MCQ Dmec
MCQ Dmec
MCQ Dmec
A. Broader
B. Narrower
C. Wider
D. Hyper
View Answer
B. Narrower
A. Digital Business
B. E-Business
C. E-Commerce
D. Digital Marketing
View Answer
C. E-Commerce
A. OYO Rooms
B. Reliance SMART
C. Ola
D. D Mart Ready
View Answer
B. Reliance SMART
Digital business is similar to the term __________ which was first coined by
IBM corporation.
A. E-business
B. E-Commerce
C. Internet Business
D. Both A and B
View Answer
A. E-business
A. Hardware
B. Software
C. Servers
View Answer
D. All of the above
A. Broader
B. Narrower
C. Restricted
D. Border
View Answer
A. Broader
OLX and Quikr is an example of _________digital business model.
A. P2P
B. B2B
C. C2C
D. Both A & B
View Answer
A. P2P
A. Digital Economy
B. Digital enterprise
C. E-commerce
View Answer
B. Digital enterprise
Customers pay a fixed amount, usually monthly, to get some type of service.
This is an examples of ________ Digital Business Model
A. Affiliate Fees
B. Transaction Fees
C. Subscription Fees
D. Licensing Fees
View Answer
C. Subscription Fees
Adoption of digital business by established SMEs is generally ___________
D. None
View Answer
A. Less than that in larger businesses
A. Digital Business
B. Business Model
C. Ecommerce
D. CRM
View Answer
B. Business Model
Companies charge others for allowing them to place a banner on their sites.
This Digital Business Model is known as ______
A. Transaction Fees
B. Licensing Fees
C. Affiliate Fees
D. Advertising Fees
View Answer
D. Advertising Fees
A. B2B
B. B2C
C. P2P
D. C2C
View Answer
B. B2C
A. Information Of Things
C. Internet of Technology
D. Internet of Things
View Answer
D. Internet of Things
C. Indirect Marketing
D. Both A & B
View Answer
A. Internet community
B. Web community
C. Social Community
D. Both A & B
View Answer
D. Both A & B
A. B2C
B. C2B
C. B2B
D. P2P
View Answer
C. B2B
A. Web Community
B. Online Commeunity
C. Internet Community
D. All of the above
View Answer
A. Digital Economy
B. Digital Enterprise
C. Internet of Things
D. E-commerce
View Answer
B. Digital Enterprise
View Answer
View Answer
A. E-business
B. E-Commerce
C. Digital Business
D. Both A and C
View Answer
D. Both A and C
A. Online
B. Virtual
C. Internet
View Answer
_______ is a new digital ecosystem, which can be described through five Cs:
creativity, connectivity, collaboration, convergence, & community.
A. .NET
B. Web 2.0
C. IoT
D. Webex
View Answer
B. Web 2.0
A. Digital Business
B. Social Network
C. Social Enterprise
D. Virtual Community
View Answer
C. Social Enterprise
A. Internet Economy
B. Digital Economy
C. Social Economy
D. Both A & B
View Answer
D. Both A & B
Question 1
Marketing that moves away from a transaction-based effort to a conversation (i.e. two-way dialogue)
and can be described as a situation or mechanism through which marketers and a customer (e.g.
stakeholders) interact usually in real-time is known as:B
a) Digital marketing.
b) Interactive marketing.
c) Direct marketing.
d) Electronic marketing.
Question 2
a) Email marketing.
c) Print advert.
d) Viral marketing.
Question 3
________ is a form of marketing communications that uses the internet for the purpose of advertising-
delivering marketing messages to increase website traffic (i.e. click-through) and encourage product
trial, purchase, and repeat purchase activity (i.e. conversion)..A
a) Internet marketing
b) Search marketing
c) Email marketing
d) Mobile marketing
Question 4
In the first 10 years, the web was heavily used as a static publishing and/or retailing (transactional)
channel. This was known as:B
a) Web 2.0.
b) Web 1.0.
c) Web publishing.
d) Static web.
Question 5
The development of digital media and the rise of Web 2.0 (i.e. the social web) technology saw a
further evolution in marketing away from a hierarchical one-sided mass communication model. Web
2.0 used more participatory technologies, (e.g. social channels and online communities), rather than
just information or transactional channels. What is the focus of this social web?B
a) Marketer.
b) User.
c) System.
d) Web platform.
Question 6
A form of marketing communications that uses Internet-based resources for the purpose of
advertising, delivering messages to drive traffic to a website ('click-through rate') and also
encourage trial, purchase, or repeat-purchase activity is called:C
a) Search marketing.
b) E-mail marketing.
c) Internet advertising.
An advertising model used in which advertisers pay their host only when their sponsored ad or link
is clicked, is called:D
b) Contextual Advertising.
a) Search marketing.
b) Internet advertising.
____________ is a form of digital marketing that describes the use of the social web and social media
(e.g. social networks, online communities, blogs or wikis) or any online collaborative technology for
marketing activities, be it sales, public relations, research, distribution or customer service.C
Four elements that distinguish mobile marketing from traditional mass marketing are: scope of
audience, type and format of messages, ___________, and response tracking.A
a) location-based targeting
b) wide coverage
c) mass distribution
Websites translated for wireless devices to access and download content and to display adverts are
known as:C
a) GPS
b) IVR
c) WAP sites
d) Apps
Question 12
This refers to branded software applications for mobile devices that consumers use to access added-
value information, customer service and/or entertainment where and when they want it:B
a) WAP sites.
b) Apps.
c) IVR.
d) Viral.
Question 13
This is the process of marketing accomplished or facilitated through the application of electronic
devices, appliances, tools, techniques, technologies and or systems:A
a) Electronic marketing.
b) Interactive marketing.
c) Internet marketing.
d) Direct marketing.
Question 14
Which of the following is not an issue that marketers need to consider when using digital resources
for marketing activities?B
a) Jurisdiction.
b) Disclosure.
c) Ownership.
d) Permissions.
Question 15
Which of the following is not one of major considerations when using internet advertising to
increase brand awareness and encourage click-through to a target site?C
a) Cost.
b) Intrusive.
c) Interactivity.
d) Timeliness.
Question 16
a) Opt-in email.
b) Consent marketing.
c) Spam.
d) Opt-out email.
Question 17
A database of information that is maintained by human editors and lists websites by category and
subcategory with categorization is known as:A
a) A search directory.
c) Apps.
d) SEO.
Question 18
This attempts to improve rankings for relevant keywords in search results by improving a website's
structure and content:B
a) SEM.
b) SEO.
c) SST.
d) SFA.
Question 19
The next iteration of the web, which will be characterized by the web becoming artificially
intelligent, thereby recognizing links and relationships between data sources, allowing the
prediction of audience response and greater audience targeting. This is referred to as:A
a) Web 3.0.
b) Web 2.0.
c) Web 1.0.
d) Web 4.0.
Question 20
This operates algorithmically or using a mixture of algorithmic and human input to collect, index,
store and retrieve information on the web (e.g. web pages, images, information and other types of
files). It makes the information available to users in a manageable and meaningful way in response
to a search query. This is referred to as:C
a) Banner ads.
b) Pop-up ads.
c) A search engine.
d) Apps.
Answer: C
23 ………………are animated full screen ads placed at the entry of a site
before a user reaches the intended content.
A. pop-up ads
B. Intromercials
C. Spam e-mail
D. malware
Answer: B
24 ………………….are interactive online ads that require the user to
respond intermittently in order to wade through the message before
reaching the intended content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer: A
25 ……………facilitates transactions between buyer and sellers by
providing comprehensive information and ancillary services, without
being involved in the actual exchange of goods and services between
the parties.
A. Metamediary
B. Intermediary
C. middlemen
D. all of these
Answer: A
26 ………………is any transaction, involving the transfer or rights to use
goods and services, which is initiated and or completed by using
mobile access to computer mediated networks with the help of an
electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer: A
27 …………….provide security and privacy for the use of the web page
content
A. HTTP
B. html
C. FTP
D. none of these
Answer: A
28 …………………….website is one that changes or customizes itself
frequently and automatically based on certain criteria
A. Dynamic website
B. Static Website
C. phish site
D. none of these
Answer: A
29 ………………site is created to fraudulently acquire sensitive
information such as pass words and credit card details, by
masquerading as a trustworthy person or business.
A. Dynamic website
B. Static Website
C. phish site
D. none of these
Answer: C
30 ……………….in the e-commerce may be a holder of a payment card
such as credit card or debit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer: A
31. The purpose of ………………page is to provide links to other pages
A. Home page
B. Web page
C. Summary page
D. None of these
Answer: A
32 ……………is an example for a software that visits suggested pages
and return the appropriate information to be indexed by the search
Engine
A. Robot
B. Spiders
C. Ants
D. All
Answer: D
33 ……………………..ads appears as rectangular graphics near the top of
the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer: A
34 ………………….ads take up the entire screen and are more powerful
than banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer: B
35 ………………………….is a form of advertisement on the web that
appears between web pages that the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer: C
36 ……………………is basically a TV commercial that runs in the
browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer: D
37. Advertisements take the form of a website copy are
called…………………
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer: A
38 ………………..is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer: B
39 …………………..is an unsolicited e-mail sent to every e-mail address
that a business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer: C
40 …………………..is the buying and selling of goods and services
through wireless handled devices such as cellular phone and Personal
Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer: A
41. Peer to Peer [P2P] is also used to describe ………………………
A. C2C
B. B2E
C. B2B
D. B2C
Answer: A
42 …………………….is an online auctioning site that facilitates the trade
of privately owned items between individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer: A
43. Monster.com is an example of ……………………..website
A. C2C
B. B2E
C. B2B
D. B2C
Answer: A
44 ………………….is an internet network that allows users with the
same network in software to connect to each other’s hard disks and
exchange files
A. B2C
B. B2E
C. B2B
D. P2P
Answer: D
45. This is a protocol which allows files to be transferred from one
computer to another computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer: B
46. A ……………….is a document, typically written in plain text
interspersed with formatting instructions of html
A. Web page
B. home page
C. domain
D. none of these
Answer: A
47 ………………….is the first page of a web site.
A. Web page
B. home page
C. domain
D. none of these
Answer: B
48 ……………..allows the person to type ion just the main word or
words and the site will come in
A. Web page
B. home page
C. domain
D. none of these
Answer: C
49. ”Google” is one of the most popular………………..
A. Portal
B. Browser
C. Search Engine
D. none of these
Answer: C
50. A ………………….. presents information from diverse sources in a
unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these
Answer: C
51. A ………………is an electronic file that uniquely identifies
individuals and websites on the internet and enables secure
confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer: B
52. The information Technology Act [IT ACT] came into effect on
A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these
Answer: C
53. Information sent over the Internet commonly uses the set of rules
called……………………
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer: A
54 ……………………….is a person who breaks in or trespasses a
computer system
A. Hacker
B. Snooper
C. operator
D. spoofer
Answer: A
55. E-mail which contain useless material is termed as……………
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer: D
56. India has enacted the first IT Act in the year……………………
A. 2001
B. 2002
C. 2009
D. 2000
Answer: D
57. Which of the following crimes were not covered under IT
(Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer: D
58. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer: C
59 ……………….is a programme designed o replicate and spread
generally with the victim being oblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Answer: C
60. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Answer: D
61. Companies use………………………networks to automate employee
related corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Answer: B
62. Which among the following is not a B2E application
A. Online Insurance policy management
B. Online supply requests
C. Special employee offers
D. Locate application and tax forms
Answer: D
63 ……………………..streamlines the flow of information and self
service capabilities through automation
A. SCC
B. CRM
C. CRP
D. SCM
Answer: A
64 ………………is a global web in which millions of users are
communicating with each other with the help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Answer: A
65 …………………is an application layer protocol for distributed,
collaborative, hypermedia information systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Answer: A
66. English physicist Tim Berner’s Lee was famous for the
establishment of …………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Answer: B
67 ………refers to a kind of e-commerce which refers to a company
selling or buying from other company
A. B2G
B. B2E
C. B2B
D. P2P
Answer: C
68. Which of the following is not an example for B2B e-commerce ?
A. Sending and receiving orders
B. Invoice and shopping
C. all of these
D. none of these
Answer: D
69. A company that manufacturers bicycles may use the internet to
purchase tyres from their suppliers. This is an example of———–
transaction.
