All E-Com MCQ's
All E-Com MCQ's
All E-Com MCQ's
2.Which of the following is part of the four main types for e-commerce?
a. B2B b. B2C
c. C2B d. All of the above
5. Digital products are best suited for B2C e-commerce because they:
a. Are commodity like products b. Can be mass-customized and
personalized
c. Can be delivered at the time of purchase d. All of the above
9. Which form of e-commerce currently accounts for about 97% of all e- commerce
revenues?
a. B2B b. B2C
c. C2B d. C2C
a. encryption b. decryption
c. firewall d. all the above
12. What is the name given to an interactive business providing a centralized market
where many buyers and suppliers can come together for e-commerce or commerce-
related activities?
a. Direct marketplace b. B2B
c. B2C d. Electronic marketplace
13. Which of the following is a method of transferring money from one person's
account to another?
a. electronic check b. credit card
c. e-transfer d. none of the above
16. Which of the following permits the transmission of a bill, along with payment of
that bill, to be conducted over the Internet?
a. financial cybermediary b. electronic check
c. electronic bill presentment and payment d. all of the above
18. Public key encryption uses multiple keys. One key is used to encrypt data, while
another is used to decrypt data. The key used to encrypt data is called the
key, while the key used to decrypt data is called the key.
a. encryption, decryption b. private, public
c. encryption, public d. public, private
20. When a transaction is processed online, how can the merchant verify the customer's
identity?
a. use secure sockets layers b. use secure electronic transactions
c. use electronic data interchange d. use financial electronic data interchange
21.The practice of forging a return address on an e-mail so that the recipient is fooled into
revealing private information is termed?
a. hacking b. cracking
c. dumpster diving d. spoofing
a. firewall b. EDI
24.Who breaks into other people's computer systems and steals and destroys information?
a. Hackers b. softwares
c. Hacktivists d. Script kiddies
25.What floods a Web site with so many requests for service that it slows down or
crashes?
a. Computer virus b. Worm
c. Denial-of-service attack d. None of the above
B. Blocks messages without the correct markings from entering the network
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
A. S-HTTP
B. VPNs
C. SSL
D. PPTP
A. Credit card
B. Accumulating balance
C. Stored value
D. Cash
B. encrypts information
A. PayPal
B. checks
C. credit cards
D. debit
A. Credit card
B. Debit card
C. Paper cash
A. Prepaid
B. Postpaid
D. None of these
39.Digital signature is a.
C. Both a and b
D. None of these
A. RSA
B. DES
C. AES
D. FTP
41.Which one is not used as a security mechanism?
A. Encryption
B. Cryptography
C. Wallets
D. Digital signature
42.Which e‐government arena is being used when governmental agencies send out
and accept bids for work?
A. G2G
B. G2B
C. G2C
D. G2G
A. SSL
B. S‐HTTP
C. SET
44.The protocol which allows the file transfer between computers is.
A. TCP/IP
B. FTP
C. HTTP
D. SOA
A. EFT
B. EPS
C. PayPal
D. None of these
B. On Time processing
D. None
A. Public key
B. Symmetric
C. Asymmetric
D. None
A. Memory
B. Microchip
C. E‐cash
D. None of the above
D. Both B and C
51.The virus that are commonly found in word documents are called __________.
A. Macro
B. Trojan horse
C. Script virus
52.Malicious hackers who act with the intention of causing harm are __________.
A. White hats
B. Black hats
C. Grey hats
D. Brown hats
A. hacking
B. cracking
C. dumpster diving
D. spoofing
54.Unsolicited e‐mail is called what?
A. Junk mail
B. Spam
C. Extra mail
B. Pirated software
C. Counterfeit software
D. Privacy
A. Phishing
B. Bulling
C. Stalking
D. Identity theft
97. Which one of the following can be considered as the class of computer threats?
A. Dos Attack
B. Phishing
C. Soliciting
D. Both A and C
A. Virus
B. Malware
C. Spam
D. All of the above
99. Which of the following usually observe each activity on the internet of the victim, gather
all information in the background, and send it to someone else?
A. Malware
B. Spyware
C. Adware
D. All of the above
100._______ is a type of software designed to help the user's computer detect viruses and
avoid them.
A. Malware
B. Adware
C. Antivirus
D. Both B and C
A. Quick heal
B. Mcafee
C. Kaspersky
D. All of the above
102. It can be a software program or a hardware device that filters all data packets coming
through the internet, a network, etc. it is known as the_______:
A. Antivirus
B. Firewall
C. Cookies
D. Malware
103. Which of the following refers to stealing one's idea or invention of others and use it for
their own benefits?
A. Piracy
B. Plagiarism
C. Intellectual property rights
D. All of the above
104. Read the following statement carefully and find out whether it is correct about the
hacking or not?
105 Which of the following refers to exploring the appropriate, ethical behaviours related to
the online environment and digital media platform?
A. Cyber low
B. Cyberethics
C. Cybersecurity
D. Cybersafety
106. Which of the following refers to the violation of the principle if a computer is no more
accessible?
A. Access control
B. Confidentiality
C. Availability
D. All of the above
107. Which one of the following refers to the technique used for verifying the integrity of the
message?
A. Digital signature
B. Decryption algorithm
C. Protocol
D. Message Digest
108. Which one of the following usually used in the process of Wi-Fi-hacking?
A. Aircrack-ng
B. Wireshark
C. Norton
D. All of the above
109 Which one of the following is actually considered as the first computer virus?
A. Sasser
B. Blaster
C. Creeper
D. Both A and C
110 To protect the computer system against the hacker and different kind of viruses, one
must always keep _________ on in the computer system.
