8/10/2019 III SEM - E-commerce(Bcom)(1)
1/31
ECommerce
BCom
IIISem
MultipleChoice
Questions
1.
Whichofthefollowingdescribesecommerce?
a. Doingbusinesselectronically
b. Doingbusiness
c. Saleofgoods
d. Alloftheabove
Answer:A
2.Whichofthefollowingispartofthefourmaintypesforecommerce?
a.
B2B
b. B2C
c. C2B
d.
Alloftheabove
Answer:D
3.WhichsegmentdoeBay,Amazon.combelong?
a. B2Bs
b. B2Cs
c.
C2Bs
d. C2Cs
Answer:B
4.Whichtypeofecommercefocusesonconsumersdealingwitheachother?
a. B2B
b.
B2C
c. C2B
d. C2C
Answer:D
5.WhichsegmentiseBayanexample?
a.
B2B
b. C2B
c.
C2C
d. Noneoftheabove
Answer:D
6.
Whichtypedealswithauction?
a. B2B
b. B2C
8/10/2019 III SEM - E-commerce(Bcom)(1)
2/31
c. C2B
d. C2C
Answer:D
7.InwhichwebsiteGlobalEasyBuyisfacilitated?
a. Ebay.com
b.
Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8.ThebestproductstosellinB2Cecommerceare:
a. Smallproducts
b. Digitalproducts
c. Specialtyproducts
d. Freshproducts
Answer:B
9.
Whichproducts
are
people
most
likely
to
be
more
uncomfortable
buying
on
the
Internet?
a. Books
b. Furniture
c. Movies
d. Alloftheabove
Answer:B
10.WhichproductsarepeoplemostlikelytobecomfortablebuyingontheInternet?
a. Books
b. PCs
c. CDs
d.
Alloftheabove
Answer:D
11.DigitalproductsarebestsuitedforB2Cecommercebecausethey:
a. Arecommoditylikeproducts
b. Canbemasscustomizedandpersonalized
c.
Canbedeliveredatthetimeofpurchase
d. Alloftheabove
Answer:D
12.Thesolutionforallbusinessneedsis
a. EDI
b.
ERP
c. SCM
d. Noneoftheabove
Answer:B
13.AllofthefollowingaretechniquesB2Cecommercecompaniesusetoattractcustomers,
except:
a. Registeringwithsearchengines
8/10/2019 III SEM - E-commerce(Bcom)(1)
3/31
b. Viralmarketing
c. Onlineads
d. Virtualmarketing
Answer:D
14.Which is afunctionofEcommerce
a.
marketing
b. advertising
c.
warehousing
d. alloftheabove
Answer:D
15.
Which isnot afunctionofEcommerce
a. marketing
b. advertising
c.
warehousing
d. noneoftheabove
Answer:C
16.
Whichtermrepresentsacountofthenumberofpeoplewhovisitonesite,clickonanad,and
aretakentothesiteoftheadvertiser?
a. Affiliateprograms
b. Clickthrough
c. Spam
d.
Alloftheabove
Answer:B
17.WhatisthepercentageofcustomerswhovisitaWebsiteandactuallybuysomethingcalled?
a. Affiliateprograms
b.
Clickthrough
c.
Spam
d. Conversionrate
Answer:D
18.Whatarematerialsusedinproductioninamanufacturingcompanyorareplacedontheshelf
forsaleinaretailenvironment?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:A
19.Whatarematerialsthatarenecessaryforrunningamoderncorporation,butdonotrelateto
thecompany'sprimarybusinessactivities?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
8/10/2019 III SEM - E-commerce(Bcom)(1)
4/31
Answer:B
20.Whatareballpointpenspurchasedbyaclothingcompany?
a. Directmaterials
b. Indirectmaterials
c. EDI
d.
Noneof
the
above
Answer:B
21.Whatisanothernamefor?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
22.Whatistheprocessinwhichabuyerpostsitsinterestinbuyingacertainquantityofitems,and
sellerscompeteforthebusinessbysubmittingsuccessivelylowerbidsuntilthereisonlyone
sellerleft?
a. B2Bmarketplace
b. Intranet
c. Reverseauction
d. Internet
Answer:C
23.Whatareplasticcardsthesizeofacreditcardthatcontainsanembeddedchiponwhichdigital
informationcanbestored?
a. Customerrelationshipmanagementsystemscards
b. Egovernmentidentitycards
c.
FEDIcards
d. Smartcards
Answer:D
24.Mostindividualsarefamiliarwithwhichformofecommerce?
a. B2B
b.
B2C
c. C2B
d. C2C
Answer:B
25.Whichformofecommercecurrentlyaccountsforabout97%ofallecommercerevenues?
a.
B2B
b. B2C
c. C2B
d. C2C
Answer:A
26.
