DAPZOI
Home Topics Quiz Login


E-Commerce MCQ Questions & Answers

E-Commerce MCQs : This section focuses on the "E-Commerce". These Multiple Choice Questions (MCQs) should be practiced to improve the E-Commerce skills required for various interviews (campus interview, walk-in interview, company interview), placement, entrance exam and other competitive examinations.




Question 1

________________ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format

A. Encapsulation
B. EDI
C. ERP
D. Transaction processing

View Answer

Question 2

.__________________ is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters

A. e-commerce
B. commerce
C. both of these
D. none

View Answer

Question 3

._____________________is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.

A. converging structure
B. diverging structure
C. any of these
D. none

View Answer

Question 4

____ is an online retail store.

A. portal
B. service provider
C. e-tailer
D. content provider

View Answer

Question 5

____ means that the information being displayed on a Web site/transmitted/received overthe Internet has not been changed in any way by an un-authorised party.

A. integrity
B. authenticity
C. authorisation
D. none of these

View Answer

Question 6

_____ allows you paperless transaction.

A. edi
B. electronic market
C. e-commerce
D. internet commerce

View Answer

Question 7

_____ can read the cipher text.

A. sender
B. receiver
C. any one
D. no one

View Answer

Question 8

_____ changes URL from http to https.

A. ssl
B. set
C. e-commerce
D. m-commerce

View Answer

Question 9

_____ is an art of attempting to acquire information by masked as trustworthy entity.

A. hacking
B. phishing
C. sniffing
D. spoofing

View Answer

Question 10

_____ means converting cipher text to plain text.

A. encryption
B. decryption
C. conversion
D. de-conversion

View Answer

Question 11

_____ means the information being displayed on a Web site or transmitted or receivedover the Internet has not been changed in any way by an unauthorized party.

A. integrity
B. confidentiality
C. authenticity
D. privacy

View Answer

Question 12

______ are sites that creates a digital online environment where people with similarinterest can transact.

A. community provider
B. market creator
C. portal
D. service provider

View Answer

Question 13

______ means converting plain text to cipher text.

A. encryption
B. decryption
C. conversion
D. de-conversion

View Answer

Question 14

______ means converting readable text to unreadable text.

A. conversion
B. decryption
C. encryption
D. decoding

View Answer

Question 15

______ means converting unreadable text to readable text.

A. conversion
B. decryption
C. encryption
D. decoding

View Answer

Question 16

______ means found everywhere.

A. universal
B. ubiquity
C. global
D. local

View Answer

Question 17

________ is an example of an auction site

A. e-bay
B. Ibibo
C. Facebook
D. Orkut

View Answer

Question 18

________ is virtual representation of physical market.

A. edi
B. electronic market
C. e-commerce
D. internet commerce

View Answer

Question 19

__________ is a best example of Online Stored Value System.

A. google
B. yahoo
C. paypal
D. go daddy

View Answer

Question 20

____________ are networks that connect people within a company to each other and to thecompany network.

A. Internets
B. Intranets
C. Extranets
D. Components

View Answer

Question 21

______________ are networks that connect people within a company to each other andto the company network.

A. bitstreams
B. extranets
C. internets
D. intranets

View Answer

Question 22

______________ includes all electronics-based information exchanges within or between companies and customers.

A. E-commerce
B. E-marketing
C. E-communication
D. E-business

View Answer

Question 23

______________ influence the behavior of others through their personality, skills, or otherfactors.

A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups

View Answer

Question 24

______________ influence the behavior of others through their personality, skills, orother factors.

A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups

View Answer

Question 25

______________ is a program that you can run from the DOS prompt in the Windowsoperating system in order to check the connection between your client and the server.

A. ping
B. telnet
C. tracert
D. ssl

View Answer

Question 26

”Google” is one of the most popular____________________

A. portal
B. browser
C. search engine
D. none of these

View Answer

Question 27

”Google” is one of the most popular____________________ a)Portal b)Browser c)Search Engine d)none of these50. A _______________________ presents information from diverse sources in a unified way in a web site.

A. Web portal
B. Link page
C. Both of these
D. none of these

View Answer

Question 28

______________Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 29

______________sites act as an intermediary between someone wanting a product or service andpotential providers

A. brokering sites
B. Information sites
C. industry portals
D. none of these

View Answer

Question 30

______________sites act as an intermediary between someone wanting a product or serviceand potential providers

A. brokering sites
B. information sites
C. industry portals
D. none of these

View Answer

Question 31

_________________allows the person to type ion just the main word or words and the site will come in

A. Web page
B. home page
C. domain
D. none of these

View Answer

Question 32

_________________allows the person to type ion just the main word or words and the site willcome in

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 33

_________________e-commerce transaction has the advantage of eliminating middlemen.

A. b2g
B. b2c
C. b2b
D. b2e

View Answer

Question 34

_________________e-commerce transaction has the advantage of eliminating middlemen.

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 35

_________________focus on producing a highly integrated value proposition through a managed process.

A. hubs
B. community
C. contents
D. none of these

View Answer

Question 36

_________________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.

A. debit card
B. credit card
C. electronic purse
D. any of these

View Answer

Question 37

_________________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

View Answer

Question 38

_______________ provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these

View Answer

Question 39

_______________cards and ____________ cards are two ways to make payments on a web site

A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above

View Answer

Question 40

_______________ is a form of supply chain where a series of assembly operations are carried out toobtain the final product

A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None

View Answer

Question 41

_______________ is a form of supply chain where a series of assembly operations are carriedout to obtain the final product

A. converging supply chain
B. diverging supply chain
C. any of these
D. none

View Answer

Question 42

_______________ is a systems approach to Managing the entire flow of information, materials, andservices from raw material suppliers through factories and warehouses to the end customer.

A. CRM
B. SRM
C. EDI
D. SCM

View Answer

Question 43

_______________ is an approach to deliver information differentiated business values called servicesby combining the system and process generally called resources

A. E-business
B. E-commerce
C. any of these
D. none

View Answer

Question 44

__________________is essentially a business process that connects manufacturers, retailers,customers and suppliers in the form of a chain to develop and deliver products.

A. E-commerce
B. EDI
C. SCM
D. Networking

View Answer

Question 45

____________________is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

View Answer

Question 46

____________________is a kind of payment card that transfers fund directly from theconsumer’s bank account to the merchants account

A. debit card
B. electronic purse
C. credit card
D. any of these

View Answer

Question 47

____________________is a set of standards developed in the 1960s to exchange business informationand to do electronic transactions

A. EDI
B. Protocols
C. TCP/IP
D. None of these

View Answer

Question 48

____________________are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 49

____________________is concerned with the buying and selling information, products and services overcomputer communication networks

A. Commerce
B. E-Commerce
C. E-Business
D. None of these

View Answer

Question 50

____________________is concerned with the buying and selling information, products andservices over computer communication networks

A. commerce
B. e-commerce
C. e-business
D. none of these

View Answer

Question 51

____________________is the most unwanted of online advertising methods.

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 52

__________________ acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 53

__________________ always operate on intranet

A. e--commerce
B. e-business
C. edi
D. none of these

View Answer

Question 54

__________________ and _____________________ were the enabling technologies that laid the ground work for E- commerce

A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these

View Answer

Question 55

__________________ in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer

View Answer

Question 56

__________________ is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments

A. customer
B. issuer
C. merchant
D. acquirer

View Answer

Question 57

__________________ is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.

A. customer
B. issuer
C. merchant
D. acquirer

View Answer

Question 58

_______________________are program developed by some dishonest people to destroy the computersystem and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these

View Answer

Question 59

__________________ is a programme designed o replicate and spread generally with the victim beingoblivious to its existence

A. hacker
B. software
C. Computer virus
D. none of these

View Answer

Question 60

_______________________are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.

A. network firewall
B. computer virus
C. both of these
D. none of these

View Answer

Question 61

__________________ is an early form of E-commerce

A. scm
B. edi
C. both of these
D. none of these

View Answer

Question 62

_______________________is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 63

__________________ is the exchange of goods or items or commodities and services or applicationsused for money and deals the money matters

A. E-commerce
B. Commerce
C. Both of these
D. none

View Answer

Question 64

_______________________is the buying and selling of goods and services through wireless handleddevices such as cellular phone and Personal Digital Assistants

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

View Answer

Question 65

__________________ is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these

View Answer

Question 66

_____________________ ads take up the entire screen and are more powerful than banner ads.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 67

_____________________ are interactive online ads that require the user to respond intermittently inorder to wade through the message before reaching the intended content.

A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 68

_____________________ e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 69

_____________________ e-commerce involves customers gathering information, purchasing andreceiving products over an electronic network

A. b2g
B. b2e
C. b2b
D. b2c

View Answer

Question 70

_____________________ e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. c2c
B. b2e
C. b2b
D. b2g

View Answer

Question 71

_____________________ e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. B2G
B. B2E
C. B2B
D. C2C

View Answer

Question 72

_____________________ is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these

View Answer

Question 73

_____________________ is a financial instrument which can be used more than once to borrowmoney or buy products and services on credit.

A. credit card
B. e-cheques
C. e-cash
D. none of these

View Answer

Question 74

_____________________ is an internet network that allows users with the same network in software toconnect to each other’s hard disks and exchange files

A. P2P
B. B2E
C. B2B
D. B2C

View Answer

Question 75

_____________________ is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files

A. b2c
B. b2e
C. b2b
D. p2p

View Answer

Question 76

_____________________ is the first page of a web site.

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 77

_____________________ is the reverse process of encryption, to make the information readable onceagain

A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography

View Answer

Question 78

__________________________card is a model of IPS

A. Smart
B. Debit
C. Credit
D. All the above

View Answer

Question 79

__________________________e-commerce consists of the sale of products or services from a business tothe general public

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 80

__________________________e-commerce consists of the sale of products or services from abusiness to the general public

A. b2g
B. b2e
C. b2b
D. b2c

View Answer

Question 81

__________________________streamlines the flow of information and self service capabilities throughautomation

A. SCC
B. CRM
C. CRP
D. SCM

View Answer

Question 82

________________________card is a card with a built-in chip capable of storing information in itsmemory

A. Debit
B. Credit
C. Smart
D. None of the above

View Answer

Question 83

__________________________streamlines the flow of information and self service capabilitiesthrough automation

A. scc
B. crm
C. crp
D. scm

View Answer

Question 84

________________________ is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

View Answer

Question 85

________________________ is an online auctioning site that facilitates the trade of privatelyowned items between individuals.

A. e-bay
B. amazon.com
C. rentalic.com
D. all of these

View Answer

Question 86

________________________ website is one that changes or customizes itself frequently and automaticallybased on certain criteria

A. Dynamic website
B. (Static Website
C. phish site
D. none of these

View Answer

Question 87

______________________________________ads appears as rectangular graphics near the top of the page

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 88

_________________________________is an application of smart card

A. ATM
B. Telecommunication
C. Transportation
D. None of the above

View Answer

Question 89

___________________________cards directly transfer funds from consumers bank account to themerchant’s

A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above

View Answer

Question 90

___________________________ allows the transfer of money itself

A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above

View Answer

Question 91

___________________________ credit card gives all the advantages of a normal credit card without worryingabout the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these

View Answer

Question 92

___________________________ credit card gives all the advantages of a normal credit cardwithout worrying about the interest charges

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 93

___________________________ is a person who breaks in or trespasses a computer system

A. hacker
B. snooper
C. operator
D. spoofer

View Answer

Question 94

________________________are special type of software meant for limiting the risks of being hit bycomputer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 95

________________________encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these

View Answer

Question 96

________________________encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.

A. ssl
B. set
C. both of these
D. none of these

View Answer

Question 97

________________________facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.

A. Cash advance
B. Revolver
C. Tele draft
D. None of these

View Answer

Question 98

________________________facility helps the customer to pay only a small amount of the totaloutstanding and revolve the rest of the payment to the next month.

A. cash advance
B. revolver
C. tele draft
D. none of these

View Answer

Question 99

________________________is a form of supply chain where a wide variety of finished goods are producedwith limited number of raw material or components.

A. Converging structure
B. Diverging structure
C. Any of these
D. None

View Answer

Question 100

________________________is basically a TV commercial that runs in the browser window.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 101

________________________is the exchange of services, information or product from one business to agovernment agency

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 102

________________________is the exchange of services, information or product from onebusiness to a government agency

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 103

______________________________ is a form of advertisement on the web that appears between web pagesthat the user requests.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 104

_____________________is the process of making information unintelligible to the unauthorized user.

A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography

View Answer

Question 105

_____________________is a class of advertising methods which are considered unethical and may evenbe illegal

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 106

__________________are animated full screen ads placed at the entry of a site before a user reachesthe intended content.

A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 107

_____________________is an application layer protocol for distributed, collaborative, hypermedia information systems.

A. html
B. http
C. bothe of these
D. none of these

View Answer

Question 108

_____________________is an application layer protocol for distributed, collaborative, hypermediainformation systems.

A. html
B. HTTP
C. Bothe of these
D. None of these

View Answer

Question 109

_____________________is basically a concept of online marketing and distributing of products andservices over the internet

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 110

__________________attacks are difficult and are only successful if the attacker knows somethingabout the shopper

A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords

View Answer

Question 111

_____________________is basically a concept of online marketing and distributing of productsand services over the internet

A. b2g
B. b2e
C. b2c
D. b2b

View Answer

Question 112

__________________is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means

A. E-commerce
B. SCM
C. EDI
D. None of these

View Answer

Question 113

__________________is a commercial process that includes production, distribution, sales ordelivery of goods and services through electronic means

A. e-commerce
B. scm
C. edi
D. none of these

View Answer

Question 114

__________________is a global web in which millions of users are communicating with each other withthe help of computers.

A. Internet
B. WWW
C. both of these
D. None of these

View Answer

Question 115

__________________is a global web in which millions of users are communicating with eachother with the help of computers.