A. Antivirus
B. Firewall
C. Vlc player
D. Script
A. An Antivirus Program
B. A photo editing software
C. A computer virus
D. A video editing software
A. Maliciousware
B. Badware
C. Ilegalware
D. Malware
113. Hackers usually used the computer virus for ______ purpose.
A. WPA
B. WPA2
C. WPS
D. Both A and C
A. 1970
B. 1971
C. 1972
D. 1969
118. Which of the following is considered as the world's first antivirus program?
A. Creeper
B. Reaper
C. Tinkered
D. Ray Tomlinson
119. Which of the following statements is true about the VPN in Network security?
A. It is a type of device that helps to ensure that communication between a device and a
network is secure.
B. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
C. It typically creates a secure, encrypted virtual "tunnel" over the open internet
D. All of the above
120. Which of the following type of text is transformed with the help of a cipher algorithm?
A. Transformed text
B. Complex text
C. Scalar text
D. Plain text
122. Which of the following is a type of independent malicious program that never required
any host program?
A. Trojan Horse
B. Worm
C. Trap Door
D. Virus
123. In an any organization, company or firm the policies of information security come
under__________
A. CIA Triad
B. Confidentiality
C. Authenticity
D. None of the above
124. Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?
125. In order to ensure the security of the data/ information, we need to ____________ the
data:
A. Encrypt
B. Decrypt
C. Delete
D. None of the above
126. Which of the following known as the oldest phone hacking techniques used by hackers
to make free calls?
A. Phreaking
B. Phishing
C. Cracking
D. Spraining
127.. A ______________ tries to formulate a web resource occupied or busy its users by
flooding the URL of the victim with unlimited requests than the server can handle.
A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
128.During a DoS attack, the regular traffic on the target _____________ will be either
dawdling down or entirely interrupted.
A.network
B. system
C. websit e
D. router
130.. A DoS attack coming from a large number of IP addresses, making it hard to manually
filter or crash the traffic from such sources is known as a _____________
A. GoS attack
B. PDoS attack
C.DoS attack
D. DDoS attack
133.. A ___________ is a small malicious program that runs hidden on infected system.
A. Virus
B. Trojan
C.Shareware
D. Adware
138. Phishers often develop ______________ websites for tricking users & filling their
personal data.
A. legitimate
B. illegitimate
C. genuine
D. official
141. ___________ are used which crawl web pages looking for email Ids and copies them to
the database.
A. Caches
B. Cookies
C. Bots
D. Spiders
144. A company wishes to ensure that no one else can use their logo.
A. Copy rights
B. Trade mark
C. Patent
D.Industrial designs
145. A singer wishes to assign the rights to reproduce a video she has made of her
concert.
147. Which of the following is part of the four main types for e-commerce?
A. B2B
B. B2C
C. C2B
D. All of the above
152. What are plastic cards the size of a credit card that contains an embedded chip on
which digital information can be stored?
A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards
153. Which of the following are advantages normally associated with B2B e- commerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
160. A business competing in a commodity like environment must focus on which of the
following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the abov
161. Which of the following is a method of transferring money from one persons account
to another?
A. electronic check
B. credit card
C. e-cash
D. none of the above
162. A combination of software and information designed to provide security and information for
payment is called a?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
163. What is the name for direct computer-to-computer transfer of transaction information
contained in standard business documents?
A. internet commerce
B. e-commerce
C. transaction information transfer
164. Public key encryption uses multiple keys. One key is used to encrypt data, while
another is used to decrypt data. The key used to encrypt data is called______ key and the key
used to decrypt data is called the______key.
A. encryption, decryption
B. private, public
C. encryption, public
D.public, private
166. When a transaction is processed online, how can the merchant verify the customers identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
167. The practice of forging a return address on an e-mail so that the recipient is fooled into
revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
B. Virus
C. Trojan horse
D. None of the above
169. Who breaks into other peoples computer systems and steals and destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
170. What is a type of virus that spreads itself, not just from file to file, but from computer to
computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
171. What floods a Web site with so many requests for service that it slows down or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
173. Fraudulent email messages are some fake email messages that seem to come from legitimate
source is called
A.Email Forging
B.Email Spoofing
C.Email Spamming
D.Email Bombing
175.A company wishes to ensure that no one else can use their logo. Then it is called the
A. Copy rights
B. Trade mark
C. Patent
D. Industrial designs
176. A singer wishes to assign the rights to reproduce a video she has made of her concert.
(a). Copy rights
(b). Trade mark
(c). Patent
(a). Industrial designs
=
180. The dimension of e-commerce that enables commerce across national
boundaries is called .
A. interactivity
C. richness
D. ubiquity
B. Doing business
C. Sale of goods
182. Which one of the following is not one of the major types of e-commerce?
Ans A. C2B
B. B2C
C. B2B
D. C2C
183. Which of the following is part of the four main types for e‐commerce?
A. B2B
B. B2C
C. C2B
C. C2Bs
D. C2Cs
185. Which type of e‐commerce focuses on consumers dealing with each other?
A. B2B
B. B2C
C. C2B
Ans D. C2C
B. C2B
C. C2C
187. All of the following are technologies used to gather information about you
online except .
A. spy ware
B. cookies
C. Gmail
Ans D. anonymizers
D. Fresh products
189. Which products are people most likely to be more uncomfortable buying on
the Internet?
