E-Commerce MCQs

ExamVeda

eCommerce MCQ Questions and Solutions with Explanations | Commerce

SECTION - 1

1.

The dimension of e-commerce that enables commerce across national boundaries is called _______.

A. interactivity    

B. global reach

C. richness

D. ubiquity

Answer & Solution

Answer: Option B

Solution:

The dimension of e-commerce that enables commerce across national boundaries is called global reach. Global Reach refers to a business initiative to increase the access between a company and their current and potential customers through the use of the Internet.

2.

Which of the following describes e‐commerce?

A. Doing business electronically

B. Doing business

C. Sale of goods

D. All of the above

Answer & Solution

Answer: Option A

Solution:

Doing business electronically describes e‐commerce. E-commerce (EC), an abbreviation for electronic commerce, is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.

3.

Which one of the following is not one of the major types of e-commerce?

A. C2B

B. B2C

C. B2B

D. C2C

Answer & Solution

Answer: Option A

Solution:

C2B is not one of the major types of e-commerce. The C2B, or consumer-to-business model, is when customers offer products or services to businesses.

4.

Which of the following is part of the four main types for e‐commerce?

A. B2B

B. B2C

C. C2B

D. All of the above

Answer & Solution

Answer: Option D

Solution:

B2B, B2C and C2B is part of the four main types for e‐commerce.

5.

Which of the following is not considered to be one of the three phases of e-commerce?

A. Innovation

B. Consolidation    

C. Preservation

D. Reinvention

Answer & Solution

Answer: Option C

Solution:

Preservation is not considered to be one of the three phases of e-commerce. The act of keeping something the same or of preventing it from being damaged is basically preservation.

6.

Which segment do eBay, Amazon.com belong?

A. B2Bs

B. B2Cs

C. C2Bs

D. C2Cs

Answer & Solution

Answer: Option B

Solution:

eBay, Amazon.com belong to B2Cs segments. The term business-to-consumer (B2C) refers to the process of selling products and services directly between consumers who are the end-users of its products or services.

7.

The idealistic market envisioned at the outset of the development of e-commerce is called a ______.

A. Bailey market

B. Baxter market

C. Bergman market

D. Bertrand market

Answer & Solution

Answer: Option D

Solution:

The idealistic market envisioned at the outset of the development of e-commerce is called a Bertrand market.

8.

Which type of e‐commerce focuses on consumers dealing with each other?

A. B2B

B. B2C

C. C2B

D. C2C

Answer & Solution

Answer: Option D

Solution:

C2C type of e‐commerce focuses on consumers dealing with each other. Consumer to consumer, or C2C, is the business model that facilitates commerce between private individuals. Whether it's for goods or services, this category of e-commerce connects people to do business with one another.

9.

The primary source of financing during the early years of e-commerce was _______.

A. bank loans

B. large retail firms

C. venture capital funds

D. initial public offerings

Answer & Solution

Answer: Option C

Solution:

The primary source of financing during the early years of e-commerce was venture capital funds. Venture Capital is money invested in businesses that are small; or exist only as an initiative, but have huge potential to grow. The people who invest this money are called venture capitalists (VCs). The venture capital investment is made when a venture capitalist buys shares of such a company and becomes a financial partner in the business.

10.

Which segment is eBay an example?

A. B2B

B. C2B

C. C2C

D. None of the above

Answer & Solution

Answer: Option D

Solution:

Ebay Stores allows you to set up an online store that sells products at a set price, instead of allowing people to bid in auction format. This business model is preferred by many eBay entrepreneurs because they can determine how much profit each product they sell will make.

11.

All of the following are technologies used to gather information about you online except ______.

A. spy ware

B. cookies

C. Gmail

D. anonymizers

Answer & Solution

Answer: Option D

Solution:

All of the following are technologies used to gather information about you online except anonymizers. An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet.

12.

In which website Global Easy Buy is facilitated?

A. Ebay.com

B. Amazon.com

C. Yepme.com

D. None of these

Answer & Solution

Answer: Option A

Solution:

In Ebay.com Global Easy Buy is facilitated.

13.

A _________ is the set of planned activities designed to result in a profit in a marketplace.

A. business model

B. profit model

C. business plan

D. revenue model

Answer & Solution

Answer: Option A

Solution:

A business model is the set of planned activities designed to result in a profit in a marketplace.

14.

The best products to sell in B2C e‐commerce are:

A. Small products

B. Digital products

C. Specialty products

D. Fresh products

Answer & Solution

Answer: Option B

Solution:

The best products to sell in B2C e‐commerce are Digital products. A digital product is an intangible asset or piece of media that can be sold and distributed repeatedly online without the need to replenish inventory.

15.

Which of the following is not a key element of a business model?

A. value proposition

B. competitive advantage

C. market strategy

D. universal standards

Answer & Solution

Answer: Option D

Solution:

Universal standards is not a key element of a business model.
8 Key Elements of a business model and types of E commerce Business models are
1) Value Proposition.
2) Revenue Model.
3) Market Opportunity.
4) Competitive Environment.
5) Competitive Advantage.
6) Market Strategy.
7) Organizational Development.
8) Management Team.

16.

Which products are people most likely to be more uncomfortable buying on the Internet?

A. Books

B. Furniture

C. Movies

D. All of the above  

Answer & Solution

Answer: Option B

Solution:

The products that people are most likely to be more uncomfortable buying on the Internet are Furniture among the given options.

17.

The source of revenue in a subscription revenue model is __________.

A. Fees from advertisers in exchange for advertisements

B. Fees for business referrals

C. Fees from subscribers in exchange for access to content or services

D. Fees for enabling or execution a transaction

Answer & Solution

Answer: Option C

Solution:

The source of revenue in a subscription revenue model is Fees from subscribers in exchange for access to content or services. The subscription business model is a business model in which a customer must pay a recurring price at regular intervals for access to a product or service.

18.

Which products are people most likely to be comfortable buying on the Internet?

A. Books

B. PCs

C. CDs

D. All of the above

Answer & Solution

Answer: Option D

Solution:

The products that people are most likely to be more uncomfortable buying on the Internet are Books, PCs and CDs.

19.

Which of the following is an example of a portal?

A. Amazon

B. eBay

C. Yahoo

D. Face book

Answer & Solution

Answer: Option C

Solution:

Yahoo is an example of a portal. Yahoo! is an Internet portal that incorporates a search engine and a directory of World Wide Web sites organized in a hierarchy of topic categories.

20.

Digital products are best suited for B2C e‐commerce because they:

A. Are commodity like products

B. Can be mass‐customized and personalized

C. Can be delivered at the time of purchase

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Digital products are best suited for B2C e‐commerce because they are commodity like products, can be mass‐customized and personalized and can be delivered at the time of purchase.

21.

All of the following are major B2C business models except ______.

A. content provider

B. industry consortium    

C. transaction broker

D. service provider

Answer & Solution

Answer: Option B

Solution:

All of the following are major B2C business models except industry consortium. An industry consortium is a group that involves representatives from several different companies. Usually, consortia are composed of companies from within a single industry.

22.

The solution for all business needs is.

A. EDI

B. ERP

C. SCM

D. None of the above

Answer & Solution

Answer: Option B

Solution:

The solution for all business needs is ERP. Enterprise resource planning (ERP) is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.

23.

The _________ business model involves an independently owned vertical digital marketplace for direct inputs.

A. e-distributor

B. exchange

C. e-procurement

D. private industrial network

Answer & Solution

Answer: Option B

Solution:

The exchange business model involves an independently owned vertical digital marketplace for direct inputs.

24.

All of the following are techniques B2C e‐commerce companies use to attract customers, except:

A. Registering with search engines

B. Viral marketing

C. Online ads

D. Virtual marketing

Answer & Solution

Answer: Option D

Solution:

All of the following are techniques B2C e‐commerce companies use to attract customers, except Virtual marketing. Viral marketing or viral advertising is a business strategy that uses existing social networks to promote a product. Its name refers to how consumers spread information about a product with other people in their social networks, much in the same way that a virus spreads from one person to another.

25.

Compared to Internet users, the number of cell phone subscribers is _________.

A. about the same

B. slightly fewer

C. much fewer

D. much larger    

Answer & Solution

Answer: Option D

Solution:

Compared to Internet users, the number of cell phone subscribers is much larger.

26.

Industry structure is defined as __________.

A. the nature of the players in an industry and their relative bargaining power

B. a set of plans for achieving long term returns on the capital invested in a business firm

C. set of planned activities designed to result in a profit in a marketplace

D. how a company's product or service fulfills the needs of customers

Answer & Solution

Answer: Option A

Solution:

Industry structure is defined as the nature of the players in an industry and their relative bargaining power. Industry structure pertains to the number and size distribution of competitors in an industry, according to University of Maryland University College.

27.

The area of actual or potential commercial value in which a company intends to operate is a _______.

A. market space

B. marketplace

C. perfect market

D. Bertrand market

Answer & Solution

Answer: Option A

Solution:

The area of actual or potential commercial value in which a company intends to operate is a market space. Minimum Viable Product or MVP is the most basic version of the product which the company wants to launch in the market.

28.

Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?

A. Affiliate programs

B. Click‐through

C. Spam

D. All of the above

Answer & Solution

Answer: Option B

Solution:

Click‐through term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser.

29.

A perfect market is one in which __________.

A. One firm develops an advantage based on a factor of production that other firms cannot purchase

B. One participant in the market has more resources than the others

C. there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production

D. competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage

Answer & Solution

Answer: Option C

Solution:

A perfect market is one in which there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

30.

What is the percentage of customers who visit a Web site and actually buy something called?

A. Affiliate programs

B. Click‐through

C. Spam

D. Conversion rate

Answer & Solution

Answer: Option D

31.

Which of the following is not a horizontal portal?

A. AOL

B. Yahoo

C. Sailnet

D. MSN/Windows Live

Answer & Solution

Answer: Option C

Solution:

Sailnet is not a horizontal portal. Specialized website (portal) that serves as an entry point to several firms in the same industry or to the same type of suppliers.

32.

What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Direct materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment.

33.

A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________.

A. a value web

B. value chain

C. profit

D. commoditization

Answer & Solution

Answer: Option D

Solution:

A situation where there are no differences among products or services, and the only basis of choosing products is price is known as commoditization. Commoditization refers to the process of making something into a commodity. A commodity is a fundamental good used in commerce that is interchangeable with other commodities of the same type.

34.

What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer & Solution

Answer: Option B

Solution:

Indirect materials are necessary for running a modern corporation, but do not relate to the company's primary business activities.

35.

A strategy designed to compete in all markets around the globe is called a _________ strategy.

A. scope

B. differentiation

C. cost

D. focus

Answer & Solution

Answer: Option A

Solution:

A strategy designed to compete in all markets around the globe is called a scope strategy. Strategic scope refers to the products and services a company plans to offer over a specific period, and indicates where and to which target markets they will be sold.

36.

What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?

A. B2B marketplace

B. Intranet

C. Reverse auction    

D. Internet

Answer & Solution

Answer: Option C

Solution:

Reverse auction is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left.

37.

Which of the following is not one of the stages of the development of the Internet?

A. Innovation

B. Institutionalization

C. Globalization    

D. Commercialization

Answer & Solution

Answer: Option C

Solution:

Globalization is not one of the stages of the development of the Internet. Globalization is the spread of products, technology, information, and jobs across national borders and cultures. In economic terms, it describes an interdependence of nations around the globe fostered through free trade.

38.

What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?

A. Customer relationship management systems cards

B. E‐government identity cards

C. FEDI cards

D. Smart cards    

Answer & Solution

Answer: Option D

Solution:

Smart cards are plastic cards of the size of a credit card that contains an embedded chip on which digital information can be stored. A smart card, chip card, or integrated circuit card (ICC) is a physical electronic authorization device, used to control access to a resource.

39.

In 1961, __________ published a paper on "packet switching" networks.

A. Leonard Kleinrock    

B. Ray Tomlinson

C. Bob Metcalfe

D. Vint Cerf

Answer & Solution

Answer: Option A

Solution:

In 1961, Leonard Kleinrock published a paper on "packet switching" networks. Kleinrock convinced Roberts of the theoretical feasibility of communications using packets rather than circuits, which was a major step along the path towards computer networking.

40.

Most individuals are familiar with which form of e‐commerce?

A. B2B

B. B2C    

C. C2B

D. C2C

Answer & Solution

Answer: Option B

Solution:

Most individuals are familiar with B2C form of e‐commerce. B2C eCommerce refers to the process of selling to individual customers directly.

41.

The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ________.

A. TCP

B. IP    

C. the Network Layer

D. the Application Layer

Answer & Solution

Answer: Option B

Solution:

The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is IP. TCP/IP is a shorthand for the two most important protocols used to make the Internet work. The Internet Protocol (IP) is responsible for transferring these data packets, while the Transmission Control Protocol (TCP) makes sure all packets arrive safely, retransmitting them if necessary.

42.

Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues?

A. B2B    

B. B2C

C. C2B

D. C2C

Answer & Solution

Answer: Option A

Solution:

B2B form of e‐commerce currently accounts for about 97% of all e‐commerce revenues. Business-to-business is a situation where one business makes a commercial transaction with another.

43.

Which protocol permits users to transfer files from the server to their client computer, and vice versa?

A. HTTP

B. SMTP

C. IMAP

D. FTP    

Answer & Solution

Answer: Option D

Solution:

FTP protocol permits users to transfer files from the server to their client computer, and vice versa. FTP (File Transfer Protocol) is a protocol for transferring a file from one host to another host.

44.

Which of the following are advantages normally associated with B2B e‐commerce?

A. Shorter cycle times

B. Reduction in costs

C. Reaches wider audiences

D. all of the above    

Answer & Solution

Answer: Option D

Solution:

Shorter cycle times, reduction in costs and it reaches wider audiences are advantages normally associated with B2B e‐commerce.

45.

__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.

A. Ping    

B. Telnet

C. Tracert

D. SSL

Answer & Solution

Answer: Option A

Solution:

Ping is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server. Ping is used to test the ability of one network host to communicate with another. Simply enter the Ping command, followed by the name or the IP address of the destination host.

46.

If the threat of substitute products or services is low it is a(n):

A. Disadvantage to the supplier

B. Advantage to the buyer

C. Advantage to the supplier    

D. None of the above

Answer & Solution

Answer: Option C

Solution:

If the threat of substitute products or services is low it is an advantage to the supplier.

47.

Broadband is generally considered to be any communication technology allowing streaming audio and video at or above _________.

