Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

MCQ Dmec

Download as pdf or txt
Download as pdf or txt
You are on page 1of 203

The scope of e-commerce is ________ than digital business.

A. Broader

B. Narrower

C. Wider

D. Hyper

View Answer
B. Narrower

All electronically mediated information exchanges are known as ______

A. Digital Business

B. E-Business

C. E-Commerce

D. Digital Marketing

View Answer
C. E-Commerce

_______ is NOT an example of Digital Business.

A. OYO Rooms

B. Reliance SMART

C. Ola

D. D Mart Ready

View Answer
B. Reliance SMART
Digital business is similar to the term __________ which was first coined by
IBM corporation.

A. E-business

B. E-Commerce

C. Internet Business

D. Both A and B

View Answer
A. E-business

Digital business Infrastructure refers to the combination of ________

A. Hardware

B. Software

C. Servers

D. All of the above

View Answer
D. All of the above

Digital business is __________ in its scope than e-commerce.

A. Broader

B. Narrower

C. Restricted

D. Border

View Answer
A. Broader
OLX and Quikr is an example of _________digital business model.

A. P2P

B. B2B

C. C2C

D. Both A & B

View Answer
A. P2P

________ is an organization that uses technology as a competitive advantage


in its internal and external operations.

A. Digital Economy

B. Digital enterprise

C. E-commerce

D. None of the above

View Answer
B. Digital enterprise

Customers pay a fixed amount, usually monthly, to get some type of service.
This is an examples of ________ Digital Business Model

A. Affiliate Fees

B. Transaction Fees

C. Subscription Fees

D. Licensing Fees

View Answer
C. Subscription Fees
Adoption of digital business by established SMEs is generally ___________

A. Less than that in larger businesses

B. More than that in larger businesses.

C. Equal to larger businesses.

D. None

View Answer
A. Less than that in larger businesses

_________describes the manner in which business is done to generate


revenue and create value.

A. Digital Business

B. Business Model

C. Ecommerce

D. CRM

View Answer

B. Business Model

Companies charge others for allowing them to place a banner on their sites.
This Digital Business Model is known as ______

A. Transaction Fees

B. Licensing Fees

C. Affiliate Fees

D. Advertising Fees

View Answer
D. Advertising Fees

This business model involves trade between business organisations and


customers.

A. B2B

B. B2C

C. P2P

D. C2C

View Answer

B. B2C

IoT stands for

A. Information Of Things

B. Input Output Things

C. Internet of Technology

D. Internet of Things

View Answer

D. Internet of Things

___________EC model is that of selling products or services online

A. Brick & Mortar

B. Online direct marketing.

C. Indirect Marketing

D. Both A & B
View Answer

B. Online direct marketing.

Online Community is also called______

A. Internet community

B. Web community

C. Social Community

D. Both A & B

View Answer

D. Both A & B

_______digital business model involves trade and transaction dealings


between business establishments.

A. B2C

B. C2B

C. B2B

D. P2P

View Answer

C. B2B

When members of virtual community interacts with each other over an


internet, then it is called ___________.

A. Web Community

B. Online Commeunity

C. Internet Community
D. All of the above

View Answer

D. All of the above

________is the new business model aim to gain competitive advantage by


using Information Technology.

A. Digital Economy

B. Digital Enterprise

C. Internet of Things

D. E-commerce

View Answer

B. Digital Enterprise

In online or digital ERP, ERP stands for________

A. Enterprise Resource Planning

B. Enterprise Relationship Planning

C. Enterprise Resource Process

D. Electronic Resource Planning

View Answer

A. Enterprise Resource Planning

In eCRM system, CRM stands for_______

A. Customer Resource Management

B. Customer Retention Management


C. Customer Relationship Management

D. Customer Relationship Mapping

View Answer

C. Customer Relationship Management

The transformation of key business processes through the use of digital or


Internet technologies is known as ____________

A. E-business

B. E-Commerce

C. Digital Business

D. Both A and C

View Answer

D. Both A and C

A _________ community is one where the interaction takes place over a


computer network, mainly the Internet.

A. Online

B. Virtual

C. Internet

D. All of the above

View Answer

D. All of the above

_______ is a new digital ecosystem, which can be described through five Cs:
creativity, connectivity, collaboration, convergence, & community.
A. .NET

B. Web 2.0

C. IoT

D. Webex

View Answer

B. Web 2.0

_________ has specific objectives to increase profits when increasing its


benefits to society.

A. Digital Business

B. Social Network

C. Social Enterprise

D. Virtual Community

View Answer

C. Social Enterprise

_________includes digital wireline or wireless communication networks,


computers, software, and other related information technologies.

A. Internet Economy

B. Digital Economy

C. Social Economy

D. Both A & B

View Answer

D. Both A & B
Question 1

Marketing that moves away from a transaction-based effort to a conversation (i.e. two-way dialogue)
and can be described as a situation or mechanism through which marketers and a customer (e.g.
stakeholders) interact usually in real-time is known as:B

a) Digital marketing.

b) Interactive marketing.

c) Direct marketing.

d) Electronic marketing.

Question 2

Which of the following is not a type of digital marketing activity?C

a) Email marketing.

b) Social web marketing.

c) Print advert.

d) Viral marketing.
Question 3

________ is a form of marketing communications that uses the internet for the purpose of advertising-
delivering marketing messages to increase website traffic (i.e. click-through) and encourage product
trial, purchase, and repeat purchase activity (i.e. conversion)..A

a) Internet marketing

b) Search marketing

c) Email marketing

d) Mobile marketing
Question 4

In the first 10 years, the web was heavily used as a static publishing and/or retailing (transactional)
channel. This was known as:B

a) Web 2.0.

b) Web 1.0.
c) Web publishing.

d) Static web.
Question 5

The development of digital media and the rise of Web 2.0 (i.e. the social web) technology saw a
further evolution in marketing away from a hierarchical one-sided mass communication model. Web
2.0 used more participatory technologies, (e.g. social channels and online communities), rather than
just information or transactional channels. What is the focus of this social web?B

a) Marketer.

b) User.

c) System.

d) Web platform.
Question 6

A form of marketing communications that uses Internet-based resources for the purpose of
advertising, delivering messages to drive traffic to a website ('click-through rate') and also
encourage trial, purchase, or repeat-purchase activity is called:C

a) Search marketing.

b) E-mail marketing.

c) Internet advertising.

d) Social web marketing.


Question 7

An advertising model used in which advertisers pay their host only when their sponsored ad or link
is clicked, is called:D

a) Search Engine Optimization (SEO).

b) Contextual Advertising.

c) Digital Asset Optimization (DAO).

d) Pay Per Click (PPC).


Question 8
A method of marketing by electronic mail wherein the recipient of the message has consented to
receive it is called:C

a) Search marketing.

b) Internet advertising.

c) Permission-based email marketing.

d) Social web marketing.


Question 9

____________ is a form of digital marketing that describes the use of the social web and social media
(e.g. social networks, online communities, blogs or wikis) or any online collaborative technology for
marketing activities, be it sales, public relations, research, distribution or customer service.C

a) Pay Per Click (PPC)

b) Digital Asset Optimization (DAO)

c) Social Media Marketing (SMM)

d) Search Engine Optimization (SEO)


Question 10

Four elements that distinguish mobile marketing from traditional mass marketing are: scope of
audience, type and format of messages, ___________, and response tracking.A

a) location-based targeting

b) wide coverage

c) mass distribution

d) interest group setting


Question 11

Websites translated for wireless devices to access and download content and to display adverts are
known as:C

a) GPS

b) IVR

c) WAP sites
d) Apps
Question 12

This refers to branded software applications for mobile devices that consumers use to access added-
value information, customer service and/or entertainment where and when they want it:B

a) WAP sites.

b) Apps.

c) IVR.

d) Viral.
Question 13

This is the process of marketing accomplished or facilitated through the application of electronic
devices, appliances, tools, techniques, technologies and or systems:A

a) Electronic marketing.

b) Interactive marketing.

c) Internet marketing.

d) Direct marketing.
Question 14

Which of the following is not an issue that marketers need to consider when using digital resources
for marketing activities?B

a) Jurisdiction.

b) Disclosure.

c) Ownership.

d) Permissions.
Question 15

Which of the following is not one of major considerations when using internet advertising to
increase brand awareness and encourage click-through to a target site?C

a) Cost.

b) Intrusive.
c) Interactivity.

d) Timeliness.
Question 16

Which of the following refers to unsolicited electronic messages?C

a) Opt-in email.

b) Consent marketing.

c) Spam.

d) Opt-out email.
Question 17

A database of information that is maintained by human editors and lists websites by category and
subcategory with categorization is known as:A

a) A search directory.

b) Automated voice response (AVR).

c) Apps.

d) SEO.
Question 18

This attempts to improve rankings for relevant keywords in search results by improving a website's
structure and content:B

a) SEM.

b) SEO.

c) SST.

d) SFA.
Question 19

The next iteration of the web, which will be characterized by the web becoming artificially
intelligent, thereby recognizing links and relationships between data sources, allowing the
prediction of audience response and greater audience targeting. This is referred to as:A

a) Web 3.0.
b) Web 2.0.

c) Web 1.0.

d) Web 4.0.
Question 20

This operates algorithmically or using a mixture of algorithmic and human input to collect, index,
store and retrieve information on the web (e.g. web pages, images, information and other types of
files). It makes the information available to users in a manageable and meaningful way in response
to a search query. This is referred to as:C

a) Banner ads.

b) Pop-up ads.

c) A search engine.

d) Apps.

1. Among the alternate models of B2B e-commerce,……is the best


means to obtain a competitive advantage in the Market place.
A. Process based
B. strategic relationship based
C. transaction based
D. any of these
2 ……………..focus on producing a highly integrated value proposition
through a managed process.
A. hubs
B. community
C. contents
D. none of these
3 …………………is basically a concept of online marketing and
distributing of products and services over the internet
A. B2G
B. B2E
C. B2C
D. B2B
4 ……………………..e-commerce consists of the sale of products or
services from a business to the general public
A. B2G
B. B2E
C. B2B
D. B2C
5. Which of the following is not suitable for a B2C transaction ?
A. clothes
B. flowers
C. airline reservation
D. none
6 ……………..e-commerce transaction has the advantage of eliminating
middlemen.
A. B2G
B. B2C
C. B2B
D. B2E
7………………….e-commerce involves customers gathering information,
purchasing and receiving products over an electronic network
A. B2G
B. B2E
C. B2B
D. B2C
8. Which among the following is not an user of B2C e-commerce ?
A. manufacturers
B. distributors
C. Publishers
D. none
9 ………………….e-commerce involves the electronic facilitation of
transaction between customers through some third party.
A. C2C
B. B2E
C. B2B
D. B2G
10. Which among the following is an example of C2C ?
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
11. World Wide Web (WWW) was introduced in the year
……………………
A. 1994
B. 1996
C. 1992
D. 1990
12. ……………….is an early form of E-commerce
A. SCM
B. EDI
C. Both of these
D. None of these
13. ………………..is concerned with the buying and selling information,
products and services over computer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
14. ………………..is a set of standards developed in the 1960s to
exchange business information and to do electronic transactions
A. EDI
B. Protocols
C. TCP/IP
D. None of these
15. Which among the following product is suitable for E-Commerce ?
A. Books
B. Vegetables
C. All of these
D. None of these
16. ……………allows a business application on the computer of one
organization to communicate directly with the business application
on the computer of another company.
A. EDI
B. Protocols
C. Standards
D. Business applications
17) Electronic Exchange of business documents in a standard format
is known as ………………
A. E-commerce
B. E-Business
C. EDI
D. None of these
18) ………………. is essentially a business process that connects
manufacturers, retailers, customers and suppliers in the form of a
chain to develop and deliver products.
A. E-commerce
B. EDI
C. Networking
D. SCM
19) Which of the following is not a party of SCM ?
A. Suppliers
B. Manufacturers
C. Distributors
D. Customers
20. ………………is a commercial process that includes production,
distribution, sales or delivery of goods and services through
electronic means
A. E-commerce
B. SCM
C. EDI
D. None of these
21 …………………is a class of advertising methods which are considered
unethical and may even be illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Answer: D
22 ……………….is the most common way for purchasing an online
advertising
A. CPM
B. CPC
C. Any of these
D. none of these

Answer: C
23 ………………are animated full screen ads placed at the entry of a site
before a user reaches the intended content.
A. pop-up ads
B. Intromercials
C. Spam e-mail
D. malware

Answer: B
24 ………………….are interactive online ads that require the user to
respond intermittently in order to wade through the message before
reaching the intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware

Answer: A
25 ……………facilitates transactions between buyer and sellers by
providing comprehensive information and ancillary services, without
being involved in the actual exchange of goods and services between
the parties.
A. Metamediary
B. Intermediary
C. middlemen
D. all of these

Answer: A
26 ………………is any transaction, involving the transfer or rights to use
goods and services, which is initiated and or completed by using
mobile access to computer mediated networks with the help of an
electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

Answer: A
27 …………….provide security and privacy for the use of the web page
content
A. HTTP
B. html
C. FTP
D. none of these

Answer: A
28 …………………….website is one that changes or customizes itself
frequently and automatically based on certain criteria
A. Dynamic website
B. Static Website
C. phish site
D. none of these

Answer: A
29 ………………site is created to fraudulently acquire sensitive
information such as pass words and credit card details, by
masquerading as a trustworthy person or business.
A. Dynamic website
B. Static Website
C. phish site
D. none of these

Answer: C
30 ……………….in the e-commerce may be a holder of a payment card
such as credit card or debit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer

Answer: A
31. The purpose of ………………page is to provide links to other pages
A. Home page
B. Web page
C. Summary page
D. None of these

Answer: A
32 ……………is an example for a software that visits suggested pages
and return the appropriate information to be indexed by the search
Engine
A. Robot
B. Spiders
C. Ants
D. All
Answer: D
33 ……………………..ads appears as rectangular graphics near the top of
the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

Answer: A
34 ………………….ads take up the entire screen and are more powerful
than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

Answer: B
35 ………………………….is a form of advertisement on the web that
appears between web pages that the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

Answer: C
36 ……………………is basically a TV commercial that runs in the
browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads

Answer: D
37. Advertisements take the form of a website copy are
called…………………
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

Answer: A
38 ………………..is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer: B
39 …………………..is an unsolicited e-mail sent to every e-mail address
that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these

Answer: C
40 …………………..is the buying and selling of goods and services
through wireless handled devices such as cellular phone and Personal
Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these

Answer: A
41. Peer to Peer [P2P] is also used to describe ………………………
A. C2C
B. B2E
C. B2B
D. B2C

Answer: A
42 …………………….is an online auctioning site that facilitates the trade
of privately owned items between individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these

Answer: A
43. Monster.com is an example of ……………………..website
A. C2C
B. B2E
C. B2B
D. B2C

Answer: A
44 ………………….is an internet network that allows users with the
same network in software to connect to each other’s hard disks and
exchange files
A. B2C
B. B2E
C. B2B
D. P2P
Answer: D
45. This is a protocol which allows files to be transferred from one
computer to another computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these

Answer: B
46. A ……………….is a document, typically written in plain text
interspersed with formatting instructions of html
A. Web page
B. home page
C. domain
D. none of these

Answer: A
47 ………………….is the first page of a web site.
A. Web page
B. home page
C. domain
D. none of these

Answer: B
48 ……………..allows the person to type ion just the main word or
words and the site will come in
A. Web page
B. home page
C. domain
D. none of these

Answer: C
49. ”Google” is one of the most popular………………..
A. Portal
B. Browser
C. Search Engine
D. none of these

Answer: C
50. A ………………….. presents information from diverse sources in a
unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these

Answer: C
51. A ………………is an electronic file that uniquely identifies
individuals and websites on the internet and enables secure
confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these

Answer: B
52. The information Technology Act [IT ACT] came into effect on
A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these

Answer: C
53. Information sent over the Internet commonly uses the set of rules
called……………………
A. TCP/IP
B. FTP
C. HTTP
D. gopher

Answer: A
54 ……………………….is a person who breaks in or trespasses a
computer system
A. Hacker
B. Snooper
C. operator
D. spoofer

Answer: A
55. E-mail which contain useless material is termed as……………
A. Spam
B. useless mail
C. trunk mail
D. Junk mail

Answer: D
56. India has enacted the first IT Act in the year……………………
A. 2001
B. 2002
C. 2009
D. 2000

Answer: D
57. Which of the following crimes were not covered under IT
(Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these

Answer: D
58. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None

Answer: C
59 ……………….is a programme designed o replicate and spread
generally with the victim being oblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these

Answer: C
60. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these

Answer: D
61. Companies use………………………networks to automate employee
related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P

Answer: B
62. Which among the following is not a B2E application
A. Online Insurance policy management
B. Online supply requests
C. Special employee offers
D. Locate application and tax forms

Answer: D
63 ……………………..streamlines the flow of information and self
service capabilities through automation
A. SCC
B. CRM
C. CRP
D. SCM

Answer: A
64 ………………is a global web in which millions of users are
communicating with each other with the help of computers.
A. Internet
B. WWW
C. both of these
D. None of these

Answer: A
65 …………………is an application layer protocol for distributed,
collaborative, hypermedia information systems.
A. html
B. HTTP
C. Bothe of these
D. None of these

Answer: A
66. English physicist Tim Berner’s Lee was famous for the
establishment of …………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these

Answer: B
67 ………refers to a kind of e-commerce which refers to a company
selling or buying from other company
A. B2G
B. B2E
C. B2B
D. P2P

