iii sem - e-commerce(bcom)(1)

Upload: mdanjum1991

Post on 02-Jun-2018

242 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    1/31

    ECommerce

    BCom

    IIISem

    MultipleChoice

    Questions

    1.

    Whichofthefollowingdescribesecommerce?

    a. Doingbusinesselectronically

    b. Doingbusiness

    c. Saleofgoods

    d. Alloftheabove

    Answer:A

    2.Whichofthefollowingispartofthefourmaintypesforecommerce?

    a.

    B2B

    b. B2C

    c. C2B

    d.

    Alloftheabove

    Answer:D

    3.WhichsegmentdoeBay,Amazon.combelong?

    a. B2Bs

    b. B2Cs

    c.

    C2Bs

    d. C2Cs

    Answer:B

    4.Whichtypeofecommercefocusesonconsumersdealingwitheachother?

    a. B2B

    b.

    B2C

    c. C2B

    d. C2C

    Answer:D

    5.WhichsegmentiseBayanexample?

    a.

    B2B

    b. C2B

    c.

    C2C

    d. Noneoftheabove

    Answer:D

    6.

    Whichtypedealswithauction?

    a. B2B

    b. B2C

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    2/31

    c. C2B

    d. C2C

    Answer:D

    7.InwhichwebsiteGlobalEasyBuyisfacilitated?

    a. Ebay.com

    b.

    Amazon.com

    c. Yepme.com

    d. Noneofthese

    Answer:A

    8.ThebestproductstosellinB2Cecommerceare:

    a. Smallproducts

    b. Digitalproducts

    c. Specialtyproducts

    d. Freshproducts

    Answer:B

    9.

    Whichproducts

    are

    people

    most

    likely

    to

    be

    more

    uncomfortable

    buying

    on

    the

    Internet?

    a. Books

    b. Furniture

    c. Movies

    d. Alloftheabove

    Answer:B

    10.WhichproductsarepeoplemostlikelytobecomfortablebuyingontheInternet?

    a. Books

    b. PCs

    c. CDs

    d.

    Alloftheabove

    Answer:D

    11.DigitalproductsarebestsuitedforB2Cecommercebecausethey:

    a. Arecommoditylikeproducts

    b. Canbemasscustomizedandpersonalized

    c.

    Canbedeliveredatthetimeofpurchase

    d. Alloftheabove

    Answer:D

    12.Thesolutionforallbusinessneedsis

    a. EDI

    b.

    ERP

    c. SCM

    d. Noneoftheabove

    Answer:B

    13.AllofthefollowingaretechniquesB2Cecommercecompaniesusetoattractcustomers,

    except:

    a. Registeringwithsearchengines

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    3/31

    b. Viralmarketing

    c. Onlineads

    d. Virtualmarketing

    Answer:D

    14.Which is afunctionofEcommerce

    a.

    marketing

    b. advertising

    c.

    warehousing

    d. alloftheabove

    Answer:D

    15.

    Which isnot afunctionofEcommerce

    a. marketing

    b. advertising

    c.

    warehousing

    d. noneoftheabove

    Answer:C

    16.

    Whichtermrepresentsacountofthenumberofpeoplewhovisitonesite,clickonanad,and

    aretakentothesiteoftheadvertiser?

    a. Affiliateprograms

    b. Clickthrough

    c. Spam

    d.

    Alloftheabove

    Answer:B

    17.WhatisthepercentageofcustomerswhovisitaWebsiteandactuallybuysomethingcalled?

    a. Affiliateprograms

    b.

    Clickthrough

    c.

    Spam

    d. Conversionrate

    Answer:D

    18.Whatarematerialsusedinproductioninamanufacturingcompanyorareplacedontheshelf

    forsaleinaretailenvironment?

    a. Directmaterials

    b. Indirectmaterials

    c. EDI

    d. Noneoftheabove

    Answer:A

    19.Whatarematerialsthatarenecessaryforrunningamoderncorporation,butdonotrelateto

    thecompany'sprimarybusinessactivities?

    a. Directmaterials

    b. Indirectmaterials

    c. EDI

    d. Noneoftheabove

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    4/31

    Answer:B

    20.Whatareballpointpenspurchasedbyaclothingcompany?

    a. Directmaterials

    b. Indirectmaterials

    c. EDI

    d.