A. 100 Kbps    

B. 56.6 Kbps

C. 30 Kbps

D. 10 Kbps

Answer & Solution

Answer: Option A

Solution:

Broadband is generally considered to be any communication technology allowing streaming audio and video at or above 100 Kbps.

48.

The threat of new entrants is high when it is:

A. Hard for customers to enter the market

B. Hard for competitors to enter the market

C. Easy for competitors to enter the market    

D. Easy for customers to enter the market

Answer & Solution

Answer: Option C

Solution:

The threat of new entrants is high when it is Easy for competitors to enter the market. A high threat of new entrants makes an industry less attractive – there are low barriers to entry. Therefore, new competitors are able to easily enter into the industry, compete with existing firms, and take market share. There is a reduced profit potential as more competitors are in the industry.

49.

Which of the following connections allows the fastest download speeds?

A. DSL

B. cable modem

C. T1

D. T3    

Answer & Solution

Answer: Option D

Solution:

T3 connections allows the fastest download speeds. T3 Internet service lines operate at speeds of 45 Mbps (672 times faster than a 56K dial-up, and 29 times faster than T1 connection).

50.

If it is easy for competitors to enter the market, the threat of new entrants is considered:

A. High    

B. Low

C. More

D. Less

Answer & Solution

Answer: Option A

Solution:

If it is easy for competitors to enter the market, the threat of new entrants is considered high. Threat of new entrants refers to the threat new competitors pose to existing competitors in an industry. Therefore, a profitable industry will attract more competitors looking to achieve profits.

51.

Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone

B. network architecture limitations

C. insufficient reach    

D. best-efforts QOS

Answer & Solution

Answer: Option C

Solution:

Insufficient reach is not a limitation of the current Internet.

52.

Unique value auction is mainly applies to?

A. New products

B. Second hand products    

C. Engineering products

D. None of the above

Answer & Solution

Answer: Option B

Solution:

Unique value auction is mainly applies to Second hand products.

53.

All of the following are goals of Internet 2 except ______.

A. Creating a leading-edge very high-speed network capability for the national research community

B. Eliminating censorship from the Internet    

C. Enabling revolutionary Internet applications

D. Ensuring the rapid transfer of new network services and applications to the broader Internet community

Answer & Solution

Answer: Option B

Solution:

All of the following are goals of Internet 2 except Eliminating censorship from the Internet.

54.

Paisapay is facilitated in.

A. eBay.co.in    

B. amazon.com

C. flipkart.com

D. none of the above

Answer & Solution

Answer: Option A

Solution:

Paisapay is facilitated in. eBay.co.in. PaisaPay is eBay's online payment service, where buyers can pay sellers through credit card or Online Bank Transfer.

55.

Which of the following is a new and disruptive Web feature or service?

A. XML

B. diffserv

C. blogs    

D. CDMA

Answer & Solution

Answer: Option C

Solution:

Blogs is a new and disruptive Web feature or service. A blog (shortening of “weblog”) is an online journal or informational website displaying information in the reverse chronological order, with latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject.

56.

Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption

B. decryption

C. firewall

D. all the above    

Answer & Solution

Answer: Option D

Solution:

Encryption, decryption and firewall is a useful security mechanism when considering business strategy and IT.

57.

All of the following are examples of 2G wireless phone technologies except _________.

A. CDMA

B. W-CDMA    

C. TDMA

D. GSM

Answer & Solution

Answer: Option B

Solution:

All of the following are examples of 2G wireless phone technologies except W-CDMA. WCDMA is the most commonly used variant of the Universal Mobile Telecommunications System (UMTS ).

58.

Which of the following is not related to security mechanism?

A. encryption

B. decryption

C. e‐cash    

D. all the above

Answer & Solution

Answer: Option C

Solution:

e‐cash is not related to security mechanism. It is also known as electronic cash, it is a digital money product that provides a way to pay for products and services without resorting to paper or coin currency.

59.

All of the following are wireless Internet access network technologies except ________.

A. Wi-Fi

B. Bluetooth

C. Zigbee

D. GigaPoP    

Answer & Solution

Answer: Option D

Solution:

All of the following are wireless Internet access network technologies except GigaPoP. A gigabit point of presence (GigaPOP) is an individual access point to something called Internet2 that represents a high-speed IP network maintained by universities and other parties.

60.

A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?

A. Switching costs

B. Loyalty programs

C. Entry barriers    

D. Affiliate programs

Answer & Solution

Answer: Option C

Solution:

A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as an Entry barriers.

61.

Internet users account for about ________ of the world's population.

A. 0.07

B. 0.17    

C. 0.27

D. 0.47

Answer & Solution

Answer: Option B

Solution:

Internet users account for about 0.17 of the world's population.

62.

Which of the following statements accurately reflect the impact of technology?

A. Technology has caused buyer power to increase    

B. Technology has lessened the entry barriers for many industries    

C. Technology has increased the threat of substitute products and services    

D. all of the above    

Answer & Solution

Answer: Option D

Solution:

Technology has caused buyer power to increase, Technology has lessened the entry barriers for many industries and Technology has increased the threat of substitute products and services statements accurately reflect the impact of technology.

63.

Which of the following was the first commercial Web browser?

A. Mosaic

B. Mozilla

C. Netscape Navigator    

D. Internet Explorer

Answer & Solution

Answer: Option C

Solution:

Netscape Navigator was the first commercial Web browser. Netscape Navigator browser was released by the Mosaic (later Netscape) Corporation. Before Microsoft's Internet Explorer became the dominant browser, Netscape Navigator was the most popular way to connect to the Web.

64.

A business cannot be all things to all people. Instead, a business must:

A. Identify target customers

B. Identify the value of products/services as perceived by customers

C. all of the above    

D. None of the above

Answer & Solution

Answer: Option C

Solution:

A business cannot be all things to all people. Instead, a business must Identify target customers and Identify the value of products/services as perceived by customers.

65.

All of the following are steps in the systems development life cycle except ______.

A. Systems Design

B. Testing

C. Implementation

D. Debugging    

Answer & Solution

Answer: Option D

Solution:

All of the following are steps in the systems development life cycle except Debugging. Debugging is the process of finding and resolving defects or problems within a computer program that prevent correct operation of computer software or a system.

66.

How the transactions occur in e‐commerce?

A. Using e‐medias    

B. Using computers only

C. Using mobile phones only

D. None of the above

Answer & Solution

Answer: Option A

Solution:

The transactions occur in e‐commerce using e‐medias.

67.

A _________ describes the flow of information at your e-commerce site and the infrastructure that will be used in the system.

A. system design

B. logical design    

C. tactical design

D. physical design

Answer & Solution

Answer: Option B

Solution:

A logical design describes the flow of information at your e-commerce site and the infrastructure that will be used in the system. Logical design is the conceptual design of a system. It describes the flow of information at your e-commerce site, the processing functions that must be performed, the database that will be used, the security and emergency backup procedures that will be instituted, and the controls that will be used in the system.

68.

Which type of products is lesser purchased using eCommerce?

A. automobiles    

B. books

C. softwares

D. none    

Answer & Solution

Answer: Option A

Solution:

Automobiles type of products is lesser purchased using eCommerce.

69.

All of the following are factors in optimizing Web site performance except _________.

A. page retrieval    

B. page generation    

C. page delivery    

D. page content

Answer & Solution

Answer: Option A

Solution:

All of the following are factors in optimizing Web site performance except page retrieval. Page retrieval is a part that uses web robot to retrieve the desired web page to database.

70.

A business competing in a commodity like environment must focus on which of the following?

A. Price

B. Ease / speed of delivery

C. Ease of ordering

D. all of the above    

Answer & Solution

Answer: Option D

Solution:

A business competing in a commodity like environment must focus on Price, Ease / speed of delivery and Ease of ordering.

 

 

 

 

 

 

 

 

 

 

 

 

Section – 2

1.

The dominant Web server software is __________.

A. Zeus

B. Apache    

C. Microsoft IIS

D. Google

Answer & Solution

Answer: Option B

Solution:

The dominant Web server software is Apache. Apache played a key role in the initial growth of the World Wide Web, quickly overtaking NCSA HTTPd as the dominant HTTP server, and has remained most popular since April 1996.

2.

Which of the following refers to creating products tailored to individual customers?

A. customization

B. aggregation

C. Direct materials

D. Reverse auction

Answer & Solution

Answer: Option A

Solution:

Customization refers to creating products tailored to individual customers. It is the action of making or changing something according to the buyer's or user's needs.

3.

What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?

A. Processing of HTTP requests

B. File Transfer Protocol

C. Data capture

D. Security services

Answer & Solution

Answer: Option D

Solution:

Security services Web server functionality allows it verify usernames and passwords and process certificates and encryption information.

4.

Materials used in the normal operation of a business but not related to primary business operations are called what?

A. Supplies

B. Direct materials

C. Indirect materials

D. Daily stuff

Answer & Solution

Answer: Option C

Solution:

Materials used in the normal operation of a business but not related to primary business operations are called Indirect materials. Indirect materials are materials used in the production process, but which cannot be linked to a specific product or job.

5.

The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ________.

A. hardware platform

B. content platform

C. transaction platform

D. scalability platform

Answer & Solution

Answer: Option A

Solution:

The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a hardware platform.

6.

Amazon.com is well‐known for which e‐commerce marketing technique?

A. Banner ads

B. Pop‐up ads

C. Affiliate programs

D. Viral marketing

Answer & Solution

Answer: Option C

Solution:

Amazon.com is well‐known for Affiliate programs e‐commerce marketing technique.

7.

Redundant navigation refers to _________.

A. pages that work, load quickly, and point the customer toward your product offerings

B. simple, fool-proof navigation

C. a site working with the most popular browsers

D. alternative navigation to the same content

Answer & Solution

Answer: Option D

Solution:

Redundant navigation refers to alternative navigation to the same content. Redundant navigation can help users find what they're looking for. Redundancy in documentation is usually bad: When you have the same content (in different words) in two places, you pay twice for localization – yet you probably only remember to update one of the items.

8.

What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities?

A. Direct marketplace

B. B2B

C. B2C

D. Electronic marketplace

Answer & Solution

Answer: Option D

Solution:

Electronic marketplace is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities.

9.

The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________.

A. Active Server Pages (ASP)

B. Java Server Pages (JSP)

C. Common Gateway Interface (CGI)

D. VBScript

Answer & Solution

Answer: Option C

Solution:

The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as Common Gateway Interface (CGI).

10.

Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials?

A. horizontal

B. Vertical

C. Integrated

D. Inclined

Answer & Solution

Answer: Option A

Solution:

Horizontal form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials. Horizontal e-commerce outfits focus on the breadth of product offerings, while vertical ones concentrate on depth.

1.

Which of the following is not a widely used midrange or high-end e-commerce suite?

A. Microsoft Commerce Server

B. WebTrends Marketing Lab2

C. IBM WebSphere Commerce

D. Broadvision Commerce

Answer & Solution

Answer: Option A

Solution:

Microsoft Commerce Server is not a widely used midrange or high-end e-commerce suite. Microsoft is one of the providers of commerce servers. Microsoft Commerce Server was first released in 2000 and was used to creatie e-commerce systems. It uses Microsoft's .NET technology.

12.

Which form of e‐marketplace brings together buyers and sellers from the same industry?

A. horizontal

B. Vertical

C. Integrated

D. Inclined

Answer & Solution

Answer: Option B

Solution:

Vertical form of e‐marketplace brings together buyers and sellers from the same industry. It is an e-marketplace that offer goods and services directly related to the production process of a specific industrial sector.

13.

The ability to change the product to better fit the needs of the customer is called ________.

A. customization

B. personalization

C. privacy

D. accessibility

Answer & Solution

Answer: Option A

Solution:

The ability to change the product to better fit the needs of the customer is called customization. It is the action of modifying something to suit a particular individual or task.

14.

Which type of add appears on a web page?

A. pop‐under ad

B. Pop‐up ad

C. Banner ad

D. Discount ad  

Answer & Solution

Answer: Option C

Solution:

Banner ad appears on a web page.

15.

All of the following are tools for optimizing a Web site's location in search engine listings except ________.

A. keywords and page titles

B. identifying market niches

C. buying ads

D. benchmarking

Answer & Solution

Answer: Option D

Solution:

All of the following are tools for optimizing a Web site's location in search engine listings except benchmarking. Benchmarking is a process of measuring the performance of a company's products, services, or processes against those of another business considered to be the best in the industry, aka “best in class.”

16.

What type of ad appears on top of a web page?

A. pop‐under ad

B. pop‐up ad

C. banner ad

D. discount ad

Answer & Solution

Answer: Option B

Solution:

pop‐up ad type of ad appears on top of a web up ad. Pop-up ads or pop-ups are forms of online advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.

17.

The most common type of Internet crime according to the IC3 is ______.

A. Credit card fraud

B. Check fraud

C. Non-delivery

D. Auction fraud

Answer & Solution

Answer: Option D

Solution:

The most common type of Internet crime according to the IC3 is Auction fraud. Internet auction fraud involves schemes attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.

18.

What type of ad appears under a web page?

A. pop‐under ad

B. pop‐up ad

C. banner ad

D. discount ad

Answer & Solution

Answer: Option A

Solution:

Pop‐under ad appears under a web page. A type of window that appears behind the browser window of a Web site that a user has visited. In contrast to a pop-up ad, which appears over (on top of) the browser window, a pop-under is less obtrusive as it hides behind other windows.

19.

In the e-commerce security environment, which of the following constitutes the inner-most layer?

A. people

B. data

C. technology solutions

D. organizational policies and procedures

Answer & Solution

Answer: Option B

Solution:

In the e-commerce security environment, data constitutes the inner-most layer. E-Commerce security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the Internet, but with protocols in place to provide safety for those involved.

20.

Which, if any, of the following types of ads are people most willing to tolerate?

A. pop‐under ad

B. pop‐up ad

C. banner ad

D. none of the above

Answer & Solution

Answer: Option D

Solution:

people most willing doesn't tolerate any type of ads.

 

21.

All of the following are major categories of computer viruses except _________.

A. Macro viruses

B. File-infecting viruses

C. Script viruses

D. Trojan viruses

Answer & Solution

Answer: Option D

Solution:

All of the following are major categories of computer viruses except Trojan viruses. Trojan or Trojan horse is a type of malicious software. Trojan virus is designed to spy on the victims computer, access files or to extract sensitive data.

22.

Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?

A. electronic check

B. electronic bill presentment and payment

C. conversion rates

D. financial cybermediary

Answer & Solution

Answer: Option D

Solution:

A financial cybermediary is an internet based company that makes it easy to transfer money from one person to another.

23.

A worm is designed to spread _________.