A. B2G
B. B2E
C. B2B
D. P2P
Answer: C
70 …………..sites act as an intermediary between someone wanting a
product or service and potential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Answer: A
71.……………….is the exchange of goods or items or commodities and
services or applications used for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none
Answer: B
72. …………….is an approach to deliver information differentiated
business values called services by combining the system and process
generally called resources
A. E-business
B. E-commerce
C. any of these
D. none
Answer: A
73. ……………….always operate on intranet
A. E–commerce
B. E-Business
C. EDI
D. None of these
Answer: B
74. Which among the following is not an example for E-commerce
A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these
Answer: C
75. ……………….and ………………… were the enabling technologies that
laid the ground work for E-commerce
A. SET and SCL
B. SCM and ERP
C. EDI and EFT
D. None of these
Answer: C
76. ………………were the first to establish prominent E-commerce
Brands
A. Baazar.com
B. E-bay and Amazon
C. E-trade.com
D. none of these
Answer: B
77. …………….is a systems approach to Managing the entire flow of
information, materials, and services from raw material suppliers
through factories and warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Answer: D
78. …………….is a form of supply chain where a series of assembly
operations are carried out to obtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Answer: A
79.…………………is a form of supply chain where a wide variety of
finished goods are produced with limited number of raw material or
components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Answer: B
80……………………is the exchange of services, information or product
from one business to a government agency
A. B2G
B. B2E
C. B2B
D. P2P
Answer: C
81 ……………….is a financial institution that establishes an account
with a merchant and processes payment card authorization and
payments
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer: D
82. In …………………..type of payment system customer is allowed to
spend only up to the amount that have pre deposited into account.
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer: A
83 ………………type of payment system is highly useful to those
customers who would like to control overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer: A
84 ……………………….credit card gives all the advantages of a normal
credit card without worrying about the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer: A
85 ……………………facility helps the customer to pay only a small
amount of the total outstanding and revolve the rest of the payment to
the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer: B
86 …………………..is the system of purchasing cash credits in relatively
small amounts, storing the credits in our computer, and then
spending them, when making electronic purchases over the internet.
A. E-cash
B. Digicash
C. Cyber cash
D. any of these
Answer: D
87 ………………….is a financial instrument which can be used more
than once to borrow money or buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer: A
88. To accept a credit card for payment, we have to open a
…………………account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer: C
89. A……………………..is a device that includes an embedded integrated
circuit Chip [ICC] that can be either a secure micro controller or
equivalent intelligence with internal memory or a memory chip alone.
A. smart Cards
B. E-Cheques
C. E-cash
D. none of these
Answer: A
90 ………………..is a kind of payment card that transfers fund directly
from the consumer’s bank account to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer: A
91 ……………….acts like a gate keeper that examines each users
identification before allowing them to enter to the organization’s
internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer: A
92 …………..Prevents unauthorized communication into and out of the
network, allowing the organization to enforce a security policy on
traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer: A
93. SET means ………………
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Answer: C
94. The verification of credit card is done by using…………….. with a
communications link to the merchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer: C
95. Creating illegitimate sites that appear to be published by
established organizations by unscrupulous artists is termed
as…………………
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer: A
96. Gain entry into the user’s system and scan your file system for
personal information is known as……………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer: B
97 ………………attacks are difficult and are only successful if the
attacker knows something about the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Answer: D
98 …………………is the process of making information unintelligible to
the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Answer: D
99 ………………….is the reverse process of encryption, to make the
information readable once again
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Answer: B
100. A………………….provides a way to associate the message with the
sender and is the equivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer: B
101 ……………..is a card with a microchip that can be used instead of
cash and coins for everything from vending machines to public
transportation.
A. Debit Card
B. credit card
C. Electronic purse
D. any of these
Answer: C
102 ………………is basically a secure gate between our organization
data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer: A
103 ……………………encrypts payment card transaction data and
verifies that both parties in the transaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Answer: B
104 ………………is automated methods of recognizing a person based
on a physiological or behavioral characteristic.
A. Biometrics
B. PIN
C. both of these
D. none of these
Answer: A
105. In Biometrics,…………………………ID system is designed to prevent
more than one person from using a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer: B
107 …………………..are program developed by some dishonest people to
destroy the computer system and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer: B
108. Which among the following is not an example for computer virus
?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer: D
109 ……………………are special type of software meant for limiting the
risks of being hit by computer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer: B
110. A……………….is a person who gains unauthorized access to a
computer network for profit, criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Answer: A
111. A……………portal is a specialized entry point to a specific market
place or industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer: A
112 ………………..are general interest portals covering a wide range of
topics and features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer: B
113. Which among the following is an example for vertical portal ?
A. i-village
B. Yahoo
C. Google
D. Net scape
Answer: A
114. A portal that helps to establish relations and to conduct
transactions between various organizations is termed as………………
A. B2B portals
B. C2C portals
C. both of these
D. none of these
Answer: A
115. A …………………….is a software that scours the internet collecting
data about every website and every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Answer: B
116. Search Engines databases are selected and built by computer
robot programs called………………
A. spiders
B. Search Engines
C. robots
D. none of these
Answer: A
117. Which among the following is not an example for Search engine ?
A. Google
B. MSN
C. Alta vista
D. none of these
Answer: D
118. Web pages are prepared using their language as…………………
A. html
B. FTP
C. HTTP
D. None of these
Answer: A
119. A web page is transferred to users computer through
……………………..
A. html
B. FTP
C. HTTP
D. None of these
Answer: C
120. The user reaches this page when they specify the address of a
website
A. Home page
B. Web page
C. Summary page
D. None of these
Answer: A
121. Which among the following is an example for vertical portal ?
A. i-village
B. yahoo
C. google
D. net scape
Answer:
A.i-village
122. 4. A portal that helps to establish relations and to conduct transactions
between variousorganizations is termed as………………
A. b2b portals
B. c2c portals
C. both of these
D. none of these
Answer:
A.b2b portals
123. A …………………….is a software that scours the internet collecting data about
everywebsite and every webpage within it
A. spiders
B. search engines
C. robots
D. none of these
Answer:
B.search engines
124. Which among the following is not an example for Search engine ?
A. google
B. msn
C. alta vista
D. none of these
Answer:
D.none of these
125. Web pages are prepared using their language as…………………
A. html
B. ftp
C. http
D. none of these
Answer:
A.html
126. A web page is transferred to users computer through ……………………..
A. html
B. ftp
C. http
D. none of these
Answer:
C.http
127. The user reaches this page when they specify the address of a website
A. home page
B. web page
C. summary page
D. none of these
Answer:
A.home page
128. ……………………..streamlines the flow of information and self service
capabilitiesthrough automation
A. scc
B. crm
C. crp
D. scm
Answer:
A.scc
129. ………………is a global web in which millions of users are communicating with
eachother with the help of computers.
A. internet
B. www
C. both of these
D. none of these
Answer:
A.internet
130. …………………….is an online auctioning site that facilitates the trade of
privatelyowned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Answer:
A.e-bay
131. Monster.com is an example of ……………………..website
A. c2c
B. b2e
C. b2b
D. b2c
Answer:
A.c2c
132. This is a protocol which allows files to be transferred from one computer to
anothercomputer
A. tcp/ip
B. ftp
C. http
D. none of these
Answer:
B.ftp
133. A ……………….is a document, typically written in plain text interspersed
withformatting instructions of html
A. web page
B. home page
C. domain
D. none of these
Answer:
A.web page
134. ………………….is the first page of a web site.
A. web page
B. home page
C. domain
D. none of these
Answer:
B.home page
135. …………………….is an online auctioning site that facilitates the trade of
privatelyowned items between individuals.
A. e-bay
B. amazon.com
C. rentalic.com
D. all of these
Answer:
A.e-bay
136. ……………..is a card with a microchip that can be used instead of cash and
coins foreverything from vending machines to public transportation.
A. debit card
B. credit card
C. electronic purse
D. any of these
Answer:
C.electronic purse
137. ……………………encrypts payment card transaction data and verifies that
bothparties in the transaction are genuine.
A. ssl
B. set
C. both of these
D. none of these
Answer:
B.set
138. SET means ………………
A. standard electronic technology
B. standard electronic transfer
D. none of these
Answer:
C.secure electronic transaction
139. The verification of credit card is done by using…………….. with a
communications linkto the merchants acquiring bank
A. credit card payment terminal
B. point of sale
C. all of these
D. none of these
Answer:
C.all of these
140. ……………….is a financial institution that establishes an account with a
merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. merchant
D. acquirer
Answer:
D.acquirer
141. ………………type of payment system is highly useful to those customers who
wouldlike to control overspending,
A. prepaid
B. post paid
C. both of these
D. none of these
Answer:
A.prepaid
142. ……………………….credit card gives all the advantages of a normal credit
cardwithout worrying about the interest charges
A. prepaid
B. post paid
C. both of these
D. none of these
Answer:
A.prepaid
143. ……………………facility helps the customer to pay only a small amount of the
totaloutstanding and revolve the rest of the payment to the next month.
A. cash advance
B. revolver
C. tele draft
D. none of these
Answer:
B.revolver
144. ………………….is a financial instrument which can be used more than once to
borrowmoney or buy products and services on credit.
A. credit card
B. e-cheques
C. e-cash
D. none of these
Answer:
A.credit card
145. To accept a credit card for payment, we have to open a …………………account
withour bank
A. savings bank
B. current account
C. merchant account
D. any of these
Answer:
C.merchant account
146. ………………..is a kind of payment card that transfers fund directly from
theconsumer’s bank account to the merchants account
A. debit card
B. electronic purse
C. credit card
D. any of these
Answer:
A.debit card
147. A ………………is an electronic file that uniquely identifies individuals and
websites onthe internet and enables secure confidential communications
A. digital signature
B. digital certificates
C. ssl
D. none of these
Answer:
B.digital certificates
148. The information Technology Act [IT ACT] came into effect on
A. 16th november 2000
D. none of these
Answer:
C.17th october 2000
149. Information sent over the Internet commonly uses the set of
rulescalled……………………
A. tcp/ip
B. ftp
C. http
D. gopher
Answer:
A.tcp/ip
150. ……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Answer:
A.hacker
151. E-mail which contains useless material is termed as……………
A. spam
B. useless mail
C. trunk mail
D. junk mail
Answer:
D.junk mail
152. India has enacted the first IT Act in the year……………………
A. 2001
B. 2002
C. 2009
D. 2000
Answer:
D.2000
153. Which of the following crimes were not covered under IT (Amendment) Act,
2008 ?
A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these
Answer:
D.none of these
154. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. data protection
B. telecommunication laws
D. none
Answer:
C.intellectual property laws
155. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Answer:
D.none of these
156. ………………is basically a secure gate between our organization data and
internet.
A. network firewall
B. antivirus
C. both of these
D. none of these
Answer:
A.network firewall
157. ………………is automated methods of recognizing a person based on a
physiological orbehavioral characteristic.
A. biometrics
B. pin
C. both of these
D. none of these
Answer:
A.biometrics
158. ……………….is a financial institution that establishes an account with a
merchant andprocesses payment card authorization and payments.
A. customer
B. issuer
C. merchant
D. acquirer
Answer:
D.acquirer
159. In …………………..type of payment system customer is allowed to spend only
up to theamount that have pre deposited into account.
A. prepaid
B. post paid
C. both of these
D. none of these
Answer:
A.prepaid
160. .……………….is the exchange of goods or items or commodities and services
orapplications used for money and deals the money matters
A. e-commerce
B. commerce
C. both of these
D. none
Answer:
B.commerce
161. ……………….always operate on intranet
A. e–commerce
B. e-business
C. edi
D. none of these
Answer:
B.e-business
162. Which among the following is not an example for E-commerce
A. amazon.com
B. baazar.com
C. e-trade.com
D. none of these
Answer:
C.e-trade.com
163. ………………were the first to establish prominent E-commerce Brands
A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these
Answer:
B.e-bay and amazon
164. …………….is a form of supply chain where a series of assembly operations are
carriedout to obtain the final product
A. converging supply chain
B. diverging supply chain
C. any of these
D. none
Answer:
A.converging supply chain
165. .…………………is a form of supply chain where a wide variety of finished goods
areproduced with limited number of raw material or components.
A. converging structure
B. diverging structure
C. any of these
D. none
Answer:
B.diverging structure
166. ……………………is the exchange of services, information or product from
onebusiness to a government agency
A. b2g
B. b2e
C. b2b
D. p2p
Answer:
C.b2b
167. ………………….is an internet network that allows users with the same network
insoftware to connect to each other’s hard disks and exchange files
A. b2c
B. b2e
C. b2b
D. p2p
Answer:
D.p2p
168. ”Google” is one of the most popular………………..
A. portal
B. browser
C. search engine
D. none of these
Answer:
C.search engine
169. A ………………….. Presents information from diverse sources in a unified way
in aweb site.
A. web portal
B. link page
C. both of these
D. none of these
Answer:
C.both of these
170. ……………………….is a person who breaks in or trespasses a computer system
A. hacker
B. snooper
C. operator
D. spoofer
Answer:
A.hacker
171. Peer to Peer [P2P] is also used to describe ………………………
A. c2c
B. b2e
C. b2b
D. b2c
Answer:
A.c2c
172. ……………..allows the person to type ion just the main word or words and the
site willcome in
A. web page
B. home page
C. domain
D. none of these
Answer:
C.domain
173. A ………………….. presents information from diverse sources in a unified way
in aweb site
A. web portal
B. link page
C. both of these
D. none of these
Answer:
C.both of these
174. In Biometrics,…………………………ID system is designed to prevent one
personfrom using more than one identity
A. positive id system
B. negative id system
C. both of these
D. none of these
Answer:
B.negative id system
175. …………………..are program developed by some dishonest people to destroy
thecomputer system and the valuable information in it.
