25
E-Commerce Management - Complementary course of Bcom – III semester – CUCBCSS 2014 Admn onwards Prepared by: Smt Susheela Menon, Rayirath House, Kottapuram Road, Punkunnam. P.O Thrissur- 680 002 Kerala, India Scrutinised by: Sri. K.O. Francis Chairman, Board of Studies in Commerce UG Question Bank Module I 1. The internet is a ) Web site b ) Network of networks c) Host d ) Server 2. EDI is an early form of a ) Traditional commerce b) Digital commerce c) E-Commerce d) Mobile commerce 3. E-commerce refers to paperless exchange of business information using a ) Electronics data interchange b ) Electronic Mail c) Bulleting boards d ) All the above 4. EDI is a set of standards developed in a ) 1960’s b ) 1970’s c) 1980’s d ) 1950’s 5. ASCX12 standards were established is a)198 6 b) 1984 c)1982 d) 1987 6. Today the largest electronic commerce is a)B2 b B2E 1

E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

Embed Size (px)

Citation preview

Page 1: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

E-Commerce Management -

Complementary course of Bcom – III semester – CUCBCSS 2014 Admn onwards

Prepared by: Smt Susheela Menon, Rayirath House, Kottapuram Road,

Punkunnam. P.O

Thrissur- 680 002 Kerala, India

Scrutinised by: Sri. K.O. Francis Chairman, Board of Studies in Commerce UG

Question Bank

Module I

1. The internet is

a

) Web site

b

) Network of networks

c) Host

d

) Server 2. EDI is an early form of

a

) Traditional commerce b) Digital commercec) E-Commerce d) Mobile commerce

3. E-commerce refers to paperless exchange of business information using

a

) Electronics data interchange

b

) Electronic Mail

c) Bulleting boards

d

) All the above4. EDI is a set of standards developed in

a

) 1960’s

b

) 1970’s

c) 1980’s

d

) 1950’s5. ASCX12 standards were established is

a)198

6 b) 1984c)1982 d) 1987

6. Today the largest electronic commerce is

a)B2 b B2E

1

Page 2: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

B )

c)P2P

d

) All the above7. Which is much helpful to do business beyond cultural and national boundaries

a

) E-Commerce

b

)

Traditional

commerce

c) Mobile commerce

d

) retailing8. Which is not a feature of e-commerce

a) Universal standard

b

) Global reach

c) Ample information

d

) Retailing9. Electronic exchange of business documents in a standard format is known as:

a

) E Commerce

b

) E business

c) EDI

d

) None of these10.This is essentially a business process that connects manufactures retailers,

customers and suppliers in the form of a chain to develop deliver products

a

) E-Commerce

b

) EDI

c) SCM

d

) Net working11.EDI stands for

a

) Electric data interface

b

) Electronic data interchange

c) Electronic data interface

d

) Name of these12.Both buyers and sellers actively participate and exchange products services in

a

) SCM

b

) EDI

c) E-COMMERCE

d

)

Traditional

commerce13.Bargaining is possible only in ………… business model

a Traditional commerce b E commerce

2

Page 3: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

) )

c) M commerce

d

) Name of these14.In e- Commerce , they can not explore the stores shelves and product space.

They can only search a

a

) Electronic items

b

) Specific copy

c) Digital catalogue

d

) none15.……………………………. Refers to companies for which internet is one of

several channels to customers and perhaps not even the primary one

a

) Traditional Commerce

b

) E- commerce

c) EDI

d

) None of these16.E commerce refers to

a

) Direct buying

b

) Retailing

c) SCM

d

) Online transaction 17.E – commerce firms ……………………..large inventory

a

) Need not stock

b

) Need stock

c) Need to stock

d

) Non of these18.EDI cannot be implemented ……………… but requires the co-operation of

trading partners

a

) Unilaterally

b

) Bilaterally

c) Multilaterally

d

) All the above19.EDI soft ware translates the information

a) from structured to unstructured format

b)From unstructured to structured format

c) from structured to semi structured format

d) Non of these

3

Page 4: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

20.Components of SCM system includes

a

)

SCM software and

hardware

b

) Business processes

c) Users

d

) All the above21.Which aspects include in supply chain planning

a

) Demand forecasting

b

) Inventory simulation

c) Manufacturing planning

d

) All the above22.Supply chain execution is the process of putting supply chain planning in to

…………….