A. internet
B. www
C. both of these
D. none of these

View Answer

Question 116

__________________is a type of EPS

A. Credit card
B. Debit card
C. Smart card
D. All the above

View Answer

Question 117

_______________is an example for a software that visits suggested pages and return the appropriateinformation to be indexed by the search Engine

A. Robot
B. Spiders
C. Ants
D. All

View Answer

Question 118

__________________is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networkswith the help of an electronic device.

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

View Answer

Question 119

__________________is automated methods of recognizing a person based on a physiological orbehavioral characteristic.

A. biometrics
B. pin
C. both of these
D. none of these

View Answer

Question 120

__________________is basically a secure gate between our organization data and internet.

A. network firewall
B. antivirus
C. both of these
D. none of these

View Answer

Question 121

__________________site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these

View Answer

Question 122

__________________type of payment system is highly useful to those customers who would like tocontrol overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these

View Answer

Question 123

__________________type of payment system is highly useful to those customers who wouldlike to control overspending,

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 124

__________________were the first to establish prominent E-commerce Brands

A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these

View Answer

Question 125

_______________allows a business application on the computer of one organization to communicatedirectly with the business application on the computer of another company.

A. EDI
B. Protocols
C. Standards
D. Business applications

View Answer

Question 126

_______________allows a business application on the computer of one organization tocommunicate directly with the business application on the computer of another company.

A. edi
B. protocols
C. standards
D. business applications

View Answer

Question 127

_________refers to a kind of e-commerce which refers to a company selling or buying from othercompany

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 128

_________refers to a kind of e-commerce which refers to a company selling or buyingfrom other company

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 129

A portal that helps to establish relations and to conduct transactions between variousorganizations is termed as__________________

A. b2b portals
B. c2c portals
C. both of these
D. none of these

View Answer

Question 130

A ______________ is the set of planned activities designed to result in a profit in amarketplace.

A. business model
B. profit model
C. business plan
D. revenue model

View Answer

Question 131

A __________________ is a document, typically written in plain text interspersed with formattinginstructions of html

A. Web page
B. home page
C. domain
D. none of these

View Answer

Question 132

A __________________ is a document, typically written in plain text interspersed withformatting instructions of html

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 133

A _______________________ presents information from diverse sources in a unified way in aweb site

A. web portal
B. link page
C. both of these
D. none of these

View Answer

Question 134

A _______________________ Presents information from diverse sources in a unified way in aweb site.

A. web portal
B. link page
C. both of these
D. none of these

View Answer

Question 135

A ________________________ is a software that scours the internet collecting data about every websiteand every webpage within it

A. spiders
B. Search Engines
C. robots
D. none of these

View Answer

Question 136

A ________________________ is a software that scours the internet collecting data about everywebsite and every webpage within it

A. spiders
B. search engines
C. robots
D. none of these

View Answer

Question 137

A __________________is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these

View Answer

Question 138

A __________________is an electronic file that uniquely identifies individuals and websites onthe internet and enables secure confidential communications

A. digital signature
B. digital certificates
C. ssl
D. none of these

View Answer

Question 139

A combination of software and information designed to provide security and information for payment is called a what?

A. digital wallet
B. pop up ad
C. shopping cart
D. encryption

View Answer

Question 140

A combination of software and information designed to provide securityand information for payment is called a?

A. digital wallet
B. pop up ad
C. shopping cart
D. encryption

View Answer

Question 141

A business cannot be all things to all people. Instead, a business must:

A. identify target customers
B. identify the value of products/services as perceived by customers
C. all of the above
D. none of the above

View Answer

Question 142

A business competing in a commodity like environment must focus on which of the following?

A. price
B. ease / speed of delivery
C. ease of ordering
D. all of the above

View Answer

Question 143

A business competing in a commodity like environment must focus onwhich of the following?

A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above

View Answer

Question 144

A company that manufacturers bicycles may use the internet to purchase tyres from theirsuppliers. This is an example of___________transaction.

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 145

A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of___________transaction

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 146

A digital signature is required _____i) to tie an electronic message to the sender’s identityii) for non repudiation of communication by a sender

A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv

View Answer

Question 147

A hardened firewall host on an Intranet is

A. a software which runs in any of the computers in the intranet
B. a software which runs on a special reserved computer on the intranet
C. a stripped-down computer connected to the intranet
D. a mainframe connected to the intranet to ensure security

View Answer

Question 148

A materials requirements planning (MRP) system is an example of ______________.

A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange

View Answer

Question 149

A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?

A. switching costs
B. loyalty programs
C. entry barriers
D. affiliate programs

View Answer

Question 150

A security plan begins with a(n) is ______________.

A. security policy
B. risk assessment
C. implementation plan
D. security organization

View Answer

Question 151

A strength of social media and viral marketing is:

A. Cannot be ignored in user's inbox
B. Considered credible
C. It is possible to reach a large number at relatively low cost
D. Highly targeted with controlled costs

View Answer

Question 152

A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as:

A. Value chain and marketplace positioning
B. Value proposition
C. Online business model
D. Revenue model and cost base

View Answer

Question 153

A web page is transferred to users computer through __________________________

A. html
B. ftp
C. http
D. none of these

View Answer

Question 154

A website offering content created by third party transparently to customers is anexample of ______________.

A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order

View Answer

Question 155

A(n) __________ is a private corporate network that uses standard Internet protocolsand interfaces.

A. ethernet
B. extranet
C. local area network
D. intranet

View Answer

Question 156

A(n) ______________ represents data as two-dimensional tables with recordsorganized in rows and attributes in columns.

A. database management system
B. data warehouse
C. sql query
D. relational database

View Answer

Question 157

A__________________ is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.

A. Hacker
B. spoofer
C. operator
D. none of these

View Answer

Question 158

A_____________________ provides a way to associate the message with the sender and is theequivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these

View Answer

Question 159

A_______________portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 160

A_______________portal is a specialized entry point to a specific market place or industryniche.

A. vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 161

ACH is

A. Acid consistency house
B. Automated clearing house
C. Automated consistency house
D. None of the above

View Answer

Question 162

Acid testis a set of properties of money transfer that include

A. Atomicity and isolation
B. Consistency and durability
C. Both (a) and (b)
D. None of the above

View Answer

Question 163

Advantage of e-com is

A. Lower cost
B. Economy
C. Higher margins
D. All of the above

View Answer

Question 164

Advantages of B2C commerce are(i) Business gets a wide reach to customers(ii) Payment for services easy(iii) Shop can be open 24 hours a day seven days a week(iv) Privacy of transaction always maintained

A. i and ii
B. ii and iii
C. i and iii
D. iii and iv

View Answer

Question 165

Advantages of e-commerce are

A. Low cost
B. Economical
C. Productivity gains
D. All the above

View Answer

Question 166

Advertisements take the form of a website copy are called______________________________

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 167

Affiliate revenue is also called as _______.

A. commission
B. brokerage
C. referral fee
D. discount

View Answer

Question 168

All of the following are major categories of computer viruses except ______________.

A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses

View Answer

Question 169

All of the following are techniques B2C e-commerce companies use to attract customers, except:

A. registering with search engines
B. viral marketing
C. online ads
D. virtual marketing

View Answer

Question 170

All of the following are techniques B2C e-commerce companies use toattract customers, except

A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing

View Answer

Question 171

All of the following are technologies used to gather information about you onlineexcept ______________.

A. spy ware
B. cookies
C. gmail
D. anonymizers

View Answer

Question 172

All of the following are types of social marketing except ______________.

A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising

View Answer

Question 173

An electronic check is one form of what?

A. e-commerce
B. online banking
C. e-cash
D. check

View Answer

Question 174

An industry is less attractive for suppliers when the rivalry among existing competitors is:

A. high
B. low
C. more
D. less

View Answer

Question 175

An industry is less attractive for suppliers when the rivalry among existingcompetitors is:

A. High
B. Low
C. More
D. Less

View Answer

Question 176

An online retail store is called as _____.

A. trader
B. retailer
C. e-tailer
D. amazon

View Answer

Question 177

Applications of smart card are:

A. Government
B. Identification
C. Health care
D. All the above

View Answer

Question 178

B2B2C is a model of

A. E-commerce
B. E-business
C. Data mining
D. None of the above

View Answer

Question 179

Barriers to entry into an industry are likely to be high if:

A. Switching costs are low
B. Differentiation is low
C. Requirement for economies of
D. Access to distribution

View Answer

Question 180

Before developing any type of strategy, a management team needs to agree the process they will follow for generating and then implementing the strategy. A framework that gives a logical sequence to follow to ensure inclusion of all key activities of an ebusiness strategic development is generally known as:

A. An E-channel strategy
B. E- business stratification process
C. A strategy process model
D. Multi-channel e-business strategy

View Answer

Question 181

BitTorrent.Com is an example of _____

A. b2b
B. b2c
C. c2c
D. p2p

View Answer

Question 182

BPM is about:

A. Aligning business processes toorganisational
B. Maintaining a process view of the organisation ratherthan a functional
C. Establishing and maintaining an environment ofcontinuous
D. All of the above

View Answer

Question 183

By electronic commerce we mean:

A. Commerce of electronic goods
B. Commerce which depends on electronics
C. Commerce which is based on the use of internet
D. None of the above

View Answer

Question 184

Complete price transparency in a perfect information marketplace is necessary for______________ to take effect.

A. bertrand\s law
B. the law of universal prices
C. the law of one price
D. the law of perfect commerce

View Answer

Question 185

Companies use___________________________networks to automate employee related corporate processes.

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 186

Companies use___________________________networks to automate employee related Corporateprocesses.

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 187

Conversion of Plain text to Cipher Text is called__________________

A. Encryption
B. Decryption
C. Cryptography
D. none of these

View Answer

Question 188

Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as______________________________.

A. Spoofing
B. Snooping
C. Sniffing
D. None of these

View Answer

Question 189

Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.

A. versioning
B. bundling.
C. transactive content
D. price discrimination

View Answer

Question 190

Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.

A. versioning
B. bundling.
C. transitive content
D. price discrimination

View Answer

Question 191

Credit cards _______________convenient for making small purchases

A. Are
B. Are not
C. Both (a) and (b)
D. None of the above

View Answer

Question 192

CRM is :

A. Customer Relationship
B. Customer Relationship
C. Customer Recovery
D. Consumer Relation

View Answer

Question 193

Currency used in e-business transactions around the world

A. Dollars
B. Rupees
C. None of the above
D. All the above

View Answer

Question 194

Debit card is used for

A. On line transactions
B. Off line transaction
C. Both (a) and (b)
D. None of the above

View Answer

Question 195

Digital Accumulating Balance Payment System is generally used for ______ payments.

A. micro
B. macro
C. credit card
D. debit card

View Answer

Question 196

Digital products are best suited for B2C e-commerce because they:

A. are commodity like products
B. can be mass-customized and personalized
C. can be delivered at the time of purchase
D. all of the above

View Answer

Question 197

Digital Products are best suited for B2C e-commerce because they:

A. Are commodity like products
B. Can be mass- customized and
C. Can be delivered at the time of
D. All of the mentioned

View Answer

Question 198

Digital products are best suited for B2C e-commerce because they:

A. Are commodity like products
B. Can be mass-customised and personalised
C. Can be delivered at the time of purchase
D. All of the above

View Answer

Question 199

Disadvantages of e-Commerce in India are(i) internet access is not universally available(ii) credit card payment security is not yet guaranteed(iii) transactions are de-personalized and human contact is missing(iv) cyberlaws are not in place

A. i and ii
B. ii and iii
C. i, ii, iii
D. i, ii, iii, iv

View Answer

Question 200

E-commerce involves

A. marketing
B. advertising
C. warehousing
D. all of the above

View Answer

Question 201

E-commerce is

A. B2C
B. B2B
C. C2B
D. All the above

View Answer

Question 202

E-Commerce Lacks _______ touch.

A. social
B. smooth
C. personal
D. communication

View Answer

Question 203

E-commerce technologies have improved upon traditional commerce technologies in______________.

A. richness
B. reach
C. both richness and reach
D. neither richness nor reach

View Answer

Question 204

EFT is a computer based system

A. TRUE
B. FALSE
C. none
D. all

View Answer

Question 205

Electronic Exchange of business documents in a standard format is known as __________________

A. E-commerce
B. E-Business
C. EDI
D. None of these

View Answer

Question 206

Electronic Exchange of business documents in a standard format is known as__________________

A. e-commerce
B. e-business
C. edi
D. none of these

View Answer

Question 207

Electronic payment is a financial transaction made ____________The use of paper documents

A. With
B. Without
C. Both (a) and (b)
D. None of the above

View Answer

Question 208

Electronic payment media can be grouped into

A. Trusted third party type
B. Notational fund transfers related type
C. Authentication type
D. All the above

View Answer

Question 209

E-mail which contain useless material is termed as___________________________

A. Spam
B. useless mail
C. trunk mail
D. Junk mail

View Answer

Question 210

E-mail which contains useless material is termed as_______________

A. spam
B. useless mail
C. trunk mail
D. junk mail

View Answer

Question 211

E-money has_______________.types

A. 3
B. 4
C. 5
D. 6

View Answer

Question 212

E-money is a _______________medium for making payments

A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above

View Answer

Question 213

EFT is

A. Electronic Fund Transfer
B. Electrical fund transfer
C. Electronic fast transfer
D. None of the above

View Answer

Question 214

English physicist Tim Berner’s Lee was famous for the establishment of _______________________in 1990.

A. internet
B. WWW
C. Intranet
D. none of these

View Answer

Question 215

English physicist Tim Berner’s Lee was famous for the establishment of_______________________in 1990.

A. internet
B. www
C. intranet
D. none of these

View Answer

Question 216

ERP stands for

A. enterprise resolution planning
B. enterprise reverse planning
C. enterprise resource planning
D. none of the above

View Answer

Question 217

E-tailer can be Pure Plays or _______ .

