e-commerce mcq
e-commerce mcq
QUESTION BANK
E-COMMERCE
For IV Sem II-B.com(CA)
UNIT-I
1. EDI standards are
(a) not universally available (b) essential for B2B commerce (c) not required for B2B
commerce
(d) still being evolved
2. EDI requires
(a) representation of common business documents in computer readable forms
(b) data entry operators by receivers (c) special value added networks
(d) special hardware at co-operating Business premises
3.The document standards for EDI were first developed by large business house during the
1970s and are now under the control of the following standard organization.
a)ISO b)ANSI c) ITU-T d) IEEE
4. Which e-business model allows consumers to name their own price for products and
services ?
A)B2B B)B2G C)C2C D)C2B
5. Which is the most valuable electronic commerce to the individual customer in long run ?
a)Business to Customer b)Business to Business c)Customer to Customer
d)None of the above
6. The principal electronic payment systems for electronic commerce is
a)Credit Card b)Digital Wallet c)Electronic Cheque d)All of the above
7. "M-Commerce" refers to
A. A myth which does not exist in reality
B. The ability of business to reach potential customers wherever they are
C. The ability to have large capacity of memory storage dealing trade and commerce
D. None of the above
8.The mercantile process model consists of the following phase(s):
(A) The pre-purchase phase. (B) Purchase consummation phase.
(C) Post-purchase Interaction (D) All of the above.
9. Amazon.com comes under the following model
(A) B2B (B) B2C (C) C2C (D) C2B
10. Which of the following describes e‐commerce?
a. Doing business electronically b. Doing business c. Sale of goods d. All of the above
11. Which of the following is part of the four main types for e‐commerce?
a. B2B b. B2C c. C2B d. All of the above
12. Which segment do eBay, Amazon.com belong?
a. B2Bs b. B2Cs c. C2Bs d. C2Cs
13. Which type of e‐commerce focuses on consumers dealing with each other?
a. B2B b. B2C c. C2B d. C2C
14. Which segment is eBay an example?
a. B2B b. C2B c. C2C d. None of the above
15. In which website Global Easy Buy is facilitated?
a. Ebay.com b. Amazon.com c. Yepme.com d. None of these
16. The best products to sell in B2C e‐commerce are:
a. Small products b. Digital products c. Specialty products d. Fresh products
17. Which products are people most likely to be more uncomfortable buying on the Internet?
a. Books b. Furniture c. Movies d. All of the above
18. Which products are people most likely to be comfortable buying on the Internet?
a. Books b. PCs c. CDs d. All of the above
19. Digital products are best suited for B2C e‐commerce because they:
a. Are commodity like products b. Can be mass‐customized and personalized c. Can be
delivered at the time of purchase d. All of the above
20. All of the following are techniques B2C e‐commerce companies use to attract customers,
except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual
marketing
21. Which is a function of E‐commerce
a. marketing b. advertising c. warehousing d. all of the above
22. Which is not a function of E‐commerce
a. marketing b. advertising c. warehousing d. none of the above
23. What are plastic cards the size of a credit card that contains an embedded chip on which
digital information can be stored?
a. Customer relationship management systems cards b. E‐government identity cards c. FEDI
cards d. Smart cards
24. Most individuals are familiar with which form of e‐commerce?
a. B2B b. B2C c. C2B d. C2C
25. If the threat of substitute products or services is low it is a(n):
a. Disadvantage to the supplier b. Advantage to the buyer c. Advantage to the supplier d. None
of the above
26. Paisapay is facilitated in
a. eBay.co.in b. amazon.com c. flipkart.com d. none of the above
27. Which of the following is a useful security mechanism when considering business strategy
and IT?
a. encryption b. decryption c. firewall d. all the above
28. Which of the following is not related to security mechanism
a. encryption b. decryption c. e‐cash d. all the above
29. How the transactions occur in e‐commerce?
a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above
30. Which of the following refers to creating products tailored to individual customers?
a. customization b. aggregation c. Direct materials d. Reverse auction
31. ____ is an e-commerce model which focuses on consumers dealing with one another.
a) Business to Business b) Consumer to Consumer
c) Consumer to Business d) Business to Consumer
32. Which of the following is/are considered examples of the Consumer to consumer (C2C)
model?
a) Amazon.com b) e-bay c) Rentalic.com d) All of the above
33. Which of the following is the set of planned activities that are designed to result in a profit in
the marketplace?
