1. Which among the following is an example of C2C ?
Correct : D. all of these
2. Peer to Peer [P2P] is also used to describe………………………….
Correct : A. C2C
3. …………………….is an online auctioning site that facilitates the trade of privately owned items
between individuals.
Correct : A. e-Bay
4. Monster.com is an example of ……………………..website
Correct : A. C2C
5. ………………….is an internet network that allows users with the same network in software to
connect to each other’s hard disks and exchange files
Correct : A. P2P
6. This is a protocol which allows files to be transferred from one computer to another computer
Correct : B. FTP
7. A ……………….is a document, typically written in plain text interspersed with formatting
instructions of html
Correct : A. Web page
8. ………………….is the first page of a web site.
Correct : B. home page
9. ……………..allows the person to type ion just the main word or words and the site will come in
Correct : C. domain
10. A ………………….. presents information from diverse sources in a unified way on a website.
Correct : C. Both of these
11. A……………portal is a specialized entry point to a specific market place or industry niche.
Correct : A. Vertical portal
12. ………………..are general interest portals covering a wide range of topics and features
Correct : B. horizontal portal
13. Which among the following is an example for vertical portal ?
Correct : A. i-village
14. A portal that helps to establish relations and to conduct transactions between various
organizations is termed as………………
Correct : A. B2B portals
15. A …………………….is a software that scours the internet collecting data about every website
and every webpage within it
Correct : B. Search Engines
16. Search Engines databases are selected and built by computer robot programs
called………………………
Correct : A. spiders
17. Which among the following is not an example for Search engine ?
Correct : D. none of these
18. Web pages are prepared using their language as…………………
Correct : A. html
19. A web page is transferred to users computer through ……………………..
Correct : C. HTTP
20. The user reaches this page when they specify the address of a website
Correct : A. Home page
21. The purpose of ………………page is to provide links to other pages
Correct : A. Home page
22. ……………is an example for a software that visits suggested pages and return the appropriate
information to be indexed by the search Engine
Correct : D. All
23. ………………………………..ads appears as rectangular graphics near the top of the page
Correct : A. Banner ads
24. ………………….ads take up the entire screen and are more powerful than banner ads.
Correct : B. floating ads
25. ………………………….is a form of advertisement on the web that appears between web pages
that the user requests.
Correct : C. interstitials
26. ……………………is basically a TV commercial that runs in the browser window.
Correct : D. Unicast ads
27. Advertisements take the form of a website copy are called…………………………
Correct : A. Advertorials
28. ………………..is the most unwanted of online advertising methods.
Correct : B. pop-up ads
29. …………………..is an unsolicited e-mail sent to every e-mail address that a business can find
Correct : C. Spam e-mail
30. …………………..is the buying and selling of goods and services through wireless handled
devices such as cellular phone and Personal Digital Assistants
Correct : A. Mobile Commerce
31. …………………is a class of advertising methods which are considered unethical and may even
be illegal
Correct : D. malware
32. ……………….is the most common way for purchasing an online advertising
Correct : C. Any of these
33. ………………are animated full screen ads placed at the entry of a site before a user reaches
the intended content.
Correct : A. Intromercials
34. ………………….are interactive online ads that require the user to respond intermittently in
order to wade through the message before reaching the intended content.
Correct : A. Ultramercials
35. ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks
with the help of an electronic device.
Correct : A. Mobile Commerce
36. …………….provide security and privacy for the use of the web page content
Correct : A. HTTP
37. …………………….website is one that changes or customizes itself frequently and automatically
based on certain criteria
Correct : A. Dynamic website
38. ………………site is created to fraudulently acquire sensitive information such as pass words
and credit card details, by masquerading as a trustworthy person or business.
Correct : C. phish site
39. ……………….in the e-commerce may be a holder of a payment card such as credit card or
debit card from an issuer
Correct : A. customer
40. ……………….is a financial institution that establishes an account with a merchant and
processes payment card authorization and payments
Correct : D. Acquirer
41. In …………………..type of payment system customer is allowed to spend only up to the
amount that have pre deposited into account.
Correct : A. Prepaid
42. ………………type of payment system is highly useful to those customers who would like to
control overspending,
Correct : A. Prepaid
43. ……………………….credit card gives all the advantages of a normal credit card without worrying
about the interest charges
Correct : A. Prepaid
44. ……………………facility helps the customer to pay only a small amount of the total outstanding
and revolve the rest of the payment to the next month.
Correct : B. Revolver
45. ………………….is a financial instrument which can be used more than once to borrow money
or buy products and services on credit.
Correct : A. Credit card
46. To accept a credit card for payment, we have to open a …………………account with our bank
Correct : C. Merchant account
47. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank
account to the merchants account
Correct : A. Debit Card
48. ……………..is a card with a microchip that can be used instead of cash and coins for
everything from vending machines to public transportation.