Answer: C
68. Which of the following is not an example for B2B e-commerce ?
A. Sending and receiving orders
B. Invoice and shopping
C. all of these
D. none of these

Answer: D
69. A company that manufacturers bicycles may use the internet to
purchase tyres from their suppliers. This is an example of———–
transaction.
A. B2G
B. B2E
C. B2B
D. P2P

Answer: C
70 …………..sites act as an intermediary between someone wanting a
product or service and potential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these

Answer: A
71.……………….is the exchange of goods or items or commodities and
services or applications used for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none

Answer: B
72. …………….is an approach to deliver information differentiated
business values called services by combining the system and process
generally called resources
A. E-business
B. E-commerce
C. any of these
D. none

Answer: A
73. ……………….always operate on intranet
A. E–commerce
B. E-Business
C. EDI
D. None of these

Answer: B
74. Which among the following is not an example for E-commerce
A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these
Answer: C
75. ……………….and ………………… were the enabling technologies that
laid the ground work for E-commerce
A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these

Answer: C
76. ………………were the first to establish prominent E-commerce
Brands
A. Baazar.com
B. E-bay and Amazon
C. E-trade.com
D. none of these

Answer: B
77. …………….is a systems approach to Managing the entire flow of
information, materials, and services from raw material suppliers
through factories and warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM

Answer: D
78. …………….is a form of supply chain where a series of assembly
operations are carried out to obtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None

Answer: A
79.…………………is a form of supply chain where a wide variety of
finished goods are produced with limited number of raw material or
components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None

Answer: B
80……………………is the exchange of services, information or product
from one business to a government agency
A. B2G
B. B2E
C. B2B
D. P2P

Answer: C
81 ……………….is a financial institution that establishes an account
with a merchant and processes payment card authorization and
payments
A. customer
B. issuer
C. Merchant
D. Acquirer

Answer: D
82. In …………………..type of payment system customer is allowed to
spend only up to the amount that have pre deposited into account.
A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer: A
83 ………………type of payment system is highly useful to those
customers who would like to control overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer: A
84 ……………………….credit card gives all the advantages of a normal
credit card without worrying about the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer: A
85 ……………………facility helps the customer to pay only a small
amount of the total outstanding and revolve the rest of the payment to
the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these

Answer: B
86 …………………..is the system of purchasing cash credits in relatively
small amounts, storing the credits in our computer, and then
spending them, when making electronic purchases over the internet.
A. E-cash
B. Digicash
C. Cyber cash
D. any of these

Answer: D
87 ………………….is a financial instrument which can be used more
than once to borrow money or buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these

Answer: A
88. To accept a credit card for payment, we have to open a
…………………account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these

Answer: C
89. A……………………..is a device that includes an embedded integrated
circuit Chip [ICC] that can be either a secure micro controller or
equivalent intelligence with internal memory or a memory chip alone.
A. smart Cards
B. E-Cheques
C. E-cash
D. none of these

Answer: A
90 ………………..is a kind of payment card that transfers fund directly
from the consumer’s bank account to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these

Answer: A
91 ……………….acts like a gate keeper that examines each users
identification before allowing them to enter to the organization’s
internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer: A
92 …………..Prevents unauthorized communication into and out of the
network, allowing the organization to enforce a security policy on
traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer: A
93. SET means ………………
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these

Answer: C
94. The verification of credit card is done by using…………….. with a
communications link to the merchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these

Answer: C
95. Creating illegitimate sites that appear to be published by
established organizations by unscrupulous artists is termed
as…………………
A. Spoofing
B. Snooping
C. Sniffing
D. None of these

Answer: A
96. Gain entry into the user’s system and scan your file system for
personal information is known as……………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these

Answer: B
97 ………………attacks are difficult and are only successful if the
attacker knows something about the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords

Answer: D
98 …………………is the process of making information unintelligible to
the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography

Answer: D
99 ………………….is the reverse process of encryption, to make the
information readable once again
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography

Answer: B
100. A………………….provides a way to associate the message with the
sender and is the equivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these

Answer: B
101 ……………..is a card with a microchip that can be used instead of
cash and coins for everything from vending machines to public
transportation.
A. Debit Card
B. credit card
C. Electronic purse
D. any of these

Answer: C
102 ………………is basically a secure gate between our organization
data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer: A
103 ……………………encrypts payment card transaction data and
verifies that both parties in the transaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these

Answer: B
104 ………………is automated methods of recognizing a person based
on a physiological or behavioral characteristic.
A. Biometrics
B. PIN
C. both of these
D. none of these

Answer: A
105. In Biometrics,…………………………ID system is designed to prevent
more than one person from using a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

Click Here for Answer

106. In Biometrics,…………………………ID system is designed to prevent


one person from using more than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

Answer: B
107 …………………..are program developed by some dishonest people to
destroy the computer system and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these

Answer: B
108. Which among the following is not an example for computer virus
?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer: D
109 ……………………are special type of software meant for limiting the
risks of being hit by computer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer: B
110. A……………….is a person who gains unauthorized access to a
computer network for profit, criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these

Answer: A
111. A……………portal is a specialized entry point to a specific market
place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

Answer: A
112 ………………..are general interest portals covering a wide range of
topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these

Answer: B
113. Which among the following is an example for vertical portal ?
A. i-village
B. Yahoo
C. Google
D. Net scape

Answer: A
114. A portal that helps to establish relations and to conduct
transactions between various organizations is termed as………………
A. B2B portals
B. C2C portals
C. both of these
D. none of these
Answer: A
115. A …………………….is a software that scours the internet collecting
data about every website and every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these

Answer: B
116. Search Engines databases are selected and built by computer
robot programs called………………
A. spiders
B. Search Engines
C. robots
D. none of these

Answer: A
117. Which among the following is not an example for Search engine ?
A. Google
B. MSN
C. Alta vista
D. none of these

Answer: D
118. Web pages are prepared using their language as…………………
A. html
B. FTP
C. HTTP
D. None of these

Answer: A
119. A web page is transferred to users computer through
……………………..
A. html
B. FTP
C. HTTP
D. None of these

Answer: C
120. The user reaches this page when they specify the address of a
website
A. Home page
B. Web page
C. Summary page
D. None of these

Answer: A
121. Which among the following is an example for vertical portal ?
A. i-village

B. yahoo

C. google

D. net scape

Answer:
A.i-village
122. 4. A portal that helps to establish relations and to conduct transactions
between variousorganizations is termed as………………
A. b2b portals

B. c2c portals

C. both of these

D. none of these

Answer:
A.b2b portals
123. A …………………….is a software that scours the internet collecting data about
everywebsite and every webpage within it
A. spiders

B. search engines

C. robots

D. none of these

Answer:
B.search engines
124. Which among the following is not an example for Search engine ?
A. google

B. msn

C. alta vista

D. none of these
Answer:
D.none of these
125. Web pages are prepared using their language as…………………
A. html

B. ftp

C. http

D. none of these

Answer:
A.html
126. A web page is transferred to users computer through ……………………..
A. html

B. ftp

C. http

D. none of these

Answer:
C.http
127. The user reaches this page when they specify the address of a website
A. home page

B. web page

C. summary page

D. none of these

Answer:
A.home page
128. ……………………..streamlines the flow of information and self service
capabilitiesthrough automation
A. scc

B. crm

C. crp

D. scm
Answer:
A.scc
129. ………………is a global web in which millions of users are communicating with
eachother with the help of computers.
A. internet

B. www

C. both of these

D. none of these

Answer:
A.internet
130. …………………….is an online auctioning site that facilitates the trade of
privatelyowned items between individuals.
A. e-bay

B. amazon.com

C. rentalic.com

D. all of these

Answer:
A.e-bay
131. Monster.com is an example of ……………………..website
A. c2c

B. b2e

C. b2b

D. b2c

Answer:
A.c2c
132. This is a protocol which allows files to be transferred from one computer to
anothercomputer
A. tcp/ip
B. ftp

C. http

D. none of these
Answer:
B.ftp
133. A ……………….is a document, typically written in plain text interspersed
withformatting instructions of html
A. web page
B. home page

C. domain

D. none of these

Answer:
A.web page
134. ………………….is the first page of a web site.
A. web page
B. home page

C. domain

D. none of these

Answer:
B.home page
135. …………………….is an online auctioning site that facilitates the trade of
privatelyowned items between individuals.
A. e-bay
B. amazon.com

C. rentalic.com

D. all of these

Answer:
A.e-bay
136. ……………..is a card with a microchip that can be used instead of cash and
coins foreverything from vending machines to public transportation.
A. debit card

B. credit card

C. electronic purse

D. any of these
Answer:
C.electronic purse
137. ……………………encrypts payment card transaction data and verifies that
bothparties in the transaction are genuine.
A. ssl
B. set

C. both of these

D. none of these

Answer:
B.set
138. SET means ………………
A. standard electronic technology
B. standard electronic transfer

C. secure electronic transaction

D. none of these

Answer:
C.secure electronic transaction
139. The verification of credit card is done by using…………….. with a
communications linkto the merchants acquiring bank
A. credit card payment terminal
B. point of sale

C. all of these

D. none of these

Answer:
C.all of these
140. ……………….is a financial institution that establishes an account with a
merchant andprocesses payment card authorization and payments
A. customer
B. issuer

C. merchant

D. acquirer

Answer:
D.acquirer
141. ………………type of payment system is highly useful to those customers who
wouldlike to control overspending,
A. prepaid
B. post paid

C. both of these

D. none of these

Answer:
A.prepaid
142. ……………………….credit card gives all the advantages of a normal credit
cardwithout worrying about the interest charges
A. prepaid

B. post paid

C. both of these

D. none of these

Answer:
A.prepaid
143. ……………………facility helps the customer to pay only a small amount of the
totaloutstanding and revolve the rest of the payment to the next month.
A. cash advance
B. revolver

C. tele draft

D. none of these

Answer:
B.revolver
144. ………………….is a financial instrument which can be used more than once to
borrowmoney or buy products and services on credit.
A. credit card
B. e-cheques

C. e-cash

D. none of these

Answer:
A.credit card
145. To accept a credit card for payment, we have to open a …………………account
withour bank
A. savings bank
B. current account

C. merchant account

D. any of these

Answer:
C.merchant account
146. ………………..is a kind of payment card that transfers fund directly from
theconsumer’s bank account to the merchants account
A. debit card
B. electronic purse

C. credit card

D. any of these

Answer:
A.debit card
147. A ………………is an electronic file that uniquely identifies individuals and
websites onthe internet and enables secure confidential communications
A. digital signature
B. digital certificates

C. ssl

D. none of these

Answer:
B.digital certificates
148. The information Technology Act [IT ACT] came into effect on
A. 16th november 2000

B. 15th december 2000

C. 17th october 2000

D. none of these

Answer:
C.17th october 2000
149. Information sent over the Internet commonly uses the set of
rulescalled……………………
A. tcp/ip
B. ftp

C. http

D. gopher

Answer:
A.tcp/ip
150. ……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper

C. operator

D. spoofer

Answer:
A.hacker
151. E-mail which contains useless material is termed as……………
A. spam

B. useless mail

C. trunk mail

D. junk mail

Answer:
D.junk mail
152. India has enacted the first IT Act in the year……………………
A. 2001
B. 2002

C. 2009

D. 2000

Answer:
D.2000
153. Which of the following crimes were not covered under IT (Amendment) Act,
2008 ?
A. cyber terrorism
B. child pornography
C. video voyeurism

D. none of these

Answer:
D.none of these
154. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. data protection
B. telecommunication laws

C. intellectual property laws

D. none

Answer:
C.intellectual property laws
155. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity

C. authentication

D. none of these

Answer:
D.none of these
156. ………………is basically a secure gate between our organization data and
internet.
A. network firewall

B. antivirus

C. both of these

D. none of these

Answer:
A.network firewall
157. ………………is automated methods of recognizing a person based on a
physiological orbehavioral characteristic.
A. biometrics
B. pin

C. both of these
D. none of these

Answer:
A.biometrics
158. ……………….is a financial institution that establishes an account with a
merchant andprocesses payment card authorization and payments.
A. customer
B. issuer

C. merchant

D. acquirer

Answer:
D.acquirer
159. In …………………..type of payment system customer is allowed to spend only
up to theamount that have pre deposited into account.
A. prepaid
B. post paid

C. both of these

D. none of these

Answer:
A.prepaid
160. .……………….is the exchange of goods or items or commodities and services
orapplications used for money and deals the money matters
A. e-commerce
B. commerce

C. both of these

D. none

Answer:
B.commerce
161. ……………….always operate on intranet
A. e–commerce

B. e-business

C. edi

D. none of these
Answer:
B.e-business
162. Which among the following is not an example for E-commerce
A. amazon.com
B. baazar.com

C. e-trade.com

D. none of these

Answer:
C.e-trade.com
163. ………………were the first to establish prominent E-commerce Brands
A. baazar.com
B. e-bay and amazon

C. e-trade.com

D. none of these

Answer:
B.e-bay and amazon
164. …………….is a form of supply chain where a series of assembly operations are
carriedout to obtain the final product
A. converging supply chain
B. diverging supply chain

C. any of these

D. none

Answer:
A.converging supply chain
165. .…………………is a form of supply chain where a wide variety of finished goods
areproduced with limited number of raw material or components.
A. converging structure
B. diverging structure

C. any of these

D. none

Answer:
B.diverging structure
166. ……………………is the exchange of services, information or product from
onebusiness to a government agency
A. b2g
B. b2e

C. b2b

D. p2p

Answer:
C.b2b
167. ………………….is an internet network that allows users with the same network
insoftware to connect to each other’s hard disks and exchange files
A. b2c

B. b2e

C. b2b

D. p2p

Answer:
D.p2p
168. ”Google” is one of the most popular………………..
A. portal
B. browser

C. search engine

D. none of these

Answer:
C.search engine
169. A ………………….. Presents information from diverse sources in a unified way
in aweb site.
A. web portal
B. link page

C. both of these

D. none of these

Answer:
C.both of these
170. ……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper

C. operator

D. spoofer

Answer:
A.hacker
171. Peer to Peer [P2P] is also used to describe ………………………
A. c2c
B. b2e

C. b2b

D. b2c

Answer:
A.c2c
172. ……………..allows the person to type ion just the main word or words and the
site willcome in
A. web page
B. home page

C. domain

D. none of these

Answer:
C.domain
173. A ………………….. presents information from diverse sources in a unified way
in aweb site
A. web portal

B. link page

C. both of these

D. none of these

Answer:
C.both of these
174. In Biometrics,…………………………ID system is designed to prevent one
personfrom using more than one identity
A. positive id system
B. negative id system
C. both of these

D. none of these

Answer:
B.negative id system
175. …………………..are program developed by some dishonest people to destroy
thecomputer system and the valuable information in it.
A. network firewall
B. computer virus

C. both of these

D. none of these

Answer:
B.computer virus
176. he dimension of e-commerce that enables commerce across national
boundaries is called______________.
A. interactivity

B. global reach

C. richness

D. ubiquity

Answer:
B.global reach
177. The primary source of financing during the early years of e-commerce
was______________.
A. bank loans
B. large retail firms

C. venture capital funds

D. initial public offerings

Answer:
C.venture capital funds
178. The source of revenue in a subscription revenue model is
______________.
A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services

D. fees for enabling or execution a transaction

Answer:
C.fees from subscribers in exchange for access to content or services
179. Industry structure is defined as ______________.
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a
business firm

C. set of planned activities designed to result in a profit in a marketplace

D. how a company\s product or service fulfills the needs of customers

Answer:
A.the nature of the players in an industry and their relative bargaining power
180. The component of TCP/IP that provides the Internet’s addressing scheme
and isresponsible for the actual delivery of packets is ______________.
A. tcp
B. ip

C. the network layer

D. the application layer

Answer:
B.ip
181. Which of the following is not a limitation of the current Internet?
A. insufficient capacity throughout the backbone

B. network architecture limitations

C. insufficient reach

D. best-efforts qos

Answer:
C.insufficient reach
182. Internet users account for about ______________ of the world’s
population.
A. 7%
B. 17%

C. 27%
D. 47%

Answer:
B.17%
183. The most common type of Internet crime according to the IC3 is
______________.
A. credit card fraud
B. check fraud

C. non-delivery

D. auction fraud

Answer:
D.auction fraud
184. When hackers flood a Web site with useless traffic to overwhelm the
network, it iscalled ______________.
A. phishing
B. pharming

C. a denial of service (dos) attack

D. spoofing

Answer:
C.a denial of service (dos) attack
185. ______________ influence the behavior of others through their
personality, skills, or otherfactors.
A. opinion leaders
B. direct reference groups

C. indirect reference groups

D. lifestyle groups

Answer:
A.opinion leaders
186. A(n) ______________ represents data as two-dimensional tables with
recordsorganized in rows and attributes in columns.
A. database management system

B. data warehouse

C. sql query
D. relational database

Answer:
D.relational database
187. Creating multiple versions of information goods and selling essentially the
sameproduct to different market segments at different prices is
called______________.
A. versioning
B. bundling.