A. network firewall
B. computer virus
C. both of these
D. none of these
Answer:
B.computer virus
176. he dimension of e-commerce that enables commerce across national
boundaries is called______________.
A. interactivity
B. global reach
C. richness
D. ubiquity
Answer:
B.global reach
177. The primary source of financing during the early years of e-commerce
was______________.
A. bank loans
B. large retail firms
Answer:
C.venture capital funds
178. The source of revenue in a subscription revenue model is
______________.
A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
Answer:
C.fees from subscribers in exchange for access to content or services
179. Industry structure is defined as ______________.
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a
business firm
Answer:
A.the nature of the players in an industry and their relative bargaining power
180. The component of TCP/IP that provides the Internet’s addressing scheme
and isresponsible for the actual delivery of packets is ______________.
A. tcp
B. ip
Answer:
B.ip
181. Which of the following is not a limitation of the current Internet?
A. insufficient capacity throughout the backbone
C. insufficient reach
D. best-efforts qos
Answer:
C.insufficient reach
182. Internet users account for about ______________ of the world’s
population.
A. 7%
B. 17%
C. 27%
D. 47%
Answer:
B.17%
183. The most common type of Internet crime according to the IC3 is
______________.
A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud
Answer:
D.auction fraud
184. When hackers flood a Web site with useless traffic to overwhelm the
network, it iscalled ______________.
A. phishing
B. pharming
D. spoofing
Answer:
C.a denial of service (dos) attack
185. ______________ influence the behavior of others through their
personality, skills, or otherfactors.
A. opinion leaders
B. direct reference groups
D. lifestyle groups
Answer:
A.opinion leaders
186. A(n) ______________ represents data as two-dimensional tables with
recordsorganized in rows and attributes in columns.
A. database management system
B. data warehouse
C. sql query
D. relational database
Answer:
D.relational database
187. Creating multiple versions of information goods and selling essentially the
sameproduct to different market segments at different prices is
called______________.
A. versioning
B. bundling.
C. transactive content
D. price discrimination
Answer:
A.versioning
188. Which of the following is a measure of the percentage of purchasers who
return to aWeb site within a year?
A. loyalty
B. reach
C. recency
D. unique visitors
Answer:
A.loyalty
189. Which of the following statements about privacy is true?
A. it is a moral right to be left alone
B. only corporations and government need to be concerned about it
Answer:
A.it is a moral right to be left alone
190. The redirection of traffic from a legitimate site to an infringing site is
called______________.
A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Answer:
B.cyber piracy
191. A security plan begins with a(n) is ______________.
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer:
B.risk assessment
192. ______________ influence the behavior of others through their
personality, skills, orother factors.
A. opinion leaders
D. lifestyle groups
Answer:
A.opinion leaders
193. Creating multiple versions of information goods and selling essentially the
sameproduct to different market segments at different prices is
called______________.
A. versioning
B. bundling.
C. transitive content
D. price discrimination
Answer:
A.versioning
194. Which of the following is a measure of the percentage of purchasers who
return to aWeb site within a year?
A. loyalty
B. reach
C. regency
D. unique visitors
Answer:
A.loyalty
195. ______________ are networks that connect people within a company to
each other andto the company network.
A. bitstreams
B. extranets
C. internets
D. intranets
Answer:
D.intranets
196. A website offering content created by third party transparently to customers
is anexample of ______________.
A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order
Answer:
B.syndication
197. E-commerce technologies have improved upon traditional commerce
technologies in______________.
A. richness
B. reach
Answer:
C.both richness and reach
198. All of the following are technologies used to gather information about you
onlineexcept ______________.
A. spy ware
B. cookies
C. gmail
D. anonymizers
Answer:
D.anonymizers
199. ______________ is a program that you can run from the DOS prompt in
the Windowsoperating system in order to check the connection between your
client and the server.
A. ping
B. telnet
C. tracert
D. ssl
Answer:
A.ping
200. Which of the following is a new and disruptive Web feature or service?
A. xml
B. diffserv
C. blogs
D. cdma
Answer:
C.blogs
201. What Web server functionality allows it verify usernames and passwords and
processcertificates and encryption information?
A. processing of http requests
C. data capture
D. security services
Answer:
D.security services
202. The ability to change the product to better fit the needs of the customer is
called______________.
A. customization
B. personalization
C. privacy
D. accessibility
Answer:
A.customization
203. All of the following are major categories of computer viruses except
______________.
A. macro viruses
B. file-infecting viruses
C. script viruses
D. trojan viruses
Answer:
D.trojan viruses
204. The most prevalent online payment method is ______________.
A. paypal
B. checks
C. credit cards
D. debit
Answer:
C.credit cards
205. Complete price transparency in a perfect information marketplace is
necessary for______________ to take effect.
A. bertrand\s law
B. the law of universal prices
Answer:
C.the law of one price
206. The process of getting customers to pass along a company’s marketing
message tofriends, family, and colleagues is known as ______________.
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Answer:
B.viral marketing
207. All of the following are types of social marketing except ______________.
A. affiliate marketing
B. blog advertising
D. game advertising
Answer:
A.affiliate marketing
208. The ethical principle which states that if an action is not right for all
situations, then itis not right for any situation is known as ______________.
A. the golden rule
B. slippery slope
C. no free lunch
D. universalism
Answer:
D.universalism
209. What is the first step in a P3P-enabled transaction?
A. send web page
B. http get request web page
Answer:
B.http get request web page
210. The majority of job seekers rely on which of the following?
A. word-of-mouth leads
B. employment agencies
D. internet only
Answer:
C.internet and newspapers equally
211. Which of the following best describes predicted growth in C2C and B2C
auctionspending?
A. b2c spending will overtake c2c spending
Answer:
B.both types of spending will increase
212. A materials requirements planning (MRP) system is an example of
______________.
A. spot purchasing
B. a multi-tier supply chain
Answer:
C.a legacy computer system
213. The E-commerce domain that involves business activity initiated by the
consumer andtargeted to businesses is known as ______________.
A. business to business (b2b)
B. consumer to consumer (c2c)
Answer:
C.consumer to business (c2b)
214. Why would a merchant want to customize products?
A. to charge a higher price
B. to decrease costs
C. it is required in ec
Answer:
A.to charge a higher price
215. A ______________ is the set of planned activities designed to result in a
profit in amarketplace.
A. business model
B. profit model
C. business plan
D. revenue model
Answer:
A.business model
216. Affiliate revenue is also called as _______.
A. commission
B. brokerage
C. referral fee
D. discount
Answer:
C.referral fee
217. Standards of EDI are decided by ______
A. ascii
B. ansi
C. usa
D. government
Answer:
B.ansi
218. ______ means converting readable text to unreadable text.
A. conversion
B. decryption
C. encryption
D. decoding
Answer:
C.encryption
219. ______ means converting unreadable text to readable text.
A. conversion
B. decryption
C. encryption
D. decoding
Answer:
B.decryption
220. _____ changes URL from http to https.
A. ssl
B. set
C. e-commerce
D. m-commerce
Answer:
A.ssl
221. In ____ server-side authentication is compulsory.
A. ssl
B. set
C. e-commerce
D. m-commerce
Answer:
A.ssl
222. An online retail store is called as _____.
A. trader
B. retailer
C. e-tailer
D. amazon
Answer:
C.e-tailer
223. In _______, one consumer deals with another consumer.
A. c2c
B. b2c
C. b2b
D. p2p
Answer:
A.c2c
224. amazon.com is an example of ______
A. b2b
B. b2c
C. c2c
D. p2p
Answer:
B.b2c
225. In SSL encryption is done using ____ key.
A. public
B. private
C. session
D. symmetric
Answer:
C.session
226. ____ is an online retail store.
A. portal
B. service provider
C. e-tailer
D. content provider
Answer:
C.e-tailer
227. Identify the identity of a person or entity with whom you are dealing on
Internet is knownas ______.
A. integrity
B. authenticity
C. authorisation
D. none of these
Answer:
B.authenticity
228. ____ means that the information being displayed on a Web
site/transmitted/received overthe Internet has not been changed in any way by
an un-authorised party.
A. integrity
B. authenticity
C. authorisation
D. none of these
Answer:
A.integrity
229. In public key encryption ______ keys are used.
A. public and private
B. only public
C. only private
D. session
Answer:
A.public and private
230. SET is developed by association led by _________.
A. master card and visa
B. master card
C. visa
D. rupay
Answer:
A.master card and visa
231. The technology behind M-commerce is based on ______.
A. http
B. https
C. wap
D. pop
Answer:
C.wap
232. ________ is virtual representation of physical market.
A. edi
B. electronic market
C. e-commerce
D. internet commerce
Answer:
B.electronic market
233. _____ allows you paperless transaction.
A. edi
B. electronic market
C. e-commerce
D. internet commerce
Answer:
A.edi
234. _____ means the information being displayed on a Web site or transmitted
or receivedover the Internet has not been changed in any way by an unauthorized
party.
A. integrity
B. confidentiality
C. authenticity
D. privacy
Answer:
A.integrity
235. In ________ encryption is performed with session key.
A. public key
B. private key
C. ssl
D. set
Answer:
C.ssl
236. olx.com is an example of ________
A. b2b
B. b2c
C. c2c
D. p2p
Answer:
C.c2c
237. ______ are sites that creates a digital online environment where people
with similarinterest can transact.
A. community provider
B. market creator
C. portal
D. service provider
Answer:
A.community provider
238. Flipkart.com is an example of _______.
A. b2b
B. b2c
C. c2c
D. p2p
Answer:
B.b2c
239. Normally in M-commerce language used to create web pages is _______.
A. html
B. wml
C. vb
D. xml
Answer:
B.wml
240. _____ is an art of attempting to acquire information by masked as
trustworthy entity.
A. hacking
B. phishing
C. sniffing
D. spoofing
Answer:
B.phishing
241. SSL can be used only with _____.
A. ftp
B. http
C. pop
D. smtp
Answer:
B.http
242. _____ means converting cipher text to plain text.
A. encryption
B. decryption
C. conversion
D. de-conversion
Answer:
B.decryption
243. ______ means converting plain text to cipher text.
A. encryption
B. decryption
C. conversion
D. de-conversion
Answer:
A.encryption
244. In Public Key Encryption ______ key is used for Encryption.
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
Answer:
C.sender’s public
245. In Public Key Encryption ______ key is used for Decryption.
A. receiver’s public
B. receiver’s private
C. sender’s public
D. sender’s private
Answer:
B.receiver’s private
246. _____ can read the cipher text.
A. sender
B. receiver
C. any one
D. no one
Answer:
D.no one
247. When message & data are available only to those who are authorized to view
them isknown as ______ .
A. integrity
B. confidentiality
C. authenticity
D. privacy
Answer:
B.confidentiality
248. Digital Accumulating Balance Payment System is generally used for ______
payments.
A. micro
B. macro
C. credit card
D. debit card
Answer:
A.micro
249. Scope of E-Commerce is ______.
A. local
B. global
C. within own country
Answer:
B.global
250. ______ means found everywhere.
A. universal
B. ubiquity
C. global
D. local
Answer:
B.ubiquity
251. E-Commerce Lacks _______ touch.
A. social
B. smooth
C. personal
D. communication
Answer:
C.personal
252. In SSL _______ key is used for encryption.
A. public
B. private
C. session
D. otp
Answer:
C.session
253. To handle credit card transaction on internet _____ is developed by Visa
and Master card.
A. ssl
B. set
C. sat
D. encryption
Answer:
B.set
254. The sender and receiver will have the same key in _____ Key Encryption.
A. symmetric
B. asymmetric
C. public
D. private
Answer:
A.symmetric
255. In SSL URL will change from HTTP to _______.
A. cipher text
B. https
C. shttp
D. smtp
Answer:
B.https
256. __________ is a best example of Online Stored Value System.