a) Profit model b) Business model c) Business plan d) Revenue model
34. In which year WWW (World Wide Web) was introduced?
a) 1996 b) 1994 c) 1990 d) 1991
35. Which of the following is an early form of e-commerce?
a) EDI b) SCM c) Both of these d) None of the above
36. ____ is an example of an Internet portal.
a) Yahoo b) e-bay c) Amazon d) Facebook
37. 1. Network layer firewall works as a __________
a) Frame filter b) Packet filter c) Content filter d) Virus filter
38. Network layer firewall has two sub-categories as _________
a) State full firewall and stateless firewall b) Bit oriented firewall and byte oriented firewall
c) Frame firewall and packet firewall d) Network layer firewall and session layer firewall
39. . Which of the following is / are the types of firewall?
a) Packet Filtering Firewall b) Dual Homed Gateway Firewall
c) Screen Host Firewall d) Dual Host Firewall
40. A packet filter firewall filters at __________
a) Physical layer b) Data link layer c) Network layer or Transport layer
d) Application layer
41. A stateful firewall maintains a ___________ which is a list of active connections.
a) Routing table b) Bridging table c) State table d) Connection table
42. A firewall needs to be __________ so that it can grow proportionally with the network that
it protects.
a) Robust b) Expansive c) Fast d) Scalable
43. Packet sniffers involve ____________
a) Active receiver b) Passive receiver c) Legal receiver
d) Partially-active receiver
44. Sniffers can be prevented by using _______________
a) Wired environment b) WiFi c) Ethernet LAN d) Switched network
45. Firewalls are often configured to block ___________
a) UDP traffic b) TCP traffic c) Sensitive traffic d) Best-effort traffic
46.A computer virus is __________
a)Fireware b) Software c) Freeware d) Bacteria
47. _______describes e-commerce.
A. Doing business offline B. Doing business electronically
C. Surfing online D. Both A & B
48. _______ is a function of E commerce.
A. Marketing B. Supply Chain C. Finance D. All of the above
49. ________mainly deals buying and selling, especially on a large scale.
A. Shopping B. Retailing C. Distribution D. Commerce
50. E-commerce has _____ scope than E-Business or Digital Business.
A. Higher B. Wider C. Narrower D. More
51. _______is a system of interconnected electronic components or circuits.
A. Marketplaces B. Metamarkets C. Electronic Markets D. Electronic Network
52. All electronically mediated information exchanges are known as _____
A. E-Business B. E-Commerce C. Digital Business D. None of the above
53. ________ is NOT an example of E-Commerce Platform.
A. Amazon Pantry B. Reliance SMART C. Flipkart Plus D. DMart Ready
54.Companies like Flipkart, Shopclues and Myntra belongs to the ________ Ecommerce (EC)
segment.
A. B2B B. P2P c.B2C D.C2B
55. OLX is an example of ________ E-commerce segment.
A. B2B B. B2C C. C2B D. C2C
56. The World Wide Web (WWW) was introduced in the year ……………………
A)1994 B) 1996 C)1992 D)1990
57. Message ________ means that the sender and the receiver expect privacy
A. confidentiality B. integrity C. authentication D. none of the above
58. Message_____ means that the data must arrive at the receiver exactly as sent
A. confidentiality B. integrity C. authentication D. none of the above
59. Message _______ means that the receiver is ensured that the message is coming from the
intended sender.
A. confidentiality B. integrity C. authentication D. none of the above
60. Which of the following are data security consideration?
UNIT-II
61. ________ is the process of retaining or keeping of data at a secure place for long-term
storage.
A. Data archiving B. Archival Storage C. Disposal of Data D. Backup
62. Which of the following is not a form of data archiving?
A. Online B. Offline C. Storage archiving D. Cloud-storage
63. Network security consists of:
A. Protection B. Detection C. Reaction D. All of the above
64. Which of the following we should configure your systems and networks as correctly as
possible?
A. Protection B. Detection C. Reaction D. None of the above
65. What is true about Email security in Network security methods?
A. Phishing is one of the most common ways attackers gain access to a network.
B. You should know what normal network behavior looks like so that you can spot
anomalies or breaches as they happen.
C. You need to employ hardware, software, and security processes to lock those apps down.
D. All of the above
66. Which of the following process is used for verifying the identity of a user?
A. AuthenticationB. Identification C. Validation D. Verification
67. Which of the following are features of E-commerce?
A. Non-Cash Payment B. 24x7 Service availability C. Advertising / Marketing
D. All of the above
68. E-commerce improves the brand image of the company
A. TRUE B. FALSE C. Can be true or falseD. Can not say
69. _________ is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it.