C. transactive content

D. price discrimination

Answer:
A.versioning
188. Which of the following is a measure of the percentage of purchasers who
return to aWeb site within a year?
A. loyalty
B. reach

C. recency

D. unique visitors

Answer:
A.loyalty
189. Which of the following statements about privacy is true?
A. it is a moral right to be left alone
B. only corporations and government need to be concerned about it

C. it has only just recently become a concern

D. it is most easily obtained on the internet

Answer:
A.it is a moral right to be left alone
190. The redirection of traffic from a legitimate site to an infringing site is
called______________.
A. cybersquatting
B. cyber piracy

C. met tagging

D. key wording
Answer:
B.cyber piracy
191. A security plan begins with a(n) is ______________.
A. security policy
B. risk assessment

C. implementation plan

D. security organization

Answer:
B.risk assessment
192. ______________ influence the behavior of others through their
personality, skills, orother factors.
A. opinion leaders

B. direct reference groups

C. indirect reference groups

D. lifestyle groups

Answer:
A.opinion leaders
193. Creating multiple versions of information goods and selling essentially the
sameproduct to different market segments at different prices is
called______________.
A. versioning
B. bundling.

C. transitive content

D. price discrimination

Answer:
A.versioning
194. Which of the following is a measure of the percentage of purchasers who
return to aWeb site within a year?
A. loyalty
B. reach

C. regency

D. unique visitors
Answer:
A.loyalty
195. ______________ are networks that connect people within a company to
each other andto the company network.
A. bitstreams
B. extranets

C. internets

D. intranets

Answer:
D.intranets
196. A website offering content created by third party transparently to customers
is anexample of ______________.
A. reinter mediation
B. syndication

C. virtual manufacturing

D. build-to-order

Answer:
B.syndication
197. E-commerce technologies have improved upon traditional commerce
technologies in______________.
A. richness
B. reach

C. both richness and reach

D. neither richness nor reach

Answer:
C.both richness and reach
198. All of the following are technologies used to gather information about you
onlineexcept ______________.
A. spy ware

B. cookies

C. gmail

D. anonymizers
Answer:
D.anonymizers
199. ______________ is a program that you can run from the DOS prompt in
the Windowsoperating system in order to check the connection between your
client and the server.
A. ping
B. telnet

C. tracert

D. ssl

Answer:
A.ping
200. Which of the following is a new and disruptive Web feature or service?
A. xml
B. diffserv

C. blogs

D. cdma

Answer:
C.blogs
201. What Web server functionality allows it verify usernames and passwords and
processcertificates and encryption information?
A. processing of http requests

B. file transfer protocol

C. data capture

D. security services

Answer:
D.security services
202. The ability to change the product to better fit the needs of the customer is
called______________.
A. customization
B. personalization

C. privacy

D. accessibility
Answer:
A.customization
203. All of the following are major categories of computer viruses except
______________.
A. macro viruses
B. file-infecting viruses

C. script viruses

D. trojan viruses

Answer:
D.trojan viruses
204. The most prevalent online payment method is ______________.
A. paypal
B. checks

C. credit cards

D. debit

Answer:
C.credit cards
205. Complete price transparency in a perfect information marketplace is
necessary for______________ to take effect.
A. bertrand\s law
B. the law of universal prices

C. the law of one price

D. the law of perfect commerce

Answer:
C.the law of one price
206. The process of getting customers to pass along a company’s marketing
message tofriends, family, and colleagues is known as ______________.
A. affiliate marketing

B. viral marketing

C. permission marketing

D. blog marketing
Answer:
B.viral marketing
207. All of the following are types of social marketing except ______________.
A. affiliate marketing
B. blog advertising

C. social network advertising

D. game advertising

Answer:
A.affiliate marketing
208. The ethical principle which states that if an action is not right for all
situations, then itis not right for any situation is known as ______________.
A. the golden rule
B. slippery slope

C. no free lunch

D. universalism

Answer:
D.universalism
209. What is the first step in a P3P-enabled transaction?
A. send web page
B. http get request web page

C. send p3p policy files

D. http get request p3p policy files

Answer:
B.http get request web page
210. The majority of job seekers rely on which of the following?
A. word-of-mouth leads
B. employment agencies

C. internet and newspapers equally

D. internet only

Answer:
C.internet and newspapers equally
211. Which of the following best describes predicted growth in C2C and B2C
auctionspending?
A. b2c spending will overtake c2c spending

B. both types of spending will increase

C. c2c spending will decrease while b2c increases

D. both types of spending will decline at similar rates

Answer:
B.both types of spending will increase
212. A materials requirements planning (MRP) system is an example of
______________.
A. spot purchasing
B. a multi-tier supply chain

C. a legacy computer system

D. electronic data interchange

Answer:
C.a legacy computer system
213. The E-commerce domain that involves business activity initiated by the
consumer andtargeted to businesses is known as ______________.
A. business to business (b2b)
B. consumer to consumer (c2c)

C. consumer to business (c2b)

D. business to consumer (b2c)

Answer:
C.consumer to business (c2b)
214. Why would a merchant want to customize products?
A. to charge a higher price
B. to decrease costs

C. it is required in ec

D. customers will only accept customized products

Answer:
A.to charge a higher price
215. A ______________ is the set of planned activities designed to result in a
profit in amarketplace.
A. business model
B. profit model

C. business plan

D. revenue model

Answer:
A.business model
216. Affiliate revenue is also called as _______.
A. commission
B. brokerage

C. referral fee

D. discount

Answer:
C.referral fee
217. Standards of EDI are decided by ______
A. ascii

B. ansi

C. usa

D. government

Answer:
B.ansi
218. ______ means converting readable text to unreadable text.
A. conversion
B. decryption

C. encryption

D. decoding

Answer:
C.encryption
219. ______ means converting unreadable text to readable text.
A. conversion
B. decryption
C. encryption

D. decoding

Answer:
B.decryption
220. _____ changes URL from http to https.
A. ssl
B. set

C. e-commerce

D. m-commerce

Answer:
A.ssl
221. In ____ server-side authentication is compulsory.
A. ssl
B. set

C. e-commerce

D. m-commerce

Answer:
A.ssl
222. An online retail store is called as _____.
A. trader
B. retailer

C. e-tailer

D. amazon

Answer:
C.e-tailer
223. In _______, one consumer deals with another consumer.
A. c2c

B. b2c

C. b2b

D. p2p
Answer:
A.c2c
224. amazon.com is an example of ______
A. b2b
B. b2c

C. c2c

D. p2p

Answer:
B.b2c
225. In SSL encryption is done using ____ key.
A. public
B. private

C. session

D. symmetric

Answer:
C.session
226. ____ is an online retail store.
A. portal

B. service provider

C. e-tailer

D. content provider

Answer:
C.e-tailer
227. Identify the identity of a person or entity with whom you are dealing on
Internet is knownas ______.
A. integrity
B. authenticity

C. authorisation

D. none of these

Answer:
B.authenticity
228. ____ means that the information being displayed on a Web
site/transmitted/received overthe Internet has not been changed in any way by
an un-authorised party.
A. integrity
B. authenticity

C. authorisation

D. none of these

Answer:
A.integrity
229. In public key encryption ______ keys are used.
A. public and private
B. only public

C. only private

D. session

Answer:
A.public and private
230. SET is developed by association led by _________.
A. master card and visa
B. master card

C. visa

D. rupay

Answer:
A.master card and visa
231. The technology behind M-commerce is based on ______.
A. http

B. https

C. wap

D. pop

Answer:
C.wap
232. ________ is virtual representation of physical market.
A. edi
B. electronic market
C. e-commerce

D. internet commerce

Answer:
B.electronic market
233. _____ allows you paperless transaction.
A. edi
B. electronic market

C. e-commerce

D. internet commerce

Answer:
A.edi
234. _____ means the information being displayed on a Web site or transmitted
or receivedover the Internet has not been changed in any way by an unauthorized
party.
A. integrity
B. confidentiality

C. authenticity

D. privacy

Answer:
A.integrity
235. In ________ encryption is performed with session key.
A. public key
B. private key

C. ssl

D. set

Answer:
C.ssl
236. olx.com is an example of ________
A. b2b

B. b2c

C. c2c
D. p2p

Answer:
C.c2c
237. ______ are sites that creates a digital online environment where people
with similarinterest can transact.
A. community provider
B. market creator

C. portal

D. service provider

Answer:
A.community provider
238. Flipkart.com is an example of _______.
A. b2b
B. b2c

C. c2c

D. p2p

Answer:
B.b2c
239. Normally in M-commerce language used to create web pages is _______.
A. html
B. wml

C. vb

D. xml

Answer:
B.wml
240. _____ is an art of attempting to acquire information by masked as
trustworthy entity.
A. hacking
B. phishing

C. sniffing

D. spoofing
Answer:
B.phishing
241. SSL can be used only with _____.
A. ftp
B. http

C. pop

D. smtp

Answer:
B.http
242. _____ means converting cipher text to plain text.
A. encryption

B. decryption

C. conversion

D. de-conversion

Answer:
B.decryption
243. ______ means converting plain text to cipher text.
A. encryption
B. decryption

C. conversion

D. de-conversion

Answer:
A.encryption
244. In Public Key Encryption ______ key is used for Encryption.
A. receiver’s public
B. receiver’s private

C. sender’s public

D. sender’s private

Answer:
C.sender’s public
245. In Public Key Encryption ______ key is used for Decryption.
A. receiver’s public
B. receiver’s private

C. sender’s public

D. sender’s private

Answer:
B.receiver’s private
246. _____ can read the cipher text.
A. sender
B. receiver

C. any one

D. no one

Answer:
D.no one
247. When message & data are available only to those who are authorized to view
them isknown as ______ .
A. integrity
B. confidentiality

C. authenticity

D. privacy

Answer:
B.confidentiality
248. Digital Accumulating Balance Payment System is generally used for ______
payments.
A. micro

B. macro

C. credit card

D. debit card

Answer:
A.micro
249. Scope of E-Commerce is ______.
A. local
B. global
C. within own country

D. within own state

Answer:
B.global
250. ______ means found everywhere.
A. universal
B. ubiquity

C. global

D. local

Answer:
B.ubiquity
251. E-Commerce Lacks _______ touch.
A. social

B. smooth

C. personal

D. communication

Answer:
C.personal
252. In SSL _______ key is used for encryption.
A. public
B. private

C. session

D. otp

Answer:
C.session
253. To handle credit card transaction on internet _____ is developed by Visa
and Master card.
A. ssl
B. set

C. sat

D. encryption
Answer:
B.set
254. The sender and receiver will have the same key in _____ Key Encryption.
A. symmetric
B. asymmetric

C. public

D. private

Answer:
A.symmetric
255. In SSL URL will change from HTTP to _______.
A. cipher text
B. https

C. shttp

D. smtp

Answer:
B.https
256. __________ is a best example of Online Stored Value System.
A. google

B. yahoo

C. paypal

D. go daddy

Answer:
C.paypal
257. BitTorrent.Com is an example of _____
A. b2b
B. b2c

C. c2c

D. p2p

Answer:
D.p2p
258. E-Tailer revenue model is ______ revenue.
A. sales
B. subscription

C. advertising

D. affiliate

Answer:
A.sales
259. The percentage of people who visit web site and buy something is known as
_____
A. hits
B. conversion rate

C. affiliate

D. walk-in-customer

Answer:
B.conversion rate
260. In _______ user can share files and computer resources directly.
A. b2b
B. b2c

C. c2c

D. p2p

Answer:
D.p2p
261. E-tailer can be Pure Plays or _______ .
A. impure plays

B. indirect plays

C. bricks & clicks

D. direct plays

Answer:
C.bricks & clicks
262. World Wide Web (WWW) was introduced in the year ……………………
A. 1994
B. 1996

C. 1992
D. 1990

Answer:
A.1994
263. ……………….is an early form of E-commerce
A. SCM
B. EDI

C. Both of these

D. None of these

Answer:
B.EDI
264. ………………..is concerned with the buying and selling information, products
and services overcomputer communication networks
A. Commerce
B. E-Commerce

C. E-Business

D. None of these

Answer:
B.E-Commerce
265. ………………..is a set of standards developed in the 1960s to exchange
business informationand to do electronic transactions
A. EDI
B. Protocols

C. TCP/IP

D. None of these

Answer:
A.EDI
266. Which among the following product is suitable for E-Commerce ?
A. Books
B. Vegetables

C. All of these

D. None of these
Answer:
A.Books
267. ……………allows a business application on the computer of one organization
to communicatedirectly with the business application on the computer of another
company.
A. EDI

B. Protocols

C. Standards

D. Business applications

Answer:
A.EDI
268. Electronic Exchange of business documents in a standard format is known
as ………………
A. E-commerce
B. E-Business

C. EDI

D. None of these

Answer:
C.EDI
269. ………………. is essentially a business process that connects manufacturers,
retailers,customers and suppliers in the form of a chain to develop and deliver
products.
A. E-commerce
B. EDI

C. SCM

D. Networking

Answer:
C.SCM
270. Which of the following is not a party of SCM ?
A. Suppliers
B. Manufacturers

C. Distributors

D. Customers
Answer:
C.Distributors
271. ………………is a commercial process that includes production, distribution,
sales or deliveryof goods and services through electronic means
A. E-commerce
B. SCM

C. EDI

D. None of these

Answer:
A.E-commerce
272. ……………….is the exchange of goods or items or commodities and services or
applicationsused for money and deals the money matters
A. E-commerce
B. Commerce

C. Both of these

D. none

Answer:
B.Commerce
273. …………….is an approach to deliver information differentiated business
values called servicesby combining the system and process generally called
resources
A. E-business

B. E-commerce

C. any of these

D. none

Answer:
A.E-business
274. ……………….always operate on intranet
A. E–commerce
B. E-Business

C. EDI

D. None of these
Answer:
B.E-Business
275. Which among the following is not an example for E-commerce
A. Amazon.com
B. Baazar.com

C. E-trade.com

D. None of these

Answer:
C.E-trade.com
276. ……………….and ………………… were the enabling technologies that laid the
ground work for E- commerce
A. SET and SCL

B. SCM and ERP

C. EDI and EFT

D. None of these

Answer:
C.EDI and EFT
277. ………………were the first to establish prominent E-commerce Brands
A. Baazar.com
B. E-bay and Amazon

C. E-trade.com

D. none of these

Answer:
B.E-bay and Amazon
278. …………….is a systems approach to Managing the entire flow of information,
materials, andservices from raw material suppliers through factories and
warehouses to the end customer.
A. CRM
B. SRM

C. EDI

D. SCM
Answer:
D.SCM
279. …………….is a form of supply chain where a series of assembly operations are
carried out to obtain the final product
A. Converging supply chain
B. Diverging supply chain

C. Any of these

D. None

Answer:
A.Converging supply chain
280. ……………………is a form of supply chain where a wide variety of finished
goods are produced with limited number of raw material or components.
A. Converging structure
B. Diverging structure

C. Any of these

D. None

Answer:
B.Diverging structure
281. ……………………is the exchange of services, information or product from one
business to agovernment agency
A. B2G

B. B2E

C. B2B

D. P2P

Answer:
C.B2B
282. Companies use………………………networks to automate employee related
corporate processes.
A. B2G
B. B2E

C. B2B

D. P2P
Answer:
B.B2E
283. Which among the following is not a B2E application
A. Online Insurance policy management
B. Online supply requests

C. Special employee offers

D. Locate application and tax forms

Answer:
D.Locate application and tax forms
284. ……………………..streamlines the flow of information and self service
capabilities throughautomation
A. SCC
B. CRM

C. CRP

D. SCM

Answer:
A.SCC
285. ………………is a global web in which millions of users are communicating with
each other withthe help of computers.
A. Internet
B. WWW

C. both of these

D. None of these

Answer:
A.Internet
286. …………………is an application layer protocol for distributed, collaborative,
hypermediainformation systems.
A. html

B. HTTP

C. Bothe of these

D. None of these
Answer:
A.html
287. English physicist Tim Berner’s Lee was famous for the establishment of
…………………..in 1990.
A. internet
B. WWW

C. Intranet

D. none of these

Answer:
B.WWW
288. ………refers to a kind of e-commerce which refers to a company selling or
buying from othercompany
A. B2G
B. B2E

C. B2B

D. P2P

Answer:
C.B2B
289. Which of the following is not an example for B2B e-commerce ?
A. Sending and receiving orders
B. Invoice and shopping

C. all of these

D. none of these

Answer:
D.none of these
290. A company that manufacturers bicycles may use the internet to purchase
tyres from theirsuppliers. This is an example of———–transaction.
A. B2G
B. B2E

C. B2B

D. P2P

Answer:
C.B2B
291. …………..sites act as an intermediary between someone wanting a product or
service andpotential providers
A. brokering sites
B. Information sites

C. industry portals

D. none of these

Answer:
A.brokering sites
292. Among the alternate models of B2B e-commerce,……is the best means to
obtain acompetitive advantage in the Market place.
A. Process based

B. strategic relationship based

C. transaction based

D. any of these

Answer:
B.strategic relationship based
293. ……………..focus on producing a highly integrated value proposition through
a managed process.
A. hubs
B. community

C. contents

D. none of these

Answer:
A.hubs
294. …………………is basically a concept of online marketing and distributing of
products andservices over the internet
A. B2G
B. B2E

C. B2B

D. B2C

Answer:
D.B2C
295. ……………………..e-commerce consists of the sale of products or services from
a business tothe general public
A. B2G
B. B2E

C. B2B

D. B2C

Answer:
D.B2C
296. Which of the following is not suitable for a B2C transaction ?
A. clothes
B. flowers

C. airline reservation

D. none

Answer:
D.none
297. ……………..e-commerce transaction has the advantage of eliminating
middlemen.
A. B2G
B. B2E

C. B2B

D. B2C

Answer:
D.B2C
298. ………………….e-commerce involves customers gathering information,
purchasing and receivingproducts over an electronic network
A. B2G

B. B2E

C. B2B

D. B2C

Answer:
D.B2C
299. Which among the following is not an user of B2C e-commerce ?
A. manufacturers
B. distributors