    Noneof

    the

    above

    Answer:B

    21.Whatisanothernamefor?

    a. Directmaterials

    b. Indirectmaterials

    c. EDI

    d. Noneoftheabove

    Answer:B

    22.Whatistheprocessinwhichabuyerpostsitsinterestinbuyingacertainquantityofitems,and

    sellerscompeteforthebusinessbysubmittingsuccessivelylowerbidsuntilthereisonlyone

    sellerleft?

    a. B2Bmarketplace

    b. Intranet

    c. Reverseauction

    d. Internet

    Answer:C

    23.Whatareplasticcardsthesizeofacreditcardthatcontainsanembeddedchiponwhichdigital

    informationcanbestored?

    a. Customerrelationshipmanagementsystemscards

    b. Egovernmentidentitycards

    c.

    FEDIcards

    d. Smartcards

    Answer:D

    24.Mostindividualsarefamiliarwithwhichformofecommerce?

    a. B2B

    b.

    B2C

    c. C2B

    d. C2C

    Answer:B

    25.Whichformofecommercecurrentlyaccountsforabout97%ofallecommercerevenues?

    a.

    B2B

    b. B2C

    c. C2B

    d. C2C

    Answer:A

    26.

    WhichofthefollowingareadvantagesnormallyassociatedwithB2Becommerce?

    a. Shortercycletimes

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    5/31

    b. Reductionincosts

    c. Reacheswideraudiences

    d. alloftheabove

    Answer:D

    27. Ifthethreatofsubstituteproductsorservicesislowitisa(n):

    a.

    Disadvantageto

    the

    supplier

    b. Advantagetothebuyer

    c. Advantagetothesupplier

    d. Noneoftheabove

    Answer:C

    28.Thethreatofnewentrantsishighwhenitis:

    a. Hardforcustomerstoenterthemarket

    b. Hardforcompetitorstoenterthemarket

    c. Easyforcompetitorstoenterthemarket

    d. Easyforcustomerstoenterthemarket

    Answer:C

    29. Ifitiseasyforcompetitorstoenterthemarket,thethreatofnewentrantsisconsidered:

    a. High

    b. Low

    c. More

    d.

    Less

    Answer:A

    30.Anindustryislessattractiveforsupplierswhentherivalryamongexistingcompetitorsis:

    a. High

    b. Low

    c.

    More

    d. Less

    Answer:A

    31.Uniquevalueauctionismainlyappliesto?

    a. Newproducts

    b.

    Secondhandproducts

    c. Engineeringproducts

    d. Noneoftheabove

    i. Answer:B

    32.Paisapayisfacilitatedin

    a.

    eBay.co.in

    b. amazon.com

    c. flipkart.com

    d. noneoftheabove

    Answer:A

    33.Whichofthefollowingisausefulsecuritymechanismwhenconsideringbusinessstrategyand

    IT?

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    6/31

    a. encryption

    b. decryption

    c. firewall

    d. alltheabove

    Answer:D

    34.

    Whichof

    the

    following

    is

    not

    related

    to

    security

    mechanism

    a. encryption

    b. decryption

    c. ecash

    d. alltheabove

    Answer:C

    35.Aproductorservicethatcustomershavecometoexpectfromanindustry,whichmustbe

    offeredbynewentrantsiftheywishtocompeteandsurvive,isknownasa(n)?

    a. Switchingcosts

    b.

    Loyaltyprograms

    c. Entrybarriers

    d. Affiliateprograms

    Answer:C

    36.Whichofthefollowingstatementsaccuratelyreflecttheimpactoftechnology?

    a. Technologyhascausedbuyerpowertoincrease

    b. Technologyhaslessenedtheentrybarriersformanyindustries

    c. Technologyhasincreasedthethreatofsubstituteproductsandservices

    d. alloftheabove

    Answer:D

    37.

    Abusiness

    cannot

    be

    all

    things

    to

    all

    people.

    Instead,

    abusiness

    must:

    a. Identifytargetcustomers

    b. Identifythevalueofproducts/servicesasperceivedbycustomers

    c. alloftheabove

    d. Noneoftheabove

    Answer:C

    38.

    Howthetransactionsoccurinecommerce?

    a. Usingemedias

    b. Using computers only

    c. Usingmobilephonesonly

    d.