WhichofthefollowingareadvantagesnormallyassociatedwithB2Becommerce?
a. Shortercycletimes
8/10/2019 III SEM - E-commerce(Bcom)(1)
5/31
b. Reductionincosts
c. Reacheswideraudiences
d. alloftheabove
Answer:D
27. Ifthethreatofsubstituteproductsorservicesislowitisa(n):
a.
Disadvantageto
the
supplier
b. Advantagetothebuyer
c. Advantagetothesupplier
d. Noneoftheabove
Answer:C
28.Thethreatofnewentrantsishighwhenitis:
a. Hardforcustomerstoenterthemarket
b. Hardforcompetitorstoenterthemarket
c. Easyforcompetitorstoenterthemarket
d. Easyforcustomerstoenterthemarket
Answer:C
29. Ifitiseasyforcompetitorstoenterthemarket,thethreatofnewentrantsisconsidered:
a. High
b. Low
c. More
d.
Less
Answer:A
30.Anindustryislessattractiveforsupplierswhentherivalryamongexistingcompetitorsis:
a. High
b. Low
c.
More
d. Less
Answer:A
31.Uniquevalueauctionismainlyappliesto?
a. Newproducts
b.
Secondhandproducts
c. Engineeringproducts
d. Noneoftheabove
i. Answer:B
32.Paisapayisfacilitatedin
a.
eBay.co.in
b. amazon.com
c. flipkart.com
d. noneoftheabove
Answer:A
33.Whichofthefollowingisausefulsecuritymechanismwhenconsideringbusinessstrategyand
IT?
8/10/2019 III SEM - E-commerce(Bcom)(1)
6/31
a. encryption
b. decryption
c. firewall
d. alltheabove
Answer:D
34.
Whichof
the
following
is
not
related
to
security
mechanism
a. encryption
b. decryption
c. ecash
d. alltheabove
Answer:C
35.Aproductorservicethatcustomershavecometoexpectfromanindustry,whichmustbe
offeredbynewentrantsiftheywishtocompeteandsurvive,isknownasa(n)?
a. Switchingcosts
b.
Loyaltyprograms
c. Entrybarriers
d. Affiliateprograms
Answer:C
36.Whichofthefollowingstatementsaccuratelyreflecttheimpactoftechnology?
a. Technologyhascausedbuyerpowertoincrease
b. Technologyhaslessenedtheentrybarriersformanyindustries
c. Technologyhasincreasedthethreatofsubstituteproductsandservices
d. alloftheabove
Answer:D
37.
Abusiness
cannot
be
all
things
to
all
people.
Instead,
abusiness
must:
a. Identifytargetcustomers
b. Identifythevalueofproducts/servicesasperceivedbycustomers
c. alloftheabove
d. Noneoftheabove
Answer:C
38.
Howthetransactionsoccurinecommerce?
a. Usingemedias
b. Using computers only
c. Usingmobilephonesonly
d.
Noneoftheabove
Answer:A
39.Whichtypeofproductsislesserpurchasedusingecommerce?
a. automobiles
b. books
c. softwares
d. none
8/10/2019 III SEM - E-commerce(Bcom)(1)
7/31
Answer:A
40.Abusinesscompetinginacommoditylikeenvironmentmustfocusonwhichofthefollowing?
a. Price
b. Ease/speedofdelivery
c. Easeofordering
d.
allof
the
above
Answer:D
41.Whichofthefollowingreferstocreatingproductstailoredtoindividualcustomers?
a. customization
b. aggregation
c. Directmaterials
d. Reverseauction
Answer:A
42.Materialsusedinthenormaloperationofabusinessbutnotrelatedtoprimarybusiness
operationsarecalledwhat?
a.
Supplies
b. Directmaterials
c. Indirectmaterials
d. Dailystuff
Answer:C
43.
Amazon.comiswellknownforwhichecommercemarketingtechnique?
a. Bannerads
b. Popupads
c. Affiliateprograms
d. Viralmarketing
Answer:C
44.Whatisthenamegiventoaninteractivebusinessprovidingacentralizedmarketwheremany
buyersandsupplierscancometogetherforecommerceorcommercerelatedactivities?
a. Directmarketplace
b. B2B
c.
B2C
d. Electronicmarketplace
Answer:D
45.Whichformofemarketplacebringstogetherbuyersandsellersfrommultipleindustries,often
forMROmaterials?
a.
horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
46.