A. from computer to computer

B. from file to file on a computer

C. from Web site to Web site

D. from Web site to computer

Answer & Solution

Answer: Option A

Solution:

A worm is designed to spread from computer to computer. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

24.

Which of the following is a method of transferring money from one person's account to another?

A. electronic check

B. credit card

C. e‐transfer

D. none of the above

Answer & Solution

Answer: Option A

Solution:

Electronic check is a method of transferring money from one person's account to another. An electronic check, also referred to as an e-check, is a form of payment made via the Internet, or another data network, designed to perform the same function as a conventional paper check.

25.

Malicious hackers who act with the intention of causing harm are __________.

A. White hats

B. Black hats

C. Grey hats

D. Brown hats

Answer & Solution

Answer: Option B

Solution:

Malicious hackers who act with the intention of causing harm are Black hats. Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security vulnerabilities for monetary gain; to steal or destroy private data; or to alter, disrupt or shut down websites and networks.

26.

An electronic check is one form of what?

A. e‐commerce

B. online banking

C. e‐cash

D. check

Answer & Solution

Answer: Option B

Solution:

An electronic check is one form of online banking. An eCheck (or electronic check) is an electronic version of a paper check used to make payments online.

27.

When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.

A. phishing

B. pharming

C. a Denial of Service (DoS) attack

D. spoofing

Answer & Solution

Answer: Option C

Solution:

When hackers flood a Web site with useless traffic to overwhelm the network, it is called a Denial of Service (DoS) attack. A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

28.

If you need to transfer money to another person via the internet, which of the following methods could you use?

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer & Solution

Answer: Option D

Solution:

If you need to transfer money to another person via the internet, the methods that could be use are financial cybermediary, electronic check and electronic bill presentment and payment.

29.

Which of the following is not a dimension of e-commerce security provided by encryption?

A. availability

B. message integrity

C. nonrepudiation

D. confidentiality

Answer & Solution

Answer: Option A

Solution:

Availability is not a dimension of e-commerce security provided by encryption. eCommerce security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the Internet, but with protocols in place to provide safety for those involved.

30.

Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer & Solution

Answer: Option C

Solution:

Electronic bill presentment and payment permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet. Electronic Bill Payment & Presentment (EBPP) is a process, which companies use to collect payments via the Internet, direct dial access, Automated Teller Machine (ATM), or other electronic method. Electronic Bill Payment & Presentment is a core component of many financial institutions' online banking offerings.

31.

The most widely used encryption standard is ______.

A. Advanced Encryption Standard (AES)

B. Data Encryption Standard (DES)

C. Universal Encryption Standard (UES)

D. Optimal Encryption Standard (OES)

Answer & Solution

Answer: Option A

Solution:

The most widely used encryption standard is Advanced Encryption Standard (AES). The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

32.

A combination of software and information designed to provide security and information for payment is called a what?

A. digital wallet

B. pop up ad

C. shopping cart

D. encryption

Answer & Solution

Answer: Option A

Solution:

A combination of software and information designed to provide security and information for payment is called digital wallet. A digital wallet is a system that securely stores users' payment information and passwords for numerous payment methods and websites.

33.

The most common form of securing channels is through ________.

A. S-HTTP

B. VPNs

C. SSL

D. PPTP

Answer & Solution

Answer: Option C

Solution:

The most common form of securing channels is through SSL. SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook).

34.

What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?

A. internet commerce

B. e‐commerce

C. transaction information transfer

D. electronic data interchange

Answer & Solution

Answer: Option D

Solution:

The name for direct computer‐to‐computer transfer of transaction information contained in standard business documents is electronic data interchange. Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper.

35.

Firewalls perform all of the following functions except _________.

A. Forbids communications from untrustworthy sources

B. Allows communications from trustworthy sources

C. Eliminates viruses and other malicious attacks

D. Filters traffic based on packet attributes

Answer & Solution

Answer: Option C

Solution:

Firewalls perform all of the following functions except Eliminates viruses and other malicious attacks.

36.

Which of the following is used in B2B to pay for purchases?

A. e‐commerce

B. financial electronic data interchange

C. electronic data exchange

D. electronic checks

Answer & Solution

Answer: Option B

Solution:

Financial electronic data interchange is used in B2B to pay for purchases. Business-to-business is a situation where one business makes a commercial transaction with another.

37.

A security plan begins with a(n) is ______.

A. security policy

B. risk assessment

C. implementation plan

D. security organization

Answer & Solution

Answer: Option B

Solution:

A security plan begins with a risk assessment. Risk assessment is a term used to describe the overall process or method where you: Identify hazards and risk factors that have the potential to cause harm (hazard identification). Analyze and evaluate the risk associated with that hazard (risk analysis, and risk evaluation).

38.

Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.

A. encryption, decryption

B. private, public

C. encryption, public

D. public, private

Answer & Solution

Answer: Option D

39.

The only payment system that is instantly convertible without intermediation is _______.

A. Credit card

B. Accumulating balance

C. Stored value

D. Cash

Answer & Solution

Answer: Option D

Solution:

The only payment system that is instantly convertible without intermediation is Cash.

40.

Secure Sockets Layers does which of the following?

A. creates a secure, private connection to a web server

B. encrypts information

C. sends information over the internet

D. all of the above

Answer & Solution

Answer: Option D

Solution:

Secure Sockets Layers creates a secure, private connection to a web server, encrypts information and sends information over the internet.

41.

The most prevalent online payment method is ______.

A. PayPal

B. checks

C. credit cards

D. debit

Answer & Solution

Answer: Option C

Solution:

The most prevalent online payment method is credit cards. Over the years, credit cards have become one of the most common forms of payment for e-commerce transactions.

42.

When a transaction is processed online, how can the merchant verify the customer's identity?

A. use secure sockets layers

B. use secure electronic transactions

C. use electronic data interchange

D. use financial electronic data interchange

Answer & Solution

Answer: Option B

Solution:

When a transaction is processed online, use secure electronic transactions the merchant can verify the customer's identity by using secure electronic transactions.

43.

What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?

A. US-CERT

B. OECD

C. IC3

D. P3P

Answer & Solution

Answer: Option A

Solution:

US-CERT is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors.

44.

The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?

A. hacking

B. cracking

C. dumpster diving

D. spoofing

Answer & Solution

Answer: Option D

Solution:

The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed as spoofing. A spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

45.

After sending e-mail, which of the following activities is most common among Internet users?

A. sending instant messages

B. reading someone else's blog

C. using a search engine to find information

D. getting news

Answer & Solution

Answer: Option C

Solution:

After sending e-mail, using a search engine to find information is most common among Internet users.

46.

What is a model of a proposed product, service, or system?

A. Prototyping

B. Prototype

C. Proof‐of‐concept prototype

D. Selling prototype

Answer & Solution

Answer: Option B

Solution:

Prototype is a model of a proposed product, service, or system. A prototype is an original model, form or an instance that serves as a basis for other processes.

47.

__________ influence the behavior of others through their personality, skills, or other factors.

A. Opinion leaders

B. Direct reference groups

C. Indirect reference groups

D. Lifestyle groups

Answer & Solution

Answer: Option A

Solution:

Opinion leaders influence the behavior of others through their personality, skills, or other factors. Opinion leaders are individuals or organizations that are able to influence people by their opinion.

48.

What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

A. Client/server network

B. Intranet

C. Extranet

D. Thin client

Answer & Solution

Answer: Option B

Solution:

Intranet is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two). An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network.

49.

A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.

A. commodity

B. core product

C. actual product

D. augmented product

Answer & Solution

Answer: Option A

Solution:

A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as commodity. A commodity is a basic good used in commerce that is interchangeable with other commodities of the same type. Commodities are most often used as inputs in the production of other goods or services.

50.

What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?

A. Client/server network

B. Intranet

C. Extranet

D. Thin client

Answer & Solution

Answer: Option C

Solution:

Extranet is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers. An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.

51.

Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.

A. Bertrand's Law

B. the Law of Universal Prices

C. the Law of One Price

D. the Law of Perfect Commerce

Answer & Solution

Answer: Option C

Solution:

Complete price transparency in a perfect information marketplace is necessary for the Law of One Price to take effect. The law of one price states that in the absence of trade frictions, and under conditions of free competition and price flexibility, identical goods sold in different locations must sell for the same price when prices are expressed in a common currency.

52.

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution

Answer: Option A

Solution:

Disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A disaster recovery plan (DRP) is a documented, structured approach with instructions for responding to unplanned incidents.

53.

A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.

A. database management system

B. data warehouse

C. SQL query

D. relational database

Answer & Solution

Answer: Option D

Solution:

A relational database represents data as two-dimensional tables with records organized in rows and attributes in columns. A relational database is a set of formally described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.

54.

What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution

Answer: Option C

Solution:

Cold site is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster. A cold site is a business location that is used for backup in the event of a disruptive operational disaster at the normal business site.

55.

All of the following are types of data mining except ______.

A. selective data mining

B. query-driven data mining

C. model-driven data mining

D. rule-based data mining

Answer & Solution

Answer: Option A

Solution:

All of the following are types of data mining except selective data mining.

56.

What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution

Answer: Option B

Solution:

Hot site is a separate and fully equipped facility where the company can move immediately after the disaster and resume business. A hot site is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster.

57.

Which of the following market entry strategies are the most common for existing firms?

A. first mover

B. fast follower

C. brand extender

D. alliances

Answer & Solution

Answer: Option C

Solution:

Brand extender market entry strategies are the most common for existing firms. Brand Extension is the use of an established brand name in new product categories.

58.

What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution

Answer: Option D

Solution:

Disaster recovery cost curve charts the cost to your organization of the unavailability of information and technology and the cost to your organization of recovering from a disaster over time.

59.

The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.

A. affiliate marketing

B. viral marketing

C. permission marketing

D. blog marketing

Answer & Solution

Answer: Option B

Solution:

The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as viral marketing. Viral marketing or viral advertising is a business strategy that uses existing social networks to promote a product.

60.

Which factor determines when your IT system will be available for knowledge workers to access?

A. Availability

B. Accessibility

C. Reliability

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Availability factor determines when your IT system will be available for knowledge workers to access.

61.

The per-product price consumers are willing to pay for a bundle ____________ as the number of goods in the bundle increases.

A. decreases

B. increases

C. varies from product to product

D. stays the same

Answer & Solution

Answer: Option B

Solution:

The per-product price consumers are willing to pay for a bundle increases as the number of goods in the bundle increases. The willingness of consumers to pay can, at times, be quite volatile. With bundle pricing, the seller lowers the variance on this willingness to pay and increases its profit by selling bundles of products instead of selling all products separately.

62.

Which factor determines who has the right to access different types of IT systems and information?

A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer & Solution

Answer: Option B

Solution:

Accessibility factor determines who has the right to access different types of IT systems and information.

63.

Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.

A. versioning

B. bundling

C. transactive content

D. price discrimination

Answer & Solution

Answer: Option A

Solution:

Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called versioning. Versioning is the creation and management of multiple releases of a product, all of which have the same general function but are improved, upgraded or customized.

64.

Which factor ensures your IT systems are functioning correctly and providing accurate information?

A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer & Solution

Answer: Option C

Solution:

Reliability factor ensures your IT systems are functioning correctly and providing accurate information. The term reliability in psychological research refers to the consistency of a research study or measuring test.

65.

All of the following are examples of intelligent agent technology except ________.

A. automated response systems

B. automatic shipping confirmation

C. order status reports

D. online web bugs

Answer & Solution

Answer: Option D

Solution:

All of the following are examples of intelligent agent technology except online web bugs.

66.

Which factor represents how well your system can adapt to increased demands?

A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer & Solution

Answer: Option D

Solution:

Scalability factor represents how well your system can adapt to increased demands. Scalability is an attribute that describes the ability of a process, network, software or organization to grow and manage increased demand.

67.

E-business can be defined as_______.

A. the uninhibited flow of information and goods on the Web

B. the use of the Internet and the Web to transact business

C. digitally enabled transactions and processes within an organization

D. commercial transactions involving electronic goods

Answer & Solution

Answer: Option C

Solution:

E-business can be defined as digitally enabled transactions and processes within an organization. E-business or Online business means business transactions that take place online with the help of the internet. The term e-business came into existence in the year 1996. E-business is an abbreviation for electronic business.

68.

Which factor represents a system's ability to change quickly?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer & Solution

Answer: Option A

Solution:

Flexibility factor represents a system's ability to change quickly. Flexibility is Key to E-commerce Stability.

69.

The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.

A. Internet

B. social networking

C. virtual life

D. Web 2.0

Answer & Solution

Answer: Option D

Solution:

The set of applications and technologies that allow users to create, edit, and distribute content online is known as Web 2.0. Web 2.0 Websites allow users to do more than just retrieve information.

70.

What is a set of conditions used to measure how well a product or system functions?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer & Solution

Answer: Option D

Solution:

Benchmark is a set of conditions used to measure how well a product or system functions. Benchmarking is the process through which a company measures its products, services, and practices against its toughest competitors, or those companies recognized as leaders in its industry.

 

 

 

Section – 3

1.

Which of the following represents a limiting factor for the growth of e-commerce?

A. Persistent cultural attraction of physical markets and traditional shopping experiences

B. Inadequate selection of goods compared to physical marketplaces

C. E-commerce lacks the convenience of other methods of transacting business

D. The potential audience for e-commerce is too low to support it as a widespread method of commerce

Answer & Solution

Answer: Option A

Solution:

Persistent cultural attraction of physical markets and traditional shopping experiences represents a limiting factor for the growth of e-commerce.

2.

What determines the future IT infrastructure requirements for new equipment and additional network capacity?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer & Solution

Answer: Option C

Solution:

Capacity planning determines the future IT infrastructure requirements for new equipment and additional network capacity.

3.

The fastest growing form of online advertising is _________.

A. banner ads

B. pop-up ads

C. rich media/video ads

D. pop-under ads

Answer & Solution

Answer: Option C

Solution:

The fastest growing form of online advertising is rich media/video ads. Online advertising, also called online marketing or Internet advertising or web advertising, is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers.

4.

What automates business processes?

A. Workflow

B. ASP

C. Workflow system

D. EIP

Answer & Solution

Answer: Option C

Solution:

Workflow system automates business processes. A workflow management system provides an infrastructure for the set-up, performance and monitoring of a defined sequence of tasks, arranged as a workflow application.

5.

All of the following are among the most common categories of spam except ______.

A. fraud

B. commercial products

C. finance

D. health (drugs)

Answer & Solution

Answer: Option A

Solution:

All of the following are among the most common categories of spam except fraud. Fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

6.