A. google
B. yahoo
C. paypal
D. go daddy
Answer:
C.paypal
257. BitTorrent.Com is an example of _____
A. b2b
B. b2c
C. c2c
D. p2p
Answer:
D.p2p
258. E-Tailer revenue model is ______ revenue.
A. sales
B. subscription
C. advertising
D. affiliate
Answer:
A.sales
259. The percentage of people who visit web site and buy something is known as
_____
A. hits
B. conversion rate
C. affiliate
D. walk-in-customer
Answer:
B.conversion rate
260. In _______ user can share files and computer resources directly.
A. b2b
B. b2c
C. c2c
D. p2p
Answer:
D.p2p
261. E-tailer can be Pure Plays or _______ .
A. impure plays
B. indirect plays
D. direct plays
Answer:
C.bricks & clicks
262. World Wide Web (WWW) was introduced in the year ……………………
A. 1994
B. 1996
C. 1992
D. 1990
Answer:
A.1994
263. ……………….is an early form of E-commerce
A. SCM
B. EDI
C. Both of these
D. None of these
Answer:
B.EDI
264. ………………..is concerned with the buying and selling information, products
and services overcomputer communication networks
A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Answer:
B.E-Commerce
265. ………………..is a set of standards developed in the 1960s to exchange
business informationand to do electronic transactions
A. EDI
B. Protocols
C. TCP/IP
D. None of these
Answer:
A.EDI
266. Which among the following product is suitable for E-Commerce ?
A. Books
B. Vegetables
C. All of these
D. None of these
Answer:
A.Books
267. ……………allows a business application on the computer of one organization
to communicatedirectly with the business application on the computer of another
company.
A. EDI
B. Protocols
C. Standards
D. Business applications
Answer:
A.EDI
268. Electronic Exchange of business documents in a standard format is known
as ………………
A. E-commerce
B. E-Business
C. EDI
D. None of these
Answer:
C.EDI
269. ………………. is essentially a business process that connects manufacturers,
retailers,customers and suppliers in the form of a chain to develop and deliver
products.
A. E-commerce
B. EDI
C. SCM
D. Networking
Answer:
C.SCM
270. Which of the following is not a party of SCM ?
A. Suppliers
B. Manufacturers
C. Distributors
D. Customers
Answer:
C.Distributors
271. ………………is a commercial process that includes production, distribution,
sales or deliveryof goods and services through electronic means
A. E-commerce
B. SCM
C. EDI
D. None of these
Answer:
A.E-commerce
272. ……………….is the exchange of goods or items or commodities and services or
applicationsused for money and deals the money matters
A. E-commerce
B. Commerce
C. Both of these
D. none
Answer:
B.Commerce
273. …………….is an approach to deliver information differentiated business
values called servicesby combining the system and process generally called
resources
A. E-business
B. E-commerce
C. any of these
D. none
Answer:
A.E-business
274. ……………….always operate on intranet
A. E–commerce
B. E-Business
C. EDI
D. None of these
Answer:
B.E-Business
275. Which among the following is not an example for E-commerce
A. Amazon.com
B. Baazar.com
C. E-trade.com
D. None of these
Answer:
C.E-trade.com
276. ……………….and ………………… were the enabling technologies that laid the
ground work for E- commerce
A. SET and SCL
D. None of these
Answer:
C.EDI and EFT
277. ………………were the first to establish prominent E-commerce Brands
A. Baazar.com
B. E-bay and Amazon
C. E-trade.com
D. none of these
Answer:
B.E-bay and Amazon
278. …………….is a systems approach to Managing the entire flow of information,
materials, andservices from raw material suppliers through factories and
warehouses to the end customer.
A. CRM
B. SRM
C. EDI
D. SCM
Answer:
D.SCM
279. …………….is a form of supply chain where a series of assembly operations are
carried out to obtain the final product
A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Answer:
A.Converging supply chain
280. ……………………is a form of supply chain where a wide variety of finished
goods are produced with limited number of raw material or components.
A. Converging structure
B. Diverging structure
C. Any of these
D. None
Answer:
B.Diverging structure
281. ……………………is the exchange of services, information or product from one
business to agovernment agency
A. B2G
B. B2E
C. B2B
D. P2P
Answer:
C.B2B
282. Companies use………………………networks to automate employee related
corporate processes.
A. B2G
B. B2E
C. B2B
D. P2P
Answer:
B.B2E
283. Which among the following is not a B2E application
A. Online Insurance policy management
B. Online supply requests
Answer:
D.Locate application and tax forms
284. ……………………..streamlines the flow of information and self service
capabilities throughautomation
A. SCC
B. CRM
C. CRP
D. SCM
Answer:
A.SCC
285. ………………is a global web in which millions of users are communicating with
each other withthe help of computers.
A. Internet
B. WWW
C. both of these
D. None of these
Answer:
A.Internet
286. …………………is an application layer protocol for distributed, collaborative,
hypermediainformation systems.
A. html
B. HTTP
C. Bothe of these
D. None of these
Answer:
A.html
287. English physicist Tim Berner’s Lee was famous for the establishment of
…………………..in 1990.
A. internet
B. WWW
C. Intranet
D. none of these
Answer:
B.WWW
288. ………refers to a kind of e-commerce which refers to a company selling or
buying from othercompany
A. B2G
B. B2E
C. B2B
D. P2P
Answer:
C.B2B
289. Which of the following is not an example for B2B e-commerce ?
A. Sending and receiving orders
B. Invoice and shopping
C. all of these
D. none of these
Answer:
D.none of these
290. A company that manufacturers bicycles may use the internet to purchase
tyres from theirsuppliers. This is an example of———–transaction.
A. B2G
B. B2E
C. B2B
D. P2P
Answer:
C.B2B
291. …………..sites act as an intermediary between someone wanting a product or
service andpotential providers
A. brokering sites
B. Information sites
C. industry portals
D. none of these
Answer:
A.brokering sites
292. Among the alternate models of B2B e-commerce,……is the best means to
obtain acompetitive advantage in the Market place.
A. Process based
C. transaction based
D. any of these
Answer:
B.strategic relationship based
293. ……………..focus on producing a highly integrated value proposition through
a managed process.
A. hubs
B. community
C. contents
D. none of these
Answer:
A.hubs
294. …………………is basically a concept of online marketing and distributing of
products andservices over the internet
A. B2G
B. B2E
C. B2B
D. B2C
Answer:
D.B2C
295. ……………………..e-commerce consists of the sale of products or services from
a business tothe general public
A. B2G
B. B2E
C. B2B
D. B2C
Answer:
D.B2C
296. Which of the following is not suitable for a B2C transaction ?
A. clothes
B. flowers
C. airline reservation
D. none
Answer:
D.none
297. ……………..e-commerce transaction has the advantage of eliminating
middlemen.
A. B2G
B. B2E
C. B2B
D. B2C
Answer:
D.B2C
298. ………………….e-commerce involves customers gathering information,
purchasing and receivingproducts over an electronic network
A. B2G
B. B2E
C. B2B
D. B2C
Answer:
D.B2C
299. Which among the following is not an user of B2C e-commerce ?
A. manufacturers
B. distributors
C. Publishers
D. none
Answer:
D.none
300. ………………….e-commerce involves the electronic facilitation of transaction
betweencustomers through some third party.
A. B2G
B. B2E
C. B2B
D. C2C
Answer:
D.C2C
301. Which among the following is an example of C2C ?
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer:
D.all of these
302. Peer to Peer [P2P] is also used to describe………………………….
A. C2C
B. B2E
C. B2B
D. B2C
Answer:
A.C2C
303. …………………….is an online auctioning site that facilitates the trade of
privately owned itemsbetween individuals.
A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer:
A.e-Bay
304. Monster.com is an example of ……………………..website
A. C2C
B. B2E
C. B2B
D. B2C
Answer:
A.C2C
305. ………………….is an internet network that allows users with the same network
in software toconnect to each other’s hard disks and exchange files
A. P2P
B. B2E
C. B2B
D. B2C
Answer:
A.P2P
306. This is a protocol which allows files to be transferred from one computer to
another computer
A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer:
B.FTP
307. A ……………….is a document, typically written in plain text interspersed with
formattinginstructions of html
A. Web page
B. home page
C. domain
D. none of these
Answer:
A.Web page
308. ………………….is the first page of a web site.
A. Web page
B. home page
C. domain
D. none of these
Answer:
B.home page
309. ……………..allows the person to type ion just the main word or words and the
site will come in
A. Web page
B. home page
C. domain
D. none of these
Answer:
C.domain
310. ”Google” is one of the most popular……………….. a)Portal b)Browser c)Search
Engine d)none of these50. A ………………….. presents information from diverse
sources in a unified way in a web site.
A. Web portal
B. Link page
C. Both of these
D. none of these
Answer:
C.Both of these
311. A……………portal is a specialized entry point to a specific market place or
industry niche.
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer:
A.Vertical portal
312. ………………..are general interest portals covering a wide range of topics and
features
A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer:
B.horizontal portal
313. Which among the following is an example for vertical portal ?
A. i-village
B. Yahoo
C. Google
D. Net scape
Answer:
A.i-village
314. A portal that helps to establish relations and to conduct transactions between
variousorganizations is termed as………………
A. B2B portals
B. C2C portals
C. both of these
D. none of these
Answer:
A.B2B portals
315. A …………………….is a software that scours the internet collecting data about
every websiteand every webpage within it
A. spiders
B. Search Engines
C. robots
D. none of these
Answer:
B.Search Engines
316. Search Engines databases are selected and built by computer robot
programscalled………………………
A. spiders
B. Search Engines
C. robots
D. none of these
Answer:
A.spiders
317. Which among the following is not an example for Search engine ?
A. Google
B. MSN
C. Alta vista
D. none of these
Answer:
D.none of these
318. Web pages are prepared using their language as…………………
A. html
B. FTP
C. HTTP
D. None of these
Answer:
A.html
319. A web page is transferred to users computer through ……………………..
A. html
B. FTP
C. HTTP
D. None of these
Answer:
C.HTTP
320. The user reaches this page when they specify the address of a website
A. Home page
B. Web page
C. Summary page
D. None of these
Answer:
A.Home page
321. The purpose of ………………page is to provide links to other pages
A. Home page
B. Web page
C. Summary page
D. None of these
Answer:
A.Home page
322. ……………is an example for a software that visits suggested pages and return
the appropriateinformation to be indexed by the search Engine
A. Robot
B. Spiders
C. Ants
D. All
Answer:
D.All
323. ………………………………..ads appears as rectangular graphics near the top of
the page
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer:
A.Banner ads
324. ………………….ads take up the entire screen and are more powerful than
banner ads.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer:
B.floating ads
325. ………………………….is a form of advertisement on the web that appears
between web pagesthat the user requests.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer:
C.interstitials
326. ……………………is basically a TV commercial that runs in the browser window.
A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer:
D.Unicast ads
327. Advertisements take the form of a website copy are called…………………………
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer:
A.Advertorials
328. ………………..is the most unwanted of online advertising methods.
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer:
B.pop-up ads
329. …………………..is an unsolicited e-mail sent to every e-mail address that a
business can find
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer:
C.Spam e-mail
330. …………………..is the buying and selling of goods and services through
wireless handleddevices such as cellular phone and Personal Digital Assistants
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer:
A.Mobile Commerce
331. …………………is a class of advertising methods which are considered unethical
and may evenbe illegal
A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Answer:
D.malware
332. ……………….is the most common way for purchasing an online advertising
A. CPM
B. CPC
C. Any of these
D. none of these
Answer:
C.Any of these
333. ………………are animated full screen ads placed at the entry of a site before a
user reachesthe intended content.
A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer:
A.Intromercials
334. ………………….are interactive online ads that require the user to respond
intermittently inorder to wade through the message before reaching the intended
content.
A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer:
A.Ultramercials
335. ………………is any transaction, involving the transfer or rights to use goods
and services, which is initiated and or completed by using mobile access to
computer mediated networkswith the help of an electronic device.
A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer:
A.Mobile Commerce
336. …………….provide security and privacy for the use of the web page content
A. HTTP
B. html
C. FTP
D. none of these
Answer:
A.HTTP
337. …………………….website is one that changes or customizes itself frequently
and automaticallybased on certain criteria
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer:
A.Dynamic website
338. ………………site is created to fraudulently acquire sensitive information such
as pass wordsand credit card details, by masquerading as a trustworthy person or
business.
A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer:
C.phish site
339. ……………….in the e-commerce may be a holder of a payment card such as
credit card ordebit card from an issuer
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer:
A.customer
340. ……………….is a financial institution that establishes an account with a
merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer:
D.Acquirer
341. In …………………..type of payment system customer is allowed to spend only
up to theamount that have pre deposited into account.
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer:
A.Prepaid
342. ………………type of payment system is highly useful to those customers who
would like tocontrol overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer:
A.Prepaid
343. ……………………….credit card gives all the advantages of a normal credit card
without worryingabout the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer:
A.Prepaid
344. ……………………facility helps the customer to pay only a small amount of the
total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer:
B.Revolver
345. ………………….is a financial instrument which can be used more than once to
borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer:
A.Credit card
346. To accept a credit card for payment, we have to open a …………………account
with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer:
C.Merchant account
347. ………………..is a kind of payment card that transfers fund directly from the
consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer:
A.Debit Card
348. ……………..is a card with a microchip that can be used instead of cash and
coins foreverything from vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer:
B.Electronic purse
349. ………………is basically a secure gate between our organization data and
internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer:
A.Network firewall
350. ……………………encrypts payment card transaction data and verifies that both
parties in thetransaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Answer:
B.SET
351. ………………is automated methods of recognizing a person based on a
physiological orbehavioral characteristic.
