You are on page 1of 31

ECommerce

BCom
IIISem
MultipleChoiceQuestions

1. Whichofthefollowingdescribesecommerce?
a. Doingbusinesselectronically
b. Doingbusiness
c. Saleofgoods
d. Alloftheabove
Answer:A
2. Whichofthefollowingispartofthefourmaintypesforecommerce?
a. B2B
b. B2C
c. C2B
d. Alloftheabove
Answer:D
3. WhichsegmentdoeBay,Amazon.combelong?
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer:B
4. Whichtypeofecommercefocusesonconsumersdealingwitheachother?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
5. WhichsegmentiseBayanexample?
a. B2B
b. C2B
c. C2C
d. Noneoftheabove

Answer:D
6. Whichtypedealswithauction?
a. B2B
b. B2C

c. C2B
d. C2C
Answer:D
7. InwhichwebsiteGlobalEasyBuyisfacilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8. ThebestproductstosellinB2Cecommerceare:
a. Smallproducts
b. Digitalproducts
c. Specialtyproducts
d. Freshproducts
Answer:B
9. WhichproductsarepeoplemostlikelytobemoreuncomfortablebuyingontheInternet?
a. Books
b. Furniture
c. Movies
d. Alloftheabove

Answer:B
10. WhichproductsarepeoplemostlikelytobecomfortablebuyingontheInternet?
a. Books
b. PCs
c. CDs
d. Alloftheabove
Answer:D
11. DigitalproductsarebestsuitedforB2Cecommercebecausethey:
a. Arecommoditylikeproducts
b. Canbemasscustomizedandpersonalized
c. Canbedeliveredatthetimeofpurchase
d. Alloftheabove
Answer:D
12. Thesolutionforallbusinessneedsis
a. EDI
b. ERP
c. SCM
d. Noneoftheabove
Answer:B
13. AllofthefollowingaretechniquesB2Cecommercecompaniesusetoattractcustomers,
except:
a. Registeringwithsearchengines

14.

15.

16.

17.

18.

19.

b. Viralmarketing
c. Onlineads
d. Virtualmarketing
Answer:D
WhichisafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. alloftheabove
Answer:D
WhichisnotafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. noneoftheabove
Answer:C
Whichtermrepresentsacountofthenumberofpeoplewhovisitonesite,clickonanad,and
aretakentothesiteoftheadvertiser?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Alloftheabove
Answer:B
WhatisthepercentageofcustomerswhovisitaWebsiteandactuallybuysomethingcalled?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Conversionrate
Answer:D
Whatarematerialsusedinproductioninamanufacturingcompanyorareplacedontheshelf
forsaleinaretailenvironment?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:A
Whatarematerialsthatarenecessaryforrunningamoderncorporation,butdonotrelateto
thecompany'sprimarybusinessactivities?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove

20.

21.

22.

23.

24.

25.

26.

Answer:B
Whatareballpointpenspurchasedbyaclothingcompany?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
Whatisanothernamefor?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
Whatistheprocessinwhichabuyerpostsitsinterestinbuyingacertainquantityofitems,and
sellerscompeteforthebusinessbysubmittingsuccessivelylowerbidsuntilthereisonlyone
sellerleft?
a. B2Bmarketplace
b. Intranet
c. Reverseauction
d. Internet
Answer:C
Whatareplasticcardsthesizeofacreditcardthatcontainsanembeddedchiponwhichdigital
informationcanbestored?
a. Customerrelationshipmanagementsystemscards
b. Egovernmentidentitycards
c. FEDIcards
d. Smartcards
Answer:D
Mostindividualsarefamiliarwithwhichformofecommerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:B
Whichformofecommercecurrentlyaccountsforabout97%ofallecommercerevenues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:A
WhichofthefollowingareadvantagesnormallyassociatedwithB2Becommerce?
a. Shortercycletimes

27.

28.

29.

30.

31.

32.