What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

A. Workflow

B. EIP

C. Workflow system

D. SLA

Answer & Solution

Answer: Option A

Solution:

Workflow defines all of the steps or business rules, from beginning to end, required for a process to run correctly.

7.

All of the following are types of social marketing except ______.

A. affiliate marketing

B. blog advertising

C. social network advertising

D. game advertising

Answer & Solution

Answer: Option A

Solution:

All of the following are types of social marketing except affiliate marketing. Affiliate marketing is the process of earning a commission by promoting other people's (or company's) products.

8.

What sends work assignments through an e‐mail system?

A. Database‐based enterprise information portal

B. Messaging‐based enterprise information portal

C. Database‐based workflow system

D. Messaging‐based workflow system

Answer & Solution

Answer: Option D

Solution:

Messaging‐based workflow system sends work assignments through an e‐mail system.

9.

Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?

A. impression rate

B. view-through rate

C. click-through rate

D. stickiness ratio

Answer & Solution

Answer: Option C

Solution:

click-through rate measures the percentage of people exposed to an online advertisement who actually click on the banner. Click-through rate (CTR) is the ratio of users who click on a specific link to the number of total users who view a page, email, or advertisement.

10.

Which will not a computer resources?

A. firewall

B. Virus

C. Trojan horse

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Firewall is not a computer resources. A firewall is a hardware or software device designed to permit or deny data through a computer network in order to protect the resources of a private network from users from other networks.

11.

Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

A. loyalty

B. reach

C. recency

D. unique visitors

Answer & Solution

Answer: Option A

Solution:

Loyalty is a measure of the percentage of purchasers who return to a Web site within a year.

12.

Which is not a function of ERP?

A. Warehousing

B. sales

C. scheduling

D. None of the above

Answer & Solution

Answer: Option D

Solution:

Enterprise resource planning (ERP) is a method of using computer technology to link various Functions—such as accounting, inventory control, and human resources—across an entire company. However, there are certain things that we need to consider in the ERP to enhance the business processes.

13.

All of the following are metrics for e-mail campaigns except _________.

A. open rate

B. delivery rate

C. bounce-back rate

D. cart conversion rate

Answer & Solution

Answer: Option D

Solution:

All of the following are metrics for e-mail campaigns except cart conversion rate. The conversion rate is the number of conversions divided by the total number of visitors.

14.

Which is a function of ERP?

A. Warehousing

B. sales

C. scheduling

D. all of the above

Answer & Solution

Answer: Option D

Solution:

The function of ERP are Warehousing, sales and scheduling.

15.

As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.

A. remain constant

B. decrease

C. increase

D. rapidly increase

Answer & Solution

Answer: Option B

Solution:

As consumers become more accustomed to new online advertising formats, click-through rates tend to decrease.

16.

Which of the following is the primary characteristic of an intranet?

A. People outside the organization can access it

B. People inside the organization can't access it

C. People outside the organization can't access it

D. None of the above

Answer & Solution

Answer: Option C

Solution:

People outside the organization can't access it is the primary characteristic of an intranet.

17.

The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.

A. The Golden Rule

B. Slippery Slope

C. No Free Lunch

D. Universalism

Answer & Solution

Answer: Option D

Solution:

The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as Universalism. Universalism is defined as an action that should be same in all the situations.

18.

Which concept suggests that different applications and computer systems should be able to communicate with one another?

A. Integration

B. Web services

C. Scalability

D. Interoperability

Answer & Solution

Answer: Option D

Solution:

Interoperability concept suggests that different applications and computer systems should be able to communicate with one another. Interoperability is the ability of different information systems, devices or applications to connect, in a coordinated manner, within and across organizational boundaries to access, exchange and cooperatively use data amongst stakeholders, with the goal of optimizing the health of individuals and populations.

19.

Which of the following statements about privacy is true?

A. It is a moral right to be left alone

B. Only corporations and government need to be concerned about it

C. It has only just recently become a concern

D. It is most easily obtained on the Internet

Answer & Solution

Answer: Option A

Solution:

Privacy is a moral right to be left alone. Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals.

20.

Which service encompasses all technologies used to transmit and process information on an across a network?

A. Interoperability

B. Scalability

C. Benchmarking

D. Web services

Answer & Solution

Answer: Option D

Solution:

Web services encompasses all technologies used to transmit and process information on an across a network. Web services is a standardized way or medium to propagate communication between the client and server applications on the World Wide Web.

21.

The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles?

A. Security

B. Enforcement

C. Choice/Consent

D. Access/Participation

Answer & Solution

Answer: Option D

Solution:

The ability of consumers to review and contest the accuracy and completeness of data collected about them involves Access/Participation FTC fair information practice principles.

22.

Which process can preventata from lose due to computer problems or human errors?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer & Solution

Answer: Option A

Solution:

Backup process can prevent from lose due to computer problems or human errors. Backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event.

23.

The __________ is the first major effort to adjust the copyright laws to the Internet age.

A. Platform for Privacy Preferences (P3P)

B. Center for Democracy and Technology

C. Digital Millennium Copyright Act (DMCA)

D. E-Government Act of 2002

Answer & Solution

Answer: Option C

Solution:

The Digital Millennium Copyright Act (DMCA) is the first major effort to adjust the copyright laws to the Internet age. The Digital Millennium Copyright Act is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization. It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.

24.

Which process is used to reinstall data from a copy when the original data has been lost?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer & Solution

Answer: Option B

Solution:

Recovery process is used to reinstall data from a copy when the original data has been lost. Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.

25.

A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.

Answer & Solution

Answer: Option B

Solution:

A patent grants the owner an exclusive monopoly on the ideas behind the invention for 20 years.

26.

What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A. Performance

B. Capacity planning

C. Benchmarking

D. Data cleansing

Answer & Solution

Answer: Option C

Solution:

Benchmarking describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved.

27.

The number of business methods patents granted is ___________ compared to the number of patents applied for.

A. substantially smaller

B. slightly smaller

C. close to equal

D. equal

Answer & Solution

Answer: Option A

Solution:

The number of business methods patents granted is substantially smaller compared to the number of patents applied for.

28.

Who protects system from external threats?

A. firewall

B. EDI

C. ERP

D. Script kiddies

Answer & Solution

Answer: Option A

Solution:

Firewall protects system from external threats. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

29.

The redirection of traffic from a legitimate site to an infringing site is called _______.

A. cyber squatting

B. cyber piracy

C. meta tagging

D. key wording

Answer & Solution

Answer: Option B

Solution:

The redirection of traffic from a legitimate site to an infringing site is called cyber piracy. Piracy is the unauthorized distribution, theft, reproduction, copying, performance, storage, sale or other use of intellectual property (IP) protected under copyright law. It is a form of copyright infringement.

30.

Who breaks into other people's computer systems and steals and destroys information?

A. Hackers

B. softwares

C. Hacktivists

D. Script kiddies

Answer & Solution

Answer: Option A

Solution:

Hackers breaks into other people's computer systems and steals and destroys information. Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.

31.

During which period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains?

A. Government Control Period

B. Privatization

C. Self-Regulation

D. Governmental Regulation

Answer & Solution

Answer: Option B

Solution:

During Privatization period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains.

32.

What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?

A. Web log

B. Clickstream

C. Anonymous Web browsing service

D. None of the above

Answer & Solution

Answer: Option D

Solution:

Spyware is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about.

33.

All of the following are acts Congress has passed or attempted to pass to protect children online except __________.

A. Video Privacy Protection Act

B. Children's Online Protection Act

C. Communications Decency Act

D. Children's Internet Protection Act

Answer & Solution

Answer: Option A

Solution:

All of the following are acts Congress has passed or attempted to pass to protect children online except Video Privacy Protection Act. The Video Privacy Protection Act of 1988 is United States legislation that prevents wrongful disclosure of an individual's personally identifiable information stemming from their rental or purchase of audiovisual material, including videotapes, DVDs and video games.

34.

ERP stands for.

A. Enterprise resolution planning

B. Enterprise reverse planning

C. Enterprise resource planning

D. None of the above

Answer & Solution

Answer: Option C

Solution:

ERP stands for Enterprise resource planning. It's a business process management software that manages and integrates a company's financials, supply chain, operations, reporting, manufacturing, and human resource activities.

35.

Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?

A. Cdt.org

B. PrivacyInternational.org

C. Epic.org

D. Privacy.org

Answer & Solution

Answer: Option A

Solution:

Cdt.org is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus.

36.

Which is not a component of ERP?

A. Legacy systems

B. Bolt on applications

C. Operational database

D. Cybersoft

Answer & Solution

Answer: Option D

Solution:

Cybersoft is not a component of ERP. Cybersoft is a leading provider of innovative business software solutions, information technology and consulting services.

37.

What is the first step in a P3P-enabled transaction?

A. send Web page

B. http GET request Web page

C. Send P3P policy files

D. http GET request P3P policy files

Answer & Solution

Answer: Option B

Solution:

The first step in a P3P-enabled transaction is http GET request Web page.

38.

Which is not a function of ERP?

A. Human resource management

B. financial

C. warehousing

D. None of the above

Answer & Solution

Answer: Option D

Solution:

Enterprise resource planning (ERP) is a method of using computer technology to link various Functions such as accounting, inventory control, and human resources across an entire company. However, there are certain things that we need to consider in the ERP to enhance the business processes. All the above are functions of ERP.

39.

All of the following are types of intellectual property protection except_______.

A. patents

B. trademarks

C. governance

D. copyrights

Answer & Solution

Answer: Option C

Solution:

All of the following are types of intellectual property protection except governance. Governance encompasses the system by which an organisation is controlled and operates, and the mechanisms by which it, and its people, are held to account.

40.

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?

A. Computer virus

B. Worm

C. Denial‐of‐service attack

D. None of the above

Answer & Solution

Answer: Option B

Solution:

Worm is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

41.

All of the following are challenges to online retail except ______.

A. Consumer concerns about the security of transactions

B. Consumer concerns about the privacy of personal information given to Web sites

C. Delays in delivery of goods when compared to store shopping

D. Inability to change prices nearly instantly

Answer & Solution

Answer: Option D

Solution:

All of the following are challenges to online retail except Inability to change prices nearly instantly.

42.

What floods a Web site with so many requests for service that it slows down or crashes?

A. Computer virus

B. Worm

C. Denial‐of‐service attack

D. None of the above

Answer & Solution

Answer: Option C

Solution:

Denial‐of‐service attack floods a Web site with so many requests for service that it slows down or crashes. A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning.

43.

Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?

A. barriers to entry

B. power of suppliers

C. power of consumers

D. industry value chain

Answer & Solution

Answer: Option A

Solution:

Barriers to entry is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry.

44.

What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A. Computer virus

B. Worm

C. Denial‐of‐service attack

D. None of the above

Answer & Solution

Answer: Option D

Solution:

Grid computing harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage.

45.

Products are made to prior to orders received based on estimated demand under a _________.

A. supply-push model

B. demand-push model

C. supply-pull model

D. demand-pull model

Answer & Solution

Answer: Option A

Solution:

Products are made to prior to orders received based on estimated demand under a supply-push model. A company's supply chain stretches from the factory where its products are made to the point the products are in customer hands.

46.

What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A. Risk management

B. Risk assessment

C. Security

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Risk management consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness. Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

47.

The major impact of Internet real estate sites is in ______.

A. completing property transactions online

B. influencing offline decisions

C. reducing commissions

D. e-mail marketing to consumers

Answer & Solution

Answer: Option B

Solution:

The major impact of Internet real estate sites is in influencing offline decisions..

48.

What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A. Risk management

B. Risk assessment

C. Security

D. None of the above

Answer & Solution

Answer: Option B

Solution:

Risk assessment is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets. A risk assessment is the combined effort of: identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment; and making judgments "on the tolerability of the risk on the basis of a risk analysis" while considering influencing factors.

49.

Which of the following is the largest online travel service?

A. Travelocity

B. Orbitz

C. Priceline

D. Expedia

Answer & Solution

Answer: Option D

Solution:

Expedia is the largest online travel service. Expedia is one of the fastest growing online travel portals in Asia, offering travellers an extensive selection of hotels, activities and travel services to meet every budget and activities of every kind at competitive rates.

50.

What is the process of making a copy of the information stored on a computer?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution

Answer: Option A

Solution:

Backup is the process of making a copy of the information stored on a computer. Backup refers to making copies of data so that the copies may be used to restore the original data after a data loss event. Backups are extrememly important for computer management.

51.

Which of the following is not one of the top three online career service providers?

A. CareerBuilder

B. Monster

C. HotJobs

D. USAJobs

Answer & Solution

Answer: Option D

Solution:

USAJobs is not one of the top three online career service providers. USAJobs is the United States Government's website for listing civil service job opportunities with federal agencies.

52.

What software detects and removes or quarantines computer viruses?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution

Answer: Option B

Solution:

Anti‐virus software detects and removes or quarantines computer viruses. Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.

53.

The largest segment in the recruitment business is________.

A. General job recruitment

B. Executive search

C. Specialized job placement services

D. Managerial recruitment

Answer & Solution

Answer: Option A

Solution:

The largest segment in the recruitment business is General job recruitment.

54.

What is hardware and/or software that protects computers from intruders?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution

Answer: Option C

Solution:

Firewall is software that protects computers from intruders. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

55.

The majority of job seekers rely on which of the following?

A. Word-of-mouth leads

B. Employment agencies

C. Internet and newspapers equally

D. Internet only

Answer & Solution

Answer: Option C

Solution:

The majority of job seekers rely on Internet and newspapers equally.

56.

What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution

Answer: Option D

Solution:

Biometrics is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification.

57.

The most popular type of media in terms of total hours of consumption per year is _____.

A. television

B. radio

C. Internet

D. newspaper

Answer & Solution

Answer: Option A

Solution:

The most popular type of media in terms of total hours of consumption per year is television. Though consumption of video on digital platforms is on the rise in the country, good old television continues to score in terms of penetration and has large headroom left to fill.

58.

All of the following are considered biometrics, except:

A. Fingerprint

B. Retina

C. Password

D. Voice

Answer & Solution

Answer: Option C

Solution:

All of the following are considered biometrics, except Password. Biometrics are more secure than traditional passwords and PINs.

59.

Which of the following describes paid content's relation to free user-generated content?

A. Free content jeopardizes paid content

B. Paid content jeopardizes free content

C. Free content and paid content can both work in tandem cooperatively

D. Paid content is viable now but will not be in the future

Answer & Solution

Answer: Option C

Solution:

Free content and paid content can both work in tandem cooperatively describes paid content's relation to free user-generated content.