a

) Action

b

) Operation

c) Maintenance

d

) control23.The cost of participating in a public exchange is significantly …………….. than

implementing out own SCM systems

a

) Higher

b

) Lower

c) Medium

d

) Non 24.Which of the following are not a drawback of public B2B exchanges

a

) Lack of customization

b

) Limited supper participants

c) Customers satisfaction

d

) Non

Module II

25.Essential elements needed to develop successful business model in any field

are…………………….

a

) Value proposition

b

) Revenue model

c) Competitive advantage

d

) All the above

4

Page 5: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

26.A model describes how the firm will earn revenue, make profit and produce a

better return on invested capital is

a

) Revenue model b) Competitive advantage c) value proposition d) Markets strategy

27. ……………… e commerce is conducted between two separate business and

has been in effect for many years

a)B2

B

b

) C2C

c)P2P

d

) B2C28.Which of the following are not the major business models utilized in the B2B are

a

) E DISTRIBUTOR b) E-Procurement c) B2B hubs d) None of these

29.The sale of products (or) service from a business to general public is …………..

a

) B2C

b

) B2B

c) B2G

d

) B2E30.20north .com, flipkart.com. are an example for

a

) B2B

b

) B2E

c) B2G

d

) B2C31.Which are not the benefits of B2c E commerce

a

) LOWER marketing cost

b

) Lower order processing cost

c) Better customer service

d

) Narrow market32.………….. were considered as the “gateways” to the internet

a

) Portal

b

) E tailer

5

Page 6: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

c) Content provider

d

) Narrow market33.Service providers offer service ………………..

a)offline

b

) Direct c)indirec

t

d

) online34.An online auction is an example of

a

) B2B

b

) C2C

c) B2C

d

) None of these

35.……….. refers to supply of goods and services for online govt. procurement

a

) C2c

b

) B2g

c) B2E

d

) B2B36.…………… is sometimes called ‘ intra business ecommerce

a

) B2E

b

) B2G

c) B2B

d

) C2C37.Which commerce model permits mobile access:

a

) E COMMERCE

b

) Mobile commerce

c) Traditional commerce

d

) None 38.Which among these is a cheap alternative method to traditional printed

catalogues

a

) Paper catalogue

b

) Floppy

c) CD–ROM S

d

) none

6

Page 7: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

39.Arrange the steps to Ecommerce 1) Security 2) Process payment 3) Service &

support 4) Generating demand 5) ordering & fulfillment

a)4,5,2,3

b

) 5,3,1,2,4c)1,2,3,4,

5

d

) 3,2,5,1,440.Which of following is the reasons for the failure of E-commerce

a

) Poor management

b

) High cost

c) Poor planning

d

) All the above41.The word internet was coined from the word

a

)

Interconnection and

network

b

)

Intra connection and net

transfer

c) Interlink and network

d

) Inter activity net work 42.The most commonly used protocols are

a

) FTP

b

) TCP/IP

c) HTTP

d

) All the above43.…………… is an internet standard (or) set of rules that allows the exchange of

information on the www

a

) HTTP

b

) FTP

c) TCP/IP

d

) Telnet44.This is a protocol which allows file to be transferred from one computer to

another computer

a

) TCP/IP

b

) FTP

c) HTTP

d

) none45.B2C sells

a Products or service directly to b Products or services directly to

7

Page 8: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

) consumers ) companies

c)Products or services directly to govt

d)

Non e

46.B2B E commerce has been conducted between

a

) Business to customer

b

) Business to bank

c) Business to business

d

) None 47.Which of the following is C2C ecommerce

a

) Financial service

b

) Product distribution

c) Online auction

d

) None48.Business to consumer involves customers gathering information, purchasing and

receiving products through.

a

) Catalogue

b

) Store

c) Electronic network

d

) None 49.A web page is created using

a

) HTML

b

) Web browsing

c) Documents

d

) None 50.Internet browsing also called

a

) Net surfing

b

) Net hunting

c) Net chatting

d

) none51.VOIP services convert our voice into ……………. Signal

a

) Electronic

b

) Wireless

c) Digital

d

) none52.ATA stands for

a Analog telegraphic adaptor b Analog telephone adaptor

8

Page 9: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

) )

c) Analog tele system

d

) Adaptor telephone analog

53.Which of the following are important among HTTP

a

) HTTP is stateless

b

) HTTP is media independent

c) HTTP is connection less

d

) All the above 54.GET method, HEAD method , the post methods are the methods of

a

) HTTP methods

b

) HPTP method

c) Current standard

d

) None 55.…………………… is a new architecture if or the development of loosely coupled

