overtake c2c spending
B. both types of spending will increase
C. c2c spending will decrease while b2c increases
D. both types of spending will decline at similar rates
Question 446
Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these
Question 447
Which of the following describes e-commerce?
A. doing business electronically
B. doing business
C. sale of goods
D. all of the above
Question 448
Which of the following describes e‐commerce?
A. Doing business electronically
B. Doing business
C. Sale of goods
D. All the above
Question 449
Which of the following examines information passing through switches,hubs, or routers?
A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures
Question 450
Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
A. loyalty
B. reach
C. recency
D. unique visitors
Question 451
Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
A. loyalty
B. reach
C. regency
D. unique visitors
Question 452
Which of the following is a method of transferring money from one person's account to another?
A. electronic check
B. credit card
C. e-transfer
D. none of the above
Question 453
Which of the following is a method of transferring money from onepersons account to another?
A. electronic check
B. credit card
C. e-transfer
D. none of the above
Question 454
Which of the following is a new and disruptive Web feature or service?
A. xml
B. diffserv
C. blogs
D. cdma
Question 455
Which of the following is a useful security mechanism when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above
Question 456
Which of the following is a useful security mechanism when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
D. All of the mentioned
Question 457
Which of the following is a useful security mechanism when consideringbusiness strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above
Question 458
Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Question 459
Which of the following is an Internet-based company that makes it easyfor one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Question 460
Which of the following is not a dimension of e- commerce security provided by encryption ?
A. availability
B. integrity
C. non-repudiation
D. confidentiality
Question 461
Which of the following is not a limitation of the current Internet?
A. insufficient capacity throughout the backbone
B. network architecture limitations
C. insufficient reach
D. best-efforts qos
Question 462
Which of the following is not a party of SCM ?
A. suppliers
B. manufacturers
C. distributors
D. customers
Question 463
Which of the following is not an example for B2B e-commerce ?
A. Sending and receiving orders
B. Invoice and shopping
C. all of these
D. none of these
Question 464
Which of the following is not related to security mechanism
A. encryption
B. decryption
C. e-cash
D. all the above
Question 465
Which of the following is not related to security mechanism?
A. encryption
B. decryption
C. e-cash
D. All of the mentioned
Question 466
Which of the following is not suitable for a B2C transaction ?
A. clothes
B. flowers
C. airline reservation
D. none
Question 467
Which of the following is not the example of business to consumer (B to C) e-commerce?
A. Amazon.com
B. e-bay.com
C. dell.com
D. lastminute.com
Question 468
Which of the following is part of the four main types for e-commerce?
A. b2b
B. b2c
C. c2b
D. all of the above
Question 469
Which of the following is part of the four main types of e-commerce?
A. B2B
B. B2C
C. C2B
D. All of the mentioned
Question 470
Which of the following is the primary characteristic of an intranet?
A. people outside the organization can access it
B. people inside the organization can\t access it
C. people outside the organization can\t access it
D. none of the above
Question 471
Which of the following is the primary characteristic of an intranet?
A. People outside the organisation can access it
B. People inside the organisation cant access it
C. People outside the organisation cant access it
D. None of the above
Question 472
Which of the following is true for supply chain management?
A. The physical material moves in the direction
B. Flow of cash backwards through the chain
C. Exchange of information moves in both the
D. All of the above
Question 473
Which of the following is used in B2B to pay for purchases?
A. e-commerce
B. financial electronic data interchange
C. electronic data exchange
D. electronic checks
Question 474
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Question 475
Which of the following permits the transmission of a bill, along withpayment of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Question 476
Which of the following refers to creating products tailored to individual customers?
A. customization
B. aggregation
C. direct materials
D. reverse auction
Question 477
Which of the following refers to creating products tailored to individualcustomers?
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
Question 478
Which of the following statements about privacy is true?
A. it is a moral right to be left alone
B. only corporations and government need to be concerned about it
C. it has only just recently become a concern
D. it is most easily obtained on the internet
Question 479
Which of the following statements accurately reflect the impact of technology?
A. technology has caused buyer power to increase
B. technology has lessened the entry barriers for many industries
C. technology has increased the threat of substitute products and services
D. all of the above
Question 480
Which of the following statements accurately reflect the impact oftechnology?
A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
C. Technology has increased the threat of substitute products and services
D. all of the above
Question 481
Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Question 482
Which process can prevent data from lose due to computer problems or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Question 483
Which process can prevent data from losing due to computer problemsor human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Question 484
Which process is used to reinstall data from a copy when the original data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Question 485
Which process is used to reinstall data from a copy when the originaldata has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Question 486
Which products are people most likely to be comfortable buying on the Internet?
A. books
B. pcs
C. cds
D. all of the above
Question 487
Which products are people most likely to be comfortable buying on theInternet?
A. Books
B. PCs
C. CDs
D. All of the above
Question 488
Which products are people most likely to be more uncomfortable buying on the Internet?
A. books
B. furniture
C. movies
D. all of the above
Question 489
Which products are people most likely to be more uncomfortable buyingon the Internet?
A. Books
B. Furniture
C. Movies
D. All of the above
Question 490
Which segment do eBay, Amazon.com belong?
A. b2bs
B. b2cs
C. c2bs
D. c2cs
Question 491
Which segment is eBay an example?
A. b2b
B. c2b
C. c2c
D. none of the above
Question 492
Which segments do eBay, Amazon.com belong?
A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
Question 493
Which service encompasses all technologies used to transmit andprocess information on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Question 494
Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?
A. affiliate programs
B. click-through
C. spam
D. all of the above
Question 495
Which term represents a count of the number of people who visit onesite, click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through
C. Spam
D. All of the above
Question 496
Which type of products is lesser purchased using e- commerce?
