E-Commerce MCQs
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
SECTION - 1
1.
The dimension of e-commerce that enables commerce across
national boundaries is called _______.
A. interactivity
B. global reach
C. richness
D. ubiquity
Answer & Solution
Answer: Option B
Solution:
The dimension of e-commerce that enables commerce across
national boundaries is called global reach. Global Reach refers to a business
initiative to increase the access between a company and their current and
potential customers through the use of the Internet.
2.
Which of the following describes e‐commerce?
A. Doing business electronically
B. Doing business
C. Sale of goods
D. All of the above
Answer & Solution
Answer: Option A
Solution:
Doing business electronically describes e‐commerce.
E-commerce (EC), an abbreviation for electronic commerce, is the buying and
selling of goods and services, or the transmitting of funds or data, over an
electronic network, primarily the internet.
3.
Which one of the following is not one of the major types
of e-commerce?
A. C2B
B. B2C
C. B2B
D. C2C
Answer & Solution
Answer: Option A
Solution:
C2B is not one of the major types of e-commerce. The C2B, or
consumer-to-business model, is when customers offer products or services to businesses.
4.
Which of the following is part of the four main types for
e‐commerce?
A. B2B
B. B2C
C. C2B
D. All of the above
Answer & Solution
Answer: Option D
Solution:
B2B, B2C and C2B is part of the four main types for
e‐commerce.
5.
Which of the following is not considered to be one of the
three phases of e-commerce?
A. Innovation
B. Consolidation
C. Preservation
D. Reinvention
Answer & Solution
Answer: Option C
Solution:
Preservation is not considered to be one of the three phases
of e-commerce. The act of keeping something the same or of preventing it from
being damaged is basically preservation.
6.
Which segment do eBay, Amazon.com belong?
A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
Answer & Solution
Answer: Option B
Solution:
eBay, Amazon.com belong to B2Cs segments. The term
business-to-consumer (B2C) refers to the process of selling products and
services directly between consumers who are the end-users of its products or
services.
7.
The idealistic market envisioned at the outset of the
development of e-commerce is called a ______.
A. Bailey market
B. Baxter market
C. Bergman market
D. Bertrand market
Answer & Solution
Answer: Option D
Solution:
The idealistic market envisioned at the outset of the
development of e-commerce is called a Bertrand market.
8.
Which type of e‐commerce focuses on consumers dealing
with each other?
A. B2B
B. B2C
C. C2B
D. C2C
Answer & Solution
Answer: Option D
Solution:
C2C type of e‐commerce focuses on consumers dealing with
each other. Consumer to consumer, or C2C, is the business model that
facilitates commerce between private individuals. Whether it's for goods or
services, this category of e-commerce connects people to do business with one
another.
9.
The primary source of financing during the early years of
e-commerce was _______.
A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Answer & Solution
Answer: Option C
Solution:
The primary source of financing during the early years of
e-commerce was venture capital funds. Venture Capital is money invested in
businesses that are small; or exist only as an initiative, but have huge
potential to grow. The people who invest this money are called venture
capitalists (VCs). The venture capital investment is made when a venture capitalist
buys shares of such a company and becomes a financial partner in the business.
10.
Which segment is eBay an example?
A. B2B
B. C2B
C. C2C
D. None of the above
Answer & Solution
Answer: Option D
Solution:
Ebay Stores allows you to set up an online store that sells
products at a set price, instead of allowing people to bid in auction format.
This business model is preferred by many eBay entrepreneurs because they can
determine how much profit each product they sell will make.
11.
All of the following are technologies used to gather
information about you online except ______.
A. spy ware
B. cookies
C. Gmail
D. anonymizers
Answer & Solution
Answer: Option D
Solution:
All of the following are technologies used to gather
information about you online except anonymizers. An anonymizer or an anonymous
proxy is a tool that attempts to make activity on the Internet untraceable. It
is a proxy server computer that acts as an intermediary and privacy shield
between a client computer and the rest of the Internet.
12.
In which website Global Easy Buy is facilitated?
A. Ebay.com
B. Amazon.com
C. Yepme.com
D. None of these
Answer & Solution
Answer: Option A
Solution:
In Ebay.com Global Easy Buy is facilitated.
13.
A _________ is the set of planned activities designed to
result in a profit in a marketplace.
A. business model
B. profit model
C. business plan
D. revenue model
Answer & Solution
Answer: Option A
Solution:
A business model is the set of planned activities designed
to result in a profit in a marketplace.
14.
The best products to sell in B2C e‐commerce are:
A. Small products
B. Digital products
C. Specialty products
D. Fresh products
Answer & Solution
Answer: Option B
Solution:
The best products to sell in B2C e‐commerce are Digital
products. A digital product is an intangible asset or piece of media that can
be sold and distributed repeatedly online without the need to replenish
inventory.
15.
Which of the following is not a key element of a business
model?
A. value proposition
B. competitive advantage
C. market strategy
D. universal standards
Answer & Solution
Answer: Option D
Solution:
Universal standards is not a key element of a business
model.
8 Key Elements of a business model and types of E commerce Business models are
1) Value Proposition.
2) Revenue Model.
3) Market Opportunity.
4) Competitive Environment.
5) Competitive Advantage.
6) Market Strategy.
7) Organizational Development.
8) Management Team.
16.
Which products are people most likely to be more uncomfortable
buying on the Internet?
A. Books
B. Furniture
C. Movies
D. All of the above
Answer & Solution
Answer: Option B
Solution:
The products that people are most likely to be more
uncomfortable buying on the Internet are Furniture among the given options.
17.
The source of revenue in a subscription revenue model is
__________.
A. Fees from advertisers in exchange for advertisements
B. Fees for business referrals
C. Fees from subscribers in exchange for access to
content or services
D. Fees for enabling or execution a transaction
Answer & Solution
Answer: Option C
Solution:
The source of revenue in a subscription revenue model is
Fees from subscribers in exchange for access to content or services. The
subscription business model is a business model in which a customer must pay a
recurring price at regular intervals for access to a product or service.
18.
Which products are people most likely to be comfortable
buying on the Internet?
A. Books
B. PCs
C. CDs
D. All of the above
Answer & Solution
Answer: Option D
Solution:
The products that people are most likely to be more uncomfortable
buying on the Internet are Books, PCs and CDs.
19.
Which of the following is an example of a portal?
A. Amazon
B. eBay
C. Yahoo
D. Face book
Answer & Solution
Answer: Option C
Solution:
Yahoo is an example of a portal. Yahoo! is an Internet portal
that incorporates a search engine and a directory of World Wide Web sites
organized in a hierarchy of topic categories.
20.
Digital products are best suited for B2C e‐commerce
because they:
A. Are commodity like products
B. Can be mass‐customized and personalized
C. Can be delivered at the time of purchase
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Digital products are best suited for B2C e‐commerce because
they are commodity like products, can be mass‐customized and personalized and
can be delivered at the time of purchase.
21.
All of the following are major B2C business models except
______.
A. content provider
B. industry consortium
C. transaction broker
D. service provider
Answer & Solution
Answer: Option B
Solution:
All of the following are major B2C business models except
industry consortium. An industry consortium is a group that involves
representatives from several different companies. Usually, consortia are
composed of companies from within a single industry.
22.
The solution for all business needs is.
A. EDI
B. ERP
C. SCM
D. None of the above
Answer & Solution
Answer: Option B
Solution:
The solution for all business needs is ERP. Enterprise
resource planning (ERP) is business process management software that allows an
organization to use a system of integrated applications to manage the business
and automate many back office functions related to technology, services and
human resources.
23.
The _________ business model involves an independently
owned vertical digital marketplace for direct inputs.
A. e-distributor
B. exchange
C. e-procurement
D. private industrial network
Answer & Solution
Answer: Option B
Solution:
The exchange business model involves an independently owned
vertical digital marketplace for direct inputs.
24.
All of the following are techniques B2C e‐commerce
companies use to attract customers, except:
A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
Answer & Solution
Answer: Option D
Solution:
All of the following are techniques B2C e‐commerce companies
use to attract customers, except Virtual marketing. Viral marketing or viral
advertising is a business strategy that uses existing social networks to
promote a product. Its name refers to how consumers spread information about a
product with other people in their social networks, much in the same way that a
virus spreads from one person to another.
25.
Compared to Internet users, the number of cell phone
subscribers is _________.
A. about the same
B. slightly fewer
C. much fewer
D. much larger
Answer & Solution
Answer: Option D
Solution:
Compared to Internet users, the number of cell phone
subscribers is much larger.
26.
Industry structure is defined as __________.
A. the nature of the players in an industry and their
relative bargaining power
B. a set of plans for achieving long term returns on
the capital invested in a business firm
C. set of planned activities designed to result in a
profit in a marketplace
D. how a company's product or service fulfills the
needs of customers
Answer & Solution
Answer: Option A
Solution:
Industry structure is defined as the nature of the players
in an industry and their relative bargaining power. Industry structure pertains
to the number and size distribution of competitors in an industry, according to
University of Maryland University College.
27.
The area of actual or potential commercial value in which
a company intends to operate is a _______.
A. market space
B. marketplace
C. perfect market
D. Bertrand market
Answer & Solution
Answer: Option A
Solution:
The area of actual or potential commercial value in which a
company intends to operate is a market space. Minimum Viable Product or MVP is
the most basic version of the product which the company wants to launch in the
market.
28.
Which term represents a count of the number of people who
visit one site, click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click‐through
C. Spam
D. All of the above
Answer & Solution
Answer: Option B
Solution:
Click‐through term represents a count of the number of
people who visit one site, click on an ad, and are taken to the site of the
advertiser.
29.
A perfect market is one in which __________.
A. One firm develops an advantage based on a factor of
production that other firms cannot purchase
B. One participant in the market has more resources
than the others
C. there are no competitive advantages or asymmetries
because all firms have equal access to all the factors to production
D. competition is at a minimum, as each niche market
within an industry is served by the company with the greatest competitive
advantage
Answer & Solution
Answer: Option C
Solution:
A perfect market is one in which there are no competitive
advantages or asymmetries because all firms have equal access to all the
factors to production.
30.
What is the percentage of customers who visit a Web site
and actually buy something called?
A. Affiliate programs
B. Click‐through
C. Spam
D. Conversion rate
Answer & Solution
Answer: Option D
31.
Which of the following is not a horizontal portal?
A. AOL
B. Yahoo
C. Sailnet
D. MSN/Windows Live
Answer & Solution
Answer: Option C
Solution:
Sailnet is not a horizontal portal. Specialized website
(portal) that serves as an entry point to several firms in the same industry or
to the same type of suppliers.
32.
What are materials used in production in a manufacturing
company or are placed on the shelf for sale in a retail environment?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Direct materials used in production in a manufacturing
company or are placed on the shelf for sale in a retail environment.
33.
A situation where there are no differences among products
or services, and the only basis of choosing products is price is known as
_________.
A. a value web
B. value chain
C. profit
D. commoditization
Answer & Solution
Answer: Option D
Solution:
A situation where there are no differences among products or
services, and the only basis of choosing products is price is known as
commoditization. Commoditization refers to the process of making something into
a commodity. A commodity is a fundamental good used in commerce that is
interchangeable with other commodities of the same type.
34.
What are materials that are necessary for running a
modern corporation, but do not relate to the company's primary business
activities?
A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Answer & Solution
Answer: Option B
Solution:
Indirect materials are necessary for running a modern
corporation, but do not relate to the company's primary business activities.
35.
A strategy designed to compete in all markets around the
globe is called a _________ strategy.
A. scope
B. differentiation
C. cost
D. focus
Answer & Solution
Answer: Option A
Solution:
A strategy designed to compete in all markets around the globe
is called a scope strategy. Strategic scope refers to the products and services
a company plans to offer over a specific period, and indicates where and to
which target markets they will be sold.
36.
What is the process in which a buyer posts its interest
in buying a certain quantity of items, and sellers compete for the business by
submitting successively lower bids until there is only one seller left?
A. B2B marketplace
B. Intranet
C. Reverse auction
D. Internet
Answer & Solution
Answer: Option C
Solution:
Reverse auction is the process in which a buyer posts its
interest in buying a certain quantity of items, and sellers compete for the
business by submitting successively lower bids until there is only one seller
left.
37.
Which of the following is not one of the stages of the
development of the Internet?
A. Innovation
B. Institutionalization
C. Globalization
D. Commercialization
Answer & Solution
Answer: Option C
Solution:
Globalization is not one of the stages of the development of
the Internet. Globalization is the spread of products, technology, information,
and jobs across national borders and cultures. In economic terms, it describes
an interdependence of nations around the globe fostered through free trade.
38.
What are plastic cards the size of a credit card that
contains an embedded chip on which digital information can be stored?
A. Customer relationship management systems cards
B. E‐government identity cards
C. FEDI cards
D. Smart cards
Answer & Solution
Answer: Option D
Solution:
Smart cards are plastic cards of the size of a credit card that
contains an embedded chip on which digital information can be stored. A smart
card, chip card, or integrated circuit card (ICC) is a physical electronic
authorization device, used to control access to a resource.
39.
In 1961, __________ published a paper on "packet
switching" networks.
A. Leonard Kleinrock
B. Ray Tomlinson
C. Bob Metcalfe
D. Vint Cerf
Answer & Solution
Answer: Option A
Solution:
In 1961, Leonard Kleinrock published a paper on "packet
switching" networks. Kleinrock convinced Roberts of the theoretical
feasibility of communications using packets rather than circuits, which was a major
step along the path towards computer networking.
40.
Most individuals are familiar with which form of
e‐commerce?
A. B2B
B. B2C
C. C2B
D. C2C
Answer & Solution
Answer: Option B
Solution:
Most individuals are familiar with B2C form of e‐commerce. B2C
eCommerce refers to the process of selling to individual customers directly.
41.
The component of TCP/IP that provides the Internet's
addressing scheme and is responsible for the actual delivery of packets is
________.
A. TCP
B. IP
C. the Network Layer
D. the Application Layer
Answer & Solution
Answer: Option B
Solution:
The component of TCP/IP that provides the Internet's
addressing scheme and is responsible for the actual delivery of packets is IP.
TCP/IP is a shorthand for the two most important protocols used to make the
Internet work. The Internet Protocol (IP) is responsible for transferring these
data packets, while the Transmission Control Protocol (TCP) makes sure all
packets arrive safely, retransmitting them if necessary.
42.
Which form of e‐commerce currently accounts for about 97%
of all e‐commerce revenues?
A. B2B
B. B2C
C. C2B
D. C2C
Answer & Solution
Answer: Option A
Solution:
B2B form of e‐commerce currently accounts for about 97% of
all e‐commerce revenues. Business-to-business is a situation where one business
makes a commercial transaction with another.
43.
Which protocol permits users to transfer files from the
server to their client computer, and vice versa?
A. HTTP
B. SMTP
C. IMAP
D. FTP
Answer & Solution
Answer: Option D
Solution:
FTP protocol permits users to transfer files from the server
to their client computer, and vice versa. FTP (File Transfer Protocol) is a
protocol for transferring a file from one host to another host.
44.
Which of the following are advantages normally associated
with B2B e‐commerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
Answer & Solution
Answer: Option D
Solution:
Shorter cycle times, reduction in costs and it reaches wider
audiences are advantages normally associated with B2B e‐commerce.
45.
__________ is a program that you can run from the DOS
prompt in the Windows operating system in order to check the connection between
your client and the server.
A. Ping
B. Telnet
C. Tracert
D. SSL
Answer & Solution
Answer: Option A
Solution:
Ping is a program that you can run from the DOS prompt in
the Windows operating system in order to check the connection between your
client and the server. Ping is used to test the ability of one network host to
communicate with another. Simply enter the Ping command, followed by the name
or the IP address of the destination host.
46.
If the threat of substitute products or services is low
it is a(n):
A. Disadvantage to the supplier
B. Advantage to the buyer
C. Advantage to the supplier
D. None of the above
Answer & Solution
Answer: Option C
Solution:
If the threat of substitute products or services is low it
is an advantage to the supplier.
47.
Broadband is generally considered to be any communication
technology allowing streaming audio and video at or above _________.
A. 100 Kbps
B. 56.6 Kbps
C. 30 Kbps
D. 10 Kbps
Answer & Solution
Answer: Option A
Solution:
Broadband is generally considered to be any communication
technology allowing streaming audio and video at or above 100 Kbps.
48.
The threat of new entrants is high when it is:
A. Hard for customers to enter the market
B. Hard for competitors to enter the market
C. Easy for competitors to enter the
market
D. Easy for customers to enter the market
Answer & Solution
Answer: Option C
Solution:
The threat of new entrants is high when it is Easy for
competitors to enter the market. A high threat of new entrants makes an
industry less attractive – there are low barriers to entry. Therefore, new
competitors are able to easily enter into the industry, compete with existing
firms, and take market share. There is a reduced profit potential as more
competitors are in the industry.