C. Publishers

D. none

Answer:
D.none
300. ………………….e-commerce involves the electronic facilitation of transaction
betweencustomers through some third party.
A. B2G
B. B2E

C. B2B

D. C2C

Answer:
D.C2C
301. Which among the following is an example of C2C ?
A. e-Bay

B. Amazon.com

C. Rentalic.com

D. all of these

Answer:
D.all of these
302. Peer to Peer [P2P] is also used to describe………………………….
A. C2C
B. B2E

C. B2B

D. B2C

Answer:
A.C2C
303. …………………….is an online auctioning site that facilitates the trade of
privately owned itemsbetween individuals.
A. e-Bay
B. Amazon.com

C. Rentalic.com

D. all of these

Answer:
A.e-Bay
304. Monster.com is an example of ……………………..website
A. C2C
B. B2E

C. B2B

D. B2C

Answer:
A.C2C
305. ………………….is an internet network that allows users with the same network
in software toconnect to each other’s hard disks and exchange files
A. P2P
B. B2E

C. B2B

D. B2C

Answer:
A.P2P
306. This is a protocol which allows files to be transferred from one computer to
another computer
A. TCP/IP

B. FTP

C. HTTP

D. none of these

Answer:
B.FTP
307. A ……………….is a document, typically written in plain text interspersed with
formattinginstructions of html
A. Web page
B. home page
C. domain

D. none of these

Answer:
A.Web page
308. ………………….is the first page of a web site.
A. Web page
B. home page

C. domain

D. none of these

Answer:
B.home page
309. ……………..allows the person to type ion just the main word or words and the
site will come in
A. Web page
B. home page

C. domain

D. none of these

Answer:
C.domain
310. ”Google” is one of the most popular……………….. a)Portal b)Browser c)Search
Engine d)none of these50. A ………………….. presents information from diverse
sources in a unified way in a web site.
A. Web portal
B. Link page

C. Both of these

D. none of these

Answer:
C.Both of these
311. A……………portal is a specialized entry point to a specific market place or
industry niche.
A. Vertical portal

B. horizontal portal
C. both of these

D. none of these

Answer:
A.Vertical portal
312. ………………..are general interest portals covering a wide range of topics and
features
A. Vertical portal
B. horizontal portal

C. both of these

D. none of these

Answer:
B.horizontal portal
313. Which among the following is an example for vertical portal ?
A. i-village
B. Yahoo

C. Google

D. Net scape

Answer:
A.i-village
314. A portal that helps to establish relations and to conduct transactions between
variousorganizations is termed as………………
A. B2B portals
B. C2C portals

C. both of these

D. none of these

Answer:
A.B2B portals
315. A …………………….is a software that scours the internet collecting data about
every websiteand every webpage within it
A. spiders
B. Search Engines

C. robots
D. none of these

Answer:
B.Search Engines
316. Search Engines databases are selected and built by computer robot
programscalled………………………
A. spiders
B. Search Engines

C. robots

D. none of these

Answer:
A.spiders
317. Which among the following is not an example for Search engine ?
A. Google

B. MSN

C. Alta vista

D. none of these

Answer:
D.none of these
318. Web pages are prepared using their language as…………………
A. html
B. FTP

C. HTTP

D. None of these

Answer:
A.html
319. A web page is transferred to users computer through ……………………..
A. html
B. FTP

C. HTTP

D. None of these
Answer:
C.HTTP
320. The user reaches this page when they specify the address of a website
A. Home page
B. Web page

C. Summary page

D. None of these

Answer:
A.Home page
321. The purpose of ………………page is to provide links to other pages
A. Home page
B. Web page

C. Summary page

D. None of these

Answer:
A.Home page
322. ……………is an example for a software that visits suggested pages and return
the appropriateinformation to be indexed by the search Engine
A. Robot
B. Spiders

C. Ants

D. All

Answer:
D.All
323. ………………………………..ads appears as rectangular graphics near the top of
the page
A. Banner ads

B. floating ads

C. interstitials

D. Unicast ads

Answer:
A.Banner ads
324. ………………….ads take up the entire screen and are more powerful than
banner ads.
A. Banner ads
B. floating ads

C. interstitials

D. Unicast ads

Answer:
B.floating ads
325. ………………………….is a form of advertisement on the web that appears
between web pagesthat the user requests.
A. Banner ads
B. floating ads

C. interstitials

D. Unicast ads

Answer:
C.interstitials
326. ……………………is basically a TV commercial that runs in the browser window.
A. Banner ads

B. floating ads

C. interstitials

D. Unicast ads

Answer:
D.Unicast ads
327. Advertisements take the form of a website copy are called…………………………
A. Advertorials
B. pop-up ads

C. Spam e-mail

D. none of these

Answer:
A.Advertorials
328. ………………..is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads

C. Spam e-mail

D. none of these

Answer:
B.pop-up ads
329. …………………..is an unsolicited e-mail sent to every e-mail address that a
business can find
A. Advertorials
B. pop-up ads

C. Spam e-mail

D. none of these

Answer:
C.Spam e-mail
330. …………………..is the buying and selling of goods and services through
wireless handleddevices such as cellular phone and Personal Digital Assistants
A. Mobile Commerce
B. e-commerce

C. both of these

D. none of these

Answer:
A.Mobile Commerce
331. …………………is a class of advertising methods which are considered unethical
and may evenbe illegal
A. Advertorials

B. pop-up ads

C. Spam e-mail

D. malware

Answer:
D.malware
332. ……………….is the most common way for purchasing an online advertising
A. CPM
B. CPC
C. Any of these

D. none of these

Answer:
C.Any of these
333. ………………are animated full screen ads placed at the entry of a site before a
user reachesthe intended content.
A. Intromercials
B. pop-up ads

C. Spam e-mail

D. malware

Answer:
A.Intromercials
334. ………………….are interactive online ads that require the user to respond
intermittently inorder to wade through the message before reaching the intended
content.
A. Ultramercials
B. pop-up ads

C. Spam e-mail

D. malware

Answer:
A.Ultramercials
335. ………………is any transaction, involving the transfer or rights to use goods
and services, which is initiated and or completed by using mobile access to
computer mediated networkswith the help of an electronic device.
A. Mobile Commerce
B. e-commerce

C. both of these

D. none of these

Answer:
A.Mobile Commerce
336. …………….provide security and privacy for the use of the web page content
A. HTTP

B. html
C. FTP

D. none of these

Answer:
A.HTTP
337. …………………….website is one that changes or customizes itself frequently
and automaticallybased on certain criteria
A. Dynamic website
B. (Static Website

C. phish site

D. none of these

Answer:
A.Dynamic website
338. ………………site is created to fraudulently acquire sensitive information such
as pass wordsand credit card details, by masquerading as a trustworthy person or
business.
A. Dynamic website
B. (Static Website

C. phish site

D. none of these

Answer:
C.phish site
339. ……………….in the e-commerce may be a holder of a payment card such as
credit card ordebit card from an issuer
A. customer
B. issuer

C. Merchant

D. Acquirer

Answer:
A.customer
340. ……………….is a financial institution that establishes an account with a
merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. Merchant

D. Acquirer

Answer:
D.Acquirer
341. In …………………..type of payment system customer is allowed to spend only
up to theamount that have pre deposited into account.
A. Prepaid
B. Post paid

C. both of these

D. none of these

Answer:
A.Prepaid
342. ………………type of payment system is highly useful to those customers who
would like tocontrol overspending,
A. Prepaid

B. Post paid

C. both of these

D. none of these

Answer:
A.Prepaid
343. ……………………….credit card gives all the advantages of a normal credit card
without worryingabout the interest charges
A. Prepaid
B. Post paid

C. both of these

D. none of these

Answer:
A.Prepaid
344. ……………………facility helps the customer to pay only a small amount of the
total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft

D. None of these

Answer:
B.Revolver
345. ………………….is a financial instrument which can be used more than once to
borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques

C. E-cash

D. none of these

Answer:
A.Credit card
346. To accept a credit card for payment, we have to open a …………………account
with our bank
A. Savings Bank
B. Current account

C. Merchant account

D. any of these

Answer:
C.Merchant account
347. ………………..is a kind of payment card that transfers fund directly from the
consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse

C. credit card

D. any of these

Answer:
A.Debit Card
348. ……………..is a card with a microchip that can be used instead of cash and
coins foreverything from vending machines to public transportation.
A. Debit Card

B. Electronic purse
C. credit card

D. any of these

Answer:
B.Electronic purse
349. ………………is basically a secure gate between our organization data and
internet.
A. Network firewall
B. Antivirus

C. both of these

D. none of these

Answer:
A.Network firewall
350. ……………………encrypts payment card transaction data and verifies that both
parties in thetransaction are genuine.
A. SSL
B. SET

C. both of these

D. none of these

Answer:
B.SET
351. ………………is automated methods of recognizing a person based on a
physiological orbehavioral characteristic.
A. Biometrics

B. PIN

C. both of these

D. none of these

Answer:
A.Biometrics
352. In Biometrics,…………………………ID system is designed to prevent more than
one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these

D. none of these

Answer:
A.Positive ID system
353. In Biometrics,…………………………ID system is designed to prevent one person
from usingmore than one identity
A. Positive ID system
B. Negative ID system

C. both of these

D. none of these

Answer:
B.Negative ID system
354. …………………..are program developed by some dishonest people to destroy
the computersystem and the valuable information in it.
A. Network firewall
B. computer virus

C. both of these

D. none of these

Answer:
B.computer virus
355. Which among the following is not an example for computer virus ?
A. Chernobyl
B. Melissa

C. I Love You

D. None of these

Answer:
D.None of these
356. ……………………are special type of software meant for limiting the risks of
being hit bycomputer viruses
A. Network firewall

B. Antivirus

C. both of these
D. none of these

Answer:
B.Antivirus
357. A……………….is a person who gains unauthorized access to a computer
network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer

C. operator

D. none of these

Answer:
A.Hacker
358. ……………….acts like a gate keeper that examines each users identification
before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus

C. both of these

D. none of these

Answer:
A.Network firewall
359. …………..Prevents unauthorized communication into and out of the network,
allowing theorganization to enforce a security policy on traffic between its
network and the internet.
A. Network firewall
B. Antivirus

C. both of these

D. none of these

Answer:
A.Network firewall
360. SET means …………………………….
A. Standard Electronic Technology
B. Standard Electronic Transfer

C. Secure Electronic Transaction

D. None of these
Answer:
C.Secure Electronic Transaction
361. The verification of credit card is done by using…………….. with a
communications link to themerchants acquiring bank
A. Credit card payment terminal

B. Point of Sale

C. All of these

D. none of these

Answer:
C.All of these
362. Creating illegitimate sites that appear to be published by established
organizations byunscrupulous artists is termed as………………………….
A. Spoofing
B. Snooping

C. Sniffing

D. None of these

Answer:
A.Spoofing
363. Gain entry into the user’s system and scan your file system for personal
information isknown as……………….
A. Spoofing
B. Snooping

C. Sniffing

D. None of these

Answer:
B.Snooping
364. ………………attacks are difficult and are only successful if the attacker knows
somethingabout the shopper
A. Spoofing
B. Snooping

C. Sniffing

D. Guessing passwords
Answer:
D.Guessing passwords
365. …………………is the process of making information unintelligible to the
unauthorized user.
A. Spoofing
B. Snooping

C. Sniffing

D. Cryptography

Answer:
D.Cryptography
366. ………………….is the reverse process of encryption, to make the information
readable onceagain
A. Spoofing
B. Decryption

C. Sniffing

D. Cryptography

Answer:
B.Decryption
367. A………………….provides a way to associate the message with the sender and
is theequivalent of an ordinary signature.
A. cyber signature

B. Digital signature

C. SSL

D. none of these

Answer:
B.Digital signature
368. A ………………is an electronic file that uniquely identifies individuals and
websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates

C. SSL

D. none of these
Answer:
B.Digital certificates
369. The information Technology Act [IT ACT] came into effect on
A. 16th November 2000
B. 15th December 2000

C. 17th October 2000

D. none of these

Answer:
C.17th October 2000
370. Information sent over the Internet commonly uses the set of rules
called………………………..
A. TCP/IP
B. FTP

C. HTTP

D. gopher

Answer:
A.TCP/IP
371. E-mail which contain useless material is termed as………………………
A. Spam
B. useless mail

C. trunk mail

D. Junk mail

Answer:
D.Junk mail
372. India has enacted the first IT Act in the year……………………………………
A. 2001
B. 2002

C. 2009

D. 2000

Answer:
D.2000
373. Which of the following crimes were not covered under IT (Amendment) Act,
2008 ?
A. Cyber terrorism

B. Child pornography

C. Video voyeurism

D. None of these

Answer:
D.None of these
374. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. Data protection
B. Telecommunication laws

C. Intellectual property laws

D. None

Answer:
C.Intellectual property laws
375. ……………….is a programme designed o replicate and spread generally with
the victim beingoblivious to its existence
A. hacker
B. software

C. Computer virus

D. none of these

Answer:
C.Computer virus
376. Which one of the following is not a principle of e-commerce ?
A. privacy

B. integrity

C. authentication

D. none of these

Answer:
D.none of these
377. Which of the below is/are goals of E-Commerce?
A. 24×7
B. reach out to larger audience

C. time saving

D. all of the above

Answer:
D.all of the above
378. In which one of the following type of E-Commerce, consumer sells to
consumer directly?
A. C2B
B. B2C

C. B2B

D. C2C

Answer:
D.C2C
379. ……………. is the electronic transmission of business transaction documents
directly between the computers of trading partners in a standard message format
A. Encapsulation
B. EDI

C. ERP

D. Transaction processing

Answer:
B.EDI
380. What does EDI stand for?
A. Electronic Data Interface
B. E-Commerce Data Interface

C. Electronic Data Interaction

D. Electronic Data Interchange

Answer:
D.Electronic Data Interchange
381. When a company buys some raw material from some other company, then it
will come under:
A. B2B
B. B2C

C. C2B

D. C2C

Answer:
A.B2B
382. In traditional commerce, people buy goods and services:
A. over the internet
B. physical visit

C. Both online & offline

D. None of the mentioned

Answer:
B.physical visit
383. Promotion of products in e-commerce can be done by
A. Social media
B. Online Ads

C. Blog

D. All of the mentioned

Answer:
D.All of the mentioned
384. Which of the following is not a dimension of e- commerce security provided
by encryption ?
A. availability
B. integrity

C. non-repudiation

D. confidentiality

Answer:
A.availability
385. Conversion of Plain text to Cipher Text is called………………
A. Encryption
B. Decryption

C. Cryptography
D. none of these

Answer:
A.Encryption
386. In Porter’s Five Forces, the ‘threat of new entrants’ relates to:
A. Barriers to entry

B. Substitutes

C. Switching costs

D. Buyer power

Answer:
A.Barriers to entry
387. Which of the following is true for supply chain management?
A. The physical material moves in the direction
B. Flow of cash backwards through the chain

C. Exchange of information moves in both the

D. All of the above

Answer:
D.All of the above
388. Logistics is the part of a supply chain involved with the forward and reverse
flow of
A. goods
B. services

C. cash

D. All of the above

Answer:
D.All of the above
389. BPM is about:
A. Aligning business processes toorganisational
B. Maintaining a process view of the organisation ratherthan a functional

C. Establishing and maintaining an environment ofcontinuous

D. All of the above


Answer:
D.All of the above
390. CRM is :
A. Customer Relationship
B. Customer Relationship

C. Customer Recovery

D. Consumer Relation

Answer:
A.Customer Relationship
391. The best products to sell in B2C e-commerce are:
A. Small Products
B. Digital Products

C. Special Products

D. Fresh Products

Answer:
B.Digital Products
392. Which of the following is a useful security mechanism when considering
business strategy and IT?
A. encryption

B. decryption

C. firewall

D. All of the mentioned

Answer:
D.All of the mentioned
393. Which type of products is lesser purchased using e- commerce?
A. automobiles
B. books

C. groceries

D. None of the mentioned

Answer:
A.automobiles
394. Which is not the application area of e-commerce?
A. E-Learning
B. E-Banking

C. E-Auction

D. None of the mentioned

Answer:
D.None of the mentioned
395. In which year the IT Act was introduced?
A. 2000
B. 2020

C. 2001

D. 2010

Answer:
A.2000
396. is an early form of E-Commerce.
A. SCM
B. EDI

C. Both SCM & EDI

D. None of the mentioned

Answer:
B.EDI
397. Which of the following is not related to security mechanism?
A. encryption
B. decryption

C. e-cash

D. All of the mentioned

Answer:
C.e-cash
398. Digital Products are best suited for B2C e-commerce because they:
A. Are commodity like products

B. Can be mass- customized and


C. Can be delivered at the time of

D. All of the mentioned

Answer:
D.All of the mentioned
399. Which of the following is part of the four main types of e-commerce?
A. B2B
B. B2C

C. C2B

D. All of the mentioned

Answer:
D.All of the mentioned
400. The dimension of E-Commerce that enables commerce across the
boundaries is called
A. interactivity
B. global reach

C. richness

D. ubiquity

Answer:
B.global reach
401. Reverse logistics is required because
A. Goods are defective

B. Goods are unsold

C. The customers simply change

D. All of the above

Answer:
D.All of the above
402. The purpose of supply chain management is
A. provide customer
B. improve quality of a product

C. integrating supply and demand

D. increase production
Answer:
C.integrating supply and demand
403. Barriers to entry into an industry are likely to be high if:
A. Switching costs are low
B. Differentiation is low