60.

What scrambles the contents of a file so you can't read it without having the right decryption key?

A. Encryption

B. Intrusion‐detection software

C. Security‐auditing software

D. All of the above

Answer & Solution

Answer: Option A

Solution:

Encryption scrambles the contents of a file so you can't read it without having the right decryption key. Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.

61.

The top U.S online video site is ______.

A. MySpace

B. YouTube

C. AOL

D. Google Video

Answer & Solution

Answer: Option B

Solution:

The top U.S online video site is YouTube. The most popular video hosting website is YouTube, with 1.8 billion logged-in users per month and the most extensive catalog of online videos.

62.

What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?

A. Encryption

B. Public key encryption

C. Intrusion‐detection software

D. Security‐auditing software

Answer & Solution

Answer: Option B

Solution:

Public-key encryption is a cryptographic system that uses two keys - a public key known to everyone and a private or secret key known only to the recipient of the message.

63.

Which of the following is not a type of media convergence?

A. technological convergence

B. content convergence

C. industry convergence

D. community convergence

Answer & Solution

Answer: Option D

Solution:

Community convergence is not a type of media convergence. Communities-Convergence means to converge is an ancient custom; it means to reunite, to reconnect, to share, to celebrate, to cooperate, to learn, to support, to dream and act as a single community that speaks with the same voice and loves as one heart!

64.

What looks for people on the network who shouldn't be there or who are acting suspiciously?

A. Encryption

B. Public key encryption

C. Intrusion‐detection software

D. Security‐auditing software

Answer & Solution

Answer: Option C

Solution:

Intrusion‐detection software looks for people on the network who shouldn't be there or who are acting suspiciously. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations.

65.

The online content revenue model in which free content drives offline revenues is called the _________.

A. marketing model

B. advertising model

C. pay-per-view model

D. subscription model

Answer & Solution

Answer: Option A

Solution:

The online content revenue model in which free content drives offline revenues is called the marketing model. Marketing mix modeling is statistical analysis such as multivariate regressions on sales and marketing time series data to estimate the impact of various marketing tactics on sales and then forecast the impact of future sets of tactics.

66.

What checks out your computer or network for potential weaknesses?

A. Encryption

B. Public key encryption

C. Security‐auditing software

D. None of the above

Answer & Solution

Answer: Option C

Solution:

Security‐auditing software checks out your computer or network for potential weaknesses. A computer security audit is a manual or systematic measurable technical assessment of a system or application.

67.

The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.

A. Digital rights management

B. Digital protection schemes

C. Digital distribution regulation

D. Digital rights protection

Answer & Solution

Answer: Option A

Solution:

The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as Digital rights management. Digital rights management (DRM) is a systematic approach to copyright protection for digital media.

68.

Which of the following to viruses harm?

A. Your keyboard

B. Your monitor

C. Your processor

D. Viruses do not harm any of the above

Answer & Solution

Answer: Option D

Solution:

Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive.

69.

What is the most commonly offered interactive feature of newspaper Web sites?

A. video

B. comments on blogs

C. RSS feeds

D. podcasts

Answer & Solution

Answer: Option C

Solution:

RSS feeds is the most commonly offered interactive feature of newspaper Web sites. RSS (Really Simple Syndication) and Atom are two specialized formats that create what's commonly called a news feed, or just feed. A feed is an easy way for sites to share headlines and stories so that you can read them without having to visit two dozen different web pages everyday.

70.

Which of the following can a virus do?

A. Hurt your hardware

B. Hurt any files they weren't designed to attack

C. Infect files on write‐protected disks

D. None of the above

Answer & Solution

Answer: Option D

Solution:

Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Section – 4

1.

Which of the following is an advantage of e-books?

A. reduced transaction costs for the user

B. requirement of expensive devices to use

C. portability compared to print books

D. copyright management

Answer & Solution

Answer: Option A

Solution:

Reduced transaction costs for the user is an advantage of e-books. An electronic book, also known as an e-book or eBook, is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices.

2.

In simple terms, what does risk assessment ask?

A. What can go wrong?

B. How likely is it to go wrong?

C. What are the possible consequences if it does go wrong?

D. All of the above

Answer & Solution

Answer: Option D

Solution:

In simple terms, risk assessment can ask What can go wrong? How likely is it to go wrong? and What are the possible consequences if it does go wrong?

3.

After television, the next largest major player in the commercial entertainment industry is _________.

A. video games

B. music

C. radio

D. film

Answer & Solution

Answer: Option D

Solution:

After television, the next largest major player in the commercial entertainment industry is film.

4.

Which of the following is a characteristic of a firewall?

A. Examines each message as it seeks entrance to the network

B. Blocks messages without the correct markings from entering the network

C. Detects computers communicating with the Internet without approval

D. All of the above

Answer & Solution

Answer: Option D

Solution:

The characteristic of a firewall Examines each message as it seeks entrance to the network, Blocks messages without the correct markings from entering the network and Detects computers communicating with the Internet without approval.

5.

Which of the following is not an entertainment industry value chain model?

A. content owner direct model

B. user distribution model

C. aggregator model

D. Internet innovator model

Answer & Solution

Answer: Option B

Solution:

User distribution model is not an entertainment industry value chain model. Distribution model defines which applications in your distributed systems communicate with each other and which types of data are distributed.

6.

Which of the following are ways to prove access rights?

A. What you know, like a password

B. What you have, like an ATM card

C. What you look like

D. All of the above

Answer & Solution

Answer: Option D

Solution:

What you know, like a password, What you have, like an ATM card and What you look like all are ways to prove access rights.

7.

Technologies that help enhance resolution of e-book reader display screens are known as _________.

A. high-res pixel formatting

B. screen resolution technologies

C. sub-screen smoothing technologies

D. sub-pixel display technologies

Answer & Solution

Answer: Option D

Solution:

Technologies that help enhance resolution of e-book reader display screens are known as sub-pixel display technologies. Subpixel rendering is a way to increase the apparent resolution of a computer's liquid crystal display (LCD) or organic light-emitting diode (OLED) display by rendering pixels to take into account the screen type's physical properties.

8.

Which item can a password be used to protect?

A. Network

B. File

C. Folder

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Network, File and Folder can be protected by using a password.

9.

All of the following are characteristics of a social network except _______.

A. involves a group of people

B. features shared social interaction

C. always feature shared goals and purposes

D. common ties among members

Answer & Solution

Answer: Option C

Solution:

All of the following are characteristics of a social network except always feature shared goals and purposes.

10.

Which is the most important component of IT?

A. Information

B. People

C. Information technology

D. Computers

Answer & Solution

Answer: Option B

Solution:

People is the most important component of IT. Their human-resource systems shine! People play a vital role in most operational systems and processes. Knowledge, skills and attitudes often determine the quality and quantity of system output.

11.

Social networking sites primarily earn their revenue through _________.

A. advertising

B. subscriptions

C. donations

D. service fees

Answer & Solution

Answer: Option A

Solution:

Social networking sites primarily earn their revenue through advertising. The most common way for websites to generate revenue is to allow companies to advertise on the site. Web advertising is still an emerging market.

12.

Which of the following applies to the implementation of an idea?

A. Copyright

B. Intellectual property

C. Patent

D. Denial‐of‐service attack

Answer & Solution

Answer: Option C

Solution:

Patent applies to the implementation of an idea.

13.

The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.

A. general community

B. practice network

C. affinity community

D. interest-based social network

Answer & Solution

Answer: Option D

Solution:

The type of social network described as a community built around a common interest such as games, sports, music, and so on is called interest-based social network. An interest-based network is exactly what it sounds like: a social network built around interests, using common threads to bring members of an audience together. Whether for travel, food, fashion or cats, interest-based networks are taking over the social media scene, and brands that get it stand to reap the benefits.

14.

When you purchase copyrighted software, what actually are you paying for?

A. The cost of the CDs, manuals, and development of the software

B. The cost of the CDs, manuals, and a share of the cost of the software development

C. A share of the cost of software development

D. All of the above

Answer & Solution

Answer: Option D

Solution:

When we purchase copyrighted software, we are actually paying for The cost of the CDs, manuals, and development of the software, The cost of the CDs, manuals, and a share of the cost of the software development and A share of the cost of software development.

15.

Auction sites like eBay tend to use _______ pricing.

A. dynamic

B. fixed

C. trigger

D. utilization

Answer & Solution

Answer: Option A

Solution:

Auction sites like eBay tend to use dynamic pricing. Dynamic pricing is the latest pricing trend that has taken the ecommerce industry by storm.

16.

Which of the following is not a dimension of privacy?

A. Need for personal space

B. Need to feel in control of our possessions

C. Need to feel in control of our personal information

D. All of the above are dimensions of privacy

Answer & Solution

Answer: Option D

Solution:

Need for personal space, Need to feel in control of our possessions and Need to feel in control of our personal information all are dimension of privacy.

17.

Which of the following is not considered to be a drawback of Internet auctions?

A. market inefficiency

B. trust risks

C. fulfillment costs

D. delayed consumption costs

Answer & Solution

Answer: Option A

Solution:

Market inefficiency is not considered to be a drawback of Internet auctions. A market anomaly (or market inefficiency) in a financial market is a price and/or rate of return distortion that seems to contradict the efficient-market hypothesis.

18.

Which of the following captures screen images?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen capture software

Answer & Solution

Answer: Option D

Solution:

Screen capture software captures screen images. Screen recording software lets you capture your screen to share with others, in support tickets, product videos, onboarding training, and more.

19.

The marketplace for auction sites is best described as __________.

A. many sites attaining similar levels of profitability

B. easy to enter due to minimal barriers

C. populated mostly with small, thriving specialty sites

D. dominated by a handful of sites with established networks

Answer & Solution

Answer: Option D

Solution:

The marketplace for auction sites is best described as dominated by a handful of sites with established networks.

20.

Which of the following examines information passing through switches, hubs, or routers?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen captures

Answer & Solution

Answer: Option B

Solution:

Packet sniffer examines information passing through switches, hubs and routers. Packet sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer.

21.

A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.

A. market neutrality

B. buyer bias

C. seller bias

D. owner bias

Answer & Solution

Answer: Option B

Solution:

A dynamically priced market that features few buyers and many sellers is a market that exhibits buyer bias.

22.

Which of the following records logons and deletions?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen captures

Answer & Solution

Answer: Option C

Solution:

Log analysis tools records logons and deletions. Log analysis helps us in understanding what has happened and derive useful metrics in monitoring, performance, digital marketing etc.

23.

The most popular type of auction on eBay is the _________.

A. Dutch Internet auction

B. Name Your Own Price auction

C. English auction

D. Professional service auction

Answer & Solution

Answer: Option C

Solution:

The most popular type of auction on eBay is the English auction. English auction, also known as an open ascending price auction. This type of auction is arguably the most common form of auction in use today.

24.

E‐mail messages may be stored on which of the following computers?

A. Sender's computer

B. Sender's server

C. Recipient's server

D. All of the above

Answer & Solution

Answer: Option D

Solution:

E‐mail messages may be stored on Sender's computer, Sender's server and Recipient's server.

25.

Which of the following is not a primary function of a portal?

A. navigation of the Web

B. social networking

C. commerce

D. content

Answer & Solution

Answer: Option B

Solution:

Social networking is not a primary function of a portal. Social networking is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients.

26.

What might identity thieves do with your identity?

A. Apply for and use credit cards

B. Apply for a loan

C. Change their identity

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund.

27.

Which portal business model best describes Yahoo?

A. general purpose portal

B. affinity group based vertical market

C. focused content based vertical market

D. none of the above

Answer & Solution

Answer: Option A

Solution:

General purpose portal business model best describes Yahoo. Yahoo! is an Internet portal that incorporates a search engine and a directory of World Wide Web sites organized in a hierarchy of topic categories.

28.

Which of the following is not a common approach to phishing?

A. Send an official‐looking e‐mail asking for confidential information

B. Ask people to fill out and return a fake letter using postal mail

C. Ask people to click a link in an e‐mail to open a submission form on a web page

D. All of the above are uncommon approaches to phishing

Answer & Solution

Answer: Option B

Solution:

Asking people to fill out and return a fake letter using postal mail is not a common approach to phishing.

29.

Which of the following portal revenue models involves charging for premium content?

A. ISP services

B. General advertising

C. Subscription fees

D. Tenancy deals

Answer & Solution

Answer: Option C

Solution:

Subscription fees portal revenue models involves charging for premium content.

30.

A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?

A. Phishing

B. Carding

C. Brand spoofing

D. All of the above

Answer & Solution

Answer: Option D

Solution:

A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called Phishing, Carding and Brand spoofing.

31.

Which of the following best describes predicted growth in C2C and B2C auction spending?

A. B2C spending will overtake C2C spending

B. Both types of spending will increase

C. C2C spending will decrease while B2C increases

D. Both types of spending will decline at similar rates

Answer & Solution

Answer: Option B

Solution:

Both types of spending will increase best describes predicted growth in C2C and B2C auction spending.

32.

Companies can gather information about employees and potential employees from which of the following places?

A. Job applications

B. Credit reports

C. Companies that track Web surfers

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Companies can gather information about employees and potential employees from Job applications, Credit reports and Companies that track Web surfers.

33.

An auction that has multiple winners that all pay the same price is an example of________.

A. uniform pricing

B. discriminatory pricing

C. bid rigging

D. price matching

Answer & Solution

Answer: Option A

Solution:

An auction that has multiple winners that all pay the same price is an example of uniform pricing. It is also called "simple monopoly pricing". The buyers are free to choose the quantity at a fixed price.

34.

Cyber slacking consists of what activities?

A. Visiting “inappropriate” web sites

B. Visiting news sites

C. Chatting online with others about non‐work topics

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Cyber slacking consists of Visiting “inappropriate” web sites, Visiting news sites and Chatting online with others about non‐work topics.

35.

The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.

A. ECD

B. EDI

C. IDE

D. BCB

Answer & Solution

Answer: Option B

Solution:

The communication standard for sharing business documents and settlement information that emerged in the 1970s is called EDI. Electronic data interchange is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.

36.

Cookies are used to do which of the following?

A. Store your ID and password for subsequent logons to the site

B. Store contents of electronic shopping carts

C. To track web activity

D. All of the above and more

Answer & Solution

Answer: Option D

Solution:

Cookies are used to Store your ID and password for subsequent logons to the site, Store contents of electronic shopping carts and To track web activity.

37.

All of the following are potential benefits of B2B e-commerce except_________.