Whichformofemarketplacebringstogetherbuyersandsellersfromthesameindustry?
a. horizontal
8/10/2019 III SEM - E-commerce(Bcom)(1)
8/31
b. Vertical
c. Integrated
d. Inclined
Answer:B
47.Whichtypeofaddappearsonawebpage?
a.
popunder
ad
b. Popupad
c. Bannerad
d. Discountad
Answer:C
48.Whattypeofadappearsontopofawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:B
49.Whattypeofadappearsunderawebpage?
a. popunderad
b. popupad
c. bannerad
d.
discountad
Answer:A
50.Which,ifany,ofthefollowingtypesofadsarepeoplemostwillingtotolerate?
a. popunderad
b. popupad
c.
bannerad
d. noneoftheabove
Answer:D
51.WhichofthefollowingisanInternetbasedcompanythatmakesiteasyforonepersontopay
anotherovertheInternet?
a.
electroniccheck
b. electronicbillpresentmentandpayment
c. conversionrates
d. financialcybermediary
Answer:D
52.
Whichofthefollowingisamethodoftransferringmoneyfromoneperson'saccountto
another?
a. electroniccheck
b. creditcard
c. etransfer
d.
noneoftheabove
Answer:A
8/10/2019 III SEM - E-commerce(Bcom)(1)
9/31
53.Anelectroniccheckisoneformofwhat?
a. ecommerce
b. onlinebanking
c. ecash
d. check
54.
Ifyou
need
to
transfer
money
to
another
person
via
the
internet,
which
of
the
following
methodscouldyouuse?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:D
55.Whichofthefollowingpermitsthetransmissionofabill,alongwithpaymentofthatbill,tobe
conductedovertheInternet?
a. financialcybermediary
b.
electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:C
56.Acombinationofsoftwareandinformationdesignedtoprovidesecurityandinformationfor
paymentiscalledawhat?
a. digitalwallet
b. popupad
c. shoppingcart
d. encryption
Answer:A
57.Whatisthenamefordirectcomputertocomputertransferoftransactioninformation
containedinstandardbusinessdocuments?
a. internetcommerce
b. ecommerce
c.
transactioninformationtransfer
d. electronicdatainterchange
Answer:D
58.WhichofthefollowingisusedinB2Btopayforpurchases?
a. ecommerce
b.
financialelectronicdatainterchange
c. electronicdataexchange
d. electronicchecks
Answer:B
59.Publickeyencryptionusesmultiplekeys. Onekeyisusedtoencryptdata,whileanotherisused
todecryptdata. Thekeyusedtoencryptdataiscalledthe_____key,whilethekeyusedto
decryptdataiscalledthe_____key.
8/10/2019 III SEM - E-commerce(Bcom)(1)
10/31
a. encryption,decryption
b. private,public
c. encryption,public
d. public,private
Answer:D
60.
SecureSockets
Layers
does
which
of
the
following?
a. createsasecure,privateconnectiontoawebserver
b. encryptsinformation
c. sendsinformationovertheinternet
d. alloftheabove
Answer:D
61.Whenatransactionisprocessedonline,howcanthemerchantverifythecustomer'sidentity?
a. usesecuresocketslayers
b. usesecureelectronictransactions
c. useelectronicdatainterchange
d.
usefinancial
electronic
data
interchange
Answer:B
62.Thepracticeofforgingareturnaddressonanemailsothattherecipientisfooledinto
revealingprivateinformationistermed?
a. hacking
b.
cracking
c. dumpsterdiving
d. spoofing
Answer:D
63.Whatisamodelofaproposedproduct,service,orsystem?
a.
Prototyping
b. Prototype
c. Proofofconceptprototype
d. Sellingprototype
Answer:B
64.
WhatisaninternalorganizationalInternetthatisguardedagainstoutsideaccessbyaspecial
securityfeaturecalledafirewall(whichcanbesoftware,hardware,oracombinationofthe
two)?
a. Client/servernetwork
b. Intranet
c.
Extranet
d. Thinclient
Answer:B
65.Whatisanintranetthatisrestrictedtoanorganizationandcertainoutsiders,suchascustomers
andsuppliers?
a.
Client/servernetwork
b. Intranet
8/10/2019 III SEM - E-commerce(Bcom)(1)
11/31
c. Extranet
d. Thinclient
Answer:C
66.WhatisadetailedprocessforrecoveringinformationoranITsystemintheeventofa
catastrophicdisastersuchasafireorflood?
a.
Disasterrecovery
plan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:A
67.Whatisaseparatefacilitythatdoesnothaveanycomputerequipmentbutisaplacewherethe
knowledgeworkerscanmoveafterthedisaster?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d.
Disasterrecovery
cost
curve
Answer:C
68.Whatisaseparateandfullyequippedfacilitywherethecompanycanmoveimmediatelyafter
thedisasterandresumebusiness?
a. Disasterrecoveryplan
b.
Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:B
69.Whatcharts(1)thecosttoyourorganizationoftheunavailabilityofinformationandtechnology
and(2)thecosttoyourorganizationofrecoveringfromadisasterovertime?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:D
70.WhichfactordetermineswhenyourITsystemwillbeavailableforknowledgeworkersto
access?
a. Availability
b. Accessibility
c.