A. Books
Ans B. Furniture
C. Movies
191 Which products are people most likely to be comfortable buying on the Internet?
A. Books
B. PCs
C. CDs
B. eBay
Ans C. Yahoo
D. Face book
193. All of the following are major B2C business models except .
A. content provider
C. transaction broker
D. service provider
Ans B. ERP
C. SCM
B. slightly fewer
C. much fewer
196. Which term represents a count of the number of people who visit one site,
click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
Ans B. Click‐through
C. Spam
D. All of the above
197. What is the percentage of customers who visit a Web site and actually
buy something called?
A. Affiliate programs
B. Click‐through
C. Spam
198. What is the process in which a buyer posts its interest in buying a certain
quantity of items, and sellers compete for the business by submitting successively
lower bids until there is only one seller left?
A. B2B marketplace
B. Intranet
D. Internet
199. What are plastic cards the size of a credit card that contains an embedded chip
on which digital information can be stored?
A. Customer relationship management systems cards
C. FEDI cards
Ans B. B2C
C. C2B
D. C2C
201. Which form of e‐commerce currently accounts for about 97% of all e‐commerce
revenues?
Ans A. B2B
B. B2C
C. C2B
D. C2C
202. Which of the following are advantages normally associated with B2B e‐
commerce?
A. Shorter cycle times
B. Reduction in costs
B. amazon.com
C. flipkart.com
B. decryption
C. firewall
B. decryption
Ans C. e‐cash
207. Which of the following statements accurately reflect the impact of technology?
A. Technology has caused buyer power to increase
208. Which of the following was the first commercial Web browser?
A. Mosaic
B. Mozilla
Ans C. Netscape Navigator
D. Internet Explorer
209. A business cannot be all things to all people. Instead, a business must:
A. Identify target customers
B. books
C. softwares
D. none
C. Ease of ordering
Ans D. all of the above
Ans B. Apache
C. Microsoft IIS
D. Google
B. aggregation
C. Direct materials
D. Reverse auction
215. What Web server functionality allows it verify usernames and passwords and
process certificates and encryption information?
A. Processing of HTTP requests
C. Data capture
216. The underlying computing equipment that the system uses to achieve its
e- commerce functionality is called a .
Ans A. hardware platform
B. content platform
C. transaction platform
D. scalability platform
B. Pop‐up ads
D. Viral marketing
B. B2B
C. B2C
220. The set of standards for communication between a browser and a program
running on a server that allows for interaction between the user and the server is
known as .
A. Active Server Pages (ASP)
D. VBScript
221. Which form of e‐marketplace brings together buyers and sellers from multiple
industries, often for MRO materials?
Ans A. horizontal
B. Vertical
C. Integrated
D. Inclined
222. Which form of e‐marketplace brings together buyers and sellers from the same
industry?
A. horizontal
Ans B. Vertical
C. Integrated
D. Inclined
223. The ability to change the product to better fit the needs of the customer is called
.
Ans A. customization
B. personalization
C. privacy
D. accessibility
B. Pop‐up ad
Ans C. Banner ad
D. Discount ad
Ans B. pop‐up ad
C. banner ad
D. discount ad
B. pop‐up ad
C. banner ad
D. discount ad
227. Which, if any, of the following types of ads are people most willing to tolerate?
A. pop‐under ad
B. pop‐up ad
C. banner ad
Ans B. data
C. technology solutions
D. organizational policies and procedures
229. All of the following are major categories of computer viruses except .
A. Macro viruses
B. File-infecting viruses
C. Script viruses
B. credit card
C. e‐transfer
232. Malicious hackers who act with the intention of causing harm are .
A. White hats
C. Grey hats
D. Brown hats
233 An electronic check is one form of what?
A. e‐commerce
C. e‐cash
D. check
234. When hackers flood a Web site with useless traffic to overwhelm the network,
it is called .
A. phishing
B. pharming
D. spoofing
235. If you need to transfer money to another person via the internet, which of the
following methods could you use?
A. financial cybermediary
B. electronic check
B. message integrity
C. nonrepudiation
D. confidentiality
237. Which of the following permits the transmission of a bill, along with payment of
that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
B. pop up ad
C. shopping cart
D. encryption
B. VPNs
Ans C. SSL
D. PPTP
241. What is the name for direct computer‐to‐computer transfer of transaction
information contained in standard business documents?
A. internet commerce
B. e‐commerce
D. electronic checks
244. Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used to decrypt data. The key used to encrypt data is called the
key, while the key used to decrypt data is called the key.
A. encryption, decryption
B. private, public
C. encryption, public
B. Accumulating balance
C. Stored value
Ans D. Cash
B. encrypts information
B. checks
D. debit
247. The practice of forging a return address on an e‐mail so that the recipient is
fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
Ans D. spoofing
248. influence the behavior of others through their personality, skills, or
other factors.
Ans A. Opinion leaders
D. Lifestyle groups
Ans B. Intranet
C. Extranet
D. Thin client
B. Intranet
Ans C. Extranet
D. Thin client
C. permission marketing
D. blog marketing
252. Creating multiple versions of information goods and selling essentially the
same product to different market segments at different prices is called .
Ans A. versioning
B. bundling
C. transactive content
D. price discrimination
253. All of the following are examples of intelligent agent technology except
.
254. Which factor represents how well your system can adapt to increased demands?
A. Availability
B. Accessibility
C. Reliability
Ans D. Scalability
255. What determines the future IT infrastructure requirements for new equipment
and additional network capacity?
A. Flexibility
B. Performance
B. pop-up ads
D. pop-under ads
257. All of the following are among the most common categories of spam except
.
Ans A. fraud
B. commercial products
C. finance
D. health (drugs)
B. blog advertising
D. game advertising
259. Which of the following measures the percentage of people exposed to an online
advertisement who actually click on the banner?
