Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Tybcom Sem-Vi Computer Systems & Applications Sample Questions AY: 2019-20

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

TYBCOM SEM-VI

COMPUTER SYSTEMS & APPLICATIONS


SAMPLE QUESTIONS
AY: 2019-20
1. Buying and selling products on the internet is called as _______________.
a) E-market
b) E-commerce
c) E-Business
d) EDI

2. A computer to computer exchange of business transactions is called.


a) EDI
b) E-commerce
c) E-Business
d) E-Market

3. EDI stands for ________________


(a) Electronic Data Internet
(b) Electronic Data Interface
(c) Electronic Data Interchange
(d) Electronic data Intake

4. _________is a feature of E-commerce.


(a) Ubiquity
(b) Whatsapp
(c) Facebook
(d) Instagram

5. In E-commerce______ refers to availability of e-commerce.


(a) Ubiquity
(b) Universal Standards
(c) Richness
(d) Fisher

6. ___________refers to business selling goods to other business.


(a) B2B
(b) B2C
(c) C2C
(d) P2P

7. Which segment of E-commerce focuses consumers dealing with each other? ________.
(a) B2B
(b) C2B
(c) C2C
(d) B2C

8. ____________earn their revenue from advertisements and referrals.


(a) Portals
(b) Content Providers
(c) E-Trailer
(d) EDI

9. ______________make money each time a transaction occurs.


(a) Transaction Brokers
(b) Portals
(c) Content Providers
(d) Credit card

10. The revenue model in E-commerce where companies earn revenue by publicizing
products/services is called as ____________.
(a) Sales Revenue
(b) Transaction Fee Revenue
(c) Advertising Revenue
(d) Affiliate Revenue

11. The model in E-commerce where companies earn revenue by referring users to other
websites providing products/services is called as _____________.
(a) Sales Revenue
(b) Transaction Fee Revenue
(c) Advertising Revenue
(d) Affiliate Revenue

12. In revenue model, revenue is generated from _____ of goods, information or services.
(a) Sales
(b) Transaction Fee
(c) Advertising
(d) Affiliate

13. Money received by selling goods or services to customers is _____

a) Sales Revenue
b) Transaction Fee Revenue
c) Advertising Revenue
d) Affiliate Revenue
14. Money received by referring customers to other websites providing products/services is___
a) Sales Revenue
b) Transaction Fee Revenue
c) Advertising Revenue
d) Affiliate Revenue

15. Business model offer users powerful web search tools as well as content and services
such as news, email, calendars, shopping, music, video and more, all in one place of ______
(a) Portal
(b) Content provider
(c) E-tailor
(d) Market creator

16. Business model build a digital environment in which buyers and sellers can meet_____
(a) Portal
(b) Content provider
(c) E-tailor
(d)Market creator

17. Google is a __________.


a) Portal
b) E-trailer
c) Transaction Broker
d) Device

18. ____________ensures that the message was not read by others.


(a) Authenticity
(b) Integrity
(c) Privacy
(d) Policy

19. In E-commerce the assurance that the message is not altered is known as ____________.
a) Authentication
b) Privacy
c) Confidentiality
d) Integrity

20. Dimension of E-commerce security deals with alteration done during transmission_____.
(a) Authenticity
(b) Confidentiality
(c) Integrity
(d) Privacy

21. In E-commerce the process to identify the identity of a person is known as


a) Authentication
b) Privacy
c) Domain Name System
d) Identification

22. Encryption means _______________.


(a) Converting readable text into cipher text
(b) Hacking
(c) Converting cipher text into readable text
(d) Blocking

23. Encryption refers to ______________.


a) Converting plain text into binary numbers
b) Converting plain text to cipher text
c) Converting cipher text to plain text
d) Converting binary text to cipher text

24. ___________________means converting readable text into cipher text.


(a) Encryption
(b) Decryption
(c) Hacking
(d) Blocking

25. The process of converting intelligible data into unintelligible data is called as _______.
a) Encryption
b) Decryption
c) EDI
d) E-market

26. Conversion of data into code is called as ______________.


a) Encryption
b) Decryption
d) Hacking
d) Firewall

27. What type of technology scrambles the contents of files sent via the Internet? _________
(a) Encryption
(b) SSL
(c) HTTPS
(d) Digital Signature

28. Converting cipher text to plain text is called ______________.


a) Encryption
b) Decryption
c) Hacking
d) Firewall

29. Decryption refers to _______________.


a) Converting plain text into binary numbers
b) Converting plain text to cipher text
c) Converting cipher text to plain text
d) Converting binary text to cipher text

30. Generally common man is familiar with __________ form of E-Commerce.


a) B2C
b) P2P
c) B2B
d) C 2 C

31. Sender and Receiver have same keys in ____________.


(a) Symmetric key encryption
(b) asymmetric key encryption
(c) DES
(d) PK1

32. In E-commerce, to authenticate the sender of the message we use _________.


(a) Digital Sending
(b) Digital Signature
(c) Digital Protocol
(d) Privacy Protocol

33. In E-commerce, digital signature is used to the sender of the message


(a) Digital sending
(b) Authenticate
(c) Digital Protocol
(d) Privacy Protocol

34. SET stands for __________.


a) Secure Electronic Transactions
b) Secrete Electronic Transactions
c) Session Electronic Transactions
d) Secure Electronic Transports

35. SET is an open standard in E-commerce offered by: _________.


a) Master and Visa
b) Microsoft
c) World Bank
d) Certification Authorities
36 SET ensures ___________.
(a) Authentication
(b) Hacking
(c) Blocking
(d) Encryption

37. SSL stands for ______________.


(a) Single Socket Layer
(b) Secure Standard Layer
(c) Simple Socket Layer
(d) Secure Socket Layer

38. It is a convention that all sites that use SSL connection while making a
secure connection, use instead of HTTP is ______.
(a) HTTPS
(b) POP
(c) FTP
(d) TCP/IP

39. The technology behind M-commerce is based on ______.


a) WAP
b) POP
c) FTP
d) TCP/1P

40. The Electronic parallel of notes and coins is ____________.


(a) Digital Cash
(b) Debit Card
(c) Petro Card
(d) Credit Card

41. Payment system allows users to make micro payments and purchases on web from
accumulated debit balance _________.
(a) Digital Cash
(b) smart card
(c) Digital accumulating balance
(d) Online Store value systems

42. In online store value systems, cards that have embedded chips that store personal
information are called as __________.
(a) Credit card

You might also like