33.

b. Reductionincosts
c. Reacheswideraudiences
d. alloftheabove
Answer:D
Ifthethreatofsubstituteproductsorservicesislowitisa(n):
a. Disadvantagetothesupplier
b. Advantagetothebuyer
c. Advantagetothesupplier
d. Noneoftheabove
Answer:C
Thethreatofnewentrantsishighwhenitis:
a. Hardforcustomerstoenterthemarket
b. Hardforcompetitorstoenterthemarket
c. Easyforcompetitorstoenterthemarket
d. Easyforcustomerstoenterthemarket
Answer:C
Ifitiseasyforcompetitorstoenterthemarket,thethreatofnewentrantsisconsidered:
a. High
b. Low
c. More
d. Less
Answer:A
Anindustryislessattractiveforsupplierswhentherivalryamongexistingcompetitorsis:
a. High
b. Low
c. More
d. Less
Answer:A
Uniquevalueauctionismainlyappliesto?
a. Newproducts
b. Secondhandproducts
c. Engineeringproducts
d. Noneoftheabove
i. Answer:B
Paisapayisfacilitatedin
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. noneoftheabove
Answer:A
Whichofthefollowingisausefulsecuritymechanismwhenconsideringbusinessstrategyand
IT?

encryption
decryption
firewall
alltheabove
Answer:D
34. Whichofthefollowingisnotrelatedtosecuritymechanism
a. encryption
b. decryption
c. ecash
d. alltheabove
a.
b.
c.
d.

35.

36.

37.

38.

39.

Answer:C
Aproductorservicethatcustomershavecometoexpectfromanindustry,whichmustbe
offeredbynewentrantsiftheywishtocompeteandsurvive,isknownasa(n)?
a. Switchingcosts
b. Loyaltyprograms
c. Entrybarriers
d. Affiliateprograms
Answer:C
Whichofthefollowingstatementsaccuratelyreflecttheimpactoftechnology?
a. Technologyhascausedbuyerpowertoincrease
b. Technologyhaslessenedtheentrybarriersformanyindustries
c. Technologyhasincreasedthethreatofsubstituteproductsandservices
d. alloftheabove
Answer:D
Abusinesscannotbeallthingstoallpeople.Instead,abusinessmust:
a. Identifytargetcustomers
b. Identifythevalueofproducts/servicesasperceivedbycustomers
c. alloftheabove
d. Noneoftheabove
Answer:C
Howthetransactionsoccurinecommerce?
a. Usingemedias
b. Using computers only
c. Usingmobilephonesonly
d. Noneoftheabove
Answer:A
Whichtypeofproductsislesserpurchasedusingecommerce?
a. automobiles
b. books
c. softwares
d. none

40.

41.

42.

43.

44.

45.

46.

Answer:A
Abusinesscompetinginacommoditylikeenvironmentmustfocusonwhichofthefollowing?
a. Price
b. Ease/speedofdelivery
c. Easeofordering
d. alloftheabove
Answer:D
Whichofthefollowingreferstocreatingproductstailoredtoindividualcustomers?
a. customization
b. aggregation
c. Directmaterials
d. Reverseauction
Answer:A
Materialsusedinthenormaloperationofabusinessbutnotrelatedtoprimarybusiness
operationsarecalledwhat?
a. Supplies
b. Directmaterials
c. Indirectmaterials
d. Dailystuff
Answer:C
Amazon.comiswellknownforwhichecommercemarketingtechnique?
a. Bannerads
b. Popupads
c. Affiliateprograms
d. Viralmarketing
Answer:C
Whatisthenamegiventoaninteractivebusinessprovidingacentralizedmarketwheremany
buyersandsupplierscancometogetherforecommerceorcommercerelatedactivities?
a. Directmarketplace
b. B2B
c. B2C
d. Electronicmarketplace
Answer:D
Whichformofemarketplacebringstogetherbuyersandsellersfrommultipleindustries,often
forMROmaterials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
Whichformofemarketplacebringstogetherbuyersandsellersfromthesameindustry?
a. horizontal

47.

48.

49.

50.

51.