A. impression rate
B. view-through rate
260. Which of the following is a measure of the percentage of purchasers who return
to a Web site within a year?
Ans A. loyalty
B. reach
C. recency
D. unique visitors
Ans B. decrease
C. increase
D. rapidly increase
264. Which process can prevent data from lose due to computer problems or
human errors?
Ans A. backup
B. recovery
C. benchmarking
D. data cleansing
265. Which process is used to reinstall data from a copy when the original data
has been lost?
A. backup
Ans B. recovery
C. benchmarking
D. data cleansing
266. A patent grants the owner an exclusive monopoly on the ideas behind
the invention for years.
A. 10
Ans B. 20
C. 30
D. 40
B. slightly smaller
C. close to equal
D. equal
B. EDI
C. ERP
D. Script kiddies
270. The redirection of traffic from a legitimate site to an infringing site is called
.
A. cyber squatting
C. meta tagging
D. key wording
271. Who breaks into other people's computer systems and steals and destroys
information?
Ans A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
272. All of the following are types of intellectual property protection except .
A. patents
B. trademarks
Ans C. governance
D. copyrights
273. What is a type of virus that spreads itself, not just from file to file, but
from computer to computer via e‐mail and other Internet traffic?
A. Computer virus
Ans B. Worm
C. Denial‐of‐service attack
275. What floods a Web site with so many requests for service that it slows down
or crashes?
A. Computer virus
B. Worm
276. Which of the following is an industry strategic factor that relates to whether
new entrants face a disadvantage when attempting to enter an industry?
Ans A. barriers to entry
B. power of suppliers
C. power of consumers
277. What is the process of making a copy of the information stored on a computer?
Ans A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Ans B. Anti‐virus
C. Firewall
D. Biometrics
279. What is hardware and/or software that protects computers from intruders?
A. Backup
B. Anti‐virus
Ans C. Firewall
D. Biometrics
280. What is the use of physical characteristics — such as your fingerprint, the blood
vessels in the retina of your eye, the sound of your voice, or perhaps even your
breath — to provide identification?
A. Backup
B. Anti‐virus
C. Firewall
Ans D. Biometrics
281. What scrambles the contents of a file so you can't read it without having the
right decryption key?
Ans A. Encryption
B. Intrusion‐detection software
C. Security‐auditing software
282. What is an encryption system that uses two keys: a public key that everyone
can have and a private key for only the recipient?
A. Encryption
C. Intrusion‐detection software
D. Security‐auditing software
B. content convergence
C. industry convergence
284. What looks for people on the network who shouldn't be there or who are acting
suspiciously?
A. Encryption
B. Public key encryption
D. Security‐auditing software
285. What checks out your computer or network for potential weaknesses?
A. Encryption
286. The combination of technical and legal means for protecting digital content from
unlimited reproduction without permission is known as .
Ans A. Digital rights management
B. File
C. Folder
C. donations
D. service fees
B. Intellectual property
Ans C. Patent
D. Denial‐of‐service attack
294. The type of social network described as a community built around a common
interest such as games, sports, music, and so on is called .
A. general community
B. practice network
C. affinity community
B. fixed
C. trigger
D. utilization
297. Which of the following examines information passing through switches, hubs,
or routers?
A. Key logger
D. Screen captures
298. A dynamically priced market that features few buyers and many sellers is a
market that exhibits .
A. market neutrality
C. seller bias
D. owner bias
B. Sender's server
C. Recipient's server
Ans B. Ask people to fill out and return a fake letter using postal mail
302. Which of the following portal revenue models involves charging for premium
content?
A. ISP services
B. General advertising
D. Tenancy deals
303. A technique used to gain personal information for the purpose of identity theft,
often by e‐mail, is called?
A. Phishing
B. Carding
C. Brand spoofing
305. All of the following are potential benefits of B2B e-commerce except .
Ans A. reduced amount of 'first-mover' advantages
Ans B. Spam
C. Extra mail
307. What is the legal protection afforded an expression of an idea, such as a song,
video game, and some types of proprietary documents?
A. Ethics
B. Intellectual property
Ans C. Copyright
C. Counterfeit software
D. Privacy
309. What is a program, when installed on a computer, records every keystroke and
mouse click?
Ans A. Key logger software
C. Cookie
D. Adware
B. Electronic cash
C. E‐cash
311. The E-commerce domain that involves business activity initiated by the
consumer and targeted to businesses is known as .
A. Business to Business (B2B)
B. Firewall
C. Hub
C. BSNL only
D. None
B. Debit card
C. Paper cash
D. None of these
Ans B. Microchip
C. E‐cash
317. The smart card which use antenna for reading and writing data.
A. Contact smart card
D. Both B and C
319. Which of the smart card uses a sim like structure for reading and writing data?
Ans A. Contact smart card
D. Both B and C
320. Which one is the third party payment providers who offer digital wallets for E‐
merchants?
A. Oxicash
B. PayMate
C. PayPass
B. DES
C. AES
B. Cryptography
Ans C. Wallets
D. Digital signature
323 Which e‐government arena is being used when governmental agencies send
out and accept bids for work?
A. G2G
Ans B. G2B
C. G2C
D. G2G
B. Cyber vandalism
C. Integrity threats
B. S‐HTTP
C. SET
326. The protocol which allows the file transfer between computers is.
A. TCP/IP
Ans B. FTP
C. HTTP
D. SOA
C. Traditional banking
D. None of these
Ans B. EPS
C. PayPal
D. None of these
B. DES
C. AES
Ans D. FTP
B. DES
C. AES
B. firewall
C. encryption
D. None
C. Demand drafts
Ans D. e‐cheque
C. Credit card
B. Debit card
C. Credit card
D. e‐cheque
335. which one is not an E‐payment method used in India?