    Noneoftheabove

    Answer:A

    39.Whichtypeofproductsislesserpurchasedusingecommerce?

    a. automobiles

    b. books

    c. softwares

    d. none

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    7/31

    Answer:A

    40.Abusinesscompetinginacommoditylikeenvironmentmustfocusonwhichofthefollowing?

    a. Price

    b. Ease/speedofdelivery

    c. Easeofordering

    d.

    allof

    the

    above

    Answer:D

    41.Whichofthefollowingreferstocreatingproductstailoredtoindividualcustomers?

    a. customization

    b. aggregation

    c. Directmaterials

    d. Reverseauction

    Answer:A

    42.Materialsusedinthenormaloperationofabusinessbutnotrelatedtoprimarybusiness

    operationsarecalledwhat?

    a.

    Supplies

    b. Directmaterials

    c. Indirectmaterials

    d. Dailystuff

    Answer:C

    43.

    Amazon.comiswellknownforwhichecommercemarketingtechnique?

    a. Bannerads

    b. Popupads

    c. Affiliateprograms

    d. Viralmarketing

    Answer:C

    44.Whatisthenamegiventoaninteractivebusinessprovidingacentralizedmarketwheremany

    buyersandsupplierscancometogetherforecommerceorcommercerelatedactivities?

    a. Directmarketplace

    b. B2B

    c.

    B2C

    d. Electronicmarketplace

    Answer:D

    45.Whichformofemarketplacebringstogetherbuyersandsellersfrommultipleindustries,often

    forMROmaterials?

    a.

    horizontal

    b. Vertical

    c. Integrated

    d. Inclined

    Answer:A

    46.

    Whichformofemarketplacebringstogetherbuyersandsellersfromthesameindustry?

    a. horizontal

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    8/31

    b. Vertical

    c. Integrated

    d. Inclined

    Answer:B

    47.Whichtypeofaddappearsonawebpage?

    a.

    popunder

    ad

    b. Popupad

    c. Bannerad

    d. Discountad

    Answer:C

    48.Whattypeofadappearsontopofawebpage?

    a. popunderad

    b. popupad

    c. bannerad

    d. discountad

    Answer:B

    49.Whattypeofadappearsunderawebpage?

    a. popunderad

    b. popupad

    c. bannerad

    d.

    discountad

    Answer:A

    50.Which,ifany,ofthefollowingtypesofadsarepeoplemostwillingtotolerate?

    a. popunderad

    b. popupad

    c.

    bannerad

    d. noneoftheabove

    Answer:D

    51.WhichofthefollowingisanInternetbasedcompanythatmakesiteasyforonepersontopay

    anotherovertheInternet?

    a.

    electroniccheck

    b. electronicbillpresentmentandpayment

    c. conversionrates

    d. financialcybermediary

    Answer:D

    52.

    Whichofthefollowingisamethodoftransferringmoneyfromoneperson'saccountto

    another?

    a. electroniccheck

    b. creditcard

    c. etransfer

    d.

    noneoftheabove

    Answer:A

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    9/31

    53.Anelectroniccheckisoneformofwhat?

    a. ecommerce

    b. onlinebanking

    c. ecash

    d. check

    54.

    Ifyou

    need

    to

    transfer

    money

    to

    another

    person

    via

    the

    internet,

    which

    of

    the

    following

    methodscouldyouuse?

    a. financialcybermediary

    b. electroniccheck

    c. electronicbillpresentmentandpayment

    d. alloftheabove

    Answer:D

    55.Whichofthefollowingpermitsthetransmissionofabill,alongwithpaymentofthatbill,tobe

    conductedovertheInternet?

    a. financialcybermediary

    b.

    electroniccheck

    c. electronicbillpresentmentandpayment

    d. alloftheabove

    Answer:C

    56.Acombinationofsoftwareandinformationdesignedtoprovidesecurityandinformationfor

    paymentiscalledawhat?

    a. digitalwallet

    b. popupad

    c. shoppingcart

    d. encryption

    Answer:A

    57.Whatisthenamefordirectcomputertocomputertransferoftransactioninformation

    containedinstandardbusinessdocuments?

    a. internetcommerce

    b. ecommerce

    c.

    transactioninformationtransfer

    d. electronicdatainterchange

    Answer:D

    58.WhichofthefollowingisusedinB2Btopayforpurchases?

    a. ecommerce

    b.

    financialelectronicdatainterchange

    c. electronicdataexchange

    d. electronicchecks

    Answer:B

    59.Publickeyencryptionusesmultiplekeys. Onekeyisusedtoencryptdata,whileanotherisused

    todecryptdata. Thekeyusedtoencryptdataiscalledthe_____key,whilethekeyusedto

    decryptdataiscalledthe_____key.

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    10/31

    a. encryption,decryption

    b. private,public

    c. encryption,public

    d. public,private

    Answer:D

    60.