52.

b. Vertical
c. Integrated
d. Inclined
Answer:B
Whichtypeofaddappearsonawebpage?
a. popunderad
b. Popupad
c. Bannerad
d. Discountad
Answer:C
Whattypeofadappearsontopofawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:B
Whattypeofadappearsunderawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:A
Which,ifany,ofthefollowingtypesofadsarepeoplemostwillingtotolerate?
a. popunderad
b. popupad
c. bannerad
d. noneoftheabove
Answer:D
WhichofthefollowingisanInternetbasedcompanythatmakesiteasyforonepersontopay
anotherovertheInternet?
a. electroniccheck
b. electronicbillpresentmentandpayment
c. conversionrates
d. financialcybermediary
Answer:D
Whichofthefollowingisamethodoftransferringmoneyfromoneperson'saccountto
another?
a. electroniccheck
b. creditcard
c. etransfer
d. noneoftheabove
Answer:A

53. Anelectroniccheckisoneformofwhat?
a. ecommerce
b. onlinebanking
c. ecash
d. check
54. Ifyouneedtotransfermoneytoanotherpersonviatheinternet,whichofthefollowing
methodscouldyouuse?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:D
55. Whichofthefollowingpermitsthetransmissionofabill,alongwithpaymentofthatbill,tobe
conductedovertheInternet?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:C
56. Acombinationofsoftwareandinformationdesignedtoprovidesecurityandinformationfor
paymentiscalledawhat?
a. digitalwallet
b. popupad
c. shoppingcart
d. encryption
Answer:A
57. Whatisthenamefordirectcomputertocomputertransferoftransactioninformation
containedinstandardbusinessdocuments?
a. internetcommerce
b. ecommerce
c. transactioninformationtransfer
d. electronicdatainterchange
Answer:D
58. WhichofthefollowingisusedinB2Btopayforpurchases?
a. ecommerce
b. financialelectronicdatainterchange
c. electronicdataexchange
d. electronicchecks
Answer:B
59. Publickeyencryptionusesmultiplekeys.Onekeyisusedtoencryptdata,whileanotherisused
todecryptdata.Thekeyusedtoencryptdataiscalledthe_____key,whilethekeyusedto
decryptdataiscalledthe_____key.

encryption,decryption
private,public
encryption,public
public,private
Answer:D
SecureSocketsLayersdoeswhichofthefollowing?
a. createsasecure,privateconnectiontoawebserver
b. encryptsinformation
c. sendsinformationovertheinternet
d. alloftheabove
Answer:D
Whenatransactionisprocessedonline,howcanthemerchantverifythecustomer'sidentity?
a. usesecuresocketslayers
b. usesecureelectronictransactions
c. useelectronicdatainterchange
d. usefinancialelectronicdatainterchange
Answer:B
Thepracticeofforgingareturnaddressonanemailsothattherecipientisfooledinto
revealingprivateinformationistermed?
a. hacking
b. cracking
c. dumpsterdiving
d. spoofing
Answer:D
Whatisamodelofaproposedproduct,service,orsystem?
a. Prototyping
b. Prototype
c. Proofofconceptprototype
d. Sellingprototype
Answer:B
WhatisaninternalorganizationalInternetthatisguardedagainstoutsideaccessbyaspecial
securityfeaturecalledafirewall(whichcanbesoftware,hardware,oracombinationofthe
two)?
a. Client/servernetwork
b. Intranet
c. Extranet
d. Thinclient
Answer:B
Whatisanintranetthatisrestrictedtoanorganizationandcertainoutsiders,suchascustomers
andsuppliers?
a. Client/servernetwork
b. Intranet
a.
b.
c.
d.

60.

61.

62.

63.

64.

65.

66.

67.

68.

69.

70.

c. Extranet
d. Thinclient
Answer:C
WhatisadetailedprocessforrecoveringinformationoranITsystemintheeventofa
catastrophicdisastersuchasafireorflood?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:A
Whatisaseparatefacilitythatdoesnothaveanycomputerequipmentbutisaplacewherethe
knowledgeworkerscanmoveafterthedisaster?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:C
Whatisaseparateandfullyequippedfacilitywherethecompanycanmoveimmediatelyafter
thedisasterandresumebusiness?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:B
Whatcharts(1)thecosttoyourorganizationoftheunavailabilityofinformationandtechnology
and(2)thecosttoyourorganizationofrecoveringfromadisasterovertime?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:D
WhichfactordetermineswhenyourITsystemwillbeavailableforknowledgeworkersto
access?
a. Availability
b. Accessibility
c. Reliability
d. Noneoftheabove
Answer:A

71. WhichfactordetermineswhohastherighttoaccessdifferenttypesofITsystemsand
information?

a.
b.
c.
d.

