1
1
1
QUESTION BANK
COURSE: M.Com (CA) SEMESTER:IV
SUBJECT CODE: 17PCC4E3 SUBJECT: E-COMMERCE & CYBER SECURITY
K1 LEVEL
a. B2C E-commerce
b. C2C E-commerce
c. B2B E-commerce
b. A customer buys several electronic coins which are digitally signed by coin
issuing bank
telecommunication network
a. Watching videos
c. Making friends
d. Receiving products
7. Which one of the following is not one of the major types of e-commerce?
a. C2B
b. B2C
c. B2B
d. C2C
8. Which of the following is not considered to be one of the three phases of e-commerce?
a. Innovation
b. Consolidation
c. Preservation
d. Reinvention
9. Which of the following is not one of the stages of the development of the internet?
a. Innovation
b. Institutionalization
c. Globalization
d. Commercialization
a. B2B
b. C2B
c. C2B
d. None of these
a. Suppliers
b. Customers
c. Channel partners
d. All of these
13. The customers may not interfaces with the company directly, but through the____
a. Service providers
b. Channel partners
c. Employees
d. Consumer
14. ______ is a generic terms for distributors, dealers, retailers etc…
a. Service provider
b. Supplier
c. Channel partners
d. Regulatory authority
15. The-------of business process fades the boundary separating them and they gradually
integrate
a. Electronification
b. Organization
c. Computerization
d. Transaction process
a. Internet plagiarism
b. Internet reference
c. Internet surfing
d. Internet publishing
a. EDI
b. KWS
c. OAS
d. MIS
a. Trading partners
b. Translation software
c. Communications
d. All of these
a. Insurance
b. Marketing
c. Manufacturing
d. Purchasing
22. The underlying _____of these products was cost containment, processing to account
information reconciliation.
a. CRS
b. USP
c. MIS
d. OAS
23. In which year credit card companies had spread across the globe and the member
merchant establishment numbered millions
a. 1970's
b. 1980's
c. 1960's
d. 1969's
24.___ is need to own or have access to a computer and be online and know to use the
internet.
a. Customers
b. Servicer
c. Marketing
d. Business
25. EC is the application of technology toward the automatic of business transactions and
b. Service perspective
c. Online perspective
d. Communication perspective
26.___ is the generic term for all agencies responsible for law enforcement
a. Service providers
b. Regulatory authority
c. Suppliers
d. Channel partners
a. Suppliers
b. Business
c. Consumer
d. None of these
29. A value added networks is a private network providers sometimes called as _____
b. Trading partners
30. The two companies or groups which exchanged information through EDI are called the _
a. Channel partners
b. Trading partners
c. Customer
d. Marketing
a. 1980
b. 1970
c. 1960
d. 1940
32.___ is the e-commerce enable use of credit card, debit card, smart card etc...
a. Advertisement
c. Support
d. Inventory management
b. B2C
c. C2C
d. C2B
34.____are tools or option available to hackers whereby they can not only monitor but
a. Less privacy
b. Infrastructure
c. Less security
d. Physical proximity
35._____can put review commands about a product and see the review comments of other
a. Customers
b. Service
c. Business
d. None of these
a. MIS
b. EDI
c. KWS
d. OAS
37. .___ emphasis the generation and exploitation of new business opportunities over internet
a. E-commerce
b. Business
c. Customers
d. Marketing
38. ________system have become increasingly popular due to widespread use of the internet
a. EPS
b. EDI
c. B2C
d. C2B
a. E-cash
b. E-wallet
c. Smart card
d. Credit card
40. Which of the following is not considered to be one of the three phases of e-commerce?
a. Innovation
b. Consolidation
c. Preservation
d. Reinvention
41. ____ is a system which helps the customer or user to make a online payment for their
Shopping.
a. EPS
b. EDI
c. CCT
d. All of these
a. 2
b. 3
c. 5
d. 4
43._____ methods are an electronic payment
a. 5
b. 6
c. 4
d. 3
44. A system that allows a person to pay for goods or services by transmitting a number from
a. E-pay
b. E-cash
c. E-wallet
d. Credit card
a. E-cash
b. Wallet
c. Credit card
d. Debit card
46. ______ is any pocket-sized card with embedded integrated
a. Debit card
b. Credit card
c. E-wallet
d. Master card
47. Which one of the following is not one of the major types of e-commerce?
a. C2B
b. B2C
c. B2B
d. C2C
a. B2BS
b. B2CS
c. C2BS
d. C2CS
a. Small products
b. Digital products
c. Speciality products
d. Fresh products
50. Which form of e-commerce currently accounts for about 97 % of all e-commerce
revenues?