Reliability
d. Noneoftheabove
Answer:A
71.WhichfactordetermineswhohastherighttoaccessdifferenttypesofITsystemsand
information?
8/10/2019 III SEM - E-commerce(Bcom)(1)
12/31
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:B
72.WhichfactorensuresyourITsystemsarefunctioningcorrectlyandprovidingaccurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:C
73.
Whichfactor
represents
how
well
your
system
can
adapt
to
increased
demands?
a. Availability
b. Accessibility
c.
Reliability
d. Scalability
Answer:D
74.
Whichfactorrepresentsasystem'sabilitytochangequickly?
a. Flexibility
b. Performance
c.
Capacityplanning
d.
Benchmark
Answer:A
75.Whatisasetofconditionsusedtomeasurehowwellaproductorsystemfunctions?
a. Flexibility
b. Performance
c.
Capacityplanning
d. Benchmark
Answer:D
76.WhatdeterminesthefutureITinfrastructurerequirementsfornewequipmentandadditional
networkcapacity?
a.
Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:C
77.
Whatautomatesbusinessprocesses?
8/10/2019 III SEM - E-commerce(Bcom)(1)
13/31
a. Workflow
b. ASP
c. Workflowsystem
d. EIP
Answer:C
78.
Whatdefines
all
of
the
steps
or
business
rules,
from
beginning
to
end,
required
for
aprocess
to
runcorrectly?
a. Workflow
b. EIP
c. Workflowsystem
d. SLA
Answer:A
79.Whatsendsworkassignmentsthroughanemailsystem?
a. Databasebasedenterpriseinformationportal
b. Messagingbasedenterpriseinformationportal
c.
Databasebased
workflow
system
d. Messagingbasedworkflowsystem
Answer:D
80.Whichwillnot harm computerresources
a. firewall
b.
Virus
c. Trojanhorse
d. Noneoftheabove
Answer:A
81.WhichisnotafunctionofERP?
a.
Warehousing
b. sales
c. scheduling
d. Noneoftheabove
Answer:D
82.
WhichisafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. alloftheabove
Answer:D
83.Whichofthefollowingistheprimarycharacteristicofanintranet?
a. Peopleoutsidetheorganizationcanaccessit
b. Peopleinsidetheorganizationcan'taccessit
c. Peopleoutsidetheorganizationcan'taccessit
d.
Noneoftheabove
Answer:C
8/10/2019 III SEM - E-commerce(Bcom)(1)
14/31
84.Whichconceptsuggeststhatdifferentapplicationsandcomputersystemsshouldbeableto
communicatewithoneanother?
a. Integration
b. Webservices
c. Scalability
d.
Interoperability
Answer:D
85.Whichserviceencompassesalltechnologiesusedtotransmitandprocessinformationonan
acrossanetwork?
a. Interoperability
b. Scalability
c. Benchmarking
d. Webservices
Answer:D
86.Whichprocesscanprevent datafromloseduetocomputerproblemsorhumanerrors?
a.
backup
b. recovery
c. benchmarking
d. datacleansing
Answer:A
87.
Whichprocessisusedtoreinstalldatafromacopywhentheoriginaldatahasbeenlost?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:B
88.Whatdescribesaprocessofcontinuouslymeasuringresultsandcomparingthoseresultsto
optimalperformancesothatactualperformancemaybeimproved?
a. Performance
b. Capacityplanning
c.
Benchmarking
d. Datacleansing
Answer:C
89.Whoprotectssystemfromexternalthreats?
a. firewall
b.
EDI
c. ERP
d. Scriptkiddies
Answer:A
90.Whobreaksintootherpeople'scomputersystemsandstealsanddestroysinformation?
a.
Hackers
b. softwares
8/10/2019 III SEM - E-commerce(Bcom)(1)
15/31
c. Hacktivists
d. Scriptkiddies
Answer:a
91.Whatissoftwarethatcomeshiddeninfreedownloadablesoftwareandtracksyouronline
movements,minestheinformationstoredonyourcomputer,orusesyourcomputer'sCPUand
storagefor
some
task
you
know
nothing
about?
a. Weblog
b. Clickstream
c. AnonymousWebbrowsingservice
d. Noneoftheabove
Answer:D
92.ERPstandsfor
a. Enterpriseresolutionplanning
b. Enterprisereverseplanning
c. Enterpriseresourceplanning
d.
Noneof
the
above
Answer:C
93.WhichisnotacomponentofERP?
a. Legacysystems
b. Boltonapplications
c.
