0% found this document useful (0 votes)
50 views31 pages

e-commerce mcq

Uploaded by

jeevijeevitha361
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views31 pages

e-commerce mcq

Uploaded by

jeevijeevitha361
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 31

DEPARTMENT OF COMPUTER SCIENCE &APPLICATION

QUESTION BANK

E-COMMERCE
For IV Sem II-B.com(CA)

UNIT-I
1. EDI standards are
(a) not universally available (b) essential for B2B commerce (c) not required for B2B
commerce
(d) still being evolved
2. EDI requires
(a) representation of common business documents in computer readable forms
(b) data entry operators by receivers (c) special value added networks
(d) special hardware at co-operating Business premises
3.The document standards for EDI were first developed by large business house during the
1970s and are now under the control of the following standard organization.
a)ISO b)ANSI c) ITU-T d) IEEE
4. Which e-business model allows consumers to name their own price for products and
services ?
A)B2B B)B2G C)C2C D)C2B
5. Which is the most valuable electronic commerce to the individual customer in long run ?
a)Business to Customer b)Business to Business c)Customer to Customer
d)None of the above
6. The principal electronic payment systems for electronic commerce is
a)Credit Card b)Digital Wallet c)Electronic Cheque d)All of the above
7. "M-Commerce" refers to
A. A myth which does not exist in reality
B. The ability of business to reach potential customers wherever they are
C. The ability to have large capacity of memory storage dealing trade and commerce
D. None of the above
8.The mercantile process model consists of the following phase(s):
(A) The pre-purchase phase. (B) Purchase consummation phase.
(C) Post-purchase Interaction (D) All of the above.
9. Amazon.com comes under the following model
(A) B2B (B) B2C (C) C2C (D) C2B
10. Which of the following describes e‐commerce?
a. Doing business electronically b. Doing business c. Sale of goods d. All of the above
11. Which of the following is part of the four main types for e‐commerce?
a. B2B b. B2C c. C2B d. All of the above
12. Which segment do eBay, Amazon.com belong?
a. B2Bs b. B2Cs c. C2Bs d. C2Cs
13. Which type of e‐commerce focuses on consumers dealing with each other?
a. B2B b. B2C c. C2B d. C2C
14. Which segment is eBay an example?
a. B2B b. C2B c. C2C d. None of the above
15. In which website Global Easy Buy is facilitated?
a. Ebay.com b. Amazon.com c. Yepme.com d. None of these
16. The best products to sell in B2C e‐commerce are:
a. Small products b. Digital products c. Specialty products d. Fresh products
17. Which products are people most likely to be more uncomfortable buying on the Internet?
a. Books b. Furniture c. Movies d. All of the above
18. Which products are people most likely to be comfortable buying on the Internet?
a. Books b. PCs c. CDs d. All of the above
19. Digital products are best suited for B2C e‐commerce because they:
a. Are commodity like products b. Can be mass‐customized and personalized c. Can be
delivered at the time of purchase d. All of the above
20. All of the following are techniques B2C e‐commerce companies use to attract customers,
except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual
marketing
21. Which is a function of E‐commerce
a. marketing b. advertising c. warehousing d. all of the above
22. Which is not a function of E‐commerce
a. marketing b. advertising c. warehousing d. none of the above
23. What are plastic cards the size of a credit card that contains an embedded chip on which
digital information can be stored?
a. Customer relationship management systems cards b. E‐government identity cards c. FEDI
cards d. Smart cards
24. Most individuals are familiar with which form of e‐commerce?
a. B2B b. B2C c. C2B d. C2C
25. If the threat of substitute products or services is low it is a(n):
a. Disadvantage to the supplier b. Advantage to the buyer c. Advantage to the supplier d. None
of the above
26. Paisapay is facilitated in
a. eBay.co.in b. amazon.com c. flipkart.com d. none of the above
27. Which of the following is a useful security mechanism when considering business strategy
and IT?
a. encryption b. decryption c. firewall d. all the above
28. Which of the following is not related to security mechanism