C. Requirement for economies of

D. Access to distribution

Answer:
C.Requirement for economies of
404. A digital signature is required …..i) to tie an electronic message to the
sender’s identityii) for non repudiation of communication by a sender
A. i and ii
B. i, ii and iii

C. i, ii, iii and iv

D. ii, iii and iv

Answer:
B.i, ii and iii
405. Which of the following examines information passing through
switches,hubs, or routers?
A. Key logger
B. Packet sniffer

C. Log analysis tools

D. Screen captures

Answer:
B.Packet sniffer
406. Which type of e-commerce focuses on consumers dealing with eachother?
A. B2B

B. B2C

C. C2B

D. C2C

Answer:
D.C2C
407. Which products are people most likely to be more uncomfortable buyingon
the Internet?
A. Books
B. Furniture

C. Movies

D. All of the above

Answer:
B.Furniture
408. Which products are people most likely to be comfortable buying on
theInternet?
A. Books
B. PCs

C. CDs

D. All of the above

Answer:
D.All of the above
409. Digital products are best suited for B2C e-commerce because they:
A. Are commodity like products
B. Can be mass-customised and personalised

C. Can be delivered at the time of purchase

D. All of the above

Answer:
D.All of the above
410. All of the following are techniques B2C e-commerce companies use toattract
customers, except
A. Registering with search engines
B. Viral marketing

C. Online ads

D. Virtual marketing

Answer:
D.Virtual marketing
411. E-commerce involves
A. marketing
B. advertising

C. warehousing

D. all of the above

Answer:
D.all of the above
412. Which term represents a count of the number of people who visit onesite,
click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through

C. Spam

D. All of the above

Answer:
B.Click-through
413. What is the percentage of customers who visit a Web site and actuallybuy
something called?
A. Affiliate programs
B. Click-through

C. Spam

D. Conversion rate

Answer:
D.Conversion rate
414. What are materials used in production in a manufacturing company orare
placed on the shelf for sale in a retail environment?
A. Direct materials
B. Indirect materials

C. EDI

D. None of the above

Answer:
A.Direct materials
415. What are materials that are necessary for running a modern corporation,but
do not relate to the company’s primary business activities?
A. Direct materials
B. Indirect materials
C. EDI

D. None of the above

Answer:
B.Indirect materials
416. What is another name for materials which cannot be linked to a
specificproduct or process?
A. Direct materials
B. Indirect materials

C. EDI

D. None of the above

Answer:
B.Indirect materials
417. What are plastic cards the size of a credit card that contains anembedded
chip on which digital information can be stored?
A. Customer relationship management systems cards

B. E-government identity cards

C. FEDI cards

D. Smart cards

Answer:
D.Smart cards
418. Which form of e-commerce currently accounts for about 97% of all
ecommerce revenues?
A. B2B
B. B2C

C. C2B

D. C2C

Answer:
A.B2B
419. Which of the following are advantages normally associated with B2B
ecommerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences

D. all of the above

Answer:
D.all of the above
420. If it is easy for competitors to enter the market, the threat of new entrantsis
considered:
A. High
B. Low

C. More

D. Less

Answer:
A.High
421. An industry is less attractive for suppliers when the rivalry among
existingcompetitors is:
A. High
B. Low

C. More

D. Less

Answer:
A.High
422. Unique value auction mainly applies to?
A. New products
B. Second hand products

C. Engineering products

D. None of the above.

Answer:
B.Second hand products
423. Which of the following is a useful security mechanism when
consideringbusiness strategy and IT?
A. encryption

B. decryption

C. firewall
D. all the above

Answer:
D.all the above
424. Which of the following statements accurately reflect the impact
oftechnology?
A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries

C. Technology has increased the threat of substitute products and services

D. all of the above

Answer:
D.all of the above
425. Which type of products is lesser purchased using e-commerce?
A. automobiles
B. books

C. softwares

D. none

Answer:
A.automobiles
426. A business competing in a commodity like environment must focus onwhich
of the following?
A. Price

B. Ease / speed of delivery

C. Ease of ordering

D. all of the above

Answer:
A.Price
427. Which of the following refers to creating products tailored to
individualcustomers?
A. customisation
B. aggregation

C. Direct materials

D. Reverse auction
Answer:
A.customisation
428. Materials used in the normal operation of a business but not related
toprimary business operations are called what?
A. Supplies
B. Direct materials

C. Indirect materials

D. Daily stuff

Answer:
C.Indirect materials
429. What is the name given to an interactive business providing a
centralisedmarket where many buyers and suppliers can come together for
ecommerce or commerce-related activities?
A. Direct marketplace
B. B2B

C. B2C

D. Electronic marketplace

Answer:
D.Electronic marketplace
430. Which form of e-marketplace brings together buyers and sellers
frommultiple industries, often for MRO materials?
A. horizontal
B. Vertical

C. Integrated

D. Inclined

Answer:
A.horizontal
431. Which form of e-marketplace brings together buyers and sellers from
thesame industry?
A. horizontal

B. Vertical

C. Integrated

D. Inclined
Answer:
B.Vertical
432. Which, if any, of the following types of ads are people most willing
totolerate?
A. pop-under ad
B. pop-up ad

C. banner ad

D. none of the above

Answer:
D.none of the above
433. Which of the following is an Internet-based company that makes it easyfor
one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment

C. conversion rates

D. financial cybermediary

Answer:
D.financial cybermediary
434. Which of the following is a method of transferring money from onepersons
account to another?
A. electronic check
B. credit card

C. e-transfer

D. none of the above

Answer:
A.electronic check
435. An electronic check is one form of what?
A. e-commerce
B. online banking

C. e-cash

D. check

Answer:
C.e-cash
436. If you need to transfer money to another person via the internet, which ofthe
following methods could you use?
A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer:
D.all of the above
437. Which of the following permits the transmission of a bill, along withpayment
of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer:
C.electronic bill presentment and payment
438. A combination of software and information designed to provide securityand
information for payment is called a?
A. digital wallet
B. pop up ad

C. shopping cart

D. encryption

Answer:
A.digital wallet
439. What is the name for direct computer-to-computer transfer of
transactioninformation contained in standard business documents?
A. internet commerce
B. e-commerce

C. transaction information transfer

D. electronic data interchange

Answer:
D.electronic data interchange
440. Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used to decrypt data. The key used to encrypt data is called the
_____ key, while the key used to decrypt data is called the _____n key.
A. encryption, decryption
B. private, public

C. encryption, public

D. public, private

Answer:
D.public, private
441. When a transaction is processed online, how can the merchant verify
thecustomers identity?
A. use secure sockets layers
B. use secure electronic transactions

C. use electronic data interchange

D. use financial electronic data interchange

Answer:
B.use secure electronic transactions
442. The practice of forging a return address on an e-mail so that the recipientis
fooled into revealing private information is termed?
A. hacking

B. cracking

C. dumpster diving

D. spoofing

Answer:
D.spoofing
443. What is an internal organisational Internet that is guarded against outside
access by a special security feature called a firewall (which can be software,
hardware, or a combination of the two)?
A. Client/server network
B. Intranet

C. Extranet

D. Thin client
Answer:
B.Intranet
444. What is an intranet that is restricted to an organisation and certainoutsiders,
such as customers and suppliers?
A. Client/server network
B. Intranet

C. Extranet

D. Thin client

Answer:
C.Extranet
445. What is a detailed process for recovering information or an IT system inthe
event of a catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer:
A.Disaster recovery plan
446. What is a separate facility that does not have any computer equipmentbut is
a place where the knowledge workers can move after the disaster?
A. Disaster recovery plan
B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer:
C.Cold site
447. What is a separate and fully equipped facility where the company canmove
immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site

C. Cold site

D. Disaster recovery cost curve


Answer:
B.Hot site
448. What charts (1) the cost to your organisation of the unavailability
ofinformation and technology and (2) the cost to your organisation of recovering
from a disaster over time?
A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer:
D.Disaster recovery cost curve
449. Which factor determines when the IT system will be available forknowledge
workers to access?
A. Availability
B. Accessibility

C. Reliability

D. None of the above

Answer:
A.Availability
450. Which factor determines who has the right to access different types of
ITsystems and information?
A. Availability
B. Accessibility

C. Reliability

D. Scalability

Answer:
B.Accessibility
451. Which factor ensures the IT systems are functioning correctly andproviding
accurate information?
A. Availability

B. Accessibility

C. Reliability
D. Scalability

Answer:
C.Reliability
452. Which factor represents how well your system can adapt to
increaseddemands?
A. Availability
B. Accessibility

C. Reliability

D. Scalability

Answer:
D.Scalability
453. Which factor represents a systems ability to change quickly?
A. Flexibility
B. Performance

C. Capacity planning

D. Benchmark

Answer:
A.Flexibility
454. What is a set of conditions used to measure how well a product orsystem
functions?
A. Flexibility
B. Performance

C. Capacity planning

D. Benchmark

Answer:
D.Benchmark
455. What determines the future IT infrastructure requirements for
newequipment and additional network capacity?
A. Flexibility
B. Performance

C. Capacity planning

D. Benchmark
Answer:
C.Capacity planning
456. What defines all of the steps or business rules, from beginning to
end,required for a process to run correctly?
A. Workflow

B. EIP

C. Workflow system

D. SLA

Answer:
A.Workflow
457. Which will not harm computer resources?
A. firewall
B. Virus

C. Trojan horse

D. None of the above

Answer:
A.firewall
458. Which of the following is the primary characteristic of an intranet?
A. People outside the organisation can access it
B. People inside the organisation cant access it

C. People outside the organisation cant access it

D. None of the above

Answer:
C.People outside the organisation cant access it
459. Which concept suggests that different applications and computersystems
should be able to communicate with one another?
A. Integration
B. Web services

C. Scalability

D. Interoperability

Answer:
D.Interoperability
460. Which service encompasses all technologies used to transmit andprocess
information on an across a network?
A. Interoperability
B. Scalability

C. Benchmarking

D. Web services

Answer:
D.Web services
461. Which process can prevent data from losing due to computer problemsor
human errors?
A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer:
A.backup
462. Which process is used to reinstall data from a copy when the originaldata
has been lost?
A. backup
B. recovery

C. benchmarking

D. data cleansing

Answer:
B.recovery
463. Who breaks into other peoples computer systems and steals anddestroys
information?
A. Hackers
B. softwares

C. Hacktivists

D. Script kiddies

Answer:
A.Hackers
464. What is software that comes hidden in free downloadable software and
tracks your online movements, mines the information stored on your computer,
or uses your computers CPU and storage for some task you know nothing about?
A. Web log
B. Clickstream

C. Anonymous Web browsing service

D. None of the above

Answer:
D.None of the above
465. What is a type of virus that spreads itself, not just from file to file, butfrom
computer to computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm

C. Denial-of-service attack

D. None of the above

Answer:
B.Worm
466. What floods a Web site with so many requests for service that it slowsdown
or crashes?
A. Computer virus
B. Worm

C. Denial-of-service attack

D. None of the above

Answer:
C.Denial-of-service attack
467. What is the process of evaluating IT assets, their importance to the
organisation, and their susceptibility to threats, to measure the risk exposure of
these assets?
A. Risk management

B. Risk assessment

C. Security

D. None of the above


1.Which of the following describes e‐commerce?

a. Doing business electronically

b. Doing business

c. Sale of goods

d. All of the above

Answer: A

2.Which of the following is part of the four main types for e‐commerce?

a. B2B

b. B2C

c. C2B

d. All of the above

Answer: D

3.Which segment do eBay, Amazon.com belong?

a. B2Bs

b. B2Cs

c. C2Bs

d. C2Cs

Answer: B

4.Which type of e‐commerce focuses on consumers dealing with each other?

a. B2B

b. B2C

c. C2B
d. C2C

Answer: D

5.Which segment is eBay an example?

a. B2B

b. C2B

c. C2C

d. None of the above

Answer: D

6.Which type deals with auction?

a. B2B

b. B2C

c. C2B

d. C2C

Answer: D

7.In which website Global Easy Buy is facilitated?

a. Ebay.com

b. Amazon.com

c. Yepme.com

d. None of these

Answer: A

8.The best products to sell in B2C e‐commerce are:

a. Small products
b. Digital products

c. Specialty products

d. Fresh products

Answer: B

9.Which products are people most likely to be more uncomfortable buying on the
Internet?

a. Books

b. Furniture

c. Movies

d. All of the above

Answer: B

10. Which products are people most likely to be comfortable buying on the
Internet?

a. Books

b. PCs

c. CDs

d. All of the above

Answer: D

11. Digital products are best suited for B2C e‐commerce because they:

a. Are commodity like products

b. Can be mass‐customized and personalized

c. Can be delivered at the time of purchase

d. All of the above


Answer: D

12. The solution for all business needs is

a. EDI

b. ERP

c. SCM

d. None of the above

Answer: B

13. All of the following are techniques B2C e‐commerce companies use to attract
customers,

except:

a. Registering with search engines

b. Viral marketing

c. Online ads

d. Virtual marketing

Answer: D

14. Which is a function of E‐commerce

a. marketing

b. advertising

c. warehousing

d. all of the above

Answer: D

15. Which is not a function of E‐commerce


a. marketing

b. advertising

c. warehousing

d. none of the above

Answer: C

16. Which term represents a count of the number of people who visit one site,
click on an ad, and

are taken to the site of the advertiser?

a. Affiliate programs

b. Click‐through

c. Spam

d. All of the above

Answer: B

17. What is the percentage of customers who visit a Web site and actually buy
something called?

a. Affiliate programs

b. Click‐through

c. Spam

d. Conversion rate

Answer: D

18. What are materials used in production in a manufacturing company or are


placed on the shelf

for sale in a retail environment?


a. Direct materials

b. Indirect materials

c. EDI

d. None of the above

Answer: A

19. What are materials that are necessary for running a modern corporation, but
do not relate to

the company's primary business activities?

a. Direct materials

b. Indirect materials

c. EDI

d. None of the above

Answer: B

20. What are ballpoint pens purchased by a clothing company?

a. Direct materials

b. Indirect materials

c. EDI

d. None of the above

Answer: B

21. What is another name for?

a. Direct materials

b. Indirect materials
c. EDI

d. None of the above

Answer: B

22. What is the process in which a buyer posts its interest in buying a certain
quantity of items, and

sellers compete for the business by submitting successively lower bids until there
is only one

seller left?

a. B2B marketplace

b. Intranet

c. Reverse auction

d. Internet

Answer: C

23. What are plastic cards the size of a credit card that contains an embedded
chip on which digital

information can be stored?

a. Customer relationship management systems cards

b. E‐government identity cards

c. FEDI cards

d. Smart cards

Answer: D

24. Most individuals are familiar with which form of e‐commerce?

a. B2B
b. B2C

c. C2B

d. C2C

Answer: B

25. Which form of e‐commerce currently accounts for about 97% of all e‐
commerce revenues?

a. B2B

b. B2C

c. C2B

d. C2C

Answer: A

26. Which of the following are advantages normally associated with B2B e‐
commerce?

a. Shorter cycle times

b. Reduction in costs

c. Reaches wider audiences

d. all of the above

Answer: D

27. If the threat of substitute products or services is low it is a(n):

a. Disadvantage to the supplier

b. Advantage to the buyer

c. Advantage to the supplier

d. None of the above


Answer: C

28. The threat of new entrants is high when it is:

a. Hard for customers to enter the market

b. Hard for competitors to enter the market

c. Easy for competitors to enter the market

d. Easy for customers to enter the market

Answer: C

29. If it is easy for competitors to enter the market, the threat of new entrants is
considered:

a. High

b. Low

c. More

d. Less

Answer: A

30. An industry is less attractive for suppliers when the rivalry among existing
competitors is:

a. High

b. Low

c. More

d. Less

Answer: A

31. Unique value auction is mainly applies to?

a. New products
b. Second hand products

c. Engineering products

d. None of the above

i. Answer: B

32. Paisapay is facilitated in

a. eBay.co.in

b. amazon.com

c. flipkart.com

d. none of the above

Answer: A

33. Which of the following is a useful security mechanism when considering


business strategy and

IT?

a. encryption

b. decryption

c. firewall

d. all the above

Answer: D

34. Which of the following is not related to security mechanism

a. encryption

b. decryption

c. e‐cash
d. all the above

Answer: C

35. A product or service that customers have come to expect from an industry,
which must be

offered by new entrants if they wish to compete and survive, is known as a(n)?

a. Switching costs

b. Loyalty programs

c. Entry barriers

d. Affiliate programs

Answer: C

36. Which of the following statements accurately reflect the impact of technology?

a. Technology has caused buyer power to increase

b. Technology has lessened the entry barriers for many industries

c. Technology has increased the threat of substitute products and services

d. all of the above

Answer: D

37. A business cannot be all things to all people. Instead, a business must:

a. Identify target customers

b. Identify the value of products/services as perceived by customers

c. all of the above

d. None of the above

Answer: C
38. How the transactions occur in e‐commerce?

a. Using e‐medias

b. Using computers only

c. Using mobile phones only

d. None of the above

Answer: A

39. Which type of products is lesser purchased using ecommerce?

a. automobiles

b. books

c. softwares

d. none

Answer: A

40. A business competing in a commodity like environment must focus on which


of the following?

a. Price

b. Ease / speed of delivery

c. Ease of ordering

d. all of the above

Answer: D

41. Which of the following refers to creating products tailored to individual


customers?

a. customization

b. aggregation
c. Direct materials

d. Reverse auction

Answer: A

42. Materials used in the normal operation of a business but not related to
primary business

operations are called what?

