Quiznetik

E-Commerce | Set 4

1. Which among the following is an example of C2C ?

Correct : D. all of these

2. Peer to Peer [P2P] is also used to describe………………………….

Correct : A. C2C

3. …………………….is an online auctioning site that facilitates the trade of privately owned items between individuals.

Correct : A. e-Bay

4. Monster.com is an example of ……………………..website

Correct : A. C2C

5. ………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files

Correct : A. P2P

6. This is a protocol which allows files to be transferred from one computer to another computer

Correct : B. FTP

7. A ……………….is a document, typically written in plain text interspersed with formatting instructions of html

Correct : A. Web page

8. ………………….is the first page of a web site.

Correct : B. home page

9. ……………..allows the person to type ion just the main word or words and the site will come in

Correct : C. domain

10. A ………………….. presents information from diverse sources in a unified way on a website.

Correct : C. Both of these

11. A……………portal is a specialized entry point to a specific market place or industry niche.

Correct : A. Vertical portal

12. ………………..are general interest portals covering a wide range of topics and features

Correct : B. horizontal portal

13. Which among the following is an example for vertical portal ?

Correct : A. i-village

14. A portal that helps to establish relations and to conduct transactions between various organizations is termed as………………

Correct : A. B2B portals

15. A …………………….is a software that scours the internet collecting data about every website and every webpage within it

Correct : B. Search Engines

16. Search Engines databases are selected and built by computer robot programs called………………………

Correct : A. spiders

17. Which among the following is not an example for Search engine ?

Correct : D. none of these

18. Web pages are prepared using their language as…………………

Correct : A. html

19. A web page is transferred to users computer through ……………………..

Correct : C. HTTP

20. The user reaches this page when they specify the address of a website

Correct : A. Home page

21. The purpose of ………………page is to provide links to other pages

Correct : A. Home page

22. ……………is an example for a software that visits suggested pages and return the appropriate information to be indexed by the search Engine

Correct : D. All

23. ………………………………..ads appears as rectangular graphics near the top of the page

Correct : A. Banner ads

24. ………………….ads take up the entire screen and are more powerful than banner ads.

Correct : B. floating ads

25. ………………………….is a form of advertisement on the web that appears between web pages that the user requests.

Correct : C. interstitials

26. ……………………is basically a TV commercial that runs in the browser window.

Correct : D. Unicast ads

27. Advertisements take the form of a website copy are called…………………………

Correct : A. Advertorials

28. ………………..is the most unwanted of online advertising methods.

Correct : B. pop-up ads

29. …………………..is an unsolicited e-mail sent to every e-mail address that a business can find

Correct : C. Spam e-mail

30. …………………..is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants

Correct : A. Mobile Commerce

31. …………………is a class of advertising methods which are considered unethical and may even be illegal

Correct : D. malware

32. ……………….is the most common way for purchasing an online advertising

Correct : C. Any of these

33. ………………are animated full screen ads placed at the entry of a site before a user reaches the intended content.

Correct : A. Intromercials

34. ………………….are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content.

Correct : A. Ultramercials

35. ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.

Correct : A. Mobile Commerce

36. …………….provide security and privacy for the use of the web page content

Correct : A. HTTP

37. …………………….website is one that changes or customizes itself frequently and automatically based on certain criteria

Correct : A. Dynamic website

38. ………………site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business.

Correct : C. phish site

39. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

Correct : A. customer

40. ……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments

Correct : D. Acquirer

41. In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.

Correct : A. Prepaid

42. ………………type of payment system is highly useful to those customers who would like to control overspending,

Correct : A. Prepaid

43. ……………………….credit card gives all the advantages of a normal credit card without worrying about the interest charges

Correct : A. Prepaid

44. ……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the rest of the payment to the next month.

Correct : B. Revolver

45. ………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

Correct : A. Credit card

46. To accept a credit card for payment, we have to open a …………………account with our bank

Correct : C. Merchant account

47. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

Correct : A. Debit Card

48. ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

Correct : B. Electronic purse

49. ………………is basically a secure gate between our organization data and internet.