A. Debit card
B. Credit card
C. e‐cheque
Ans D. none
B. On Time processing
D. None
B. Viruses
C. Worm
Ans D. None
Ans B. Symmetric
C. Asymmetric
D. None
B. Symmetric
Ans C. Asymmetric
D. None
340. What is an arrangement made between e‐commerce sites that direct users from
one site to the other?
A. Spam
B. Viral marketing
B. Virus
C. Trojan horse
Ans B. Cryptography
C. Firewall
B. Security
C. Confidentiality
B. Trojan horse
C. Script virus
345. The virus that are attached with vb and java files are called.
A. Macro
B. Trojan horse
C. Websites
Answer:D
7. In which website GlobalEasy Buy is facilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8. The best products to sellinB2C e‐ commerce are:
a. Small products
b. Digital products
c. Specialty products
d. Fresh products
Answer:B
9. Which products are people most likely to be more uncomfortable buying on the
Internet?
a. Books
b. Furniture
c. Movies
d.Alloftheabove
Answer:B
10. Which products are people most likely to be comfortable buying on
theInternet?
a. Books
b. PCs
c. CDs
d. All of the above
Answer:D
11. Digital products are best suited for B2C e‐ commerce because they:
a. Are commodity like products
b. Can be mass‐ customized and personalized
c. Can be delivered at the time of purchase
d. All of the above
Answer:D
12. The solution for all business needs is
a. EDI
b. ERP
c. SCM
d. None of the above
Answer:B
13. All of the following are techniques B2C e‐ commerce companies use to
attract customers,except:
a. Registering with search engines
b. Viral marketing
c. Online ads
d. Virtual marketing
Answer:D
14. Which is a function of E‐ commerce
a. marketing
b. advertising
c. warehousing
d. all of the above
Answer:D
15. Which is not a function of E‐ commerce
a. marketing
b. advertising
c. warehousing
d. none of the above
Answer:C
16. Which term represents account of the number of people who visit onesite,click
on an ad,and are taken to the site of the advertiser?
a. Affiliate programs
b. Click‐ through
c. Spam
d. All of the above
Answer:B
17. What is the percent age of customers who visit a Website and actually buy
some thing called?
a. Affiliate programs
b. Click‐ through
c. Spam
d. Conversionrate
Answer:D
18. What are materials used in production in a manufacturing company
or rare placed on the shelf or sale in are tail environment?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above
Answer:A
19. What are materials that are necessary for running a modern corporation,but
do not relate to the company's primary business activities?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above
Answer:B
20. What are ball point pens purchased by a clothing company?
a. Direct materials
b. Indirect materials
c. EDI
d. None of theabove
Answer:B
21. What is another name for?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above
Answer:B
22. What is the process in which a buyer posts its interest in buying a certain
quantity of items,and sellers compete for the business by submitting
successively lowerbids until there is only one seller left?
a. B2B marketplace
b. Intranet
c. Reverse auction
d. Internet
Answer:C
23. What are plastic cards the size of a creditcard that contains an embedded chip
on which digital information can be stored?
a. Customer relationship management systems cards
b. E‐ government identity cards
c. FEDI cards
d. Smartcards
Answer:D
24. Most individuals are familiar with which form of e‐ commerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:B
25. Which form of e‐ commerce currently accounts for about 97% of all
e‐ commercere venues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:A
26. Which of the following are advantages normally associated with B2B
e‐ commerce?
a. Shorter cycle times
b. Reduction in costs
c. Reaches wider audiences
d. All of the above
Answer:D
27. If the threat of substitute products or services is low it is a(n):
a. Disadvantage to the supplier
b. Advantage to the buyer
c. Advantage to the supplier
d. None of the above
Answer:C
28. The threat of new entrants is high when it is:
a. Hard for customers to enter the market
b. Hard for competitors to enter the market
c. Easy for competitors to enter the market
d. Easy for customers to enter the market
Answer:C
29. If it is easy for competitors to enter the market,the threat of newentrants is
considered:
a. High
b. Low
c. More
d. Less
Answer:A
30. An industry is less attractive for suppliers when the rivalry among existing
competitors is:
a. High
b. Low
c. More
d. Less
Answer:A
31. Unique value auction is mainly applies to?
a. New products
b. Second hand products
c. Engineering products
d. None of the above
i. Answer:B
32. Paisa pay is facilitated in
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. none of the above
Answer:A
33. Which of the following is a useful security mechanism when considering
business strategy and IT?
encryption
a.
decryption
b.
firewall
c.
all the above
d.
Answer:D
34. Which of the following is not related to security mechanism
a. encryption
b. decryption
c. e‐ cash
d. all the above
Answer:C
35. A productor service that customers have come to expect froman
industry,which must be offered by newentrants if they wish to compete and
survive,is known as a(n)?
a. Switching costs
b. Loyalty programs
c. Entry barriers
d. Affiliate programs
Answer:C
36. Which of the following statements accurately reflect the impact of technology?
a. Technology has caused buyer power to increase
b. Technology has less ened the entry barriers for many industries
c. Technology has increased the threat of substitute products and services
d. All of the above
Answer:D
37. A business can not be all things to all people.Instead,a business must:
a. Identify target customers
b. Identify the value of products/services as perceived by customers
c. All of the above
d. None of the above
Answer:C
38. How the transactions occurin e‐ commerce?
a. Using e‐ medias
b. Using computers only
c. Using mobile phones only
d. None of the above
Answer:A
39. Which type of products is lesser purchased using ecommerce?
a. automobiles
b. books
c. softwares
d. none
Answer:A
40. A business competing in a commodity like environment must focus on which of
the following?