a. Supplies

b. Direct materials

c. Indirect materials

d. Daily stuff

Answer: C

43. Amazon.com is well‐known for which e‐commerce marketing technique?

a. Banner ads

b. Pop‐up ads

c. Affiliate programs

d. Viral marketing

Answer: C

44. What is the name given to an interactive business providing a centralized


market where many

buyers and suppliers can come together for e‐commerce or commerce‐related


activities?

a. Direct marketplace

b. B2B
c. B2C

d. Electronic marketplace

Answer: D

45. Which form of e‐marketplace brings together buyers and sellers from multiple
industries, often

for MRO materials?

a. horizontal

b. Vertical

c. Integrated

d. Inclined

Answer: A

46. Which form of e‐marketplace brings together buyers and sellers from the
same industry?

a. horizontal

b. Vertical

c. Integrated

d. Inclined

Answer: B

47. Which type of add appears on a web page?

a. pop‐under ad

b. Pop‐up ad

c. Banner ad

d. Discount ad
Answer: C

48. What type of ad appears on top of a web page?

a. pop‐under ad

b. pop‐up ad

c. banner ad

d. discount ad

Answer: B

49. What type of ad appears under a web page?

a. pop‐under ad

b. pop‐up ad

c. banner ad

d. discount ad

Answer: A

50. Which, if any, of the following types of ads are people most willing to tolerate?

a. pop‐under ad

b. pop‐up ad

c. banner ad

d. none of the above

Answer: D

51. Which of the following is an Internet‐based company that makes it easy for
one person to pay

another over the Internet?


a. electronic check

b. electronic bill presentment and payment

c. conversion rates

d. financial cybermediary

Answer: D

52. Which of the following is a method of transferring money from one person's
account to

another?

a. electronic check

b. credit card

c. e‐transfer

d. none of the above

Answer: A

53. An electronic check is one form of what?

a. e‐commerce

b. online banking

c. e‐cash

d. check

54. If you need to transfer money to another person via the internet, which of the
following

methods could you use?

a. financial cybermediary

b. electronic check
c. electronic bill presentment and payment

d. all of the above

Answer: D

55. Which of the following permits the transmission of a bill, along with payment
of that bill, to be

conducted over the Internet?

a. financial cybermediary

b. electronic check

c. electronic bill presentment and payment

d. all of the above

Answer: C

56. A combination of software and information designed to provide security and


information for

payment is called a what?

a. digital wallet

b. pop up ad

c. shopping cart

d. encryption

Answer: A

57. What is the name for direct computer‐to‐computer transfer of transaction


information

contained in standard business documents?

a. internet commerce
b. e‐commerce

c. transaction information transfer

d. electronic data interchange

Answer: D

58. Which of the following is used in B2B to pay for purchases?

a. e‐commerce

b. financial electronic data interchange

c. electronic data exchange

d. electronic checks

Answer: B

59. Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used

to decrypt data. The key used to encrypt data is called the _____ key, while the
key used to

decrypt data is called the _____ key.

a. encryption, decryption

b. private, public

c. encryption, public

d. public, private

Answer: D

60. Secure Sockets Layers does which of the following?

a. creates a secure, private connection to a web server

b. encrypts information
c. sends information over the internet

d. all of the above

Answer: D

61. When a transaction is processed online, how can the merchant verify the
customer's identity?

a. use secure sockets layers

b. use secure electronic transactions

c. use electronic data interchange

d. use financial electronic data interchange

Answer: B

62. The practice of forging a return address on an e‐mail so that the recipient is
fooled into

revealing private information is termed?

a. hacking

b. cracking

c. dumpster diving

d. spoofing

Answer: D

63. What is a model of a proposed product, service, or system?

a. Prototyping

b. Prototype

c. Proof‐of‐concept prototype

d. Selling prototype
Answer: B

64. What is an internal organizational Internet that is guarded against outside


access by a special

security feature called a firewall (which can be software, hardware, or a


combination of the

two)?

a. Client/server network

b. Intranet

c. Extranet

d. Thin client

Answer: B

65. What is an intranet that is restricted to an organization and certain outsiders,


such as customers

and suppliers?

a. Client/server network

b. Intranet

c. Extranet

d. Thin client

Answer: C

66. What is a detailed process for recovering information or an IT system in the


event of a

catastrophic disaster such as a fire or flood?

a. Disaster recovery plan

b. Hot site
c. Cold site

d. Disaster recovery cost curve

Answer: A

67. What is a separate facility that does not have any computer equipment but is a
place where the

knowledge workers can move after the disaster?

a. Disaster recovery plan

b. Hot site

c. Cold site

d. Disaster recovery cost curve

Answer: C

68. What is a separate and fully equipped facility where the company can move
immediately after

the disaster and resume business?

a. Disaster recovery plan

b. Hot site

c. Cold site

d. Disaster recovery cost curve

Answer: B

69. What charts (1) the cost to your organization of the unavailability of
information and technology

and (2) the cost to your organization of recovering from a disaster over time?

a. Disaster recovery plan


b. Hot site

c. Cold site

d. Disaster recovery cost curve

Answer: D

70. Which factor determines when your IT system will be available for knowledge
workers to

access?

a. Availability

b. Accessibility

c. Reliability

d. None of the above

Answer: A

71. Which factor determines who has the right to access different types of IT
systems and

information?

a. Availability

b. Accessibility

c. Reliability

d. Scalability

Answer: B

72. Which factor ensures your IT systems are functioning correctly and providing
accurate

information?
a. Availability

b. Accessibility

c. Reliability

d. Scalability

Answer: C

73. Which factor represents how well your system can adapt to increased
demands?

a. Availability

b. Accessibility

c. Reliability

d. Scalability

Answer: D

74. Which factor represents a system's ability to change quickly?

a. Flexibility

b. Performance

c. Capacity planning

d. Benchmark

Answer: A

75. What is a set of conditions used to measure how well a product or system
functions?

a. Flexibility

b. Performance

c. Capacity planning
d. Benchmark

Answer: D

76. What determines the future IT infrastructure requirements for new


equipment and additional

network capacity?

a. Flexibility

b. Performance

c. Capacity planning

d. Benchmark

Answer: C

77. What automates business processes?

a. Workflow

b. ASP

c. Workflow system

d. EIP

Answer: C

78. What defines all of the steps or business rules, from beginning to end,
required for a process to

run correctly?

a. Workflow

b. EIP

c. Workflow system

d. SLA
Answer: A

79. What sends work assignments through an e‐mail system?

a. Database‐based enterprise information portal

b. Messaging‐based enterprise information portal

c. Database‐based workflow system

d. Messaging‐based workflow system

Answer: D

80. Which will not harm computer resources

a. firewall

b. Virus

c. Trojan horse

d. None of the above

Answer: A

81. Which is not a function of ERP?

a. Warehousing

b. sales

c. scheduling

d. None of the above

Answer: D

82. Which is a function of ERP?

a. Warehousing

b. sales
c. scheduling

d. all of the above

Answer: D

83. Which of the following is the primary characteristic of an intranet?

a. People outside the organization can access it

b. People inside the organization can't access it

c. People outside the organization can't access it

d. None of the above

Answer: C

84. Which concept suggests that different applications and computer systems
should be able to

communicate with one another?

a. Integration

b. Web services

c. Scalability

d. Interoperability

Answer: D

85. Which service encompasses all technologies used to transmit and process
information on an

across a network?

a. Interoperability

b. Scalability

c. Benchmarking
d. Web services

Answer: D

86. Which process can prevent data from lose due to computer problems or
human errors?

a. backup

b. recovery

c. benchmarking

d. data cleansing

Answer: A

87. Which process is used to reinstall data from a copy when the original data has
been lost?

a. backup

b. recovery

c. benchmarking

d. data cleansing

Answer: B

88. What describes a process of continuously measuring results and comparing


those results to

optimal performance so that actual performance may be improved?

a. Performance

b. Capacity planning

c. Benchmarking

d. Data cleansing
Answer: C

89. Who protects system from external threats?

a. firewall

b. EDI

c. ERP

d. Script kiddies

Answer: A

90. Who breaks into other people's computer systems and steals and destroys
information?

a. Hackers

b. softwares

c. Hacktivists

d. Script kiddies

Answer: a

91. What is software that comes hidden in free downloadable software and tracks
your online

movements, mines the information stored on your computer, or uses your


computer's CPU and

storage for some task you know nothing about?

a. Web log

b. Clickstream

c. Anonymous Web browsing service

d. None of the above


Answer: D

92. ERP stands for

a. Enterprise resolution planning

b. Enterprise reverse planning

c. Enterprise resource planning

d. None of the above

Answer: C

93. Which is not a component of ERP?

a. Legacy systems

b. Bolt on applications

c. Operational database

d. Cybersoft

Answer: D

94. Which is not a function of ERP?

a. Human resource management

b. financial

c. warehousing

d. None of the above

Answer: D

95. What is a type of virus that spreads itself, not just from file to file, but from
computer to

computer via e‐mail and other Internet traffic?


a. Computer virus

b. Worm

c. Denial‐of‐service attack

d. None of the above

Answer: B

96. What floods a Web site with so many requests for service that it slows down
or crashes?

a. Computer virus

b. Worm

c. Denial‐of‐service attack

d. None of the above

Answer: C

97. What harnesses far‐flung computers together by way of the Internet or a


virtual private network

to share CPU power, databases, and database storage?

a. Computer virus

b. Worm

c. Denial‐of‐service attack

d. None of the above

Answer: D

98. What consists of the identification of risks or threats, the implementation of


security measures,

and the monitoring of those measures for effectiveness?


a. Risk management

b. Risk assessment

c. Security

d. None of the above

Answer: A

99. What is the process of evaluating IT assets, their importance to the


organization, and their

susceptibility to threats, to measure the risk exposure of these assets?

a. Risk management

b. Risk assessment

c. Security

d. None of the above

Answer: B

100. What is the process of making a copy of the information stored on a


computer?

a. Backup

b. Anti‐virus

c. Firewall

d. Biometrics

Answer: A

101. What software detects and removes or quarantines computer viruses?

a. Backup

b. Anti‐virus
c. Firewall

d. Biometrics

Answer: B

102. What is hardware and/or software that protects computers from intruders?

a. Backup

b. Anti‐virus

c. Firewall

d. Biometrics

Answer: C

103. What is the use of physical characteristics — such as your fingerprint, the
blood vessels

in the retina of your eye, the sound of your voice, or perhaps even your breath —
to provide

identification?

a. Backup

b. Anti‐virus

c. Firewall

d. Biometrics

Answer: D

104. All of the following are considered biometrics, except:

a. Fingerprint

b. Retina

c. Password
d. Voice

Answer: C

105. What scrambles the contents of a file so you can't read it without having the
right

decryption key?

a. Encryption

b. Intrusion‐detection software

c. Security‐auditing software

d. All of the above

Answer: A

106. What is an encryption system that uses two keys: a public key that everyone
can have

and a private key for only the recipient?

a. Encryption

b. Public key encryption

c. Intrusion‐detection software

d. Security‐auditing software

Answer: B

107. What looks for people on the network who shouldn't be there or who are
acting

suspiciously?

a. Encryption

b. Public key encryption


c. Intrusion‐detection software

d. Security‐auditing software

Answer: C

108. What checks out your computer or network for potential weaknesses?

a. Encryption

b. Public key encryption

c. Security‐auditing software

d. None of the above

Answer: C

109. Which of the following to viruses harm?

a. Your keyboard

b. Your monitor

c. Your processor

d. Viruses do not harm any of the above

Answer: D

110. Which of the following can a virus do?

a. Hurt your hardware

b. Hurt any files they weren't designed to attack

c. Infect files on write‐protected disks

d. None of the above

Answer: D

111. In simple terms, what does risk assessment ask?


a. What can go wrong?

b. How likely is it to go wrong?

c. What are the possible consequences if it does go wrong?

d. All of the above

Answer: D

112. Which of the following is a characteristic of a firewall?

a. Examines each message as it seeks entrance to the network

b. Blocks messages without the correct markings from entering the network

c. Detects computers communicating with the Internet without approval

d. All of the above

Answer: D

113. Which of the following are ways to prove access rights?

a. What you know, like a password

b. What you have, like an ATM card

c. What you look like

d. All of the above

Answer: D

114. Which item can a password be used to protect?

a. Network

b. File

c. Folder

d. All of the above


Answer: D

115. Which is the most important component of IT?

a. Information

b. People

c. Information technology

d. Computers

Answer: B

116. Which of the following applies to the implementation of an idea?

a. Copyright

b. Intellectual property

c. Patent

d. Denial‐of‐service attack

Answer: C

117. When you purchase copyrighted software, what actually are you paying for?

a. The cost of the CDs, manuals, and development of the software

b. The cost of the CDs, manuals, and a share of the cost of the software
development

c. A share of the cost of software development

d. All of the above

Answer: D

118. Which of the following is not a dimension of privacy?

a. Need for personal space


b. Need to feel in control of our possessions

c. Need to feel in control of our personal information

d. All of the above are dimensions of privacy

Answer: D

119. Which of the following captures screen images?

a. Key logger

b. Packet sniffer

c. Log analysis tools

d. Screen capture software

Answer: D

120. Which of the following examines information passing through switches,


hubs, or

routers?

a. Key logger

b. Packet sniffer

c. Log analysis tools

d. Screen captures

Answer: B

121. Which of the following records logons and deletions?

a. Key logger

b. Packet sniffer

c. Log analysis tools


d. Screen captures

Answer: C

122. E‐mail messages may be stored on which of the following computers?

a. Sender's computer

b. Sender's server

c. Recipient's server

d. All of the above

Answer: D

123. What might identity thieves do with your identity?

a. Apply for and use credit cards

b. Apply for a loan

c. Change their identity

d. All of the above

Answer: D

124. Which of the following is not a common approach to phishing?

a. Send an official‐looking e‐mail asking for confidential information

b. Ask people to fill out and return a fake letter using postal mail

c. Ask people to click a link in an e‐mail to open a submission form on a web page

d. All of the above are uncommon approaches to phishing

Answer: B

125. A technique used to gain personal information for the purpose of identity
theft, often by
e‐mail, is called?

a. Phishing

b. Carding

c. Brand spoofing

d. All of the above

Answer: D

126. Companies can gather information about employees and potential employees
from

which of the following places?

a. Job applications

b. Credit reports

c. Companies that track Web surfers

d. All of the above

Answer: D

127. Cyber slacking consists of what activities?

a. Visiting “inappropriate” web sites

b. Visiting news sites

c. Chatting online with others about non‐work topics

d. All of the above

Answer: D

128. Cookies are used to do which of the following?

a. Store your ID and password for subsequent logons to the site


b. Store contents of electronic shopping carts

c. To track web activity

d. All of the above and more

Answer: D

129. Unsolicited e‐mail is called what?

a. Junk mail

b. Spam

c. Extra mail

d. None of the above

Answer: B

130. What is the name of the new anti‐Spam bill?

a. No‐Spam

b. CAN‐Spam

c. Spam‐Away

d. Stop Spam

Answer: B

131. What is the legal protection afforded an expression of an idea, such as a song,
video

game, and some types of proprietary documents?

a. Ethics

b. Intellectual property

c. Copyright
d. Fair Use Doctrine

Answer: C

132. What is the unauthorized use, duplication, distribution or sale of copyrighted


software?

a. Fair Use Doctrine

b. Pirated software

c. Counterfeit software

d. Privacy

Answer: B

133. What is a program, when installed on a computer, records every keystroke


and mouse

click?

a. Key logger software

b. Hardware key logger

c. Cookie

d. Adware

Answer: A

134. What is software you don't want hidden inside software you do want?

a. Adware

b. Trojan‐horse software

c. Spyware

d. All of the above

Answer: D
135. What is an electronic representation of cash?

a. Digital cash

b. Electronic cash

c. E‐cash

d. All of the above

Answer: D

136. What is a fully‐equipped computer that you wear as a piece of clothing or


attached to a

piece of clothing similar to the way you would carry your cell phone on your belt?

a. Wearable computer

b. GPS

c. Implant chip

d. None of the above

Answer: A

137. What is a technology‐enabled microchip implanted into the human body?

a. Wearable computer

b. GPS

c. Implant chip

d. None of the above

Answer: C

138. Which of the following is not a reason why digital cash has turned out to be
extremely

difficult?
a. If your system crashes you lose your money

b. There is only one standard

c. Digital cash makes money laundering easy

d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Answer: B

139. Smart card is better protected than other cards using

a. Encryption

b. Firewall

c. Hub

d. All the above

Answer: A

140. Trust card is introduced by

a. BSNL and itzcash

b. BSNL and oxicash

c. BSNL only

d. None

Answer: A

141. PaisaPay is offered only by

a. Homeshop18.com

b. eBay.in

c. amazon.com

d. none
Answer: B

142. The E‐payment mechanism widely used in B2B is

a. Credit card

b. Debit card

c. Master card

d. E‐cheque

Answer: D

143. Which type of technology will increase portability and mobility?

a. Implant chips

b. Micro‐payments

c. Internet phone calls

d. All of the above

Answer: D

144. Which of the following an accurate statement about internet phone calls?

a. They are possible but not yet free

b. They are not possible

c. They are currently standard practice

d. None of the above is an accurate statement about internet phone calls

Answer: A

145. What are the most commonly used input devices today?

a. Keyboard

b. Mouse
c. All of the above

d. None of the above

Answer: C

146. Which of the following can be used to help identify people in a crowd?

a. Biochip

b. Implant chip

c. Facial recognition software

d. Vision chip

Answer: C

147. Which one is also known as plastic money?

a. Credit card

b. Debit card

c. Paper cash

d. All of the above

Answer: A

148. E‐cheques are …………………

a.Prepaid

b.Postpaid

c. Both prepaid and postpaid

Answer: A

149. Digital signature is a

a. Digital id,send as an attachment to a web page/e‐mail/message


b. Is used for verifying the attachments send using web

c. Both a and b

d. None of these

Answer: C

150. Which one is the component of cybercash payment system

a. CC user software

b. CC merachant software

c. CC Server Software

d. All of the above

Answer: D

151. The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

a. Memory

b. Microchip

c. E‐cash

d. None of the above

Answer: B

152. The smart card which use antenna for reading and writing data

a) Contact smart card

b) Contactless smart card

c) Proximity smart card

d) Both B and C

Answer: D
153. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only.