Correct : A. Network firewall

50. ……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

Correct : B. SET

51. ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.

Correct : A. Biometrics

52. In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity

Correct : A. Positive ID system

53. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity

Correct : B. Negative ID system

54. …………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.

Correct : B. computer virus

55. Which among the following is not an example for computer virus ?

Correct : D. None of these

56. ……………………are special type of software meant for limiting the risks of being hit by computer viruses

Correct : B. Antivirus

57. A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

Correct : A. Hacker

58. ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.

Correct : A. Network firewall

59. …………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.

Correct : A. Network firewall

60. SET means …………………………….

Correct : C. Secure Electronic Transaction

61. The verification of credit card is done by using…………….. with a communications link to the merchants acquiring bank

Correct : C. All of these

62. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as………………………….

Correct : A. Spoofing

63. Gain entry into the user’s system and scan your file system for personal information is known as……………….

Correct : B. Snooping

64. ………………attacks are difficult and are only successful if the attacker knows something about the shopper

Correct : D. Guessing passwords

65. …………………is the process of making information unintelligible to the unauthorized user.

Correct : D. Cryptography

66. ………………….is the reverse process of encryption, to make the information readable once again

Correct : B. Decryption

67. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

Correct : B. Digital signature

68. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

Correct : B. Digital certificates

69. The information Technology Act [IT ACT] came into effect on

Correct : C. 17th October 2000

70. Information sent over the Internet commonly uses the set of rules called………………………..

Correct : A. TCP/IP

71. E-mail which contain useless material is termed as………………………

Correct : D. Junk mail

72. India has enacted the first IT Act in the year……………………………………

Correct : D. 2000

73. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

Correct : D. None of these

74. Trade mark, copyright, patent law etc comes under the purview of……………………

Correct : C. Intellectual property laws

75. ……………….is a programme designed o replicate and spread generally with the victim being oblivious to its existence

Correct : C. Computer virus

76. Which one of the following is not a principle of e-commerce ?

Correct : D. none of these

77. Which of the below is/are goals of E-Commerce?

Correct : D. all of the above

78. In which one of the following type of E-Commerce, consumer sells to consumer directly?

Correct : D. C2C

79. ................ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format

Correct : B. EDI

80. What does EDI stand for?

Correct : D. Electronic Data Interchange

81. When a company buys some raw material from some other company, then it will come under:

Correct : A. B2B

82. In traditional commerce, people buy goods and services :

Correct : B. physical visit

83. Promotion of products in e-commerce can be done by

Correct : D. All of the mentioned

84. Which of the following is not a dimension of e- commerce security provided by encryption ?

Correct : A. availability

85. Conversion of Plain text to Cipher Text is called………………

Correct : A. Encryption

86. In Porter's Five Forces, the 'threat of new entrants' relates to:

Correct : A. Barriers to entry

87. Which of the following is true for supply chain management?

Correct : D. All of the above

88. Logistics is the part of a supply chain involved with the forward and reverse flow of

Correct : D. All of the above

89. BPM is about:

Correct : D. All of the above

90. CRM is :

Correct : A. Customer Relationship

91. The best products to sell in B2C e-commerce are:

Correct : B. Digital Products

92. Which of the following is a useful security mechanism when considering business strategy and IT?

Correct : D. All of the mentioned

93. Which type of products is lesser purchased using e- commerce?

Correct : A. automobiles

94. Which is not the application area of e-commerce?

Correct : D. None of the mentioned

95. In which year the IT Act was introduced?

Correct : A. 2000

96. is an early form of E-Commerce.

Correct : B. EDI

97. Which of the following is not related to security mechanism?

Correct : C. e-cash

98. Digital Products are best suited for B2C e-commerce because they:

Correct : D. All of the mentioned

99. Which of the following is part of the four main types of e-commerce?

Correct : D. All of the mentioned

100. The dimension of E-Commerce that enables commerce across the boundaries is called

Correct : B. global reach