a. encryption b. decryption c. e‐cash d. all the above
29. How the transactions occur in e‐commerce?
a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above
30. Which of the following refers to creating products tailored to individual customers?
a. customization b. aggregation c. Direct materials d. Reverse auction
31. ____ is an e-commerce model which focuses on consumers dealing with one another.
a) Business to Business b) Consumer to Consumer
c) Consumer to Business d) Business to Consumer
32. Which of the following is/are considered examples of the Consumer to consumer (C2C)
model?
a) Amazon.com b) e-bay c) Rentalic.com d) All of the above
33. Which of the following is the set of planned activities that are designed to result in a profit in
the marketplace?
a) Profit model b) Business model c) Business plan d) Revenue model
34. In which year WWW (World Wide Web) was introduced?
a) 1996 b) 1994 c) 1990 d) 1991
35. Which of the following is an early form of e-commerce?
a) EDI b) SCM c) Both of these d) None of the above
36. ____ is an example of an Internet portal.
a) Yahoo b) e-bay c) Amazon d) Facebook
37. 1. Network layer firewall works as a __________
a) Frame filter b) Packet filter c) Content filter d) Virus filter
38. Network layer firewall has two sub-categories as _________
a) State full firewall and stateless firewall b) Bit oriented firewall and byte oriented firewall
c) Frame firewall and packet firewall d) Network layer firewall and session layer firewall
39. . Which of the following is / are the types of firewall?
a) Packet Filtering Firewall b) Dual Homed Gateway Firewall
c) Screen Host Firewall d) Dual Host Firewall
40. A packet filter firewall filters at __________
a) Physical layer b) Data link layer c) Network layer or Transport layer
d) Application layer
41. A stateful firewall maintains a ___________ which is a list of active connections.
a) Routing table b) Bridging table c) State table d) Connection table
42. A firewall needs to be __________ so that it can grow proportionally with the network that
it protects.
a) Robust b) Expansive c) Fast d) Scalable
43. Packet sniffers involve ____________
a) Active receiver b) Passive receiver c) Legal receiver
d) Partially-active receiver
44. Sniffers can be prevented by using _______________
a) Wired environment b) WiFi c) Ethernet LAN d) Switched network
45. Firewalls are often configured to block ___________
a) UDP traffic b) TCP traffic c) Sensitive traffic d) Best-effort traffic
46.A computer virus is __________
a)Fireware b) Software c) Freeware d) Bacteria
47. _______describes e-commerce.
A. Doing business offline B. Doing business electronically
C. Surfing online D. Both A & B
48. _______ is a function of E commerce.
A. Marketing B. Supply Chain C. Finance D. All of the above
49. ________mainly deals buying and selling, especially on a large scale.
A. Shopping B. Retailing C. Distribution D. Commerce
50. E-commerce has _____ scope than E-Business or Digital Business.
A. Higher B. Wider C. Narrower D. More
51. _______is a system of interconnected electronic components or circuits.
A. Marketplaces B. Metamarkets C. Electronic Markets D. Electronic Network
52. All electronically mediated information exchanges are known as _____
A. E-Business B. E-Commerce C. Digital Business D. None of the above
53. ________ is NOT an example of E-Commerce Platform.
A. Amazon Pantry B. Reliance SMART C. Flipkart Plus D. DMart Ready
54.Companies like Flipkart, Shopclues and Myntra belongs to the ________ Ecommerce (EC)
segment.
A. B2B B. P2P c.B2C D.C2B
55. OLX is an example of ________ E-commerce segment.
A. B2B B. B2C C. C2B D. C2C
56. The World Wide Web (WWW) was introduced in the year ……………………
A)1994 B) 1996 C)1992 D)1990
57. Message ________ means that the sender and the receiver expect privacy
A. confidentiality B. integrity C. authentication D. none of the above

58. Message_____ means that the data must arrive at the receiver exactly as sent
A. confidentiality B. integrity C. authentication D. none of the above

59. Message _______ means that the receiver is ensured that the message is coming from the
intended sender.
A. confidentiality B. integrity C. authentication D. none of the above
60. Which of the following are data security consideration?