49.
Which of the following connections allows the fastest
download speeds?
A. DSL
B. cable modem
C. T1
D. T3
Answer & Solution
Answer: Option D
Solution:
T3 connections allows the fastest download speeds. T3
Internet service lines operate at speeds of 45 Mbps (672 times faster than a
56K dial-up, and 29 times faster than T1 connection).
50.
If it is easy for competitors to enter the market, the
threat of new entrants is considered:
A. High
B. Low
C. More
D. Less
Answer & Solution
Answer: Option A
Solution:
If it is easy for competitors to enter the market, the
threat of new entrants is considered high. Threat of new entrants refers to the
threat new competitors pose to existing competitors in an industry. Therefore,
a profitable industry will attract more competitors looking to achieve profits.
51.
Which of the following is not a limitation of the current
Internet?
A. insufficient capacity throughout the backbone
B. network architecture limitations
C. insufficient reach
D. best-efforts QOS
Answer & Solution
Answer: Option C
Solution:
Insufficient reach is not a limitation of the current
Internet.
52.
Unique value auction is mainly applies to?
A. New products
B. Second hand products
C. Engineering products
D. None of the above
Answer & Solution
Answer: Option B
Solution:
Unique value auction is mainly applies to Second hand
products.
53.
All of the following are goals of Internet 2 except
______.
A. Creating a leading-edge very high-speed network
capability for the national research community
B. Eliminating censorship from the
Internet
C. Enabling revolutionary Internet applications
D. Ensuring the rapid transfer of new network services
and applications to the broader Internet community
Answer & Solution
Answer: Option B
Solution:
All of the following are goals of Internet 2 except
Eliminating censorship from the Internet.
54.
Paisapay is facilitated in.
A. eBay.co.in
B. amazon.com
C. flipkart.com
D. none of the above
Answer & Solution
Answer: Option A
Solution:
Paisapay is facilitated in. eBay.co.in. PaisaPay is eBay's
online payment service, where buyers can pay sellers through credit card or
Online Bank Transfer.
55.
Which of the following is a new and disruptive Web
feature or service?
A. XML
B. diffserv
C. blogs
D. CDMA
Answer & Solution
Answer: Option C
Solution:
Blogs is a new and disruptive Web feature or service. A blog
(shortening of “weblog”) is an online journal or informational website
displaying information in the reverse chronological order, with latest posts
appearing first. It is a platform where a writer or even a group of writers
share their views on an individual subject.
56.
Which of the following is a useful security mechanism
when considering business strategy and IT?
A. encryption
B. decryption
C. firewall
D. all the above
Answer & Solution
Answer: Option D
Solution:
Encryption, decryption and firewall is a useful security
mechanism when considering business strategy and IT.
57.
All of the following are examples of 2G wireless phone
technologies except _________.
A. CDMA
B. W-CDMA
C. TDMA
D. GSM
Answer & Solution
Answer: Option B
Solution:
All of the following are examples of 2G wireless phone
technologies except W-CDMA. WCDMA is the most commonly used variant of the
Universal Mobile Telecommunications System (UMTS ).
58.
Which of the following is not related to security
mechanism?
A. encryption
B. decryption
C. e‐cash
D. all the above
Answer & Solution
Answer: Option C
Solution:
e‐cash is not related to security mechanism. It is also
known as electronic cash, it is a digital money product that provides a way to
pay for products and services without resorting to paper or coin currency.
59.
All of the following are wireless Internet access network
technologies except ________.
A. Wi-Fi
B. Bluetooth
C. Zigbee
D. GigaPoP
Answer & Solution
Answer: Option D
Solution:
All of the following are wireless Internet access network
technologies except GigaPoP. A gigabit point of presence (GigaPOP) is an
individual access point to something called Internet2 that represents a
high-speed IP network maintained by universities and other parties.
60.
A product or service that customers have come to expect
from an industry, which must be offered by new entrants if they wish to compete
and survive, is known as a(n)?
A. Switching costs
B. Loyalty programs
C. Entry barriers
D. Affiliate programs
Answer & Solution
Answer: Option C
Solution:
A product or service that customers have come to expect from
an industry, which must be offered by new entrants if they wish to compete and
survive, is known as an Entry barriers.
61.
Internet users account for about ________ of the world's
population.
A. 0.07
B. 0.17
C. 0.27
D. 0.47
Answer & Solution
Answer: Option B
Solution:
Internet users account for about 0.17 of the world's
population.
62.
Which of the following statements accurately reflect the
impact of technology?
A. Technology has caused buyer power to
increase
B. Technology has lessened the entry barriers for many
industries
C. Technology has increased the threat of substitute
products and services
D. all of the above
Answer & Solution
Answer: Option D
Solution:
Technology has caused buyer power to increase, Technology
has lessened the entry barriers for many industries and Technology has
increased the threat of substitute products and services statements accurately
reflect the impact of technology.
63.
Which of the following was the first commercial Web
browser?
A. Mosaic
B. Mozilla
C. Netscape Navigator
D. Internet Explorer
Answer & Solution
Answer: Option C
Solution:
Netscape Navigator was the first commercial Web browser.
Netscape Navigator browser was released by the Mosaic (later Netscape)
Corporation. Before Microsoft's Internet Explorer became the dominant browser,
Netscape Navigator was the most popular way to connect to the Web.
64.
A business cannot be all things to all people. Instead, a
business must:
A. Identify target customers
B. Identify the value of products/services as perceived
by customers
C. all of the above
D. None of the above
Answer & Solution
Answer: Option C
Solution:
A business cannot be all things to all people. Instead, a
business must Identify target customers and Identify the value of
products/services as perceived by customers.
65.
All of the following are steps in the systems development
life cycle except ______.
A. Systems Design
B. Testing
C. Implementation
D. Debugging
Answer & Solution
Answer: Option D
Solution:
All of the following are steps in the systems development
life cycle except Debugging. Debugging is the process of finding and resolving
defects or problems within a computer program that prevent correct operation of
computer software or a system.
66.
How the transactions occur in e‐commerce?
A. Using e‐medias
B. Using computers only
C. Using mobile phones only
D. None of the above
Answer & Solution
Answer: Option A
Solution:
The transactions occur in e‐commerce using e‐medias.
67.
A _________ describes the flow of information at your
e-commerce site and the infrastructure that will be used in the system.
A. system design
B. logical design
C. tactical design
D. physical design
Answer & Solution
Answer: Option B
Solution:
A logical design describes the flow of information at your
e-commerce site and the infrastructure that will be used in the system. Logical
design is the conceptual design of a system. It describes the flow of information
at your e-commerce site, the processing functions that must be performed, the
database that will be used, the security and emergency backup procedures that
will be instituted, and the controls that will be used in the system.
68.
Which type of products is lesser purchased using
eCommerce?
A. automobiles
B. books
C. softwares
D. none
Answer & Solution
Answer: Option A
Solution:
Automobiles type of products is lesser purchased using
eCommerce.
69.
All of the following are factors in optimizing Web site
performance except _________.
A. page retrieval
B. page generation
C. page delivery
D. page content
Answer & Solution
Answer: Option A
Solution:
All of the following are factors in optimizing Web site
performance except page retrieval. Page retrieval is a part that uses web robot
to retrieve the desired web page to database.
70.
A business competing in a commodity like environment must
focus on which of the following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
Answer & Solution
Answer: Option D
Solution:
A business competing in a commodity like environment must
focus on Price, Ease / speed of delivery and Ease of ordering.
Section – 2
1.
The dominant Web server software is __________.
A. Zeus
B. Apache
C. Microsoft IIS
D. Google
Answer & Solution
Answer: Option B
Solution:
The dominant Web server software is Apache. Apache played a
key role in the initial growth of the World Wide Web, quickly overtaking NCSA
HTTPd as the dominant HTTP server, and has remained most popular since April
1996.
2.
Which of the following refers to creating products
tailored to individual customers?
A. customization
B. aggregation
C. Direct materials
D. Reverse auction
Answer & Solution
Answer: Option A
Solution:
Customization refers to creating products tailored to
individual customers. It is the action of making or changing something
according to the buyer's or user's needs.
3.
What Web server functionality allows it verify usernames
and passwords and process certificates and encryption information?
A. Processing of HTTP requests
B. File Transfer Protocol
C. Data capture
D. Security services
Answer & Solution
Answer: Option D
Solution:
Security services Web server functionality allows it verify
usernames and passwords and process certificates and encryption information.
4.
Materials used in the normal operation of a business but
not related to primary business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Answer & Solution
Answer: Option C
Solution:
Materials used in the normal operation of a business but not
related to primary business operations are called Indirect materials. Indirect
materials are materials used in the production process, but which cannot be linked
to a specific product or job.
5.
The underlying computing equipment that the system uses
to achieve its e-commerce functionality is called a ________.
A. hardware platform
B. content platform
C. transaction platform
D. scalability platform
Answer & Solution
Answer: Option A
Solution:
The underlying computing equipment that the system uses to
achieve its e-commerce functionality is called a hardware platform.
6.
Amazon.com is well‐known for which e‐commerce marketing
technique?
A. Banner ads
B. Pop‐up ads
C. Affiliate programs
D. Viral marketing
Answer & Solution
Answer: Option C
Solution:
Amazon.com is well‐known for Affiliate programs e‐commerce
marketing technique.
7.
Redundant navigation refers to _________.
A. pages that work, load quickly, and point the
customer toward your product offerings
B. simple, fool-proof navigation
C. a site working with the most popular browsers
D. alternative navigation to the same content
Answer & Solution
Answer: Option D
Solution:
Redundant navigation refers to alternative navigation to the
same content. Redundant navigation can help users find what they're looking
for. Redundancy in documentation is usually bad: When you have the same content
(in different words) in two places, you pay twice for localization – yet you
probably only remember to update one of the items.
8.
What is the name given to an interactive business
providing a centralized market where many buyers and suppliers can come together
for e‐commerce or commerce‐related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Answer & Solution
Answer: Option D
Solution:
Electronic marketplace is the name given to an interactive
business providing a centralized market where many buyers and suppliers can
come together for e‐commerce or commerce‐related activities.
9.
The set of standards for communication between a browser and
a program running on a server that allows for interaction between the user and
the server is known as _________.
A. Active Server Pages (ASP)
B. Java Server Pages (JSP)
C. Common Gateway Interface (CGI)
D. VBScript
Answer & Solution
Answer: Option C
Solution:
The set of standards for communication between a browser and
a program running on a server that allows for interaction between the user and
the server is known as Common Gateway Interface (CGI).
10.
Which form of e‐marketplace brings together buyers and
sellers from multiple industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer & Solution
Answer: Option A
Solution:
Horizontal form of e‐marketplace brings together buyers and
sellers from multiple industries, often for MRO materials. Horizontal
e-commerce outfits focus on the breadth of product offerings, while vertical
ones concentrate on depth.
1.
Which of the following is not a widely used midrange or
high-end e-commerce suite?
A. Microsoft Commerce Server
B. WebTrends Marketing Lab2
C. IBM WebSphere Commerce
D. Broadvision Commerce
Answer & Solution
Answer: Option A
Solution:
Microsoft Commerce Server is not a widely used midrange or
high-end e-commerce suite. Microsoft is one of the providers of commerce
servers. Microsoft Commerce Server was first released in 2000 and was used to
creatie e-commerce systems. It uses Microsoft's .NET technology.
12.
Which form of e‐marketplace brings together buyers and
sellers from the same industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer & Solution
Answer: Option B
Solution:
Vertical form of e‐marketplace brings together buyers and
sellers from the same industry. It is an e-marketplace that offer goods and services
directly related to the production process of a specific industrial sector.
13.
The ability to change the product to better fit the needs
of the customer is called ________.
A. customization
B. personalization
C. privacy
D. accessibility
Answer & Solution
Answer: Option A
Solution:
The ability to change the product to better fit the needs of
the customer is called customization. It is the action of modifying something
to suit a particular individual or task.
14.
Which type of add appears on a web page?
A. pop‐under ad
B. Pop‐up ad
C. Banner ad
D. Discount ad
Answer & Solution
Answer: Option C
Solution:
Banner ad appears on a web page.
15.
All of the following are tools for optimizing a Web
site's location in search engine listings except ________.
A. keywords and page titles
B. identifying market niches
C. buying ads
D. benchmarking
Answer & Solution
Answer: Option D
Solution:
All of the following are tools for optimizing a Web site's
location in search engine listings except benchmarking. Benchmarking is a
process of measuring the performance of a company's products, services, or
processes against those of another business considered to be the best in the
industry, aka “best in class.”
16.
What type of ad appears on top of a web page?
A. pop‐under ad
B. pop‐up ad
C. banner ad
D. discount ad
Answer & Solution
Answer: Option B
Solution:
pop‐up ad type of ad appears on top of a web up ad. Pop-up
ads or pop-ups are forms of online advertising on the World Wide Web. A pop-up
is a graphical user interface (GUI) display area, usually a small window, that
suddenly appears ("pops up") in the foreground of the visual
interface.
17.
The most common type of Internet crime according to the
IC3 is ______.
A. Credit card fraud
B. Check fraud
C. Non-delivery
D. Auction fraud
Answer & Solution
Answer: Option D
Solution:
The most common type of Internet crime according to the IC3
is Auction fraud. Internet auction fraud involves schemes attributable to the
misrepresentation of a product advertised for sale through an Internet auction
site or the non-delivery of products purchased through an Internet auction
site.
18.
What type of ad appears under a web page?
A. pop‐under ad
B. pop‐up ad
C. banner ad
D. discount ad
Answer & Solution
Answer: Option A
Solution:
Pop‐under ad appears under a web page. A type of window that
appears behind the browser window of a Web site that a user has visited. In
contrast to a pop-up ad, which appears over (on top of) the browser window, a
pop-under is less obtrusive as it hides behind other windows.
19.
In the e-commerce security environment, which of the
following constitutes the inner-most layer?
A. people
B. data
C. technology solutions
D. organizational policies and procedures
Answer & Solution
Answer: Option B
Solution:
In the e-commerce security environment, data constitutes the
inner-most layer. E-Commerce security refers to the principles which guide safe
electronic transactions, allowing the buying and selling of goods and services
through the Internet, but with protocols in place to provide safety for those
involved.
20.
Which, if any, of the following types of ads are people
most willing to tolerate?
A. pop‐under ad
B. pop‐up ad
C. banner ad
D. none of the above
Answer & Solution
Answer: Option D
Solution:
people most willing doesn't tolerate any type of ads.
21.
All of the following are major categories of computer
viruses except _________.
A. Macro viruses
B. File-infecting viruses
C. Script viruses
D. Trojan viruses
Answer & Solution
Answer: Option D
Solution:
All of the following are major categories of computer
viruses except Trojan viruses. Trojan or Trojan horse is a type of malicious
software. Trojan virus is designed to spy on the victims computer, access files
or to extract sensitive data.
22.
Which of the following is an Internet‐based company that
makes it easy for one person to pay another over the Internet?
A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Answer & Solution
Answer: Option D
Solution:
A financial cybermediary is an internet based company that
makes it easy to transfer money from one person to another.
23.
A worm is designed to spread _________.
A. from computer to computer
B. from file to file on a computer
C. from Web site to Web site
D. from Web site to computer
Answer & Solution
Answer: Option A
Solution:
A worm is designed to spread from computer to computer. A
computer worm is a standalone malware computer program that replicates itself
in order to spread to other computers. Often, it uses a computer network to
spread itself, relying on security failures on the target computer to access
it.
24.
Which of the following is a method of transferring money
from one person's account to another?
A. electronic check
B. credit card
C. e‐transfer
D. none of the above
Answer & Solution
Answer: Option A
Solution:
Electronic check is a method of transferring money from one
person's account to another. An electronic check, also referred to as an
e-check, is a form of payment made via the Internet, or another data network,
designed to perform the same function as a conventional paper check.
25.
Malicious hackers who act with the intention of causing
harm are __________.
A. White hats
B. Black hats
C. Grey hats
D. Brown hats
Answer & Solution
Answer: Option B
Solution:
Malicious hackers who act with the intention of causing harm
are Black hats. Black hat refers to a hacker who breaks into a computer system
or network with malicious intent. A black hat hacker may exploit security
vulnerabilities for monetary gain; to steal or destroy private data; or to
alter, disrupt or shut down websites and networks.
26.
An electronic check is one form of what?
A. e‐commerce
B. online banking
C. e‐cash
D. check
Answer & Solution
Answer: Option B
Solution:
An electronic check is one form of online banking. An eCheck
(or electronic check) is an electronic version of a paper check used to make
payments online.
27.
When hackers flood a Web site with useless traffic to
overwhelm the network, it is called ______.
A. phishing
B. pharming
C. a Denial of Service (DoS) attack
D. spoofing
Answer & Solution
Answer: Option C
Solution:
When hackers flood a Web site with useless traffic to
overwhelm the network, it is called a Denial of Service (DoS) attack. A
denial-of-service attack (DoS attack) is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host
connected to the Internet.