a. B2B
b. B2C
c. C2B
d. C2C
51. _____ is a global e-commerce business allowing payment and money transfer to be made
a. PayPal
b. Bank payment
c. Credit card
d. Wallet
a. Banner adds
b. Popup adds
53. What is the percentage of customers who visit a website and actually buy some thing
called?
a. Attitude programs
b. Click-throws
c. SPGM
d. Conversion ratio
54. _________ have become one of the most common forms of payment for e-commerce
transactions.
a. Credit card
b. Debit card
c. Smart card
d. E-cash
55. Plastic card containing an embedded microchip and available for over 10 year is called _
a. Smart card
b. Credit card
c. Debit card
d. PayPal
56. _______ is popular method of online payment.
a. Debit card
b. Credit card
c. E-pay
d. Wallet
a. Credit card
b. Debit card
c. Wallet
d. PayPal
58. __________is a plastic card which provides an alternative payment method to cash when
making purchases
a. Credit
b. Debit
c. E-cash
d. Wallet
59. European community members are also planning do levy processing for
non ____ documentation
a. EDI
b. CCT
c. EPS
a. E-commerce
b. EDI
c. EPS
d. Internet
a. Business to business
b. Business to customer
c. Customer to business
d. Customer to customer
a. Trading partner
b. Translation software
c. Translation of business data
d. Communication
63. ______ is a collection of facts organized in such a way that they have additional value
b. Digital data
a. Technical
b. Authentication
c. Privacy
d. Non-Technical Attacks
a. Digital of Service
b. Denial of Security
c. Denial of Service
d. Data of Service
66. Online banking also known as _____ banking.
a. Internet banking
b. Mobile banking
c. E-banking
d. Banking
67. The ______ will typically connect to or be part of the core banking.
c. E-banking system
d. Online banking
68. _____is networking of branches, which enables Customers to operate their accounts.
c. Both a &b
a. Banks
b. Online
c. Retail
d. Core
a. Transaction accounts
b. Loans, mortgages
c. Payments
72. Core allows banks to access applications from _____ data centre.
a. Commercialized
b. Centralized
c. Century
d. Corelized
73. _____ offers invariably all information that a bank's customers need.
a. CBS
b. CBC
c.CBR
d. CRE
a. Recording of transactions
b. Passbook maintenance
c. Interest calculations
b. CBS
c. DOS
76. ______ assists customers in retaining their identity rather than remembering passwords,
b. Retail
c. Core marketing
d. Security
a. Model
b. Digital
c. Traditional
d. Online
a. Chennai
b. Bangalore
c. New Delhi
d. Mumbai
79. The president of India who gave assent to Information Technology Act 2000 _____
b. K.R Narayanan
c. Pratibha Patil
d. None of these
b. Stealing of a computer
d. None of these
a. Phishing attacks
b. Money thefts
c. Data misuse
82. E-commerce security is a set of protocols that safely guide ___ transactions
a. E-commerce
b. Retail
c. Digital
d. Economic
83. ____ is one of the most important and interesting e-commerce issues.
a. Reintermediation
b. Disintermediation
c. Intermediation
d. Both a & b
84._____ replaces the traditional verification methods of showing identity cards or entering
a. Security
b. Biometric
a. Authorization
b. Confidentiality
c. Bio-metric
d. Authority
a. Authorization
b. Confidentiality
c. Security
d. Publicity
87. ______ helps an ecommerce website to tighten their security measures by replacing old
a. Bio-metric modalities
b. Security
c. Google
d. E-banking
88. E-commerce ____ refers to the principles which guide safe electronic transactions.
a. Transactions
b. Authorization
c. Security
d. Authority
89. Which of the following is the common legal issue faced by ecommerce?
a. Incorporation Problem
c. Transaction Issues
customers.
a. Privacy
b. Security
c. Bio-metric
d. Legal issues
91. _____is an activity which a person or firm uses the existing domain name belong to the well-
known organization .
a. Bio-metric
b. Legal issues
c. Cyber squatting
d. Ethical issues
a. Web spoofing
b. Cyber-squatting
c. Privacy
d. Security
d. Unsolicited Co E-mail
94. The ____ occur when the personal details belong to consumers are exposed to the
unauthorized party.
a. Private invasion
b. Public invasion
c. Privacy invasion
d. Security invasion
95. ____ is an essential part of any transaction that takes place over the internet.
a. Security
b. E-commerce
c. Cyber security
d. E-banking
sender knows
a. October 30
b. November 30
c. December 30
d. January 30
99. Information Technology Act, 2000 made amendment to which of the following existing
laws?