A. automobiles
B. books
C. groceries
D. None of the mentioned
Question 497
Which type of products is lesser purchased using ecommerce?
A. automobiles
B. books
C. softwares
D. none
Question 498
Which type of products is lesser purchased using e-commerce?
A. automobiles
B. books
C. softwares
D. none
Question 499
Which will not harm computer resources
A. firewall
B. virus
C. trojan horse
D. none of the above
Question 500
Which will not harm computer resources?
A. firewall
B. Virus
C. Trojan horse
D. None of the above
Question 501
Which, if any, of the following types of ads are people most willing to tolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above
Question 502
Which, if any, of the following types of ads are people most willing totolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above
Question 503
While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds?
A. Directory
B. Publisher site
C. Blog
D. Access portal
Question 504
Who breaks into other people's computer systems and steals and destroys information?
A. hackers
B. softwares
C. hacktivists
D. script kiddies
Question 505
Who breaks into other peoples computer systems and steals anddestroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Question 506
Who protects system from external threats?
A. firewall
B. edi
C. erp
D. script kiddies
Question 507
Why would a merchant want to customize products?
A. to charge a higher price
B. to decrease costs
C. it is required in ec
D. customers will only accept customized products
Question 508
World Wide Web (WWW) was introduced in the year ________________________
A. 1994
B. 1996
C. 1992
D. 1990
Question 509
Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Question 510
Companies use__________________networks to automate employee related Corporateprocesses.
A. b2g
B. b2e
C. b2b
D. p2p
Question 511
____________is an early form of E-commerce
A. scm
B. edi
C. both of these
D. none of these
Question 512
____________is concerned with the buying and selling information, products andservices over computer communication networks
A. commerce
B. e-commerce
C. e-business
D. none of these
Question 513
__________allows a business application on the computer of one organization tocommunicate directly with the business application on the computer of another company.
A. edi
B. protocols
C. standards
D. business applications
Question 514
Electronic Exchange of business documents in a standard format is known as____________
A. e-commerce
B. e-business
C. edi
D. none of these
Question 515
____________is a commercial process that includes production, distribution, sales ordelivery of goods and services through electronic means
A. e-commerce
B. scm
C. edi
D. none of these
Question 516
Among the alternate models of B2B e-commerce,____is the best means to obtain acompetitive advantage in the Market place.
A. process based
B. strategic relationship based
C. transaction based
D. any of these
Question 517
______________is basically a concept of online marketing and distributing of productsand services over the internet
A. b2g
B. b2e
C. b2c
D. b2b
Question 518
________________e-commerce consists of the sale of products or services from abusiness to the general public
A. b2g
B. b2e
C. b2b
D. b2c
Question 519
__________e-commerce transaction has the advantage of eliminating middlemen.
A. b2g
B. b2c
C. b2b
D. b2e
Question 520
______________e-commerce involves customers gathering information, purchasing andreceiving products over an electronic network
A. b2g
B. b2e
C. b2b
D. b2c
Question 521
______________e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.
A. c2c
B. b2e
C. b2b
D. b2g
Question 522
________________streamlines the flow of information and self service capabilitiesthrough automation
A. scc
B. crm
C. crp
D. scm
Question 523
______________is an application layer protocol for distributed, collaborative, hypermedia information systems.
A. html
B. http
C. bothe of these
D. none of these
Question 524
English physicist Tim Berner’s Lee was famous for the establishment of______________in 1990.
A. internet
B. www
C. intranet
D. none of these
Question 525
______refers to a kind of e-commerce which refers to a company selling or buyingfrom other company
A. b2g
B. b2e
C. b2b
D. p2p
Question 526
A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of__________transaction
A. b2g
B. b2e
C. b2b
D. p2p
Question 527
________sites act as an intermediary between someone wanting a product or serviceand potential providers
A. brokering sites
B. information sites
C. industry portals
D. none of these
Question 528
A__________portal is a specialized entry point to a specific market place or industryniche.
A. vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 529
A portal that helps to establish relations and to conduct transactions between variousorganizations is termed as____________
A. b2b portals
B. c2c portals
C. both of these
D. none of these
Question 530
A ________________is a software that scours the internet collecting data about everywebsite and every webpage within it
A. spiders
B. search engines
C. robots
D. none of these
Question 531
Web pages are prepared using their language as______________
A. html
B. ftp
C. http
D. none of these
Question 532
A web page is transferred to users computer through ________________
A. html
B. ftp
C. http
D. none of these
Question 533
Trade mark, copyright, patent law etc comes under the purview of________________
A. data protection
B. telecommunication laws
C. intellectual property laws
D. none
Question 534
____________is basically a secure gate between our organization data and internet.
A. network firewall
B. antivirus
C. both of these
D. none of these
Question 535
____________is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
A. biometrics
B. pin
C. both of these
D. none of these
Question 536
____________is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.
A. customer
B. issuer
C. merchant
D. acquirer
Question 537
In ______________type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
A. prepaid
B. post paid
C. both of these
D. none of these
Question 538
.____________is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters
A. e-commerce
B. commerce
C. both of these
D. none
Question 539
____________always operate on intranet
A. e--commerce
B. e-business
C. edi
D. none of these
Question 540
____________were the first to establish prominent E-commerce Brands
A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these
Question 541
__________is a form of supply chain where a series of assembly operations are carriedout to obtain the final product
A. converging supply chain
B. diverging supply chain
C. any of these
D. none
Question 542
.______________is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.