a. Price
b. Ease/speed of delivery
c. Ease of ordering
d. All of the above
Answer:D
41. Which of the following refers to creating products tailor ed to individual
customers?
a. customization
b. aggregation
c. Direct materials
d. Reverse auction
Answer:A
42. Materials used in the normal operation of a business but not related to
primary business operations are called what?
a. Supplies
b. Direct materials
c. Indirect materials
d. Daily stuff
Answer:C
43. Amazon.com is well‐ known for which e‐ commerce marketing technique?
a. Banner ads
b. Pop‐ up ads
c. Affiliate programs
d. Viral marketing
Answer:C
44. What is the name given to an interactive business providing a centralized
market where many buyers and suppliers can come together for e‐ commerce
or commerce‐ related activities?
a. Direct market place
b. B2B
c. B2C
d. Electronic market place
Answer:D
45. Which form of e‐ market place brings together buyers and sellers from multiple
industries,often for MRO materials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
46. Which form of e‐ market place brings together buyers and sellers from the same
industry?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:B
47. Which type of add appears on a webpage?
a. pop‐ underad
b. Pop‐ up ad
c. Banner ad
d.Discount ad
Answer:C
48. What type of ad appears on top of a webpage?
a. pop‐ underad
b. pop‐ up ad
c. banner ad
d. discount ad
Answer:B
49. What type of ad appears under a webpage?
a. pop‐ under ad
b. pop‐ up ad
c. banner ad
d. discount ad
Answer:A
50. Which,if any,of the following types of ads are people most willing to tolerate?
a. pop‐ underad
b. pop‐ up ad
c. banner ad
d. none of the above
Answer:D
51. Which of the following is an Internet‐ based company that makes it easy for on
e person to pay another over the Internet?
a. Electronic check
b. Electronic bill presentment and payment
c. Conversion rates
d. Financial cybermediary
Answer:D
52. Which of the following is a method of transferring money from one
person's account toa nother?
a. Electronic check
b. creditcard
c. e‐ transfer
d. none of the above
Answer:A
53. An electronic check is one form of what?
a. e‐ commerce
b. online banking
c. e‐ cash
d. check Answer B
54. If you need to transfer money to another person via the internet,which of
the following methods could you use?
a. Financial cybermediary
b. Electronic check
c. Electronic bill presentment and payment
d. All of the above
Answer:D
55. Which of the following permits the transmission of a bill,along with payment of
that bill,to be conducted over theInternet?
a. Financial cybermediary
b. Electronic check
c. Electronic bill presentment andpayment
d. All of the above
Answer:C
56. A combination of software and information designed to provide security and
information for payment is called a what?
a. Digital wallet
b. Popup ad
c. Shopping cart
d. encryption
Answer:A
57. What is the name for direct computer‐ to‐ computer transfer of
transaction information contained in standard business documents?
a. Internet commerce
b. e‐ commerce
c. transaction information transfer
d. electronic data interchange
Answer:D
58. Which of thefollowing is used in B2B to pay for purchases?
a. e‐ commerce
b. financial electronic data interchange
c. electronic data exchange
d. electronic checks
Answer:B
59. Public key encryption uses multiple keys.One key is used to encryptdata,while
another is used to decrypt data.The key used to encryptdata is called the
key,while the key used to decrypt data is called the key.
a. encryption,decryption
b. private,public
c. encryption,public
d. public,private
Answer:D
60. Secure Sockets Layers does which of the following?
a. Creates a secure,private connection to a webserver
b. Encrypts information
c. Sends information over the internet
d. All of the above
Answer:D
61. When a transaction is processed online,how can the merchant verify the
customer's identity?
a. Use secure sockets layers
b. Use secure electronic transactions
c. Use electronic data interchange
d. Use financial electronic data interchange
e. Answer:B
62. The practice of forging a return address on an e‐ mail so that the
recipientis fooled into revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Answer:D
63. What is a model of a proposed product,service,or system?
a. Prototyping
b. Prototype
c. Proof‐ of‐ concept prototype
d. Selling prototype
Answer:B
64. What is an internal organizational Internet that is guarded against outside
access by a special security feature called a firewall (which can be
software,hardware,or a combination of the two)?
a. Client/server network
b. Intranet
c. Extranet
d. Thinclient
Answer:B
65. What is an intranet that is restricted to an organization and certain
outsiders,such as customers and suppliers?
a. Client/server network
b. Intranet
c. Extranet
d. Thinclient
Answer:C
66. What is a detailed process for recovering information or an IT system in
the event of acatastrophic disaster such as a fire or flood?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery cost curve
Answer:A
67. What is a separate facility that does not have any computer equipment but is a
place where the knowledge workers can move after the disaster?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery costcurve
Answer:C
68. What is a separate and fully equipped facility where the company can move
immediately after the disaster and resume business?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery cost curve
Answer:B
69. Whatcharts(1) the cost to your organization of the unavailability of information
and technology and (2) the cost to your organization of recovering from a
disaster overtime?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery
costcurve
Answer:D
70. Which factor determines when your IT system will be available for
knowledge workers to access?
a. Availability
b. Accessibility
c. Reliability
d. None of the above
Answer:A
71. Which factor determines whoh as the right to access different types of IT
systems and information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:B
72. Which factor ensures your IT systems are functioning correctly and
providing accurate information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:C
73. Which factor represent show well your system can adapt to increased demands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:D
Answer:B
100.