A. Smart card B. E-Money C. Debit Card D. Electronic Fund Transfer
70. Information should not be altered during its transmission over the network means?
A. Confidentiality B. Integrity C. Availability D. Authenticity
71. E-commerce reduces the paper work.
A. Yes B. No C. Can be yes or no D. Cannot say
72………… is a best example of Online Stored Value System.
A. google b) yahoo c) paypal d)go daddy
73.…………….is an early form of E-commerce
UNIT-IV
127. Which of the following network devices is used to filter and forward network traffic
based on MAC addresses?
a) Router
b) Hub
c) Switch
d) Repeater
Answer: c) Switch
128. Which of the following is a type of denial-of-service attack that floods a network with
bogus requests?
a) Smurf Attack
b) Spoofing
c) SYN Flood
d) Ping of Death
Answer: c) SYN Flood
129. Which of the following is a protocol used to securely transfer files over the internet?
a) Telnet
b) FTP
c) SMTP
d) SFTP
Answer: d) SFTP
130. Which of the following is a type of firewall that operates at the application layer of the
OSI model?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Application firewall
d) Network address translation firewall
Answer: c) Application firewall
131. Which of the following is an encryption algorithm used for secure communication
over the internet?
a) DES
b) RSA
c) Blowfish
d) Twofish
Answer: b) RSA
132. Which of the following is a type of network attack in which an attacker intercepts and
modifies network traffic?
a) Spoofing
b) Sniffing
c) Hijacking
d) Injection
Answer: d) Injection
133. Which of the following is a type of security mechanism used to authenticate users and
devices on a network?
a) Encryption
b) Firewall
c) Access control
d) IDS/IPS
Answer: c) Access control
134. Which of the following is a protocol used to secure web traffic over the internet?
a) HTTPS
b) FTPS
c) SFTP
d) SMTPS
Answer: a) HTTPS
135. Which of the following is a type of attack in which an attacker sends a flood of ICMP
packets to a target network?
a) Ping of Death
b) SYN Flood
c) Smurf Attack
d) Teardrop Attack
Answer: c) Smurf Attack
136. Which of the following is a type of network attack in which an attacker masquerades
as a trusted entity to gain unauthorized access to network resources?
a) Injection
b) Spoofing
c) Hijacking
d) Sniffing
Answer: b) Spoofing
137. Which of the following is a type of firewall that examines the state of network
connections to determine whether to allow or block traffic?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Application firewall
d) Network address translation firewall
Answer: b) Stateful inspection firewall
138. Which of the following is a type of authentication that uses physical characteristics
such as fingerprints or facial recognition?
a) Password authentication
b) Two-factor authentication
c) Biometric authentication
d) Token authentication
Answer: c) Biometric authentication
139. Which of the following is a type of attack in which an attacker sends a packet that is
larger than the maximum packet size allowed by the target system?
a) Ping of Death
b) SYN Flood
c) Smurf Attack
d) Teardrop Attack
Answer: a) Ping of Death
140. Which of the following is a type of network attack in which an attacker intercepts
network traffic to capture sensitive information such as passwords or credit card
numbers?
a) Sniffing
b) Injection
c) Spoofing
d) Hijacking
Answer: a) Sniffing
141. Which of the following is a type of attack in which an attacker floods a target system
with a large number of connection requests?
a) Ping of Death
b) SYN Flood
c) Smurf Attack
d) Teardrop Attack
Answer: b) SYN Flood
142. Which of the following is a type of firewall that examines the content of network
traffic to block traffic that matches specific patterns or signatures?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Application firewall
d) Intrusion detection system
Answer: c) Application firewall
143. Which of the following is a type of encryption that uses the same key for both
encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: a) Symmetric encryption
144. Which of the following is a type of security mechanism used to protect network traffic
by hiding the IP addresses of internal devices?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Network address translation
d) Virtual private network
Answer: c) Network address translation
145. Which of the following is a type of attack in which an attacker sends a packet with an
IP address that has been forged to appear to be from a trusted source?
a) Injection
b) Spoofing
c) Hijacking
d) Sniffing
Answer: b) Spoofing
146. Which of the following is a type of authentication that uses a physical device such as a
smart card or token to verify a user’s identity?
a) Password authentication
b) Two-factor authentication
c) Biometric authentication
d) Token authentication
Answer: d) Token authentication
147. Which of the following is a type of attack in which an attacker uses a combination of
social engineering and technical attacks to trick users into revealing sensitive information?