distributed application

a

) S0A

b

) WSDL

c) SOAP

d

) UDDI56.VOIP began to be used regularly for long distance voice communication in

a

) 2005

b

) 2002

c) 2001

d

) 200357.The internets open TCP/IP design was origin ally inspired by use for radio

communication network in the

a

) 1960’s

b

) 1980’s

c) 1970’s

d

) 2000’s58. This type of network does not allow an external user to access the company

data

a

) Interanet

b

) Internet

9

Page 10: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

c) Extranet

d

) None 59.The IP was originally designed for

a

) Data net working

b

) Data processing

c) Data Execution

d

) none

Module III

MCQ

60.The structure of a web page is called it’s

a

) Web design

b

) Web layout

c) Architecture

d

) None 61.……………… is a representation language used to create hypertext documents

containing text list boxes and graphic

a

) HTML

b

) HTTP

c) JAVA

d

) none62.……………… is a client server based internet standards or set of rules

a

) HTML

b

) HTTP

c) HPTP

d

) None63.Which are the important concepts in the development of web site

a

) Information Presentation b) Good navigation & usabilityc) Feed back d) All the above

64.Which are not the types of web pages

a

) Summary page

b

) Content page c) Support page d Help me page

10

Page 11: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

)65.Web pages are prepared using this language

a

) HTML

b

) HTTP

c) NTTP

d

) None 66.A web page is transferred to users of computer through

a

) HTML

b

) NTTP

c) HTTP

d

) None 67.The user reaches this page when they specify the address of a web site.

a

) Home page

b

) Web page

c) Summary page

d

) None68.The purpose of this page is to provide links to other pages

a

) Home page

b

) Web page

c) Summary page

d

) None 69.These are online magazines generally covering topic of interest

a

) Banner Adv’s

b

) Search engineers

c) E-Zines

d

) None

70.This is an internet based interactive search device that enables a user to search

for information on the internet.

a

) Portal

b

) BROWSER

c) SEARCH ENGINE

d

) NONE 71.Google is one of the most popular

11

Page 12: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

a

) Portal

b

) Search engine

c) Browser

d

) None 72.This is a website that provide a gateway to other resources on the internet

a

) Portal

b

) Browser

c) Search engine

d

) None 73.These portals simply provide tools , information articles, research & statistics on

the specific industry

a

) Horizontal

b

) Vertical

c) Enterprise

d

) None 74.These are mega portals dealing in wide range of topics

a

) Horizontal

b

) Vertical

c) Enterprise

d

) Non e75.This is a form of advt. on the web that appears between web pages that the

user requests

a

) Banner advt

b

) Floating advt

c) Interstitials

d

) None 76.This is a service that communicates with clients through a set of standard

protocols and technologies

a

) VOIP

b

) Web services

c) XML

d

) None 77.Interoperable systems are essential to mass adoption of

a

) Mobile commerce

b

) E commerce

12

Page 13: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

c) Traditional commerce

d

) None 78.Important site evaluation criteria are

a

) Key words

b

) Retention rates

c) Conversion rates

d

) All the above79.Which is the creation and development o f communication strategies specifically

for brands to have meaning and context on the web

a

) E branding

b

) Branding

c) Advertising

d

) None 80.This is the classic from of advertising on the net

a

) Floating advt

b

) Banner advt

c) Interstitials

d

) None 81.The advt which float over the page for 5 to 30 sec is

a

) Banner advt

b

) Interstitials

c) Floating advt

d

) None 82.The new advertising medium is

a

) Newspaper

b

) Radio

c) Magazines

d

) internet83.This type of portal is application oriented

a

) Application centric portals

b

) B2B portals

c) Horizontal portals

d

) None 84.An enterprise portal is also called as

a Vertical portal s b Corporate portal

13

Page 14: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

) )

c) B2B portals

d

) None 85.Meta crawler is also an example for

a

) Mega search engine

b

) Meta-search engine

c) Search engine

d

) None 86.Which is a web- roaming program used to find documents pertaining to your

search

a

) Spider

b

) Meta search engine

c) Metatags

d

) Indexers 87.PPC engines is called

a

) Per –pay click

b

) Pay- per click

c) Pay - pay click

d

) none

88.Key factors that distinguish mobile marketing form other more traditional informs

of marketing is

a

) Two way

b

) Permission – based

c) Targeted

d

) All the above89.Business to consumer application of mobile commerce includes

a

) Advertising promotion

b

) An intelligent device

c) A connective device

d

)