What is the process of making a copyoftheinformationstoredonacomputer?
a. Backup
b. Anti‐virus
c. Firewall
d.
Biometrics
Answer:A
What software detects and removes or quarantines computerviruses?
101.
Backup
a. Anti‐virus
b.
c. Firewall
d. Biometrics
Answer:B
Whati shardware and/or software that protects computers from intruders?
102.
Backup
a. Anti‐virus
b.
c. Firewall
d. Biometrics
Answer:C
103. What is the use of physical characteristics—such as your fingerprint,the
blood vessels in the retina of your eye,the sound of your voice,or perhaps
evenyour breath—to provide identification?
a. Backup
b. Anti‐ virus
c. Firewall
d. Biometrics
Answer:D
104. All of the following are considered biometrics,except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105. Whats crambles the contents of a file so you can't read it without
having the right decryptionkey?
a. Encryption
b. Intrusion‐ detectionsoftware
c. Security‐ auditingsoftware
d. Alloftheabove
Answer:A
106. What is an encryption system that use two keys: a public key that every one can have and a
private keyfor only the recipient?
a.
Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software
Answer:B
107.suspiciously?
Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting
a. Encryption
PublickeyencryptionIntrusion‐detection
b. softwareSecurity‐auditingsoftware
c.
d.
Answer:C
108.
What checks out your computer or network for potential weaknesses?
a. Encryption
b. Public key encryption Security
c. ‐auditing software
d. Noneoftheabove
Answer:C
109.
Which of the following to viruses harm?
a. Your keyboard
b. Your monitor
c. Your processor
d. Viruses do not har many of the above
Answer: D
110.
Which of the following can a virus do?
a. Hurt yourhardware
Answer:D
112. Which of the following is a characteristic of a firewall?
Examine seach message as it seeks entrance to the network
a.
b. Blocks messages without the correct markings from entering the network
c. Detects computers communicating with the Internet without approval
d. All of the above
Answer:D
113. Which of the following are ways to prove accessrights?
a. What you know,likeapassword
Answer:D
114. Which item can a password be used to protect?
a. Network
b. File
c. Folder
d.
Alloftheabove
Answer:D
115. Which is the most important component o fIT?
a. Information
b. People
c.
Information technology
d. Computers
Answer:B
116. Which of the following applies to the implementation of an idea?
a. Copyright
b. Intellectualproperty
c. Patent
d. Denial‐ of‐ serviceattack
Answer:C
117. Wheny
a. oupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?Thecostofth
b. eCDs,manuals,anddevelopmentofthesoftware
c.
d. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopmentAshareo
Answer:D
fthecostofsoftwaredevelopment
Which of the following is not a dimension of privacy?
a. Need for personal space
118.
Alloftheabove
b. Need to feel in control of our possessions
c.
d. Need to feel in control of our personal information
Alloftheabovearedimensionsofprivacy
Answer:D
Which of the following captures screen images?
119. a
Keylogger
a. PacketsnifferLog
b.
c. analysistools
d. Screencapturesoftware
Answer:D
120. Which of the following examines information passing through
switches,hubs,or routers?
a. Keylogger
b. Packetsniffer
c. Log analysis tools
d. Screen captures
Answer:B
121. Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packet sniffer
Log analysi stools
c.
d. Screen captures
Answer:C
E‐mail messages may be stored onwhich of the following computers?
122. a Sender'scomputer
a.
b. Sender'sserverRecipient
'sserver
c.
Alloftheabove
d.
Answer:D
What might identity thieves do with your identity?
123.
a
Applyforandusecreditcards
b. Applyforaloan
a.
c. Changetheiridentity
d. Alloftheabove
Answer:D
124. Which of the following is not a common approach to phishing?
a. Send an official‐looking e‐mail asking for confidential information
b. Ask people to fill out and return a fake letter using postalmail
c. Ask people to clicka link in an e‐mail to open a submission form on a webpage
d. All of the above are uncommon approaches to phishing
Answer:B
125. A technique used to gain personal information for the purpose of identity
theft,often bye‐ mail,iscalled?
a. Phishing
b. Carding
c. Brand spoofing
d. All of th eabove
Answer:D
126. Companies can gather information about employees and potential
employees from which of the following places?
a. Job applications
b. Credit reports
c. Companies that track Websurfers
d. All of the above
Answer:D
Answer:B
Answer:C
132. What is the unauthorized use ,duplication,distribution or sale of copyrighted software?
a. Fair Use Doctrine Pirated
b. software
c. Counterfeit
d . softwarePrivacy
Answer:B
133. What is a program,when installed on a computer,records every key stroke and mouse
click?
a. Keyloggersoftware
b. Hardwarekeylogger
c. Cookie
d. Adware
Answer:A
134. What is software you don't want hidden inside software you do want?
a. Adware
b. Trojan‐ horse software
c. Spyware
d. All of the above
Answer:D
135. What is an electronic representation of cash?
a. Digital cash
b. Electronic cash
c. E‐ cash
d. All of the above
Answer:D
136. What is a fully‐ equipped computer that you wear as a piece of clothing or
attached to a
Piece of clothing similar to the way you would carry your cell phone on yourbelt?
a. Wearable computer
b. GPS
c. Implant chip None
d. of the above
Answer:A
137. What is a technology‐enabled microchip implanted in to the humanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d.