Availability
Accessibility
Reliability
Scalability
Answer:B

72. WhichfactorensuresyourITsystemsarefunctioningcorrectlyandprovidingaccurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:C
73. Whichfactorrepresentshowwellyoursystemcanadapttoincreaseddemands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:D
74. Whichfactorrepresentsasystem'sabilitytochangequickly?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:A
75. Whatisasetofconditionsusedtomeasurehowwellaproductorsystemfunctions?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:D
76. WhatdeterminesthefutureITinfrastructurerequirementsfornewequipmentandadditional
networkcapacity?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:C
77. Whatautomatesbusinessprocesses?

Workflow
ASP
Workflowsystem
EIP
Answer:C
Whatdefinesallofthestepsorbusinessrules,frombeginningtoend,requiredforaprocessto
runcorrectly?
a. Workflow
b. EIP
c. Workflowsystem
d. SLA
Answer:A
Whatsendsworkassignmentsthroughanemailsystem?
a. Databasebasedenterpriseinformationportal
b. Messagingbasedenterpriseinformationportal
c. Databasebasedworkflowsystem
d. Messagingbasedworkflowsystem
Answer:D
Whichwillnotharmcomputerresources
a. firewall
b. Virus
c. Trojanhorse
d. Noneoftheabove
Answer:A
WhichisnotafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. Noneoftheabove
Answer:D
WhichisafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. alloftheabove
Answer:D
Whichofthefollowingistheprimarycharacteristicofanintranet?
a. Peopleoutsidetheorganizationcanaccessit
b. Peopleinsidetheorganizationcan'taccessit
c. Peopleoutsidetheorganizationcan'taccessit
d. Noneoftheabove
Answer:C
a.
b.
c.
d.

78.

79.

80.

81.

82.

83.

84. Whichconceptsuggeststhatdifferentapplicationsandcomputersystemsshouldbeableto
communicatewithoneanother?
a. Integration
b. Webservices
c. Scalability
d. Interoperability
Answer:D
85. Whichserviceencompassesalltechnologiesusedtotransmitandprocessinformationonan
acrossanetwork?
a. Interoperability
b. Scalability
c. Benchmarking
d. Webservices
Answer:D
86. Whichprocesscanpreventdatafromloseduetocomputerproblemsorhumanerrors?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:A
87. Whichprocessisusedtoreinstalldatafromacopywhentheoriginaldatahasbeenlost?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:B
88. Whatdescribesaprocessofcontinuouslymeasuringresultsandcomparingthoseresultsto
optimalperformancesothatactualperformancemaybeimproved?
a. Performance
b. Capacityplanning
c. Benchmarking
d. Datacleansing
Answer:C
89. Whoprotectssystemfromexternalthreats?
a. firewall
b. EDI
c. ERP
d. Scriptkiddies
Answer:A
90. Whobreaksintootherpeople'scomputersystemsandstealsanddestroysinformation?
a. Hackers
b. softwares

91.

92.

93.

94.

95.

96.

c. Hacktivists
d. Scriptkiddies
Answer:a
Whatissoftwarethatcomeshiddeninfreedownloadablesoftwareandtracksyouronline
movements,minestheinformationstoredonyourcomputer,orusesyourcomputer'sCPUand
storageforsometaskyouknownothingabout?
a. Weblog
b. Clickstream
c. AnonymousWebbrowsingservice
d. Noneoftheabove
Answer:D
ERPstandsfor
a. Enterpriseresolutionplanning
b. Enterprisereverseplanning
c. Enterpriseresourceplanning
d. Noneoftheabove
Answer:C
WhichisnotacomponentofERP?
a. Legacysystems
b. Boltonapplications
c. Operationaldatabase
d. Cybersoft
Answer:D
WhichisnotafunctionofERP?
a. Humanresourcemanagement
b. financial
c. warehousing
d. Noneoftheabove
Answer:D
Whatisatypeofvirusthatspreadsitself,notjustfromfiletofile,butfromcomputerto
computerviaemailandotherInternettraffic?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:B
WhatfloodsaWebsitewithsomanyrequestsforservicethatitslowsdownorcrashes?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:C

