1. ……………allows a business application on the computer of one organization to
communicate directly with the business application on the computer of another company.
Correct : A. edi
2. Electronic Exchange of business documents in a standard format is known as
………………
Correct : C. edi
3. Which of the following is not a party of SCM ?
Correct : C. distributors
4. ………………is a commercial process that includes production, distribution, sales or
delivery of goods and services through electronic means
Correct : A. e-commerce
5. Among the alternate models of B2B e-commerce,……is the best means to obtain a
competitive advantage in the Market place.
Correct : B. strategic relationship based
6. …………………is basically a concept of online marketing and distributing of products
and services over the internet
Correct : C. b2c
7. ……………………..e-commerce consists of the sale of products or services from a
business to the general public
Correct : D. b2c
8. Which of the following is not suitable for a B2C transaction ?
Correct : D. none
9. ……………..e-commerce transaction has the advantage of eliminating middlemen.
Correct : B. b2c
10. ………………….e-commerce involves customers gathering information, purchasing and
receiving products over an electronic network
Correct : D. b2c
11. Which among the following is not an user of B2C e-commerce ?
Correct : D. none
12. ………………….e-commerce involves the electronic facilitation of transaction between
customers through some third party.
Correct : A. c2c
13. Which among the following is not a B2E application
Correct : D. locate application and tax forms
14. ……………………..streamlines the flow of information and self service capabilities
through automation
Correct : A. scc
15. …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.
Correct : B. http
16. English physicist Tim Berner’s Lee was famous for the establishment of
…………………..in 1990.
Correct : B. www
17. ………refers to a kind of e-commerce which refers to a company selling or buying
from other company
Correct : C. b2b
18. A company that manufacturers bicycles may use the internet to purchase tyres from
their suppliers. This is an example of-----------transaction
Correct : C. b2b
19. …………..sites act as an intermediary between someone wanting a product or service
and potential providers
Correct : A. brokering sites
20. A……………portal is a specialized entry point to a specific market place or industry
niche.
Correct : A. vertical portal
21. Which among the following is an example for vertical portal ?
Correct : A. i-village
22. 4. A portal that helps to establish relations and to conduct transactions between various
organizations is termed as………………
Correct : A. b2b portals
23. A …………………….is a software that scours the internet collecting data about every
website and every webpage within it
Correct : B. search engines
24. Which among the following is not an example for Search engine ?
Correct : D. none of these
25. Web pages are prepared using their language as…………………
Correct : A. html
26. A web page is transferred to users computer through ……………………..
Correct : C. http
27. The user reaches this page when they specify the address of a website
Correct : A. home page
28. ……………………..streamlines the flow of information and self service capabilities
through automation
Correct : A. scc
29. ………………is a global web in which millions of users are communicating with each
other with the help of computers.
Correct : A. internet
30. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.
Correct : A. e-bay
31. Monster.com is an example of ……………………..website
Correct : A. c2c
32. This is a protocol which allows files to be transferred from one computer to another
computer
Correct : B. ftp
33. A ……………….is a document, typically written in plain text interspersed with
formatting instructions of html
Correct : A. web page
34. ………………….is the first page of a web site.
Correct : B. home page
35. …………………….is an online auctioning site that facilitates the trade of privately
owned items between individuals.
Correct : A. e-bay
36. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.
Correct : C. electronic purse
37. ……………………encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.
Correct : B. set
38. SET means ………………
Correct : C. secure electronic transaction
39. The verification of credit card is done by using…………….. with a communications link
to the merchants acquiring bank
Correct : C. all of these
40. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments
Correct : D. acquirer
41. ………………type of payment system is highly useful to those customers who would
like to control overspending,
Correct : A. prepaid
42. ……………………….credit card gives all the advantages of a normal credit card
without worrying about the interest charges
Correct : A. prepaid
43. ……………………facility helps the customer to pay only a small amount of the total
outstanding and revolve the rest of the payment to the next month.
Correct : B. revolver
44. ………………….is a financial instrument which can be used more than once to borrow
money or buy products and services on credit.
Correct : A. credit card
45. To accept a credit card for payment, we have to open a …………………account with
our bank
Correct : C. merchant account
46. ………………..is a kind of payment card that transfers fund directly from the
consumer’s bank account to the merchants account
Correct : A. debit card
47. A ………………is an electronic file that uniquely identifies individuals and websites on
the internet and enables secure confidential communications
Correct : B. digital certificates
48. The information Technology Act [IT ACT] came into effect on
Correct : C. 17th october 2000
49. Information sent over the Internet commonly uses the set of rules
called……………………
Correct : A. tcp/ip
50. ……………………….is a person who breaks in or trespasses a computer system
Correct : A. hacker
51. E-mail which contains useless material is termed as……………
Correct : D. junk mail
52. India has enacted the first IT Act in the year……………………
Correct : D. 2000
53. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
Correct : D. none of these
54. Trade mark, copyright, patent law etc comes under the purview of……………………
Correct : C. intellectual property laws
55. Which one of the following is not a principle of e-commerce ?
Correct : D. none of these
56. ………………is basically a secure gate between our organization data and internet.