A transactional

device 90.TV Viewer can interact with what is happening on screens using their mobile

phone is

a

) Cable TV

b

) Interactive

14

Page 15: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

c) Set off box

d

) none

Module IV

91.The cyber crime related to monitoring data flow between shoppers computer and

e commerce website

a

) Spoofing

b

) Hacking

c) Sniffing

d

) phishing92.Secret key is used in

a

) Public key cryptography

b

) Symmetric cryptography

c) Asymmetric cryptography

d

) none93.This acts like a gate keeper that examines each users identification before

allowing them to enter to the organization internal networks

a

) Antivirus program

b

) Biometrics

c) Fire wall

d

) none94.This type of electronic payment systems is highly useful to those customers who

would like to control over spending

a

) Post paid payment system

b

) Pre paid payment system

c) Spot payment system

d

) none

95.This type of card includes an embedded ICC

a

) Credit card

b

) Debit card

c) E cash

d

) Smart card 96.ATM card is a

15

Page 16: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

a

) Credit card

b

) Debit card

c) E cash

d

) Smart card 97.This is a financial instrument which can be used more than once to borrow

money or products or credit

a

) Credit card

b

) Debit card

c) e- Cash

d

) Non e98.SET Means

a

) Standard electronic technology

b

) Standard electronic transfer

c) Secure electronic transaction

d

) None 99.Which is defined as a financial exchange that takes place on line between

buyers and sellers

a

) E payment

b

) Prepaid payment

c) Post paid payment

d

) Non e100. The participants in an online electronic payment transaction include

a

) The customer

b

) The issuer

c) The merchant

d

) All above 101. Which is used for transferring money from one bank account to another

directly without involving cash

a

) EFT

b

) E-Cash

c) Micropayment

d

) None 102. Which system provides a service that is paid for prior to usage

a

) Post paid payment system

b

) Prepaid payment system

16

Page 17: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

c) Spot cash system

d

) None103. Which is an electronic medium for making payment

a

) Smart card

b

) Debit card

c) e- cash

d

) All of the above

104. All credit cards are

a

) Smart cash

b

) Post paid cards

c) E cash

d

) None105. A popular example of E wallet is

a

) Micro soft wallet

b

) Mega soft wallet

c) Penta soft wallet

d

) None106. Which are made for small payment on the web

a

) Mega payments

b

) Micro payments

c) Spot payment

d

) All the above107. Which are used for signing and endorsing electronic changes

a

) Manual signature

b

) Thump impression

c) Digital signature

d

) Spot signature 108. The two types of credit cards today namely credit cards issued by credit

card companies

a

) Master card , visa b) Smart card credit card c) Debit card, e cash d) None

109. ……………………is a card with a microchip that can be used instead of

cash and coins for every thing.

17

Page 18: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

a

) Electronics cash

b

) Fast cash

c) Electronic purse

d

) None110. Prepaid or real-time tokens are exchanged between

a

) Banker and applicant

b

) Payer and drawer

c) Buyer and seller

d

) None111. …………. Is a digital analogue of various forms of payment backed by a

bank

a

) Electronics cash

b

) Electronic purse

c) Electronic tokens

d

) Non e112. There are two main concerns for using digital coins: anonymity of the

consumer and :-

a

) Prepaid system

b

) Post paid system

c) Electronic tokens

d

) Online verification

113. SSL is the most widely deployed

a

) Security protocol

b

) Data encryption

c) Cryptography

d

) None 114. …………………. Encrypts payment card transaction data and verifies

that both parties in the transaction are genuine.

a

) SSL

b

) SET

c) Secret key

d

) None115. …………………. Is the process of coding and scrambling of messages to

prevent un authorized access to under standing of data being transmitted

18

Page 19: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

a

) Cryptography

b

) Encryption

c) Security key

d

) none116. ………………. Is used to keep transmissions privacy through the use of

data encryption techniques.

a

) Data encryption

b

) Crytography

c) Security key

d

) Non e117. Which refers to the automatic identification (or) identity verification of

living persons using their enduring physical or behavioral characteristics

a

) Biometrics

b

) Cryptography

c) ENCRYPTION

d

) None118. ……………… involves checking to see if the signal is good quality

a

) Transmission

b

) Quality control

c) Decision

d

) none

Module V

119. The process of encrypted data readable once again is called,

a

) Encryption

b

) Decryption

c) Uncryption

d

) None 120. This the process of making information un intelligible to the unauthorized

reader

a

) Encryption

b

) Decryption

c) Uncryption

d

) none

19

Page 20: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

121. The attacker monitors the data between the shoppers computer and the

server

a

) Spoofing

b

) snoofing

c) Sniffing

d

) none122. The private content of transaction, if unprotected can be intercepted

when it go through the route over the internet called.