A. Biometrics
B. PIN
C. both of these
D. none of these
Answer:
A.Biometrics
352. In Biometrics,…………………………ID system is designed to prevent more than
one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer:
A.Positive ID system
353. In Biometrics,…………………………ID system is designed to prevent one person
from usingmore than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer:
B.Negative ID system
354. …………………..are program developed by some dishonest people to destroy
the computersystem and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer:
B.computer virus
355. Which among the following is not an example for computer virus ?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer:
D.None of these
356. ……………………are special type of software meant for limiting the risks of
being hit bycomputer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer:
B.Antivirus
357. A……………….is a person who gains unauthorized access to a computer
network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Answer:
A.Hacker
358. ……………….acts like a gate keeper that examines each users identification
before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer:
A.Network firewall
359. …………..Prevents unauthorized communication into and out of the network,
allowing theorganization to enforce a security policy on traffic between its
network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer:
A.Network firewall
360. SET means …………………………….
A. Standard Electronic Technology
B. Standard Electronic Transfer
D. None of these
Answer:
C.Secure Electronic Transaction
361. The verification of credit card is done by using…………….. with a
communications link to themerchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer:
C.All of these
362. Creating illegitimate sites that appear to be published by established
organizations byunscrupulous artists is termed as………………………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer:
A.Spoofing
363. Gain entry into the user’s system and scan your file system for personal
information isknown as……………….
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer:
B.Snooping
364. ………………attacks are difficult and are only successful if the attacker knows
somethingabout the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Answer:
D.Guessing passwords
365. …………………is the process of making information unintelligible to the
unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Answer:
D.Cryptography
366. ………………….is the reverse process of encryption, to make the information
readable onceagain
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Answer:
B.Decryption
367. A………………….provides a way to associate the message with the sender and
is theequivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer:
B.Digital signature
368. A ………………is an electronic file that uniquely identifies individuals and
websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer:
B.Digital certificates
369. The information Technology Act [IT ACT] came into effect on
A. 16th November 2000
B. 15th December 2000
D. none of these
Answer:
C.17th October 2000
370. Information sent over the Internet commonly uses the set of rules
called………………………..
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer:
A.TCP/IP
371. E-mail which contain useless material is termed as………………………
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer:
D.Junk mail
372. India has enacted the first IT Act in the year……………………………………
A. 2001
B. 2002
C. 2009
D. 2000
Answer:
D.2000
373. Which of the following crimes were not covered under IT (Amendment) Act,
2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer:
D.None of these
374. Trade mark, copyright, patent law etc comes under the purview
of……………………
A. Data protection
B. Telecommunication laws
D. None
Answer:
C.Intellectual property laws
375. ……………….is a programme designed o replicate and spread generally with
the victim beingoblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Answer:
C.Computer virus
376. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Answer:
D.none of these
377. Which of the below is/are goals of E-Commerce?
A. 24×7
B. reach out to larger audience
C. time saving
Answer:
D.all of the above
378. In which one of the following type of E-Commerce, consumer sells to
consumer directly?
A. C2B
B. B2C
C. B2B
D. C2C
Answer:
D.C2C
379. ……………. is the electronic transmission of business transaction documents
directly between the computers of trading partners in a standard message format
A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Answer:
B.EDI
380. What does EDI stand for?
A. Electronic Data Interface
B. E-Commerce Data Interface
Answer:
D.Electronic Data Interchange
381. When a company buys some raw material from some other company, then it
will come under:
A. B2B
B. B2C
C. C2B
D. C2C
Answer:
A.B2B
382. In traditional commerce, people buy goods and services:
A. over the internet
B. physical visit
Answer:
B.physical visit
383. Promotion of products in e-commerce can be done by
A. Social media
B. Online Ads
C. Blog
Answer:
D.All of the mentioned
384. Which of the following is not a dimension of e- commerce security provided
by encryption ?
A. availability
B. integrity
C. non-repudiation
D. confidentiality
Answer:
A.availability
385. Conversion of Plain text to Cipher Text is called………………
A. Encryption
B. Decryption
C. Cryptography
D. none of these
Answer:
A.Encryption
386. In Porter’s Five Forces, the ‘threat of new entrants’ relates to:
A. Barriers to entry
B. Substitutes
C. Switching costs
D. Buyer power
Answer:
A.Barriers to entry
387. Which of the following is true for supply chain management?
A. The physical material moves in the direction
B. Flow of cash backwards through the chain
Answer:
D.All of the above
388. Logistics is the part of a supply chain involved with the forward and reverse
flow of
A. goods
B. services
C. cash
Answer:
D.All of the above
389. BPM is about:
A. Aligning business processes toorganisational
B. Maintaining a process view of the organisation ratherthan a functional
C. Customer Recovery
D. Consumer Relation
Answer:
A.Customer Relationship
391. The best products to sell in B2C e-commerce are:
A. Small Products
B. Digital Products
C. Special Products
D. Fresh Products
Answer:
B.Digital Products
392. Which of the following is a useful security mechanism when considering
business strategy and IT?
A. encryption
B. decryption
C. firewall
Answer:
D.All of the mentioned
393. Which type of products is lesser purchased using e- commerce?
A. automobiles
B. books
C. groceries
Answer:
A.automobiles
394. Which is not the application area of e-commerce?
A. E-Learning
B. E-Banking
C. E-Auction
Answer:
D.None of the mentioned
395. In which year the IT Act was introduced?
A. 2000
B. 2020
C. 2001
D. 2010
Answer:
A.2000
396. is an early form of E-Commerce.
A. SCM
B. EDI
Answer:
B.EDI
397. Which of the following is not related to security mechanism?
A. encryption
B. decryption
C. e-cash
Answer:
C.e-cash
398. Digital Products are best suited for B2C e-commerce because they:
A. Are commodity like products
Answer:
D.All of the mentioned
399. Which of the following is part of the four main types of e-commerce?
A. B2B
B. B2C
C. C2B
Answer:
D.All of the mentioned
400. The dimension of E-Commerce that enables commerce across the
boundaries is called
A. interactivity
B. global reach
C. richness
D. ubiquity
Answer:
B.global reach
401. Reverse logistics is required because
A. Goods are defective
Answer:
D.All of the above
402. The purpose of supply chain management is
A. provide customer
B. improve quality of a product
D. increase production
Answer:
C.integrating supply and demand
403. Barriers to entry into an industry are likely to be high if:
A. Switching costs are low
B. Differentiation is low
D. Access to distribution
Answer:
C.Requirement for economies of
404. A digital signature is required …..i) to tie an electronic message to the
sender’s identityii) for non repudiation of communication by a sender
A. i and ii
B. i, ii and iii
Answer:
B.i, ii and iii
405. Which of the following examines information passing through
switches,hubs, or routers?
A. Key logger
B. Packet sniffer
D. Screen captures
Answer:
B.Packet sniffer
406. Which type of e-commerce focuses on consumers dealing with eachother?
A. B2B
B. B2C
C. C2B
D. C2C
Answer:
D.C2C
407. Which products are people most likely to be more uncomfortable buyingon
the Internet?
A. Books
B. Furniture
C. Movies
Answer:
B.Furniture
408. Which products are people most likely to be comfortable buying on
theInternet?
A. Books
B. PCs
C. CDs
Answer:
D.All of the above
409. Digital products are best suited for B2C e-commerce because they:
A. Are commodity like products
B. Can be mass-customised and personalised
Answer:
D.All of the above
410. All of the following are techniques B2C e-commerce companies use toattract
customers, except
A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
Answer:
D.Virtual marketing
411. E-commerce involves
A. marketing
B. advertising
C. warehousing
Answer:
D.all of the above
412. Which term represents a count of the number of people who visit onesite,
click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through
C. Spam
Answer:
B.Click-through
413. What is the percentage of customers who visit a Web site and actuallybuy
something called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
Answer:
D.Conversion rate
414. What are materials used in production in a manufacturing company orare
placed on the shelf for sale in a retail environment?
A. Direct materials
B. Indirect materials
C. EDI
Answer:
A.Direct materials
415. What are materials that are necessary for running a modern corporation,but
do not relate to the company’s primary business activities?
A. Direct materials
B. Indirect materials
C. EDI
Answer:
B.Indirect materials
416. What is another name for materials which cannot be linked to a
specificproduct or process?
A. Direct materials
B. Indirect materials
C. EDI
Answer:
B.Indirect materials
417. What are plastic cards the size of a credit card that contains anembedded
chip on which digital information can be stored?
A. Customer relationship management systems cards
C. FEDI cards
D. Smart cards
Answer:
D.Smart cards
418. Which form of e-commerce currently accounts for about 97% of all
ecommerce revenues?
A. B2B
B. B2C
C. C2B
D. C2C
Answer:
A.B2B
419. Which of the following are advantages normally associated with B2B
ecommerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
Answer:
D.all of the above
420. If it is easy for competitors to enter the market, the threat of new entrantsis
considered:
A. High
B. Low
C. More
D. Less
Answer:
A.High
421. An industry is less attractive for suppliers when the rivalry among
existingcompetitors is:
A. High
B. Low
C. More
D. Less
Answer:
A.High
422. Unique value auction mainly applies to?
A. New products
B. Second hand products
C. Engineering products
Answer:
B.Second hand products
423. Which of the following is a useful security mechanism when
consideringbusiness strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above
Answer:
D.all the above
424. Which of the following statements accurately reflect the impact
oftechnology?
A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
Answer:
D.all of the above
425. Which type of products is lesser purchased using e-commerce?
A. automobiles
B. books
C. softwares
D. none
Answer:
A.automobiles
426. A business competing in a commodity like environment must focus onwhich
of the following?
A. Price
C. Ease of ordering
Answer:
A.Price
427. Which of the following refers to creating products tailored to
individualcustomers?
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
Answer:
A.customisation
428. Materials used in the normal operation of a business but not related
toprimary business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Answer:
C.Indirect materials
429. What is the name given to an interactive business providing a
centralisedmarket where many buyers and suppliers can come together for
ecommerce or commerce-related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Answer:
D.Electronic marketplace
430. Which form of e-marketplace brings together buyers and sellers
frommultiple industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer:
A.horizontal
431. Which form of e-marketplace brings together buyers and sellers from
thesame industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer:
B.Vertical
432. Which, if any, of the following types of ads are people most willing
totolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
Answer:
D.none of the above
433. Which of the following is an Internet-based company that makes it easyfor
one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Answer:
D.financial cybermediary
434. Which of the following is a method of transferring money from onepersons
account to another?
A. electronic check
B. credit card
C. e-transfer
Answer:
A.electronic check
435. An electronic check is one form of what?
A. e-commerce
B. online banking
C. e-cash
D. check
Answer:
C.e-cash
436. If you need to transfer money to another person via the internet, which ofthe
following methods could you use?
A. financial cybermediary
B. electronic check
Answer:
D.all of the above
437. Which of the following permits the transmission of a bill, along withpayment
of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
Answer:
C.electronic bill presentment and payment
438. A combination of software and information designed to provide securityand
information for payment is called a?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Answer:
A.digital wallet
439. What is the name for direct computer-to-computer transfer of
transactioninformation contained in standard business documents?
A. internet commerce
B. e-commerce
Answer:
D.electronic data interchange
440. Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used to decrypt data. The key used to encrypt data is called the
_____ key, while the key used to decrypt data is called the _____n key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Answer:
D.public, private
441. When a transaction is processed online, how can the merchant verify
thecustomers identity?
A. use secure sockets layers
B. use secure electronic transactions
Answer:
B.use secure electronic transactions
442. The practice of forging a return address on an e-mail so that the recipientis
fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer:
D.spoofing
443. What is an internal organisational Internet that is guarded against outside
access by a special security feature called a firewall (which can be software,
hardware, or a combination of the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer:
B.Intranet
444. What is an intranet that is restricted to an organisation and certainoutsiders,
such as customers and suppliers?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer:
C.Extranet
445. What is a detailed process for recovering information or an IT system inthe
event of a catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site
C. Cold site
Answer:
A.Disaster recovery plan
446. What is a separate facility that does not have any computer equipmentbut is
a place where the knowledge workers can move after the disaster?
A. Disaster recovery plan
B. Hot site
C. Cold site
Answer:
C.Cold site
447. What is a separate and fully equipped facility where the company canmove
immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site
C. Cold site
B. Hot site
C. Cold site
Answer:
D.Disaster recovery cost curve
449. Which factor determines when the IT system will be available forknowledge
workers to access?
