Quiznetik

E-Commerce | Set 2

1. ……………allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company.

Correct : A. edi

2. Electronic Exchange of business documents in a standard format is known as ………………

Correct : C. edi

3. Which of the following is not a party of SCM ?

Correct : C. distributors

4. ………………is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means

Correct : A. e-commerce

5. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in the Market place.

Correct : B. strategic relationship based

6. …………………is basically a concept of online marketing and distributing of products and services over the internet

Correct : C. b2c

7. ……………………..e-commerce consists of the sale of products or services from a business to the general public

Correct : D. b2c

8. Which of the following is not suitable for a B2C transaction ?

Correct : D. none

9. ……………..e-commerce transaction has the advantage of eliminating middlemen.

Correct : B. b2c

10. ………………….e-commerce involves customers gathering information, purchasing and receiving products over an electronic network

Correct : D. b2c

11. Which among the following is not an user of B2C e-commerce ?

Correct : D. none

12. ………………….e-commerce involves the electronic facilitation of transaction between customers through some third party.

Correct : A. c2c

13. Which among the following is not a B2E application

Correct : D. locate application and tax forms

14. ……………………..streamlines the flow of information and self service capabilities through automation

Correct : A. scc

15. …………………is an application layer protocol for distributed, collaborative, hypermedia information systems.

Correct : B. http

16. English physicist Tim Berner’s Lee was famous for the establishment of …………………..in 1990.

Correct : B. www

17. ………refers to a kind of e-commerce which refers to a company selling or buying from other company

Correct : C. b2b

18. A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an example of-----------transaction

Correct : C. b2b

19. …………..sites act as an intermediary between someone wanting a product or service and potential providers

Correct : A. brokering sites

20. A……………portal is a specialized entry point to a specific market place or industry niche.

Correct : A. vertical portal

21. Which among the following is an example for vertical portal ?

Correct : A. i-village

22. 4. A portal that helps to establish relations and to conduct transactions between various organizations is termed as………………

Correct : A. b2b portals

23. A …………………….is a software that scours the internet collecting data about every website and every webpage within it

Correct : B. search engines

24. Which among the following is not an example for Search engine ?

Correct : D. none of these

25. Web pages are prepared using their language as…………………

Correct : A. html

26. A web page is transferred to users computer through ……………………..

Correct : C. http

27. The user reaches this page when they specify the address of a website

Correct : A. home page

28. ……………………..streamlines the flow of information and self service capabilities through automation

Correct : A. scc

29. ………………is a global web in which millions of users are communicating with each other with the help of computers.

Correct : A. internet

30. …………………….is an online auctioning site that facilitates the trade of privately owned items between individuals.

Correct : A. e-bay

31. Monster.com is an example of ……………………..website

Correct : A. c2c

32. This is a protocol which allows files to be transferred from one computer to another computer

Correct : B. ftp

33. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html

Correct : A. web page

34. ………………….is the first page of a web site.

Correct : B. home page

35. …………………….is an online auctioning site that facilitates the trade of privately owned items between individuals.

Correct : A. e-bay

36. ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

Correct : C. electronic purse

37. ……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

Correct : B. set

38. SET means ………………

Correct : C. secure electronic transaction

39. The verification of credit card is done by using…………….. with a communications link to the merchants acquiring bank

Correct : C. all of these

40. ……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments

Correct : D. acquirer

41. ………………type of payment system is highly useful to those customers who would like to control overspending,

Correct : A. prepaid

42. ……………………….credit card gives all the advantages of a normal credit card without worrying about the interest charges

Correct : A. prepaid

43. ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the rest of the payment to the next month.