97. WhatharnessesfarflungcomputerstogetherbywayoftheInternetoravirtualprivatenetwork
toshareCPUpower,databases,anddatabasestorage?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:D
98. Whatconsistsoftheidentificationofrisksorthreats,theimplementationofsecuritymeasures,
andthemonitoringofthosemeasuresforeffectiveness?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:A
99. WhatistheprocessofevaluatingITassets,theirimportancetotheorganization,andtheir
susceptibilitytothreats,tomeasuretheriskexposureoftheseassets?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:B
100.
Whatistheprocessofmakingacopyoftheinformationstoredonacomputer?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:A
101.
Whatsoftwaredetectsandremovesorquarantinescomputerviruses?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:B
102.
Whatishardwareand/orsoftwarethatprotectscomputersfromintruders?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:C
103.
Whatistheuseofphysicalcharacteristicssuchasyourfingerprint,thebloodvessels
intheretinaofyoureye,thesoundofyourvoice,orperhapsevenyourbreathtoprovide
identification?

Backup
Antivirus
Firewall
Biometrics
Answer:D
104.
Allofthefollowingareconsideredbiometrics,except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105.
Whatscramblesthecontentsofafilesoyoucan'treaditwithouthavingtheright
decryptionkey?
a. Encryption
b. Intrusiondetectionsoftware
c. Securityauditingsoftware
d. Alloftheabove
Answer:A
106.
Whatisanencryptionsystemthatusestwokeys:apublickeythateveryonecanhave
andaprivatekeyforonlytherecipient?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:B
107.
Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting
suspiciously?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:C
108.
Whatchecksoutyourcomputerornetworkforpotentialweaknesses?
a. Encryption
b. Publickeyencryption
c. Securityauditingsoftware
d. Noneoftheabove
Answer:C
109.
Whichofthefollowingtovirusesharm?
a. Yourkeyboard
b. Yourmonitor
c. Yourprocessor
a.
b.
c.
d.

110.

111.

112.

113.

114.

115.

116.

d. Virusesdonotharmanyoftheabove
Answer:D
Whichofthefollowingcanavirusdo?
a. Hurtyourhardware
b. Hurtanyfilestheyweren'tdesignedtoattack
c. Infectfilesonwriteprotecteddisks
d. Noneoftheabove
Answer:D
Insimpleterms,whatdoesriskassessmentask?
a. Whatcangowrong?
b. Howlikelyisittogowrong?
c. Whatarethepossibleconsequencesifitdoesgowrong?
d. Alloftheabove
Answer:D
Whichofthefollowingisacharacteristicofafirewall?
a. Examineseachmessageasitseeksentrancetothenetwork
b. Blocksmessageswithoutthecorrectmarkingsfromenteringthenetwork
c. DetectscomputerscommunicatingwiththeInternetwithoutapproval
d. Alloftheabove
Answer:D
Whichofthefollowingarewaystoproveaccessrights?
a. Whatyouknow,likeapassword
b. Whatyouhave,likeanATMcard
c. Whatyoulooklike
d. Alloftheabove
Answer:D
Whichitemcanapasswordbeusedtoprotect?
a. Network
b. File
c. Folder
d. Alloftheabove
Answer:D
WhichisthemostimportantcomponentofIT?
a. Information
b. People
c. Informationtechnology
d. Computers
Answer:B
Whichofthefollowingappliestotheimplementationofanidea?
a. Copyright
b. Intellectualproperty
c. Patent

d. Denialofserviceattack
Answer:C
117.
Whenyoupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?
a. ThecostoftheCDs,manuals,anddevelopmentofthesoftware
b. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopment
c. Ashareofthecostofsoftwaredevelopment
d. Alloftheabove
Answer:D
118.
Whichofthefollowingisnotadimensionofprivacy?
a. Needforpersonalspace
b. Needtofeelincontrolofourpossessions
c. Needtofeelincontrolofourpersonalinformation
d. Alloftheabovearedimensionsofprivacy
Answer:D
119.
Whichofthefollowingcapturesscreenimages?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencapturesoftware
Answer:D
120.
Whichofthefollowingexaminesinformationpassingthroughswitches,hubs,or
routers?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:B
121.
Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:C
122.
Emailmessagesmaybestoredonwhichofthefollowingcomputers?
a. Sender'scomputer
b. Sender'sserver
c. Recipient'sserver
d. Alloftheabove
Answer:D
123.
Whatmightidentitythievesdowithyouridentity?
a. Applyforandusecreditcards
b. Applyforaloan