Operationaldatabase
d. Cybersoft
Answer:D
94.WhichisnotafunctionofERP?
a. Humanresourcemanagement
b.
financial
c. warehousing
d. Noneoftheabove
Answer:D
95.Whatisatypeofvirusthatspreadsitself,notjustfromfiletofile,butfromcomputerto
computerviaemailandotherInternettraffic?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:B
96.WhatfloodsaWebsitewithsomanyrequestsforservicethatitslowsdownorcrashes?
a. Computervirus
b. Worm
c. Denialofserviceattack
d.
Noneoftheabove
Answer:C
8/10/2019 III SEM - E-commerce(Bcom)(1)
16/31
97.WhatharnessesfarflungcomputerstogetherbywayoftheInternetoravirtualprivatenetwork
toshareCPUpower,databases,anddatabasestorage?
a. Computervirus
b. Worm
c. Denialofserviceattack
d.
Noneof
the
above
Answer:D
98.Whatconsistsoftheidentificationofrisksorthreats,theimplementationofsecuritymeasures,
andthemonitoringofthosemeasuresforeffectiveness?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:A
99.WhatistheprocessofevaluatingITassets,theirimportancetotheorganization,andtheir
susceptibilityto
threats,
to
measure
the
risk
exposure
of
these
assets?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:B
100. Whatistheprocessofmakingacopyoftheinformationstoredonacomputer?
a. Backup
b. Antivirus
c. Firewall
d.
Biometrics
Answer:A
101. Whatsoftwaredetectsandremovesorquarantinescomputerviruses?
a. Backup
b. Antivirus
c.
Firewall
d. Biometrics
Answer:B
102. Whatishardwareand/orsoftwarethatprotectscomputersfromintruders?
a. Backup
b.
Antivirus
c. Firewall
d. Biometrics
Answer:C
103. Whatistheuseofphysicalcharacteristicssuchasyourfingerprint,thebloodvessels
intheretinaofyoureye,thesoundofyourvoice,orperhapsevenyourbreathtoprovide
identification?
8/10/2019 III SEM - E-commerce(Bcom)(1)
17/31
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:D
104.
Allof
the
following
are
considered
biometrics,
except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105. Whatscramblesthecontentsofafilesoyoucan'treaditwithouthavingtheright
decryptionkey?
a. Encryption
b. Intrusiondetectionsoftware
c.
Securityauditing
software
d. Alloftheabove
Answer:A
106. Whatisanencryptionsystemthatusestwokeys:apublickeythateveryonecanhave
andaprivatekeyforonlytherecipient?
a.
Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:B
107.
Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting
suspiciously?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d.
Securityauditingsoftware
Answer:C
108. Whatchecksoutyourcomputerornetworkforpotentialweaknesses?
a. Encryption
b. Publickeyencryption
c.
Securityauditingsoftware
d. Noneoftheabove
Answer:C
109. Whichofthefollowingtovirusesharm?
a. Yourkeyboard
b.
Yourmonitor
c. Yourprocessor
8/10/2019 III SEM - E-commerce(Bcom)(1)
18/31
d. Virusesdonotharmanyoftheabove
Answer:D
110. Whichofthefollowingcanavirusdo?
a. Hurtyourhardware
b. Hurtanyfilestheyweren'tdesignedtoattack
c.
Infectfiles
on
write
protected
disks
d. Noneoftheabove
Answer:D
111. Insimpleterms,whatdoesriskassessmentask?
a. Whatcangowrong?
b. Howlikelyisittogowrong?
c. Whatarethepossibleconsequencesifitdoesgowrong?
d. Alloftheabove
Answer:D
112. Whichofthefollowingisacharacteristicofafirewall?
a.
Examineseach
message
as
it
seeks
entrance
to
the
network
b. Blocksmessageswithoutthecorrectmarkingsfromenteringthenetwork
c. DetectscomputerscommunicatingwiththeInternetwithoutapproval
d. Alloftheabove
Answer:D
113.
Whichofthefollowingarewaystoproveaccessrights?
a. Whatyouknow,likeapassword
b. Whatyouhave,likeanATMcard
c. Whatyoulooklike
d. Alloftheabove
Answer:D
114. Whichitemcanapasswordbeusedtoprotect?
a. Network
b. File
c. Folder
d.
Alloftheabove
Answer:D
115. WhichisthemostimportantcomponentofIT?
a. Information
b. People
c.
Informationtechnology
d. Computers
Answer:B
116. Whichofthefollowingappliestotheimplementationofanidea?
a. Copyright
b.
Intellectualproperty
c. Patent
8/10/2019 III SEM - E-commerce(Bcom)(1)
19/31
d. Denialofserviceattack
Answer:C
117. Whenyoupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?
a. ThecostoftheCDs,manuals,anddevelopmentofthesoftware
b. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopment
c.