A. BackupsB. Archival Storage C. Disposal of Data


D. All of the above

UNIT-II

61. ________ is the process of retaining or keeping of data at a secure place for long-term
storage.
A. Data archiving B. Archival Storage C. Disposal of Data D. Backup
62. Which of the following is not a form of data archiving?
A. Online B. Offline C. Storage archiving D. Cloud-storage
63. Network security consists of:
A. Protection B. Detection C. Reaction D. All of the above
64. Which of the following we should configure your systems and networks as correctly as
possible?
A. Protection B. Detection C. Reaction D. None of the above
65. What is true about Email security in Network security methods?
A. Phishing is one of the most common ways attackers gain access to a network.
B. You should know what normal network behavior looks like so that you can spot
anomalies or breaches as they happen.
C. You need to employ hardware, software, and security processes to lock those apps down.
D. All of the above
66. Which of the following process is used for verifying the identity of a user?
A. AuthenticationB. Identification C. Validation D. Verification
67. Which of the following are features of E-commerce?
A. Non-Cash Payment B. 24x7 Service availability C. Advertising / Marketing
D. All of the above
68. E-commerce improves the brand image of the company
A. TRUE B. FALSE C. Can be true or falseD. Can not say
69. _________ is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it.
A. Smart card B. E-Money C. Debit Card D. Electronic Fund Transfer
70. Information should not be altered during its transmission over the network means?
A. Confidentiality B. Integrity C. Availability D. Authenticity
71. E-commerce reduces the paper work.
A. Yes B. No C. Can be yes or no D. Cannot say
72………… is a best example of Online Stored Value System.
A. google b) yahoo c) paypal d)go daddy
73.…………….is an early form of E-commerce