    SecureSockets

    Layers

    does

    which

    of

    the

    following?

    a. createsasecure,privateconnectiontoawebserver

    b. encryptsinformation

    c. sendsinformationovertheinternet

    d. alloftheabove

    Answer:D

    61.Whenatransactionisprocessedonline,howcanthemerchantverifythecustomer'sidentity?

    a. usesecuresocketslayers

    b. usesecureelectronictransactions

    c. useelectronicdatainterchange

    d.

    usefinancial

    electronic

    data

    interchange

    Answer:B

    62.Thepracticeofforgingareturnaddressonanemailsothattherecipientisfooledinto

    revealingprivateinformationistermed?

    a. hacking

    b.

    cracking

    c. dumpsterdiving

    d. spoofing

    Answer:D

    63.Whatisamodelofaproposedproduct,service,orsystem?

    a.

    Prototyping

    b. Prototype

    c. Proofofconceptprototype

    d. Sellingprototype

    Answer:B

    64.

    WhatisaninternalorganizationalInternetthatisguardedagainstoutsideaccessbyaspecial

    securityfeaturecalledafirewall(whichcanbesoftware,hardware,oracombinationofthe

    two)?

    a. Client/servernetwork

    b. Intranet

    c.

    Extranet

    d. Thinclient

    Answer:B

    65.Whatisanintranetthatisrestrictedtoanorganizationandcertainoutsiders,suchascustomers

    andsuppliers?

    a.

    Client/servernetwork

    b. Intranet

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    11/31

    c. Extranet

    d. Thinclient

    Answer:C

    66.WhatisadetailedprocessforrecoveringinformationoranITsystemintheeventofa

    catastrophicdisastersuchasafireorflood?

    a.

    Disasterrecovery

    plan

    b. Hotsite

    c. Coldsite

    d. Disasterrecoverycostcurve

    Answer:A

    67.Whatisaseparatefacilitythatdoesnothaveanycomputerequipmentbutisaplacewherethe

    knowledgeworkerscanmoveafterthedisaster?

    a. Disasterrecoveryplan

    b. Hotsite

    c. Coldsite

    d.

    Disasterrecovery

    cost

    curve

    Answer:C

    68.Whatisaseparateandfullyequippedfacilitywherethecompanycanmoveimmediatelyafter

    thedisasterandresumebusiness?

    a. Disasterrecoveryplan

    b.

    Hotsite

    c. Coldsite

    d. Disasterrecoverycostcurve

    Answer:B

    69.Whatcharts(1)thecosttoyourorganizationoftheunavailabilityofinformationandtechnology

    and(2)thecosttoyourorganizationofrecoveringfromadisasterovertime?

    a. Disasterrecoveryplan

    b. Hotsite

    c. Coldsite

    d. Disasterrecoverycostcurve

    Answer:D

    70.WhichfactordetermineswhenyourITsystemwillbeavailableforknowledgeworkersto

    access?

    a. Availability

    b. Accessibility

    c.

    Reliability

    d. Noneoftheabove

    Answer:A

    71.WhichfactordetermineswhohastherighttoaccessdifferenttypesofITsystemsand

    information?

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    12/31

    a. Availability

    b. Accessibility

    c. Reliability

    d. Scalability

    Answer:B

    72.WhichfactorensuresyourITsystemsarefunctioningcorrectlyandprovidingaccurate

    information?

    a. Availability

    b. Accessibility

    c. Reliability

    d. Scalability

    Answer:C

    73.

    Whichfactor

    represents

    how

    well

    your

    system

    can

    adapt

    to

    increased

    demands?

    a. Availability

    b. Accessibility

    c.

    Reliability

    d. Scalability

    Answer:D

    74.

    Whichfactorrepresentsasystem'sabilitytochangequickly?

    a. Flexibility

    b. Performance

    c.

    Capacityplanning

    d.

    Benchmark

    Answer:A

    75.Whatisasetofconditionsusedtomeasurehowwellaproductorsystemfunctions?

    a. Flexibility

    b. Performance

    c.

    Capacityplanning

    d. Benchmark

    Answer:D

    76.WhatdeterminesthefutureITinfrastructurerequirementsfornewequipmentandadditional

    networkcapacity?

    a.

    Flexibility

    b. Performance

    c. Capacityplanning

    d. Benchmark

    Answer:C

    77.

    Whatautomatesbusinessprocesses?