A. reduced amount of 'first-mover' advantages

B. decreased product cycle time

C. increased opportunities for collaborating with suppliers and distributors

D. increased production flexibility

Answer & Solution

Answer: Option A

Solution:

All of the following are potential benefits of B2B e-commerce except reduced amount of 'first-mover' advantages.

38.

Unsolicited e‐mail is called what?

A. Junk mail

B. Spam

C. Extra mail

D. None of the above

Answer & Solution

Answer: Option B

Solution:

Unsolicited e‐mail is called Spam. Spam is electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited.

39.

Goods directly involved in the production process are known as _________.

A. MRO goods

B. procured goods

C. indirect goods

D. direct goods

Answer & Solution

Answer: Option D

Solution:

Goods directly involved in the production process are known as direct goods. Direct goods and services are purchases that are directly related to the production of the particular good or service that is being offered.

40.

What is the name of the new anti‐Spam bill?

A. No‐Spam

B. CAN‐Spam

C. Spam‐Away

D. Stop Spam

Answer & Solution

Answer: Option B

Solution:

CAN‐Spam is the name of the new anti‐Spam bill. Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) is a law that establishes the rules for commercial email and commercial messages, gives recipients the right to have a business stop emailing them, and outlines the penalties incurred for those who violate the law.

41.

A materials requirements planning (MRP) system is an example of ______.

A. spot purchasing

B. a multi-tier supply chain

C. a legacy computer system

D. electronic data interchange

Answer & Solution

Answer: Option C

Solution:

A materials requirements planning (MRP) system is an example of a legacy computer system. Material requirements planning (MRP) is a system for calculating the materials and components needed to manufacture a product. It consists of three primary steps: taking inventory of the materials and components on hand, identifying which additional ones are needed and then scheduling their production or purchase.

42.

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

A. Ethics

B. Intellectual property

C. Copyright

D. Fair Use Doctrine

Answer & Solution

Answer: Option C

Solution:

Copyright is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents. Copyright refers to the legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy.

43.

The foundation for contemporary supply chain management systems includes all of the following except _________.

A. supply chain simplification

B. continuous inventory replenishment

C. ERP systems

D. B2B electronic storefronts

Answer & Solution

Answer: Option D

Solution:

The foundation for contemporary supply chain management systems includes all of the following except B2B electronic storefronts.

44.

What is the unauthorized use, duplication, distribution or sale of copyrighted software?

A. Fair Use Doctrine

B. Pirated software

C. Counterfeit software

D. Privacy

Answer & Solution

Answer: Option B

Solution:

Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted software. Software piracy is the illegal copying, distribution, or use of software.

45.

The two main types of Internet-based B2B commerce are_________.

A. Net marketplaces and private industrial networks

B. EDI and collaborative commerce

C. Net marketplaces and collaborative commerce

D. EDI and private industrial networks

Answer & Solution

Answer: Option D

Solution:

The two main types of Internet-based B2B commerce are EDI and private industrial networks.

46.

What is a program, when installed on a computer, records every keystroke and mouse click?

A. Key logger software

B. Hardware key logger

C. Cookie

D. Adware

Answer & Solution

Answer: Option A

Solution:

Key logger software is a program, when installed on a computer, records every keystroke and mouse click. A keylogger can be either a piece of software or a small hardware device that is used to capture the keystrokes that are typed on the keyboard.

47.

The type of Net marketplace characterized by indirect inputs and spot purchasing is called an _______.

A. industry consortium

B. independent exchange

C. e-distributor

D. e-procurement marketplace

Answer & Solution

Answer: Option C

Solution:

The type of Net marketplace characterized by indirect inputs and spot purchasing is called an e-distributor. E-distribution is a type of distribution that uses purely electronic media. It is often interpreted as the buying or selling of services or goods over a public network without the physical media; this is usually done by downloading from the Internet to the consumer's electronic device.

48.

What is software you don't want hidden inside a software?

A. Adware

B. Trojan‐horse software

C. Spyware

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Adware, Trojan‐horse software and Spyware is software we don't want hidden inside a software.

49.

The most common and easily understood type of Net marketplace is ______.

A. e-procurement marketplace

B. e-distributors

C. industry consortia

D. independent exchanges

Answer & Solution

Answer: Option B

Solution:

The most common and easily understood type of Net marketplace is e-distributors. is a type of distribution that uses purely electronic media. It is often interpreted as the buying or selling of services or goods over a public network without the physical media; this is usually done by downloading from the Internet to the consumer's electronic device.

50.

What is an electronic representation of cash?

A. Digital cash

B. Electronic cash

C. E‐cash

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Digital cash, Electronic cash and E‐cash is an electronic representation of cash.

51.

All of the following are objectives of private industrial networks except ________.

A. developing efficient purchasing and selling business processes industry-wide

B. operating on a local scale

C. creating increased supply chain visibility

D. reducing industry risk

Answer & Solution

Answer: Option B

Solution:

All of the following are objectives of private industrial networks except operating on a local scale.

52.

What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?

A. Wearable computer

B. GPS

C. Implant chip

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Wearable computer is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt.

53.

Which of the following is not one of the benefits of e-commerce to sellers?

A. E-commerce offers greater flexibility in meeting customer needs

B. E-commerce is a powerful tool for customer relationship building

C. E-commerce can help to reduce costs

D. E-commerce increases the net cost per contact

Answer & Solution

Answer: Option D

Solution:

E-commerce increases the net cost per contact is not one of the benefits of e-commerce to sellers.

54.

What is a technology‐enabled microchip implanted into the human body?

A. Wearable computer

B. GPS

C. Implant chip

D. None of the above

Answer & Solution

Answer: Option C

Solution:

Implant chip is a technology‐enabled microchip implanted into the human body. A human microchip implant is typically an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being.

55.

The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________.

A. Business to Business (B2B)

B. Consumer to Consumer (C2C)

C. Consumer to Business (C2B)

D. Business to Consumer (B2C)

Answer & Solution

Answer: Option C

Solution:

The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as Consumer to Business (C2B). Consumer-to-business (C2B) is a business model in which consumers (individuals) create value and businesses consume that value.

56.

Which of the following is not a reason why digital cash has turned out to be extremely difficult?

A. If your system crashes you lose your money

B. There is only one standard

C. Digital cash makes money laundering easy

D. Digital cash travels across the vast Internet and is susceptible to begin stolen

Answer & Solution

Answer: Option B

Solution:

There is only one standard is not a reason why digital cash has turned out to be extremely difficult.

57.

A _________ is a B2B trading network that links a particular seller with its own trading partners.

A. bitstream

B. virtual network

C. web community

D. private trading network

Answer & Solution

Answer: Option D

Solution:

A private trading network is a B2B trading network that links a particular seller with its own trading partners. Private e-marketplaces, also known as private trading networks, are particularly well suited for manufacturing organizations such as Cisco's that: Cisco's eHub Initiative.

58.

Smart card is better protected than other cards using.

A. Encryption

B. Firewall

C. Hub

D. All the above

Answer & Solution

Answer: Option A

Solution:

Smart card is better protected than other cards using Encryption. Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

59.

The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.

A. marketing

B. click-and-mortar

C. customer service

D. corporate

Answer & Solution

Answer: Option D

Solution:

The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a corporate website. The purpose of these sites is to provide information about the company and its products or services.

60.

Trust card is introduced by.

A. BSNL and itzcash

B. BSNL and oxicash

C. BSNL only

D. None

Answer & Solution

Answer: Option A

Solution:

Trust card is introduced by BSNL and itzcash. Trust Card is a multipurpose prepaid payment card brought to you by BSNL in association with ItzCash. With this card you can make payments for your BSNL Bills (Postpaid bills & Prepaid top-ups), purchase BSNL Value Added Services viz.

61.

______________ marketing is the Internet version of word-of-mouth marketing.

A. Visceral

B. Virile

C. Viral

D. Virtual

Answer & Solution

Answer: Option C

Solution:

Viral marketing is the Internet version of word-of-mouth marketing. Viral Marketing is that which is able to generate interest and the potential sale of a brand or product through messages that spread like a virus, in other words, quickly, and from person to person. The idea is for it to be the users themselves that choose to share the content.

62.

PaisaPay is offered only by.

A. Homeshop18.com

B. eBay.in

C. amazon.com

D. none

Answer & Solution

Answer: Option B

Solution:

PaisaPay is offered only by eBay.in. An eBay India owned, safe & secured payment service; PaisaPay enables Buyers to pay for their purchases using Credit Card, Debit Card, Online Bank Transfer or Cash on Delivery.

63.

Why would a merchant want to customize products?

A. To charge a higher price

B. To decrease costs

C. It is required in EC

D. Customers will only accept customized products

Answer & Solution

Answer: Option A

Solution:

A merchant want to customize products because to charge a higher price.

64.

The E‐payment mechanism widely used in B2B is.

A. Credit card

B. Debit card

C. Master card

D. E‐cheque

Answer & Solution

Answer: Option D

Solution:

The E‐payment mechanism widely used in B2B is E‐cheque. An electronic version or representation of a paper cheque. The account holder writes an e-check (or e-cheque) using a computer or other type of electronic device and transmits the e-cheque to the payee electronically. Like paper cheques, e-checks are signed by the payer and endorsed by the payee.

65.

A website offering content created by third party transparently to customers is an example of ________.

A. Reintermediation

B. Syndication

C. Virtual Manufacturing

D. Build-to-order

Answer & Solution

Answer: Option B

Solution:

A website offering content created by third party transparently to customers is an example of Syndication. a group of individuals or organizations combined or making a joint effort to undertake some specific duty or carry out specific transactions or negotiations.

66.

Which type of technology will increase portability and mobility?

A. Implant chips

B. Micro‐payments

C. Internet phone calls

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Implant chips, Micro‐payments and Internet phone calls type of technology will increase portability and mobility.

67.

Which of the following an accurate statement about internet phone calls?

A. They are possible but not yet free

B. They are not possible

C. They are currently standard practice

D. None of the above is an accurate statement about internet phone calls

Answer & Solution

Answer: Option A

Solution:

An accurate statement about internet phone calls is that they are possible but not yet free.

68.

What are the most commonly used input devices today?

A. Keyboard

B. Mouse

C. All of the above

D. None of the above

Answer & Solution

Answer: Option C

Solution:

Keyboard and Mouse are the most commonly used input devices today.

69.

Which of the following can be used to help identify people in a crowd?

A. Biochip

B. Implant chip

C. Facial recognition software

D. Vision chip

Answer & Solution

Answer: Option C

Solution:

Facial recognition software can be used to help identify people in a crowd. A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.

70.

Which one is also known as plastic money?

A. Credit card

B. Debit card

C. Paper cash

D. All of the above

Answer & Solution

Answer: Option A

Solution:

Credit card is also known as plastic money. Credit Card is a small plastic card that is issued by financial institutions such as banks. As the name Credit when one buys using credit card, one is buying by taking loan.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Section – 5

1.

E‐cheques are …………

A. Prepaid

B. Postpaid

C. Both prepaid and postpaid

D. None of these

Answer & Solution

Answer: Option A

Solution:

E‐cheques are Prepaid. E-cheques are a mode of electronic payments.

2.

Digital signature is a.

A. Digital id,send as an attachment to a web page/e‐mail/message

B. Is used for verifying the attachments send using web

C. Both a and b

D. None of these

Answer & Solution

Answer: Option C

Solution:

Digital signature is a Digital id,send as an attachment to a web page/e‐mail/message and it is used for verifying the attachments send using web. A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

3.

Which one is the component of cybercash payment system?

A. CC user software

B. CC merachant software

C. CC Server Software

D. All of the above

Answer & Solution

Answer: Option D

Solution:

CC user software, CC merachant software and CC Server Software are the component of cybercash payment system.

4.

The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

A. Memory

B. Microchip

C. E‐cash

D. None of the above

Answer & Solution

Answer: Option B

Solution:

The presence of Microchip make the smart card smart.

5.

The smart card which use antenna for reading and writing data.

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

Answer & Solution

Answer: Option D

Solution:

The smart card which use antenna for reading and writing data are Contactless smart card and Proximity smart card.

6.

‐‐‐‐‐‐‐‐‐ card is read only mode.

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

Answer & Solution

Answer: Option C

Solution:

Proximity smart card is read only mode. A proximity card or prox card is a "contactless" smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards.

7.

Which of the smart card uses a sim like structure for reading and writing data?

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

Answer & Solution

Answer: Option A

Solution:

Contact smart card uses a sim like structure for reading and writing data. This type of smart card consists of electrical contacts which are used to connect to the card reader where the card is inserted. The electrical contacts are deployed on a conductive gold plated coating on the card surface.

8.

Which is not a feature of eCommerce?

A. SCM

B. EDI

C. WWW

D. BPR

Answer & Solution

Answer: Option D

Solution:

BPR is not a feature of eCommerce. Business process re-engineering is a business management strategy, originally pioneered in the early 1990s, focusing on the analysis and design of workflows and business processes within an organization.

9.

What is I stands in CIA of smart card?

A. International

B. Integrity

C. Identity

D. None of the above

Answer & Solution

Answer: Option B

Solution:

I stands for Integrity in CIA of smart card. CIA stands for confidentiality, integrity and availability, which are said to be the three most important elements of reliable security.

10.

What is A stands in CIA of smart card?

A. auditing

B. authenticity

C. authorized

D. None of the above

Answer & Solution

Answer: Option B

Solution:

A stands for authenticity in CIA of smart card.

11.

What is C stands in CIA of smart card?

A. confidentiality

B. conference

C. congress

D. None of the above

Answer & Solution

Answer: Option A

Solution:

C stands for confidentiality in CIA of smart card.

12.

Which one is the third party payment providers who offer digital wallets for E‐merchants?

A. Oxicash

B. PayMate

C. PayPass

D. All the above

Answer & Solution

Answer: Option D

Solution:

Oxicash, PayMate and PayPass is the third party payment providers who offer digital wallets for E‐merchants.

13.

Which is used to identify mobile money?

A. MCID

B. MMID

C. RSID

D. NONE OF THE ABOVE

Answer & Solution

Answer: Option B

Solution:

MMID is used to identify mobile money. Mobile Money Identifier (MMID) is a seven-digit number, issued by banks for effecting financial transactions through the user's mobile phone.

14.

‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.

A. Threat

B. Danger

C. Error

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Threat is an act that poses danger to computer assets.

15.

Which one is not a encryption technique?

A. RSA

B. DES

C. AES

D. NONE OF THE ABOVE

Answer & Solution

Answer: Option D

Solution:

RSA, DES and AES all are an encryption technique.

16.

Which one is not used as a security mechanism?