A. Availability
B. Accessibility
C. Reliability
Answer:
A.Availability
450. Which factor determines who has the right to access different types of
ITsystems and information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer:
B.Accessibility
451. Which factor ensures the IT systems are functioning correctly andproviding
accurate information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer:
C.Reliability
452. Which factor represents how well your system can adapt to
increaseddemands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer:
D.Scalability
453. Which factor represents a systems ability to change quickly?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer:
A.Flexibility
454. What is a set of conditions used to measure how well a product orsystem
functions?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer:
D.Benchmark
455. What determines the future IT infrastructure requirements for
newequipment and additional network capacity?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer:
C.Capacity planning
456. What defines all of the steps or business rules, from beginning to
end,required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
Answer:
A.Workflow
457. Which will not harm computer resources?
A. firewall
B. Virus
C. Trojan horse
Answer:
A.firewall
458. Which of the following is the primary characteristic of an intranet?
A. People outside the organisation can access it
B. People inside the organisation cant access it
Answer:
C.People outside the organisation cant access it
459. Which concept suggests that different applications and computersystems
should be able to communicate with one another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer:
D.Interoperability
460. Which service encompasses all technologies used to transmit andprocess
information on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer:
D.Web services
461. Which process can prevent data from losing due to computer problemsor
human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer:
A.backup
462. Which process is used to reinstall data from a copy when the originaldata
has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer:
B.recovery
463. Who breaks into other peoples computer systems and steals anddestroys
information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer:
A.Hackers
464. What is software that comes hidden in free downloadable software and
tracks your online movements, mines the information stored on your computer,
or uses your computers CPU and storage for some task you know nothing about?
A. Web log
B. Clickstream
Answer:
D.None of the above
465. What is a type of virus that spreads itself, not just from file to file, butfrom
computer to computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
Answer:
B.Worm
466. What floods a Web site with so many requests for service that it slowsdown
or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
Answer:
C.Denial-of-service attack
467. What is the process of evaluating IT assets, their importance to the
organisation, and their susceptibility to threats, to measure the risk exposure of
these assets?
A. Risk management
B. Risk assessment
C. Security
b. Doing business
c. Sale of goods
Answer: A
2.Which of the following is part of the four main types for e‐commerce?
a. B2B
b. B2C
c. C2B
Answer: D
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer: B
a. B2B
b. B2C
c. C2B
d. C2C
Answer: D
a. B2B
b. C2B
c. C2C
Answer: D
a. B2B
b. B2C
c. C2B
d. C2C
Answer: D
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. None of these
Answer: A
a. Small products
b. Digital products
c. Specialty products
d. Fresh products
Answer: B
9.Which products are people most likely to be more uncomfortable buying on the
Internet?
a. Books
b. Furniture
c. Movies
Answer: B
10. Which products are people most likely to be comfortable buying on the
Internet?
a. Books
b. PCs
c. CDs
Answer: D
11. Digital products are best suited for B2C e‐commerce because they:
a. EDI
b. ERP
c. SCM
Answer: B
13. All of the following are techniques B2C e‐commerce companies use to attract
customers,
except:
b. Viral marketing
c. Online ads
d. Virtual marketing
Answer: D
a. marketing
b. advertising
c. warehousing
Answer: D
b. advertising
c. warehousing
Answer: C
16. Which term represents a count of the number of people who visit one site,
click on an ad, and
a. Affiliate programs
b. Click‐through
c. Spam
Answer: B
17. What is the percentage of customers who visit a Web site and actually buy
something called?
a. Affiliate programs
b. Click‐through
c. Spam
d. Conversion rate
Answer: D
b. Indirect materials
c. EDI
Answer: A
19. What are materials that are necessary for running a modern corporation, but
do not relate to
a. Direct materials
b. Indirect materials
c. EDI
Answer: B
a. Direct materials
b. Indirect materials
c. EDI
Answer: B
a. Direct materials
b. Indirect materials
c. EDI
Answer: B
22. What is the process in which a buyer posts its interest in buying a certain
quantity of items, and
sellers compete for the business by submitting successively lower bids until there
is only one
seller left?
a. B2B marketplace
b. Intranet
c. Reverse auction
d. Internet
Answer: C
23. What are plastic cards the size of a credit card that contains an embedded
chip on which digital
c. FEDI cards
d. Smart cards
Answer: D
a. B2B
b. B2C
c. C2B
d. C2C
Answer: B
25. Which form of e‐commerce currently accounts for about 97% of all e‐
commerce revenues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: A
26. Which of the following are advantages normally associated with B2B e‐
commerce?
b. Reduction in costs
Answer: D
Answer: C
29. If it is easy for competitors to enter the market, the threat of new entrants is
considered:
a. High
b. Low
c. More
d. Less
Answer: A
30. An industry is less attractive for suppliers when the rivalry among existing
competitors is:
a. High
b. Low
c. More
d. Less
Answer: A
a. New products
b. Second hand products
c. Engineering products
i. Answer: B
a. eBay.co.in
b. amazon.com
c. flipkart.com
Answer: A
IT?
a. encryption
b. decryption
c. firewall
Answer: D
a. encryption
b. decryption
c. e‐cash
d. all the above
Answer: C
35. A product or service that customers have come to expect from an industry,
which must be
offered by new entrants if they wish to compete and survive, is known as a(n)?
a. Switching costs
b. Loyalty programs
c. Entry barriers
d. Affiliate programs
Answer: C
36. Which of the following statements accurately reflect the impact of technology?
Answer: D
37. A business cannot be all things to all people. Instead, a business must:
Answer: C
38. How the transactions occur in e‐commerce?
a. Using e‐medias
Answer: A
a. automobiles
b. books
c. softwares
d. none
Answer: A
a. Price
c. Ease of ordering
Answer: D
a. customization
b. aggregation
c. Direct materials
d. Reverse auction
Answer: A
42. Materials used in the normal operation of a business but not related to
primary business
a. Supplies
b. Direct materials
c. Indirect materials
d. Daily stuff
Answer: C
a. Banner ads
b. Pop‐up ads
c. Affiliate programs
d. Viral marketing
Answer: C
a. Direct marketplace
b. B2B
c. B2C
d. Electronic marketplace
Answer: D
45. Which form of e‐marketplace brings together buyers and sellers from multiple
industries, often
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer: A
46. Which form of e‐marketplace brings together buyers and sellers from the
same industry?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer: B
a. pop‐under ad
b. Pop‐up ad
c. Banner ad
d. Discount ad
Answer: C
a. pop‐under ad
b. pop‐up ad
c. banner ad
d. discount ad
Answer: B
a. pop‐under ad
b. pop‐up ad
c. banner ad
d. discount ad
Answer: A
50. Which, if any, of the following types of ads are people most willing to tolerate?
a. pop‐under ad
b. pop‐up ad
c. banner ad
Answer: D
51. Which of the following is an Internet‐based company that makes it easy for
one person to pay
c. conversion rates
d. financial cybermediary
Answer: D
52. Which of the following is a method of transferring money from one person's
account to
another?
a. electronic check
b. credit card
c. e‐transfer
Answer: A
a. e‐commerce
b. online banking
c. e‐cash
d. check
54. If you need to transfer money to another person via the internet, which of the
following
a. financial cybermediary
b. electronic check
c. electronic bill presentment and payment
Answer: D
55. Which of the following permits the transmission of a bill, along with payment
of that bill, to be
a. financial cybermediary
b. electronic check
Answer: C
a. digital wallet
b. pop up ad
c. shopping cart
d. encryption
Answer: A
a. internet commerce
b. e‐commerce
Answer: D
a. e‐commerce
d. electronic checks
Answer: B
59. Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used
to decrypt data. The key used to encrypt data is called the _____ key, while the
key used to
a. encryption, decryption
b. private, public
c. encryption, public
d. public, private
Answer: D
b. encrypts information
c. sends information over the internet
Answer: D
61. When a transaction is processed online, how can the merchant verify the
customer's identity?
Answer: B
62. The practice of forging a return address on an e‐mail so that the recipient is
fooled into
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Answer: D
a. Prototyping
b. Prototype
c. Proof‐of‐concept prototype
d. Selling prototype
Answer: B
two)?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client
Answer: B
and suppliers?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client
Answer: C
b. Hot site
c. Cold site
Answer: A
67. What is a separate facility that does not have any computer equipment but is a
place where the
b. Hot site
c. Cold site
Answer: C
68. What is a separate and fully equipped facility where the company can move
immediately after
b. Hot site
c. Cold site
Answer: B
69. What charts (1) the cost to your organization of the unavailability of
information and technology
and (2) the cost to your organization of recovering from a disaster over time?
c. Cold site
Answer: D
70. Which factor determines when your IT system will be available for knowledge
workers to
access?
a. Availability
b. Accessibility
c. Reliability
Answer: A
71. Which factor determines who has the right to access different types of IT
systems and
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer: B
72. Which factor ensures your IT systems are functioning correctly and providing
accurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer: C
73. Which factor represents how well your system can adapt to increased
demands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer: D
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer: A
75. What is a set of conditions used to measure how well a product or system
functions?
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer: D
network capacity?
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer: C
a. Workflow
b. ASP
c. Workflow system
d. EIP
Answer: C
78. What defines all of the steps or business rules, from beginning to end,
required for a process to
run correctly?
a. Workflow
b. EIP
c. Workflow system
d. SLA
Answer: A
Answer: D
a. firewall
b. Virus
c. Trojan horse
Answer: A
a. Warehousing
b. sales
c. scheduling
Answer: D
a. Warehousing
b. sales
c. scheduling
Answer: D
Answer: C
84. Which concept suggests that different applications and computer systems
should be able to
a. Integration
b. Web services
c. Scalability
d. Interoperability
Answer: D
85. Which service encompasses all technologies used to transmit and process
information on an
across a network?
a. Interoperability
b. Scalability
c. Benchmarking
d. Web services
Answer: D
86. Which process can prevent data from lose due to computer problems or
human errors?
a. backup
b. recovery
c. benchmarking
d. data cleansing
Answer: A
87. Which process is used to reinstall data from a copy when the original data has
been lost?
a. backup
b. recovery
c. benchmarking
d. data cleansing
Answer: B
a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing
Answer: C
a. firewall
b. EDI
c. ERP
d. Script kiddies
Answer: A
90. Who breaks into other people's computer systems and steals and destroys
information?
a. Hackers
b. softwares
c. Hacktivists
d. Script kiddies
Answer: a
91. What is software that comes hidden in free downloadable software and tracks
your online
a. Web log
b. Clickstream
Answer: C
a. Legacy systems
b. Bolt on applications
c. Operational database
d. Cybersoft
Answer: D
b. financial
c. warehousing
Answer: D
95. What is a type of virus that spreads itself, not just from file to file, but from
computer to
b. Worm
c. Denial‐of‐service attack
Answer: B
96. What floods a Web site with so many requests for service that it slows down
or crashes?
a. Computer virus
b. Worm
c. Denial‐of‐service attack
Answer: C
a. Computer virus
b. Worm
c. Denial‐of‐service attack
Answer: D
b. Risk assessment
c. Security
Answer: A
a. Risk management
b. Risk assessment
c. Security
Answer: B
a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics
Answer: A
a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics
Answer: B
102. What is hardware and/or software that protects computers from intruders?
a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics
Answer: C
103. What is the use of physical characteristics — such as your fingerprint, the
blood vessels
in the retina of your eye, the sound of your voice, or perhaps even your breath —
to provide
identification?
a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics
Answer: D
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer: C
105. What scrambles the contents of a file so you can't read it without having the
right
decryption key?
a. Encryption
b. Intrusion‐detection software
c. Security‐auditing software
Answer: A
106. What is an encryption system that uses two keys: a public key that everyone
can have
a. Encryption
c. Intrusion‐detection software
d. Security‐auditing software
Answer: B
107. What looks for people on the network who shouldn't be there or who are
acting
suspiciously?
a. Encryption
d. Security‐auditing software
Answer: C
108. What checks out your computer or network for potential weaknesses?
a. Encryption
c. Security‐auditing software
Answer: C
a. Your keyboard
b. Your monitor
c. Your processor
Answer: D
Answer: D
Answer: D
b. Blocks messages without the correct markings from entering the network
Answer: D
Answer: D
a. Network
b. File
c. Folder
a. Information
b. People
c. Information technology
d. Computers
Answer: B
a. Copyright
b. Intellectual property
c. Patent
d. Denial‐of‐service attack
Answer: C
117. When you purchase copyrighted software, what actually are you paying for?
b. The cost of the CDs, manuals, and a share of the cost of the software
development
Answer: D
Answer: D
a. Key logger
b. Packet sniffer
Answer: D
routers?
a. Key logger
b. Packet sniffer
d. Screen captures
Answer: B
a. Key logger
b. Packet sniffer
Answer: C
a. Sender's computer
b. Sender's server
c. Recipient's server
Answer: D
Answer: D
b. Ask people to fill out and return a fake letter using postal mail
c. Ask people to click a link in an e‐mail to open a submission form on a web page
Answer: B
125. A technique used to gain personal information for the purpose of identity
theft, often by
e‐mail, is called?