28.
If you need to transfer money to another person via the
internet, which of the following methods could you use?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer & Solution
Answer: Option D
Solution:
If you need to transfer money to another person via the
internet, the methods that could be use are financial cybermediary, electronic
check and electronic bill presentment and payment.
29.
Which of the following is not a dimension of e-commerce
security provided by encryption?
A. availability
B. message integrity
C. nonrepudiation
D. confidentiality
Answer & Solution
Answer: Option A
Solution:
Availability is not a dimension of e-commerce security
provided by encryption. eCommerce security refers to the principles which guide
safe electronic transactions, allowing the buying and selling of goods and
services through the Internet, but with protocols in place to provide safety
for those involved.
30.
Which of the following permits the transmission of a
bill, along with payment of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer & Solution
Answer: Option C
Solution:
Electronic bill presentment and payment permits the transmission
of a bill, along with payment of that bill, to be conducted over the Internet.
Electronic Bill Payment & Presentment (EBPP) is a process, which companies
use to collect payments via the Internet, direct dial access, Automated Teller
Machine (ATM), or other electronic method. Electronic Bill Payment &
Presentment is a core component of many financial institutions' online banking
offerings.
31.
The most widely used encryption standard is ______.
A. Advanced Encryption Standard (AES)
B. Data Encryption Standard (DES)
C. Universal Encryption Standard (UES)
D. Optimal Encryption Standard (OES)
Answer & Solution
Answer: Option A
Solution:
The most widely used encryption standard is Advanced
Encryption Standard (AES). The Advanced Encryption Standard, or AES, is a
symmetric block cipher chosen by the U.S. government to protect classified
information and is implemented in software and hardware throughout the world to
encrypt sensitive data.
32.
A combination of software and information designed to
provide security and information for payment is called a what?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Answer & Solution
Answer: Option A
Solution:
A combination of software and information designed to
provide security and information for payment is called digital wallet. A
digital wallet is a system that securely stores users' payment information and
passwords for numerous payment methods and websites.
33.
The most common form of securing channels is through
________.
A. S-HTTP
B. VPNs
C. SSL
D. PPTP
Answer & Solution
Answer: Option C
Solution:
The most common form of securing channels is through SSL.
SSL (Secure Sockets Layer) is a standard security technology for establishing
an encrypted link between a server and a client—typically a web server
(website) and a browser; or a mail server and a mail client (e.g., Outlook).
34.
What is the name for direct computer‐to‐computer transfer
of transaction information contained in standard business documents?
A. internet commerce
B. e‐commerce
C. transaction information transfer
D. electronic data interchange
Answer & Solution
Answer: Option D
Solution:
The name for direct computer‐to‐computer transfer of
transaction information contained in standard business documents is electronic
data interchange. Electronic Data Interchange (EDI) is the electronic
interchange of business information using a standardized format; a process
which allows one company to send information to another company electronically
rather than with paper.
35.
Firewalls perform all of the following functions except
_________.
A. Forbids communications from untrustworthy sources
B. Allows communications from trustworthy sources
C. Eliminates viruses and other malicious attacks
D. Filters traffic based on packet attributes
Answer & Solution
Answer: Option C
Solution:
Firewalls perform all of the following functions except
Eliminates viruses and other malicious attacks.
36.
Which of the following is used in B2B to pay for
purchases?
A. e‐commerce
B. financial electronic data interchange
C. electronic data exchange
D. electronic checks
Answer & Solution
Answer: Option B
Solution:
Financial electronic data interchange is used in B2B to pay
for purchases. Business-to-business is a situation where one business makes a
commercial transaction with another.
37.
A security plan begins with a(n) is ______.
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer & Solution
Answer: Option B
Solution:
A security plan begins with a risk assessment. Risk
assessment is a term used to describe the overall process or method where you:
Identify hazards and risk factors that have the potential to cause harm (hazard
identification). Analyze and evaluate the risk associated with that hazard
(risk analysis, and risk evaluation).
38.
Public key encryption uses multiple keys.ne key is used
to encrypt data, while another is used to decrypt data.he key used to encrypt
data is called the _______ key, while the key used to decrypt data is called
the ________ key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Answer & Solution
Answer: Option D
39.
The only payment system that is instantly convertible
without intermediation is _______.
A. Credit card
B. Accumulating balance
C. Stored value
D. Cash
Answer & Solution
Answer: Option D
Solution:
The only payment system that is instantly convertible
without intermediation is Cash.
40.
Secure Sockets Layers does which of the following?
A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above
Answer & Solution
Answer: Option D
Solution:
Secure Sockets Layers creates a secure, private connection
to a web server, encrypts information and sends information over the internet.
41.
The most prevalent online payment method is ______.
A. PayPal
B. checks
C. credit cards
D. debit
Answer & Solution
Answer: Option C
Solution:
The most prevalent online payment method is credit cards.
Over the years, credit cards have become one of the most common forms of
payment for e-commerce transactions.
42.
When a transaction is processed online, how can the
merchant verify the customer's identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Answer & Solution
Answer: Option B
Solution:
When a transaction is processed online, use secure electronic
transactions the merchant can verify the customer's identity by using secure
electronic transactions.
43.
What is the name of the division of the U.S. Department
of Homeland Security that coordinates cyber incident warnings and responses
across government and private sectors?
A. US-CERT
B. OECD
C. IC3
D. P3P
Answer & Solution
Answer: Option A
Solution:
US-CERT is the name of the division of the U.S. Department
of Homeland Security that coordinates cyber incident warnings and responses
across government and private sectors.
44.
The practice of forging a return address on an e‐mail so
that the recipient is fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer & Solution
Answer: Option D
Solution:
The practice of forging a return address on an e‐mail so
that the recipient is fooled into revealing private information is termed as
spoofing. A spoofing attack is a situation in which a person or program
successfully masquerades as another by falsifying data, to gain an illegitimate
advantage.
45.
After sending e-mail, which of the following activities
is most common among Internet users?
A. sending instant messages
B. reading someone else's blog
C. using a search engine to find information
D. getting news
Answer & Solution
Answer: Option C
Solution:
After sending e-mail, using a search engine to find
information is most common among Internet users.
46.
What is a model of a proposed product, service, or
system?
A. Prototyping
B. Prototype
C. Proof‐of‐concept prototype
D. Selling prototype
Answer & Solution
Answer: Option B
Solution:
Prototype is a model of a proposed product, service, or
system. A prototype is an original model, form or an instance that serves as a
basis for other processes.
47.
__________ influence the behavior of others through their
personality, skills, or other factors.
A. Opinion leaders
B. Direct reference groups
C. Indirect reference groups
D. Lifestyle groups
Answer & Solution
Answer: Option A
Solution:
Opinion leaders influence the behavior of others through
their personality, skills, or other factors. Opinion leaders are individuals or
organizations that are able to influence people by their opinion.
48.
What is an internal organizational Internet that is
guarded against outside access by a special security feature called a firewall
(which can be software, hardware, or a combination of the two)?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer & Solution
Answer: Option B
Solution:
Intranet is an internal organizational Internet that is
guarded against outside access by a special security feature called a firewall
(which can be software, hardware, or a combination of the two). An intranet is
a private network that is contained within an enterprise. It may consist of
many interlinked local area networks and also use leased lines in the wide area
network.
49.
A good or service for which there are many dealers
supplying the same product, and all products in the segment are essentially
identical is known as _______.
A. commodity
B. core product
C. actual product
D. augmented product
Answer & Solution
Answer: Option A
Solution:
A good or service for which there are many dealers supplying
the same product, and all products in the segment are essentially identical is
known as commodity. A commodity is a basic good used in commerce that is
interchangeable with other commodities of the same type. Commodities are most
often used as inputs in the production of other goods or services.
50.
What is an intranet that is restricted to an organization
and certain outsiders, such as customers and suppliers?
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer & Solution
Answer: Option C
Solution:
Extranet is an intranet that is restricted to an
organization and certain outsiders, such as customers and suppliers. An extranet
is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses.
51.
Complete price transparency in a perfect information
marketplace is necessary for ____________ to take effect.
A. Bertrand's Law
B. the Law of Universal Prices
C. the Law of One Price
D. the Law of Perfect Commerce
Answer & Solution
Answer: Option C
Solution:
Complete price transparency in a perfect information
marketplace is necessary for the Law of One Price to take effect. The law of
one price states that in the absence of trade frictions, and under conditions
of free competition and price flexibility, identical goods sold in different
locations must sell for the same price when prices are expressed in a common
currency.
52.
What is a detailed process for recovering information or
an IT system in the event of a catastrophic disaster such as a fire or flood?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer & Solution
Answer: Option A
Solution:
Disaster recovery plan is a detailed process for recovering
information or an IT system in the event of a catastrophic disaster such as a
fire or flood. A disaster recovery plan (DRP) is a documented, structured
approach with instructions for responding to unplanned incidents.
53.
A(n) _________ represents data as two-dimensional tables
with records organized in rows and attributes in columns.
A. database management system
B. data warehouse
C. SQL query
D. relational database
Answer & Solution
Answer: Option D
Solution:
A relational database represents data as two-dimensional
tables with records organized in rows and attributes in columns. A relational database
is a set of formally described tables from which data can be accessed or
reassembled in many different ways without having to reorganize the database
tables.
54.
What is a separate facility that does not have any
computer equipment but is a place where the knowledge workers can move after
the disaster?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer & Solution
Answer: Option C
Solution:
Cold site is a separate facility that does not have any
computer equipment but is a place where the knowledge workers can move after
the disaster. A cold site is a business location that is used for backup in the
event of a disruptive operational disaster at the normal business site.
55.
All of the following are types of data mining except
______.
A. selective data mining
B. query-driven data mining
C. model-driven data mining
D. rule-based data mining
Answer & Solution
Answer: Option A
Solution:
All of the following are types of data mining except
selective data mining.
56.
What is a separate and fully equipped facility where the
company can move immediately after the disaster and resume business?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer & Solution
Answer: Option B
Solution:
Hot site is a separate and fully equipped facility where the
company can move immediately after the disaster and resume business. A hot site
is a commercial disaster recovery service that allows a business to continue
computer and network operations in the event of a computer or equipment
disaster.
57.
Which of the following market entry strategies are the
most common for existing firms?
A. first mover
B. fast follower
C. brand extender
D. alliances
Answer & Solution
Answer: Option C
Solution:
Brand extender market entry strategies are the most common
for existing firms. Brand Extension is the use of an established brand name in
new product categories.
58.
What charts (1) the cost to your organization of the
unavailability of information and technology and (2) the cost to your
organization of recovering from a disaster over time?
A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer & Solution
Answer: Option D
Solution:
Disaster recovery cost curve charts the cost to your organization
of the unavailability of information and technology and the cost to your
organization of recovering from a disaster over time.
59.
The process of getting customers to pass along a
company's marketing message to friends, family, and colleagues is known as
_______.
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Answer & Solution
Answer: Option B
Solution:
The process of getting customers to pass along a company's
marketing message to friends, family, and colleagues is known as viral
marketing. Viral marketing or viral advertising is a business strategy that
uses existing social networks to promote a product.
60.
Which factor determines when your IT system will be
available for knowledge workers to access?
A. Availability
B. Accessibility
C. Reliability
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Availability factor determines when your IT system will be
available for knowledge workers to access.
61.
The per-product price consumers are willing to pay for a
bundle ____________ as the number of goods in the bundle increases.
A. decreases
B. increases
C. varies from product to product
D. stays the same
Answer & Solution
Answer: Option B
Solution:
The per-product price consumers are willing to pay for a
bundle increases as the number of goods in the bundle increases. The
willingness of consumers to pay can, at times, be quite volatile. With bundle
pricing, the seller lowers the variance on this willingness to pay and
increases its profit by selling bundles of products instead of selling all
products separately.
62.
Which factor determines who has the right to access
different types of IT systems and information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer & Solution
Answer: Option B
Solution:
Accessibility factor determines who has the right to access
different types of IT systems and information.
63.
Creating multiple versions of information goods and
selling essentially the same product to different market segments at different
prices is called__________.
A. versioning
B. bundling
C. transactive content
D. price discrimination
Answer & Solution
Answer: Option A
Solution:
Creating multiple versions of information goods and selling
essentially the same product to different market segments at different prices
is called versioning. Versioning is the creation and management of multiple
releases of a product, all of which have the same general function but are
improved, upgraded or customized.
64.
Which factor ensures your IT systems are functioning
correctly and providing accurate information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer & Solution
Answer: Option C
Solution:
Reliability factor ensures your IT systems are functioning
correctly and providing accurate information. The term reliability in
psychological research refers to the consistency of a research study or
measuring test.
65.
All of the following are examples of intelligent agent
technology except ________.
A. automated response systems
B. automatic shipping confirmation
C. order status reports
D. online web bugs
Answer & Solution
Answer: Option D
Solution:
All of the following are examples of intelligent agent
technology except online web bugs.
66.
Which factor represents how well your system can adapt to
increased demands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer & Solution
Answer: Option D
Solution:
Scalability factor represents how well your system can adapt
to increased demands. Scalability is an attribute that describes the ability of
a process, network, software or organization to grow and manage increased
demand.
67.
E-business can be defined as_______.
A. the uninhibited flow of information and goods on the
Web
B. the use of the Internet and the Web to transact
business
C. digitally enabled transactions and processes within
an organization
D. commercial transactions involving electronic goods
Answer & Solution
Answer: Option C
Solution:
E-business can be defined as digitally enabled transactions
and processes within an organization. E-business or Online business means
business transactions that take place online with the help of the internet. The
term e-business came into existence in the year 1996. E-business is an
abbreviation for electronic business.
68.
Which factor represents a system's ability to change
quickly?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer & Solution
Answer: Option A
Solution:
Flexibility factor represents a system's ability to change
quickly. Flexibility is Key to E-commerce Stability.
69.
The set of applications and technologies that allow users
to create, edit, and distribute content online is known as______.
A. Internet
B. social networking
C. virtual life
D. Web 2.0
Answer & Solution
Answer: Option D
Solution:
The set of applications and technologies that allow users to
create, edit, and distribute content online is known as Web 2.0. Web 2.0
Websites allow users to do more than just retrieve information.
70.
What is a set of conditions used to measure how well a product
or system functions?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer & Solution
Answer: Option D
Solution:
Benchmark is a set of conditions used to measure how well a
product or system functions. Benchmarking is the process through which a
company measures its products, services, and practices against its toughest
competitors, or those companies recognized as leaders in its industry.
Section – 3
1.
Which of the following represents a limiting factor for
the growth of e-commerce?
A. Persistent cultural attraction of physical markets
and traditional shopping experiences
B. Inadequate selection of goods compared to physical
marketplaces
C. E-commerce lacks the convenience of other methods of
transacting business
D. The potential audience for e-commerce is too low to
support it as a widespread method of commerce
Answer & Solution
Answer: Option A
Solution:
Persistent cultural attraction of physical markets and
traditional shopping experiences represents a limiting factor for the growth of
e-commerce.
2.
What determines the future IT infrastructure requirements
for new equipment and additional network capacity?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer & Solution
Answer: Option C
Solution:
Capacity planning determines the future IT infrastructure
requirements for new equipment and additional network capacity.
3.
The fastest growing form of online advertising is
_________.
A. banner ads
B. pop-up ads
C. rich media/video ads
D. pop-under ads
Answer & Solution
Answer: Option C
Solution:
The fastest growing form of online advertising is rich
media/video ads. Online advertising, also called online marketing or Internet
advertising or web advertising, is a form of marketing and advertising which
uses the Internet to deliver promotional marketing messages to consumers.
4.
What automates business processes?
A. Workflow
B. ASP
C. Workflow system
D. EIP
Answer & Solution
Answer: Option C
Solution:
Workflow system automates business processes. A workflow
management system provides an infrastructure for the set-up, performance and
monitoring of a defined sequence of tasks, arranged as a workflow application.
5.
All of the following are among the most common categories
of spam except ______.
A. fraud
B. commercial products
C. finance
D. health (drugs)
Answer & Solution
Answer: Option A
Solution:
All of the following are among the most common categories of
spam except fraud. Fraud is intentional deception to secure unfair or unlawful
gain, or to deprive a victim of a legal right.
6.
What defines all of the steps or business rules, from
beginning to end, required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
Answer & Solution
Answer: Option A
Solution:
Workflow defines all of the steps or business rules, from
beginning to end, required for a process to run correctly.
7.
All of the following are types of social marketing except
______.
A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising
Answer & Solution
Answer: Option A
Solution:
All of the following are types of social marketing except
affiliate marketing. Affiliate marketing is the process of earning a commission
by promoting other people's (or company's) products.
8.
What sends work assignments through an e‐mail system?