A.SCM B.EDI C.CRM D. SRM


74.……………..is concerned with the buying and selling information, products and services
over computer communication networks.
a.Commerce b. e-commerce c)e-business d.worker
75. . ………………..is a set of standards developed in the 1960s to exchange business
information and to do electronic transactions.
a.EDI b.Protocol c.TCP/IP d.None of the above
76.which among the following product is suitable for e-commerce?
a)Books b)vegetables c)none of the above d)all the above
77._______ allows a business application on the computer of one organization to communicate
directly with the business application on the computer of another company.
A. EDI b.Protocol c.SRM d)Networking
78. Electronic Exchange of business documents in a standard format is known as ………………
a.E-commerce b.E-business c)EDI d.crm
79. _____is an application layer protocol for distributed, collaborative, hypermedia information
systems.
a.html b.http c.both of these d.None of these
80. ______is an online auctioning site that facilitates the trade of privately owned items between
individuals.
a.e-bay b.Amazon c)Flipkart d.None of these
81. Monster.com is an example of ……………………..website
a.c2c b.b2b c.b2g d.b2c
82._________ protocol which allows files to be transferred from one computer to another
computer
a.FTP b.smtp c.TCP d.IP
83. ______is the most unwanted of online advertising methods.
a.pop-up-ads b.spam c.rules d.none of the above
84. .______is the buying and selling of goods and services through wireless handled devices
such as cellular phone and Personal Digital Assistants
a.M-commerce b.commerce c.E-commerce d.spam
85. _______provide security and privacy for the use of the web page content
a.HTTP b.HTML c.FTP d.IP
86. Purchasing and selling products online is referred to as?
A. E-Commerce B. Cyber-Selling C. Hyper-Marketing D. Euro-Conversio
87. Which of the following describes E‐Commerce?
A. Business activities B. Sale of goods C. Doing business online D. All of the above
88. Which of the following is not a major form of E-Commerce?
A. C2B B. B2C C. B2B D. C2C
89. The aspect of E-Commerce that allows for cross-border trade is known as.
A. Interactivity B. Global reach C. Richness D. Ubiquity
90. Which is not a function of E-Commerce?
A. Marketing B. Advertising C. Warehousing D. None of these
UNIT-III
91. What is an early form of E-Commerce?
A. EDI B. SCM C. Both of these D. None of the above
92. . Compared to B2C E-Commerce, B2B E-Commerce is B2B E-Commerce is
A. Of equal size B. A little smaller C. A little bigger D. Much larger
93. A system of interconnected electronic components or circuits is known as-
A. Electronic Network B. Metamarkets C. Electronic Markets D. Marketplaces
94. Which of the following is not a benefit of E-commerce?
A. Fast process B. Inconvenience C. Always on D. Reduced cost price
95. Which type of commercial enterprise is focused on selling goods and services over the
internet?
A. Indirect Marketing B. Online Direct Marketing C. Brick & Mortar D. Marketplace
96. Which one is an example of an Internet portal?
A. E-bay B. Yahoo C. Amazon D. Facebook
97. What is ESN full form?
A. Enterprise Social Networks B. Entrepreneur Social Networks C. Enterprise Special
Networks D. Essential Social Networks
98. What is ‘EOQ’ in Inventory control?
A. Economic Occurring Quantity B. Economic Order Quantity C. Economic Over Quantity D.
Economic of Quantity
99. Which is not a horizontal portal?
A. Yahoo B. Sailnet C. MSN/Windows Live D. AOL
100. Which E-commerce company has launched Shopsy, allowing Indians to start shops for
free? A. AJIO B. Amazon C. Flipkart D. Snapdeal
101. 3. ERP stands for
A. Enterprise Resolution Planning B. Enterprise Resource Planning C. Enterprise Reader
Planning D. Enterprise Reverse Planning
102. is a set of standards developed in the 1960s to exchange business information and to do
electronic transactions
a) EDI b)Protocols c) TCP/IP d)None of these
103.____________ is concerned with the buying and selling information, products and services
over computer communication networks
a.Commerce b.E-Commerce c.E-Business d.None of these
104.Which among the following products is suitable for E-Commerce?
a.Books .b. Vegetables c.All of these d.None of these
105.Which of the following is not a party of SCM?
a.Suppliers Manufacturers c..Distributors d.Customers
106_______ is a function of E commerce.
a.Marketing b.Supply Chain c.Finance d.All of the above
107________mainly deals with buying and selling, especially on a large scale.
a.Shopping b.Commerce c.Retailing d.Distribution
108.E-commerce has _____ scope than E-Business or Digital Business.
a.Higher b.Narrower c.Wider d.More
109_______is a system of interconnected electronic components or circuits.
a.Electronic Network b.Marketplaces c.Electronic Markets d.Metamarkets
110.All electronically mediated information exchanges are referred to as _____
a.E-Business b.Digital Business c.E-Commerce d.None of the above
111._________are markets linked via modern communications networks and powered through
high-speed computers.
a.Marketplaces bMetamarkets c.Electronic Network d.Electronic Markets
112___________ is a part of the 4 important types of E-commerce.
a.All of the above b.B2B c.P2P c.C2A
113.Companies like Flipkart, Amazon and Myntra belong to which type of Ecommerce (EC)
segment.
a.B2B b.B2C c.P2P d.C2B
114.Customers pay a fixed amount, commonly month-to-month or quarterly or annually, to get a
few types of service referred to as ________E-Commerce Business Model.
a.Licensing b.Subscription c.Transaction d.Affiliate
115.This E-Commerce commercial enterprise model specifically specialises in selling services
or products online.
a.Indirect Marketing b.Online Direct Marketing c.Brick & Mortar d.Marketplace
116_________is a retail fulfilment approach in which a shop doesn’t hold the goods it sells in
stock.
a.Aggregator Model b.Affiliate c.Dropshipping d.Advertising Model
117.Some marketers or companies charge other companies for letting them place a banner on
their websites, blogs or platforms known as the ___________E-Commerce Model.
a.Affiliate b.Transaction c.Aggregator d.Advertising
118.Among the alternative models of B2B E-commerce, which is the best means to acquire a
competitive advantage in the market?
a.Strategic relationship b.Process c.Transaction d.All of the above
119.The concept of online marketing and selling of products and services through the internet is
_________
a.B2G b.B2C c.B2B d.B2E
120.Which of the following is not a user of B2C E-commerce?
a.Distributors b.Manufacturers c.Publishers d.None of the above
121.___________ allows transactions among customers and dealers through supplying complete
information and ancillary services, without being concerned about the actual exchange of
products and offerings among the parties.
a.Middlemen b.Metamediary c.Intermediary d.All of the following
122.Which of the following is NOT a B2B E-commerce?
a.Sending and receiving orders b.Invoice and shopping c.All of the above d.None of the above
123.……………lets in a commercial enterprise utility at the computer of one organization to
speak immediately with the commercial enterprise utility at the computer of any other company
a.EDI b.Business applications c.Standards d.Protocols
124.What is ‘EOQ’ in Inventory control?
a.Economic Occuring Quantity b.Economic Order Quantity c.Economic Over Quantity
d.Economic of Quantity
125. Which of the following protocols is used to provide secure access to network resources
over the internet?
a) FTP
b) Telnet
c) SSH
d) HTTP
Answer: c) SSH
126. Which of the following is an example of a symmetric key encryption algorithm?
a) RSA
b) Diffie-Hellman
c) AES
d) ECC
Answer: c) AES