a. Phishing
b. Carding
c. Brand spoofing
Answer: D
126. Companies can gather information about employees and potential employees
from
a. Job applications
b. Credit reports
Answer: D
Answer: D
Answer: D
a. Junk mail
b. Spam
c. Extra mail
Answer: B
a. No‐Spam
b. CAN‐Spam
c. Spam‐Away
d. Stop Spam
Answer: B
131. What is the legal protection afforded an expression of an idea, such as a song,
video
a. Ethics
b. Intellectual property
c. Copyright
d. Fair Use Doctrine
Answer: C
b. Pirated software
c. Counterfeit software
d. Privacy
Answer: B
click?
c. Cookie
d. Adware
Answer: A
134. What is software you don't want hidden inside software you do want?
a. Adware
b. Trojan‐horse software
c. Spyware
Answer: D
135. What is an electronic representation of cash?
a. Digital cash
b. Electronic cash
c. E‐cash
Answer: D
piece of clothing similar to the way you would carry your cell phone on your belt?
a. Wearable computer
b. GPS
c. Implant chip
Answer: A
a. Wearable computer
b. GPS
c. Implant chip
Answer: C
138. Which of the following is not a reason why digital cash has turned out to be
extremely
difficult?
a. If your system crashes you lose your money
d. Digital cash travels across the vast Internet and is susceptible to begin stolen
Answer: B
a. Encryption
b. Firewall
c. Hub
Answer: A
c. BSNL only
d. None
Answer: A
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none
Answer: B
a. Credit card
b. Debit card
c. Master card
d. E‐cheque
Answer: D
a. Implant chips
b. Micro‐payments
Answer: D
144. Which of the following an accurate statement about internet phone calls?
Answer: A
145. What are the most commonly used input devices today?
a. Keyboard
b. Mouse
c. All of the above
Answer: C
146. Which of the following can be used to help identify people in a crowd?
a. Biochip
b. Implant chip
d. Vision chip
Answer: C
a. Credit card
b. Debit card
c. Paper cash
Answer: A
a.Prepaid
b.Postpaid
Answer: A
c. Both a and b
d. None of these
Answer: C
a. CC user software
b. CC merachant software
c. CC Server Software
Answer: D
a. Memory
b. Microchip
c. E‐cash
Answer: B
152. The smart card which use antenna for reading and writing data
d) Both B and C
Answer: D
153. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only.
d) Both B and C
Answer: C
154. Which of the smart card uses a sim like structure for reading and writing
data
d) Both B and C
Answer: A
a. SCM
b. EDI
c. WWW
d. BPR
Answer: D
a. International
b. Integrity
c. Identity
Answer: B
a. auditing
b. authenticity
c. authorized
Answer: B
a. confidentiality
b. conference
c. congress
Answer :A
159. Which one is the third party payment providers who offer digital wallets for
E‐
merchants
a. Oxicash
b. PayMate
c. PayPass
a. MCID
b. MMID
c. RSID
Answer: B
a. Threat
b. Danger
c. Error
Answer: A
a. RSA
b. DES
c. AES
Answer: D
a. Encryption
b. Cryptography
c. Wallets
d. Digital signature
Answer :C
164. Which e‐government arena is being used when governmental agencies send
out and
a) G2G
b) G2B
c) G2C
d) G2G
Answer: B
d. None of these
Answer: B
a. Sniffer programs
b. Cyber vandalism
c. Integrity threats
a. SSL
b. S‐HTTP
c. SET
Answer: D
168. The protocol which allows the file transfer between computers is
a. TCP/IP
b. FTP
c. HTTP
d. SOA
Answer: B
a. ATMs
b. Net banking
c. Traditional banking
d. None of these
Answer: B
a. EFT
b. EPS
c. PayPal
d. None of these
Answer: B
a. Malicious code
b. Viruses
c. Active contents
Answer: D
a. RSA
b. DES
c. AES
d. FTP
Answer: D
a. RSA
b. DES
c. AES
Answer: D
b. CGI threats
c. Database threats
d. Buffer overflows
Answer: A
a. Hacking
b. Storm
c. Phishing
Answer: A
a. Phishing
b. Storm
c. Earthquake
Answer: D
a. Hacking
b. Storm
c. Phishing
a. Home page
b. Web pages
Answer: D
a. Trojan horse
b. firewall
c. encryption
d. None
Answer: A
Answer: D
a. Cash on delivery
d. e‐cheque
Answer: D
a. Cash on delivery
c. Credit card
d. Both a and b
Answer: D
a. Cash on delivery
b. Debit card
c. Credit card
d. e‐cheque
Answer: A
a. Cash on delivery
c. Demand drafts
d. e‐cheque
Answer: D
b. Credit card
c. e‐cheque
d. none
Answer: D
a. On Time Password
b. On Time processing
d. None
Answer: A
a. Trojan horse
b. Viruses
c. Worm
d. None
Answer: D
a. Public key
b. Symmetric
c. Asymmetric
d. None
Answer: B
a. Private key
b. Symmetric
c. Asymmetric
d. None
Answer: C
a. Ethics
b. Intellectual property
c. Copyright
Answer: C
Answer: D
192. What is an arrangement made between e‐commerce sites that direct users
from one
site to the other?
a. Spam
b. Viral marketing
c. Affiliate programs
Answer: C
a. B2B
b. B2C
c. C2B
d. C2C
Answer: D
a. Physical layer
b. Product layer
c. Service layer
d. None
Answer: D
a. Worm
b. Virus
c. Trojan horse
d. All the above
Answer: D
a. Decryption
b. Cryptography
c. Firewall
Answer: B
a. Integrity
b. Security
c. Confidentiality
Answer: D
198. The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐
a. Macro
b. Trojan horse
c. Script virus
Answer: A
199. The virus that are attached with vb and java files are called
a. Macro
b. Trojan horse
c. Script virus
Answer: C
a. Mails
c. Websites
Answer: D
Answer:
A.Risk management
1. The dimension of e-commerce that enables commerce across national boundaries is called
_______.
A. interactivity.
B. global reach.
C. richness.
D. ubiquity.
ANSWER: B
3. Which one of the following is not one of the major types of e-commerce?
A. C2B.
B. B2C.
C. B2B.
D. C2C.
ANSWER: A
5. Which of the following is not considered to be one of the three phases of e-commerce?
A. Innovation.
B. Consolidation.
C. Preservation.
D. Reinvention.
ANSWER: C
6. The idealistic market envisioned at the outset of the development of e-commerce is called a
______.
A. Bailey market.
B. Baxter market.
C. Bergman market.
D. Bertrand market.
ANSWER: D
7. The primary source of financing during the early years of e-commerce was _______.
A. bank loans.
B. large retail firms.
C. venture capital funds.
D. initial public offerings.
ANSWER: C
8. The type of firms that benefited the most during the consolidation period of e-commerce
were _______.
A. large, traditional firms.
B. first movers.
C. pure online companies.
D. ISPs
ANSWER: A
9. All of the following are technologies used to gather information about you online except
______.
A. spy ware.
B. cookies.
C. Gmail.
D. anonymizers.
ANSWER: D
10. A _________ is the set of planned activities designed to result in a profit in a
marketplace.
A. business model.
B. profit model.
C. business plan.
D. revenue model.
ANSWER: A
14. All of the following are major B2C business models except ______.
A. content provider.
B. industry consortium.
C. transaction broker.
D. service provider.
ANSWER: B
15. The _________ business model involves an independently owned vertical digital
marketplace for direct
inputs.
A. e-distributor.
B. exchange.
C. e-procurement.
D. private industrial network.
ANSWER: B
16. Compared to Internet users, the number of cell phone subscribers is _________.
A. about the same.
B. slightly fewer.
C. much fewer.
D. much larger.
ANSWER: D
18. The area of actual or potential commercial value in which a company intends to operate is
a _______.
A. market space.
B. marketplace.
C. perfect market.
D. Bertrand market.
ANSWER: A
21. A situation where there are no differences among products or services, and the only basis
of choosing
products is price is known as ______.
A. a value web.
B. value chain.
C. profit.
D. commoditization.
ANSWER: D
22. A strategy designed to compete in all markets around the globe is called a _____ strategy.
A. scope.
B. differentiation.
C. cost.
D. focus.
ANSWER: A
23. Which of the following is not one of the stages of the development of the Internet?
A. Innovation.
B. Institutionalization.
C. Globalization.
D. Commercialization.
ANSWER: C
25. The component of TCP/IP that provides the Internet's addressing scheme and is
responsible for the
actual delivery of packets is ______.
A. TCP.
B. IP.
C. the Network Layer.
D. the Application Layer
ANSWER: B
26. Which protocol permits users to transfer files from the server to their client computer, and
vice versa?
A. HTTP.
B. SMTP.
C. IMAP.
D. FTP.
ANSWER: D
27. __________ is a program that you can run from the DOS prompt in the Windows
operating system in
order to check the connection between your client and the server.
A. Ping
B. Telnet
C. Tracert
D. SSL
ANSWER: A
28. Broadband is generally considered to be any communication technology allowing
streaming audio and
video at or above _____.
A. 100 Kbps.
B. 56.6 Kbps.
C. 30 Kbps.
D. 10 Kbps
ANSWER: A
29. Which of the following connections allows the fastest download speeds?
A. DSL.
B. cable modem.
C. T1.
D. T3.
ANSWER: D
32. Which of the following is a new and disruptive Web feature or service?
A. XML.
B. diffserv.
C. blogs.
D. CDMA.
ANSWER: C
33. All of the following are examples of 2G wireless phone technologies except _______.
A. CDMA.
B. W-CDMA.
C. TDMA.
D. GSM.
ANSWER: B
34. All of the following are wireless Internet access network technologies except ________.
A. Wi-Fi
B. Bluetooth.
C. Zigbee.
D. GigaPoP.
ANSWER: D
35. Internet users account for about ________ of the world's population.
A. 7%
B. 17%
C. 27%
D. 47%
ANSWER: B
36. Which of the following was the first commercial Web browser?
A. Mosaic.
B. Mozilla.
C. Netscape Navigator.
D. Internet Explorer
ANSWER: C
37. All of the following are steps in the systems development life cycle except ______.
A. Systems Design.
B. Testing.
C. Implementation.
D. Debugging.
ANSWER: D
38. A _________ describes the flow of information at your e-commerce site and the
infrastructure that will
be used in the system.
A. system design.
B. logical design.
C. tactical design
D. physical design.
ANSWER: B
39. All of the following are factors in optimizing Web site performance except _____.
A. page retrieval.
B. page generation.
C. page delivery.
D. page content.
ANSWER: A
42. What Web server functionality allows it verify usernames and passwords and process
certificates and
encryption information?
A. Processing of HTTP requests.
B. File Transfer Protocol.
C. Data capture.
D. Security services.
ANSWER: D
43. The underlying computing equipment that the system uses to achieve its e-commerce
functionality is
called a ______.
A. hardware platform.
B. content platform.
C. transaction platform.
D. scalability platform.
ANSWER: A
45. The set of standards for communication between a browser and a program running on a
server that
allows for interaction between the user and the server is known as _______.
A. Active Server Pages (ASP).
B. Java Server Pages (JSP).
C. Common Gateway Interface (CGI).
D. VBScript.
ANSWER: C
46. E-commerce merchant server software includes all of the following except_______.
A. online e-mail.
B. online catalog.
C. online shopping cart.
D. online credit card processing.
ANSWER: A
47. Which of the following is not a widely used midrange or high-end e-commerce suite?
A. Microsoft Commerce Server.
B. WebTrends Marketing Lab2.
C. IBM WebSphere Commerce.
D. Broadvision Commerce.
ANSWER: A
48. The ability to change the product to better fit the needs of the customer is called
________.
A. customization.
B. personalization.
C. privacy.
D. accessibility.
ANSWER: A
49. All of the following are tools for optimizing a Web site's location in search engine
listings except
______.
A. keywords and page titles.
B. identifying market niches.
C. buying ads.
D. benchmarking.
ANSWER: D
50. The most common type of Internet crime according to the IC3 is ______.
A. Credit card fraud.
B. Check fraud.
C. Non-delivery.
D. Auction fraud.
ANSWER: D
51. In the e-commerce security environment, which of the following constitutes the inner-
most layer?
A. people.
B. data.
C. technology solutions.
D. organizational policies and procedures.
ANSWER: B
52. All of the following are major categories of computer viruses except _____.
A. Macro viruses.
B. File-infecting viruses.
C. Script viruses.
D. Trojan viruses.
ANSWER: D
53. A worm is designed to spread _________.
A. from computer to computer.
B. from file to file on a computer.
C. from Web site to Web site.
D. from Web site to computer
ANSWER: A
54. Malicious hackers who act with the intention of causing harm are __________.
A. White hats.
B. Black hats.
C. Grey hats.
D. Brown hats.
ANSWER: B
55. When hackers flood a Web site with useless traffic to overwhelm the network, it is called
______.
A. phishing.
B. pharming.
C. a Denial of Service (DoS) attack.
D. spoofing.
ANSWER: C
61. The only payment system that is instantly convertible without intermediation is _______.
A. Credit card.
B. Accumulating balance.
C. Stored value.
D. Cash.
ANSWER: D
63. What is the name of the division of the U.S. Department of Homeland Security that
coordinates cyber
incident warnings and responses across government and private sectors?