A. Encryption

B. Cryptography

C. Wallets

D. Digital signature

Answer & Solution

Answer: Option C

Solution:

Wallets is not used as a security mechanism. All the others are used.

17.

Which e‐government arena is being used when governmental agencies send out and accept bids for work?

A. G2G  

B. G2B

C. G2C

D. G2G

Answer & Solution

Answer: Option B

Solution:

G2B e‐government arena is being used when governmental agencies send out and accept bids for work. In this type of interaction, e-Governance tools are used to help the business organizations that provide goods and services to seamlessly interact with the government.

18.

Secret key is used for.

A. Public key cryptography

B. Private key cryptography

C. Asymmetric key cryptography

D. None of these

Answer & Solution

Answer: Option B

Solution:

Secret key is used for Private key cryptography. A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code. Secret keys are only shared with the key's generator, making it highly secure. Private keys play an important role in symmetric cryptography, asymmetric cryptography and cryptocurrencies.

19.

Which one is communication channel threat?

A. Sniffer programs

B. Cyber vandalism

C. Integrity threats

D. All of the above

Answer & Solution

Answer: Option D

Solution:

Sniffer programs, Cyber vandalism and Integrity threats are communication channel threat.

20.

Which one is communication channel security protocol?

A. SSL

B. S‐HTTP

C. SET

D. ALL OF THE ABOVE

Answer & Solution

Answer: Option D

Solution:

SSL, S‐HTTP and SET are communication channel security protocol.

21.

The protocol which allows the file transfer between computers is.

A. TCP/IP

B. FTP

C. HTTP

D. SOA

Answer & Solution

Answer: Option B

Solution:

The protocol which allows the file transfer between computers is FTP. The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

22.

E‐Banking is also known as.

A. ATMs

B. Net banking

C. Traditional banking

D. None of these

Answer & Solution

Answer: Option B

Solution:

E‐Banking is also known as Net banking. Electronic banking has many names like e banking, virtual banking, online banking, or internet banking. It is simply the use of electronic and telecommunications network for delivering various banking products and services. Through e-banking, a customer can access his account and conduct many transactions using his computer or mobile phone. In this article, we will look at the importance and types of e-banking services.

23.

__________ is backbone of all E‐payments in E‐commerce.

A. EFT

B. EPS

C. PayPal

D. None of these

Answer & Solution

Answer: Option B

Solution:

EPS is backbone of all E‐payments in E‐commerce. An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. It’s also called an electronic payment system or online payment system.

24.

Which one is a client level threat?

A. Malicious code

B. Viruses

C. Active contents

D. All the above   

Answer & Solution

Answer: Option D

Solution:

Malicious code, Viruses and Active contents are client level threat.

25.

Which one is not an encryption technique?

A. RSA

B. DES

C. AES

D. FTP

Answer & Solution

Answer: Option D

Solution:

FTP is not an encryption technique. The File Transfer Protocol is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

26.

Which one is an encryption technique?

A. RSA

B. DES

C. AES

D. All of the above

Answer & Solution

Answer: Option D

Solution:

RSA, DES and AES are encryption technique.

27.

Which one is not a server level threat?

A. Malicious code

B. CGI threats

C. Database threats

D. Buffer overflows

Answer & Solution

Answer: Option A

Solution:

Malicious code is not a server level threat. Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone.

28.

Which one is not a physical threat?

A. Hacking

B. Storm

C. Phishing

D. None of the above

Answer & Solution

Answer: Option A

Solution:

Hacking is not a physical threat. Hacking generally refers to unauthorized intrusion into a computer or a network.

29.

Which one is a physical threat?

A. Phishing

B. Storm

C. Earthquake

D. All the above

Answer & Solution

Answer: Option D

Solution:

Phishing, Storm and Earthquake all are physical threat.

30.

The basic elements of website is.

A. Home page

B. Web pages

C. Links and banners

D. All the above

Answer & Solution

Answer: Option D

Solution:

The basic elements of website is Home page, Web pages and Links and banners.

31.

Which one is threat for E‐commerce?

A. Trojan horse

B. firewall

C. encryption

D. None

Answer & Solution

Answer: Option A

Solution:

Trojan horse is threat for E‐commerce. A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

32.

Secure communication means.

A. Protect transmission of credit card number

B. Guarantee privacy of customer

C. Unauthorized access of payment details

D. All the above

Answer & Solution

Answer: Option D

Solution:

Secure communication means Protect transmission of credit card number, Guarantee privacy of customer and Unauthorized access of payment details.

33.

Which one is not an offline payment mode?

A. Cash on delivery

B. Cash before delivery

C. Demand drafts

D. e‐cheque

Answer & Solution

Answer: Option D

Solution:

E‐cheque is not an offline payment mode. An eCheque is a payment that you make directly from your bank account. You can only send an eCheque if your bank account is the only payment method attached to your bank account, and you don't have a credit or debit card as a back-up payment method.

34.

Which one is an offline payment mode?

A. Cash on delivery

B. Cash before delivery

C. Credit card

D. Both a and b

Answer & Solution

Answer: Option D

Solution:

Both Cash on delivery and Cash before delivery are offline payment mode.

35.

Which one is not an online payment mode?

A. Cash on delivery

B. Debit card

C. Credit card

D. e‐cheque

Answer & Solution

Answer: Option A

Solution:

Cash on delivery is not an online payment mode. It is an offline payment mode.

36.

which one is not an E‐payment method used in India?

A. Debit card

B. Credit card

C. e‐cheque

D. none

Answer & Solution

Answer: Option D

Solution:

Debit card, Credit card and e‐cheque all are E‐payment method used in India.

37.

OTP stands for.

A. One Time Password

B. On Time processing

C. One time processor

D. None

Answer & Solution

Answer: Option A

Solution:

A one-time password (OTP), also known as one-time pin or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device.

38.

Which one is not a threat for E‐commerce?

A. Trojan horse

B. Viruses

C. Worm

D. None

Answer & Solution

Answer: Option D

Solution:

Trojan horse, Viruses and Worm all are threat for E‐commerce.

39.

Private Key cryptography is also known as __________ cryptography.

A. Public key

B. Symmetric

C. Asymmetric

D. None

Answer & Solution

Answer: Option B

Solution:

Private Key cryptography is also known as Symmetric cryptography. A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format.

40.

Public key cryptography is also known as _________ cryptography.

A. Private key

B. Symmetric

C. Asymmetric

D. None

Answer & Solution

Answer: Option C

Solution:

Public key cryptography is also known as Asymmetric cryptography. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key

41.

What is an arrangement made between e‐commerce sites that direct users from one site to the other?

A. Spam

B. Viral marketing

C. Affiliate programs

D. None of the above

Answer & Solution

Answer: Option C

Solution:

Affiliate programs is an arrangement made between e‐commerce sites that direct users from one site to the other.

42.

Which one is not layer of E‐commerce infrastructure?

A. Physical layer

B. Product layer

C. Service layer

D. None

Answer & Solution

Answer: Option D

Solution:

Physical layer, Product layer and Service layer all are layer of E‐commerce infrastructure.

43.

Which will harm computer resources

A. Worm

B. Virus

C. Trojan horse

D. All the above

Answer & Solution

Answer: Option D

Solution:

Worm, Virus and Trojan horse will harm computer resources.

44.

The study of encryption is called ___________.

A. Decryption

B. Cryptography

C. Firewall

D. All the above

Answer & Solution

Answer: Option B

Solution:

The study of encryption is called Cryptography. Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa.

45.

During E‐commerce transaction we should ensure ___________.

A. Integrity

B. Security

C. Confidentiality

D. All the above

Answer & Solution

Answer: Option D

Solution:

During E‐commerce transaction we should ensure Integrity, Security and Confidentiality.

46.

The virus that are commonly found in word documents are called __________.

A. Macro

B. Trojan horse

C. Script virus

D. None of the above

Answer & Solution

Answer: Option A

Solution:

The virus that are commonly found in word documents are called Macro. A macro virus is a computer virus written in the same macro language used for software programs, including Microsoft Excel or word processors such as Microsoft Word.

47.

The virus that are attached with vb and java files are called.

A. Macro

B. Trojan horse

C. Script virus

D. None of the above

Answer & Solution

Answer: Option C

Solution:

The virus that are attached with vb and java files are called Script virus. A Script Virus is spread via webpages and has several properties such as being easy to program, malicious, and highly infectious. Even if you are a rookie programmer you can create a new type of Script Virus in a short time.

48.

The viruses spreads through __________.

A. Mails

B. Pen drives and cds

C. Websites

D. All the above

Answer & Solution

Answer: Option D

Solution:

The viruses spreads through Mails, Pen drives and cds and Websites.

 

ExamVidya

120 Questions E-Commerce from 1st link

 

MCQ SET -1

1) World Wide Web (WWW) was introduced in the year ……………………

 

      (a) 1994 
(b) 1996 
(c) 1992 
(d) 1990

 

   Click Here for Answer   Answer - (a)    

2) ……………….is an early form of E-commerce


(a) SCM 
(b) EDI 
(c) Both of these 
(d) None of these

 

   Click Here for Answer   Answer - (b)    

3) ………………..is concerned with the buying and selling information, products and services over computer communication networks

      (a) Commerce 
(b) E-Commerce 
(c) E-Business 
(d) None of these

 

   Click Here for Answer   Answer - (b)    

4) ………………..is a set of standards developed in the 1960s to exchange business information and to do electronic transactions

      (a) EDI 
(b) Protocols 
(c) TCP/IP 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

5) Which among the following product is suitable for E-Commerce ?

      (a) Books 
(b) Vegetables 
(c) All of these 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

6) ……………allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company.

      (a) EDI 
(b) Protocols 
(c) Standards 
(d) Business applications

 

   Click Here for Answer   Answer - (a)    

7) Electronic Exchange of business documents in a standard format is known as ………………

      (a) E-commerce 
(b) E-Business 
(c) EDI 
(d) None of these

 

   Click Here for Answer   Answer - (c)    

8) ………………. is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products.

      (a) E-commerce 
(b) EDI 
(c) Networking 
(d) SCM 

 

   Click Here for Answer   Answer - (d)    

9) Which of the following is not a party of SCM ?

      (a) Suppliers 
(b) Manufacturers 
(c) Distributors 
(d) Customers

 

   Click Here for Answer   Answer - (c)    

10) ………………is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means

      (a) E-commerce 
(b) SCM 
(c) EDI 
(d) None of these


   Click Here for Answer   Answer - (a)    

MCQ SET -2

1. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in the Market place.

 

      (a) Process based 
(b) strategic relationship based

      (c) transaction based 
(d) any of these

 

   Click Here for Answer   Answer - (b)    

2 ……………..focus on producing a highly integrated value proposition through a managed process.

      (a) hubs 
(b) community 
(c) contents 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

3 …………………is basically a concept of online marketing and distributing of products and services over the internet

(a) B2G 
(b) B2E 
(c) B2C  
(d) B2B

 

   Click Here for Answer   Answer - (c)    

 

4 ……………………..e-commerce consists of the sale of products or services from a business to the general public

      (a) B2G 
(b) B2E 
(c) B2B 
(d) B2C

 

   Click Here for Answer   Answer - (d)    

5. Which of the following is not suitable for a B2C transaction ?

      (a) clothes 
(b) flowers 
(c) airline reservation 
(d) none

 

   Click Here for Answer   Answer - (d)    

6 ……………..e-commerce transaction has the advantage of eliminating middlemen.

(a) B2G 
(b) B2C  
(c) B2B 
(d) B2E

 

   Click Here for Answer   Answer - (b)    

7………………….e-commerce involves customers gathering information, purchasing and receiving products over an electronic network

      (a) B2G 
(b) B2E 
(c) B2B 
(d) B2C

 

   Click Here for Answer   Answer - (d)    

8. Which among the following is not an user of B2C e-commerce ?                 

      (a) manufacturers 
(b) distributors 
(c) Publishers 
(d) none

 

   Click Here for Answer   Answer - (d)    

9 ………………….e-commerce involves the electronic facilitation of transaction between customers through some third party.

(a) C2C  
(b) B2E 
(c) B2B 
(d) B2G

 

   Click Here for Answer   Answer - (a)    

10. Which among the following is an example of C2C ?

      (a) e-Bay 
(b) Amazon.com 
(c) Rentalic.com 
(d) all of these


   Click Here for Answer   Answer - (d)    

MCQ SET -3

1 …………………is a class of advertising methods which are considered unethical and may even be illegal

 

      (a) Advertorials 
(b) pop-up ads 
(c) Spam e-mail 
(d) malware

 

   Click Here for Answer   Answer - (d)    

2 ……………….is the most common way for purchasing an online advertising

      (a) CPM 
(b) CPC 
(c) Any of these 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

3 ………………are animated full screen ads placed at the entry of a site before a user reaches the intended content.

      (a) pop-up ads  
(b) Intromercials 
(c) Spam e-mail 
(d) malware

 

   Click Here for Answer   Answer - (b)    

4 ………………….are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content.

      (a) Ultramercials 
(b) pop-up ads 
(c) Spam e-mail 
(d) malware

 

   Click Here for Answer   Answer - (a)    

5 ……………facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties.

      (a) Metamediary 
(b) Intermediary 
(c) middlemen 
(d) all of these

 

   Click Here for Answer   Answer - (a)    

6 ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.

      (a) Mobile Commerce 
(b) e-commerce 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

7 …………….provide security and privacy for the use of the web page content

      (a) HTTP 
(b) html 
(c) FTP 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

8 …………………….website is one that changes or customizes itself frequently and automatically based on certain criteria

      (a) Dynamic website 
(b) Static Website 
(c) phish site 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

9 ………………site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business.

      (a) Dynamic website 
(b) Static Website 
(c) phish site 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

10 ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

      (a) customer 
(b) issuer 
(c) Merchant 
(d) Acquirer

 

   Click Here for Answer   Answer – (a)

MCQ SET -4

1. Companies use………………………networks to automate employee related corporate processes.

 

      (a) B2G 
(b) B2E 
(c) B2B 
(d) P2P

 

   Click Here for Answer   Answer - (b)    

2. Which among the following is not a B2E application

      (a) Online Insurance policy management 
(b) Online supply requests

      (c) Special employee offers 
(d) Locate application and tax forms

 

   Click Here for Answer   Answer - (d)    

3 ……………………..streamlines the flow of information and self service capabilities through automation

      (a) SCC 
(b) CRM 
(c) CRP 
(d) SCM

 

   Click Here for Answer   Answer - (a)    

4 ………………is a global web in which millions of users are communicating with each other with the help of computers.

      (a) Internet 
(b) WWW 
(c) both of these 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

5 …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.