a) Phishing
b) Spear phishing
c) Whaling
d) Vishing
Answer: a) Phishing
148. Which of the following is a type of security mechanism that uses a set of rules to
control access to network resources based on the identity of the user or device?
a) Access control list
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: a) Access control list
149. Which of the following is a type of attack in which an attacker sends a large number
of email messages to a target system with the goal of overloading the system?
a) Smurf Attack
b) Teardrop Attack
c) Ping of Death
d) Email bombing
Answer: d) Email bombing
150. Which of the following is a type of encryption that uses two keys, a public key and a
private key, to encrypt and decrypt data?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: b) Asymmetric encryption
151. Which of the following is a type of security mechanism that uses machine learning
and statistical analysis to detect and block attacks in real time?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: b) Intrusion prevention system
152. Which of the following is a type of attack in which an attacker sends a large number
of ping requests to a target system with the goal of overloading the system?
a) Smurf Attack
b) Teardrop Attack
c) Ping of Death
d) Email bombing
Answer: c) Ping of Death
153. Which of the following is a type of security mechanism that monitors and filters
incoming and outgoing network traffic based on a set of predefined rules?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: d) Firewall
154. Which of the following is a type of encryption that uses the same key to encrypt and
decrypt data?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: a) Symmetric encryption
155. Which of the following is a type of attack in which an attacker intercepts and modifies
data in transit between two systems?
a) Man-in-the-middle attack
b) Denial-of-service attack
c) SQL injection attack
d) Cross-site scripting attack
Answer: a) Man-in-the-middle attack
156. Which of the following is a type of security mechanism that scans network traffic for
known viruses and other malware?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: c) Antivirus software
157. Which of the following is a type of attack in which an attacker sends a malicious email
or instant message that appears to come from a trusted source?
a) Phishing
b) Spear phishing
c) Whaling
d) Vishing
Answer: b) Spear phishing
158. Which of the following is a type of encryption that is used to ensure the integrity of
data by producing a fixed-size output, or hash, that is unique to the input data?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: c) Hashing
159. Which of the following is a type of security mechanism that uses a combination of
hardware and software to encrypt data and protect it from unauthorized access?
a) Virtual private network
b) Intrusion prevention system
c) Antivirus software
d) Secure socket layer
Answer: a) Virtual private network
160. Which of the following is a type of attack in which an attacker floods a target system
with traffic in order to overwhelm it and render it unavailable to legitimate users?
a) Man-in-the-middle attack
b) Denial-of-service attack
c) SQL injection attack
d) Cross-site scripting attack
Answer: b) Denial-of-service attack
161. Which of the following is a type of security mechanism that can detect and prevent
attacks in real-time by analyzing network traffic?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: b) Intrusion prevention system
162. Which of the following is a type of attack in which an attacker inserts malicious SQL
code into a query in order to gain unauthorized access to a database?
a) Man-in-the-middle attack
b) Denial-of-service attack
c) SQL injection attack
d) Cross-site scripting attack
Answer: c) SQL injection attack
163. Which of the following is a type of encryption that is used to sign digital documents
and ensure their authenticity?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: d) Digital signature
164. Which of the following is a type of security mechanism that can detect and prevent
attacks by analyzing system logs for suspicious activity?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: a) Intrusion detection system
165. Which of the following is a type of attack in which an attacker gains access to a system
or network by pretending to be someone else?
a) Phishing
b) Spoofing
c) Whaling
d) Vishing
Answer: b) Spoofing
166. Which of the following is a type of security mechanism that is used to authenticate
users and grant access to resources based on their identity?
a) Access control
b) Intrusion prevention system
c) Antivirus software
d) Secure socket layer
Answer: a) Access control
167. Which of the following is a type of security mechanism that is used to encrypt data as
it is transmitted over a network?
a) Firewall
b) Virtual private network
c) Secure socket layer
d) Intrusion detection system
Answer: c) Secure socket layer
168. Which of the following is a type of attack in which an attacker gains access to a system
or network by exploiting a vulnerability in software or hardware?
a) Phishing
b) Spoofing
c) Exploit
d) Social engineering
Answer: c) Exploit
169. Which of the following is a type of security mechanism that is used to monitor and
control network traffic to and from a network?
a) Firewall
b) Virtual private network
c) Intrusion prevention system
d) Access control
Answer: a) Firewall
170. Which of the following is a type of attack in which an attacker intercepts
communication between two parties in order to steal sensitive information?