A. converging structure
B. diverging structure
C. any of these
D. none
Question 543
________________is the exchange of services, information or product from onebusiness to a government agency
A. b2g
B. b2e
C. b2b
D. p2p
Question 544
______________is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files
A. b2c
B. b2e
C. b2b
D. p2p
Question 545
”Google” is one of the most popular____________
A. portal
B. browser
C. search engine
D. none of these
Question 546
A ______________ Presents information from diverse sources in a unified way in aweb site.
A. web portal
B. link page
C. both of these
D. none of these
Question 547
Peer to Peer [P2P] is also used to describe __________________
A. c2c
B. b2e
C. b2b
D. b2c
Question 548
__________allows the person to type ion just the main word or words and the site willcome in
A. web page
B. home page
C. domain
D. none of these
Question 549
A ______________ presents information from diverse sources in a unified way in aweb site
A. web portal
B. link page
C. both of these
D. none of these
Question 550
In Biometrics,____________________ID system is designed to prevent one personfrom using more than one identity
A. positive id system
B. negative id system
C. both of these
D. none of these
Question 551
______________are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.
A. network firewall
B. computer virus
C. both of these
D. none of these
Question 552
he dimension of e-commerce that enables commerce across national boundaries is called______________
A. interactivity
B. global reach
C. richness
D. ubiquity
Question 553
The primary source of financing during the early years of e-commerce was______________
A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Question 554
The source of revenue in a subscription revenue model is ______________
A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
D. fees for enabling or execution a transaction
Question 555
Industry structure is defined as ______________
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company\s product or service fulfills the needs of customers
Question 556
The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________
A. tcp
B. ip
C. the network layer
D. the application layer
Question 557
The most common type of Internet crime according to the IC3 is ______________
A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud
Question 558
Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Question 559
The redirection of traffic from a legitimate site to an infringing site is called______________
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Question 560
A security plan begins with a(n) is ______________
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Question 561
Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________
A. versioning
B. bundling.
C. transitive content
D. price discrimination
Question 562
A website offering content created by third party transparently to customers is anexample of ______________
A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order
Question 563
E-commerce technologies have improved upon traditional commerce technologies in______________
A. richness
B. reach
C. both richness and reach
D. neither richness nor reach
Question 564
All of the following are technologies used to gather information about you onlineexcept ______________
A. spy ware
B. cookies
C. gmail
D. anonymizers
Question 565
The ability to change the product to better fit the needs of the customer is called______________
A. customization
B. personalization
C. privacy
D. accessibility
Question 566
All of the following are major categories of computer viruses except ______________
A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses
Question 567
The most prevalent online payment method is ______________
A. paypal
B. checks
C. credit cards
D. debit
Question 568
All of the following are types of social marketing except ______________
A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising
Question 569
A materials requirements planning (MRP) system is an example of ______________
A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange
Question 570
The E-commerce domain that involves business activity initiated by the consumer andtargeted to businesses is known as ______________
A. business to business (b2b)
B. consumer to consumer (c2c)
C. consumer to business (c2b)
D. business to consumer (b2c)
Question 571
Affiliate revenue is also called as _______
A. commission
B. brokerage
C. referral fee
D. discount
Question 572
An online retail store is called as _____
A. trader
B. retailer
C. e-tailer
D. amazon
Question 573
Identify the identity of a person or entity with whom you are dealing on Internet is knownas ______
A. integrity
B. authenticity
C. authorisation
D. none of these
Question 574
SET is developed by association led by _________
A. master card and visa
B. master card
C. visa
D. rupay
Question 575
The technology behind M-commerce is based on ______
A. http
B. https
C. wap
D. pop
Question 576
Flipkart.com is an example of _______
A. b2b
B. b2c
C. c2c
D. p2p
Question 577
Normally in M-commerce language used to create web pages is _______
A. html
B. wml
C. vb
D. xml
Question 578
SSL can be used only with _____
A. ftp
B. http
C. pop
D. smtp
Question 579
Scope of E-Commerce is ______
A. local
B. global
C. within own country
D. within own state
Question 580
In SSL URL will change from HTTP to _______
A. cipher text
B. https
C. shttp
D. smtp
Question 581
World Wide Web (WWW) was introduced in the year ________________
A. 1994
B. 1996
C. 1992
D. 1990
Question 582
____________is concerned with the buying and selling information, products and services overcomputer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Question 583
____________is a set of standards developed in the 1960s to exchange business informationand to do electronic transactions
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Question 584
__________allows a business application on the computer of one organization to communicatedirectly with the business application on the computer of another company.
A. EDI
B. Protocols
C. Standards
D. Business applications
Question 585
Electronic Exchange of business documents in a standard format is known as ____________
A. E-commerce
B. E-Business
C. EDI
D. None of these
Question 586
____________ is essentially a business process that connects manufacturers, retailers,customers and suppliers in the form of a chain to develop and deliver products.
A. E-commerce
B. EDI
C. SCM
D. Networking
Question 587
____________is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means
A. E-commerce
B. SCM
C. EDI
D. None of these
Question 588
____________is the exchange of goods or items or commodities and services or applicationsused for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none
Question 589
__________is an approach to deliver information differentiated business values called servicesby combining the system and process generally called resources
A. E-business
B. E-commerce
C. any of these
D. none
Question 590
____________and ______________ were the enabling technologies that laid the ground work for E- commerce
A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these
Question 591
__________is a systems approach to Managing the entire flow of information, materials, andservices from raw material suppliers through factories and warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Question 592
__________is a form of supply chain where a series of assembly operations are carried out toobtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Question 593
________________is a form of supply chain where a wide variety of finished goods are producedwith limited number of raw material or components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Question 594
________________is the exchange of services, information or product from one business to agovernment agency
A. B2G
B. B2E
C. B2B
D. P2P
Question 595
Companies use__________________networks to automate employee related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Question 596
________________streamlines the flow of information and self service capabilities throughautomation
A. SCC
B. CRM
C. CRP
D. SCM
Question 597
____________is a global web in which millions of users are communicating with each other withthe help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Question 598
______________is an application layer protocol for distributed, collaborative, hypermediainformation systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Question 599
English physicist Tim Berner’s Lee was famous for the establishment of ______________in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Question 600
______refers to a kind of e-commerce which refers to a company selling or buying from othercompany
A. B2G
B. B2E
C. B2B
D. P2P
Question 601
A company that manufacturers bicycles may use the internet to purchase tyres from theirsuppliers. This is an example of__________transaction.