A. impure plays
B. indirect plays
C. bricks & clicks
D. direct plays

View Answer

Question 218

E-Tailer revenue model is ______ revenue.

A. sales
B. subscription
C. advertising
D. affiliate

View Answer

Question 219

Flipkart.com is an example of _______.

A. b2b
B. b2c
C. c2c
D. p2p

View Answer

Question 220

Gain entry into the user’s system and scan your file system for personal information isknown as__________________.

A. Spoofing
B. Snooping
C. Sniffing
D. None of these

View Answer

Question 221

Google.com is an example of a:

A. Destination site
B. Portal
C. Search engine
D. None of the above

View Answer

Question 222

he dimension of e-commerce that enables commerce across national boundaries is called______________.

A. interactivity
B. global reach
C. richness
D. ubiquity

View Answer

Question 223

How the transactions occur in e-commerce?

A. using e-medias
B. using computers only
C. using mobile phones only
D. none of the above

View Answer

Question 224

Identify the identity of a person or entity with whom you are dealing on Internet is knownas ______.

A. integrity
B. authenticity
C. authorisation
D. none of these

View Answer

Question 225

amazon.com is an example of ______

A. b2b
B. b2c
C. c2c
D. p2p

View Answer

Question 226

Amazon.com is well-known for which e-commerce marketing technique?

A. banner ads
B. pop-up ads
C. affiliate programs
D. viral marketing

View Answer

Question 227

Among the alternate models of B2B e-commerce,______is the best means to obtain acompetitive advantage in the Market place.

A. process based
B. strategic relationship based
C. transaction based
D. any of these

View Answer

Question 228

If it is easy for competitors to enter the market, the threat of new entrants is considered:

A. high
B. low
C. more
D. less

View Answer

Question 229

If it is easy for competitors to enter the market, the threat of new entrantsis considered:

A. High
B. Low
C. More
D. Less

View Answer

Question 230

If the threat of substitute products or services is low it is a(n):

A. disadvantage to the supplier
B. advantage to the buyer
C. advantage to the supplier
D. none of the above

View Answer

Question 231

If you need to transfer money to another person via the internet, which of the following methods could you use?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above

View Answer

Question 232

If you need to transfer money to another person via the internet, which ofthe following methods could you use?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above

View Answer

Question 233

In ____ server-side authentication is compulsory.

A. ssl
B. set
C. e-commerce
D. m-commerce

View Answer

Question 234

In _______ user can share files and computer resources directly.

A. b2b
B. b2c
C. c2c
D. p2p

View Answer

Question 235

In _______, one consumer deals with another consumer.

A. c2c
B. b2c
C. b2b
D. p2p

View Answer

Question 236

In ________ encryption is performed with session key.

A. public key
B. private key
C. ssl
D. set

View Answer

Question 237

In _______________________type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 238

In Biometrics,______________________________ID system is designed to prevent more than one person fromusing a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

View Answer

Question 239

In Biometrics,______________________________ID system is designed to prevent one person from usingmore than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

View Answer

Question 240

In Biometrics,______________________________ID system is designed to prevent one personfrom using more than one identity

A. positive id system
B. negative id system
C. both of these
D. none of these

View Answer

Question 241

In Porter's Five Forces, the 'threat of new entrants' relates to:

A. Barriers to entry
B. Substitutes
C. Switching costs
D. Buyer power

View Answer

Question 242

In Public Key Encryption ______ key is used for Decryption.

A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private

View Answer

Question 243

In Public Key Encryption ______ key is used for Encryption.

A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private

View Answer

Question 244

In public key encryption ______ keys are used.

A. public and private
B. only public
C. only private
D. session

View Answer

Question 245

In SSL _______ key is used for encryption.

A. public
B. private
C. session
D. otp

View Answer

Question 246

In SSL encryption is done using ____ key.

A. public
B. private
C. session
D. symmetric

View Answer

Question 247

In SSL URL will change from HTTP to _______.

A. cipher text
B. https
C. shttp
D. smtp

View Answer

Question 248

In traditional commerce, people buy goods and services:

A. over the internet
B. physical visit
C. Both online & offline
D. None of the mentioned

View Answer

Question 249

In which one of the following type of E-Commerce, consumer sells to consumer directly?

A. C2B
B. B2C
C. B2B
D. C2C

View Answer

Question 250

In which website Global Easy Buy is facilitated?

A. ebay.com
B. amazon.com
C. yepme.com
D. none of these

View Answer

Question 251

In which year the IT Act was introduced?

A. 2000
B. 2020
C. 2001
D. 2010

View Answer

Question 252

In_____________________., each transaction must be independent

A. Consistency
B. Isolation
C. Durability
D. None of the above

View Answer

Question 253

India has enacted the first IT Act in the year________________________

A. 2001
B. 2002
C. 2009
D. 2000

View Answer

Question 254

India has enacted the first IT Act in the year__________________________________________

A. 2001
B. 2002
C. 2009
D. 2000

View Answer

Question 255

Industry structure is defined as ______________.

A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company\s product or service fulfills the needs of customers

View Answer

Question 256

Information sent over the Internet commonly uses the set of rules called_____________________________

A. TCP/IP
B. FTP
C. HTTP
D. gopher

View Answer

Question 257

Information sent over the Internet commonly uses the set of rulescalled________________________

A. tcp/ip
B. ftp
C. http
D. gopher

View Answer

Question 258

Internet users account for about ______________ of the world's population.

A. 7%
B. 17%
C. 27%
D. 47%

View Answer

Question 259

Logistics is the part of a supply chain involved with the forward and reverse flow of

A. goods
B. services
C. cash
D. All of the above

View Answer

Question 260

Main models of internet based payment system are:

A. Electronic currency
B. Credit card
C. Debit card
D. All the above

View Answer

Question 261

Materials used in the normal operation of a business but not related to primary business operations are called what?

A. supplies
B. direct materials
C. indirect materials
D. daily stuff

View Answer

Question 262

Materials used in the normal operation of a business but not related toprimary business operations are called what?

A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff

View Answer

Question 263

Mobile commerce is same as

A. E-commerce
B. E-business
C. Data mining
D. None of the above

View Answer

Question 264

Monster.com is an example of __________________________website

A. c2c
B. b2e
C. b2b
D. b2c

View Answer

Question 265

Most common uses of the Internet and the Web include communicating, shopping,

A. searching, entertainment, and education
B. e-commerce, e-mail, and searching
C. e-mail, entertainment, and education
D. e -commerce, e-mail, and education

View Answer

Question 266

Most individuals are familiar with which form of e-commerce?

A. b2b
B. b2c
C. c2b
D. c2c

View Answer

Question 267

Moving from one Web site to another is called

A. jumping
B. moving
C. surfing
D. applying

View Answer

Question 268

Normally in M-commerce language used to create web pages is _______.

A. html
B. wml
C. vb
D. xml

View Answer

Question 269

olx.com is an example of ________

A. b2b
B. b2c
C. c2c
D. p2p

View Answer

Question 270

Once segments have been identified, organizations need to define how best to position their online services relative to competitors according to four main variables: product quality, service quality, and fulfillment time. Which variable is missing?

A. After sales service
B. Brand perception
C. Customer value
D. Price

View Answer

Question 271

Paisapay is facilitated in

A. ebay.co.in
B. amazon.com
C. flipkart.com
D. none of the above

View Answer

Question 272

Paisapay is facilitated in__________________

A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above

View Answer

Question 273

Payment systems via the internet include

A. Cyber cash
B. First virtual
C. Both (a) and (b)
D. None of the above

View Answer

Question 274

Peer to Peer [P2P] is also used to describe ___________________________

A. c2c
B. b2e
C. b2b
D. b2c

View Answer

Question 275

Peer to Peer [P2P] is also used to describe______________________________.

A. C2C
B. B2E
C. B2B
D. B2C

View Answer

Question 276

Promotion of products in e-commerce can be done by

A. Social media
B. Online Ads
C. Blog
D. All of the mentioned

View Answer

Question 277

Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt dataThe key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key.

A. encryption, decryption
B. private, public
C. encryption, public
D. public, private

View Answer

Question 278

Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt dataThe key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.

A. encryption, decryption
B. private, public
C. encryption, public
D. public, private

View Answer

Question 279

RACE is a practical framework to help marketers manage and improve the commercial value gained from digital marketingThe term stands for Reach, Act, C, Engage. What does 'C' refer to?

A. Collaborate
B. Collect
C. Consolidate
D. Convert

View Answer

Question 280

Reverse logistics is required because

A. Goods are defective
B. Goods are unsold
C. The customers simply change
D. All of the above

View Answer

Question 281

Rules for exchanging data between computers are called

A. programs
B. procedures
C. protocols
D. hyperlinks

View Answer

Question 282

Scope of E-Commerce is ______.

A. local
B. global
C. within own country
D. within own state

View Answer

Question 283

Search Engines databases are selected and built by computer robot programscalled___________________________

A. spiders
B. Search Engines
C. robots
D. none of these

View Answer

Question 284

Secure Sockets Layers does which of the following?

A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above

View Answer

Question 285

Security is a serious concern for e-business managers and there are many potential risks concerning unauthorized access to customer and company data. One way this occurs is through misleading users through setting up a bogus website and gaining user details online. What is this method known as?

A. Denial of service
B. Phishing
C. Malware
D. Firewalling

View Answer

Question 286

SET is developed by association led by _________.

A. master card and visa
B. master card
C. visa
D. rupay

View Answer

Question 287

SET means __________________

A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these

View Answer

Question 288

SET means _________________________________.

A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these

View Answer

Question 289

Smart card is same as______.

A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above

View Answer

Question 290

Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category?

A. Portal, publisher or media sites
B. Brand-building sites
C. Transactional e-commerce sites
D. Services-orientated relationship-building websites

View Answer

Question 291

SSL can be used only with _____.

A. ftp
B. http
C. pop
D. smtp

View Answer

Question 292

Standards of EDI are decided by ______

A. ascii
B. ansi
C. usa
D. government

View Answer

Question 293

The __________ is the multimedia interface to resources available on the Internet.

A. Web
B. ISP
C. browser
D. URL

View Answer

Question 294

The ability to change the product to better fit the needs of the customer is called______________.

A. customization
B. personalization
C. privacy
D. accessibility

View Answer

Question 295

The approach by which applications of internal and external electronic communications can support and influence strategy is a definition of:

A. Corporate Strategy
B. E-channel strategy
C. E-business strategy
D. E-business responsibility

View Answer

Question 296

is an early form of E-Commerce.

A. SCM
B. EDI
C. Both SCM & EDI
D. None of the mentioned

View Answer

Question 297

The best products to sell in B2C e-commerce are:

A. small products
B. digital products
C. specialty products
D. fresh products

View Answer

Question 298

The best products to sell in B2C e-commerce are:

A. Small Products
B. Digital Products
C. Special Products
D. Fresh Products

View Answer

Question 299

The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________.

A. tcp
B. ip
C. the network layer
D. the application layer

View Answer

Question 300

The dimension of E-Commerce that enables commerce across the boundaries is called

A. interactivity
B. global reach
C. richness
D. ubiquity

View Answer

Question 301

The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as:

A. Business to Business (B2B).
B. Consumer to Business (C2B).
C. Business to Consumer (B2C).
D. Consumer to Consumer (C2C).

View Answer

Question 302

The E-commerce domain that involves business activity initiated by the consumer andtargeted to businesses is known as ______________.

A. business to business (b2b)
B. consumer to consumer (c2c)
C. consumer to business (c2b)
D. business to consumer (b2c)

View Answer

Question 303

The ethical principle which states that if an action is not right for all situations, then itis not right for any situation is known as ______________

A. the golden rule
B. slippery slope
C. no free lunch
D. universalism

View Answer

Question 304

The fastest-growing application for the Internet is

A. going shopping
B. conducting research
C. playing games, reading, and listening to music
D. using e-mail

View Answer

Question 305

The flip side of e-marketing is:

A. e-advertising
B. e-selling
C. e-commerce
D. e-purchasing

View Answer

Question 306

The information Technology Act [IT ACT] came into effect on

A. 16th november 2000
B. 15th december 2000
C. 17th october 2000
D. none of these

View Answer

Question 307

The majority of job seekers rely on which of the following?

A. word-of-mouth leads
B. employment agencies
C. internet and newspapers equally
D. internet only

View Answer

Question 308

The most common method for gaining access to the Internet is through a __________.

A. dumb terminal
B. virtual provider or computer
C. point-to-point computer
D. provider or host computer

View Answer

Question 309

The most common type of Internet crime according to the IC3 is ______________.

A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud

View Answer

Question 310

The most prevalent online payment method is ______________.

A. paypal
B. checks
C. credit cards
D. debit

View Answer

Question 311

The multimedia interface to the resources available on the Net is called the

A. World Wide Web
B. Internet
C. GUI interface
D. Server

View Answer

Question 312

The percentage of people who visit web site and buy something is known as _____

A. hits
B. conversion rate
C. affiliate
D. walk-in-customer

View Answer

Question 313

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

A. hacking
B. cracking
C. dumpster diving
D. spoofing

View Answer

Question 314

The practice of forging a return address on an e-mail so that the recipientis fooled into revealing private information is termed?

A. hacking
B. cracking
C. dumpster diving
D. spoofing

View Answer

Question 315

In future, some suggest that the task of searching for suppliers and products may be taken over by computer programmes which have defined rules or some degree of intelligence that replicates human neural functioningThese programmes are known as:

A. Spider search engines
B. HTML
C. E-marketplace search engines
D. Software intelligent agents

View Answer

Question 316

In ICES test, C means

A. Consistency
B. Complexity
C. Conservation
D. None of the above

View Answer

Question 317

The primary source of financing during the early years of e-commerce was______________.

