E - Commerce CH.2
E - Commerce CH.2
E - Commerce CH.2
Unit 2
Multiple Choice Questions with Answer Key
a. electronic check
b. electronic bill presentment and payment
c. conversion rates
d. financial cybermediary
Answer: d
a. electronic check
b. credit card
c. e-transfer
d. none of the above
Answer: a
a. e-commerce
b. online banking
c. e-cash
d. check
Answer: c
4. If you need to transfer money to another person via the internet,
which of the following methods could you use?
a. financial cybermediary
b. electronic check
c. electronic bill presentment and payment
d. all of the above
Answer: d
a. financial cybermediary
b. electronic check
c. electronic bill presentment and payment
d. all of the above
Answer: c
a. digital wallet
b. pop up ad
c. shopping cart
d. encryption
Answer: a
7. What is the name for direct computer-to-computer transfer of
transaction information contained in standard business documents?
a. internet commerce
b. e-commerce
c. transaction information transfer
d. electronic data interchange
Answer: d
a. e-commerce
b. financial electronic data interchange
c. electronic data exchange
d. electronic checks
Answer: b
a. encryption, decryption
b. private, public
c. encryption, public
d. public, private
Answer: d
10. For carrying out B2B e-Commerce the following infrastructure is
essential:
a. i, ii, iii
b. ii, iii, iv
c. ii, iii, iv, v
d. i, ii, iii, iv, v
Answer: c
a. i, ii
b. i, ii, iii
c. i, ii, iii, iv
d. ii, iii, iv
Answer: b
12. EDI standard
Answer: b
Answer: a
Answer: b
15. A computer ________ is a malicious code which self-replicates
by copying itself to other programs.
a. program
b. virus
c. application
d. worm
Answer: b
a. Research purpose
b. Pranks
c. Identity theft
d. Protection
Answer: d
a. Non-resident virus
b. Overwrite Virus
c. Polymorphic Virus
d. Space-filler Virus
Answer: d
18. ____________ deletes all the files that it infects.
a. Non-resident virus
b. Overwrite Virus
c. Polymorphic Virus
d. Multipartite Virus
Answer: b
a. Non-resident virus
b. Boot Sector Virus
c. Polymorphic Virus
d. Multipartite Virus
Answer: c
a. Non-resident virus
b. Boot Sector Virus
c. Polymorphic Virus
d. Multipartite Virus
Answer: d
21. Direct Action Virus is also known as ___________
a. Non-resident virus
b. Boot Sector Virus
c. Polymorphic Virus
d. Multipartite Virus
Answer: a
Answer: b
Answer: a
24. Which of them is not an ideal way of spreading the virus?
a. Infected website
b. Emails
c. Official Antivirus CDs
d. USBs
Answer: c
a. Boot virus
b. Macro virus
c. File virus
d. Anti virus
Answer: b
a. It is hardware
b. It is system software
c. It is a computer program
d. It is a windows tool
Answer: c
27. ________________ are unnecessary software which infiltrates
user’s system, spy on user’s activities, stealing internet usage data
& sensitive information of that user.
a. Shareware
b. Spyware
c. Ransomware
d. Freeware
Answer: b
28. They spy on our digital habits and spy on which data is more
sensitive or useful for its creator. Who are ‘they’ referring to?
a. Shareware
b. Ransomware
c. Spyware
d. Freeware
Answer: c
a. advertisers
b. dark-market
c. antivirus company
d. share market
Answer: a
30. Which of the following activity is not done by spyware?
Answer: d
Answer: c
a. passwords
b. email ID
c. name
d. address
Answer: a
33. By security in e-Commerce we mean
a. I and ii
b. ii and iii
c. iii and iv
d. i, iii and iv
Answer: d
a. Electronic Check
b. Electronic bill presentment and payment
c. Conversion rates
d. Financial cybermediary
Answer: d
a. Anonymity
b. Security
c. Confidentiality
d. All of Above
Answer: d