A. US-CERT.
B. OECD.
C. IC3.
D. P3P.
ANSWER: A
64. After sending e-mail, which of the following activities is most common among Internet
users?
A. sending instant messages.
B. reading someone else's blog.
C. using a search engine to find information.
D. getting news.
ANSWER: C
65. __________ influence the behavior of others through their personality, skills, or other
factors.
A. Opinion leaders.
B. Direct reference groups.
C. Indirect reference groups.
D. Lifestyle groups.
ANSWER: A
66. All of the following are reasons more people don't shop online except ________.
A. lack of trust in online merchants.
B. lack of convenience.
C. inability to touch and feel the product.
D. fear of misuse of personal information.
ANSWER: B
67. A good or service for which there are many dealers supplying the same product, and all
products in the
segment are essentially identical is known as _______.
A. commodity.
B. core product.
C. actual product.
D. augmented product.
ANSWER: A
69. A(n) _________ represents data as two-dimensional tables with records organized in
rows and
attributes in columns.
A. database management system.
B. data warehouse.
C. SQL query.
D. relational database.
ANSWER: D
70. All of the following are types of data mining except ______.
A. selective data mining.
B. query-driven data mining.
C. model-driven data mining.
D. rule-based data mining.
ANSWER: A
71. Which of the following market entry strategies are the most common for existing firms?
A. first mover
B. fast follower.
C. brand extender.
D. alliances.
ANSWER: C
72. The process of getting customers to pass along a company's marketing message to
friends, family, and
colleagues is known as _______.
A. affiliate marketing.
B. viral marketing.
C. permission marketing.
D. blog marketing.
ANSWER: B
73. The per-product price consumers are willing to pay for a bundle ____________ as the
number of goods
in the bundle increases.
A. decreases.
B. increases.
C. varies from product to product.
D. stays the same.
ANSWER: B
74. Creating multiple versions of information goods and selling essentially the same product
to different
market segments at different prices is called_______.
A. versioning.
B. bundling.
C. transactive content.
D. price discrimination.
ANSWER: A
75. All of the following are examples of intelligent agent technology except ________.
A. automated response systems.
B. automatic shipping confirmation.
C. order status reports.
D. online web bugs.
ANSWER: D
77. The set of applications and technologies that allow users to create, edit, and distribute
content online is
known as______.
A. Internet.
B. social networking.
C. virtual life.
D. Web 2.0.
ANSWER: D
78. Which of the following represents a limiting factor for the growth of e-commerce?
A. Persistent cultural attraction of physical markets and traditional shopping experiences.
B. Inadequate selection of goods compared to physical marketplaces.
C. E-commerce lacks the convenience of other methods of transacting business.
D. The potential audience for e-commerce is too low to support it as a widespread method of
commerce.
ANSWER: A
80. All of the following are among the most common categories of spam except ______.
A. fraud.
B. commercial products.
C. finance.
D. health (drugs).
ANSWER: A
81. All of the following are types of social marketing except ______.
A. affiliate marketing.
B. blog advertising
C. social network advertising.
D. game advertising.
ANSWER: A
82. Which of the following measures the percentage of people exposed to an online
advertisement who
actually click on the banner?
A. impression rate.
B. view-through rate.
C. click-through rate.
D. stickiness ratio.
ANSWER: C
83. Which of the following is a measure of the percentage of purchasers who return to a Web
site within a
year?
A. loyalty.
B. reach.
C. recency
D. unique visitors.
ANSWER: A
84. All of the following are metrics for e-mail campaigns except ______.
A. open rate.
B. delivery rate.
C. bounce-back rate.
D. cart conversion rate.
ANSWER: D
85. As consumers become more accustomed to new online advertising formats, click-through
rates tend to
_______.
A. remain constant.
B. decrease.
C. increase.
D. rapidly increase.
ANSWER: B
86. The ethical principle which states that if an action is not right for all situations, then it is
not right for
any situation is known as ______.
A. The Golden Rule.
B. Slippery Slope.
C. No Free Lunch.
D. Universalism.
ANSWER: D
88. The ability of consumers to review and contest the accuracy and completeness of data
collected about
them involves which of the following FTC fair information practice principles?
A. Security.
B. Enforcement.
C. Choice/Consent.
D. Access/Participation.
ANSWER: D
89. The __________ is the first major effort to adjust the copyright laws to the Internet age.
A. Platform for Privacy Preferences (P3P).
B. Center for Democracy and Technology.
C. Digital Millennium Copyright Act (DMCA).
D. E-Government Act of 2002.
ANSWER: C
90. A patent grants the owner an exclusive monopoly on the ideas behind the invention for
______ years.
A. 10
B. 20
C. 30
D. 40
ANSWER: B
91. The number of business methods patents granted is ___________ compared to the
number of patents
applied for.
A. substantially smaller.
B. slightly smaller.
C. close to equal.
D. equal.
ANSWER: A
92. The redirection of traffic from a legitimate site to an infringing site is called _______.
A. cybersquatting.
B. cyberpiracy.
C. metatagging.
D. keywording.
ANSWER: B
93. During which period of Internet governance was Network Solutions given a monopoly to
assign and
track high-level domains?
A. Government Control Period.
B. Privatization.
C. Self-Regulation.
D. Governmental Regulation.
ANSWER: B
94. The taxation system for e-commerce sales is best described as ______.
A. complex.
B. streamlined.
C. universal.
D. standardized.
ANSWER: A
95. All of the following are acts Congress has passed or attempted to pass to protect children
online except
______.
A. Video Privacy Protection Act.
B. Children's Online Protection Act.
C. Communications Decency Act.
D. Children's Internet Protection Act.
ANSWER: A
96. Which of the following is a privacy advocacy group that is a foundation- and business-
supported group
with a legislative focus?
A. Cdt org.
B. Privacy International org.
C. Epic org.
D. Privacy org
ANSWER: A
98. All of the following are types of intellectual property protection except_______.
A. patents.
B. trademarks.
C. governance.
D. copyrights.
ANSWER: C
99. All of the following are challenges to online retail except ______.
A. Consumer concerns about the security of transactions.
B. Consumer concerns about the privacy of personal information given to Web sites.
C. Delays in delivery of goods when compared to store shopping.
D. Inability to change prices nearly instantly.
ANSWER: D
100. Which of the following is an industry strategic factor that relates to whether new
entrants face a
disadvantage when attempting to enter an industry?
A. barriers to entry
B. power of suppliers.
C. power of consumers.
D. industry value chain.
ANSWER: A
101. Companies that have a network of physical stores as their primary retail channel, but
also have
introduced online offerings are called ______.
A. Virtual merchants.
B. Bricks and clicks.
C. Catalog merchants.
D. Manufacturer-direct.
ANSWER: B
102. Products are made to prior to orders received based on estimated demand under a
______.
A. supply-push model.
B. demand-push model.
C. supply-pull model.
D. demand-pull model.
ANSWER: A
105. Which of the following is not one of the top three online career service providers?
A. CareerBuilder.
B. Monster.
C. HotJobs.
D. USAJobs.
ANSWER: D
109. Which of the following describes paid content's relation to free user-generated content?
A. Free content jeopardizes paid content
B. Paid content jeopardizes free content
C. Free content and paid content can both work in tandem cooperatively.
D. Paid content is viable now but will not be in the future.
ANSWER: C
112. The online content revenue model in which free content drives offline revenues is called
the ______.
A. marketing model.
B. advertising model.
C. pay-per-view model.
D. subscription model.
ANSWER: A
113. The combination of technical and legal means for protecting digital content from
unlimited
reproduction without permission is known as _____.
A. Digital rights management.
B. Digital protection schemes.
C. Digital distribution regulation.
D. Digital rights protection.
ANSWER: A
114. What is the most commonly offered interactive feature of newspaper Web sites?
A. video.
B. comments on blogs.
C. RSS feeds.
D. podcasts.
ANSWER: C
116. After television, the next largest major player in the commercial entertainment industry
is ______.
A. video games.
B. music.
C. radio.
D. film.
ANSWER: D
117. Which of the following is not an entertainment industry value chain model?
A. content owner direct model.
B. user distribution model.
C. aggregator model.
D. Internet innovator model.
ANSWER: B
118. Technologies that help enhance resolution of e-book reader display screens are known as
______.
A. high-res pixel formatting.
B. screen resolution technologies.
C. sub-screen smoothing technologies.
D. sub-pixel display technologies.
ANSWER: D
119. All of the following are characteristics of a social network except _______.
A. involves a group of people.
B. features shared social interaction.
C. always feature shared goals and purposes.
D. common ties among members.
ANSWER: C
120. Social networking sites primarily earn their revenue through ______.
A. advertising.
B. subscriptions.
C. donations.
D. service fees.
ANSWER: A
121. The type of social network described as a community built around a common interest
such as games,
sports, music, and so on is called _____.
A. general community.
B. practice network.
C. affinity community.
D. interest-based social network.
ANSWER: D
125. A dynamically priced market that features few buyers and many sellers is a market that
exhibits
______.
A. market neutrality.
B. buyer bias.
C. seller bias.
D. owner bias.
ANSWER: B
129. Which of the following portal revenue models involves charging for premium content?
A. ISP services.
B. General advertising.
C. Subscription fees.
D. Tenancy deals.
ANSWER: C
130. Which of the following best describes predicted growth in C2C and B2C auction
spending?
A. B2C spending will overtake C2C spending.
B. Both types of spending will increase.
C. C2C spending will decrease while B2C increases.
D. Both types of spending will decline at similar rates.
ANSWER: B
131. An auction that has multiple winners that all pay the same price is an example
of________.
A. uniform pricing.
B. discriminatory pricing.
C. bid rigging.
D. price matching.
ANSWER: A
132. The communication standard for sharing business documents and settlement information
that emerged
in the 1970s is called_____.
A. ECD.
B. EDI.
C. IDE.
D. BCB.
ANSWER: B
133. All of the following are potential benefits of B2B e-commerce except_________.
A. reduced amount of 'first-mover' advantages.
B. decreased product cycle time.
C. increased opportunities for collaborating with suppliers and distributors.
D. increased production flexibility.
ANSWER: A
134. Goods directly involved in the production process are known as _____.
A. MRO goods.
B. procured goods.
C. indirect goods.
D. direct goods.
ANSWER: D
136. The foundation for contemporary supply chain management systems includes all of the
following
except _____.
A. supply chain simplification.
B. continuous inventory replenishment.
C. ERP systems.
D. B2B electronic storefronts.
ANSWER: D
138. The type of Net marketplace characterized by indirect inputs and spot purchasing is
called an
_______.
A. industry consortium.
B. independent exchange.
C. e-distributor.
D. e-procurement marketplace.
ANSWER: C
139. The most common and easily understood type of Net marketplace is ______.
A. e-procurement marketplace.
B. e-distributors.
C. industry consortia.
D. independent exchanges.
ANSWER: B
140. All of the following are objectives of private industrial networks except ________.
A. developing efficient purchasing and selling business processes industry-wide.
B. operating on a local scale.
C. creating increased supply chain visibility.
D. reducing industry risk.
ANSWER: B
141. _____________ are networks that connect people within a company to each other and to
the
company network.
A. Bitstreams.
B. Extranets.
C. Internets.
D. Intranets.
ANSWER: D
142. _______________ is the encompassing term that involves the use of electronic
platforms - intranets,
extranets and the Internet - to conduct a company's business.
A. E-marketing.
B. E-business
C. E-procurement.
D. E-commerce.
ANSWER: B
143. Which of the following is not one of the benefits of e-commerce to sellers?
A. E-commerce offers greater flexibility in meeting customer needs.
B. E-commerce is a powerful tool for customer relationship building.
C. E-commerce can help to reduce costs.
D. E-commerce increases the net cost per contact.
ANSWER: D
144. The E-commerce domain that involves business activity initiated by the consumer and
targeted to
businesses is known as ______.
A. Business to Business (B2B).
B. Consumer to Consumer (C2C).
C. Consumer to Business (C2B).
D. Business to Consumer (B2C).
ANSWER: C
145. A _________ is a B2B trading network that links a particular seller with its own trading
partners.
A. bitstream.
B. virtual network.
C. web community.
D. private trading network.
ANSWER: D
146. The type of website that is designed to build customer goodwill and to supplement other
sales channels
rather then sell the company's products directly is known as a ______________ website.
A. marketing.
B. click-and-mortar.
C. customer service.
D. corporate.
ANSWER: D
147. When preparing a website, designers should ensure that the site enables user-to-user
communication.
This design feature is known as ___________.
A. context.
B. community.
C. commerce.
D. connection.
ANSWER: B