A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings

View Answer

Question 318

The process of getting customers to pass along a company's marketing message tofriends, family, and colleagues is known as ______________

A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing

View Answer

Question 319

The purpose of __________________page is to provide links to other pages

A. Home page
B. Web page
C. Summary page
D. None of these

View Answer

Question 320

The purpose of supply chain management is

A. provide customer
B. improve quality of a product
C. integrating supply and demand
D. increase production

View Answer

Question 321

The redirection of traffic from a legitimate site to an infringing site is called______________.

A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording

View Answer

Question 322

The sender and receiver will have the same key in _____ Key Encryption.

A. symmetric
B. asymmetric
C. public
D. private

View Answer

Question 323

The solution for all business needs is

A. edi
B. erp
C. scm
D. none of the above

View Answer

Question 324

The source of revenue in a subscription revenue model is ______________.

A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
D. fees for enabling or execution a transaction

View Answer

Question 325

The technology behind M-commerce is based on ______.

A. http
B. https
C. wap
D. pop

View Answer

Question 326

The term ISP refers to

A. internal software protocol
B. international shareware pool
C. Internet service provider
D. interface standard protocol

View Answer

Question 327

The threat of new entrants is high when it is:

A. hard for customers to enter the market
B. hard for competitors to enter the market
C. easy for competitors to enter the market
D. easy for customers to enter the market

View Answer

Question 328

The types of Business to Business e-commerce are ________________

A. Direct selling and support to Business
B. Industry portals
C. Information sites about a industry
D. All the above

View Answer

Question 329

The user reaches this page when they specify the address of a website

A. home page
B. web page
C. summary page
D. none of these

View Answer

Question 330

The verification of credit card is done by using_________________ with a communications link to themerchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these

View Answer

Question 331

The verification of credit card is done by using_________________ with a communications linkto the merchants acquiring bank

A. credit card payment terminal
B. point of sale
C. all of these
D. none of these

View Answer

Question 332

The way to hide digital information is through______

A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above

View Answer

Question 333

These types of commercial Internet service providers are the most widely used

A. national service providers
B. regional service providers
C. centralized service providers
D. decentralized service providers

View Answer

Question 334

This is a protocol which allows files to be transferred from one computer to another computer

A. TCP/IP
B. FTP
C. HTTP
D. none of these

View Answer

Question 335

This is a protocol which allows files to be transferred from one computer to anothercomputer

A. tcp/ip
B. ftp
C. http
D. none of these

View Answer

Question 336

To accept a credit card for payment, we have to open a _____________________account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these

View Answer

Question 337

To accept a credit card for payment, we have to open a _____________________account withour bank

A. savings bank
B. current account
C. merchant account
D. any of these

View Answer

Question 338

To handle credit card transaction on internet _____ is developed by Visa and Master card.

A. ssl
B. set
C. sat
D. encryption

View Answer

Question 339

Trade mark, copyright, patent law etc comes under the purview of________________________

A. data protection
B. telecommunication laws
C. intellectual property laws
D. none

View Answer

Question 340

Unique value auction is mainly applies to?

A. new products
B. second hand products
C. engineering products
D. none of the above

View Answer

Question 341

Unique value auction mainly applies to?

A. New products
B. Second hand products
C. Engineering products
D. None of the above.

View Answer

Question 342

Web pages are prepared using their language as_____________________

A. html
B. ftp
C. http
D. none of these

View Answer

Question 343

What are ballpoint pens purchased by a clothing company?

A. direct materials
B. indirect materials
C. edi
D. none of the above

View Answer

Question 344

What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?

A. direct materials
B. indirect materials
C. edi
D. none of the above

View Answer

Question 345

What are materials that are necessary for running a modern corporation,but do not relate to the company’s primary business activities?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above

View Answer

Question 346

What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?

A. direct materials
B. indirect materials
C. edi
D. none of the above

View Answer

Question 347

What are materials used in production in a manufacturing company orare placed on the shelf for sale in a retail environment?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above

View Answer

Question 348

What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and GoogleChrome examples of?

A. Web servers
B. Web browsers
C. Web application servers
D. All of the above

View Answer

Question 349

What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?

A. customer relationship management systems cards
B. e-government identity cards
C. fedi cards
D. smart cards

View Answer

Question 350

What are plastic cards the size of a credit card that contains anembedded chip on which digital information can be stored?

A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards

View Answer

Question 351

What automates business processes?

A. workflow
B. asp
C. workflow system
D. eip

View Answer

Question 352

What charts (1) the cost to your organisation of the unavailability ofinformation and technology and (2) the cost to your organisation of recovering from a disaster over time?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve

View Answer

Question 353

What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A. risk management
B. risk assessment
C. security
D. none of the above

View Answer

Question 354

What could be an implication for an organization if an e-business strategy is not clearlydefined?

A. Clear direction of e-business strategy
B. Effective integration of e-business at a technical level
C. Greater opportunities from evaluation of opportunities
D. None of the above are applicable

View Answer

Question 355

What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

A. workflow
B. eip
C. workflow system
D. sla

View Answer

Question 356

What defines all of the steps or business rules, from beginning to end,required for a process to run correctly?

A. Workflow
B. EIP
C. Workflow system
D. SLA

View Answer

Question 357

What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A. performance
B. capacity planning
C. benchmarking
D. data cleansing

View Answer

Question 358

What determines the future IT infrastructure requirements for new equipment and additional network capacity?

A. flexibility
B. performance
C. capacity planning
D. benchmark

View Answer

Question 359

What determines the future IT infrastructure requirements for newequipment and additional network capacity?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark

View Answer

Question 360

What does EDI stand for?

A. Electronic Data Interface
B. E-Commerce Data Interface
C. Electronic Data Interaction
D. Electronic Data Interchange

View Answer

Question 361

What floods a Web site with so many requests for service that it slows down or crashes?

A. computer virus
B. worm
C. denial-of-service attack
D. none of the above

View Answer

Question 362

What floods a Web site with so many requests for service that it slowsdown or crashes?

A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above

View Answer

Question 363

What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A. computer virus
B. worm
C. denial-of-service attack
D. none of the above

View Answer

Question 364

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve

View Answer

Question 365

What is a detailed process for recovering information or an IT system inthe event of a catastrophic disaster such as a fire or flood?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve

View Answer

Question 366

What is a model of a proposed product, service, or system?

A. prototyping
B. prototype
C. proof-of-concept prototype
D. selling prototype

View Answer

Question 367

What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve

View Answer

Question 368

What is a separate and fully equipped facility where the company canmove immediately after the disaster and resume business?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve

View Answer

Question 369

What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve

View Answer

Question 370

What is a separate facility that does not have any computer equipmentbut is a place where the knowledge workers can move after the disaster?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve

View Answer

Question 371

What is a set of conditions used to measure how well a product or system functions?

A. flexibility
B. performance
C. capacity planning
D. benchmark

View Answer

Question 372

What is a set of conditions used to measure how well a product orsystem functions?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark

View Answer

Question 373

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?

A. computer virus
B. worm
C. denial-of-service attack
D. none of the above

View Answer

Question 374

What is a type of virus that spreads itself, not just from file to file, butfrom computer to computer via e-mail and other Internet traffic?

A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above

View Answer

Question 375

What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

A. Client/server network
B. Intranet
C. Extranet
D. Thin client

View Answer

Question 376

What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

A. client/server network
B. intranet
C. extranet
D. thin client

View Answer

Question 377

What is an intranet that is restricted to an organisation and certainoutsiders, such as customers and suppliers?

A. Client/server network
B. Intranet
C. Extranet
D. Thin client

View Answer

Question 378

What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?

A. client/server network
B. intranet
C. extranet
D. thin client

View Answer

Question 379

What is another name for materials which cannot be linked to a specificproduct or process?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above

View Answer

Question 380

What is another name for?

A. direct materials
B. indirect materials
C. edi
D. none of the above

View Answer

Question 381

What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about?

A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above

View Answer

Question 382

What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?

A. web log
B. clickstream
C. anonymous web browsing service
D. none of the above

View Answer

Question 383

What is the first step in a P3P-enabled transaction?

A. send web page
B. http get request web page
C. send p3p policy files
D. http get request p3p policy files

View Answer

Question 384

What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?

A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange

View Answer

Question 385

What is the name for direct computer-to-computer transfer of transactioninformation contained in standard business documents?

A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange

View Answer

Question 386

What is the name given to an interactive business providing a centralisedmarket where many buyers and suppliers can come together for ecommerce or commerce-related activities?

A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace

View Answer

Question 387

What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e-commerce or commerce-related activities?

A. direct marketplace
B. b2b
C. b2c
D. electronic marketplace

View Answer

Question 388

What is the percentage of customers who visit a Web site and actually buy something called?

A. affiliate programs
B. click-through
C. spam
D. conversion rate

View Answer

Question 389

What is the percentage of customers who visit a Web site and actuallybuy something called?

A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate

View Answer

Question 390

What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?

A. b2b marketplace
B. intranet
C. reverse auction
D. internet

View Answer

Question 391

What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets?

A. Risk management
B. Risk assessment
C. Security
D. None of the above

View Answer

Question 392

What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A. risk management
B. risk assessment
C. security
D. none of the above

View Answer

Question 393

What is the process of making a copy of the information stored on a computer?

A. backup
B. anti-virus
C. firewall
D. biometrics

View Answer

Question 394

What items are traded in e-business

A. Consumer durables
B. Pharmaceutical products
C. Industrial goods
D. All the above

View Answer

Question 395

What sends work assignments through an e-mail system?

A. database-based enterprise information portal
B. messaging-based enterprise information portal
C. database-based workflow system
D. messaging-based workflow system

View Answer

Question 396

What type of ad appears on top of a web page?

A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad

View Answer

Question 397

What type of ad appears under a web page?

A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad

View Answer

Question 398

What Web server functionality allows it verify usernames and passwords and processcertificates and encryption information?

A. processing of http requests
B. file transfer protocol
C. data capture
D. security services

View Answer

Question 399

When a company buys some raw material from some other company, then it will come under:

A. B2B
B. B2C
C. C2B
D. C2C

View Answer

Question 400

When a transaction is processed online, how can the merchant verify the customer's identity?

A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange

View Answer

Question 401

When a transaction is processed online, how can the merchant verify thecustomers identity?

A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange

View Answer

Question 402

When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________

A. phishing
B. pharming
C. a denial of service (dos) attack
D. spoofing

View Answer

Question 403

When measuring the effectiveness on an online advertisement, the __________ is the percentage of visitors to a page who click on an advertisement.

A. click ratio
B. click rate
C. click-through rate
D. hit ratio

View Answer

Question 404

When message & data are available only to those who are authorized to view them isknown as ______ .

A. integrity
B. confidentiality
C. authenticity
D. privacy

View Answer

Question 405

When surfing the Web, the browser interprets the HTML command found in a document file, and displays it as a(n)

A. Applet page
B. Java page
C. Web page
D. Domain page

View Answer

Question 406

When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts?

A. E-commerce is broadly equivalent to e-business
B. E-commerce has some overlap with e-business
C. E-commerce is a subset of e-business
D. E-business is a subset of e-commerce

View Answer

Question 407

Which among the following is an example for vertical portal ?

A. i-village
B. yahoo
C. google
D. net scape

View Answer

Question 408

Which among the following is an example of C2C ?

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

View Answer

Question 409

Which among the following is not a B2E application

A. online insurance policy management
B. online supply requests
C. special employee offers
D. locate application and tax forms

View Answer

Question 410

Which among the following is not an example for computer virus ?

A. Chernobyl
B. Melissa
C. I Love You
D. None of these

View Answer

Question 411

Which among the following is not an example for E-commerce

A. amazon.com
B. baazar.com
C. e-trade.com
D. none of these

View Answer

Question 412

Which among the following is not an example for Search engine ?

A. google
B. msn
C. alta vista
D. none of these

View Answer

Question 413

Which among the following is not an user of B2C e-commerce ?

A. manufacturers
B. distributors
C. publishers
D. none

View Answer

Question 414

Which among the following product is suitable for E-Commerce ?

A. books
B. vegetables
C. all of these
D. none of these

View Answer

Question 415

Which concept suggests that different applications and computer systems should be able to communicate with one another?

A. integration
B. web services
C. scalability
D. interoperability

View Answer

Question 416

Which concept suggests that different applications and computersystems should be able to communicate with one another?

A. Integration
B. Web services
C. Scalability
D. Interoperability

View Answer

Question 417

Which driver promote E-commerce

A. Digital Convergence
B. 24/7 availability
C. Profit margins
D. None of the above

View Answer

Question 418

Which factor determines when the IT system will be available forknowledge workers to access?

A. Availability
B. Accessibility
C. Reliability
D. None of the above

View Answer

Question 419

Which factor determines who has the right to access different types of IT systems and information?

A. availability
B. accessibility
C. reliability
D. scalability

View Answer

Question 420

Which factor determines who has the right to access different types of ITsystems and information?

A. Availability
B. Accessibility
C. Reliability
D. Scalability

View Answer

Question 421

Which factor ensures the IT systems are functioning correctly andproviding accurate information?

A. Availability
B. Accessibility
C. Reliability
D. Scalability

View Answer

Question 422

Which factor ensures your IT systems are functioning correctly and providing accurate information?

A. availability
B. accessibility
C. reliability
D. scalability

View Answer

Question 423

Which factor represents a systems ability to change quickly?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark

View Answer

Question 424

Which factor represents a system's ability to change quickly?

A. flexibility
B. performance
C. capacity planning
D. benchmark

View Answer

Question 425

Which factor represents how well your system can adapt to increased demands?

A. availability
B. accessibility
C. reliability
D. scalability

View Answer

Question 426

Which factor represents how well your system can adapt to increaseddemands?