Ashare
of
the
cost
of
software
development
d. Alloftheabove
Answer:D
118. Whichofthefollowingisnotadimensionofprivacy?
a. Needforpersonalspace
b. Needtofeelincontrolofourpossessions
c. Needtofeelincontrolofourpersonalinformation
d. Alloftheabovearedimensionsofprivacy
Answer:D
119. Whichofthefollowingcapturesscreenimages?
a.
Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencapturesoftware
Answer:D
120.
Whichofthefollowingexaminesinformationpassingthroughswitches,hubs,or
routers?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d.
Screencaptures
Answer:B
121. Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packetsniffer
c.
Loganalysistools
d. Screencaptures
Answer:C
122. Emailmessagesmaybestoredonwhichofthefollowingcomputers?
a. Sender'scomputer
b.
Sender'sserver
c. Recipient'sserver
d. Alloftheabove
Answer:D
123. Whatmightidentitythievesdowithyouridentity?
a.
Applyforandusecreditcards
b. Applyforaloan
8/10/2019 III SEM - E-commerce(Bcom)(1)
20/31
c. Changetheiridentity
d. Alloftheabove
Answer:D
124. Whichofthefollowingisnotacommonapproachtophishing?
a. Sendanofficiallookingemailaskingforconfidentialinformation
b.
Askpeople
to
fill
out
and
return
afake
letter
using
postal
c. Askpeopletoclickalinkinanemailtoopenasubmissionformonawebpage
d. Alloftheaboveareuncommonapproachestophishing
Answer:B
125. Atechniqueusedtogainpersonalinformationforthepurposeofidentitytheft,oftenby
email,iscalled?
a. Phishing
b. Carding
c. Brandspoofing
d. Alloftheabove
Answer:D
126. Companiescangatherinformationaboutemployeesandpotentialemployeesfrom
whichofthefollowingplaces?
a. Jobapplications
b. Creditreports
c.
CompaniesthattrackWebsurfers
d. Alloftheabove
Answer:D
127.
Cyber
slacking
consists
of
what
activities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d.
Alloftheabove
Answer:D
128. Cookiesareusedtodowhichofthefollowing?
a. StoreyourIDandpasswordforsubsequentlogonstothesite
b. Storecontentsofelectronicshoppingcarts
c.
Totrackwebactivity
d.
Allof
the
above
and
more
Answer:D
129. Unsolicitedemailiscalledwhat?
a. Junkmail
b.
Spam
c. Extramail
d. Noneoftheabove
8/10/2019 III SEM - E-commerce(Bcom)(1)
21/31
Answer:B
130. WhatisthenameofthenewantiSpambill?
a. NoSpam
b. CANSpam
c. SpamAway
d.
StopSpam
Answer:B
131. Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
132. Whatistheunauthorizeduse,duplication,distributionorsaleofcopyrightedsoftware?
a. FairUseDoctrine
b. Piratedsoftware
c. Counterfeitsoftware
d.
Privacy
Answer:B
133. Whatisaprogram,wheninstalledonacomputer,recordseverykeystrokeandmouse
click?
a.
Keyloggersoftware
b.
Hardware
key
logger
c. Cookie
d. Adware
Answer:A
134.
Whatissoftwareyoudon'twanthiddeninsidesoftwareyoudowant?
a.
Adware
b. Trojanhorsesoftware
c. Spyware
d. Alloftheabove
Answer:D
135.
Whatis
an
electronic
representation
of
cash?
a. Digitalcash
b. Electroniccash
c. Ecash
d.
Alloftheabove
Answer:D
136. Whatisafullyequippedcomputerthatyouwearasapieceofclothingorattachedtoa
8/10/2019 III SEM - E-commerce(Bcom)(1)
22/31
pieceofclothingsimilartothewayyouwouldcarryyourcellphoneonyourbelt?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:A
137. Whatisatechnologyenabledmicrochipimplantedintothehumanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:C
138. Whichofthefollowingisnotareasonwhydigitalcashhasturnedouttobeextremely
difficult?
a.
Ifyour
system
crashes
you
lose
your
money
b. Thereisonlyonestandard
c.
Digitalcashmakesmoneylaunderingeasy
d. DigitalcashtravelsacrossthevastInternetandissusceptibletobeginstolen
Answer:B
139. Smartcardisbetterprotectedthanothercardsusing
a. Encryption
b.
Firewall
c. Hub
d. Alltheabove
Answer:A
140. Trustcardisintroducedby
a.
BSNLanditzcash
b. BSNLandoxicash
c. BSNLonly
d. None
Answer:A
141.
PaisaPayisofferedonlyby
a. Homeshop18.com
b. eBay.in
c.
amazon.com
d.
none
Answer:B
142. TheEpaymentmechanismwidelyusedinB2Bis
a. Creditcard
b. Debitcard
c.
Mastercard
8/10/2019 III SEM - E-commerce(Bcom)(1)
23/31
d. Echeque
Answer:D
143. Whichtypeoftechnologywillincreaseportabilityandmobility?
a. Implantchips
b. Micropayments
c.