A. B2G
B. B2E
C. B2B
D. P2P
Question 602
________sites act as an intermediary between someone wanting a product or service andpotential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Question 603
__________focus on producing a highly integrated value proposition through a managed process.
A. hubs
B. community
C. contents
D. none of these
Question 604
______________is basically a concept of online marketing and distributing of products andservices over the internet
A. B2G
B. B2E
C. B2B
D. B2C
Question 605
________________e-commerce consists of the sale of products or services from a business tothe general public
A. B2G
B. B2E
C. B2B
D. B2C
Question 606
__________e-commerce transaction has the advantage of eliminating middlemen.
A. B2G
B. B2E
C. B2B
D. B2C
Question 607
______________e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network
A. B2G
B. B2E
C. B2B
D. B2C
Question 608
______________e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.
A. B2G
B. B2E
C. B2B
D. C2C
Question 609
Peer to Peer [P2P] is also used to describe____________________
A. C2C
B. B2E
C. B2B
D. B2C
Question 610
________________is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Question 611
______________is an internet network that allows users with the same network in software toconnect to each other’s hard disks and exchange files
A. P2P
B. B2E
C. B2B
D. B2C
Question 612
A ____________is a document, typically written in plain text interspersed with formattinginstructions of html
A. Web page
B. home page
C. domain
D. none of these
Question 613
__________allows the person to type ion just the main word or words and the site will come in
A. Web page
B. home page
C. domain
D. none of these
Question 614
”Google” is one of the most popular____________ a)Portal b)Browser c)Search Engine d)none of these50. A ______________ presents information from diverse sources in a unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these
Question 615
A__________portal is a specialized entry point to a specific market place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 616
____________are general interest portals covering a wide range of topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 617
A ________________is a software that scours the internet collecting data about every websiteand every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Question 618
Search Engines databases are selected and built by computer robot programscalled__________________
A. spiders
B. Search Engines
C. robots
D. none of these
Question 619
The purpose of ____________page is to provide links to other pages
A. Home page
B. Web page
C. Summary page
D. None of these
Question 620
__________is an example for a software that visits suggested pages and return the appropriateinformation to be indexed by the search Engine
A. Robot
B. Spiders
C. Ants
D. All
Question 621
________________________ads appears as rectangular graphics near the top of the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 622
______________ads take up the entire screen and are more powerful than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 623
____________________is a form of advertisement on the web that appears between web pagesthat the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 624
________________is basically a TV commercial that runs in the browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 625
Advertisements take the form of a website copy are called____________________
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 626
____________is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 627
______________is an unsolicited e-mail sent to every e-mail address that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 628
______________is the buying and selling of goods and services through wireless handleddevices such as cellular phone and Personal Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Question 629
______________is a class of advertising methods which are considered unethical and may evenbe illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Question 630
____________is the most common way for purchasing an online advertising
A. CPM
B. CPC
C. Any of these
D. none of these
Question 631
____________are animated full screen ads placed at the entry of a site before a user reachesthe intended content.
A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Question 632
______________are interactive online ads that require the user to respond intermittently inorder to wade through the message before reaching the intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Question 633
____________is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networkswith the help of an electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Question 634
__________provide security and privacy for the use of the web page content
A. HTTP
B. html
C. FTP
D. none of these
Question 635
________________website is one that changes or customizes itself frequently and automaticallybased on certain criteria
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Question 636
____________site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Question 637
____________in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer
Question 638
____________type of payment system is highly useful to those customers who would like tocontrol overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Question 639
__________________credit card gives all the advantages of a normal credit card without worryingabout the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Question 640
________________facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Question 641
______________is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Question 642
To accept a credit card for payment, we have to open a ______________account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Question 643
____________is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Question 644
__________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Question 645
________________encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Question 646
In Biometrics,____________________ID system is designed to prevent more than one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Question 647
In Biometrics,____________________ID system is designed to prevent one person from usingmore than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Question 648
______________are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Question 649
________________are special type of software meant for limiting the risks of being hit bycomputer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 650
A____________is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Question 651
____________acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 652
________Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 653
SET means ______________________
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Question 654
The verification of credit card is done by using__________ with a communications link to themerchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Question 655
Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as____________________
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Question 656
Gain entry into the user’s system and scan your file system for personal information isknown as____________
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Question 657
____________attacks are difficult and are only successful if the attacker knows somethingabout the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Question 658
______________is the process of making information unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Question 659
______________is the reverse process of encryption, to make the information readable onceagain
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Question 660
A______________provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Question 661
A ____________is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Question 662
Information sent over the Internet commonly uses the set of rules called__________________
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Question 663
E-mail which contain useless material is termed as__________________
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Question 664
India has enacted the first IT Act in the year____________________________
A. 2001
B. 2002
C. 2009
D. 2000
Question 665
____________is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Question 666
................ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format
A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Question 667
Conversion of Plain text to Cipher Text is called____________
A. Encryption
B. Decryption
C. Cryptography
D. none of these
Question 668
The dimension of E-Commerce that enables commerce across the boundaries is called
A. interactivity
B. global reach
C. richness
D. ubiquity
Question 669
A digital signature is required __i) to tie an electronic message to the sender’s identityii) for non repudiation of communication by a sender
A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv
Question 670
Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Question 671
The types of Business to Business e-commerce are ................