A. Availability
B. Accessibility
C. Reliability
D. Scalability

View Answer

Question 427

Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?

A. B2B
B. B2C
C. C2B
D. C2C

View Answer

Question 428

Which form of e-commerce currently accounts for about 97% of all e-commerce revenues?

A. b2b
B. b2c
C. c2b
D. c2c

View Answer

Question 429

Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO materials?

A. horizontal
B. vertical
C. integrated
D. inclined

View Answer

Question 430

Which form of e-marketplace brings together buyers and sellers from the same industry?

A. horizontal
B. vertical
C. integrated
D. inclined

View Answer

Question 431

Which form of e-marketplace brings together buyers and sellers from thesame industry?

A. horizontal
B. Vertical
C. Integrated
D. Inclined

View Answer

Question 432

Which form of e-marketplace brings together buyers and sellers frommultiple industries, often for MRO materials?

A. horizontal
B. Vertical
C. Integrated
D. Inclined

View Answer

Question 433

Which is a function of E-commerce

A. marketing
B. advertising
C. warehousing
D. all of the above

View Answer

Question 434

Which is a function of ERP?

A. warehousing
B. sales
C. scheduling
D. all of the above

View Answer

Question 435

Which is not a component of ERP?

A. legacy systems
B. bolt on applications
C. operational database
D. cybersoft

View Answer

Question 436

Which is not a function of E-commerce

A. marketing
B. advertising
C. warehousing
D. none of the above

View Answer

Question 437

Which is not a function of ERP?

A. warehousing
B. sales
C. scheduling
D. none of the above

View Answer

Question 438

Which is not a function of ERP?

A. human resource management
B. financial
C. warehousing
D. none of the above

View Answer

Question 439

Which is not the application area of e-commerce?

A. E-Learning
B. E-Banking
C. E-Auction
D. None of the mentioned

View Answer

Question 440

Which model of e commerce deals with virtual auction?

A. Aggregator Model
B. Info-mediary model
C. Community Model
D. Brokerage Model

View Answer

Question 441

Which of the below is/are goals of E-Commerce?

A. 24×7
B. reach out to larger audience
C. time saving
D. all of the above

View Answer

Question 442

Which of the following are advantages normally associated with B2B ecommerce?

A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above

View Answer

Question 443

Which of the following are advantages normally associated with B2B e-commerce?

A. shorter cycle times
B. reduction in costs
C. reaches wider audiences
D. all of the above

View Answer

Question 444

Which of the following are not required to send and receive e-mail?

A. e-mail account
B. Web page
C. access to the Internet
D. e-mail program

View Answer

Question 445

Which of the following best describes predicted growth in C2C and B2C auctionspending?

A. b2c spending will overtake c2c spending
B. both types of spending will increase
C. c2c spending will decrease while b2c increases
D. both types of spending will decline at similar rates

View Answer

Question 446

Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these

View Answer

Question 447

Which of the following describes e-commerce?

A. doing business electronically
B. doing business
C. sale of goods
D. all of the above

View Answer

Question 448

Which of the following describes e‐commerce?

A. Doing business electronically
B. Doing business
C. Sale of goods
D. All the above

View Answer

Question 449

Which of the following examines information passing through switches,hubs, or routers?

A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures

View Answer

Question 450

Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?

A. loyalty
B. reach
C. recency
D. unique visitors

View Answer

Question 451

Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?

A. loyalty
B. reach
C. regency
D. unique visitors

View Answer

Question 452

Which of the following is a method of transferring money from one person's account to another?

A. electronic check
B. credit card
C. e-transfer
D. none of the above

View Answer

Question 453

Which of the following is a method of transferring money from onepersons account to another?

A. electronic check
B. credit card
C. e-transfer
D. none of the above

View Answer

Question 454

Which of the following is a new and disruptive Web feature or service?

A. xml
B. diffserv
C. blogs
D. cdma

View Answer

Question 455

Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption
B. decryption
C. firewall
D. all the above

View Answer

Question 456

Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption
B. decryption
C. firewall
D. All of the mentioned

View Answer

Question 457

Which of the following is a useful security mechanism when consideringbusiness strategy and IT?

A. encryption
B. decryption
C. firewall
D. all the above

View Answer

Question 458

Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet?

A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary

View Answer

Question 459

Which of the following is an Internet-based company that makes it easyfor one person to pay another over the Internet?

A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary

View Answer

Question 460

Which of the following is not a dimension of e- commerce security provided by encryption ?

A. availability
B. integrity
C. non-repudiation
D. confidentiality

View Answer

Question 461

Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone
B. network architecture limitations
C. insufficient reach
D. best-efforts qos

View Answer

Question 462

Which of the following is not a party of SCM ?

A. suppliers
B. manufacturers
C. distributors
D. customers

View Answer

Question 463

Which of the following is not an example for B2B e-commerce ?

A. Sending and receiving orders
B. Invoice and shopping
C. all of these
D. none of these

View Answer

Question 464

Which of the following is not related to security mechanism

A. encryption
B. decryption
C. e-cash
D. all the above

View Answer

Question 465

Which of the following is not related to security mechanism?

A. encryption
B. decryption
C. e-cash
D. All of the mentioned

View Answer

Question 466

Which of the following is not suitable for a B2C transaction ?

A. clothes
B. flowers
C. airline reservation
D. none

View Answer

Question 467

Which of the following is not the example of business to consumer (B to C) e-commerce?

A. Amazon.com
B. e-bay.com
C. dell.com
D. lastminute.com

View Answer

Question 468

Which of the following is part of the four main types for e-commerce?

A. b2b
B. b2c
C. c2b
D. all of the above

View Answer

Question 469

Which of the following is part of the four main types of e-commerce?

A. B2B
B. B2C
C. C2B
D. All of the mentioned

View Answer

Question 470

Which of the following is the primary characteristic of an intranet?

A. people outside the organization can access it
B. people inside the organization can\t access it
C. people outside the organization can\t access it
D. none of the above

View Answer

Question 471

Which of the following is the primary characteristic of an intranet?

A. People outside the organisation can access it
B. People inside the organisation cant access it
C. People outside the organisation cant access it
D. None of the above

View Answer

Question 472

Which of the following is true for supply chain management?

A. The physical material moves in the direction
B. Flow of cash backwards through the chain
C. Exchange of information moves in both the
D. All of the above

View Answer

Question 473

Which of the following is used in B2B to pay for purchases?

A. e-commerce
B. financial electronic data interchange
C. electronic data exchange
D. electronic checks

View Answer

Question 474

Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above

View Answer

Question 475

Which of the following permits the transmission of a bill, along withpayment of that bill, to be conducted over the Internet?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above

View Answer

Question 476

Which of the following refers to creating products tailored to individual customers?

A. customization
B. aggregation
C. direct materials
D. reverse auction

View Answer

Question 477

Which of the following refers to creating products tailored to individualcustomers?

A. customisation
B. aggregation
C. Direct materials
D. Reverse auction

View Answer

Question 478

Which of the following statements about privacy is true?

A. it is a moral right to be left alone
B. only corporations and government need to be concerned about it
C. it has only just recently become a concern
D. it is most easily obtained on the internet

View Answer

Question 479

Which of the following statements accurately reflect the impact of technology?

A. technology has caused buyer power to increase
B. technology has lessened the entry barriers for many industries
C. technology has increased the threat of substitute products and services
D. all of the above

View Answer

Question 480

Which of the following statements accurately reflect the impact oftechnology?

A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
C. Technology has increased the threat of substitute products and services
D. all of the above

View Answer

Question 481

Which one of the following is not a principle of e-commerce ?

A. privacy
B. integrity
C. authentication
D. none of these

View Answer

Question 482

Which process can prevent data from lose due to computer problems or human errors?

A. backup
B. recovery
C. benchmarking
D. data cleansing

View Answer

Question 483

Which process can prevent data from losing due to computer problemsor human errors?

A. backup
B. recovery
C. benchmarking
D. data cleansing

View Answer

Question 484

Which process is used to reinstall data from a copy when the original data has been lost?

A. backup
B. recovery
C. benchmarking
D. data cleansing

View Answer

Question 485

Which process is used to reinstall data from a copy when the originaldata has been lost?

A. backup
B. recovery
C. benchmarking
D. data cleansing

View Answer

Question 486

Which products are people most likely to be comfortable buying on the Internet?

A. books
B. pcs
C. cds
D. all of the above

View Answer

Question 487

Which products are people most likely to be comfortable buying on theInternet?

A. Books
B. PCs
C. CDs
D. All of the above

View Answer

Question 488

Which products are people most likely to be more uncomfortable buying on the Internet?

A. books
B. furniture
C. movies
D. all of the above

View Answer

Question 489

Which products are people most likely to be more uncomfortable buyingon the Internet?

A. Books
B. Furniture
C. Movies
D. All of the above

View Answer

Question 490

Which segment do eBay, Amazon.com belong?

A. b2bs
B. b2cs
C. c2bs
D. c2cs

View Answer

Question 491

Which segment is eBay an example?

A. b2b
B. c2b
C. c2c
D. none of the above

View Answer

Question 492

Which segments do eBay, Amazon.com belong?

A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs

View Answer

Question 493

Which service encompasses all technologies used to transmit andprocess information on an across a network?

A. Interoperability
B. Scalability
C. Benchmarking
D. Web services

View Answer

Question 494

Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?

A. affiliate programs
B. click-through
C. spam
D. all of the above

View Answer

Question 495

Which term represents a count of the number of people who visit onesite, click on an ad, and are taken to the site of the advertiser?

A. Affiliate programs
B. Click-through
C. Spam
D. All of the above

View Answer

Question 496

Which type of products is lesser purchased using e- commerce?

A. automobiles
B. books
C. groceries
D. None of the mentioned

View Answer

Question 497

Which type of products is lesser purchased using ecommerce?

A. automobiles
B. books
C. softwares
D. none

View Answer

Question 498

Which type of products is lesser purchased using e-commerce?

A. automobiles
B. books
C. softwares
D. none

View Answer

Question 499

Which will not harm computer resources

A. firewall
B. virus
C. trojan horse
D. none of the above

View Answer

Question 500

Which will not harm computer resources?

A. firewall
B. Virus
C. Trojan horse
D. None of the above

View Answer

Question 501

Which, if any, of the following types of ads are people most willing to tolerate?

A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above

View Answer

Question 502

Which, if any, of the following types of ads are people most willing totolerate?

A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above

View Answer

Question 503

While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds?

A. Directory
B. Publisher site
C. Blog
D. Access portal

View Answer

Question 504

Who breaks into other people's computer systems and steals and destroys information?

A. hackers
B. softwares
C. hacktivists
D. script kiddies

View Answer

Question 505

Who breaks into other peoples computer systems and steals anddestroys information?

A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies

View Answer

Question 506

Who protects system from external threats?

A. firewall
B. edi
C. erp
D. script kiddies

View Answer

Question 507

Why would a merchant want to customize products?

A. to charge a higher price
B. to decrease costs
C. it is required in ec
D. customers will only accept customized products

View Answer

Question 508

World Wide Web (WWW) was introduced in the year ________________________

A. 1994
B. 1996
C. 1992
D. 1990

View Answer

Question 509

Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key.

A. encryption, decryption
B. private, public
C. encryption, public
D. public, private

View Answer

Question 510

Companies use__________________networks to automate employee related Corporateprocesses.

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 511

____________is an early form of E-commerce

A. scm
B. edi
C. both of these
D. none of these

View Answer

Question 512

____________is concerned with the buying and selling information, products andservices over computer communication networks

A. commerce
B. e-commerce
C. e-business
D. none of these

View Answer

Question 513

__________allows a business application on the computer of one organization tocommunicate directly with the business application on the computer of another company.

A. edi
B. protocols
C. standards
D. business applications

View Answer

Question 514

Electronic Exchange of business documents in a standard format is known as____________

A. e-commerce
B. e-business
C. edi
D. none of these

View Answer

Question 515

____________is a commercial process that includes production, distribution, sales ordelivery of goods and services through electronic means

A. e-commerce
B. scm
C. edi
D. none of these

View Answer

Question 516

Among the alternate models of B2B e-commerce,____is the best means to obtain acompetitive advantage in the Market place.

A. process based
B. strategic relationship based
C. transaction based
D. any of these

View Answer

Question 517

______________is basically a concept of online marketing and distributing of productsand services over the internet

A. b2g
B. b2e
C. b2c
D. b2b

View Answer

Question 518

________________e-commerce consists of the sale of products or services from abusiness to the general public

A. b2g
B. b2e
C. b2b
D. b2c

View Answer

Question 519

__________e-commerce transaction has the advantage of eliminating middlemen.

A. b2g
B. b2c
C. b2b
D. b2e

View Answer

Question 520

______________e-commerce involves customers gathering information, purchasing andreceiving products over an electronic network

A. b2g
B. b2e
C. b2b
D. b2c

View Answer

Question 521

______________e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. c2c
B. b2e
C. b2b
D. b2g

View Answer

Question 522

________________streamlines the flow of information and self service capabilitiesthrough automation

A. scc
B. crm
C. crp
D. scm

View Answer

Question 523

______________is an application layer protocol for distributed, collaborative, hypermedia information systems.

A. html
B. http
C. bothe of these
D. none of these

View Answer

Question 524

English physicist Tim Berner’s Lee was famous for the establishment of______________in 1990.

A. internet
B. www
C. intranet
D. none of these

View Answer

Question 525

______refers to a kind of e-commerce which refers to a company selling or buyingfrom other company

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 526

A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of__________transaction

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 527

________sites act as an intermediary between someone wanting a product or serviceand potential providers

A. brokering sites
B. information sites
C. industry portals
D. none of these

View Answer

Question 528

A__________portal is a specialized entry point to a specific market place or industryniche.

A. vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 529

A portal that helps to establish relations and to conduct transactions between variousorganizations is termed as____________

A. b2b portals
B. c2c portals
C. both of these
D. none of these

View Answer

Question 530

A ________________is a software that scours the internet collecting data about everywebsite and every webpage within it

A. spiders
B. search engines
C. robots
D. none of these

View Answer

Question 531

Web pages are prepared using their language as______________

A. html
B. ftp
C. http
D. none of these

View Answer

Question 532

A web page is transferred to users computer through ________________

A. html
B. ftp
C. http
D. none of these

View Answer

Question 533

Trade mark, copyright, patent law etc comes under the purview of________________

A. data protection
B. telecommunication laws
C. intellectual property laws
D. none

View Answer

Question 534

____________is basically a secure gate between our organization data and internet.

A. network firewall
B. antivirus
C. both of these
D. none of these

View Answer

Question 535

____________is automated methods of recognizing a person based on a physiological orbehavioral characteristic.

A. biometrics
B. pin
C. both of these
D. none of these

View Answer

Question 536

____________is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.

A. customer
B. issuer
C. merchant
D. acquirer

View Answer

Question 537

In ______________type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 538

.____________is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters

A. e-commerce
B. commerce
C. both of these
D. none

View Answer

Question 539

____________always operate on intranet

A. e--commerce
B. e-business
C. edi
D. none of these

View Answer

Question 540

____________were the first to establish prominent E-commerce Brands

A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these

View Answer

Question 541

__________is a form of supply chain where a series of assembly operations are carriedout to obtain the final product

A. converging supply chain
B. diverging supply chain
C. any of these
D. none

View Answer

Question 542

.______________is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.

A. converging structure
B. diverging structure
C. any of these
D. none

View Answer

Question 543

________________is the exchange of services, information or product from onebusiness to a government agency

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 544

______________is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files

A. b2c
B. b2e
C. b2b
D. p2p

View Answer

Question 545

”Google” is one of the most popular____________

A. portal
B. browser
C. search engine
D. none of these

View Answer

Question 546

A ______________ Presents information from diverse sources in a unified way in aweb site.

A. web portal
B. link page
C. both of these
D. none of these

View Answer

Question 547

Peer to Peer [P2P] is also used to describe __________________

A. c2c
B. b2e
C. b2b
D. b2c

View Answer

Question 548

__________allows the person to type ion just the main word or words and the site willcome in

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 549

A ______________ presents information from diverse sources in a unified way in aweb site

A. web portal
B. link page
C. both of these
D. none of these

View Answer

Question 550

In Biometrics,____________________ID system is designed to prevent one personfrom using more than one identity

A. positive id system
B. negative id system
C. both of these
D. none of these

View Answer

Question 551

______________are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.

A. network firewall
B. computer virus
C. both of these
D. none of these

View Answer

Question 552

he dimension of e-commerce that enables commerce across national boundaries is called______________

A. interactivity
B. global reach
C. richness
D. ubiquity

View Answer

Question 553

The primary source of financing during the early years of e-commerce was______________

A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings

View Answer

Question 554

The source of revenue in a subscription revenue model is ______________

A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
D. fees for enabling or execution a transaction

View Answer

Question 555

Industry structure is defined as ______________

A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company\s product or service fulfills the needs of customers

View Answer

Question 556

The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________

A. tcp
B. ip
C. the network layer
D. the application layer

View Answer

Question 557

The most common type of Internet crime according to the IC3 is ______________

A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud

View Answer

Question 558

Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________

A. versioning
B. bundling.
C. transactive content
D. price discrimination

View Answer

Question 559

The redirection of traffic from a legitimate site to an infringing site is called______________

A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording

View Answer

Question 560

A security plan begins with a(n) is ______________

A. security policy
B. risk assessment
C. implementation plan
D. security organization

View Answer

Question 561

Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________

A. versioning
B. bundling.
C. transitive content
D. price discrimination

View Answer

Question 562

A website offering content created by third party transparently to customers is anexample of ______________

A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order

View Answer

Question 563

E-commerce technologies have improved upon traditional commerce technologies in______________

A. richness
B. reach
C. both richness and reach
D. neither richness nor reach

View Answer

Question 564

All of the following are technologies used to gather information about you onlineexcept ______________

A. spy ware
B. cookies
C. gmail
D. anonymizers

View Answer

Question 565

The ability to change the product to better fit the needs of the customer is called______________

A. customization
B. personalization
C. privacy
D. accessibility

View Answer

Question 566

All of the following are major categories of computer viruses except ______________

A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses

View Answer

Question 567

The most prevalent online payment method is ______________

A. paypal
B. checks
C. credit cards
D. debit

View Answer

Question 568

All of the following are types of social marketing except ______________

A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising

View Answer

Question 569

A materials requirements planning (MRP) system is an example of ______________

A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange

View Answer

Question 570

The E-commerce domain that involves business activity initiated by the consumer andtargeted to businesses is known as ______________

A. business to business (b2b)
B. consumer to consumer (c2c)
C. consumer to business (c2b)
D. business to consumer (b2c)

View Answer

Question 571

Affiliate revenue is also called as _______

A. commission
B. brokerage
C. referral fee
D. discount

View Answer

Question 572

An online retail store is called as _____

A. trader
B. retailer
C. e-tailer
D. amazon

View Answer

Question 573

Identify the identity of a person or entity with whom you are dealing on Internet is knownas ______

A. integrity
B. authenticity
C. authorisation
D. none of these

View Answer

Question 574

SET is developed by association led by _________

A. master card and visa
B. master card
C. visa
D. rupay

View Answer

Question 575

The technology behind M-commerce is based on ______

A. http
B. https
C. wap
D. pop

View Answer

Question 576

Flipkart.com is an example of _______

A. b2b
B. b2c
C. c2c
D. p2p

View Answer

Question 577

Normally in M-commerce language used to create web pages is _______

A. html
B. wml
C. vb
D. xml

View Answer

Question 578

SSL can be used only with _____

A. ftp
B. http
C. pop
D. smtp

View Answer

Question 579

Scope of E-Commerce is ______

A. local
B. global
C. within own country
D. within own state

View Answer

Question 580

In SSL URL will change from HTTP to _______

A. cipher text
B. https
C. shttp
D. smtp

View Answer

Question 581

World Wide Web (WWW) was introduced in the year ________________

A. 1994
B. 1996
C. 1992
D. 1990

View Answer

Question 582

____________is concerned with the buying and selling information, products and services overcomputer communication networks

A. Commerce
B. E-Commerce
C. E-Business
D. None of these

View Answer

Question 583

____________is a set of standards developed in the 1960s to exchange business informationand to do electronic transactions

A. EDI
B. Protocols
C. TCP/IP
D. None of these

View Answer

Question 584

__________allows a business application on the computer of one organization to communicatedirectly with the business application on the computer of another company.

A. EDI
B. Protocols
C. Standards
D. Business applications

View Answer

Question 585

Electronic Exchange of business documents in a standard format is known as ____________

A. E-commerce
B. E-Business
C. EDI
D. None of these

View Answer

Question 586

____________ is essentially a business process that connects manufacturers, retailers,customers and suppliers in the form of a chain to develop and deliver products.

A. E-commerce
B. EDI
C. SCM
D. Networking

View Answer

Question 587

____________is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means

A. E-commerce
B. SCM
C. EDI
D. None of these

View Answer

Question 588

____________is the exchange of goods or items or commodities and services or applicationsused for money and deals the money matters

A. E-commerce
B. Commerce
C. Both of these
D. none

View Answer

Question 589

__________is an approach to deliver information differentiated business values called servicesby combining the system and process generally called resources

A. E-business
B. E-commerce
C. any of these
D. none

View Answer

Question 590

____________and ______________ were the enabling technologies that laid the ground work for E- commerce

A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these

View Answer

Question 591

__________is a systems approach to Managing the entire flow of information, materials, andservices from raw material suppliers through factories and warehouses to the end customer.

A. CRM
B. SRM
C. EDI
D. SCM

View Answer

Question 592

__________is a form of supply chain where a series of assembly operations are carried out toobtain the final product

A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None

View Answer

Question 593

________________is a form of supply chain where a wide variety of finished goods are producedwith limited number of raw material or components.

A. Converging structure
B. Diverging structure
C. Any of these
D. None

View Answer

Question 594

________________is the exchange of services, information or product from one business to agovernment agency

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 595

Companies use__________________networks to automate employee related corporate processes.

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 596

________________streamlines the flow of information and self service capabilities throughautomation

A. SCC
B. CRM
C. CRP
D. SCM

View Answer

Question 597

____________is a global web in which millions of users are communicating with each other withthe help of computers.

A. Internet
B. WWW
C. both of these
D. None of these

View Answer

Question 598

______________is an application layer protocol for distributed, collaborative, hypermediainformation systems.

A. html
B. HTTP
C. Bothe of these
D. None of these

View Answer

Question 599

English physicist Tim Berner’s Lee was famous for the establishment of ______________in 1990.

A. internet
B. WWW
C. Intranet
D. none of these

View Answer

Question 600

______refers to a kind of e-commerce which refers to a company selling or buying from othercompany

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 601

A company that manufacturers bicycles may use the internet to purchase tyres from theirsuppliers. This is an example of__________transaction.

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 602

________sites act as an intermediary between someone wanting a product or service andpotential providers

A. brokering sites
B. Information sites
C. industry portals
D. none of these

View Answer

Question 603

__________focus on producing a highly integrated value proposition through a managed process.

A. hubs
B. community
C. contents
D. none of these

View Answer

Question 604

______________is basically a concept of online marketing and distributing of products andservices over the internet

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 605

________________e-commerce consists of the sale of products or services from a business tothe general public

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 606

__________e-commerce transaction has the advantage of eliminating middlemen.

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 607

______________e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 608

______________e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. B2G
B. B2E
C. B2B
D. C2C

View Answer

Question 609

Peer to Peer [P2P] is also used to describe____________________

A. C2C
B. B2E
C. B2B
D. B2C

View Answer

Question 610

________________is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

View Answer

Question 611

______________is an internet network that allows users with the same network in software toconnect to each other’s hard disks and exchange files

A. P2P
B. B2E
C. B2B
D. B2C

View Answer

Question 612

A ____________is a document, typically written in plain text interspersed with formattinginstructions of html

A. Web page
B. home page
C. domain
D. none of these

View Answer

Question 613

__________allows the person to type ion just the main word or words and the site will come in

A. Web page
B. home page
C. domain
D. none of these

View Answer

Question 614

”Google” is one of the most popular____________ a)Portal b)Browser c)Search Engine d)none of these50. A ______________ presents information from diverse sources in a unified way in a web site.

A. Web portal
B. Link page
C. Both of these
D. none of these

View Answer

Question 615

A__________portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 616

____________are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 617

A ________________is a software that scours the internet collecting data about every websiteand every webpage within it

A. spiders
B. Search Engines
C. robots
D. none of these

View Answer

Question 618

Search Engines databases are selected and built by computer robot programscalled__________________

A. spiders
B. Search Engines
C. robots
D. none of these

View Answer

Question 619

The purpose of ____________page is to provide links to other pages

A. Home page
B. Web page
C. Summary page
D. None of these

View Answer

Question 620

__________is an example for a software that visits suggested pages and return the appropriateinformation to be indexed by the search Engine

A. Robot
B. Spiders
C. Ants
D. All

View Answer

Question 621

________________________ads appears as rectangular graphics near the top of the page

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 622

______________ads take up the entire screen and are more powerful than banner ads.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 623

____________________is a form of advertisement on the web that appears between web pagesthat the user requests.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 624

________________is basically a TV commercial that runs in the browser window.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 625

Advertisements take the form of a website copy are called____________________

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 626

____________is the most unwanted of online advertising methods.

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 627

______________is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 628

______________is the buying and selling of goods and services through wireless handleddevices such as cellular phone and Personal Digital Assistants

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

View Answer

Question 629

______________is a class of advertising methods which are considered unethical and may evenbe illegal

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 630

____________is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these

View Answer

Question 631

____________are animated full screen ads placed at the entry of a site before a user reachesthe intended content.

A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 632

______________are interactive online ads that require the user to respond intermittently inorder to wade through the message before reaching the intended content.

A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 633

____________is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networkswith the help of an electronic device.

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

View Answer

Question 634

__________provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these

View Answer

Question 635

________________website is one that changes or customizes itself frequently and automaticallybased on certain criteria

A. Dynamic website
B. (Static Website
C. phish site
D. none of these

View Answer

Question 636

____________site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these

View Answer

Question 637

____________in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer

View Answer

Question 638

____________type of payment system is highly useful to those customers who would like tocontrol overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these

View Answer

Question 639

__________________credit card gives all the advantages of a normal credit card without worryingabout the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these

View Answer

Question 640

________________facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.

A. Cash advance
B. Revolver
C. Tele draft
D. None of these

View Answer

Question 641

______________is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these

View Answer

Question 642

To accept a credit card for payment, we have to open a ______________account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these

View Answer

Question 643

____________is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

View Answer

Question 644

__________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

View Answer

Question 645

________________encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these

View Answer

Question 646

In Biometrics,____________________ID system is designed to prevent more than one person fromusing a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

View Answer

Question 647

In Biometrics,____________________ID system is designed to prevent one person from usingmore than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

View Answer

Question 648

______________are program developed by some dishonest people to destroy the computersystem and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these

View Answer

Question 649

________________are special type of software meant for limiting the risks of being hit bycomputer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 650

A____________is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.