100. Any criminal activity that uses a computer either as an instrumentality, target or a means
a. Software piracy
b. Cyber crime
c. Conventional crime
d. None of these
A. I Love You
B. Blaster
C. Sasser
D. Creeper
102.MCAfee is an example of
D. Antivirus
A. illegalware
B. badware
C. malware
D. maliciousware
104.To protect a computer from virus, you should install -------- in your computer
A. backup wizard
B. disk cleanup
C. antivirus
D. disk defragmenter
106.Which of the following virus overtake computer system, when it boots and destroy information?
A. System infectors
B. Trojan
C. Boot infectors
D. Stealth virus
A. Script
B. Firewall
C. VLC
D. Antivirus
D. unauthorized access
K2 LEVEL QUESTIONS
1. Discuss the concept of E-commerce?
2. Explain traditional commerce?
3. Describe any four drivers of E-commerce?
4. Discuss any two E-commerce activities?
5. Explain any two features of E-commerce?
6. Explain the perspectives of E-commerce?
7. Describe the limitations of E-commerce?
8. Predict the merit of E-commerce?
9. Explain about the MIS?
10. Clarify the KWS?
11. Explain about EDI?
12. Classify the model of E-commerce?
13. Classify the concept B2C transaction?
14. Discuss the features of EDI?
15. Describe the benefits of EDI?
16. Explain the components of EDI?
17. Identify the application of EDI?
18. Describe the mobile commerce?
19. Discuss any two application of mobile commerce?
20. Explain EDS?
21. Discuss any two types of electronic payment system?
22. Explain the traditional payment system?
23. Clarify the features of electronic payment system?
24. Discuss any two advantage of electronic payment system?
25. Discuss any two advantages of mobile commerce?
26. Discuss about online banking
27. Extend the term CBS
28. Classify any two of the Advantages of online banking
29. Explain Core Banking Solutions
30. Extend the term CORE
31. Indicate the traditional verification methods?
32. Explain the term confidentiality?
33. Discuss some examples of biometric modalities
34. Illustrate the issues in E- Commerce
35. Differentiate the security tools of E- Commerce
36. Interpret the term Biometrics
37. Classify the issues of E- Commerce
38. Compare Ethical and legal Issues.
39. Recognize the Applications of Biometrics
40. Associate any two common legal issues faced by E-Commerce
41. Explain Cyber Law
42. Show down the provision of Cyber Law
43. List out the aims of Cyber law
44. Rephrase Authorization
45. Discuss about IT Act 2000
46. Discuss Authentication
47. Demonstrate Electronic Records
48. Summarize the term Digital signature
49. List out the types of offenses.
50. Extent Criminal offenses
K3 LEVEL QUESTIONS
1. Analyze the perspective of E-Commerce.
2. Simplify the history of E-Commerce.
3. Discover the adoption of E-Commerce.
4. List out the advantages of E-Commerce
5. Simplify the meaning of E-Commerce and state its disadvantages.
6. Categorize to future of EDI.
7. Analyze the architecture of EDI.
8. List out the basic components of EDI.
9. List out the Advantages of mobile commerce.
10. State the meaning of mobile commerce and examine its disadvantages.
11. Categorize the feature of electronic payment system.
12. Simplify the meaning of electronic payment system and state its advantages.
13. List out the disadvantages of electronic payment system.
14. State the meaning of core banking solution and examine its advantages.
15. Discover the disadvantages of core banking solution.
16. Categorize the components of security issues.
17. Simplify the risk involved in security issues of E-Commerce.
18. Classify the security tools of E-Commerce.
19. List out the types of ethical issues.
20. Discover the types of legal issues.
21. Define cyber Law and simplify the aims of cyber law.
22. Discover the cyber law in India.
23. List out the Provision of IT Act 2000 in India.
24. Classify the civil offense of IT Act 2000.
25. Simplify the criminal offense of IT Act 2000.
K4 & K5 QUESTIONS
1. Distinguish between the traditional commerce and electronic commerce.
2. Classify the frame work of E-Commerce.
3. Examine the drives of E-Commerce.
4. Point out the advantage and disadvantages of E-Commerce.
5. Classify the various models of E-Commerce.
6. Examine the EDI Standards.
7. Categorize the applications of mobile commerce.
8. Outline the advantage and disadvantage of mobile commerce.
9. Determine the problems in traditional Payment System.
10. Classify the types of electronic commerce.
11. Distinguish Between traditional payment system and electronic payment system.
12. Examine the advantage and disadvantage of Electronic payment system.
13. Explain the advantage and disadvantage of core banking solution.
14. Differentiate the security tools of E-Commerce.
15. Analyze the application of Bio metrics.
16. Compare the types of ethical and legal issues.
17. Examine the provision of cyber law.
18. Categorize the electronic records.
19. Criticize the types of digital signature.
20. Outline the civil offenses and criminal offenses of IT Act 2000.