A. Direct selling and support to Business
B. Industry portals
C. Information sites about a industry
D. All the above
Question 672
E-money is a __________ medium for making payments
A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above
Question 673
In______________, each transaction must be independent
A. Consistency
B. Isolation
C. Durability
D. None of the above
Question 674
Electronic payment is a financial transaction made ________ the use of paper documents
A. With
B. Without
C. Both (a) and (b)
D. None of the above
Question 675
____________is a type of EPS
A. Credit card
B. Debit card
C. Smart card
D. All the above
Question 676
Smart card is same as____
A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above
Question 677
________________ card is a card with a built-in chip capable of storing information in itsmemory
A. Debit
B. Credit
C. Smart
D. None of the above
Question 678
______________________is an application of smart card
A. ATM
B. Telecommunication
C. Transportation
D. None of the above
Question 679
__________cards and ________cards are two ways to make payments on a web site
A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above
Question 680
__________________allows the transfer of money itself
A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above
Question 681
E-money has__________types
A. 3
B. 4
C. 5
D. 6
Question 682
Paisapay is facilitated in____________
A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above
Question 683
The way to hide digital information is through____
A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above
Question 684
________________card is a model of IPS
A. Smart
B. Debit
C. Credit
D. All the above
Question 685
__________________cards directly transfer funds from consumers bank account to themerchant’s
A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above
Question 686
Credit cards __________ convenient for making small purchases
A. Are
B. Are not
C. Both (a) and (b)
D. None of the above
Question 687
RACE is a practical framework to help marketers manage and improve the commercial value gained from digital marketing. The term stands for Reach, Act, C, Engage. What does 'C' refer to?
A. Collaborate
B. Collect
C. Consolidate
D. Convert
Question 688
In future, some suggest that the task of searching for suppliers and products may be taken over by computer programmes which have defined rules or some degree of intelligence that replicates human neural functioning. These programmes are known as:
A. Spider search engines
B. HTML
C. E-marketplace search engines
D. Software intelligent agents
Question 689
The most common method for gaining access to the Internet is through a __________
A. dumb terminal
B. virtual provider or computer
C. point-to-point computer
D. provider or host computer
Question 690
Which type deals with auction?
A. b2b
B. b2c
C. c2b
D. c2c
Question 691
Which type of add appears on a web page?
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
Question 692
Which type of e-commerce focuses on consumers dealing with each other?
A. b2b
B. b2c
C. c2b
D. c2c
Question 693
Which type of e‐commerce focuses on consumers dealing with each other?
A. B2B
B. B2C
C. C2B
D. C2C
Question 694
Which type of e-commerce focuses on consumers dealing with eachother?
A. B2B
B. B2C
C. C2B
D. C2C
Question 695
____________is a global web in which millions of users are communicating with eachother with the help of computers.
A. internet
B. www
C. both of these
D. none of these
Question 696
________________is an online auctioning site that facilitates the trade of privatelyowned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Question 697
Monster.com is an example of ________________website
A. c2c
B. b2e
C. b2b
D. b2c
Question 698
A ____________is a document, typically written in plain text interspersed withformatting instructions of html
A. web page
B. home page
C. domain
D. none of these
Question 699
______________is the first page of a web site.
A. web page
B. home page
C. domain
D. none of these
Question 700
__________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.
A. debit card
B. credit card
C. electronic purse
D. any of these
Question 701
________________encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.
A. ssl
B. set
C. both of these
D. none of these
Question 702
SET means ____________
A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these
Question 703
The verification of credit card is done by using__________ with a communications linkto the merchants acquiring bank
A. credit card payment terminal
B. point of sale
C. all of these
D. none of these
Question 704
____________is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. merchant
D. acquirer
Question 705
____________type of payment system is highly useful to those customers who wouldlike to control overspending,
A. prepaid
B. post paid
C. both of these
D. none of these
Question 706
__________________credit card gives all the advantages of a normal credit cardwithout worrying about the interest charges
A. prepaid
B. post paid
C. both of these
D. none of these
Question 707
________________facility helps the customer to pay only a small amount of the totaloutstanding and revolve the rest of the payment to the next month.
A. cash advance
B. revolver
C. tele draft
D. none of these
Question 708
______________is a financial instrument which can be used more than once to borrowmoney or buy products and services on credit.
A. credit card
B. e-cheques
C. e-cash
D. none of these
Question 709
To accept a credit card for payment, we have to open a ______________account withour bank
A. savings bank
B. current account
C. merchant account
D. any of these
Question 710
____________is a kind of payment card that transfers fund directly from theconsumer’s bank account to the merchants account
A. debit card
B. electronic purse
C. credit card
D. any of these
Question 711
A ____________is an electronic file that uniquely identifies individuals and websites onthe internet and enables secure confidential communications
A. digital signature
B. digital certificates
C. ssl
D. none of these
Question 712
Information sent over the Internet commonly uses the set of rulescalled________________
A. tcp/ip
B. ftp
C. http
D. gopher
Question 713
__________________is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Question 714
E-mail which contains useless material is termed as__________
A. spam
B. useless mail
C. trunk mail
D. junk mail
Question 715
India has enacted the first IT Act in the year________________
A. 2001
B. 2002
C. 2009
D. 2000
Question 716
Companies use………………………networks to automate employee related Corporateprocesses.