c. Changetheiridentity
d. Alloftheabove
Answer:D
124.
Whichofthefollowingisnotacommonapproachtophishing?
a. Sendanofficiallookingemailaskingforconfidentialinformation
b. Askpeopletofilloutandreturnafakeletterusingpostalmail
c. Askpeopletoclickalinkinanemailtoopenasubmissionformonawebpage
d. Alloftheaboveareuncommonapproachestophishing
Answer:B
125.
Atechniqueusedtogainpersonalinformationforthepurposeofidentitytheft,oftenby
email,iscalled?
a. Phishing
b. Carding
c. Brandspoofing
d. Alloftheabove
Answer:D
126.
Companiescangatherinformationaboutemployeesandpotentialemployeesfrom
whichofthefollowingplaces?
a. Jobapplications
b. Creditreports
c. CompaniesthattrackWebsurfers
d. Alloftheabove
Answer:D
127.
a.
b.
c.
d.
128.
a.
b.
c.
d.
129.
a.
b.
c.
d.

Cyberslackingconsistsofwhatactivities?
Visitinginappropriatewebsites
Visitingnewssites
Chattingonlinewithothersaboutnonworktopics
Alloftheabove
Answer:D
Cookiesareusedtodowhichofthefollowing?
StoreyourIDandpasswordforsubsequentlogonstothesite
Storecontentsofelectronicshoppingcarts
Totrackwebactivity
Alloftheaboveandmore
Answer:D
Unsolicitedemailiscalledwhat?
Junkmail
Spam
Extramail
Noneoftheabove

130.
a.
b.
c.
d.

Answer:B
WhatisthenameofthenewantiSpambill?
NoSpam
CANSpam
SpamAway
StopSpam
Answer:B

131.
Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
132.
Whatistheunauthorizeduse,duplication,distributionorsaleofcopyrightedsoftware?
a. FairUseDoctrine
b. Piratedsoftware
c. Counterfeitsoftware
d. Privacy
Answer:B
133.
Whatisaprogram,wheninstalledonacomputer,recordseverykeystrokeandmouse
click?
a. Keyloggersoftware
b. Hardwarekeylogger
c. Cookie
d. Adware
Answer:A
134.
Whatissoftwareyoudon'twanthiddeninsidesoftwareyoudowant?
a. Adware
b. Trojanhorsesoftware
c. Spyware
d. Alloftheabove
Answer:D
135.
Whatisanelectronicrepresentationofcash?
a. Digitalcash
b. Electroniccash
c. Ecash
d. Alloftheabove
Answer:D
136.
Whatisafullyequippedcomputerthatyouwearasapieceofclothingorattachedtoa

pieceofclothingsimilartothewayyouwouldcarryyourcellphoneonyourbelt?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:A
137.
Whatisatechnologyenabledmicrochipimplantedintothehumanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:C
138.
Whichofthefollowingisnotareasonwhydigitalcashhasturnedouttobeextremely
difficult?
a. Ifyoursystemcrashesyouloseyourmoney
b. Thereisonlyonestandard
c. Digitalcashmakesmoneylaunderingeasy
d. DigitalcashtravelsacrossthevastInternetandissusceptibletobeginstolen
Answer:B
139.
Smartcardisbetterprotectedthanothercardsusing
a. Encryption
b. Firewall
c. Hub
d. Alltheabove
Answer:A
140.
Trustcardisintroducedby
a. BSNLanditzcash
b. BSNLandoxicash
c. BSNLonly
d. None
Answer:A
141.
PaisaPayisofferedonlyby
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none
Answer:B
142.
TheEpaymentmechanismwidelyusedinB2Bis
a. Creditcard
b. Debitcard
c. Mastercard

d. Echeque
143.

144.

145.

146.

147.

148.

149.