UNIT-IV

127. Which of the following network devices is used to filter and forward network traffic
based on MAC addresses?
a) Router
b) Hub
c) Switch
d) Repeater
Answer: c) Switch
128. Which of the following is a type of denial-of-service attack that floods a network with
bogus requests?
a) Smurf Attack
b) Spoofing
c) SYN Flood
d) Ping of Death
Answer: c) SYN Flood
129. Which of the following is a protocol used to securely transfer files over the internet?
a) Telnet
b) FTP
c) SMTP
d) SFTP
Answer: d) SFTP
130. Which of the following is a type of firewall that operates at the application layer of the
OSI model?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Application firewall
d) Network address translation firewall
Answer: c) Application firewall
131. Which of the following is an encryption algorithm used for secure communication
over the internet?
a) DES
b) RSA
c) Blowfish
d) Twofish
Answer: b) RSA
132. Which of the following is a type of network attack in which an attacker intercepts and
modifies network traffic?
a) Spoofing
b) Sniffing
c) Hijacking
d) Injection
Answer: d) Injection
133. Which of the following is a type of security mechanism used to authenticate users and
devices on a network?
a) Encryption
b) Firewall
c) Access control
d) IDS/IPS
Answer: c) Access control
134. Which of the following is a protocol used to secure web traffic over the internet?
a) HTTPS
b) FTPS
c) SFTP
d) SMTPS
Answer: a) HTTPS
135. Which of the following is a type of attack in which an attacker sends a flood of ICMP
packets to a target network?
a) Ping of Death
b) SYN Flood
c) Smurf Attack
d) Teardrop Attack
Answer: c) Smurf Attack
136. Which of the following is a type of network attack in which an attacker masquerades
as a trusted entity to gain unauthorized access to network resources?
a) Injection
b) Spoofing
c) Hijacking
d) Sniffing
Answer: b) Spoofing
137. Which of the following is a type of firewall that examines the state of network
connections to determine whether to allow or block traffic?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Application firewall
d) Network address translation firewall
Answer: b) Stateful inspection firewall
138. Which of the following is a type of authentication that uses physical characteristics
such as fingerprints or facial recognition?
a) Password authentication
b) Two-factor authentication
c) Biometric authentication
d) Token authentication
Answer: c) Biometric authentication
139. Which of the following is a type of attack in which an attacker sends a packet that is
larger than the maximum packet size allowed by the target system?
a) Ping of Death
b) SYN Flood
c) Smurf Attack
d) Teardrop Attack
Answer: a) Ping of Death
140. Which of the following is a type of network attack in which an attacker intercepts
network traffic to capture sensitive information such as passwords or credit card
numbers?
a) Sniffing
b) Injection
c) Spoofing
d) Hijacking
Answer: a) Sniffing
141. Which of the following is a type of attack in which an attacker floods a target system
with a large number of connection requests?
a) Ping of Death
b) SYN Flood
c) Smurf Attack
d) Teardrop Attack
Answer: b) SYN Flood
142. Which of the following is a type of firewall that examines the content of network
traffic to block traffic that matches specific patterns or signatures?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Application firewall
d) Intrusion detection system
Answer: c) Application firewall
143. Which of the following is a type of encryption that uses the same key for both
encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: a) Symmetric encryption
144. Which of the following is a type of security mechanism used to protect network traffic
by hiding the IP addresses of internal devices?
a) Packet filtering firewall
b) Stateful inspection firewall
c) Network address translation
d) Virtual private network
Answer: c) Network address translation
145. Which of the following is a type of attack in which an attacker sends a packet with an
IP address that has been forged to appear to be from a trusted source?
a) Injection
b) Spoofing
c) Hijacking
d) Sniffing
Answer: b) Spoofing
146. Which of the following is a type of authentication that uses a physical device such as a
smart card or token to verify a user’s identity?
a) Password authentication
b) Two-factor authentication
c) Biometric authentication
d) Token authentication
Answer: d) Token authentication
147. Which of the following is a type of attack in which an attacker uses a combination of
social engineering and technical attacks to trick users into revealing sensitive information?
a) Phishing
b) Spear phishing
c) Whaling
d) Vishing
Answer: a) Phishing
148. Which of the following is a type of security mechanism that uses a set of rules to
control access to network resources based on the identity of the user or device?
a) Access control list
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: a) Access control list
149. Which of the following is a type of attack in which an attacker sends a large number
of email messages to a target system with the goal of overloading the system?
a) Smurf Attack
b) Teardrop Attack
c) Ping of Death
d) Email bombing
Answer: d) Email bombing
150. Which of the following is a type of encryption that uses two keys, a public key and a
private key, to encrypt and decrypt data?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: b) Asymmetric encryption
151. Which of the following is a type of security mechanism that uses machine learning