A. Database‐based enterprise information portal
B. Messaging‐based enterprise information portal
C. Database‐based workflow system
D. Messaging‐based workflow system
Answer & Solution
Answer: Option D
Solution:
Messaging‐based workflow system sends work assignments
through an e‐mail system.
9.
Which of the following measures the percentage of people
exposed to an online advertisement who actually click on the banner?
A. impression rate
B. view-through rate
C. click-through rate
D. stickiness ratio
Answer & Solution
Answer: Option C
Solution:
click-through rate measures the percentage of people exposed
to an online advertisement who actually click on the banner. Click-through rate
(CTR) is the ratio of users who click on a specific link to the number of total
users who view a page, email, or advertisement.
10.
Which will not a computer resources?
A. firewall
B. Virus
C. Trojan horse
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Firewall is not a computer resources. A firewall is a
hardware or software device designed to permit or deny data through a computer
network in order to protect the resources of a private network from users from
other networks.
11.
Which of the following is a measure of the percentage of
purchasers who return to a Web site within a year?
A. loyalty
B. reach
C. recency
D. unique visitors
Answer & Solution
Answer: Option A
Solution:
Loyalty is a measure of the percentage of purchasers who
return to a Web site within a year.
12.
Which is not a function of ERP?
A. Warehousing
B. sales
C. scheduling
D. None of the above
Answer & Solution
Answer: Option D
Solution:
Enterprise resource planning (ERP) is a method of using
computer technology to link various Functions—such as accounting, inventory
control, and human resources—across an entire company. However, there are
certain things that we need to consider in the ERP to enhance the business
processes.
13.
All of the following are metrics for e-mail campaigns
except _________.
A. open rate
B. delivery rate
C. bounce-back rate
D. cart conversion rate
Answer & Solution
Answer: Option D
Solution:
All of the following are metrics for e-mail campaigns except
cart conversion rate. The conversion rate is the number of conversions divided
by the total number of visitors.
14.
Which is a function of ERP?
A. Warehousing
B. sales
C. scheduling
D. all of the above
Answer & Solution
Answer: Option D
Solution:
The function of ERP are Warehousing, sales and scheduling.
15.
As consumers become more accustomed to new online advertising
formats, click-through rates tend to _______.
A. remain constant
B. decrease
C. increase
D. rapidly increase
Answer & Solution
Answer: Option B
Solution:
As consumers become more accustomed to new online
advertising formats, click-through rates tend to decrease.
16.
Which of the following is the primary characteristic of
an intranet?
A. People outside the organization can access it
B. People inside the organization can't access it
C. People outside the organization can't access it
D. None of the above
Answer & Solution
Answer: Option C
Solution:
People outside the organization can't access it is the
primary characteristic of an intranet.
17.
The ethical principle which states that if an action is
not right for all situations, then it is not right for any situation is known as
__________.
A. The Golden Rule
B. Slippery Slope
C. No Free Lunch
D. Universalism
Answer & Solution
Answer: Option D
Solution:
The ethical principle which states that if an action is not
right for all situations, then it is not right for any situation is known as
Universalism. Universalism is defined as an action that should be same in all
the situations.
18.
Which concept suggests that different applications and
computer systems should be able to communicate with one another?
A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer & Solution
Answer: Option D
Solution:
Interoperability concept suggests that different
applications and computer systems should be able to communicate with one
another. Interoperability is the ability of different information systems,
devices or applications to connect, in a coordinated manner, within and across
organizational boundaries to access, exchange and cooperatively use data
amongst stakeholders, with the goal of optimizing the health of individuals and
populations.
19.
Which of the following statements about privacy is true?
A. It is a moral right to be left alone
B. Only corporations and government need to be
concerned about it
C. It has only just recently become a concern
D. It is most easily obtained on the Internet
Answer & Solution
Answer: Option A
Solution:
Privacy is a moral right to be left alone. Privacy is the
ability of an individual or group to seclude themselves, or information about
themselves, and thereby express themselves selectively. The boundaries and
content of what is considered private differ among cultures and individuals.
20.
Which service encompasses all technologies used to
transmit and process information on an across a network?
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer & Solution
Answer: Option D
Solution:
Web services encompasses all technologies used to transmit
and process information on an across a network. Web services is a standardized
way or medium to propagate communication between the client and server
applications on the World Wide Web.
21.
The ability of consumers to review and contest the
accuracy and completeness of data collected about them involves which of the
following FTC fair information practice principles?
A. Security
B. Enforcement
C. Choice/Consent
D. Access/Participation
Answer & Solution
Answer: Option D
Solution:
The ability of consumers to review and contest the accuracy
and completeness of data collected about them involves Access/Participation FTC
fair information practice principles.
22.
Which process can preventata from lose due to computer
problems or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer & Solution
Answer: Option A
Solution:
Backup process can prevent from lose due to computer
problems or human errors. Backup, or data backup, or the process of backing up,
refers to the copying into an archive file of computer data that is already in
secondary storage—so that it may be used to restore the original after a data
loss event.
23.
The __________ is the first major effort to adjust the
copyright laws to the Internet age.
A. Platform for Privacy Preferences (P3P)
B. Center for Democracy and Technology
C. Digital Millennium Copyright Act (DMCA)
D. E-Government Act of 2002
Answer & Solution
Answer: Option C
Solution:
The Digital Millennium Copyright Act (DMCA) is the first
major effort to adjust the copyright laws to the Internet age. The Digital
Millennium Copyright Act is a 1998 United States copyright law that implements
two 1996 treaties of the World Intellectual Property Organization. It
criminalizes production and dissemination of technology, devices, or services
intended to circumvent measures that control access to copyrighted works.
24.
Which process is used to reinstall data from a copy when
the original data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer & Solution
Answer: Option B
Solution:
Recovery process is used to reinstall data from a copy when
the original data has been lost. Data restore is the process of copying backup
data from secondary storage and restoring it to its original location or a new
location.
25.
A patent grants the owner an exclusive monopoly on the
ideas behind the invention for ______ years.
Answer & Solution
Answer: Option B
Solution:
A patent grants the owner an exclusive monopoly on the ideas
behind the invention for 20 years.
26.
What describes a process of continuously measuring
results and comparing those results to optimal performance so that actual
performance may be improved?
A. Performance
B. Capacity planning
C. Benchmarking
D. Data cleansing
Answer & Solution
Answer: Option C
Solution:
Benchmarking describes a process of continuously measuring
results and comparing those results to optimal performance so that actual
performance may be improved.
27.
The number of business methods patents granted is
___________ compared to the number of patents applied for.
A. substantially smaller
B. slightly smaller
C. close to equal
D. equal
Answer & Solution
Answer: Option A
Solution:
The number of business methods patents granted is
substantially smaller compared to the number of patents applied for.
28.
Who protects system from external threats?
A. firewall
B. EDI
C. ERP
D. Script kiddies
Answer & Solution
Answer: Option A
Solution:
Firewall protects system from external threats. A firewall
typically establishes a barrier between a trusted internal network and
untrusted external network, such as the Internet.
29.
The redirection of traffic from a legitimate site to an
infringing site is called _______.
A. cyber squatting
B. cyber piracy
C. meta tagging
D. key wording
Answer & Solution
Answer: Option B
Solution:
The redirection of traffic from a legitimate site to an
infringing site is called cyber piracy. Piracy is the unauthorized distribution,
theft, reproduction, copying, performance, storage, sale or other use of
intellectual property (IP) protected under copyright law. It is a form of
copyright infringement.
30.
Who breaks into other people's computer systems and
steals and destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer & Solution
Answer: Option A
Solution:
Hackers breaks into other people's computer systems and
steals and destroys information. Hacking refers to activities that seek to
compromise digital devices, such as computers, smartphones, tablets, and even
entire networks.
31.
During which period of Internet governance was Network
Solutions given a monopoly to assign and track high-level domains?
A. Government Control Period
B. Privatization
C. Self-Regulation
D. Governmental Regulation
Answer & Solution
Answer: Option B
Solution:
During Privatization period of Internet governance was
Network Solutions given a monopoly to assign and track high-level domains.
32.
What is software that comes hidden in free downloadable
software and tracks your online movements, mines the information stored on your
computer, or uses your computer's CPU and storage for some task you know
nothing about?
A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above
Answer & Solution
Answer: Option D
Solution:
Spyware is software that comes hidden in free downloadable
software and tracks your online movements, mines the information stored on your
computer, or uses your computer's CPU and storage for some task you know
nothing about.
33.
All of the following are acts Congress has passed or
attempted to pass to protect children online except __________.
A. Video Privacy Protection Act
B. Children's Online Protection Act
C. Communications Decency Act
D. Children's Internet Protection Act
Answer & Solution
Answer: Option A
Solution:
All of the following are acts Congress has passed or
attempted to pass to protect children online except Video Privacy Protection
Act. The Video Privacy Protection Act of 1988 is United States legislation that
prevents wrongful disclosure of an individual's personally identifiable
information stemming from their rental or purchase of audiovisual material,
including videotapes, DVDs and video games.
34.
ERP stands for.
A. Enterprise resolution planning
B. Enterprise reverse planning
C. Enterprise resource planning
D. None of the above
Answer & Solution
Answer: Option C
Solution:
ERP stands for Enterprise resource planning. It's a business
process management software that manages and integrates a company's financials,
supply chain, operations, reporting, manufacturing, and human resource
activities.
35.
Which of the following is a privacy advocacy group that
is a foundation- and business-supported group with a legislative focus?
A. Cdt.org
B. PrivacyInternational.org
C. Epic.org
D. Privacy.org
Answer & Solution
Answer: Option A
Solution:
Cdt.org is a privacy advocacy group that is a foundation-
and business-supported group with a legislative focus.
36.
Which is not a component of ERP?
A. Legacy systems
B. Bolt on applications
C. Operational database
D. Cybersoft
Answer & Solution
Answer: Option D
Solution:
Cybersoft is not a component of ERP. Cybersoft is a leading
provider of innovative business software solutions, information technology and
consulting services.
37.
What is the first step in a P3P-enabled transaction?
A. send Web page
B. http GET request Web page
C. Send P3P policy files
D. http GET request P3P policy files
Answer & Solution
Answer: Option B
Solution:
The first step in a P3P-enabled transaction is http GET
request Web page.
38.
Which is not a function of ERP?
A. Human resource management
B. financial
C. warehousing
D. None of the above
Answer & Solution
Answer: Option D
Solution:
Enterprise resource planning (ERP) is a method of using
computer technology to link various Functions such as accounting, inventory
control, and human resources across an entire company. However, there are
certain things that we need to consider in the ERP to enhance the business
processes. All the above are functions of ERP.
39.
All of the following are types of intellectual property
protection except_______.
A. patents
B. trademarks
C. governance
D. copyrights
Answer & Solution
Answer: Option C
Solution:
All of the following are types of intellectual property
protection except governance. Governance encompasses the system by which an
organisation is controlled and operates, and the mechanisms by which it, and
its people, are held to account.
40.
What is a type of virus that spreads itself, not just
from file to file, but from computer to computer via e‐mail and other Internet
traffic?
A. Computer virus
B. Worm
C. Denial‐of‐service attack
D. None of the above
Answer & Solution
Answer: Option B
Solution:
Worm is a type of virus that spreads itself, not just from
file to file, but from computer to computer via e‐mail and other Internet
traffic. A computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers.
41.
All of the following are challenges to online retail
except ______.
A. Consumer concerns about the security of transactions
B. Consumer concerns about the privacy of personal
information given to Web sites
C. Delays in delivery of goods when compared to store
shopping
D. Inability to change prices nearly instantly
Answer & Solution
Answer: Option D
Solution:
All of the following are challenges to online retail except
Inability to change prices nearly instantly.
42.
What floods a Web site with so many requests for service
that it slows down or crashes?
A. Computer virus
B. Worm
C. Denial‐of‐service attack
D. None of the above
Answer & Solution
Answer: Option C
Solution:
Denial‐of‐service attack floods a Web site with so many
requests for service that it slows down or crashes. A denial-of-service (DoS)
attack is a type of cyber attack in which a malicious actor aims to render a
computer or other device unavailable to its intended users by interrupting the
device's normal functioning.
43.
Which of the following is an industry strategic factor
that relates to whether new entrants face a disadvantage when attempting to
enter an industry?
A. barriers to entry
B. power of suppliers
C. power of consumers
D. industry value chain
Answer & Solution
Answer: Option A
Solution:
Barriers to entry is an industry strategic factor that
relates to whether new entrants face a disadvantage when attempting to enter an
industry.
44.
What harnesses far‐flung computers together by way of the
Internet or a virtual private network to share CPU power, databases, and
database storage?
A. Computer virus
B. Worm
C. Denial‐of‐service attack
D. None of the above
Answer & Solution
Answer: Option D
Solution:
Grid computing harnesses far-flung computers together by way
of the Internet or a virtual private network to share CPU power, databases, and
database storage.
45.
Products are made to prior to orders received based on
estimated demand under a _________.
A. supply-push model
B. demand-push model
C. supply-pull model
D. demand-pull model
Answer & Solution
Answer: Option A
Solution:
Products are made to prior to orders received based on
estimated demand under a supply-push model. A company's supply chain stretches
from the factory where its products are made to the point the products are in
customer hands.
46.
What consists of the identification of risks or threats,
the implementation of security measures, and the monitoring of those measures
for effectiveness?
A. Risk management
B. Risk assessment
C. Security
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Risk management consists of the identification of risks or
threats, the implementation of security measures, and the monitoring of those measures
for effectiveness. Risk management is the process of identifying, assessing and
controlling threats to an organization's capital and earnings.
47.
The major impact of Internet real estate sites is in
______.
A. completing property transactions online
B. influencing offline decisions
C. reducing commissions
D. e-mail marketing to consumers
Answer & Solution
Answer: Option B
Solution:
The major impact of Internet real estate sites is in
influencing offline decisions..
48.
What is the process of evaluating IT assets, their
importance to the organization, and their susceptibility to threats, to measure
the risk exposure of these assets?
A. Risk management
B. Risk assessment
C. Security
D. None of the above
Answer & Solution
Answer: Option B
Solution:
Risk assessment is the process of evaluating IT assets,
their importance to the organization, and their susceptibility to threats, to
measure the risk exposure of these assets. A risk assessment is the combined
effort of: identifying and analyzing potential events that may negatively
impact individuals, assets, and/or the environment; and making judgments
"on the tolerability of the risk on the basis of a risk analysis"
while considering influencing factors.
49.
Which of the following is the largest online travel
service?
A. Travelocity
B. Orbitz
C. Priceline
D. Expedia
Answer & Solution
Answer: Option D
Solution:
Expedia is the largest online travel service. Expedia is one
of the fastest growing online travel portals in Asia, offering travellers an
extensive selection of hotels, activities and travel services to meet every
budget and activities of every kind at competitive rates.
50.
What is the process of making a copy of the information
stored on a computer?
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer & Solution
Answer: Option A
Solution:
Backup is the process of making a copy of the information
stored on a computer. Backup refers to making copies of data so that the copies
may be used to restore the original data after a data loss event. Backups are
extrememly important for computer management.
51.
Which of the following is not one of the top three online
career service providers?
A. CareerBuilder
B. Monster
C. HotJobs
D. USAJobs
Answer & Solution
Answer: Option D
Solution:
USAJobs is not one of the top three online career service
providers. USAJobs is the United States Government's website for listing civil
service job opportunities with federal agencies.
52.
What software detects and removes or quarantines computer
viruses?
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer & Solution
Answer: Option B
Solution:
Anti‐virus software detects and removes or quarantines
computer viruses. Antivirus software is a program or set of programs that are
designed to prevent, search for, detect, and remove software viruses, and other
malicious software like worms, trojans, adware, and more.
53.
The largest segment in the recruitment business
is________.
A. General job recruitment
B. Executive search
C. Specialized job placement services
D. Managerial recruitment
Answer & Solution
Answer: Option A
Solution:
The largest segment in the recruitment business is General
job recruitment.
54.
What is hardware and/or software that protects computers
from intruders?
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer & Solution
Answer: Option C
Solution:
Firewall is software that protects computers from intruders.
A firewall typically establishes a barrier between a trusted internal network
and untrusted external network, such as the Internet.
55.
The majority of job seekers rely on which of the
following?
A. Word-of-mouth leads
B. Employment agencies
C. Internet and newspapers equally
D. Internet only
Answer & Solution
Answer: Option C
Solution:
The majority of job seekers rely on Internet and newspapers
equally.
56.
What is the use of physical characteristics — such as
your fingerprint, the blood vessels in the retina of your eye, the sound of
your voice, or perhaps even your breath — to provide identification?
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer & Solution
Answer: Option D
Solution:
Biometrics is the use of physical characteristics — such as
your fingerprint, the blood vessels in the retina of your eye, the sound of
your voice, or perhaps even your breath — to provide identification.
57.