Answer:D
Whichtypeoftechnologywillincreaseportabilityandmobility?
a. Implantchips
b. Micropayments
c. Internetphonecalls
d. Alloftheabove
Answer:D
Whichofthefollowinganaccuratestatementaboutinternetphonecalls?
a. Theyarepossiblebutnotyetfree
b. Theyarenotpossible
c. Theyarecurrentlystandardpractice
d. Noneoftheaboveisanaccuratestatementaboutinternetphonecalls
Answer:A
Whatarethemostcommonlyusedinputdevicestoday?
a. Keyboard
b. Mouse
c. Alloftheabove
d. Noneoftheabove
Answer:C
Whichofthefollowingcanbeusedtohelpidentifypeopleinacrowd?
a. Biochip
b. Implantchip
c. Facialrecognitionsoftware
d. Visionchip
Answer:C
Whichoneisalsoknownasplasticmoney?
a. Creditcard
b. Debitcard
c. Papercash
d. Alloftheabove
Answer:A
Echequesare
a. Prepaid
b. Postpaid
c. Bothprepaidandpostpaid
Answer:A
Digitalsignatureisa
a. Digitalid,sendasanattachmenttoawebpage/email/message
b. Isusedforverifyingtheattachmentssendusingweb
c. Bothaandb
d. Noneofthese

Answer:C
150.
a.
b.
c.
d.
151.
a.
b.
c.
d.
152.
a)
b)
c)
d)

Whichoneisthecomponentofcybercashpaymentsystem
CCusersoftware
CCmerachantsoftware
CCServerSoftware
Alloftheabove
Answer:D
Thepresenceofmakethesmartcardsmart.
Memory
Microchip
Ecash
Noneoftheabove
Answer:B
Thesmartcardwhichuseantennaforreadingandwritingdata
Contactsmartcard
Contactlesssmartcard
Proximitysmartcard
BothBandC
Answer:D

153.

cardisreadonly.
a) Contactsmartcard

154.

b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
Answer:C
Whichofthesmartcardusesasimlikestructureforreadingandwritingdata
a) Contactsmartcard
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC

155.
a.
b.
c.
d.
156.

Answer:A

Whichisnotafeatureofecommerce
SCM
EDI
WWW
BPR
Answer:D
WhatisIstandsinCIAofsmartcard?

a.
b.
c.
d.

International
Integrity
Identity
Noneoftheabove
Answer:B

157.

WhatisAstandsinCIAofsmartcard?
a. auditing
b. authenticity
c. authorized
d. Noneoftheabove
Answer:B
158.
WhatisCstandsinCIAofsmartcard?
a. confidentiality
b. conference
c. congress
d. Noneoftheabove
Answer:A
159.
WhichoneisthethirdpartypaymentproviderswhoofferdigitalwalletsforE
merchants
a. Oxicash
b. PayMate
c. PayPass
d. Alltheabove
Answer:D
160.
Whichisusedtoidentifymobilemoney
a. MCID
b. MMID
c. RSID
d. NONEOFTHEABOVE
Answer:B
161.
isanactthatposesdangertocomputerassets.
a. Threat
b. Danger
c. Error
d. Noneoftheabove
Answer:A
162.
Whichoneisnotaencryptiontechnique
a. RSA
b. DES
c. AES
d. NONEOFTHEABOVE

Answer:D

163.

Whichoneisnotusedasasecuritymechanism?
a. Encryption
b. Cryptography
c. Wallets
d. Digitalsignature
Answer:C
164.
Whichegovernmentarenaisbeingusedwhengovernmentalagenciessendoutand
acceptbidsforwork?
a) G2G
b) G2B
c) G2C
d) G2G
Answer:B
165.
a.
b.
c.
d.
166.
a.
b.
c.
d.
167.
a.
b.
c.
d.
168.
a.
b.
c.
d.

Secretkeyisusedfor
Publickeycryptography
Privatekeycryptography
Asymmetrickeycryptography
Noneofthese
Answer:B
Whichoneisacommunicationchannelthreat?
Snifferprograms
Cybervandalism
Integritythreats
Alloftheabove
Answer:D
Whichoneisacommunicationchannelsecurityprotocol?
SSL
SHTTP
SET
ALLOFTHEABOVE
Answer:D
Theprotocolwhichallowsthefiletransferbetweencomputersis
TCP/IP
FTP
HTTP
SOA
Answer:B

169.
a.
b.
c.
d.
170.
a.
b.
c.
d.
171.
a.
b.
c.
d.
172.
a.
b.
c.
d.
173.
a.
b.
c.
d.
174.
a.
b.
c.
d.
175.
a.
b.
c.
d.