A. b2g
B. b2e
C. b2b
D. p2p
Question 717
……………….is an early form of E-commerce
A. scm
B. edi
C. both of these
D. none of these
Question 718
………………..is concerned with the buying and selling information, products andservices over computer communication networks
A. commerce
B. e-commerce
C. e-business
D. none of these
Question 719
……………allows a business application on the computer of one organization tocommunicate directly with the business application on the computer of another company.
A. edi
B. protocols
C. standards
D. business applications
Question 720
Electronic Exchange of business documents in a standard format is known as………………
A. e-commerce
B. e-business
C. edi
D. none of these
Question 721
………………is a commercial process that includes production, distribution, sales ordelivery of goods and services through electronic means
A. e-commerce
B. scm
C. edi
D. none of these
Question 722
Among the alternate models of B2B e-commerce,……is the best means to obtain acompetitive advantage in the Market place.
A. process based
B. strategic relationship based
C. transaction based
D. any of these
Question 723
…………………is basically a concept of online marketing and distributing of productsand services over the internet
A. b2g
B. b2e
C. b2c
D. b2b
Question 724
……………………..e-commerce consists of the sale of products or services from abusiness to the general public
A. b2g
B. b2e
C. b2b
D. b2c
Question 725
……………..e-commerce transaction has the advantage of eliminating middlemen.
A. b2g
B. b2c
C. b2b
D. b2e
Question 726
………………….e-commerce involves customers gathering information, purchasing andreceiving products over an electronic network
A. b2g
B. b2e
C. b2b
D. b2c
Question 727
………………….e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.
A. c2c
B. b2e
C. b2b
D. b2g
Question 728
……………………..streamlines the flow of information and self service capabilitiesthrough automation
A. scc
B. crm
C. crp
D. scm
Question 729
…………………is an application layer protocol for distributed, collaborative, hypermedia information systems.
A. html
B. http
C. bothe of these
D. none of these
Question 730
English physicist Tim Berner’s Lee was famous for the establishment of…………………..in 1990.
A. internet
B. www
C. intranet
D. none of these
Question 731
………refers to a kind of e-commerce which refers to a company selling or buyingfrom other company
A. b2g
B. b2e
C. b2b
D. p2p
Question 732
…………..sites act as an intermediary between someone wanting a product or serviceand potential providers
A. brokering sites
B. information sites
C. industry portals
D. none of these
Question 733
A……………portal is a specialized entry point to a specific market place or industryniche.
A. vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 734
A portal that helps to establish relations and to conduct transactions between variousorganizations is termed as………………
A. b2b portals
B. c2c portals
C. both of these
D. none of these
Question 735
A …………………….is a software that scours the internet collecting data about everywebsite and every webpage within it
A. spiders
B. search engines
C. robots
D. none of these
Question 736
Web pages are prepared using their language as…………………
A. html
B. ftp
C. http
D. none of these
Question 737
A web page is transferred to users computer through ……………………..
A. html
B. ftp
C. http
D. none of these
Question 738
………………is a global web in which millions of users are communicating with eachother with the help of computers.
A. internet
B. www
C. both of these
D. none of these
Question 739
…………………….is an online auctioning site that facilitates the trade of privatelyowned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Question 740
Monster.com is an example of ……………………..website
A. c2c
B. b2e
C. b2b
D. b2c
Question 741
A ……………….is a document, typically written in plain text interspersed withformatting instructions of html
A. web page
B. home page
C. domain
D. none of these
Question 742
The verification of credit card is done by using…………….. with a communications linkto the merchants acquiring bank
A. credit card payment terminal
B. point of sale
C. all of these
D. none of these
Question 743
………………….is the first page of a web site.
A. web page
B. home page
C. domain
D. none of these
Question 744
……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. merchant
D. acquirer
Question 745
……………..is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.
A. debit card
B. credit card
C. electronic purse
D. any of these
Question 746
………………type of payment system is highly useful to those customers who wouldlike to control overspending,
A. prepaid
B. post paid
C. both of these
D. none of these
Question 747
……………………encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.
A. ssl
B. set
C. both of these
D. none of these
Question 748
……………………….credit card gives all the advantages of a normal credit cardwithout worrying about the interest charges
A. prepaid
B. post paid
C. both of these
D. none of these
Question 749
SET means ………………
A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these
Question 750
……………………facility helps the customer to pay only a small amount of the totaloutstanding and revolve the rest of the payment to the next month.
A. cash advance
B. revolver
C. tele draft
D. none of these
Question 751
………………….is a financial instrument which can be used more than once to borrowmoney or buy products and services on credit.
A. credit card
B. e-cheques
C. e-cash
D. none of these
Question 752
To accept a credit card for payment, we have to open a …………………account withour bank
A. savings bank
B. current account
C. merchant account
D. any of these
Question 753
………………..is a kind of payment card that transfers fund directly from theconsumer’s bank account to the merchants account
A. debit card
B. electronic purse
C. credit card
D. any of these
Question 754
A ………………is an electronic file that uniquely identifies individuals and websites onthe internet and enables secure confidential communications
A. digital signature
B. digital certificates
C. ssl
D. none of these
Question 755
Information sent over the Internet commonly uses the set of rulescalled……………………
A. tcp/ip
B. ftp
C. http
D. gopher
Question 756
……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Question 757
E-mail which contains useless material is termed as……………
A. spam
B. useless mail
C. trunk mail
D. junk mail
Question 758
India has enacted the first IT Act in the year……………………
A. 2001
B. 2002
C. 2009
D. 2000
Question 759
The ethical principle which states that if an action is not right for all situations, then itis not right for any situation is known as ______________.