The most popular type of media in terms of total hours of
consumption per year is _____.
A. television
B. radio
C. Internet
D. newspaper
Answer & Solution
Answer: Option A
Solution:
The most popular type of media in terms of total hours of
consumption per year is television. Though consumption of video on digital
platforms is on the rise in the country, good old television continues to score
in terms of penetration and has large headroom left to fill.
58.
All of the following are considered biometrics, except:
A. Fingerprint
B. Retina
C. Password
D. Voice
Answer & Solution
Answer: Option C
Solution:
All of the following are considered biometrics, except
Password. Biometrics are more secure than traditional passwords and PINs.
59.
Which of the following describes paid content's relation
to free user-generated content?
A. Free content jeopardizes paid content
B. Paid content jeopardizes free content
C. Free content and paid content can both work in
tandem cooperatively
D. Paid content is viable now but will not be in the
future
Answer & Solution
Answer: Option C
Solution:
Free content and paid content can both work in tandem
cooperatively describes paid content's relation to free user-generated content.
60.
What scrambles the contents of a file so you can't read
it without having the right decryption key?
A. Encryption
B. Intrusion‐detection software
C. Security‐auditing software
D. All of the above
Answer & Solution
Answer: Option A
Solution:
Encryption scrambles the contents of a file so you can't
read it without having the right decryption key. Encryption is the process of
encoding a message or information in such a way that only authorized parties
can access it and those who are not authorized cannot. Encryption does not itself
prevent interference, but denies the intelligible content to a would-be
interceptor.
61.
The top U.S online video site is ______.
A. MySpace
B. YouTube
C. AOL
D. Google Video
Answer & Solution
Answer: Option B
Solution:
The top U.S online video site is YouTube. The most popular
video hosting website is YouTube, with 1.8 billion logged-in users per month
and the most extensive catalog of online videos.
62.
What is an encryption system that uses two keys: a public
key that everyone can have and a private key for only the recipient?
A. Encryption
B. Public key encryption
C. Intrusion‐detection software
D. Security‐auditing software
Answer & Solution
Answer: Option B
Solution:
Public-key encryption is a cryptographic system that uses
two keys - a public key known to everyone and a private or secret key known
only to the recipient of the message.
63.
Which of the following is not a type of media
convergence?
A. technological convergence
B. content convergence
C. industry convergence
D. community convergence
Answer & Solution
Answer: Option D
Solution:
Community convergence is not a type of media convergence.
Communities-Convergence means to converge is an ancient custom; it means to
reunite, to reconnect, to share, to celebrate, to cooperate, to learn, to
support, to dream and act as a single community that speaks with the same voice
and loves as one heart!
64.
What looks for people on the network who shouldn't be
there or who are acting suspiciously?
A. Encryption
B. Public key encryption
C. Intrusion‐detection software
D. Security‐auditing software
Answer & Solution
Answer: Option C
Solution:
Intrusion‐detection software looks for people on the network
who shouldn't be there or who are acting suspiciously. An intrusion detection
system is a device or software application that monitors a network or systems
for malicious activity or policy violations.
65.
The online content revenue model in which free content
drives offline revenues is called the _________.
A. marketing model
B. advertising model
C. pay-per-view model
D. subscription model
Answer & Solution
Answer: Option A
Solution:
The online content revenue model in which free content
drives offline revenues is called the marketing model. Marketing mix modeling
is statistical analysis such as multivariate regressions on sales and marketing
time series data to estimate the impact of various marketing tactics on sales
and then forecast the impact of future sets of tactics.
66.
What checks out your computer or network for potential
weaknesses?
A. Encryption
B. Public key encryption
C. Security‐auditing software
D. None of the above
Answer & Solution
Answer: Option C
Solution:
Security‐auditing software checks out your computer or
network for potential weaknesses. A computer security audit is a manual or
systematic measurable technical assessment of a system or application.
67.
The combination of technical and legal means for protecting
digital content from unlimited reproduction without permission is known as
__________.
A. Digital rights management
B. Digital protection schemes
C. Digital distribution regulation
D. Digital rights protection
Answer & Solution
Answer: Option A
Solution:
The combination of technical and legal means for protecting
digital content from unlimited reproduction without permission is known as
Digital rights management. Digital rights management (DRM) is a systematic
approach to copyright protection for digital media.
68.
Which of the following to viruses harm?
A. Your keyboard
B. Your monitor
C. Your processor
D. Viruses do not harm any of the above
Answer & Solution
Answer: Option D
Solution:
Some computer viruses are programmed to harm your computer
by damaging programs, deleting files, or reformatting the hard drive.
69.
What is the most commonly offered interactive feature of
newspaper Web sites?
A. video
B. comments on blogs
C. RSS feeds
D. podcasts
Answer & Solution
Answer: Option C
Solution:
RSS feeds is the most commonly offered interactive feature
of newspaper Web sites. RSS (Really Simple Syndication) and Atom are two
specialized formats that create what's commonly called a news feed, or just
feed. A feed is an easy way for sites to share headlines and stories so that
you can read them without having to visit two dozen different web pages
everyday.
70.
Which of the following can a virus do?
A. Hurt your hardware
B. Hurt any files they weren't designed to attack
C. Infect files on write‐protected disks
D. None of the above
Answer & Solution
Answer: Option D
Solution:
Some computer viruses are programmed to harm your computer
by damaging programs, deleting files, or reformatting the hard drive.
Section – 4
1.
Which of the following is an advantage of e-books?
A. reduced transaction costs for the user
B. requirement of expensive devices to use
C. portability compared to print books
D. copyright management
Answer & Solution
Answer: Option A
Solution:
Reduced transaction costs for the user is an advantage of
e-books. An electronic book, also known as an e-book or eBook, is a book
publication made available in digital form, consisting of text, images, or
both, readable on the flat-panel display of computers or other electronic
devices.
2.
In simple terms, what does risk assessment ask?
A. What can go wrong?
B. How likely is it to go wrong?
C. What are the possible consequences if it does go
wrong?
D. All of the above
Answer & Solution
Answer: Option D
Solution:
In simple terms, risk assessment can ask What can go wrong?
How likely is it to go wrong? and What are the possible consequences if it does
go wrong?
3.
After television, the next largest major player in the
commercial entertainment industry is _________.
A. video games
B. music
C. radio
D. film
Answer & Solution
Answer: Option D
Solution:
After television, the next largest major player in the
commercial entertainment industry is film.
4.
Which of the following is a characteristic of a firewall?
A. Examines each message as it seeks entrance to the
network
B. Blocks messages without the correct markings from
entering the network
C. Detects computers communicating with the Internet
without approval
D. All of the above
Answer & Solution
Answer: Option D
Solution:
The characteristic of a firewall Examines each message as it
seeks entrance to the network, Blocks messages without the correct markings
from entering the network and Detects computers communicating with the Internet
without approval.
5.
Which of the following is not an entertainment industry
value chain model?
A. content owner direct model
B. user distribution model
C. aggregator model
D. Internet innovator model
Answer & Solution
Answer: Option B
Solution:
User distribution model is not an entertainment industry
value chain model. Distribution model defines which applications in your
distributed systems communicate with each other and which types of data are
distributed.
6.
Which of the following are ways to prove access rights?
A. What you know, like a password
B. What you have, like an ATM card
C. What you look like
D. All of the above
Answer & Solution
Answer: Option D
Solution:
What you know, like a password, What you have, like an ATM
card and What you look like all are ways to prove access rights.
7.
Technologies that help enhance resolution of e-book
reader display screens are known as _________.
A. high-res pixel formatting
B. screen resolution technologies
C. sub-screen smoothing technologies
D. sub-pixel display technologies
Answer & Solution
Answer: Option D
Solution:
Technologies that help enhance resolution of e-book reader
display screens are known as sub-pixel display technologies. Subpixel rendering
is a way to increase the apparent resolution of a computer's liquid crystal display
(LCD) or organic light-emitting diode (OLED) display by rendering pixels to
take into account the screen type's physical properties.
8.
Which item can a password be used to protect?
A. Network
B. File
C. Folder
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Network, File and Folder can be protected by using a
password.
9.
All of the following are characteristics of a social
network except _______.
A. involves a group of people
B. features shared social interaction
C. always feature shared goals and purposes
D. common ties among members
Answer & Solution
Answer: Option C
Solution:
All of the following are characteristics of a social network
except always feature shared goals and purposes.
10.
Which is the most important component of IT?
A. Information
B. People
C. Information technology
D. Computers
Answer & Solution
Answer: Option B
Solution:
People is the most important component of IT. Their
human-resource systems shine! People play a vital role in most operational
systems and processes. Knowledge, skills and attitudes often determine the
quality and quantity of system output.
11.
Social networking sites primarily earn their revenue
through _________.
A. advertising
B. subscriptions
C. donations
D. service fees
Answer & Solution
Answer: Option A
Solution:
Social networking sites primarily earn their revenue through
advertising. The most common way for websites to generate revenue is to allow
companies to advertise on the site. Web advertising is still an emerging
market.
12.
Which of the following applies to the implementation of
an idea?
A. Copyright
B. Intellectual property
C. Patent
D. Denial‐of‐service attack
Answer & Solution
Answer: Option C
Solution:
Patent applies to the implementation of an idea.
13.
The type of social network described as a community built
around a common interest such as games, sports, music, and so on is called
_________.
A. general community
B. practice network
C. affinity community
D. interest-based social network
Answer & Solution
Answer: Option D
Solution:
The type of social network described as a community built
around a common interest such as games, sports, music, and so on is called
interest-based social network. An interest-based network is exactly what it
sounds like: a social network built around interests, using common threads to
bring members of an audience together. Whether for travel, food, fashion or
cats, interest-based networks are taking over the social media scene, and
brands that get it stand to reap the benefits.
14.
When you purchase copyrighted software, what actually are
you paying for?
A. The cost of the CDs, manuals, and development of the
software
B. The cost of the CDs, manuals, and a share of the
cost of the software development
C. A share of the cost of software development
D. All of the above
Answer & Solution
Answer: Option D
Solution:
When we purchase copyrighted software, we are actually
paying for The cost of the CDs, manuals, and development of the software, The
cost of the CDs, manuals, and a share of the cost of the software development
and A share of the cost of software development.
15.
Auction sites like eBay tend to use _______ pricing.
A. dynamic
B. fixed
C. trigger
D. utilization
Answer & Solution
Answer: Option A
Solution:
Auction sites like eBay tend to use dynamic pricing. Dynamic
pricing is the latest pricing trend that has taken the ecommerce industry by
storm.
16.
Which of the following is not a dimension of privacy?
A. Need for personal space
B. Need to feel in control of our possessions
C. Need to feel in control of our personal information
D. All of the above are dimensions of privacy
Answer & Solution
Answer: Option D
Solution:
Need for personal space, Need to feel in control of our
possessions and Need to feel in control of our personal information all are dimension
of privacy.
17.
Which of the following is not considered to be a drawback
of Internet auctions?
A. market inefficiency
B. trust risks
C. fulfillment costs
D. delayed consumption costs
Answer & Solution
Answer: Option A
Solution:
Market inefficiency is not considered to be a drawback of
Internet auctions. A market anomaly (or market inefficiency) in a financial
market is a price and/or rate of return distortion that seems to contradict the
efficient-market hypothesis.
18.
Which of the following captures screen images?
A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen capture software
Answer & Solution
Answer: Option D
Solution:
Screen capture software captures screen images. Screen
recording software lets you capture your screen to share with others, in
support tickets, product videos, onboarding training, and more.
19.
The marketplace for auction sites is best described as
__________.
A. many sites attaining similar levels of profitability
B. easy to enter due to minimal barriers
C. populated mostly with small, thriving specialty
sites
D. dominated by a handful of sites with established
networks
Answer & Solution
Answer: Option D
Solution:
The marketplace for auction sites is best described as
dominated by a handful of sites with established networks.
20.
Which of the following examines information passing
through switches, hubs, or routers?
A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures
Answer & Solution
Answer: Option B
Solution:
Packet sniffer examines information passing through
switches, hubs and routers. Packet sniffing is the act of capturing packets of
data flowing across a computer network. The software or device used to do this
is called a packet sniffer.
21.
A dynamically priced market that features few buyers and
many sellers is a market that exhibits ______.
A. market neutrality
B. buyer bias
C. seller bias
D. owner bias
Answer & Solution
Answer: Option B
Solution:
A dynamically priced market that features few buyers and
many sellers is a market that exhibits buyer bias.
22.
Which of the following records logons and deletions?
A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures
Answer & Solution
Answer: Option C
Solution:
Log analysis tools records logons and deletions. Log
analysis helps us in understanding what has happened and derive useful metrics
in monitoring, performance, digital marketing etc.
23.
The most popular type of auction on eBay is the
_________.
A. Dutch Internet auction
B. Name Your Own Price auction
C. English auction
D. Professional service auction
Answer & Solution
Answer: Option C
Solution:
The most popular type of auction on eBay is the English
auction. English auction, also known as an open ascending price auction. This
type of auction is arguably the most common form of auction in use today.
24.
E‐mail messages may be stored on which of the following
computers?
A. Sender's computer
B. Sender's server
C. Recipient's server
D. All of the above
Answer & Solution
Answer: Option D
Solution:
E‐mail messages may be stored on Sender's computer, Sender's
server and Recipient's server.
25.
Which of the following is not a primary function of a
portal?
A. navigation of the Web
B. social networking
C. commerce
D. content
Answer & Solution
Answer: Option B
Solution:
Social networking is not a primary function of a portal.
Social networking is the use of Internet-based social media sites to stay
connected with friends, family, colleagues, customers, or clients.
26.
What might identity thieves do with your identity?
A. Apply for and use credit cards
B. Apply for a loan
C. Change their identity
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Once identity thieves have your personal information, they
can drain your bank account, run up charges on your credit cards, open new
utility accounts, or get medical treatment on your health insurance. An
identity thief can file a tax refund in your name and get your refund.
27.
Which portal business model best describes Yahoo?
A. general purpose portal
B. affinity group based vertical market
C. focused content based vertical market
D. none of the above
Answer & Solution
Answer: Option A
Solution:
General purpose portal business model best describes Yahoo.
Yahoo! is an Internet portal that incorporates a search engine and a directory
of World Wide Web sites organized in a hierarchy of topic categories.
28.
Which of the following is not a common approach to
phishing?
A. Send an official‐looking e‐mail asking for
confidential information
B. Ask people to fill out and return a fake letter
using postal mail
C. Ask people to click a link in an e‐mail to open a
submission form on a web page
D. All of the above are uncommon approaches to phishing
Answer & Solution
Answer: Option B
Solution:
Asking people to fill out and return a fake letter using
postal mail is not a common approach to phishing.
29.
Which of the following portal revenue models involves
charging for premium content?
A. ISP services
B. General advertising
C. Subscription fees
D. Tenancy deals
Answer & Solution
Answer: Option C
Solution:
Subscription fees portal revenue models involves charging
for premium content.
30.
A technique used to gain personal information for the
purpose of identity theft, often by e‐mail, is called?
A. Phishing
B. Carding
C. Brand spoofing
D. All of the above
Answer & Solution
Answer: Option D
Solution:
A technique used to gain personal information for the
purpose of identity theft, often by e‐mail, is called Phishing, Carding and
Brand spoofing.
31.
Which of the following best describes predicted growth in
C2C and B2C auction spending?
A. B2C spending will overtake C2C spending
B. Both types of spending will increase
C. C2C spending will decrease while B2C increases
D. Both types of spending will decline at similar rates
Answer & Solution
Answer: Option B
Solution:
Both types of spending will increase best describes
predicted growth in C2C and B2C auction spending.
32.
Companies can gather information about employees and
potential employees from which of the following places?
A. Job applications
B. Credit reports
C. Companies that track Web surfers
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Companies can gather information about employees and
potential employees from Job applications, Credit reports and Companies that
track Web surfers.
33.
An auction that has multiple winners that all pay the
same price is an example of________.
A. uniform pricing
B. discriminatory pricing
C. bid rigging
D. price matching
Answer & Solution
Answer: Option A
Solution:
An auction that has multiple winners that all pay the same
price is an example of uniform pricing. It is also called "simple monopoly
pricing". The buyers are free to choose the quantity at a fixed price.
34.
Cyber slacking consists of what activities?
A. Visiting “inappropriate” web sites
B. Visiting news sites
C. Chatting online with others about non‐work topics
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Cyber slacking consists of Visiting “inappropriate” web
sites, Visiting news sites and Chatting online with others about non‐work
topics.
35.
The communication standard for sharing business documents
and settlement information that emerged in the 1970s is called__________.
A. ECD
B. EDI
C. IDE
D. BCB
Answer & Solution
Answer: Option B
Solution:
The communication standard for sharing business documents
and settlement information that emerged in the 1970s is called EDI. Electronic
data interchange is the concept of businesses electronically communicating
information that was traditionally communicated on paper, such as purchase
orders and invoices.