Internetphone
calls
d. Alloftheabove
Answer:D
144. Whichofthefollowinganaccuratestatementaboutinternetphonecalls?
a. Theyarepossiblebutnotyetfree
b. Theyarenotpossible
c. Theyarecurrentlystandardpractice
d. Noneoftheaboveisanaccuratestatementaboutinternetphonecalls
Answer:A
145. Whatarethemostcommonlyusedinputdevicestoday?
a.
Keyboard
b. Mouse
c. Alloftheabove
d. Noneoftheabove
Answer:C
146.
Whichofthefollowingcanbeusedtohelpidentifypeopleinacrowd?
a. Biochip
b. Implantchip
c. Facialrecognitionsoftware
d. Visionchip
Answer:C
147. Whichoneisalsoknownasplasticmoney?
a. Creditcard
b. Debitcard
c. Papercash
d.
Alloftheabove
Answer:A
148. Echequesare
a.Prepaid
b.Postpaid
c.
Bothprepaidandpostpaid
Answer:A
149. Digitalsignatureisa
a. Digitalid,sendasanattachmenttoawebpage/email/message
b. Isusedforverifyingtheattachmentssendusingweb
c.
Bothaandb
d. Noneofthese
8/10/2019 III SEM - E-commerce(Bcom)(1)
24/31
Answer:C
150.
Whichoneisthecomponentofcybercashpaymentsystem
a. CCusersoftware
b. CCmerachantsoftware
c.
CCServer
Software
d. Alloftheabove
Answer:D
151. Thepresence ofmakethesmartcardsmart.
a. Memory
b. Microchip
c. Ecash
d.
Noneoftheabove
Answer:B
152. Thesmartcardwhichuseantennaforreadingandwritingdata
a)
Contactsmart
card
b) Contactlesssmartcard
c)
Proximitysmartcard
d) BothBandC
Answer:D
153. cardisreadonly.
a) Contactsmartcard
b) Contactlesssmartcard
c)
Proximitysmartcard
d)
BothB
and
C
Answer:C
154. Whichofthesmartcardusesasimlikestructureforreadingandwritingdata
a)
Contactsmartcard
b)
Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
Answer:A
155.
Which
is
not
a
feature
of
ecommerce
a. SCM
b. EDI
c.
WWW
d. BPR
Answer:D
156. WhatisIstandsinCIAofsmartcard?
8/10/2019 III SEM - E-commerce(Bcom)(1)
25/31
a. International
b. Integrity
c. Identity
d. Noneoftheabove
Answer:B
157. WhatisAstandsinCIAofsmartcard?
a. auditing
b. authenticity
c. authorized
d. Noneoftheabove
Answer:B
158. WhatisCstandsinCIAofsmartcard?
a. confidentiality
b. conference
c.
congress
d. Noneoftheabove
Answer:A
159. WhichoneisthethirdpartypaymentproviderswhoofferdigitalwalletsforE
merchants
a.
Oxicash
b. PayMate
c. PayPass
d. Alltheabove
Answer:D
160.
Whichisusedtoidentifymobilemoney
a. MCID
b. MMID
c. RSID
d. NONEOFTHEABOVE
Answer:B
161. isanactthatposesdangertocomputerassets.
a. Threat
b. Danger
c. Error
d.
Noneoftheabove
Answer:A
162. Whichoneisnotaencryptiontechnique
a. RSA
b. DES
c.
AES
d. NONEOFTHEABOVE
8/10/2019 III SEM - E-commerce(Bcom)(1)
26/31
Answer:D
163. Whichoneisnotusedasasecuritymechanism?
a. Encryption
b. Cryptography
c. Wallets
d. Digitalsignature
Answer:C
164. Whichegovernmentarenaisbeingusedwhengovernmentalagenciessendoutand
acceptbidsforwork?
a)G2G
b)G2B
c)G2C
d)
G2G
Answer:B
165.
Secretkeyisusedfor
a. Publickeycryptography
b. Privatekeycryptography
c. Asymmetrickeycryptography
d. Noneofthese
Answer:B
166. Whichoneis acommunicationchannelthreat?
a.
Snifferprograms
b. Cybervandalism
c.
Integritythreats
d.
Alloftheabove
Answer:D
167. Whichoneis acommunicationchannelsecurityprotocol?
a. SSL
b.
SHTTP
c.
SET
d. ALLOFTHEABOVE
Answer:D
168. Theprotocolwhichallowsthefiletransferbetweencomputersis
a. TCP/IP
b. FTP
c. HTTP
d. SOA
Answer:B
8/10/2019 III SEM - E-commerce(Bcom)(1)
27/31
169. EBankingisalsoknownas
a. ATMs
b. Netbanking
c. Traditionalbanking
d. Noneofthese
Answer:B
170. isbackboneofallEpaymentsinEcommerce
a. EFT
b. EPS
c. PayPal
d. Noneofthese
Answer:B
171. Whichoneisaclientlevelthreat?
a. Maliciouscode
b. Viruses
c.