EBankingisalsoknownas
ATMs
Netbanking
Traditionalbanking
Noneofthese
Answer:B
isbackboneofallEpaymentsinEcommerce
EFT
EPS
PayPal
Noneofthese
Answer:B
Whichoneisaclientlevelthreat?
Maliciouscode
Viruses
Activecontents
Alltheabove
Answer:D
Whichoneisnotanencryptiontechnique?
RSA
DES
AES
FTP
Answer:D
Whichoneisanencryptiontechnique?
RSA
DES
AES
Alloftheabove
Answer:D
Whichoneisnotaserverlevelthreat?
Maliciouscode
CGIthreats
Databasethreats
Bufferoverflows
Answer:A
Whichoneisnotaphysicalthreat?
Hacking
Storm
Phishing
Noneoftheabove
Answer:A

176.
a.
b.
c.
d.
177.
a.
b.
c.
d.
178.
a.
b.
c.
d.
179.
a.
b.
c.
d.
180.
a.
b.
c.
d.
181.
a.
b.
c.
d.
182.
a.
b.
c.
d.

Whichoneisaphysicalthreat?
Phishing
Storm
Earthquake
Alltheabove
Answer:D
Whichoneisalogicalthreat?
Hacking
Storm
Phishing
Noneoftheabove
Answer:A
Thebasicelementsofwebsiteis
Homepage
Webpages
Linksandbanners
Alltheabove
Answer:D
WhichoneisathreatforEcommerce
Trojanhorse
firewall
encryption
None
Answer:A
Securecommunicationmeans
Protecttransmissionofcreditcardnumber
Guaranteeprivacyofcustomer
Unauthorizedaccessofpaymentdetails
Alltheabove
Answer:D
Whichoneisnotanofflinepaymentmode?
Cashondelivery
Cashbeforedelivery
Demanddrafts
echeque
Answer:D

Whichoneisanofflinepaymentmode?
Cashondelivery
Cashbeforedelivery
Creditcard
Bothaandb
Answer:D

183.
a.
b.
c.
d.
184.
a.
b.
c.
d.
185.
a.
b.
c.
d.
186.
a.
b.
c.
d.
187.
a.
b.
c.
d.
188.
a.
b.
c.
d.
189.
a.
b.
c.
d.

Whichoneisnotanonlinepaymentmode?
Cashondelivery
Debitcard
Creditcard
echeque
Answer:A
Whichoneisanonlinepaymentmode?
Cashondelivery
Cashbeforedelivery
Demanddrafts
echeque
Answer:D
whichoneisnotanEpaymentmethodusedinIndia
Debitcard
Creditcard
echeque
none
Answer:D
OTPstandsfor
OnTimePassword
OnTimeprocessing
Onetimeprocessor
None
Answer:A
WhichoneisnotathreatforEcommerce
Trojanhorse
Viruses
Worm
None
Answer:D
PrivateKeycryptographyisalsoknownascryptography.
Publickey
Symmetric
Asymmetric
None
Answer:B
Publickeycryptographyisalsoknownascryptography.
Privatekey
Symmetric
Asymmetric
None
Answer:C

190.
Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
191.
Cyberslackingconsistsofwhatactivities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d. Alloftheabove
Answer:D
192.
Whatisanarrangementmadebetweenecommercesitesthatdirectusersfromone
sitetotheother?
a. Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193.
Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
194.
WhichoneisnotalayerofEcommerceinfrastructure
a. Physicallayer
b. Productlayer
c. Servicelayer
d. None

195.

196.

Answer:D

Whichwillharmcomputerresources
a. Worm
b. Virus
c. Trojanhorse
d. Alltheabove

Answer:D

Thestudyofencryptioniscalled

a.
b.
c.
d.
197.
a.
b.
c.
d.
198.
a.
b.
c.
d.

199.
a.
b.
c.
d.

Decryption
Cryptography
Firewall
Alltheabove
Answer:B
DuringEcommercetransactionweshouldensure
Integrity
Security
Confidentiality
Alltheabove
Answer:D
Thevirusthatarecommonlyfoundinworddocumentsarecalled
Macro
Trojanhorse
Scriptvirus
Noneoftheabove

Thevirusthatareattachedwithvbandjavafilesarecalled
Macro
Trojanhorse
Scriptvirus
Noneoftheabove

200.
a.
b.
c.
d.

Answer:A

Answer:C

Thevirusesspreadsthrough
Mails
Pendrivesandcds
Websites
Alltheabove
Answer:D

You might also like