a) Phishing
b) Man-in-the-middle attack
c) Spoofing
d) Vishing
Answer: b) Man-in-the-middle attack
171. Which of the following is a type of security mechanism that is used to protect against
viruses, worms, and other types of malware?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: c) Antivirus software
172. Which of the following is a type of attack in which an attacker sends a fraudulent
email or message in order to trick the recipient into revealing sensitive information?
a) Phishing
b) Spoofing
c) Whaling
d) Vishing
Answer: a) Phishing
173. Which of the following is a type of security mechanism that is used to protect against
unauthorized access to a system or network?
a) Access control
b) Intrusion detection system
c) Intrusion prevention system
d) Firewall
Answer: a) Access control
UNIT-V
174. Which of the following is a type of attack in which an attacker gains access to a
network by pretending to be a trusted entity?
a) Spoofing
b) Phishing
c) Man-in-the-middle attack
d) Brute force attack
Answer: a) Spoofing
175.Which of the following describes e‐commerce?
a. Doing business electronically b. Doing business c. Sale of goods d. All of the above
Answer: A
176.Which of the following is part of the four main types for e‐commerce?
a. B2B
b. B2C
c. C2B
d. All of the above
Answer: D
177.Which segment do eBay, Amazon.com belong?
A.B2Bs
B.B2Cs
C.C2Bs
D.C2Cs
Answer: B
178.Which type of e‐commerce focuses on consumers dealing with each other?
A.B2B
B.B2C
C.C2B
D.C2C
Answer: D
179.Which segment is eBay an example?
A.B2B
B.C2B
C.C2C
D.None of the above
Answer: D
180.Which type deals with auction?
A.B2B
B.B2C
C.C2B
D.C2C
Answer: D
181.In which website Global Easy Buy is facilitated?
A.Ebay.com
B.Amazon.com
C.Yepme.com
D.None of these
Answer: A
182.The best products to sell in B2C e‐commerce are:
A.Small products
B.Digital products
C.Specialty products
D.Fresh products
Answer: B
183.Which products are people most likely to be more uncomfortable buying on the
Internet?
A.Books
B.Furniture
C.Movies
D.All of the above
Answer: B
184.Which products are people most likely to be comfortable buying on the
Internet?
A.Books
B.PCs
C.CDs
D.All of the above
Answer: D
185.Digital products are best suited for B2C e‐commerce because they:
A.Are commodity like products
B.Can be mass‐customized and personalized
C.Can be delivered at the time of purchase
D.All of the above
Answer: D
186.The solution for all business needs is
A.EDI
B.ERP
C.SCM
D.None of the above
Answer: B
A.Affiliate programs
B.Click‐through
C.Spam
D.All of the above
Answer: B
191.What is the percentage of customers who visit a Web site and actually buy
something called?
A.Affiliate programs
B.Click‐through
C.Spam
D.Conversion rate
Answer: D
a. Direct materials
b. Indirect materials
c. EDI
d. None of the
above
Answer: A
193.What are materials that are necessary for running a modern corporation, but
do not relate to the company's primary business activities?
A.Direct materials
B.Indirect materials
C.EDI
D.None of the above
Answer: B
194.What are ballpoint pens purchased by a clothing company?
A.Direct materials
B.Indirect materials
C.EDI
D.None of the above
Answer: B
195.What is the process in which a buyer posts its interest in buying a certain
quantity of items, and sellers compete for the business by submitting successively
lower bids until there is only one seller left?
A.B2B marketplace
B.Intranet
C.Reverse auction
D.Internet
Answer: C
196.What are plastic cards the size of a credit card that contains an embedded chip
on which digital information can be stored?
IMPORTANT QUESTIONS
UNIT-I
5 MARKS
1. Classification of electronic commerce?
10 MARKS:
1. Define e-commerce and what are the classification of electronic commerce?
2. What is mean by I way? And what are the component of the I way?
UNIT-II
5 MARKS
1. Define internal information systems
10 MARKS
1. What is EDI and its benefits
2. What is mean by value added network? And write its advantages
UNIT-III
5 MARKS
1.what are the types of firewalls and network security?
10 MARKS
1.what is data and message security and its importance?
2.what are the emerging client/server threats networks security?
UNIT-IV
5 MARKS
1.what are the types of mercantile process models?
10 MARKS
1.what are the different types of consumer oriented electronic commerce?
2.what is mercantile model from consumer perspective?
UNIT-V
5 MARKS
1.What are the types of electronic payment systems?
10 MARKS
1. what is credit card how it is used in electronic payment system?
2. Explain digital token based electronic payment system?