Activecontents
d. Alltheabove
Answer:D
172. Whichoneisnotanencryptiontechnique?
a. RSA
b.
DES
c. AES
d. FTP
Answer:D
173. Whichoneis anencryptiontechnique?
a.
RSA
b. DES
c. AES
d. Alloftheabove
Answer:D
174.
Whichoneisnotaserverlevelthreat?
a. Maliciouscode
b. CGIthreats
c. Databasethreats
d. Bufferoverflows
Answer:A
175. Whichoneisnotaphysicalthreat?
a. Hacking
b. Storm
c. Phishing
d.
Noneoftheabove
Answer:A
8/10/2019 III SEM - E-commerce(Bcom)(1)
28/31
176. Whichoneisaphysicalthreat?
a. Phishing
b. Storm
c. Earthquake
d. Alltheabove
Answer:D
177. Whichoneisalogicalthreat?
a. Hacking
b. Storm
c. Phishing
d. Noneoftheabove
Answer:A
178. Thebasicelementsofwebsiteis
a. Homepage
b. Webpages
c.
Linksand
banners
d. Alltheabove
Answer:D
179. Whichoneis athreatforEcommerce
a. Trojanhorse
b.
firewall
c. encryption
d. None
Answer:A
180. Securecommunicationmeans
a.
Protecttransmissionofcreditcardnumber
b. Guaranteeprivacyofcustomer
c. Unauthorizedaccessofpaymentdetails
d. Alltheabove
Answer:D
181.
Whichoneisnotanofflinepaymentmode?
a. Cashondelivery
b. Cashbeforedelivery
c. Demanddrafts
d. echeque
Answer:D
182. Whichoneis anofflinepaymentmode?
a. Cashondelivery
b. Cashbeforedelivery
c. Creditcard
d.
Bothaandb
Answer:D
8/10/2019 III SEM - E-commerce(Bcom)(1)
29/31
183. Whichoneisnotanonlinepaymentmode?
a. Cashondelivery
b. Debitcard
c. Creditcard
d. echeque
Answer:A
184. Whichoneis anonlinepaymentmode?
a. Cashondelivery
b. Cashbeforedelivery
c. Demanddrafts
d. echeque
Answer:D
185. whichoneisnotanEpaymentmethodusedinIndia
a. Debitcard
b. Creditcard
c.
echeque
d. none
Answer:D
186. OTPstandsfor
a. OnTimePassword
b.
OnTimeprocessing
c. Onetimeprocessor
d. None
Answer:A
187. WhichoneisnotathreatforEcommerce
a.
Trojanhorse
b. Viruses
c. Worm
d. None
Answer:D
188.
PrivateKeycryptographyisalsoknownascryptography.
a. Publickey
b. Symmetric
c. Asymmetric
d. None
Answer:B
189. Publickeycryptographyisalsoknownascryptography.
a. Privatekey
b. Symmetric
c. Asymmetric
d.
None
Answer:C
8/10/2019 III SEM - E-commerce(Bcom)(1)
30/31
190. Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d.
FairUse
Doctrine
Answer:C
191. Cyberslackingconsistsofwhatactivities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d. Alloftheabove
Answer:D
192. Whatisanarrangementmadebetweenecommercesitesthatdirectusersfromone
sitetotheother?
a.
Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193.
Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
194. Whichoneisnot alayerofEcommerceinfrastructure
a. Physicallayer
b. Productlayer
c. Servicelayer
d.
None
Answer:D
195.
Whichwillharm computerresources
a.
Worm
b. Virus
c. Trojanhorse
d. Alltheabove
Answer:D
196. Thestudyofencryptioniscalled
8/10/2019 III SEM - E-commerce(Bcom)(1)
31/31
a. Decryption
b. Cryptography
c. Firewall
d. Alltheabove
Answer:B
197.
DuringEcommerce
transaction
we
should
ensure
a. Integrity
b. Security
c. Confidentiality
d. Alltheabove
Answer:D
198. Thevirusthatarecommonlyfoundinworddocumentsarecalled
a. Macro
b. Trojanhorse
c. Scriptvirus
d.
Noneof
the
above
Answer:A
199. Thevirusthatareattachedwithvbandjavafilesarecalled
a.
Macro
b. Trojanhorse
c. Scriptvirus
d. Noneoftheabove
Answer:C
200. Thevirusesspreadsthrough
a. Mails
b.
Pendrivesandcds
c. Websites
d. Alltheabove
Answer:D