A. Hacker
B. spoofer
C. operator
D. none of these

View Answer

Question 651

____________acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 652

________Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 653

SET means ______________________

A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these

View Answer

Question 654

The verification of credit card is done by using__________ with a communications link to themerchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these

View Answer

Question 655

Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as____________________

A. Spoofing
B. Snooping
C. Sniffing
D. None of these

View Answer

Question 656

Gain entry into the user’s system and scan your file system for personal information isknown as____________

A. Spoofing
B. Snooping
C. Sniffing
D. None of these

View Answer

Question 657

____________attacks are difficult and are only successful if the attacker knows somethingabout the shopper

A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords

View Answer

Question 658

______________is the process of making information unintelligible to the unauthorized user.

A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography

View Answer

Question 659

______________is the reverse process of encryption, to make the information readable onceagain

A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography

View Answer

Question 660

A______________provides a way to associate the message with the sender and is theequivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these

View Answer

Question 661

A ____________is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these

View Answer

Question 662

Information sent over the Internet commonly uses the set of rules called__________________

A. TCP/IP
B. FTP
C. HTTP
D. gopher

View Answer

Question 663

E-mail which contain useless material is termed as__________________

A. Spam
B. useless mail
C. trunk mail
D. Junk mail

View Answer

Question 664

India has enacted the first IT Act in the year____________________________

A. 2001
B. 2002
C. 2009
D. 2000

View Answer

Question 665

____________is a programme designed o replicate and spread generally with the victim beingoblivious to its existence

A. hacker
B. software
C. Computer virus
D. none of these

View Answer

Question 666

................ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format

A. Encapsulation
B. EDI
C. ERP
D. Transaction processing

View Answer

Question 667

Conversion of Plain text to Cipher Text is called____________

A. Encryption
B. Decryption
C. Cryptography
D. none of these

View Answer

Question 668

The dimension of E-Commerce that enables commerce across the boundaries is called                    

A. interactivity
B. global reach
C. richness
D. ubiquity

View Answer

Question 669

A digital signature is required __i) to tie an electronic message to the sender’s identityii) for non repudiation of communication by a sender

A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv

View Answer

Question 670

Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.

A. encryption, decryption
B. private, public
C. encryption, public
D. public, private

View Answer

Question 671

The types of Business to Business e-commerce are ................

A. Direct selling and support to Business
B. Industry portals
C. Information sites about a industry
D. All the above

View Answer

Question 672

E-money is a __________ medium for making payments

A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above

View Answer

Question 673

In______________, each transaction must be independent

A. Consistency
B. Isolation
C. Durability
D. None of the above

View Answer

Question 674

Electronic payment is a financial transaction made ________ the use of paper documents

A. With
B. Without
C. Both (a) and (b)
D. None of the above

View Answer

Question 675

____________is a type of EPS

A. Credit card
B. Debit card
C. Smart card
D. All the above

View Answer

Question 676

Smart card is same as____

A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above

View Answer

Question 677

________________ card is a card with a built-in chip capable of storing information in itsmemory

A. Debit
B. Credit
C. Smart
D. None of the above

View Answer

Question 678

______________________is an application of smart card

A. ATM
B. Telecommunication
C. Transportation
D. None of the above

View Answer

Question 679

__________cards and ________cards are two ways to make payments on a web site

A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above

View Answer

Question 680

__________________allows the transfer of money itself

A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above

View Answer

Question 681

E-money has__________types

A. 3
B. 4
C. 5
D. 6

View Answer

Question 682

Paisapay is facilitated in____________

A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above

View Answer

Question 683

The way to hide digital information is through____

A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above

View Answer

Question 684

________________card is a model of IPS

A. Smart
B. Debit
C. Credit
D. All the above

View Answer

Question 685

__________________cards directly transfer funds from consumers bank account to themerchant’s

A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above

View Answer

Question 686

Credit cards __________ convenient for making small purchases

A. Are
B. Are not
C. Both (a) and (b)
D. None of the above

View Answer

Question 687

RACE is a practical framework to help marketers manage and improve the commercial value gained from digital marketing. The term stands for Reach, Act, C, Engage. What does 'C' refer to?

A. Collaborate
B. Collect
C. Consolidate
D. Convert

View Answer

Question 688

In future, some suggest that the task of searching for suppliers and products may be taken over by computer programmes which have defined rules or some degree of intelligence that replicates human neural functioning. These programmes are known as:

A. Spider search engines
B. HTML
C. E-marketplace search engines
D. Software intelligent agents

View Answer

Question 689

The most common method for gaining access to the Internet is through a __________

A. dumb terminal
B. virtual provider or computer
C. point-to-point computer
D. provider or host computer

View Answer

Question 690

Which type deals with auction?

A. b2b
B. b2c
C. c2b
D. c2c

View Answer

Question 691

Which type of add appears on a web page?

A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad

View Answer

Question 692

Which type of e-commerce focuses on consumers dealing with each other?

A. b2b
B. b2c
C. c2b
D. c2c

View Answer

Question 693

Which type of e‐commerce focuses on consumers dealing with each other?

A. B2B
B. B2C
C. C2B
D. C2C

View Answer

Question 694

Which type of e-commerce focuses on consumers dealing with eachother?

A. B2B
B. B2C
C. C2B
D. C2C

View Answer

Question 695

____________is a global web in which millions of users are communicating with eachother with the help of computers.

A. internet
B. www
C. both of these
D. none of these

View Answer

Question 696

________________is an online auctioning site that facilitates the trade of privatelyowned items between individuals.

A. e-bay
B. amazon.com
C. rentalic.com
D. all of these

View Answer

Question 697

Monster.com is an example of ________________website

A. c2c
B. b2e
C. b2b
D. b2c

View Answer

Question 698

A ____________is a document, typically written in plain text interspersed withformatting instructions of html

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 699

______________is the first page of a web site.

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 700

__________is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.

A. debit card
B. credit card
C. electronic purse
D. any of these

View Answer

Question 701

________________encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.

A. ssl
B. set
C. both of these
D. none of these

View Answer

Question 702

SET means ____________

A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these

View Answer

Question 703

The verification of credit card is done by using__________ with a communications linkto the merchants acquiring bank

A. credit card payment terminal
B. point of sale
C. all of these
D. none of these

View Answer

Question 704

____________is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments

A. customer
B. issuer
C. merchant
D. acquirer

View Answer

Question 705

____________type of payment system is highly useful to those customers who wouldlike to control overspending,

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 706

__________________credit card gives all the advantages of a normal credit cardwithout worrying about the interest charges

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 707

________________facility helps the customer to pay only a small amount of the totaloutstanding and revolve the rest of the payment to the next month.

A. cash advance
B. revolver
C. tele draft
D. none of these

View Answer

Question 708

______________is a financial instrument which can be used more than once to borrowmoney or buy products and services on credit.

A. credit card
B. e-cheques
C. e-cash
D. none of these

View Answer

Question 709

To accept a credit card for payment, we have to open a ______________account withour bank

A. savings bank
B. current account
C. merchant account
D. any of these

View Answer

Question 710

____________is a kind of payment card that transfers fund directly from theconsumer’s bank account to the merchants account

A. debit card
B. electronic purse
C. credit card
D. any of these

View Answer

Question 711

A ____________is an electronic file that uniquely identifies individuals and websites onthe internet and enables secure confidential communications

A. digital signature
B. digital certificates
C. ssl
D. none of these

View Answer

Question 712

Information sent over the Internet commonly uses the set of rulescalled________________

A. tcp/ip
B. ftp
C. http
D. gopher

View Answer

Question 713

__________________is a person who breaks in or trespasses a computer system

A. hacker
B. snooper
C. operator
D. spoofer

View Answer

Question 714

E-mail which contains useless material is termed as__________

A. spam
B. useless mail
C. trunk mail
D. junk mail

View Answer

Question 715

India has enacted the first IT Act in the year________________

A. 2001
B. 2002
C. 2009
D. 2000

View Answer

Question 716

Companies use………………………networks to automate employee related Corporateprocesses.

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 717

……………….is an early form of E-commerce

A. scm
B. edi
C. both of these
D. none of these

View Answer

Question 718

………………..is concerned with the buying and selling information, products andservices over computer communication networks

A. commerce
B. e-commerce
C. e-business
D. none of these

View Answer

Question 719

……………allows a business application on the computer of one organization tocommunicate directly with the business application on the computer of another company.

A. edi
B. protocols
C. standards
D. business applications

View Answer

Question 720

Electronic Exchange of business documents in a standard format is known as………………

A. e-commerce
B. e-business
C. edi
D. none of these

View Answer

Question 721

………………is a commercial process that includes production, distribution, sales ordelivery of goods and services through electronic means

A. e-commerce
B. scm
C. edi
D. none of these

View Answer

Question 722

Among the alternate models of B2B e-commerce,……is the best means to obtain acompetitive advantage in the Market place.

A. process based
B. strategic relationship based
C. transaction based
D. any of these

View Answer

Question 723

…………………is basically a concept of online marketing and distributing of productsand services over the internet

A. b2g
B. b2e
C. b2c
D. b2b

View Answer

Question 724

……………………..e-commerce consists of the sale of products or services from abusiness to the general public

A. b2g
B. b2e
C. b2b
D. b2c

View Answer

Question 725

……………..e-commerce transaction has the advantage of eliminating middlemen.

A. b2g
B. b2c
C. b2b
D. b2e

View Answer

Question 726

………………….e-commerce involves customers gathering information, purchasing andreceiving products over an electronic network

A. b2g
B. b2e
C. b2b
D. b2c

View Answer

Question 727

………………….e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. c2c
B. b2e
C. b2b
D. b2g

View Answer

Question 728

……………………..streamlines the flow of information and self service capabilitiesthrough automation

A. scc
B. crm
C. crp
D. scm

View Answer

Question 729

…………………is an application layer protocol for distributed, collaborative, hypermedia information systems.

A. html
B. http
C. bothe of these
D. none of these

View Answer

Question 730

English physicist Tim Berner’s Lee was famous for the establishment of…………………..in 1990.

A. internet
B. www
C. intranet
D. none of these

View Answer

Question 731

………refers to a kind of e-commerce which refers to a company selling or buyingfrom other company

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 732

…………..sites act as an intermediary between someone wanting a product or serviceand potential providers

A. brokering sites
B. information sites
C. industry portals
D. none of these

View Answer

Question 733

A……………portal is a specialized entry point to a specific market place or industryniche.

A. vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 734

A portal that helps to establish relations and to conduct transactions between variousorganizations is termed as………………

A. b2b portals
B. c2c portals
C. both of these
D. none of these

View Answer

Question 735

A …………………….is a software that scours the internet collecting data about everywebsite and every webpage within it

A. spiders
B. search engines
C. robots
D. none of these

View Answer

Question 736

Web pages are prepared using their language as…………………

A. html
B. ftp
C. http
D. none of these

View Answer

Question 737

A web page is transferred to users computer through ……………………..

A. html
B. ftp
C. http
D. none of these

View Answer

Question 738

………………is a global web in which millions of users are communicating with eachother with the help of computers.

A. internet
B. www
C. both of these
D. none of these

View Answer

Question 739

…………………….is an online auctioning site that facilitates the trade of privatelyowned items between individuals.

A. e-bay
B. amazon.com
C. rentalic.com
D. all of these

View Answer

Question 740

Monster.com is an example of ……………………..website

A. c2c
B. b2e
C. b2b
D. b2c

View Answer

Question 741

A ……………….is a document, typically written in plain text interspersed withformatting instructions of html

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 742

The verification of credit card is done by using…………….. with a communications linkto the merchants acquiring bank

A. credit card payment terminal
B. point of sale
C. all of these
D. none of these

View Answer

Question 743

………………….is the first page of a web site.

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 744

……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments

A. customer
B. issuer
C. merchant
D. acquirer

View Answer

Question 745

……………..is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.

A. debit card
B. credit card
C. electronic purse
D. any of these

View Answer

Question 746

………………type of payment system is highly useful to those customers who wouldlike to control overspending,

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 747

……………………encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.

A. ssl
B. set
C. both of these
D. none of these

View Answer

Question 748

……………………….credit card gives all the advantages of a normal credit cardwithout worrying about the interest charges

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 749

SET means ………………

A. standard electronic technology
B. standard electronic transfer
C. secure electronic transaction
D. none of these

View Answer

Question 750

……………………facility helps the customer to pay only a small amount of the totaloutstanding and revolve the rest of the payment to the next month.

A. cash advance
B. revolver
C. tele draft
D. none of these

View Answer

Question 751

………………….is a financial instrument which can be used more than once to borrowmoney or buy products and services on credit.

A. credit card
B. e-cheques
C. e-cash
D. none of these

View Answer

Question 752

To accept a credit card for payment, we have to open a …………………account withour bank

A. savings bank
B. current account
C. merchant account
D. any of these

View Answer

Question 753

………………..is a kind of payment card that transfers fund directly from theconsumer’s bank account to the merchants account

A. debit card
B. electronic purse
C. credit card
D. any of these

View Answer

Question 754

A ………………is an electronic file that uniquely identifies individuals and websites onthe internet and enables secure confidential communications

A. digital signature
B. digital certificates
C. ssl
D. none of these

View Answer

Question 755

Information sent over the Internet commonly uses the set of rulescalled……………………

A. tcp/ip
B. ftp
C. http
D. gopher

View Answer

Question 756

……………………….is a person who breaks in or trespasses a computer system

A. hacker
B. snooper
C. operator
D. spoofer

View Answer

Question 757

E-mail which contains useless material is termed as……………

A. spam
B. useless mail
C. trunk mail
D. junk mail

View Answer

Question 758

India has enacted the first IT Act in the year……………………

A. 2001
B. 2002
C. 2009
D. 2000

View Answer

Question 759

The ethical principle which states that if an action is not right for all situations, then itis not right for any situation is known as ______________.

A. the golden rule
B. slippery slope
C. no free lunch
D. universalism

View Answer

Question 760

Trade mark, copyright, patent law etc comes under the purview of……………………

A. data protection
B. telecommunication laws
C. intellectual property laws
D. none

View Answer

Question 761

………………is basically a secure gate between our organization data and internet.

A. network firewall
B. antivirus
C. both of these
D. none of these

View Answer

Question 762

………………is automated methods of recognizing a person based on a physiological orbehavioral characteristic.