a) Contact smart card

b) Contactless smart card

c) Proximity smart card

d) Both B and C

Answer: C

154. Which of the smart card uses a sim like structure for reading and writing
data

a) Contact smart card

b) Contactless smart card

c) Proximity smart card

d) Both B and C

Answer: A

155. Which is not a feature of ecommerce

a. SCM

b. EDI

c. WWW

d. BPR

Answer: D

156. What is I stands in CIA of smart card?

a. International

b. Integrity
c. Identity

d. None of the above

Answer: B

157. What is A stands in CIA of smart card?

a. auditing

b. authenticity

c. authorized

d. None of the above

Answer: B

158. What is C stands in CIA of smart card?

a. confidentiality

b. conference

c. congress

d. None of the above

Answer :A

159. Which one is the third party payment providers who offer digital wallets for
E‐

merchants

a. Oxicash

b. PayMate

c. PayPass

d. All the above


Answer: D

160. Which is used to identify mobile money

a. MCID

b. MMID

c. RSID

d. NONE OF THE ABOVE

Answer: B

161. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.

a. Threat

b. Danger

c. Error

d. None of the above

Answer: A

162. Which one is not a encryption technique

a. RSA

b. DES

c. AES

d. NONE OF THE ABOVE

Answer: D

163. Which one is not used as a security mechanism?

a. Encryption

b. Cryptography
c. Wallets

d. Digital signature

Answer :C

164. Which e‐government arena is being used when governmental agencies send
out and

accept bids for work?

a) G2G

b) G2B

c) G2C

d) G2G

Answer: B

165. Secret key is used for

a. Public key cryptography

b. Private key cryptography

c. Asymmetric key cryptography

d. None of these

Answer: B

166. Which one is a communication channel threat?

a. Sniffer programs

b. Cyber vandalism

c. Integrity threats

d. All of the above


Answer: D

167. Which one is a communication channel security protocol?

a. SSL

b. S‐HTTP

c. SET

d. ALL OF THE ABOVE

Answer: D

168. The protocol which allows the file transfer between computers is

a. TCP/IP

b. FTP

c. HTTP

d. SOA

Answer: B

169. E‐Banking is also known as

a. ATMs

b. Net banking

c. Traditional banking

d. None of these

Answer: B

170. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce

a. EFT

b. EPS
c. PayPal

d. None of these

Answer: B

171. Which one is a client level threat?

a. Malicious code

b. Viruses

c. Active contents

d. All the above

Answer: D

172. Which one is not an encryption technique?

a. RSA

b. DES

c. AES

d. FTP

Answer: D

173. Which one is an encryption technique?

a. RSA

b. DES

c. AES

d. All of the above

Answer: D

174. Which one is not a server level threat?


a. Malicious code

b. CGI threats

c. Database threats

d. Buffer overflows

Answer: A

175. Which one is not a physical threat?

a. Hacking

b. Storm

c. Phishing

d. None of the above

Answer: A

176. Which one is a physical threat?

a. Phishing

b. Storm

c. Earthquake

d. All the above

Answer: D

177. Which one is a logical threat?

a. Hacking

b. Storm

c. Phishing

d. None of the above


Answer: A

178. The basic elements of website is

a. Home page

b. Web pages

c. Links and banners

d. All the above

Answer: D

179. Which one is a threat for E‐commerce

a. Trojan horse

b. firewall

c. encryption

d. None

Answer: A

180. Secure communication means

a. Protect transmission of credit card number

b. Guarantee privacy of customer

c. Unauthorized access of payment details

d. All the above

Answer: D

181. Which one is not an offline payment mode?

a. Cash on delivery

b. Cash before delivery


c. Demand drafts

d. e‐cheque

Answer: D

182. Which one is an offline payment mode?

a. Cash on delivery

b. Cash before delivery

c. Credit card

d. Both a and b

Answer: D

183. Which one is not an online payment mode?

a. Cash on delivery

b. Debit card

c. Credit card

d. e‐cheque

Answer: A

184. Which one is an online payment mode?

a. Cash on delivery

b. Cash before delivery

c. Demand drafts

d. e‐cheque

Answer: D

185. which one is not an E‐payment method used in India


a. Debit card

b. Credit card

c. e‐cheque

d. none

Answer: D

186. OTP stands for

a. On Time Password

b. On Time processing

c. One time processor

d. None

Answer: A

187. Which one is not a threat for E‐commerce

a. Trojan horse

b. Viruses

c. Worm

d. None

Answer: D

188. Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography.

a. Public key

b. Symmetric

c. Asymmetric

d. None
Answer: B

189. Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography.

a. Private key

b. Symmetric

c. Asymmetric

d. None

Answer: C

190. What is the legal protection afforded an expression of an idea, such as a


song, video

game, and some types of proprietary documents?

a. Ethics

b. Intellectual property

c. Copyright

d. Fair Use Doctrine

Answer: C

191. Cyber slacking consists of what activities?

a. Visiting “inappropriate” web sites

b. Visiting news sites

c. Chatting online with others about non‐work topics

d. All of the above

Answer: D

192. What is an arrangement made between e‐commerce sites that direct users
from one
site to the other?

a. Spam

b. Viral marketing

c. Affiliate programs

d. None of the above

Answer: C

193. Which type deals with auction?

a. B2B

b. B2C

c. C2B

d. C2C

Answer: D

194. Which one is not a layer of E‐commerce infrastructure

a. Physical layer

b. Product layer

c. Service layer

d. None

Answer: D

195. Which will harm computer resources

a. Worm

b. Virus

c. Trojan horse
d. All the above

Answer: D

196. The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Decryption

b. Cryptography

c. Firewall

d. All the above

Answer: B

197. During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Integrity

b. Security

c. Confidentiality

d. All the above

Answer: D

198. The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Macro

b. Trojan horse

c. Script virus

d. None of the above

Answer: A

199. The virus that are attached with vb and java files are called

a. Macro
b. Trojan horse

c. Script virus

d. None of the above

Answer: C

200. The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Mails

b. Pen drives and cds

c. Websites

d. All the above

Answer: D

Answer:
A.Risk management

1. The dimension of e-commerce that enables commerce across national boundaries is called
_______.
A. interactivity.
B. global reach.
C. richness.
D. ubiquity.
ANSWER: B

2. E-commerce technologies have improved upon traditional commerce technologies


in______.
A. richness.
B. reach.
C. both richness and reach.
D. neither richness nor reach.
ANSWER: C

3. Which one of the following is not one of the major types of e-commerce?
A. C2B.
B. B2C.
C. B2B.
D. C2C.
ANSWER: A

4. Compared to B2C e-commerce, B2B e-commerce is ______.


A. of equal size.
B. slightly smaller.
C. slightly larger.
D. much larger.
ANSWER: D

5. Which of the following is not considered to be one of the three phases of e-commerce?
A. Innovation.
B. Consolidation.
C. Preservation.
D. Reinvention.
ANSWER: C

6. The idealistic market envisioned at the outset of the development of e-commerce is called a
______.

A. Bailey market.
B. Baxter market.
C. Bergman market.
D. Bertrand market.
ANSWER: D
7. The primary source of financing during the early years of e-commerce was _______.
A. bank loans.
B. large retail firms.
C. venture capital funds.
D. initial public offerings.
ANSWER: C

8. The type of firms that benefited the most during the consolidation period of e-commerce
were _______.
A. large, traditional firms.
B. first movers.
C. pure online companies.
D. ISPs
ANSWER: A

9. All of the following are technologies used to gather information about you online except
______.
A. spy ware.
B. cookies.
C. Gmail.
D. anonymizers.
ANSWER: D
10. A _________ is the set of planned activities designed to result in a profit in a
marketplace.
A. business model.
B. profit model.
C. business plan.
D. revenue model.
ANSWER: A

11. Which of the following is not a key element of a business model?


A. value proposition.
B. competitive advantage.
C. market strategy.
D. universal standards.
ANSWER: D

12. The source of revenue in a subscription revenue model is _____.


A. Fees from advertisers in exchange for advertisements.
B. Fees for business referrals.
C. Fees from subscribers in exchange for access to content or services.
D. Fees for enabling or execution a transaction.
ANSWER: C

13. Which of the following is an example of a portal?


A. Amazon.
B. eBay.
C. Yahoo.
D. Face book
ANSWER: C

14. All of the following are major B2C business models except ______.
A. content provider.
B. industry consortium.
C. transaction broker.
D. service provider.
ANSWER: B

15. The _________ business model involves an independently owned vertical digital
marketplace for direct
inputs.
A. e-distributor.
B. exchange.
C. e-procurement.
D. private industrial network.
ANSWER: B

16. Compared to Internet users, the number of cell phone subscribers is _________.
A. about the same.
B. slightly fewer.
C. much fewer.
D. much larger.
ANSWER: D

17. Industry structure is defined as _____.


A. the nature of the players in an industry and their relative bargaining power.
B. a set of plans for achieving long term returns on the capital invested in a business firm.
C. set of planned activities designed to result in a profit in a marketplace.
D. how a company's product or service fulfills the needs of customers.
ANSWER: A

18. The area of actual or potential commercial value in which a company intends to operate is
a _______.
A. market space.
B. marketplace.
C. perfect market.
D. Bertrand market.
ANSWER: A

19. A perfect market is one in which _____.


A. One firm develops an advantage based on a factor of production that other firms cannot
purchase.
B. One participant in the market has more resources than the others.
C. there are no competitive advantages or asymmetries because all firms have equal access to
all the
factors to production.
D. competition is at a minimum, as each niche market within an industry is served by the
company with
the greatest competitive advantage.
ANSWER: C

20. Which of the following is not a horizontal portal?


A. AOL.
B. Yahoo.
C. Sailnet.
D. MSN/Windows Live.
ANSWER: C

21. A situation where there are no differences among products or services, and the only basis
of choosing
products is price is known as ______.
A. a value web.
B. value chain.
C. profit.
D. commoditization.
ANSWER: D
22. A strategy designed to compete in all markets around the globe is called a _____ strategy.
A. scope.
B. differentiation.
C. cost.
D. focus.
ANSWER: A

23. Which of the following is not one of the stages of the development of the Internet?
A. Innovation.
B. Institutionalization.
C. Globalization.
D. Commercialization.
ANSWER: C

24. In 1961, __________ published a paper on "packet switching" networks.


A. Leonard Kleinrock.
B. Ray Tomlinson.
C. Bob Metcalfe.
D. Vint Cerf.
ANSWER: A

25. The component of TCP/IP that provides the Internet's addressing scheme and is
responsible for the
actual delivery of packets is ______.
A. TCP.
B. IP.
C. the Network Layer.
D. the Application Layer
ANSWER: B

26. Which protocol permits users to transfer files from the server to their client computer, and
vice versa?
A. HTTP.
B. SMTP.
C. IMAP.
D. FTP.
ANSWER: D

27. __________ is a program that you can run from the DOS prompt in the Windows
operating system in
order to check the connection between your client and the server.
A. Ping
B. Telnet
C. Tracert
D. SSL
ANSWER: A
28. Broadband is generally considered to be any communication technology allowing
streaming audio and
video at or above _____.
A. 100 Kbps.
B. 56.6 Kbps.
C. 30 Kbps.
D. 10 Kbps
ANSWER: A

29. Which of the following connections allows the fastest download speeds?
A. DSL.
B. cable modem.
C. T1.
D. T3.
ANSWER: D

30. Which of the following is not a limitation of the current Internet?


A. insufficient capacity throughout the backbone.
B. network architecture limitations.
C. insufficient reach.
D. best-efforts QOS.
ANSWER: C

31. All of the following are goals of Internet2 except ______.


A. Creating a leading-edge very high-speed network capability for the national research
community.
B. Eliminating censorship from the Internet.
C. Enabling revolutionary Internet applications.
D. Ensuring the rapid transfer of new network services and applications to the broader
Internet
community.
ANSWER: B

32. Which of the following is a new and disruptive Web feature or service?
A. XML.
B. diffserv.
C. blogs.
D. CDMA.
ANSWER: C

33. All of the following are examples of 2G wireless phone technologies except _______.
A. CDMA.
B. W-CDMA.
C. TDMA.
D. GSM.
ANSWER: B

34. All of the following are wireless Internet access network technologies except ________.
A. Wi-Fi
B. Bluetooth.
C. Zigbee.
D. GigaPoP.
ANSWER: D

35. Internet users account for about ________ of the world's population.
A. 7%
B. 17%
C. 27%
D. 47%
ANSWER: B

36. Which of the following was the first commercial Web browser?
A. Mosaic.
B. Mozilla.
C. Netscape Navigator.
D. Internet Explorer
ANSWER: C

37. All of the following are steps in the systems development life cycle except ______.
A. Systems Design.
B. Testing.
C. Implementation.
D. Debugging.
ANSWER: D

38. A _________ describes the flow of information at your e-commerce site and the
infrastructure that will
be used in the system.
A. system design.
B. logical design.
C. tactical design
D. physical design.
ANSWER: B

39. All of the following are factors in optimizing Web site performance except _____.
A. page retrieval.
B. page generation.
C. page delivery.
D. page content.
ANSWER: A

40. The largest component of a Web site budget is_____.


A. system maintenance.
B. system development.
C. content design and development.
D. telecommunications.
ANSWER: A

41. The dominant Web server software is ______.


A. Zeus.
B. Apache.
C. Microsoft IIS.
D. Google.
ANSWER: B

42. What Web server functionality allows it verify usernames and passwords and process
certificates and
encryption information?
A. Processing of HTTP requests.
B. File Transfer Protocol.
C. Data capture.
D. Security services.
ANSWER: D

43. The underlying computing equipment that the system uses to achieve its e-commerce
functionality is
called a ______.
A. hardware platform.
B. content platform.
C. transaction platform.
D. scalability platform.
ANSWER: A

44. Redundant navigation refers to _________.


A. pages that work, load quickly, and point the customer toward your product offerings.
B. simple, fool-proof navigation.
C. a site working with the most popular browsers.
D. alternative navigation to the same content.
ANSWER: D

45. The set of standards for communication between a browser and a program running on a
server that
allows for interaction between the user and the server is known as _______.
A. Active Server Pages (ASP).
B. Java Server Pages (JSP).
C. Common Gateway Interface (CGI).
D. VBScript.
ANSWER: C

46. E-commerce merchant server software includes all of the following except_______.
A. online e-mail.
B. online catalog.
C. online shopping cart.
D. online credit card processing.
ANSWER: A

47. Which of the following is not a widely used midrange or high-end e-commerce suite?
A. Microsoft Commerce Server.
B. WebTrends Marketing Lab2.
C. IBM WebSphere Commerce.
D. Broadvision Commerce.
ANSWER: A

48. The ability to change the product to better fit the needs of the customer is called
________.
A. customization.
B. personalization.
C. privacy.
D. accessibility.
ANSWER: A

49. All of the following are tools for optimizing a Web site's location in search engine
listings except
______.
A. keywords and page titles.
B. identifying market niches.
C. buying ads.
D. benchmarking.
ANSWER: D

50. The most common type of Internet crime according to the IC3 is ______.
A. Credit card fraud.
B. Check fraud.
C. Non-delivery.
D. Auction fraud.
ANSWER: D

51. In the e-commerce security environment, which of the following constitutes the inner-
most layer?
A. people.
B. data.
C. technology solutions.
D. organizational policies and procedures.
ANSWER: B

52. All of the following are major categories of computer viruses except _____.
A. Macro viruses.
B. File-infecting viruses.
C. Script viruses.
D. Trojan viruses.
ANSWER: D
53. A worm is designed to spread _________.
A. from computer to computer.
B. from file to file on a computer.
C. from Web site to Web site.
D. from Web site to computer
ANSWER: A

54. Malicious hackers who act with the intention of causing harm are __________.
A. White hats.
B. Black hats.
C. Grey hats.
D. Brown hats.
ANSWER: B

55. When hackers flood a Web site with useless traffic to overwhelm the network, it is called
______.
A. phishing.
B. pharming.
C. a Denial of Service (DoS) attack.
D. spoofing.
ANSWER: C

56. Which of the following is not a dimension of e-commerce security provided by


encryption?
A. availability.
B. message integrity.
C. nonrepudiation.
D. confidentiality.
ANSWER: A

57. The most widely used encryption standard is ______.


A. Advanced Encryption Standard (AES).
B. Data Encryption Standard (DES).
C. Universal Encryption Standard (UES).
D. Optimal Encryption Standard (OES).
ANSWER: A

58. The most common form of securing channels is through ______.


A. S-HTTP.
B. VPNs.
C. SSL.
D. PPTP.
ANSWER: C

59. Firewalls perform all of the following functions except ______.


A. Forbids communications from untrustworthy sources.
B. Allows communications from trustworthy sources.
C. Eliminates viruses and other malicious attacks.
D. Filters traffic based on packet attributes.
ANSWER: C