and statistical analysis to detect and block attacks in real time?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: b) Intrusion prevention system
152. Which of the following is a type of attack in which an attacker sends a large number
of ping requests to a target system with the goal of overloading the system?
a) Smurf Attack
b) Teardrop Attack
c) Ping of Death
d) Email bombing
Answer: c) Ping of Death
153. Which of the following is a type of security mechanism that monitors and filters
incoming and outgoing network traffic based on a set of predefined rules?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: d) Firewall
154. Which of the following is a type of encryption that uses the same key to encrypt and
decrypt data?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: a) Symmetric encryption
155. Which of the following is a type of attack in which an attacker intercepts and modifies
data in transit between two systems?
a) Man-in-the-middle attack
b) Denial-of-service attack
c) SQL injection attack
d) Cross-site scripting attack
Answer: a) Man-in-the-middle attack
156. Which of the following is a type of security mechanism that scans network traffic for
known viruses and other malware?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: c) Antivirus software
157. Which of the following is a type of attack in which an attacker sends a malicious email
or instant message that appears to come from a trusted source?
a) Phishing
b) Spear phishing
c) Whaling
d) Vishing
Answer: b) Spear phishing
158. Which of the following is a type of encryption that is used to ensure the integrity of
data by producing a fixed-size output, or hash, that is unique to the input data?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: c) Hashing
159. Which of the following is a type of security mechanism that uses a combination of
hardware and software to encrypt data and protect it from unauthorized access?
a) Virtual private network
b) Intrusion prevention system
c) Antivirus software
d) Secure socket layer
Answer: a) Virtual private network
160. Which of the following is a type of attack in which an attacker floods a target system
with traffic in order to overwhelm it and render it unavailable to legitimate users?
a) Man-in-the-middle attack
b) Denial-of-service attack
c) SQL injection attack
d) Cross-site scripting attack
Answer: b) Denial-of-service attack
161. Which of the following is a type of security mechanism that can detect and prevent
attacks in real-time by analyzing network traffic?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: b) Intrusion prevention system
162. Which of the following is a type of attack in which an attacker inserts malicious SQL
code into a query in order to gain unauthorized access to a database?
a) Man-in-the-middle attack
b) Denial-of-service attack
c) SQL injection attack
d) Cross-site scripting attack
Answer: c) SQL injection attack
163. Which of the following is a type of encryption that is used to sign digital documents
and ensure their authenticity?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signature
Answer: d) Digital signature
164. Which of the following is a type of security mechanism that can detect and prevent
attacks by analyzing system logs for suspicious activity?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: a) Intrusion detection system
165. Which of the following is a type of attack in which an attacker gains access to a system
or network by pretending to be someone else?
a) Phishing
b) Spoofing
c) Whaling
d) Vishing
Answer: b) Spoofing
166. Which of the following is a type of security mechanism that is used to authenticate
users and grant access to resources based on their identity?
a) Access control
b) Intrusion prevention system
c) Antivirus software
d) Secure socket layer
Answer: a) Access control
167. Which of the following is a type of security mechanism that is used to encrypt data as
it is transmitted over a network?
a) Firewall
b) Virtual private network
c) Secure socket layer
d) Intrusion detection system
Answer: c) Secure socket layer
168. Which of the following is a type of attack in which an attacker gains access to a system
or network by exploiting a vulnerability in software or hardware?
a) Phishing
b) Spoofing
c) Exploit
d) Social engineering
Answer: c) Exploit
169. Which of the following is a type of security mechanism that is used to monitor and
control network traffic to and from a network?
a) Firewall
b) Virtual private network
c) Intrusion prevention system
d) Access control
Answer: a) Firewall
170. Which of the following is a type of attack in which an attacker intercepts
communication between two parties in order to steal sensitive information?
a) Phishing
b) Man-in-the-middle attack
c) Spoofing
d) Vishing
Answer: b) Man-in-the-middle attack
171. Which of the following is a type of security mechanism that is used to protect against
viruses, worms, and other types of malware?
a) Intrusion detection system
b) Intrusion prevention system
c) Antivirus software
d) Firewall
Answer: c) Antivirus software
172. Which of the following is a type of attack in which an attacker sends a fraudulent
email or message in order to trick the recipient into revealing sensitive information?
a) Phishing
b) Spoofing
c) Whaling
d) Vishing
Answer: a) Phishing
173. Which of the following is a type of security mechanism that is used to protect against
unauthorized access to a system or network?
a) Access control
b) Intrusion detection system
c) Intrusion prevention system
d) Firewall
Answer: a) Access control