36.
Cookies are used to do which of the following?
A. Store your ID and password for subsequent logons to
the site
B. Store contents of electronic shopping carts
C. To track web activity
D. All of the above and more
Answer & Solution
Answer: Option D
Solution:
Cookies are used to Store your ID and password for subsequent
logons to the site, Store contents of electronic shopping carts and To track
web activity.
37.
All of the following are potential benefits of B2B
e-commerce except_________.
A. reduced amount of 'first-mover' advantages
B. decreased product cycle time
C. increased opportunities for collaborating with
suppliers and distributors
D. increased production flexibility
Answer & Solution
Answer: Option A
Solution:
All of the following are potential benefits of B2B
e-commerce except reduced amount of 'first-mover' advantages.
38.
Unsolicited e‐mail is called what?
A. Junk mail
B. Spam
C. Extra mail
D. None of the above
Answer & Solution
Answer: Option B
Solution:
Unsolicited e‐mail is called Spam. Spam is electronic junk
mail or junk newsgroup postings. Some people define spam even more generally as
any unsolicited email. However, if a long-lost brother finds your email address
and sends you a message, this could hardly be called spam, even though it is
unsolicited.
39.
Goods directly involved in the production process are
known as _________.
A. MRO goods
B. procured goods
C. indirect goods
D. direct goods
Answer & Solution
Answer: Option D
Solution:
Goods directly involved in the production process are known
as direct goods. Direct goods and services are purchases that are directly related
to the production of the particular good or service that is being offered.
40.
What is the name of the new anti‐Spam bill?
A. No‐Spam
B. CAN‐Spam
C. Spam‐Away
D. Stop Spam
Answer & Solution
Answer: Option B
Solution:
CAN‐Spam is the name of the new anti‐Spam bill. Controlling
the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) is a law that
establishes the rules for commercial email and commercial messages, gives
recipients the right to have a business stop emailing them, and outlines the
penalties incurred for those who violate the law.
41.
A materials requirements planning (MRP) system is an
example of ______.
A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange
Answer & Solution
Answer: Option C
Solution:
A materials requirements planning (MRP) system is an example
of a legacy computer system. Material requirements planning (MRP) is a system
for calculating the materials and components needed to manufacture a product.
It consists of three primary steps: taking inventory of the materials and
components on hand, identifying which additional ones are needed and then
scheduling their production or purchase.
42.
What is the legal protection afforded an expression of an
idea, such as a song, video game, and some types of proprietary documents?
A. Ethics
B. Intellectual property
C. Copyright
D. Fair Use Doctrine
Answer & Solution
Answer: Option C
Solution:
Copyright is the legal protection afforded an expression of
an idea, such as a song, video game, and some types of proprietary documents.
Copyright refers to the legal right of the owner of intellectual property. In
simpler terms, copyright is the right to copy.
43.
The foundation for contemporary supply chain management
systems includes all of the following except _________.
A. supply chain simplification
B. continuous inventory replenishment
C. ERP systems
D. B2B electronic storefronts
Answer & Solution
Answer: Option D
Solution:
The foundation for contemporary supply chain management systems
includes all of the following except B2B electronic storefronts.
44.
What is the unauthorized use, duplication, distribution
or sale of copyrighted software?
A. Fair Use Doctrine
B. Pirated software
C. Counterfeit software
D. Privacy
Answer & Solution
Answer: Option B
Solution:
Pirated software is the unauthorized use, duplication,
distribution or sale of copyrighted software. Software piracy is the illegal
copying, distribution, or use of software.
45.
The two main types of Internet-based B2B commerce
are_________.
A. Net marketplaces and private industrial networks
B. EDI and collaborative commerce
C. Net marketplaces and collaborative commerce
D. EDI and private industrial networks
Answer & Solution
Answer: Option D
Solution:
The two main types of Internet-based B2B commerce are EDI
and private industrial networks.
46.
What is a program, when installed on a computer, records
every keystroke and mouse click?
A. Key logger software
B. Hardware key logger
C. Cookie
D. Adware
Answer & Solution
Answer: Option A
Solution:
Key logger software is a program, when installed on a
computer, records every keystroke and mouse click. A keylogger can be either a
piece of software or a small hardware device that is used to capture the
keystrokes that are typed on the keyboard.
47.
The type of Net marketplace characterized by indirect
inputs and spot purchasing is called an _______.
A. industry consortium
B. independent exchange
C. e-distributor
D. e-procurement marketplace
Answer & Solution
Answer: Option C
Solution:
The type of Net marketplace characterized by indirect inputs
and spot purchasing is called an e-distributor. E-distribution is a type of
distribution that uses purely electronic media. It is often interpreted as the
buying or selling of services or goods over a public network without the
physical media; this is usually done by downloading from the Internet to the
consumer's electronic device.
48.
What is software you don't want hidden inside a software?
A. Adware
B. Trojan‐horse software
C. Spyware
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Adware, Trojan‐horse software and Spyware is software we
don't want hidden inside a software.
49.
The most common and easily understood type of Net marketplace
is ______.
A. e-procurement marketplace
B. e-distributors
C. industry consortia
D. independent exchanges
Answer & Solution
Answer: Option B
Solution:
The most common and easily understood type of Net
marketplace is e-distributors. is a type of distribution that uses purely
electronic media. It is often interpreted as the buying or selling of services
or goods over a public network without the physical media; this is usually done
by downloading from the Internet to the consumer's electronic device.
50.
What is an electronic representation of cash?
A. Digital cash
B. Electronic cash
C. E‐cash
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Digital cash, Electronic cash and E‐cash is an electronic
representation of cash.
51.
All of the following are objectives of private industrial
networks except ________.
A. developing efficient purchasing and selling business
processes industry-wide
B. operating on a local scale
C. creating increased supply chain visibility
D. reducing industry risk
Answer & Solution
Answer: Option B
Solution:
All of the following are objectives of private industrial
networks except operating on a local scale.
52.
What is a fully‐equipped computer that you wear as a
piece of clothing or attached to a piece of clothing similar to the way you
would carry your cell phone on your belt?
A. Wearable computer
B. GPS
C. Implant chip
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Wearable computer is a fully‐equipped computer that you wear
as a piece of clothing or attached to a piece of clothing similar to the way
you would carry your cell phone on your belt.
53.
Which of the following is not one of the benefits of
e-commerce to sellers?
A. E-commerce offers greater flexibility in meeting
customer needs
B. E-commerce is a powerful tool for customer relationship
building
C. E-commerce can help to reduce costs
D. E-commerce increases the net cost per contact
Answer & Solution
Answer: Option D
Solution:
E-commerce increases the net cost per contact is not one of
the benefits of e-commerce to sellers.
54.
What is a technology‐enabled microchip implanted into the
human body?
A. Wearable computer
B. GPS
C. Implant chip
D. None of the above
Answer & Solution
Answer: Option C
Solution:
Implant chip is a technology‐enabled microchip implanted
into the human body. A human microchip implant is typically an identifying
integrated circuit device or RFID transponder encased in silicate glass and
implanted in the body of a human being.
55.
The E-commerce domain that involves business activity
initiated by the consumer and targeted to businesses is known as ________.
A. Business to Business (B2B)
B. Consumer to Consumer (C2C)
C. Consumer to Business (C2B)
D. Business to Consumer (B2C)
Answer & Solution
Answer: Option C
Solution:
The E-commerce domain that involves business activity
initiated by the consumer and targeted to businesses is known as Consumer to
Business (C2B). Consumer-to-business (C2B) is a business model in which
consumers (individuals) create value and businesses consume that value.
56.
Which of the following is not a reason why digital cash
has turned out to be extremely difficult?
A. If your system crashes you lose your money
B. There is only one standard
C. Digital cash makes money laundering easy
D. Digital cash travels across the vast Internet and is
susceptible to begin stolen
Answer & Solution
Answer: Option B
Solution:
There is only one standard is not a reason why digital cash
has turned out to be extremely difficult.
57.
A _________ is a B2B trading network that links a
particular seller with its own trading partners.
A. bitstream
B. virtual network
C. web community
D. private trading network
Answer & Solution
Answer: Option D
Solution:
A private trading network is a B2B trading network that
links a particular seller with its own trading partners. Private
e-marketplaces, also known as private trading networks, are particularly well
suited for manufacturing organizations such as Cisco's that: Cisco's eHub
Initiative.
58.
Smart card is better protected than other cards using.
A. Encryption
B. Firewall
C. Hub
D. All the above
Answer & Solution
Answer: Option A
Solution:
Smart card is better protected than other cards using
Encryption. Encryption is the process of encoding a message or information in
such a way that only authorized parties can access it and those who are not
authorized cannot.
59.
The type of website that is designed to build customer
goodwill and to supplement other sales channels rather then sell the company's
products directly is known as a ______________ website.
A. marketing
B. click-and-mortar
C. customer service
D. corporate
Answer & Solution
Answer: Option D
Solution:
The type of website that is designed to build customer
goodwill and to supplement other sales channels rather then sell the company's
products directly is known as a corporate website. The purpose of these sites
is to provide information about the company and its products or services.
60.
Trust card is introduced by.
A. BSNL and itzcash
B. BSNL and oxicash
C. BSNL only
D. None
Answer & Solution
Answer: Option A
Solution:
Trust card is introduced by BSNL and itzcash. Trust Card is
a multipurpose prepaid payment card brought to you by BSNL in association with
ItzCash. With this card you can make payments for your BSNL Bills (Postpaid
bills & Prepaid top-ups), purchase BSNL Value Added Services viz.
61.
______________ marketing is the Internet version of
word-of-mouth marketing.
A. Visceral
B. Virile
C. Viral
D. Virtual
Answer & Solution
Answer: Option C
Solution:
Viral marketing is the Internet version of word-of-mouth
marketing. Viral Marketing is that which is able to generate interest and the
potential sale of a brand or product through messages that spread like a virus,
in other words, quickly, and from person to person. The idea is for it to be
the users themselves that choose to share the content.
62.
PaisaPay is offered only by.
A. Homeshop18.com
B. eBay.in
C. amazon.com
D. none
Answer & Solution
Answer: Option B
Solution:
PaisaPay is offered only by eBay.in. An eBay India owned,
safe & secured payment service; PaisaPay enables Buyers to pay for their
purchases using Credit Card, Debit Card, Online Bank Transfer or Cash on
Delivery.
63.
Why would a merchant want to customize products?
A. To charge a higher price
B. To decrease costs
C. It is required in EC
D. Customers will only accept customized products
Answer & Solution
Answer: Option A
Solution:
A merchant want to customize products because to charge a
higher price.
64.
The E‐payment mechanism widely used in B2B is.
A. Credit card
B. Debit card
C. Master card
D. E‐cheque
Answer & Solution
Answer: Option D
Solution:
The E‐payment mechanism widely used in B2B is E‐cheque. An
electronic version or representation of a paper cheque. The account holder
writes an e-check (or e-cheque) using a computer or other type of electronic
device and transmits the e-cheque to the payee electronically. Like paper
cheques, e-checks are signed by the payer and endorsed by the payee.
65.
A website offering content created by third party
transparently to customers is an example of ________.
A. Reintermediation
B. Syndication
C. Virtual Manufacturing
D. Build-to-order
Answer & Solution
Answer: Option B
Solution:
A website offering content created by third party
transparently to customers is an example of Syndication. a group of individuals
or organizations combined or making a joint effort to undertake some specific
duty or carry out specific transactions or negotiations.
66.
Which type of technology will increase portability and
mobility?
A. Implant chips
B. Micro‐payments
C. Internet phone calls
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Implant chips, Micro‐payments and Internet phone calls type
of technology will increase portability and mobility.
67.
Which of the following an accurate statement about internet
phone calls?
A. They are possible but not yet free
B. They are not possible
C. They are currently standard practice
D. None of the above is an accurate statement about
internet phone calls
Answer & Solution
Answer: Option A
Solution:
An accurate statement about internet phone calls is that
they are possible but not yet free.
68.
What are the most commonly used input devices today?
A. Keyboard
B. Mouse
C. All of the above
D. None of the above
Answer & Solution
Answer: Option C
Solution:
Keyboard and Mouse are the most commonly used input devices
today.
69.
Which of the following can be used to help identify
people in a crowd?
A. Biochip
B. Implant chip
C. Facial recognition software
D. Vision chip
Answer & Solution
Answer: Option C
Solution:
Facial recognition software can be used to help identify
people in a crowd. A facial recognition system is a technology capable of
identifying or verifying a person from a digital image or a video frame from a
video source.
70.
Which one is also known as plastic money?
A. Credit card
B. Debit card
C. Paper cash
D. All of the above
Answer & Solution
Answer: Option A
Solution:
Credit card is also known as plastic money. Credit Card is a
small plastic card that is issued by financial institutions such as banks. As
the name Credit when one buys using credit card, one is buying by taking loan.
Section – 5
1.
E‐cheques are …………
A. Prepaid
B. Postpaid
C. Both prepaid and postpaid
D. None of these
Answer & Solution
Answer: Option A
Solution:
E‐cheques are Prepaid. E-cheques are a mode of electronic
payments.
2.
Digital signature is a.
A. Digital id,send as an attachment to a web
page/e‐mail/message
B. Is used for verifying the attachments send using web
C. Both a and b
D. None of these
Answer & Solution
Answer: Option C
Solution:
Digital signature is a Digital id,send as an attachment to a
web page/e‐mail/message and it is used for verifying the attachments send using
web. A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software or digital document.
3.
Which one is the component of cybercash payment system?
A. CC user software
B. CC merachant software
C. CC Server Software
D. All of the above
Answer & Solution
Answer: Option D
Solution:
CC user software, CC merachant software and CC Server
Software are the component of cybercash payment system.
4.
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card
smart.
A. Memory
B. Microchip
C. E‐cash
D. None of the above
Answer & Solution
Answer: Option B
Solution:
The presence of Microchip make the smart card
smart.
5.
The smart card which use antenna for reading and writing
data.
A. Contact smart card
B. Contactless smart card
C. Proximity smart card
D. Both B and C
Answer & Solution
Answer: Option D
Solution:
The smart card which use antenna for reading and writing
data are Contactless smart card and Proximity smart card.
6.
‐‐‐‐‐‐‐‐‐ card is read only mode.
A. Contact smart card
B. Contactless smart card
C. Proximity smart card
D. Both B and C
Answer & Solution
Answer: Option C
Solution:
Proximity smart card is read only mode. A proximity
card or prox card is a "contactless" smart card which can be read
without inserting it into a reader device, as required by earlier magnetic
stripe cards such as credit cards and "contact" type smart cards.
7.
Which of the smart card uses a sim like structure for
reading and writing data?
A. Contact smart card
B. Contactless smart card
C. Proximity smart card
D. Both B and C
Answer & Solution
Answer: Option A
Solution:
Contact smart card uses a sim like structure for reading and
writing data. This type of smart card consists of electrical contacts which are
used to connect to the card reader where the card is inserted. The electrical
contacts are deployed on a conductive gold plated coating on the card surface.
8.
Which is not a feature of eCommerce?
A. SCM
B. EDI
C. WWW
D. BPR
Answer & Solution
Answer: Option D
Solution:
BPR is not a feature of eCommerce. Business process
re-engineering is a business management strategy, originally pioneered in the
early 1990s, focusing on the analysis and design of workflows and business
processes within an organization.
9.
What is I stands in CIA of smart card?
A. International
B. Integrity
C. Identity
D. None of the above
Answer & Solution
Answer: Option B
Solution:
I stands for Integrity in CIA of smart card. CIA stands for
confidentiality, integrity and availability, which are said to be the three
most important elements of reliable security.
10.
What is A stands in CIA of smart card?
A. auditing
B. authenticity
C. authorized
D. None of the above
Answer & Solution
Answer: Option B
Solution:
A stands for authenticity in CIA of smart card.
11.
What is C stands in CIA of smart card?
A. confidentiality
B. conference
C. congress
D. None of the above
Answer & Solution
Answer: Option A
Solution:
C stands for confidentiality in CIA of smart card.
12.
Which one is the third party payment providers who offer
digital wallets for E‐merchants?
A. Oxicash
B. PayMate
C. PayPass
D. All the above
Answer & Solution
Answer: Option D
Solution:
Oxicash, PayMate and PayPass is the third party payment
providers who offer digital wallets for E‐merchants.
13.
Which is used to identify mobile money?
A. MCID
B. MMID
C. RSID
D. NONE OF THE ABOVE
Answer & Solution
Answer: Option B
Solution:
MMID is used to identify mobile money. Mobile Money
Identifier (MMID) is a seven-digit number, issued by banks for effecting
financial transactions through the user's mobile phone.
14.
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer
assets.
A. Threat
B. Danger
C. Error
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Threat is an act that poses danger to computer assets.
15.
Which one is not a encryption technique?