60. A security plan begins with a(n) is ______.


A. security policy.
B. risk assessment.
C. implementation plan.
D. security organization.
ANSWER: B

61. The only payment system that is instantly convertible without intermediation is _______.
A. Credit card.
B. Accumulating balance.
C. Stored value.
D. Cash.
ANSWER: D

62. The most prevalent online payment method is ______.


A. PayPal.
B. checks.
C. credit cards.
D. debit.
ANSWER: C

63. What is the name of the division of the U.S. Department of Homeland Security that
coordinates cyber
incident warnings and responses across government and private sectors?
A. US-CERT.
B. OECD.
C. IC3.
D. P3P.
ANSWER: A

64. After sending e-mail, which of the following activities is most common among Internet
users?
A. sending instant messages.
B. reading someone else's blog.
C. using a search engine to find information.
D. getting news.
ANSWER: C

65. __________ influence the behavior of others through their personality, skills, or other
factors.
A. Opinion leaders.
B. Direct reference groups.
C. Indirect reference groups.
D. Lifestyle groups.
ANSWER: A
66. All of the following are reasons more people don't shop online except ________.
A. lack of trust in online merchants.
B. lack of convenience.
C. inability to touch and feel the product.
D. fear of misuse of personal information.
ANSWER: B

67. A good or service for which there are many dealers supplying the same product, and all
products in the
segment are essentially identical is known as _______.
A. commodity.
B. core product.
C. actual product.
D. augmented product.
ANSWER: A

68. Complete price transparency in a perfect information marketplace is necessary for


____________ to
take effect.
A. Bertrand's Law.
B. the Law of Universal Prices.
C. the Law of One Price.
D. the Law of Perfect Commerce.
ANSWER: C

69. A(n) _________ represents data as two-dimensional tables with records organized in
rows and
attributes in columns.
A. database management system.
B. data warehouse.
C. SQL query.
D. relational database.
ANSWER: D

70. All of the following are types of data mining except ______.
A. selective data mining.
B. query-driven data mining.
C. model-driven data mining.
D. rule-based data mining.
ANSWER: A

71. Which of the following market entry strategies are the most common for existing firms?
A. first mover
B. fast follower.
C. brand extender.
D. alliances.
ANSWER: C

72. The process of getting customers to pass along a company's marketing message to
friends, family, and
colleagues is known as _______.
A. affiliate marketing.
B. viral marketing.
C. permission marketing.
D. blog marketing.
ANSWER: B

73. The per-product price consumers are willing to pay for a bundle ____________ as the
number of goods
in the bundle increases.
A. decreases.
B. increases.
C. varies from product to product.
D. stays the same.
ANSWER: B

74. Creating multiple versions of information goods and selling essentially the same product
to different
market segments at different prices is called_______.
A. versioning.
B. bundling.
C. transactive content.
D. price discrimination.
ANSWER: A

75. All of the following are examples of intelligent agent technology except ________.
A. automated response systems.
B. automatic shipping confirmation.
C. order status reports.
D. online web bugs.
ANSWER: D

76. E-business can be defined as_______.


A. the uninhibited flow of information and goods on the Web.
B. the use of the Internet and the Web to transact business.
C. digitally enabled transactions and processes within an organization.
D. commercial transactions involving electronic goods.
ANSWER: C

77. The set of applications and technologies that allow users to create, edit, and distribute
content online is
known as______.
A. Internet.
B. social networking.
C. virtual life.
D. Web 2.0.
ANSWER: D

78. Which of the following represents a limiting factor for the growth of e-commerce?
A. Persistent cultural attraction of physical markets and traditional shopping experiences.
B. Inadequate selection of goods compared to physical marketplaces.
C. E-commerce lacks the convenience of other methods of transacting business.
D. The potential audience for e-commerce is too low to support it as a widespread method of
commerce.
ANSWER: A

79. The fastest growing form of online advertising is _________.


A. banner ads.
B. pop-up ads
C. rich media/video ads.
D. pop-under ads.
ANSWER: C

80. All of the following are among the most common categories of spam except ______.
A. fraud.
B. commercial products.
C. finance.
D. health (drugs).
ANSWER: A

81. All of the following are types of social marketing except ______.
A. affiliate marketing.
B. blog advertising
C. social network advertising.
D. game advertising.
ANSWER: A

82. Which of the following measures the percentage of people exposed to an online
advertisement who
actually click on the banner?
A. impression rate.
B. view-through rate.
C. click-through rate.
D. stickiness ratio.
ANSWER: C

83. Which of the following is a measure of the percentage of purchasers who return to a Web
site within a
year?
A. loyalty.
B. reach.
C. recency
D. unique visitors.
ANSWER: A

84. All of the following are metrics for e-mail campaigns except ______.
A. open rate.
B. delivery rate.
C. bounce-back rate.
D. cart conversion rate.
ANSWER: D

85. As consumers become more accustomed to new online advertising formats, click-through
rates tend to
_______.
A. remain constant.
B. decrease.
C. increase.
D. rapidly increase.
ANSWER: B

86. The ethical principle which states that if an action is not right for all situations, then it is
not right for
any situation is known as ______.
A. The Golden Rule.
B. Slippery Slope.
C. No Free Lunch.
D. Universalism.
ANSWER: D

87. Which of the following statements about privacy is true?


A. It is a moral right to be left alone.
B. Only corporations and government need to be concerned about it.
C. It has only just recently become a concern.
D. It is most easily obtained on the Internet.
ANSWER: A

88. The ability of consumers to review and contest the accuracy and completeness of data
collected about
them involves which of the following FTC fair information practice principles?
A. Security.
B. Enforcement.
C. Choice/Consent.
D. Access/Participation.
ANSWER: D

89. The __________ is the first major effort to adjust the copyright laws to the Internet age.
A. Platform for Privacy Preferences (P3P).
B. Center for Democracy and Technology.
C. Digital Millennium Copyright Act (DMCA).
D. E-Government Act of 2002.
ANSWER: C

90. A patent grants the owner an exclusive monopoly on the ideas behind the invention for
______ years.
A. 10
B. 20
C. 30
D. 40
ANSWER: B

91. The number of business methods patents granted is ___________ compared to the
number of patents
applied for.
A. substantially smaller.
B. slightly smaller.
C. close to equal.
D. equal.
ANSWER: A

92. The redirection of traffic from a legitimate site to an infringing site is called _______.
A. cybersquatting.
B. cyberpiracy.
C. metatagging.
D. keywording.
ANSWER: B

93. During which period of Internet governance was Network Solutions given a monopoly to
assign and
track high-level domains?
A. Government Control Period.
B. Privatization.
C. Self-Regulation.
D. Governmental Regulation.
ANSWER: B

94. The taxation system for e-commerce sales is best described as ______.
A. complex.
B. streamlined.
C. universal.
D. standardized.
ANSWER: A

95. All of the following are acts Congress has passed or attempted to pass to protect children
online except
______.
A. Video Privacy Protection Act.
B. Children's Online Protection Act.
C. Communications Decency Act.
D. Children's Internet Protection Act.
ANSWER: A

96. Which of the following is a privacy advocacy group that is a foundation- and business-
supported group
with a legislative focus?
A. Cdt org.
B. Privacy International org.
C. Epic org.
D. Privacy org
ANSWER: A

97. What is the first step in a P3P-enabled transaction?


A. send Web page.
B. http GET request Web page.
C. Send P3P policy files.
D. http GET request P3P policy files.
ANSWER: B

98. All of the following are types of intellectual property protection except_______.
A. patents.
B. trademarks.
C. governance.
D. copyrights.
ANSWER: C

99. All of the following are challenges to online retail except ______.
A. Consumer concerns about the security of transactions.
B. Consumer concerns about the privacy of personal information given to Web sites.
C. Delays in delivery of goods when compared to store shopping.
D. Inability to change prices nearly instantly.
ANSWER: D

100. Which of the following is an industry strategic factor that relates to whether new
entrants face a
disadvantage when attempting to enter an industry?
A. barriers to entry
B. power of suppliers.
C. power of consumers.
D. industry value chain.
ANSWER: A

101. Companies that have a network of physical stores as their primary retail channel, but
also have
introduced online offerings are called ______.
A. Virtual merchants.
B. Bricks and clicks.
C. Catalog merchants.
D. Manufacturer-direct.
ANSWER: B

102. Products are made to prior to orders received based on estimated demand under a
______.
A. supply-push model.
B. demand-push model.
C. supply-pull model.
D. demand-pull model.
ANSWER: A

103. The major impact of Internet real estate sites is in ______.


A. completing property transactions online.
B. influencing offline decisions
C. reducing commissions.
D. e-mail marketing to consumers.
ANSWER: B

104. Which of the following is the largest online travel service?


A. Travelocity.
B. Orbitz.
C. Priceline.
D. Expedia.
ANSWER: D

105. Which of the following is not one of the top three online career service providers?
A. CareerBuilder.
B. Monster.
C. HotJobs.
D. USAJobs.
ANSWER: D

106. The largest segment in the recruitment business is_____.


A. General job recruitment.
B. Executive search.
C. Specialized job placement services.
D. Managerial recruitment
ANSWER: A

107. The majority of job seekers rely on which of the following?


A. Word-of-mouth leads.
B. Employment agencies.
C. Internet and newspapers equally.
D. Internet only.
ANSWER: C
108. The most popular type of media in terms of total hours of consumption per year is
_____.
A. television.
B. radio.
C. Internet.
D. newspaper.
ANSWER: A

109. Which of the following describes paid content's relation to free user-generated content?
A. Free content jeopardizes paid content
B. Paid content jeopardizes free content
C. Free content and paid content can both work in tandem cooperatively.
D. Paid content is viable now but will not be in the future.
ANSWER: C

110. The top U.S online video site is ______.


A. MySpace.
B. YouTube.
C. AOL.
D. Google Video.
ANSWER: B

111. Which of the following is not a type of media convergence?


A. technological convergence.
B. content convergence.
C. industry convergence
D. community convergence.
ANSWER: D

112. The online content revenue model in which free content drives offline revenues is called
the ______.
A. marketing model.
B. advertising model.
C. pay-per-view model.
D. subscription model.
ANSWER: A

113. The combination of technical and legal means for protecting digital content from
unlimited
reproduction without permission is known as _____.
A. Digital rights management.
B. Digital protection schemes.
C. Digital distribution regulation.
D. Digital rights protection.
ANSWER: A
114. What is the most commonly offered interactive feature of newspaper Web sites?
A. video.
B. comments on blogs.
C. RSS feeds.
D. podcasts.
ANSWER: C

115. Which of the following is an advantage of e-books?


A. reduced transaction costs for the user.
B. requirement of expensive devices to use.
C. portability compared to print books.
D. copyright management.
ANSWER: A

116. After television, the next largest major player in the commercial entertainment industry
is ______.
A. video games.
B. music.
C. radio.
D. film.
ANSWER: D

117. Which of the following is not an entertainment industry value chain model?
A. content owner direct model.
B. user distribution model.
C. aggregator model.
D. Internet innovator model.
ANSWER: B

118. Technologies that help enhance resolution of e-book reader display screens are known as
______.
A. high-res pixel formatting.
B. screen resolution technologies.
C. sub-screen smoothing technologies.
D. sub-pixel display technologies.
ANSWER: D

119. All of the following are characteristics of a social network except _______.
A. involves a group of people.
B. features shared social interaction.
C. always feature shared goals and purposes.
D. common ties among members.
ANSWER: C

120. Social networking sites primarily earn their revenue through ______.
A. advertising.
B. subscriptions.
C. donations.
D. service fees.
ANSWER: A

121. The type of social network described as a community built around a common interest
such as games,
sports, music, and so on is called _____.
A. general community.
B. practice network.
C. affinity community.
D. interest-based social network.
ANSWER: D

122. Auction sites like eBay tend to use _______ pricing.


A. dynamic.
B. fixed.
C. trigger.
D. utilization.
ANSWER: A

123. Which of the following is not considered to be a drawback of Internet auctions?


A. market inefficiency.
B. trust risks.
C. fulfillment costs.
D. delayed consumption costs.
ANSWER: A

124. The marketplace for auction sites is best described as _____.


A. many sites attaining similar levels of profitability.
B. easy to enter due to minimal barriers.
C. populated mostly with small, thriving specialty sites.
D. dominated by a handful of sites with established networks.
ANSWER: D

125. A dynamically priced market that features few buyers and many sellers is a market that
exhibits
______.
A. market neutrality.
B. buyer bias.
C. seller bias.
D. owner bias.
ANSWER: B

126. The most popular type of auction on eBay is the ______.


A. Dutch Internet auction.
B. Name Your Own Price auction.
C. English auction.
D. Professional service auction.
ANSWER: C

127. Which of the following is not a primary function of a portal?


A. navigation of the Web.
B. social networking.
C. commerce.
D. content.
ANSWER: B

128. Which portal business model best describes Yahoo?


A. general purpose portal.
B. affinity group based vertical market.
C. focused content based vertical market.
D. none of the above.
ANSWER: A

129. Which of the following portal revenue models involves charging for premium content?
A. ISP services.
B. General advertising.
C. Subscription fees.
D. Tenancy deals.
ANSWER: C

130. Which of the following best describes predicted growth in C2C and B2C auction
spending?
A. B2C spending will overtake C2C spending.
B. Both types of spending will increase.
C. C2C spending will decrease while B2C increases.
D. Both types of spending will decline at similar rates.
ANSWER: B

131. An auction that has multiple winners that all pay the same price is an example
of________.
A. uniform pricing.
B. discriminatory pricing.
C. bid rigging.
D. price matching.
ANSWER: A

132. The communication standard for sharing business documents and settlement information
that emerged
in the 1970s is called_____.
A. ECD.
B. EDI.
C. IDE.
D. BCB.
ANSWER: B
133. All of the following are potential benefits of B2B e-commerce except_________.
A. reduced amount of 'first-mover' advantages.
B. decreased product cycle time.
C. increased opportunities for collaborating with suppliers and distributors.
D. increased production flexibility.
ANSWER: A

134. Goods directly involved in the production process are known as _____.
A. MRO goods.
B. procured goods.
C. indirect goods.
D. direct goods.
ANSWER: D

135. A materials requirements planning (MRP) system is an example of ______.


A. spot purchasing.
B. a multi-tier supply chain.
C. a legacy computer system.
D. electronic data interchange.
ANSWER: C

136. The foundation for contemporary supply chain management systems includes all of the
following
except _____.
A. supply chain simplification.
B. continuous inventory replenishment.
C. ERP systems.
D. B2B electronic storefronts.
ANSWER: D

137. The two main types of Internet-based B2B commerce are______.


A. Net marketplaces and private industrial networks.
B. EDI and collaborative commerce.
C. Net marketplaces and collaborative commerce.
D. EDI and private industrial networks.
ANSWER: D

138. The type of Net marketplace characterized by indirect inputs and spot purchasing is
called an
_______.
A. industry consortium.
B. independent exchange.
C. e-distributor.
D. e-procurement marketplace.
ANSWER: C

139. The most common and easily understood type of Net marketplace is ______.
A. e-procurement marketplace.
B. e-distributors.
C. industry consortia.
D. independent exchanges.
ANSWER: B

140. All of the following are objectives of private industrial networks except ________.
A. developing efficient purchasing and selling business processes industry-wide.
B. operating on a local scale.
C. creating increased supply chain visibility.
D. reducing industry risk.
ANSWER: B

141. _____________ are networks that connect people within a company to each other and to
the
company network.
A. Bitstreams.
B. Extranets.
C. Internets.
D. Intranets.
ANSWER: D

142. _______________ is the encompassing term that involves the use of electronic
platforms - intranets,
extranets and the Internet - to conduct a company's business.
A. E-marketing.
B. E-business
C. E-procurement.
D. E-commerce.
ANSWER: B

143. Which of the following is not one of the benefits of e-commerce to sellers?
A. E-commerce offers greater flexibility in meeting customer needs.
B. E-commerce is a powerful tool for customer relationship building.
C. E-commerce can help to reduce costs.
D. E-commerce increases the net cost per contact.
ANSWER: D

144. The E-commerce domain that involves business activity initiated by the consumer and
targeted to
businesses is known as ______.
A. Business to Business (B2B).
B. Consumer to Consumer (C2C).
C. Consumer to Business (C2B).
D. Business to Consumer (B2C).
ANSWER: C
145. A _________ is a B2B trading network that links a particular seller with its own trading
partners.
A. bitstream.
B. virtual network.
C. web community.
D. private trading network.
ANSWER: D

146. The type of website that is designed to build customer goodwill and to supplement other
sales channels
rather then sell the company's products directly is known as a ______________ website.
A. marketing.
B. click-and-mortar.
C. customer service.
D. corporate.
ANSWER: D

147. When preparing a website, designers should ensure that the site enables user-to-user
communication.
This design feature is known as ___________.
A. context.
B. community.
C. commerce.
D. connection.
ANSWER: B

148. ______________ marketing is the Internet version of word-of-mouth marketing.


A. Visceral.
B. Virile.
C. Viral.
D. Virtual.
ANSWER: C

149. Why would a merchant want to customize products?


A. To charge a higher price.
B. To decrease costs.
C. It is required in EC.
D. Customers will only accept customized products.
ANSWER: A

150. A website offering content created by third party transparently to customers is an


example of ______.
A. Reintermediation.
B. Syndication.
C. Virtual Manufacturing.
D. Build-to-order.
ANSWER: B

You might also like