UNIT-V
174. Which of the following is a type of attack in which an attacker gains access to a
network by pretending to be a trusted entity?
a) Spoofing
b) Phishing
c) Man-in-the-middle attack
d) Brute force attack
Answer: a) Spoofing
175.Which of the following describes e‐commerce?
a. Doing business electronically b. Doing business c. Sale of goods d. All of the above
Answer: A
176.Which of the following is part of the four main types for e‐commerce?
a. B2B
b. B2C
c. C2B
d. All of the above
Answer: D
177.Which segment do eBay, Amazon.com belong?
A.B2Bs
B.B2Cs
C.C2Bs
D.C2Cs
Answer: B
178.Which type of e‐commerce focuses on consumers dealing with each other?
A.B2B
B.B2C
C.C2B
D.C2C
Answer: D
179.Which segment is eBay an example?
A.B2B
B.C2B
C.C2C
D.None of the above
Answer: D
180.Which type deals with auction?
A.B2B
B.B2C
C.C2B
D.C2C
Answer: D
181.In which website Global Easy Buy is facilitated?
A.Ebay.com
B.Amazon.com
C.Yepme.com
D.None of these
Answer: A
182.The best products to sell in B2C e‐commerce are:
A.Small products
B.Digital products
C.Specialty products
D.Fresh products
Answer: B
183.Which products are people most likely to be more uncomfortable buying on the
Internet?
A.Books
B.Furniture
C.Movies
D.All of the above
Answer: B
184.Which products are people most likely to be comfortable buying on the
Internet?
A.Books
B.PCs
C.CDs
D.All of the above
Answer: D
185.Digital products are best suited for B2C e‐commerce because they:
A.Are commodity like products
B.Can be mass‐customized and personalized
C.Can be delivered at the time of purchase
D.All of the above
Answer: D
186.The solution for all business needs is
A.EDI
B.ERP
C.SCM
D.None of the above

Answer: B

187.All of the following are techniques B2C e‐commerce companies use to


attract customers, except:

A.Registering with search engines


B.Viral marketing
C.Online ads
D.Virtual marketing
Answer: D
188.Which is a function of E‐commerce
a. marketing
b. advertising
c. warehousing
d. all of the above
Answer: D
189.Which is not a function of E‐commerce
A.marketing
B.advertising
C.warehousing
D.none of the above
Answer: C
190.Which term represents a count of the number of people who visit one site,
click on an ad, and are taken to the site of the advertiser?