Correct : B. Electronic purse
49. ………………is basically a secure gate between our organization data and internet.
Correct : A. Network firewall
50. ……………………encrypts payment card transaction data and verifies that both parties in the
transaction are genuine.
Correct : B. SET
51. ………………is automated methods of recognizing a person based on a physiological or
behavioral characteristic.
Correct : A. Biometrics
52. In Biometrics,…………………………ID system is designed to prevent more than one person from
using a single identity
Correct : A. Positive ID system
53. In Biometrics,…………………………ID system is designed to prevent one person from using
more than one identity
Correct : B. Negative ID system
54. …………………..are program developed by some dishonest people to destroy the computer
system and the valuable information in it.
Correct : B. computer virus
55. Which among the following is not an example for computer virus ?
Correct : D. None of these
56. ……………………are special type of software meant for limiting the risks of being hit by
computer viruses
Correct : B. Antivirus
57. A……………….is a person who gains unauthorized access to a computer network for profit,
criminal mischief or personal pleasure.
Correct : A. Hacker
58. ……………….acts like a gate keeper that examines each users identification before allowing
them to enter to the organization’s internal networks.
Correct : A. Network firewall
59. …………..Prevents unauthorized communication into and out of the network, allowing the
organization to enforce a security policy on traffic between its network and the internet.
Correct : A. Network firewall
60. SET means …………………………….
Correct : C. Secure Electronic Transaction
61. The verification of credit card is done by using…………….. with a communications link to the
merchants acquiring bank
Correct : C. All of these
62. Creating illegitimate sites that appear to be published by established organizations by
unscrupulous artists is termed as………………………….
Correct : A. Spoofing
63. Gain entry into the user’s system and scan your file system for personal information is
known as……………….
Correct : B. Snooping
64. ………………attacks are difficult and are only successful if the attacker knows something
about the shopper
Correct : D. Guessing passwords
65. …………………is the process of making information unintelligible to the unauthorized user.
Correct : D. Cryptography
66. ………………….is the reverse process of encryption, to make the information readable once
again
Correct : B. Decryption
67. A………………….provides a way to associate the message with the sender and is the
equivalent of an ordinary signature.
Correct : B. Digital signature
68. A ………………is an electronic file that uniquely identifies individuals and websites on the
internet and enables secure confidential communications
Correct : B. Digital certificates
69. The information Technology Act [IT ACT] came into effect on
Correct : C. 17th October 2000
70. Information sent over the Internet commonly uses the set of rules called………………………..
Correct : A. TCP/IP
71. E-mail which contain useless material is termed as………………………
Correct : D. Junk mail
72. India has enacted the first IT Act in the year……………………………………
Correct : D. 2000
73. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
Correct : D. None of these
74. Trade mark, copyright, patent law etc comes under the purview of……………………
Correct : C. Intellectual property laws
75. ……………….is a programme designed o replicate and spread generally with the victim being
oblivious to its existence
Correct : C. Computer virus
76. Which one of the following is not a principle of e-commerce ?
Correct : D. none of these
77. Which of the below is/are goals of E-Commerce?
Correct : D. all of the above
78. In which one of the following type of E-Commerce, consumer sells to consumer directly?
Correct : D. C2C
79. ................ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format
Correct : B. EDI
80. What does EDI stand for?
Correct : D. Electronic Data Interchange
81. When a company buys some raw material from some other company, then it will come under:
Correct : A. B2B
82. In traditional commerce, people buy goods and services
:
Correct : B. physical visit
83. Promotion of products in e-commerce can be done by
Correct : D. All of the mentioned
84. Which of the following is not a dimension of e- commerce security provided by encryption ?
Correct : A. availability
85. Conversion of Plain text to Cipher Text is called………………
Correct : A. Encryption
86. In Porter's Five Forces, the 'threat of new entrants' relates to:
Correct : A. Barriers to entry
87. Which of the following is true for supply chain management?
Correct : D. All of the above
88. Logistics is the part of a supply chain involved with the forward and reverse flow of
Correct : D. All of the above
89. BPM is about:
Correct : D. All of the above
90. CRM is :
Correct : A. Customer Relationship
91. The best products to sell in B2C e-commerce are:
Correct : B. Digital Products
92. Which of the following is a useful security mechanism when considering business strategy and IT?
Correct : D. All of the mentioned
93. Which type of products is lesser purchased using e- commerce?
Correct : A. automobiles
94. Which is not the application area of e-commerce?
Correct : D. None of the mentioned
95. In which year the IT Act was introduced?
Correct : A. 2000
96. is an early form of E-Commerce.
Correct : B. EDI
97. Which of the following is not related to security mechanism?
Correct : C. e-cash
98. Digital Products are best suited for B2C e-commerce because they:
Correct : D. All of the mentioned
99. Which of the following is part of the four main types of e-commerce?
Correct : D. All of the mentioned
100. The dimension of E-Commerce that enables commerce across the boundaries is called