      (a) html 
(b) HTTP 
(c) Bothe of these 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

6. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.

      (a) internet 
(b) WWW 
(c) Intranet 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

7 ………refers to a kind of e-commerce which refers to a company selling or buying from other company

(     a) B2G 
(b) B2E 
(c) B2B 
(d) P2P

 

   Click Here for Answer   Answer - (c)    

8. Which of the following is not an example for B2B e-commerce ?

(a) Sending and receiving orders 
(b) Invoice and shopping
(c) all of these 

      (d) none of these

 

   Click Here for Answer   Answer - (d)    

9. A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an example of-----------transaction.

      (a) B2G 
(b) B2E 
(c) B2B 
(d) P2P

 

   Click Here for Answer   Answer - (c)    

10 …………..sites act as an intermediary between someone wanting a product or service and potential providers

      (a) brokering sites 
(b) Information sites 
(c) industry portals 
(d) none of these


   Click Here for Answer   Answer - (a)    

SET -5

 

1. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

 

      (a) Digital signature 
(b) Digital certificates 
(c) SSL 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

2. The information Technology Act [IT ACT] came into effect on

      (a) 16th November 2000 
(b) 15th December 2000

      (c) 17th October 2000 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

3. Information sent over the Internet commonly uses the set of rules called……………………

      (a) TCP/IP 
(b) FTP 
(c) HTTP 
(d) gopher

 

   Click Here for Answer   Answer - (a)    

4 ……………………….is a person who breaks in or trespasses a computer system

      (a) Hacker 
(b) Snooper 
(c) operator 
(d) spoofer

 

   Click Here for Answer   Answer - (a)    

5. E-mail which contain useless material is termed as……………

      (a) Spam 
(b) useless mail 
(c) trunk mail 
(d) Junk mail

 

   Click Here for Answer   Answer - (d)    

6. India has enacted the first IT Act in the year……………………

      (a) 2001 
(b) 2002 
(c) 2009 
(d) 2000

 

   Click Here for Answer   Answer - (d)    

7. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

      (a) Cyber terrorism 
(b) Child pornography 
(c) Video voyeurism 
(d) None of these

 

   Click Here for Answer   Answer - (d)    

8. Trade mark, copyright, patent law etc comes under the purview of……………………

      (a) Data protection 
(b) Telecommunication laws

      (c) Intellectual property laws 
(d) None

 

   Click Here for Answer   Answer - (c)    

9 ……………….is a programme designed o replicate and spread generally with the victim being oblivious to its existence

      (a) hacker 
(b) software 
(c) Computer virus 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

10. Which one of the following is not a principle of e-commerce ?

      (a) privacy 
(b) integrity 
(c) authentication 
(d) none of these


   Click Here for Answer   Answer - (d)    

----------------------------------------------------------------------------------------------------

SET  6

1. A……………portal is a specialized entry point to a specific market place or industry niche.

 

      (a) Vertical portal 
(b) horizontal portal 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

 

2 ………………..are general interest portals covering a wide range of topics and features

      (a) Vertical portal 
(b) horizontal portal 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

 

3. Which among the following is an example for vertical portal ?

      (a) i-village 
(b) Yahoo 
(c) Google 
(d) Net scape

 

   Click Here for Answer   Answer - (a)    

 

4. A portal that helps to establish relations and to conduct transactions between various organizations is termed as………………

      (a) B2B portals 
(b) C2C portals 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

 

5. A …………………….is a software that scours the internet collecting data about every website and every webpage within it

      (a) spiders 
(b) Search Engines 
(c) robots 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

 

6. Search Engines databases are selected and built by computer robot programs called………………

      (a) spiders 
(b) Search Engines 
(c) robots 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

 

7. Which among the following is not an example for Search engine ?

      (a) Google 
(b) MSN 
(c) Alta vista 
(d) none of these

 

   Click Here for Answer   Answer - (d)    

8. Web pages are prepared using their language as…………………

      (a) html 
(b) FTP 
(c) HTTP 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

9. A web page is transferred to users computer through ……………………..

      (a) html 
(b) FTP 
(c) HTTP 
(d) None of these

 

   Click Here for Answer   Answer - (c)    

10. The user reaches this page when they specify the address of a website

      (a) Home page 
(b) Web page 
(c) Summary page 
(d) None of these

 

 

   Click Here for Answer   Answer - (a)   

set 7

1 ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

 

      (a) Debit Card 
(b) credit card
(c) Electronic purse   
(d) any of these

 

   Click Here for Answer   Answer - (c)    

2 ………………is basically a secure gate between our organization data and internet.

      (a) Network firewall 
(b) Antivirus 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

3 ……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

      (a) SSL 
(b) SET 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

4 ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.

      (a) Biometrics 
(b) PIN 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

5. In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity

      (a) Positive ID system 
(b) Negative ID system 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

6. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity

      (a) Positive ID system 
(b) Negative ID system

      (c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

7 …………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.

      (a) Network firewall 
(b) computer virus 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

8. Which among the following is not an example for computer virus ?

      (a) Chernobyl 
(b) Melissa 
(c) I Love You 
(d) None of these

 

   Click Here for Answer   Answer - (d)    

9 ……………………are special type of software meant for limiting the risks of being hit by computer viruses

      (a) Network firewall 
(b) Antivirus 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

10. A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

      (a) Hacker 
(b) spoofer 
(c) operator 
(d) none of these


   Click Here for Answer   Answer - (a)    

set 8

1. The purpose of ………………page is to provide links to other pages

 

      (a) Home page 
(b) Web page 
(c) Summary page 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

2 ……………is an example for a software that visits suggested pages and return the appropriate information to be indexed by the search Engine

      (a) Robot 
(b) Spiders 
(c) Ants 
(d) All

 

   Click Here for Answer   Answer - (d)    

3 ……………………..ads appears as rectangular graphics near the top of the page

      (a) Banner ads 
(b) floating ads 
(c) interstitials 
(d) Unicast ads

 

   Click Here for Answer   Answer - (a)    

4 ………………….ads take up the entire screen and are more powerful than banner ads.

      (a) Banner ads 
(b) floating ads 
(c) interstitials 
(d) Unicast ads

 

   Click Here for Answer   Answer - (b)    

5 ………………………….is a form of advertisement on the web that appears between web pages that the user requests.

      (a) Banner ads 
(b) floating ads 
(c) interstitials 
(d) Unicast ads

 

   Click Here for Answer   Answer - (c)    

6 ……………………is basically a TV commercial that runs in the browser window.

      (a) Banner ads 
(b) floating ads 
(c) interstitials 
(d) Unicast ads

 

   Click Here for Answer   Answer - (d)    

7. Advertisements take the form of a website copy are called…………………

      (a) Advertorials 
(b) pop-up ads 
(c) Spam e-mail 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

8 ………………..is the most unwanted of online advertising methods.

      (a) Advertorials 
(b) pop-up ads 
(c) Spam e-mail 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

9 …………………..is an unsolicited e-mail sent to every e-mail address that a business can find

      (a) Advertorials 
(b) pop-up ads 
(c) Spam e-mail 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

10 …………………..is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants

      (a) Mobile Commerce 
(b) e-commerce 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

SET 9

1.……………….is the exchange of goods or items or commodities and services or applications used for money and deals the money matters

 

      (a) E-commerce 
(b) Commerce 
(c) Both of these 
(d) none

 

   Click Here for Answer   Answer - (b)    

2. …………….is an approach to deliver information differentiated business values called services by combining the system and process generally called resources

      (a) E-business 
(b) E-commerce 
(c) any of these 
(d) none

 

   Click Here for Answer   Answer - (a)    

3. ……………….always operate on intranet

      (a) E--commerce 
(b) E-Business 
(c) EDI 
(d) None of these

 

   Click Here for Answer   Answer - (b)    

4. Which among the following is not an example for E-commerce

      (a) Amazon.com 
(b) Baazar.com 
(c) E-trade.com 
(d) None of these

 

   Click Here for Answer   Answer - (c)    

5. ……………….and ………………… were the enabling technologies that laid the ground work for E-commerce

      (a) SET and SCL 
(b) SCM and ERP 
(c) EDI and EFT 
(d) None of these

 

   Click Here for Answer   Answer - (c)    

6. ………………were the first to establish prominent E-commerce Brands

      (a) Baazar.com 
(b) E-bay and Amazon 
(c) E-trade.com 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

7. …………….is a systems approach to Managing the entire flow of information, materials, and services from raw material suppliers through factories and warehouses to the end customer.

      (a) CRM 
(b) SRM 
(c) EDI 
(d) SCM

 

   Click Here for Answer   Answer - (d)    

8. …………….is a form of supply chain where a series of assembly operations are carried out to obtain the final product

      (a) Converging supply chain 
(b) Diverging supply chain

      (c) Any of these 
(d) None

 

   Click Here for Answer   Answer - (a)    

9.…………………is a form of supply chain where a wide variety of finished goods are produced with limited number of raw material or components.

      (a) Converging structure 
(b) Diverging structure

      (c) Any of these 
(d) None

 

   Click Here for Answer   Answer - (b)    

10……………………is the exchange of services, information or product from one business to a government agency

      (a) B2G 
(b) B2E 
(c) B2B 
(d) P2P

 

   Click Here for Answer   Answer - (c)    

SET 10

 

1 ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.

 

      (a) Network firewall 
(b) Antivirus 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

2 …………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.

      (a) Network firewall 
(b) Antivirus 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

3. SET means ………………

      (a) Standard Electronic Technology 
(b) Standard Electronic Transfer

      (c) Secure Electronic Transaction 
(d) None of these

 

   Click Here for Answer   Answer - (c)    

4. The verification of credit card is done by using…………….. with a communications link to the merchants acquiring bank

      (a) Credit card payment terminal 
(b) Point of Sale

      (c) All of these 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

5. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as…………………

      (a) Spoofing 
(b) Snooping 
(c) Sniffing 
(d) None of these

 

   Click Here for Answer   Answer - (a)    

6. Gain entry into the user’s system and scan your file system for personal information is known as……………….

      (a) Spoofing 
(b) Snooping 
(c) Sniffing 
(d) None of these

 

   Click Here for Answer   Answer - (b)    

 

7 ………………attacks are difficult and are only successful if the attacker knows something about the shopper

      (a) Spoofing 
(b) Snooping 
(c) Sniffing 
(d) Guessing passwords

 

   Click Here for Answer   Answer - (d)    

8 …………………is the process of making information unintelligible to the unauthorized user.

      (a) Spoofing 
(b) Snooping 
(c) Sniffing 
(d) Cryptography

 

   Click Here for Answer   Answer - (d)    

9 ………………….is the reverse process of encryption, to make the information readable once again

      (a) Spoofing 
(b) Decryption 
(c) Sniffing 
(d) Cryptography

 

 

 

   Click Here for Answer   Answer - (b)    

 

10. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

      (a) cyber signature 
(b) Digital signature 
(c) SSL 
(d) none of these

 

 

   Click Here for Answer   Answer - (b)    

SET 11

. Peer to Peer [P2P] is also used to describe ………………………


(a) C2C 

      (b) B2E 
(c) B2B 
(d) B2C

 

   Click Here for Answer   Answer - (a)    

2 …………………….is an online auctioning site that facilitates the trade of privately owned items between individuals.

      ­(a) e-Bay 
(b) Amazon.com 
(c) Rentalic.com 
(d) all of these

 

   Click Here for Answer   Answer - (a)    

3. Monster.com is an example of ……………………..website

(a) C2C 
(b) B2E 
(c) B2B 
(d) B2C

 

   Click Here for Answer   Answer - (a)    

4 ………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files

(a) B2C
(b) B2E 
(c) B2B 
(d) P2P 

 

   Click Here for Answer   Answer - (d)    

5. This is a protocol which allows files to be transferred from one computer to another computer

(a) TCP/IP 
(b) FTP 
(c) HTTP 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

6. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html

(a) Web page 
(b) home page 
(c) domain 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

7 ………………….is the first page of a web site.

(a) Web page 
(b) home page 
(c) domain 
(d) none of these

 

   Click Here for Answer   Answer - (b)    

8 ……………..allows the person to type ion just the main word or words and the site will come in

(a) Web page 
(b) home page 
(c) domain 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

9. ”Google” is one of the most popular………………..

(a) Portal 
(b) Browser 
(c) Search Engine 
(d) none of these

 

   Click Here for Answer   Answer - (c)    

10. A ………………….. presents information from diverse sources in a unified way in a web site.

(a) Web portal 
(b) Link page 
(c) Both of these 
(d) none of these


   Click Here for Answer   Answer - (c)    

MCQ SET -12

1 ……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments

 

      (a) customer 
(b) issuer 
(c) Merchant 
(d) Acquirer

 

   Click Here for Answer   Answer - (d)    

2. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.

      (a) Prepaid 
(b) Post paid 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

3 ………………type of payment system is highly useful to those customers who would like to control overspending,

      (a) Prepaid 
(b) Post paid 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

4 ……………………….credit card gives all the advantages of a normal credit card without worrying about the interest charges

      (a) Prepaid 
(b) Post paid 
(c) both of these 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

5 ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the rest of the payment to the next month.

      (a) Cash advance 
(b) Revolver 
(c) Tele draft 
(d) None of these

 

   Click Here for Answer   Answer - (b)    

6 …………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.

      (a) E-cash 
(b) Digicash 
(c) Cyber cash 
(d) any of these

 

   Click Here for Answer   Answer - (d)    

7 ………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

      (a) Credit card 
(b) E-Cheques 
(c) E-cash 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

8. To accept a credit card for payment, we have to open a …………………account with our bank

      (a) Savings Bank 
(b) Current account 
(c) Merchant account 
(d) any of these

 

   Click Here for Answer   Answer - (c)    

 

9. A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.

      (a) smart Cards 
(b) E-Cheques 
(c) E-cash 
(d) none of these

 

   Click Here for Answer   Answer - (a)    

10 ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

      (a) Debit Card 
(b) Electronic purse 
(c) credit card 
(d) any of these

 

   Click Here for Answer   Answer - (a)    


-----------------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

Comments

  1. I’m going to read this. I’ll be sure to come back. thanks for sharing. and also This article gives the light in which we can observe the reality. this is very nice one and gives indepth information. thanks for this nice article... suncoast 48re rebuild kit

    ReplyDelete
  2. Really a great addition. I have read this marvelous post. Thanks for sharing information about it. I really like that. Thanks so lot for your convene. Paginas web Aguascalientes

    ReplyDelete

Post a Comment

Popular posts from this blog

VEP MCQs

ERP MCQs (Enterprise Resource Planning)