a) spoofing b) Snoopingc) sniffing d) eavesdropping

123. Gain entry into the user’s system and scan your file system for personal

information is known as

a) spoofing b) Snoopingc) sniffing d) None

124. Creating illegitimate site that appear to published by established

organizations are by this name

a

) Spoofing

b

) Snooping

c) Sniffing

d

) None125. The IT act came into effect on

a

) 17 May 2000

b

) 17th December 2000

c) 17 Oct 2000

d

) 17 June 2000126. UNCITRAL model law on E commerce is

a

) 1996

b

) 1994

c) 1995

d

) 1997127. E commerce consists of commerce activities

a

) Electrically

b

) Technically

c) Electronically

d

) None128. …… provide security and privacy for the use of the web page content

20

Page 21: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

a

) HTTP

b

) HTML

c) FTP

d

) None129. A digital signature performs a similar functions to a

a

) Thump impression

b

) Written Signature

c) Scanning

d

) None130. Digital signature acts as a ……………….. for e commerce

a

) Risk

b

) Virus

c) Security

d

) Boon131. Privacy laws of their host Coventry effect

a

) Domestic companies

b

) Overseas companies

c) Neighboring companies

d

) None132. …………………….is designed to protect a persons personal information

a

) Data integrity

b

) Cyber law

c) Private legislation

d

) None133. There are different types of risks connected with information protection

such as disruption, disaster.

a

) Unauthorized access

b

) Publicity

c) Consumer

d

) None134. ………………… are electronic files that are used to uniquely identify

people and resources over the internet

a

) Digital signature

b

) Digital certificatec) Encryption recourse d None

21

Page 22: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

)135. ……………….. techniques make use of secret codes (or) keys to

encrypt information

a

) Cryptography

b

) Encryption

c) Digital certificate

d

) None136. The organization has to ensure that the …………… are sent to the

customers

a

) Ordered goods

b

) Unordered goods

c) Good quality goods

d

) None137. ………………… can catch the transmissions to obtain customers

sensitive information

a

) Fire wall

b

) Anti virus

c) Hackers

d

) None138. SATAN is an example

a

) Unauthorized disclosures

b

) Unauthorized actions

c) Snooping

d

) Spoofing

139. Customers are concerned about

a

) Privacy and security of information

b

) How things are managed

c) Business practices

d

) None140. Information sent over the internet commonly uses the set of rules called

a) FTP b) TCP/IPc) HTTP d) Gopher

22

Page 23: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

Mod - 1

Mod 2

Mod 3

Mod 4 Mod 5

1 B 25 D

60 C

91 B

119 A

2 C 26 A

61 A

92 B

120 A

3 D 27 A

62 B

93 B

121 C

4 A 2 D 6 D 9 B 1 D

23

Page 24: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

8 3 422

5 B 29 A

64 D

95 D

123 A

6 A 30 D

65 A

96 B

124 A

7 A 31 D

66 C

97 A

125 C

8 D 32 A

67 A

98 C

126 A

9 C 33 D

68 C

99 A

127 C

10 C

34 B

69 C

100 D

128 A

11 B

35 B

70 B

101 A

129 B

12 D

36 A

71 B

102 B

130 C

13 A

37 B

72 A

103 D

131 B

14 C

38 C

73 B

104 B

132 C

15 B

39 A

74 A

105 A

133 A

16 D

40 D

75 C

106 B

134 B

17 A

41 A

76 A

107 C

135 A

18 A

42 D

77 A

108 A

136 A

19

B 43

A 78

D 10

C 13

C

24

Page 25: E-Commerce Management - University of · PDF fileE-Commerce Management - ... E-commerce refers to paperless exchange of business information using a) ... Security 2) Process payment

9 7

20 D

44 B

79 A

110 C

138 C

21 D

45 A

80 B

111 C

139 A

22 A

46 C

81 C

112 D

140 B

23 B

47 C

82 D

113 A

24 C

48 C

83 A

114 B

49 A

84 B

115 B

50 A

85 B

116 B

51 C

86 A

117 A

52 B

87 B

118 B

53 D

88 D

54 A

89 A

55 A

90 B

56 B

57 C

58 A

59 A

25