Correct : B. revolver

44. ………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

Correct : A. credit card

45. To accept a credit card for payment, we have to open a …………………account with our bank

Correct : C. merchant account

46. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

Correct : A. debit card

47. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

Correct : B. digital certificates

48. The information Technology Act [IT ACT] came into effect on

Correct : C. 17th october 2000

49. Information sent over the Internet commonly uses the set of rules called……………………

Correct : A. tcp/ip

50. ……………………….is a person who breaks in or trespasses a computer system

Correct : A. hacker

51. E-mail which contains useless material is termed as……………

Correct : D. junk mail

52. India has enacted the first IT Act in the year……………………

Correct : D. 2000

53. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

Correct : D. none of these

54. Trade mark, copyright, patent law etc comes under the purview of……………………

Correct : C. intellectual property laws

55. Which one of the following is not a principle of e-commerce ?

Correct : D. none of these

56. ………………is basically a secure gate between our organization data and internet.

Correct : A. network firewall

57. ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.

Correct : A. biometrics

58. ……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments.

Correct : D. acquirer

59. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.

Correct : A. prepaid

60. .……………….is the exchange of goods or items or commodities and services or applications used for money and deals the money matters

Correct : B. commerce

61. ……………….always operate on intranet

Correct : B. e-business

62. Which among the following is not an example for E-commerce

Correct : C. e-trade.com

63. ………………were the first to establish prominent E-commerce Brands

Correct : B. e-bay and amazon

64. …………….is a form of supply chain where a series of assembly operations are carried out to obtain the final product

Correct : A. converging supply chain

65. .…………………is a form of supply chain where a wide variety of finished goods are produced with limited number of raw material or components.

Correct : B. diverging structure

66. ……………………is the exchange of services, information or product from one business to a government agency

Correct : C. b2b

67. ………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files

Correct : D. p2p

68. ”Google” is one of the most popular………………..

Correct : C. search engine

69. A ………………….. Presents information from diverse sources in a unified way in a web site.

Correct : C. both of these

70. ……………………….is a person who breaks in or trespasses a computer system

Correct : A. hacker

71. Peer to Peer [P2P] is also used to describe ………………………

Correct : A. c2c

72. ……………..allows the person to type ion just the main word or words and the site will come in

Correct : C. domain

73. A ………………….. presents information from diverse sources in a unified way in a web site

Correct : C. both of these

74. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity

Correct : B. negative id system

75. …………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.

Correct : B. computer virus

76. he dimension of e-commerce that enables commerce across national boundaries is called ______________.

Correct : B. global reach

77. The primary source of financing during the early years of e-commerce was ______________.

Correct : C. venture capital funds

78. The source of revenue in a subscription revenue model is ______________.

Correct : C. fees from subscribers in exchange for access to content or services

79. Industry structure is defined as ______________.

Correct : A. the nature of the players in an industry and their relative bargaining power

80. The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ______________.

Correct : B. ip

81. Which of the following is not a limitation of the current Internet?

Correct : C. insufficient reach

82. Internet users account for about ______________ of the world's population.

Correct : B. 17%

83. The most common type of Internet crime according to the IC3 is ______________.

Correct : D. auction fraud

84. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.

Correct : C. a denial of service (dos) attack

85. ______________ influence the behavior of others through their personality, skills, or other factors.

Correct : A. opinion leaders

86. A(n) ______________ represents data as two-dimensional tables with records organized in rows and attributes in columns.

Correct : D. relational database

87. Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________.

Correct : A. versioning

88. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

Correct : A. loyalty

89. Which of the following statements about privacy is true?

Correct : A. it is a moral right to be left alone

90. The redirection of traffic from a legitimate site to an infringing site is called ______________.

Correct : B. cyber piracy

91. A security plan begins with a(n) is ______________.

Correct : B. risk assessment

92. ______________ influence the behavior of others through their personality, skills, or other factors.

Correct : A. opinion leaders

93. Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________.

Correct : A. versioning

94. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

Correct : A. loyalty

95. ______________ are networks that connect people within a company to each other and to the company network.

Correct : D. intranets

96. A website offering content created by third party transparently to customers is an example of ______________.

Correct : B. syndication

97. E-commerce technologies have improved upon traditional commerce technologies in ______________.

Correct : C. both richness and reach

98. All of the following are technologies used to gather information about you online except ______________.

Correct : D. anonymizers

99. ______________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.

Correct : A. ping

100. Which of the following is a new and disruptive Web feature or service?

Correct : C. blogs