A.Affiliate programs
B.Click‐through
C.Spam
D.All of the above
Answer: B
191.What is the percentage of customers who visit a Web site and actually buy
something called?
A.Affiliate programs
B.Click‐through
C.Spam
D.Conversion rate
Answer: D

192.What are materials used in production in a manufacturing company or are


placed on the shelf for sale in a retail environment?

a. Direct materials
b. Indirect materials
c. EDI
d. None of the
above
Answer: A
193.What are materials that are necessary for running a modern corporation, but
do not relate to the company's primary business activities?

A.Direct materials
B.Indirect materials
C.EDI
D.None of the above
Answer: B
194.What are ballpoint pens purchased by a clothing company?
A.Direct materials
B.Indirect materials
C.EDI
D.None of the above
Answer: B
195.What is the process in which a buyer posts its interest in buying a certain
quantity of items, and sellers compete for the business by submitting successively
lower bids until there is only one seller left?

A.B2B marketplace
B.Intranet
C.Reverse auction
D.Internet
Answer: C
196.What are plastic cards the size of a credit card that contains an embedded chip
on which digital information can be stored?

A.Customer relationship management systems cards


B.E‐government identity cards
C.FEDI cards
D.Smart cards
Answer: D
197.Most individuals are familiar with which form of e‐commerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: B
198.Which form of e‐commerce currently accounts for about 97% of all e‐commerce
revenues?
A.B2B
B.B2C
C.C2B
D.C2C
Answer: A
199.Which of the following are advantages normally associated with B2B e‐
commerce?
A.Shorter cycle times
B.Reduction in costs
C.Reaches wider audiences
D.all of the above
Answer: D
200.If the threat of substitute products or services is low it is a(n):
A.Disadvantage to the supplier
B.Advantage to the buyer
C.Advantage to the supplier
D.None of the above
Answer: C
201.The threat of new entrants is high when it is:
a. Hard for customers to enter the market
b. Hard for competitors to enter the market
c. Easy for competitors to enter the market
d. Easy for customers to enter the
market
Answer: C
202.If it is easy for competitors to enter the market, the threat of new entrants is
considered:
A. High
B. Low
C.Less
Answer: A
203.An industry is less attractive for suppliers when the rivalry among existing
competitors is:
A.High
B.Low
C.More
D.Less
Answer: A
204.Unique value auction is mainly applies to?
A.New products
B. Second hand products
C.Engineering products
D.None of the above
Answer: B
205. Paisa pay is facilitated in
A.eBay.co.in
B.amazon.com
C.flipkart.com
D.none of the above
Answer: A

IMPORTANT QUESTIONS
UNIT-I
5 MARKS
1. Classification of electronic commerce?

10 MARKS:
1. Define e-commerce and what are the classification of electronic commerce?
2. What is mean by I way? And what are the component of the I way?

UNIT-II
5 MARKS
1. Define internal information systems
10 MARKS
1. What is EDI and its benefits
2. What is mean by value added network? And write its advantages

UNIT-III
5 MARKS
1.what are the types of firewalls and network security?

10 MARKS
1.what is data and message security and its importance?
2.what are the emerging client/server threats networks security?

UNIT-IV
5 MARKS
1.what are the types of mercantile process models?

10 MARKS
1.what are the different types of consumer oriented electronic commerce?
2.what is mercantile model from consumer perspective?

UNIT-V
5 MARKS
1.What are the types of electronic payment systems?

10 MARKS
1. what is credit card how it is used in electronic payment system?
2. Explain digital token based electronic payment system?

You might also like