A. RSA
B. DES
C. AES
D. NONE OF THE ABOVE
Answer & Solution
Answer: Option D
Solution:
RSA, DES and AES all are an encryption technique.
16.
Which one is not used as a security mechanism?
A. Encryption
B. Cryptography
C. Wallets
D. Digital signature
Answer & Solution
Answer: Option C
Solution:
Wallets is not used as a security mechanism. All the others
are used.
17.
Which e‐government arena is being used when governmental
agencies send out and accept bids for work?
A. G2G
B. G2B
C. G2C
D. G2G
Answer & Solution
Answer: Option B
Solution:
G2B e‐government arena is being used when governmental
agencies send out and accept bids for work. In this type of interaction,
e-Governance tools are used to help the business organizations that provide
goods and services to seamlessly interact with the government.
18.
Secret key is used for.
A. Public key cryptography
B. Private key cryptography
C. Asymmetric key cryptography
D. None of these
Answer & Solution
Answer: Option B
Solution:
Secret key is used for Private key cryptography. A private
key, also known as a secret key, is a variable in cryptography that is used
with an algorithm to encrypt and decrypt code. Secret keys are only shared with
the key's generator, making it highly secure. Private keys play an important
role in symmetric cryptography, asymmetric cryptography and cryptocurrencies.
19.
Which one is communication channel threat?
A. Sniffer programs
B. Cyber vandalism
C. Integrity threats
D. All of the above
Answer & Solution
Answer: Option D
Solution:
Sniffer programs, Cyber vandalism and Integrity threats are
communication channel threat.
20.
Which one is communication channel security protocol?
A. SSL
B. S‐HTTP
C. SET
D. ALL OF THE ABOVE
Answer & Solution
Answer: Option D
Solution:
SSL, S‐HTTP and SET are communication channel security
protocol.
21.
The protocol which allows the file transfer between
computers is.
A. TCP/IP
B. FTP
C. HTTP
D. SOA
Answer & Solution
Answer: Option B
Solution:
The protocol which allows the file transfer between
computers is FTP. The File Transfer Protocol (FTP) is a standard network
protocol used for the transfer of computer files between a client and server on
a computer network.
22.
E‐Banking is also known as.
A. ATMs
B. Net banking
C. Traditional banking
D. None of these
Answer & Solution
Answer: Option B
Solution:
E‐Banking is also known as Net banking. Electronic banking
has many names like e banking, virtual banking, online banking, or internet
banking. It is simply the use of electronic and telecommunications network for
delivering various banking products and services. Through e-banking, a customer
can access his account and conduct many transactions using his computer or
mobile phone. In this article, we will look at the importance and types of
e-banking services.
23.
__________ is backbone of all E‐payments in E‐commerce.
A. EFT
B. EPS
C. PayPal
D. None of these
Answer & Solution
Answer: Option B
Solution:
EPS is backbone of all E‐payments in E‐commerce. An
e-payment system is a way of making transactions or paying for goods and
services through an electronic medium, without the use of checks or cash. It’s
also called an electronic payment system or online payment system.
24.
Which one is a client level threat?
A. Malicious code
B. Viruses
C. Active contents
D. All the above
Answer & Solution
Answer: Option D
Solution:
Malicious code, Viruses and Active contents are client level
threat.
25.
Which one is not an encryption technique?
A. RSA
B. DES
C. AES
D. FTP
Answer & Solution
Answer: Option D
Solution:
FTP is not an encryption technique. The File Transfer Protocol
is a standard network protocol used for the transfer of computer files between
a client and server on a computer network.
26.
Which one is an encryption technique?
A. RSA
B. DES
C. AES
D. All of the above
Answer & Solution
Answer: Option D
Solution:
RSA, DES and AES are encryption technique.
27.
Which one is not a server level threat?
A. Malicious code
B. CGI threats
C. Database threats
D. Buffer overflows
Answer & Solution
Answer: Option A
Solution:
Malicious code is not a server level threat. Malicious code
is the term used to describe any code in any part of a software system or
script that is intended to cause undesired effects, security breaches or damage
to a system. Malicious code is an application security threat that cannot be
efficiently controlled by conventional antivirus software alone.
28.
Which one is not a physical threat?
A. Hacking
B. Storm
C. Phishing
D. None of the above
Answer & Solution
Answer: Option A
Solution:
Hacking is not a physical threat. Hacking generally refers
to unauthorized intrusion into a computer or a network.
29.
Which one is a physical threat?
A. Phishing
B. Storm
C. Earthquake
D. All the above
Answer & Solution
Answer: Option D
Solution:
Phishing, Storm and Earthquake all are physical threat.
30.
The basic elements of website is.
A. Home page
B. Web pages
C. Links and banners
D. All the above
Answer & Solution
Answer: Option D
Solution:
The basic elements of website is Home page, Web pages and
Links and banners.
31.
Which one is threat for E‐commerce?
A. Trojan horse
B. firewall
C. encryption
D. None
Answer & Solution
Answer: Option A
Solution:
Trojan horse is threat for E‐commerce. A Trojan horse or
Trojan is a type of malware that is often disguised as legitimate software.
Trojans can be employed by cyber-thieves and hackers trying to gain access to
users' systems. Users are typically tricked by some form of social engineering
into loading and executing Trojans on their systems.
32.
Secure communication means.
A. Protect transmission of credit card number
B. Guarantee privacy of customer
C. Unauthorized access of payment details
D. All the above
Answer & Solution
Answer: Option D
Solution:
Secure communication means Protect transmission of credit
card number, Guarantee privacy of customer and Unauthorized access of payment
details.
33.
Which one is not an offline payment mode?
A. Cash on delivery
B. Cash before delivery
C. Demand drafts
D. e‐cheque
Answer & Solution
Answer: Option D
Solution:
E‐cheque is not an offline payment mode. An eCheque is a
payment that you make directly from your bank account. You can only send an
eCheque if your bank account is the only payment method attached to your bank
account, and you don't have a credit or debit card as a back-up payment method.
34.
Which one is an offline payment mode?
A. Cash on delivery
B. Cash before delivery
C. Credit card
D. Both a and b
Answer & Solution
Answer: Option D
Solution:
Both Cash on delivery and Cash before delivery are offline
payment mode.
35.
Which one is not an online payment mode?
A. Cash on delivery
B. Debit card
C. Credit card
D. e‐cheque
Answer & Solution
Answer: Option A
Solution:
Cash on delivery is not an online payment mode. It is an
offline payment mode.
36.
which one is not an E‐payment method used in India?
A. Debit card
B. Credit card
C. e‐cheque
D. none
Answer & Solution
Answer: Option D
Solution:
Debit card, Credit card and e‐cheque all are E‐payment
method used in India.
37.
OTP stands for.
A. One Time Password
B. On Time processing
C. One time processor
D. None
Answer & Solution
Answer: Option A
Solution:
A one-time password (OTP), also known as one-time pin or
dynamic password, is a password that is valid for only one login session or
transaction, on a computer system or other digital device.
38.
Which one is not a threat for E‐commerce?
A. Trojan horse
B. Viruses
C. Worm
D. None
Answer & Solution
Answer: Option D
Solution:
Trojan horse, Viruses and Worm all are threat for
E‐commerce.
39.
Private Key cryptography is also known as __________
cryptography.
A. Public key
B. Symmetric
C. Asymmetric
D. None
Answer & Solution
Answer: Option B
Solution:
Private Key cryptography is also known as Symmetric
cryptography. A private key is a tiny bit of code that is paired with a public
key to set off algorithms for text encryption and decryption. It is created as
part of public key cryptography during asymmetric-key encryption and used to
decrypt and transform a message to a readable format.
40.
Public key cryptography is also known as _________
cryptography.
A. Private key
B. Symmetric
C. Asymmetric
D. None
Answer & Solution
Answer: Option C
Solution:
Public key cryptography is also known as Asymmetric
cryptography. Asymmetric cryptography, also known as public key cryptography,
uses public and private keys to encrypt and decrypt data. The keys are simply
large numbers that have been paired together but are not identical
(asymmetric). One key in the pair can be shared with everyone; it is called the
public key
41.
What is an arrangement made between e‐commerce sites that
direct users from one site to the other?
A. Spam
B. Viral marketing
C. Affiliate programs
D. None of the above
Answer & Solution
Answer: Option C
Solution:
Affiliate programs is an arrangement made between e‐commerce
sites that direct users from one site to the other.
42.
Which one is not layer of E‐commerce infrastructure?
A. Physical layer
B. Product layer
C. Service layer
D. None
Answer & Solution
Answer: Option D
Solution:
Physical layer, Product layer and Service layer all are
layer of E‐commerce infrastructure.
43.
Which will harm computer resources
A. Worm
B. Virus
C. Trojan horse
D. All the above
Answer & Solution
Answer: Option D
Solution:
Worm, Virus and Trojan horse will harm computer resources.
44.
The study of encryption is called ___________.
A. Decryption
B. Cryptography
C. Firewall
D. All the above
Answer & Solution
Answer: Option B
Solution:
The study of encryption is called Cryptography. Cryptography
is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa.
45.
During E‐commerce transaction we should ensure
___________.
A. Integrity
B. Security
C. Confidentiality
D. All the above
Answer & Solution
Answer: Option D
Solution:
During E‐commerce transaction we should ensure Integrity,
Security and Confidentiality.
46.
The virus that are commonly found in word documents are
called __________.
A. Macro
B. Trojan horse
C. Script virus
D. None of the above
Answer & Solution
Answer: Option A
Solution:
The virus that are commonly found in word documents are
called Macro. A macro virus is a computer virus written in the same macro
language used for software programs, including Microsoft Excel or word
processors such as Microsoft Word.
47.
The virus that are attached with vb and java files are
called.
A. Macro
B. Trojan horse
C. Script virus
D. None of the above
Answer & Solution
Answer: Option C
Solution:
The virus that are attached with vb and java files are
called Script virus. A Script Virus is spread via webpages and has several
properties such as being easy to program, malicious, and highly infectious.
Even if you are a rookie programmer you can create a new type of Script Virus
in a short time.
48.
The viruses spreads through __________.
A. Mails
B. Pen drives and cds
C. Websites
D. All the above
Answer & Solution
Answer: Option D
Solution:
The viruses spreads through Mails, Pen drives and cds and
Websites.
120 Questions E-Commerce from 1st link
MCQ SET -1
1) World Wide Web (WWW) was introduced in the year ……………………
(a) 1994
(b) 1996
(c) 1992
(d) 1990
Click Here for Answer Answer - (a)
2) ……………….is an early form of E-commerce
(a) SCM
(b) EDI
(c) Both of these
(d) None of these
Click Here for Answer Answer - (b)
3) ………………..is concerned
with the buying and selling information, products and services over computer
communication networks
(a) Commerce
(b) E-Commerce
(c) E-Business
(d) None of these
Click Here for Answer Answer - (b)
4) ………………..is a set of
standards developed in the 1960s to exchange business information and to do
electronic transactions
(a) EDI
(b) Protocols
(c) TCP/IP
(d) None of these
Click Here for Answer Answer - (a)
5) Which among the
following product is suitable for E-Commerce ?
(a) Books
(b) Vegetables
(c) All of these
(d) None of these
Click Here for Answer Answer - (a)
6) ……………allows a business
application on the computer of one organization to communicate directly with
the business application on the computer of another company.
(a) EDI
(b) Protocols
(c) Standards
(d) Business applications
Click Here for Answer Answer - (a)
7) Electronic Exchange of
business documents in a standard format is known as ………………
(a) E-commerce
(b) E-Business
(c) EDI
(d) None of these
Click Here for Answer Answer - (c)
8) ………………. is essentially
a business process that connects manufacturers, retailers, customers and suppliers
in the form of a chain to develop and deliver products.
(a) E-commerce
(b) EDI
(c) Networking
(d) SCM
Click Here for
Answer Answer - (d)
9) Which of the following
is not a party of SCM ?
(a) Suppliers
(b) Manufacturers
(c) Distributors
(d) Customers
Click Here for Answer Answer - (c)
10) ………………is a commercial
process that includes production, distribution, sales or delivery of goods and
services through electronic means
(a) E-commerce
(b) SCM
(c) EDI
(d) None of these
Click Here for Answer Answer - (a)
MCQ SET -2
1. Among the alternate models of B2B e-commerce,……is the best
means to obtain a competitive advantage in the Market place.
(a) Process based
(b) strategic relationship
based
(c) transaction based
(d) any of these
Click Here for Answer Answer - (b)
2 ……………..focus on
producing a highly integrated value proposition through a managed process.
(a) hubs
(b) community
(c) contents
(d) none of these
Click Here for Answer Answer - (a)
3 …………………is basically a
concept of online marketing and distributing of products and services over the
internet
(a) B2G
(b) B2E
(c) B2C
(d) B2B
Click Here for Answer
Answer - (c)
4 ……………………..e-commerce
consists of the sale of products or services from a business to the general
public
(a) B2G
(b) B2E
(c) B2B
(d) B2C
Click Here for Answer Answer - (d)
5. Which of the following
is not suitable for a B2C transaction ?
(a) clothes
(b) flowers
(c) airline reservation
(d) none
Click Here for Answer Answer - (d)
6 ……………..e-commerce
transaction has the advantage of eliminating middlemen.
(a) B2G
(b) B2C
(c) B2B
(d) B2E
Click Here for Answer Answer - (b)
7………………….e-commerce
involves customers gathering information, purchasing and receiving products
over an electronic network
(a) B2G
(b) B2E
(c) B2B
(d) B2C
Click Here for Answer Answer - (d)
8. Which among the
following is not an user of B2C e-commerce ?
(a) manufacturers
(b) distributors
(c) Publishers
(d) none
Click Here for Answer Answer - (d)
9 ………………….e-commerce
involves the electronic facilitation of transaction between customers through
some third party.
(a) C2C
(b) B2E
(c) B2B
(d) B2G
Click Here for Answer Answer - (a)
10. Which among the
following is an example of C2C ?
(a) e-Bay
(b) Amazon.com
(c) Rentalic.com
(d) all of these
Click Here for Answer Answer - (d)
MCQ SET -3
1 …………………is a class of advertising methods which are considered
unethical and may even be illegal
(a) Advertorials
(b) pop-up ads
(c) Spam e-mail
(d) malware
Click Here for Answer Answer - (d)
2 ……………….is the most
common way for purchasing an online advertising
(a) CPM
(b) CPC
(c) Any of these
(d) none of these
Click Here for Answer Answer - (c)
3 ………………are animated full
screen ads placed at the entry of a site before a user reaches the intended
content.
(a) pop-up ads
(b) Intromercials
(c) Spam e-mail
(d) malware
Click Here for Answer Answer - (b)
4 ………………….are interactive
online ads that require the user to respond intermittently in order to wade
through the message before reaching the intended content.
(a) Ultramercials
(b) pop-up ads
(c) Spam e-mail
(d) malware
Click Here for Answer Answer - (a)
5 ……………facilitates
transactions between buyer and sellers by providing comprehensive information
and ancillary services, without being involved in the actual exchange of goods
and services between the parties.
(a) Metamediary
(b) Intermediary
(c) middlemen
(d) all of these
Click Here for Answer Answer - (a)
6 ………………is any
transaction, involving the transfer or rights to use goods and services, which
is initiated and or completed by using mobile access to computer mediated
networks with the help of an electronic device.
(a) Mobile Commerce
(b) e-commerce
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
7 …………….provide security
and privacy for the use of the web page content
(a) HTTP
(b) html
(c) FTP
(d) none of these
Click Here for Answer Answer - (a)
8 …………………….website is one
that changes or customizes itself frequently and automatically based on certain
criteria
(a) Dynamic website
(b) Static Website
(c) phish site
(d) none of these
Click Here for Answer Answer - (a)
9 ………………site is created to
fraudulently acquire sensitive information such as pass words and credit card
details, by masquerading as a trustworthy person or business.
(a) Dynamic website
(b) Static Website
(c) phish site
(d) none of these
Click Here for Answer Answer - (c)
10 ……………….in the
e-commerce may be a holder of a payment card such as credit card or debit card
from an issuer
(a) customer
(b) issuer
(c) Merchant
(d) Acquirer
Click Here for Answer Answer – (a)
MCQ SET -4
1. Companies use………………………networks to automate employee related
corporate processes.
(a) B2G
(b) B2E
(c) B2B
(d) P2P
Click Here for Answer
Answer - (b)
2. Which among the following is not a B2E application
(a) Online Insurance policy management
(b) Online supply requests
(c) Special employee offers
(d) Locate application and tax
forms
Click Here for Answer
Answer - (d)
3 ……………………..streamlines the flow of information and self service
capabilities through automation
(a) SCC
(b) CRM
(c) CRP
(d) SCM
Click Here for Answer
Answer - (a)
4 ………………is a global web in which millions of users are
communicating with each other with the help of computers.