Correct : A. network firewall
57. ………………is automated methods of recognizing a person based on a physiological or
behavioral characteristic.
Correct : A. biometrics
58. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments.
Correct : D. acquirer
59. In …………………..type of payment system customer is allowed to spend only up to the
amount that have pre deposited into account.
Correct : A. prepaid
60. .……………….is the exchange of goods or items or commodities and services or
applications used for money and deals the money matters
Correct : B. commerce
61. ……………….always operate on intranet
Correct : B. e-business
62. Which among the following is not an example for E-commerce
Correct : C. e-trade.com
63. ………………were the first to establish prominent E-commerce Brands
Correct : B. e-bay and amazon
64. …………….is a form of supply chain where a series of assembly operations are carried
out to obtain the final product
Correct : A. converging supply chain
65. .…………………is a form of supply chain where a wide variety of finished goods are
produced with limited number of raw material or components.
Correct : B. diverging structure
66. ……………………is the exchange of services, information or product from one
business to a government agency
Correct : C. b2b
67. ………………….is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files
Correct : D. p2p
68. ”Google” is one of the most popular………………..
Correct : C. search engine
69. A ………………….. Presents information from diverse sources in a unified way in a
web site.
Correct : C. both of these
70. ……………………….is a person who breaks in or trespasses a computer system
Correct : A. hacker
71. Peer to Peer [P2P] is also used to describe ………………………
Correct : A. c2c
72. ……………..allows the person to type ion just the main word or words and the site will
come in
Correct : C. domain
73. A ………………….. presents information from diverse sources in a unified way in a
web site
Correct : C. both of these
74. In Biometrics,…………………………ID system is designed to prevent one person
from using more than one identity
Correct : B. negative id system
75. …………………..are program developed by some dishonest people to destroy the
computer system and the valuable information in it.
Correct : B. computer virus
76. he dimension of e-commerce that enables commerce across national boundaries is called
______________.
Correct : B. global reach
77. The primary source of financing during the early years of e-commerce was
______________.
Correct : C. venture capital funds
78. The source of revenue in a subscription revenue model is ______________.
Correct : C. fees from subscribers in exchange for access to content or services
79. Industry structure is defined as ______________.
Correct : A. the nature of the players in an industry and their relative bargaining power
80. The component of TCP/IP that provides the Internet's addressing scheme and is
responsible for the actual delivery of packets is ______________.
Correct : B. ip
81. Which of the following is not a limitation of the current Internet?
Correct : C. insufficient reach
82. Internet users account for about ______________ of the world's population.
Correct : B. 17%
83. The most common type of Internet crime according to the IC3 is ______________.
Correct : D. auction fraud
84. When hackers flood a Web site with useless traffic to overwhelm the network, it is
called ______________.
Correct : C. a denial of service (dos) attack
85. ______________ influence the behavior of others through their personality, skills, or other
factors.
Correct : A. opinion leaders
86. A(n) ______________ represents data as two-dimensional tables with records
organized in rows and attributes in columns.
Correct : D. relational database
87. Creating multiple versions of information goods and selling essentially the same
product to different market segments at different prices is called______________.
Correct : A. versioning
88. Which of the following is a measure of the percentage of purchasers who return to a
Web site within a year?
Correct : A. loyalty
89. Which of the following statements about privacy is true?
Correct : A. it is a moral right to be left alone
90. The redirection of traffic from a legitimate site to an infringing site is called
______________.
Correct : B. cyber piracy
91. A security plan begins with a(n) is ______________.
Correct : B. risk assessment
92. ______________ influence the behavior of others through their personality, skills, or
other factors.
Correct : A. opinion leaders
93. Creating multiple versions of information goods and selling essentially the same
product to different market segments at different prices is called______________.
Correct : A. versioning
94. Which of the following is a measure of the percentage of purchasers who return to a
Web site within a year?
Correct : A. loyalty
95. ______________ are networks that connect people within a company to each other and
to the company network.
Correct : D. intranets
96. A website offering content created by third party transparently to customers is an
example of ______________.
Correct : B. syndication
97. E-commerce technologies have improved upon traditional commerce technologies in
______________.
Correct : C. both richness and reach
98. All of the following are technologies used to gather information about you online
except ______________.
Correct : D. anonymizers
99. ______________ is a program that you can run from the DOS prompt in the Windows
operating system in order to check the connection between your client and the server.
Correct : A. ping
100. Which of the following is a new and disruptive Web feature or service?