A. the golden rule
B. slippery slope
C. no free lunch
D. universalism
Question 760
Trade mark, copyright, patent law etc comes under the purview of……………………
A. data protection
B. telecommunication laws
C. intellectual property laws
D. none
Question 761
………………is basically a secure gate between our organization data and internet.
A. network firewall
B. antivirus
C. both of these
D. none of these
Question 762
………………is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
A. biometrics
B. pin
C. both of these
D. none of these
Question 763
……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.
A. customer
B. issuer
C. merchant
D. acquirer
Question 764
In …………………..type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
A. prepaid
B. post paid
C. both of these
D. none of these
Question 765
……………….is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters
A. e-commerce
B. commerce
C. both of these
D. none
Question 766
……………….always operate on intranet
A. e--commerce
B. e-business
C. edi
D. none of these
Question 767
………………were the first to establish prominent E-commerce Brands
A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these
Question 768
…………….is a form of supply chain where a series of assembly operations are carriedout to obtain the final product
A. converging supply chain
B. diverging supply chain
C. any of these
D. none
Question 769
…………………is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.
A. converging structure
B. diverging structure
C. any of these
D. none
Question 770
……………………is the exchange of services, information or product from onebusiness to a government agency
A. b2g
B. b2e
C. b2b
D. p2p
Question 771
………………….is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files
A. b2c
B. b2e
C. b2b
D. p2p
Question 772
”Google” is one of the most popular………………..
A. portal
B. browser
C. search engine
D. none of these
Question 773
A ………………….. Presents information from diverse sources in a unified way in aweb site.
A. web portal
B. link page
C. both of these
D. none of these
Question 774
Peer to Peer [P2P] is also used to describe ………………………
A. c2c
B. b2e
C. b2b
D. b2c
Question 775
……………..allows the person to type ion just the main word or words and the site willcome in
A. web page
B. home page
C. domain
D. none of these
Question 776
A ………………….. presents information from diverse sources in a unified way in aweb site
A. web portal
B. link page
C. both of these
D. none of these
Question 777
In Biometrics,…………………………ID system is designed to prevent one personfrom using more than one identity
A. positive id system
B. negative id system
C. both of these
D. none of these
Question 778
…………………..are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.
A. network firewall
B. computer virus
C. both of these
D. none of these
Question 779
When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________.
A. phishing
B. pharming
C. a denial of service (dos) attack
D. spoofing
Question 780
The process of getting customers to pass along a company's marketing message tofriends, family, and colleagues is known as ______________.
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Question 781
World Wide Web (WWW) was introduced in the year ……………………
A. 1994
B. 1996
C. 1992
D. 1990
Question 782
………………..is concerned with the buying and selling information, products and services overcomputer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Question 783
………………..is a set of standards developed in the 1960s to exchange business informationand to do electronic transactions
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Question 784
……………allows a business application on the computer of one organization to communicatedirectly with the business application on the computer of another company.
A. EDI
B. Protocols
C. Standards
D. Business applications
Question 785
Electronic Exchange of business documents in a standard format is known as ………………
A. E-commerce
B. E-Business
C. EDI
D. None of these
Question 786
………………. is essentially a business process that connects manufacturers, retailers,customers and suppliers in the form of a chain to develop and deliver products.
A. E-commerce
B. EDI
C. SCM
D. Networking
Question 787
………………is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means
A. E-commerce
B. SCM
C. EDI
D. None of these
Question 788
………………….e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.
A. B2G
B. B2E
C. B2B
D. C2C
Question 789
……………….is the exchange of goods or items or commodities and services or applicationsused for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none
Question 790
…………….is an approach to deliver information differentiated business values called servicesby combining the system and process generally called resources
A. E-business
B. E-commerce
C. any of these
D. none
Question 791
……………….and ………………… were the enabling technologies that laid the ground work for E- commerce
A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these
Question 792
Peer to Peer [P2P] is also used to describe………………………….
A. C2C
B. B2E
C. B2B
D. B2C
Question 793
…………….is a systems approach to Managing the entire flow of information, materials, andservices from raw material suppliers through factories and warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Question 794
…………………….is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Question 795
………………….is an internet network that allows users with the same network in software toconnect to each other’s hard disks and exchange files
A. P2P
B. B2E
C. B2B
D. B2C
Question 796
…………….is a form of supply chain where a series of assembly operations are carried out toobtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Question 797
……………………is a form of supply chain where a wide variety of finished goods are producedwith limited number of raw material or components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Question 798
A ……………….is a document, typically written in plain text interspersed with formattinginstructions of html
A. Web page
B. home page
C. domain
D. none of these
Question 799
……………………is the exchange of services, information or product from one business to agovernment agency
A. B2G
B. B2E
C. B2B
D. P2P
Question 800
……………..allows the person to type ion just the main word or words and the site will come in
A. Web page
B. home page
C. domain
D. none of these
Question 801
Companies use………………………networks to automate employee related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Question 802
A……………portal is a specialized entry point to a specific market place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 803
……………………..streamlines the flow of information and self service capabilities throughautomation
A. SCC
B. CRM
C. CRP
D. SCM
Question 804
………………..are general interest portals covering a wide range of topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Question 805
………………is a global web in which millions of users are communicating with each other withthe help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Question 806
A …………………….is a software that scours the internet collecting data about every websiteand every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Question 807
…………………is an application layer protocol for distributed, collaborative, hypermediainformation systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Question 808
Search Engines databases are selected and built by computer robot programscalled………………………
A. spiders
B. Search Engines
C. robots
D. none of these
Question 809
English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Question 810
The purpose of ………………page is to provide links to other pages
A. Home page
B. Web page
C. Summary page
D. None of these
Question 811
……………is an example for a software that visits suggested pages and return the appropriateinformation to be indexed by the search Engine
A. Robot
B. Spiders
C. Ants
D. All
Question 812
………refers to a kind of e-commerce which refers to a company selling or buying from othercompany
A. B2G
B. B2E
C. B2B
D. P2P
Question 813
………………………………..ads appears as rectangular graphics near the top of the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 814
………………….ads take up the entire screen and are more powerful than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 815
…………..sites act as an intermediary between someone wanting a product or service andpotential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Question 816
………………………….is a form of advertisement on the web that appears between web pagesthat the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 817
……………..focus on producing a highly integrated value proposition through a managed process.