(a) Internet
(b) WWW
(c) both of these
(d) None of these
Click Here for Answer
Answer - (a)
5 …………………is an application layer protocol for distributed,
collaborative, hypermedia information systems.
(a) html
(b) HTTP
(c) Bothe of these
(d) None of these
Click Here for Answer
Answer - (a)
6. English physicist Tim Berner’s Lee was famous for the
establishment of …………………..in 1990.
(a) internet
(b) WWW
(c) Intranet
(d) none of these
Click Here for Answer
Answer - (b)
7 ………refers to a kind of e-commerce which refers to a company
selling or buying from other company
( a) B2G
(b) B2E
(c) B2B
(d) P2P
Click Here for Answer
Answer - (c)
8. Which of the following is not an example for B2B e-commerce ?
(a) Sending and receiving
orders
(b) Invoice and shopping
(c) all of these
(d) none of these
Click Here for Answer
Answer - (d)
9. A company that manufacturers bicycles may use the internet to
purchase tyres from their suppliers. This is an example
of-----------transaction.
(a) B2G
(b) B2E
(c) B2B
(d) P2P
Click Here for Answer
Answer - (c)
10 …………..sites act as an intermediary between someone wanting a
product or service and potential providers
(a) brokering sites
(b) Information sites
(c) industry portals
(d) none of these
Click Here for Answer Answer - (a)
SET -5
1. A ………………is an electronic file that uniquely identifies
individuals and websites on the internet and enables secure confidential
communications
(a) Digital signature
(b) Digital certificates
(c) SSL
(d) none of these
Click Here for Answer Answer - (b)
2. The information
Technology Act [IT ACT] came into effect on
(a) 16th November 2000
(b) 15th December 2000
(c) 17th October 2000
(d) none of these
Click Here for Answer Answer - (c)
3. Information sent over
the Internet commonly uses the set of rules called……………………
(a) TCP/IP
(b) FTP
(c) HTTP
(d) gopher
Click Here for Answer Answer - (a)
4 ……………………….is a person
who breaks in or trespasses a computer system
(a) Hacker
(b) Snooper
(c) operator
(d) spoofer
Click Here for Answer Answer - (a)
5. E-mail which contain
useless material is termed as……………
(a) Spam
(b) useless mail
(c) trunk mail
(d) Junk mail
Click Here for Answer Answer - (d)
6. India has enacted the
first IT Act in the year……………………
(a) 2001
(b) 2002
(c) 2009
(d) 2000
Click Here for Answer Answer - (d)
7. Which of the following
crimes were not covered under IT (Amendment) Act, 2008 ?
(a) Cyber terrorism
(b) Child pornography
(c) Video voyeurism
(d) None of these
Click Here for Answer Answer - (d)
8. Trade mark, copyright,
patent law etc comes under the purview of……………………
(a) Data protection
(b) Telecommunication laws
(c) Intellectual property laws
(d) None
Click Here for Answer Answer - (c)
9 ……………….is a programme
designed o replicate and spread generally with the victim being oblivious to
its existence
(a) hacker
(b) software
(c) Computer virus
(d) none of these
Click Here for Answer Answer - (c)
10. Which one of the
following is not a principle of e-commerce ?
(a) privacy
(b) integrity
(c) authentication
(d) none of these
Click Here for Answer Answer - (d)
----------------------------------------------------------------------------------------------------
SET 6
1. A……………portal is a specialized entry point to a specific market
place or industry niche.
(a) Vertical portal
(b) horizontal portal
(c) both of these
(d) none of these
Click Here for Answer
Answer - (a)
2 ………………..are general
interest portals covering a wide range of topics and features
(a) Vertical portal
(b) horizontal portal
(c) both of these
(d) none of these
Click Here for
Answer Answer - (b)
3. Which among the
following is an example for vertical portal ?
(a) i-village
(b) Yahoo
(c) Google
(d) Net scape
Click Here for Answer
Answer - (a)
4. A portal that helps to
establish relations and to conduct transactions between various organizations
is termed as………………
(a) B2B portals
(b) C2C portals
(c) both of these
(d) none of these
Click Here for Answer
Answer - (a)
5. A …………………….is a
software that scours the internet collecting data about every website and every
webpage within it
(a) spiders
(b) Search Engines
(c) robots
(d) none of these
Click Here for
Answer Answer - (b)
6. Search Engines
databases are selected and built by computer robot programs called………………
(a) spiders
(b) Search Engines
(c) robots
(d) none of these
Click Here for Answer
Answer - (a)
7. Which among the
following is not an example for Search engine ?
(a) Google
(b) MSN
(c) Alta vista
(d) none of these
Click Here for Answer Answer - (d)
8. Web pages are prepared
using their language as…………………
(a) html
(b) FTP
(c) HTTP
(d) None of these
Click Here for Answer Answer - (a)
9. A web page is
transferred to users computer through ……………………..
(a) html
(b) FTP
(c) HTTP
(d) None of these
Click Here for Answer Answer - (c)
10. The user reaches this
page when they specify the address of a website
(a) Home page
(b) Web page
(c) Summary page
(d) None of these
Click Here for Answer Answer - (a)
set 7
1 ……………..is a card with a microchip that can be used instead of
cash and coins for everything from vending machines to public transportation.
(a) Debit Card
(b) credit card
(c) Electronic purse
(d) any of these
Click Here for Answer Answer - (c)
2 ………………is basically a
secure gate between our organization data and internet.
(a) Network firewall
(b) Antivirus
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
3 ……………………encrypts payment
card transaction data and verifies that both parties in the transaction are
genuine.
(a) SSL
(b) SET
(c) both of these
(d) none of these
Click Here for Answer Answer - (b)
4 ………………is automated
methods of recognizing a person based on a physiological or behavioral
characteristic.
(a) Biometrics
(b) PIN
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
5. In
Biometrics,…………………………ID system is designed to prevent more than one person from
using a single identity
(a) Positive ID system
(b) Negative ID system
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
6. In
Biometrics,…………………………ID system is designed to prevent one person from using
more than one identity
(a) Positive ID system
(b) Negative ID system
(c) both of these
(d) none of these
Click Here for Answer Answer - (b)
7 …………………..are program
developed by some dishonest people to destroy the computer system and the
valuable information in it.
(a) Network firewall
(b) computer virus
(c) both of these
(d) none of these
Click Here for Answer Answer - (b)
8. Which among the
following is not an example for computer virus ?
(a) Chernobyl
(b) Melissa
(c) I Love You
(d) None of these
Click Here for Answer Answer - (d)
9 ……………………are special type
of software meant for limiting the risks of being hit by computer viruses
(a) Network firewall
(b) Antivirus
(c) both of these
(d) none of these
Click Here for Answer Answer - (b)
10. A……………….is a person
who gains unauthorized access to a computer network for profit, criminal
mischief or personal pleasure.
(a) Hacker
(b) spoofer
(c) operator
(d) none of these
Click Here for Answer Answer - (a)
set 8
1. The purpose of ………………page is to provide links to other pages
(a) Home page
(b) Web page
(c) Summary page
(d) None of these
Click Here for Answer Answer - (a)
2 ……………is an example for a
software that visits suggested pages and return the appropriate information to
be indexed by the search Engine
(a) Robot
(b) Spiders
(c) Ants
(d) All
Click Here for Answer Answer - (d)
3 ……………………..ads appears as
rectangular graphics near the top of the page
(a) Banner ads
(b) floating ads
(c) interstitials
(d) Unicast ads
Click Here for Answer Answer - (a)
4 ………………….ads take up the
entire screen and are more powerful than banner ads.
(a) Banner ads
(b) floating ads
(c) interstitials
(d) Unicast ads
Click Here for Answer Answer - (b)
5 ………………………….is a form of
advertisement on the web that appears between web pages that the user requests.
(a) Banner ads
(b) floating ads
(c) interstitials
(d) Unicast ads
Click Here for Answer Answer - (c)
6 ……………………is basically a
TV commercial that runs in the browser window.
(a) Banner ads
(b) floating ads
(c) interstitials
(d) Unicast ads
Click Here for Answer Answer - (d)
7. Advertisements take the
form of a website copy are called…………………
(a) Advertorials
(b) pop-up ads
(c) Spam e-mail
(d) none of these
Click Here for Answer Answer - (a)
8 ………………..is the most
unwanted of online advertising methods.
(a) Advertorials
(b) pop-up ads
(c) Spam e-mail
(d) none of these
Click Here for Answer Answer - (b)
9 …………………..is an
unsolicited e-mail sent to every e-mail address that a business can find
(a) Advertorials
(b) pop-up ads
(c) Spam e-mail
(d) none of these
Click Here for Answer Answer - (c)
10 …………………..is the buying
and selling of goods and services through wireless handled devices such as
cellular phone and Personal Digital Assistants
(a) Mobile Commerce
(b) e-commerce
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
SET 9
1.……………….is the exchange of goods or items or commodities and
services or applications used for money and deals the money matters
(a) E-commerce
(b) Commerce
(c) Both of these
(d) none
Click Here for Answer Answer - (b)
2. …………….is an approach to
deliver information differentiated business values called services by combining
the system and process generally called resources
(a) E-business
(b) E-commerce
(c) any of these
(d) none
Click Here for Answer Answer - (a)
3. ……………….always operate
on intranet
(a) E--commerce
(b) E-Business
(c) EDI
(d) None of these
Click Here for
Answer Answer - (b)
4. Which among the following is not an
example for E-commerce
(a) Amazon.com
(b) Baazar.com
(c) E-trade.com
(d) None of these
Click Here for Answer Answer - (c)
5. ……………….and ………………… were
the enabling technologies that laid the ground work for E-commerce
(a) SET and SCL
(b) SCM and ERP
(c) EDI and EFT
(d) None of these
Click Here for Answer Answer - (c)
6. ………………were the first to
establish prominent E-commerce Brands
(a) Baazar.com
(b) E-bay and Amazon
(c) E-trade.com
(d) none of these
Click Here for Answer Answer - (b)
7. …………….is a systems
approach to Managing the entire flow of information, materials, and services
from raw material suppliers through factories and warehouses to the end
customer.
(a) CRM
(b) SRM
(c) EDI
(d) SCM
Click Here for Answer Answer - (d)
8. …………….is a form of
supply chain where a series of assembly operations are carried out to obtain
the final product
(a) Converging supply chain
(b) Diverging supply chain
(c) Any of these
(d) None
Click Here for Answer Answer - (a)
9.…………………is a form of
supply chain where a wide variety of finished goods are produced with limited
number of raw material or components.
(a) Converging structure
(b) Diverging structure
(c) Any of these
(d) None
Click Here for Answer Answer - (b)
10……………………is the exchange
of services, information or product from one business to a government agency
(a) B2G
(b) B2E
(c) B2B
(d) P2P
Click Here for Answer Answer - (c)
SET 10
1 ……………….acts like a gate keeper that examines each users
identification before allowing them to enter to the organization’s internal
networks.
(a) Network firewall
(b) Antivirus
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
2 …………..Prevents
unauthorized communication into and out of the network, allowing the organization
to enforce a security policy on traffic between its network and the internet.
(a) Network firewall
(b) Antivirus
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
3. SET means ………………
(a) Standard Electronic Technology
(b) Standard Electronic
Transfer
(c) Secure Electronic Transaction
(d) None of these
Click Here for Answer Answer - (c)
4. The verification of
credit card is done by using…………….. with a communications link to the merchants
acquiring bank
(a) Credit card payment terminal
(b) Point of Sale
(c) All of these
(d) none of these
Click Here for Answer Answer - (c)
5. Creating illegitimate
sites that appear to be published by established organizations by unscrupulous
artists is termed as…………………
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) None of these
Click Here for Answer Answer - (a)
6. Gain entry into the
user’s system and scan your file system for personal information is known
as……………….
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) None of these
Click Here for
Answer Answer - (b)
7 ………………attacks are
difficult and are only successful if the attacker knows something about the
shopper
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) Guessing passwords
Click Here for
Answer Answer - (d)
8 …………………is the process of making
information unintelligible to the unauthorized user.
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) Cryptography
Click Here for Answer Answer - (d)
9 ………………….is the reverse
process of encryption, to make the information readable once again
(a) Spoofing
(b) Decryption
(c) Sniffing
(d) Cryptography
Click Here for
Answer Answer - (b)
10. A………………….provides a
way to associate the message with the sender and is the equivalent of an
ordinary signature.
(a) cyber signature
(b) Digital signature
(c) SSL
(d) none of these
Click Here for Answer Answer - (b)
SET 11
. Peer to Peer [P2P] is also used to describe ………………………
(a) C2C
(b) B2E
(c) B2B
(d) B2C
Click Here for Answer
Answer - (a)
2 …………………….is an online auctioning site that facilitates the trade
of privately owned items between individuals.
(a) e-Bay
(b) Amazon.com
(c) Rentalic.com
(d) all of these
Click Here for Answer
Answer - (a)
3. Monster.com is an example of ……………………..website
(a) C2C
(b) B2E
(c) B2B
(d) B2C
Click Here for Answer
Answer - (a)
4 ………………….is an internet network that allows users with the same
network in software to connect to each other’s hard disks and exchange files
(a) B2C
(b) B2E
(c) B2B
(d) P2P
Click Here for Answer
Answer - (d)
5. This is a protocol which allows files to be transferred from
one computer to another computer
(a) TCP/IP
(b) FTP
(c) HTTP
(d) none of these
Click Here for Answer
Answer - (b)
6. A ……………….is a document, typically written in plain text
interspersed with formatting instructions of html
(a) Web page
(b) home page
(c) domain
(d) none of these
Click Here for Answer
Answer - (a)
7 ………………….is the first page of a web site.
(a) Web page
(b) home page
(c) domain
(d) none of these
Click Here for Answer
Answer - (b)
8 ……………..allows the person to type ion just the main word or words
and the site will come in
(a) Web page
(b) home page
(c) domain
(d) none of these
Click Here for Answer
Answer - (c)
9. ”Google” is one of the most popular………………..
(a) Portal
(b) Browser
(c) Search Engine
(d) none of these
Click Here for Answer
Answer - (c)
10. A ………………….. presents information from diverse sources in a
unified way in a web site.
(a) Web portal
(b) Link page
(c) Both of these
(d) none of these
Click Here for Answer Answer - (c)
MCQ SET -12
1 ……………….is a financial institution that establishes an account
with a merchant and processes payment card authorization and payments
(a) customer
(b) issuer
(c) Merchant
(d) Acquirer
Click Here for Answer Answer - (d)
2. In …………………..type of
payment system customer is allowed to spend only up to the amount that have pre
deposited into account.
(a) Prepaid
(b) Post paid
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
3 ………………type of payment
system is highly useful to those customers who would like to control overspending,
(a) Prepaid
(b) Post paid
(c) both of these
(d) none of these
Click Here for
Answer Answer - (a)
4 ……………………….credit card gives all the
advantages of a normal credit card without worrying about the interest charges
(a) Prepaid
(b) Post paid
(c) both of these
(d) none of these
Click Here for Answer Answer - (a)
5 ……………………facility helps
the customer to pay only a small amount of the total outstanding and revolve
the rest of the payment to the next month.
(a) Cash advance
(b) Revolver
(c) Tele draft
(d) None of these
Click Here for Answer Answer - (b)
6 …………………..is the system
of purchasing cash credits in relatively small amounts, storing the credits in
our computer, and then spending them, when making electronic purchases over the
internet.
(a) E-cash
(b) Digicash
(c) Cyber cash
(d) any of these
Click Here for Answer Answer - (d)
7 ………………….is a financial
instrument which can be used more than once to borrow money or buy products and
services on credit.
(a) Credit card
(b) E-Cheques
(c) E-cash
(d) none of these
Click Here for Answer Answer - (a)
8. To accept a credit card
for payment, we have to open a …………………account with our bank
(a) Savings Bank
(b) Current account
(c) Merchant account
(d) any of these
Click Here for Answer
Answer - (c)
9. A……………………..is a device
that includes an embedded integrated circuit Chip [ICC] that can be either a
secure micro controller or equivalent intelligence with internal memory or a
memory chip alone.
(a) smart Cards
(b) E-Cheques
(c) E-cash
(d) none of these
Click Here for
Answer Answer - (a)
10 ………………..is a kind of payment card
that transfers fund directly from the consumer’s bank account to the merchants
account
(a) Debit Card
(b) Electronic purse
(c) credit card
(d) any of these
Click Here for Answer Answer - (a)
-----------------------------------------------------------------------------------------------------------
I’m going to read this. I’ll be sure to come back. thanks for sharing. and also This article gives the light in which we can observe the reality. this is very nice one and gives indepth information. thanks for this nice article... suncoast 48re rebuild kit
ReplyDeleteReally a great addition. I have read this marvelous post. Thanks for sharing information about it. I really like that. Thanks so lot for your convene. Paginas web Aguascalientes
ReplyDelete