Noneoftheabove
Answer:C
138. Which of the following is not a reason why digital cash has turned out to
be extremely difficult?
a. If your system crashes you lose your money
b. There is only one standard
c. Digital cash makes money laundering easy
d. Digital cash travels across the vast Internet an dissusceptible to
begin stolen
Answer:B
139. Smart card is better protected than other cards using
a. Encryption
b. Firewall
c. Hub
Answer:A
140. Trust card is introduced by
a. BSNLanditzcash
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. None
Answer:B
142. The E‐payment mechanism widely used in B2B is
a. Creditcard
b. Debitcard
c. Mastercard
d.E‐ chequ
Answer:D
143. Which type of technology will increase portability and mobility?
a. Implant chips
b. Micro‐ payments
c. Internet phone calls
d. All of the above
Answer:D
144. Which of the following an accurate statement about internet phone
calls?
a. They are possible but not yet free
b. They are not possible
c. They are currently standard practice
d. None of the above is an accurate statement about internet
phone calls
Answer:A
145. What are the most commonly used input devices today?
a. Keyboard
b. Mouse
c. All of the above
d. None of the above
Answer:C
146. Which of the following can be used to help identify people in a crowd?
a. Biochip
b. Implant chip
c. Facial recognition software
d. Vision chip
Answer:C
147. Which one is also known as plastic money?
a. Credit card
b. Debit card
c. Paper cash
d. All of th eabove
Answer:A
148. E‐ chequesare…………………
a.Prepaidb.
b Postpaid
c.Both prepaid and postpaid
Answer:A
149. Digital signature is a
a. Digital id,send as an attachment to a webpage/e‐mail/message
b. Isused for verifying the attachments send using web
c. Bothaandb
d. None of these
Answer:C
b. Microchip
c. E‐cash
d. None of the above
Answer:B
152. The smart card which use antenna for reading and writing data Contact
a) smartcard
b) Contactles smartcard
c)
Proximity smartcard (d) Both B and C
)
Answer:D
153. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only.
a) Contact smart card
b) Contactless smart card
c) Proximity smart card
d) Both B and C
Answer:C
154. Which of the smart card uses a sim like structure for reading and writing data
a) Contact smart card
a. SCM
b. EDI
c. WWW
d. BPR
Answer:D
156. What is I stands in CIA of smart card?
a. International
b. Integrity
c. Identity
d. None of the above
Answer:B
a. Auditing
b. Authenticity
c. Authorized
d. Noneoftheabove
Answer:B
b. Conference
c. Congress
a. MCID
b. MMID
c. RSID
d. NONE OF THE ABOVE
Answer:B
a. Threat
b. Danger
c. Error
d. Noneoftheabove
Answer:A
162. Which one is not a encryption technique
a. RSA
b. DES
c. AES
d. NONEOFTHEABOVE
Answer:D
a. Encryption
b. Cryptography
c. Wallets
d. Digital signature
Answer:C
164. Which e‐ government arenais being used when governmental
agencies send out and accept bids for work?
a) G2G
b) G2B
c) G2C
d) G2G
Answer:B
d. None of these
Answer:B
a. Sniffer programs
b. Cyber vandalism
c. Integrity threats
a. SSL
b. S‐HTTP
c. SET
d. ALLOFTHEABOVE
Answer:D
168. The protocol which allows the file transfer between computers is
a. TCP/IP
b. FTP
c. HTTP
d. SOA
Answer:B
169. E‐Bankingisalsoknownas
a. ATMs
b. Netbanking
c. Traditional banking
d. None of these
Answer:B
a. EFT
b. EPS
c. PayPal
d. None of these
Answer:B
171. Whichoneisaclientlevelthreat?
a. Malicious code
b. Viruses
c. Active contents
a. RSA
b. DES
c. AES
d. FTP
Answer:D
a. RSA
b. DES
c. AES
a. Malicious code
b. CGI threats
c. Database threats
d. Buffer overflows
Answer:A
a. Hacking
b. Storm
c. Phishing
Answer:A
176. Which one is a physical threat?
a. Phishing
b. Storm
c. Earthquake
a. Hacking
b. Storm
c. Phishing
Answer:A
b. Webpages
a. Trojan horse
b. firewall
c. encryption
d. None
Answer:A
a. Cash on delivery
b. Cash before delivery
c. Demand drafts
d. e‐cheque
Answer:D
a. Cash on delivery
c. Creditcard
d. Both a and b
Answer:D
183. Which one is not an online payment mode?
a. Cash on delivery
b. Debitcard
c. Creditcard
d. e‐cheque
Answer:A
a. Cashon delivery
c. Demand drafts
d. e‐cheque
Answer:D
a. Debitcard
b. Creditcard
c. e‐cheque
d. None
Answer:D
a. On Time Password
b. On Time processing
d. None
Answer:A
a. Trojanhorse
b. Viruses
c. Worm
d. None
Answer:D
a. Publickey
b. Symmetric
c. Asymmetric
d. None
Answer:B
b. Symmetric
c. Asymmetric
d. None
Answer:C
190. What is the legal protection afforded an expression of an idea,such as
a song,videogame,and some types of proprietary documents?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
191. Cyber slacking consists of what activities?
a. Visiting“inappropriate”websites
b. Visiting news sites
c. Chatting online with others about non‐worktopics
d. All of the above
Answer:D
192. What is an arrangement made between e‐ commerce sites that direct
users from one site to theother?
a. Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193. Which type deals with auction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
a. Physical layer
b. Product layer
c. Service layer
d. None
Answer:D
Answer:D
197. DuringE‐commercetransactionweshouldensure‐‐‐‐‐‐‐‐‐‐‐‐‐
a. Integrity
b. Security
c. Confidentiality
198. The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐
a. Macro
b. Trojanhorse
c. Scriptvirus
199. The virus that are attached with vb and java files are called
a. Macro
b. Trojanhorse
c. Scriptvirus
a. Mails
c. Websites