A. hubs
B. community
C. contents
D. none of these
Question 818
……………………is basically a TV commercial that runs in the browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Question 819
…………………is basically a concept of online marketing and distributing of products andservices over the internet
A. B2G
B. B2E
C. B2B
D. B2C
Question 820
Advertisements take the form of a website copy are called…………………………
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 821
……………………..e-commerce consists of the sale of products or services from a business tothe general public
A. B2G
B. B2E
C. B2B
D. B2C
Question 822
……………..e-commerce transaction has the advantage of eliminating middlemen.
A. B2G
B. B2E
C. B2B
D. B2C
Question 823
………………..is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 824
………………….e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network
A. B2G
B. B2E
C. B2B
D. B2C
Question 825
…………………..is an unsolicited e-mail sent to every e-mail address that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Question 826
…………………..is the buying and selling of goods and services through wireless handleddevices such as cellular phone and Personal Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Question 827
…………………is a class of advertising methods which are considered unethical and may evenbe illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Question 828
……………….is the most common way for purchasing an online advertising
A. CPM
B. CPC
C. Any of these
D. none of these
Question 829
………………are animated full screen ads placed at the entry of a site before a user reachesthe intended content.
A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Question 830
………………….are interactive online ads that require the user to respond intermittently inorder to wade through the message before reaching the intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Question 831
………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networkswith the help of an electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Question 832
…………….provide security and privacy for the use of the web page content
A. HTTP
B. html
C. FTP
D. none of these
Question 833
…………………….website is one that changes or customizes itself frequently and automaticallybased on certain criteria
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Question 834
………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Question 835
……………….in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer
Question 836
………………type of payment system is highly useful to those customers who would like tocontrol overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Question 837
……………………….credit card gives all the advantages of a normal credit card without worryingabout the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Question 838
……………………facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Question 839
………………….is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Question 840
To accept a credit card for payment, we have to open a …………………account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Question 841
………………..is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Question 842
……………..is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Question 843
……………………encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Question 844
In Biometrics,…………………………ID system is designed to prevent more than one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Question 845
In Biometrics,…………………………ID system is designed to prevent one person from usingmore than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Question 846
…………………..are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Question 847
A digital signature is required …..i) to tie an electronic message to the sender’s identityii) for non repudiation of communication by a sender
A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv
Question 848
……………………are special type of software meant for limiting the risks of being hit bycomputer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 849
A……………….is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Question 850
……………….acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 851
…………..Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Question 852
SET means …………………………….
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Question 853
The verification of credit card is done by using…………….. with a communications link to themerchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Question 854
Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as………………………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Question 855
Gain entry into the user’s system and scan your file system for personal information isknown as……………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Question 856
………………attacks are difficult and are only successful if the attacker knows somethingabout the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Question 857
…………………is the process of making information unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Question 858
………………….is the reverse process of encryption, to make the information readable onceagain
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Question 859
A………………….provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Question 860
A ………………is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Question 861
Information sent over the Internet commonly uses the set of rules called………………………..
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Question 862
E-mail which contain useless material is termed as………………………
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Question 863
India has enacted the first IT Act in the year……………………………………
A. 2001
B. 2002
C. 2009
D. 2000
Question 864
……………….is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Question 865
............... is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format
A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Question 866
Conversion of Plain text to Cipher Text is called………………
A. Encryption
B. Decryption
C. Cryptography
D. none of these
Question 867
E-money is a ……………. medium for making payments
A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above
Question 868
In…………………., each transaction must be independent
A. Consistency
B. Isolation
C. Durability
D. None of the above
Question 869
Electronic payment is a financial transaction made …………. the use of paper documents
A. With
B. Without
C. Both (a) and (b)
D. None of the above
Question 870
………………is a type of EPS
A. Credit card
B. Debit card
C. Smart card
D. All the above
Question 871
Smart card is same as…….
A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above
Question 872
……………………. card is a card with a built-in chip capable of storing information in itsmemory
A. Debit
B. Credit
C. Smart
D. None of the above
Question 873
……………………………is an application of smart card
A. ATM
B. Telecommunication
C. Transportation
D. None of the above
Question 874
…………….cards and ………….cards are two ways to make payments on a web site
A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above
Question 875
……………………….allows the transfer of money itself
A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above
Question 876
E-money has…………….types
A. 3
B. 4
C. 5
D. 6
Question 877
Paisapay is facilitated in………………
A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above
Question 878
The way to hide digital information is through……
A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above
Question 879
……………………..card is a model of IPS
A. Smart
B. Debit
C. Credit
D. All the above
Question 880
………………………cards directly transfer funds from consumers bank account to themerchant’s
A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above
Question 881
Credit cards ……………. convenient for making small purchases
A. Are
B. Are not
C. Both (a) and (b)
D. None of the above
Question 882
”Google” is one of the most popular……………….. a)Portal b)Browser c)Search Engine d)none of these50. A ………………….. presents information from diverse sources in a unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these