A. biometrics
B. pin
C. both of these
D. none of these

View Answer

Question 763

……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.

A. customer
B. issuer
C. merchant
D. acquirer

View Answer

Question 764

In …………………..type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.

A. prepaid
B. post paid
C. both of these
D. none of these

View Answer

Question 765

……………….is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters

A. e-commerce
B. commerce
C. both of these
D. none

View Answer

Question 766

……………….always operate on intranet

A. e--commerce
B. e-business
C. edi
D. none of these

View Answer

Question 767

………………were the first to establish prominent E-commerce Brands

A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these

View Answer

Question 768

…………….is a form of supply chain where a series of assembly operations are carriedout to obtain the final product

A. converging supply chain
B. diverging supply chain
C. any of these
D. none

View Answer

Question 769

…………………is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.

A. converging structure
B. diverging structure
C. any of these
D. none

View Answer

Question 770

……………………is the exchange of services, information or product from onebusiness to a government agency

A. b2g
B. b2e
C. b2b
D. p2p

View Answer

Question 771

………………….is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files

A. b2c
B. b2e
C. b2b
D. p2p

View Answer

Question 772

”Google” is one of the most popular………………..

A. portal
B. browser
C. search engine
D. none of these

View Answer

Question 773

A ………………….. Presents information from diverse sources in a unified way in aweb site.

A. web portal
B. link page
C. both of these
D. none of these

View Answer

Question 774

Peer to Peer [P2P] is also used to describe ………………………

A. c2c
B. b2e
C. b2b
D. b2c

View Answer

Question 775

……………..allows the person to type ion just the main word or words and the site willcome in

A. web page
B. home page
C. domain
D. none of these

View Answer

Question 776

A ………………….. presents information from diverse sources in a unified way in aweb site

A. web portal
B. link page
C. both of these
D. none of these

View Answer

Question 777

In Biometrics,…………………………ID system is designed to prevent one personfrom using more than one identity

A. positive id system
B. negative id system
C. both of these
D. none of these

View Answer

Question 778

…………………..are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.

A. network firewall
B. computer virus
C. both of these
D. none of these

View Answer

Question 779

When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________.

A. phishing
B. pharming
C. a denial of service (dos) attack
D. spoofing

View Answer

Question 780

The process of getting customers to pass along a company's marketing message tofriends, family, and colleagues is known as ______________.

A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing

View Answer

Question 781

World Wide Web (WWW) was introduced in the year ……………………

A. 1994
B. 1996
C. 1992
D. 1990

View Answer

Question 782

………………..is concerned with the buying and selling information, products and services overcomputer communication networks

A. Commerce
B. E-Commerce
C. E-Business
D. None of these

View Answer

Question 783

………………..is a set of standards developed in the 1960s to exchange business informationand to do electronic transactions

A. EDI
B. Protocols
C. TCP/IP
D. None of these

View Answer

Question 784

……………allows a business application on the computer of one organization to communicatedirectly with the business application on the computer of another company.

A. EDI
B. Protocols
C. Standards
D. Business applications

View Answer

Question 785

Electronic Exchange of business documents in a standard format is known as ………………

A. E-commerce
B. E-Business
C. EDI
D. None of these

View Answer

Question 786

………………. is essentially a business process that connects manufacturers, retailers,customers and suppliers in the form of a chain to develop and deliver products.

A. E-commerce
B. EDI
C. SCM
D. Networking

View Answer

Question 787

………………is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means

A. E-commerce
B. SCM
C. EDI
D. None of these

View Answer

Question 788

………………….e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. B2G
B. B2E
C. B2B
D. C2C

View Answer

Question 789

……………….is the exchange of goods or items or commodities and services or applicationsused for money and deals the money matters

A. E-commerce
B. Commerce
C. Both of these
D. none

View Answer

Question 790

…………….is an approach to deliver information differentiated business values called servicesby combining the system and process generally called resources

A. E-business
B. E-commerce
C. any of these
D. none

View Answer

Question 791

……………….and ………………… were the enabling technologies that laid the ground work for E- commerce

A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these

View Answer

Question 792

Peer to Peer [P2P] is also used to describe………………………….

A. C2C
B. B2E
C. B2B
D. B2C

View Answer

Question 793

…………….is a systems approach to Managing the entire flow of information, materials, andservices from raw material suppliers through factories and warehouses to the end customer.

A. CRM
B. SRM
C. EDI
D. SCM

View Answer

Question 794

…………………….is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

View Answer

Question 795

………………….is an internet network that allows users with the same network in software toconnect to each other’s hard disks and exchange files

A. P2P
B. B2E
C. B2B
D. B2C

View Answer

Question 796

…………….is a form of supply chain where a series of assembly operations are carried out toobtain the final product

A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None

View Answer

Question 797

……………………is a form of supply chain where a wide variety of finished goods are producedwith limited number of raw material or components.

A. Converging structure
B. Diverging structure
C. Any of these
D. None

View Answer

Question 798

A ……………….is a document, typically written in plain text interspersed with formattinginstructions of html

A. Web page
B. home page
C. domain
D. none of these

View Answer

Question 799

……………………is the exchange of services, information or product from one business to agovernment agency

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 800

……………..allows the person to type ion just the main word or words and the site will come in

A. Web page
B. home page
C. domain
D. none of these

View Answer

Question 801

Companies use………………………networks to automate employee related corporate processes.

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 802

A……………portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 803

……………………..streamlines the flow of information and self service capabilities throughautomation

A. SCC
B. CRM
C. CRP
D. SCM

View Answer

Question 804

………………..are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

View Answer

Question 805

………………is a global web in which millions of users are communicating with each other withthe help of computers.

A. Internet
B. WWW
C. both of these
D. None of these

View Answer

Question 806

A …………………….is a software that scours the internet collecting data about every websiteand every webpage within it

A. spiders
B. Search Engines
C. robots
D. none of these

View Answer

Question 807

…………………is an application layer protocol for distributed, collaborative, hypermediainformation systems.

A. html
B. HTTP
C. Bothe of these
D. None of these

View Answer

Question 808

Search Engines databases are selected and built by computer robot programscalled………………………

A. spiders
B. Search Engines
C. robots
D. none of these

View Answer

Question 809

English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.

A. internet
B. WWW
C. Intranet
D. none of these

View Answer

Question 810

The purpose of ………………page is to provide links to other pages

A. Home page
B. Web page
C. Summary page
D. None of these

View Answer

Question 811

……………is an example for a software that visits suggested pages and return the appropriateinformation to be indexed by the search Engine

A. Robot
B. Spiders
C. Ants
D. All

View Answer

Question 812

………refers to a kind of e-commerce which refers to a company selling or buying from othercompany

A. B2G
B. B2E
C. B2B
D. P2P

View Answer

Question 813

………………………………..ads appears as rectangular graphics near the top of the page

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 814

………………….ads take up the entire screen and are more powerful than banner ads.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 815

…………..sites act as an intermediary between someone wanting a product or service andpotential providers

A. brokering sites
B. Information sites
C. industry portals
D. none of these

View Answer

Question 816

………………………….is a form of advertisement on the web that appears between web pagesthat the user requests.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 817

……………..focus on producing a highly integrated value proposition through a managed process.

A. hubs
B. community
C. contents
D. none of these

View Answer

Question 818

……………………is basically a TV commercial that runs in the browser window.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

View Answer

Question 819

…………………is basically a concept of online marketing and distributing of products andservices over the internet

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 820

Advertisements take the form of a website copy are called…………………………

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 821

……………………..e-commerce consists of the sale of products or services from a business tothe general public

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 822

……………..e-commerce transaction has the advantage of eliminating middlemen.

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 823

………………..is the most unwanted of online advertising methods.

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 824

………………….e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network

A. B2G
B. B2E
C. B2B
D. B2C

View Answer

Question 825

…………………..is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

View Answer

Question 826

…………………..is the buying and selling of goods and services through wireless handleddevices such as cellular phone and Personal Digital Assistants

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

View Answer

Question 827

…………………is a class of advertising methods which are considered unethical and may evenbe illegal

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 828

……………….is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these

View Answer

Question 829

………………are animated full screen ads placed at the entry of a site before a user reachesthe intended content.

A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 830

………………….are interactive online ads that require the user to respond intermittently inorder to wade through the message before reaching the intended content.

A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware

View Answer

Question 831

………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networkswith the help of an electronic device.

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

View Answer

Question 832

…………….provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these

View Answer

Question 833

…………………….website is one that changes or customizes itself frequently and automaticallybased on certain criteria

A. Dynamic website
B. (Static Website
C. phish site
D. none of these

View Answer

Question 834

………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these

View Answer

Question 835

……………….in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer

View Answer

Question 836

………………type of payment system is highly useful to those customers who would like tocontrol overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these

View Answer

Question 837

……………………….credit card gives all the advantages of a normal credit card without worryingabout the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these

View Answer

Question 838

……………………facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.

A. Cash advance
B. Revolver
C. Tele draft
D. None of these

View Answer

Question 839

………………….is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these

View Answer

Question 840

To accept a credit card for payment, we have to open a …………………account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these

View Answer

Question 841

………………..is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

View Answer

Question 842

……………..is a card with a microchip that can be used instead of cash and coins foreverything from vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these

View Answer

Question 843

……………………encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these

View Answer

Question 844

In Biometrics,…………………………ID system is designed to prevent more than one person fromusing a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

View Answer

Question 845

In Biometrics,…………………………ID system is designed to prevent one person from usingmore than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

View Answer

Question 846

…………………..are program developed by some dishonest people to destroy the computersystem and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these

View Answer

Question 847

A digital signature is required …..i) to tie an electronic message to the sender’s identityii) for non repudiation of communication by a sender

A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv

View Answer

Question 848

……………………are special type of software meant for limiting the risks of being hit bycomputer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 849

A……………….is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.

A. Hacker
B. spoofer
C. operator
D. none of these

View Answer

Question 850

……………….acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 851

…………..Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these

View Answer

Question 852

SET means …………………………….

A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these

View Answer

Question 853

The verification of credit card is done by using…………….. with a communications link to themerchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these

View Answer

Question 854

Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as………………………….

A. Spoofing
B. Snooping
C. Sniffing
D. None of these

View Answer

Question 855

Gain entry into the user’s system and scan your file system for personal information isknown as……………….

A. Spoofing
B. Snooping
C. Sniffing
D. None of these

View Answer

Question 856

………………attacks are difficult and are only successful if the attacker knows somethingabout the shopper

A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords

View Answer

Question 857

…………………is the process of making information unintelligible to the unauthorized user.

A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography

View Answer

Question 858

………………….is the reverse process of encryption, to make the information readable onceagain

A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography

View Answer

Question 859

A………………….provides a way to associate the message with the sender and is theequivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these

View Answer

Question 860

A ………………is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these

View Answer

Question 861

Information sent over the Internet commonly uses the set of rules called………………………..

A. TCP/IP
B. FTP
C. HTTP
D. gopher

View Answer

Question 862

E-mail which contain useless material is termed as………………………

A. Spam
B. useless mail
C. trunk mail
D. Junk mail

View Answer

Question 863

India has enacted the first IT Act in the year……………………………………

A. 2001
B. 2002
C. 2009
D. 2000

View Answer

Question 864

……………….is a programme designed o replicate and spread generally with the victim beingoblivious to its existence

A. hacker
B. software
C. Computer virus
D. none of these

View Answer

Question 865

............... is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format

A. Encapsulation
B. EDI
C. ERP
D. Transaction processing

View Answer

Question 866

Conversion of Plain text to Cipher Text is called………………

A. Encryption
B. Decryption
C. Cryptography
D. none of these

View Answer

Question 867

E-money is a ……………. medium for making payments

A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above

View Answer

Question 868

In…………………., each transaction must be independent

A. Consistency
B. Isolation
C. Durability
D. None of the above

View Answer

Question 869

Electronic payment is a financial transaction made …………. the use of paper documents

A. With
B. Without
C. Both (a) and (b)
D. None of the above

View Answer

Question 870

………………is a type of EPS

A. Credit card
B. Debit card
C. Smart card
D. All the above

View Answer

Question 871

Smart card is same as…….

A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above

View Answer

Question 872

……………………. card is a card with a built-in chip capable of storing information in itsmemory

A. Debit
B. Credit
C. Smart
D. None of the above

View Answer

Question 873

……………………………is an application of smart card

A. ATM
B. Telecommunication
C. Transportation
D. None of the above

View Answer

Question 874

…………….cards and ………….cards are two ways to make payments on a web site

A. Debit and smart
B. Credit and debit
C. Credit and smart
D. None of the above

View Answer

Question 875

……………………….allows the transfer of money itself

A. Digital cash
B. Electronic money
C. Both (a) and (b)
D. None of the above

View Answer

Question 876

E-money has…………….types

A. 3
B. 4
C. 5
D. 6

View Answer

Question 877

Paisapay is facilitated in………………

A. Amazon.com
B. eBay.co.in
C. Flipkart.com
D. None of the above

View Answer

Question 878

The way to hide digital information is through……

A. Cryptography
B. Digital certificate
C. Digital signature
D. None of the above

View Answer

Question 879

……………………..card is a model of IPS

A. Smart
B. Debit
C. Credit
D. All the above

View Answer

Question 880

………………………cards directly transfer funds from consumers bank account to themerchant’s

A. Debit
B. Credit
C. Both (a) and (b)
D. None of the above

View Answer

Question 881

Credit cards ……………. convenient for making small purchases

A. Are
B. Are not
C. Both (a) and (b)
D. None of the above

View Answer

Question 882

”Google” is one of the most popular……………….. a)Portal b)Browser c)Search Engine d)none of these50. A ………………….. presents information from diverse sources in a unified way in a web site.

A. Web portal
B. Link page
C. Both of these
D. none of these

View Answer