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    13/31

    a. Workflow

    b. ASP

    c. Workflowsystem

    d. EIP

    Answer:C

    78.

    Whatdefines

    all

    of

    the

    steps

    or

    business

    rules,

    from

    beginning

    to

    end,

    required

    for

    aprocess

    to

    runcorrectly?

    a. Workflow

    b. EIP

    c. Workflowsystem

    d. SLA

    Answer:A

    79.Whatsendsworkassignmentsthroughanemailsystem?

    a. Databasebasedenterpriseinformationportal

    b. Messagingbasedenterpriseinformationportal

    c.

    Databasebased

    workflow

    system

    d. Messagingbasedworkflowsystem

    Answer:D

    80.Whichwillnot harm computerresources

    a. firewall

    b.

    Virus

    c. Trojanhorse

    d. Noneoftheabove

    Answer:A

    81.WhichisnotafunctionofERP?

    a.

    Warehousing

    b. sales

    c. scheduling

    d. Noneoftheabove

    Answer:D

    82.

    WhichisafunctionofERP?

    a. Warehousing

    b. sales

    c. scheduling

    d. alloftheabove

    Answer:D

    83.Whichofthefollowingistheprimarycharacteristicofanintranet?

    a. Peopleoutsidetheorganizationcanaccessit

    b. Peopleinsidetheorganizationcan'taccessit

    c. Peopleoutsidetheorganizationcan'taccessit

    d.

    Noneoftheabove

    Answer:C

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    14/31

    84.Whichconceptsuggeststhatdifferentapplicationsandcomputersystemsshouldbeableto

    communicatewithoneanother?

    a. Integration

    b. Webservices

    c. Scalability

    d.

    Interoperability

    Answer:D

    85.Whichserviceencompassesalltechnologiesusedtotransmitandprocessinformationonan

    acrossanetwork?

    a. Interoperability

    b. Scalability

    c. Benchmarking

    d. Webservices

    Answer:D

    86.Whichprocesscanprevent datafromloseduetocomputerproblemsorhumanerrors?

    a.

    backup

    b. recovery

    c. benchmarking

    d. datacleansing

    Answer:A

    87.

    Whichprocessisusedtoreinstalldatafromacopywhentheoriginaldatahasbeenlost?

    a. backup

    b. recovery

    c. benchmarking

    d. datacleansing

    Answer:B

    88.Whatdescribesaprocessofcontinuouslymeasuringresultsandcomparingthoseresultsto

    optimalperformancesothatactualperformancemaybeimproved?

    a. Performance

    b. Capacityplanning

    c.

    Benchmarking

    d. Datacleansing

    Answer:C

    89.Whoprotectssystemfromexternalthreats?

    a. firewall

    b.

    EDI

    c. ERP

    d. Scriptkiddies

    Answer:A

    90.Whobreaksintootherpeople'scomputersystemsandstealsanddestroysinformation?

    a.

    Hackers

    b. softwares

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    15/31

    c. Hacktivists

    d. Scriptkiddies

    Answer:a

    91.Whatissoftwarethatcomeshiddeninfreedownloadablesoftwareandtracksyouronline

    movements,minestheinformationstoredonyourcomputer,orusesyourcomputer'sCPUand

    storagefor

    some

    task

    you

    know

    nothing

    about?

    a. Weblog

    b. Clickstream

    c. AnonymousWebbrowsingservice

    d. Noneoftheabove

    Answer:D

    92.ERPstandsfor

    a. Enterpriseresolutionplanning

    b. Enterprisereverseplanning

    c. Enterpriseresourceplanning

    d.

    Noneof

    the

    above

    Answer:C

    93.WhichisnotacomponentofERP?

    a. Legacysystems

    b. Boltonapplications

    c.

    Operationaldatabase

    d. Cybersoft

    Answer:D

    94.WhichisnotafunctionofERP?

    a. Humanresourcemanagement

    b.

    financial

    c. warehousing

    d. Noneoftheabove

    Answer:D

    95.Whatisatypeofvirusthatspreadsitself,notjustfromfiletofile,butfromcomputerto

    computerviaemailandotherInternettraffic?

    a. Computervirus

    b. Worm

    c. Denialofserviceattack

    d. Noneoftheabove

    Answer:B

    96.WhatfloodsaWebsitewithsomanyrequestsforservicethatitslowsdownorcrashes?

    a. Computervirus

    b. Worm

    c. Denialofserviceattack

    d.

    Noneoftheabove

    Answer:C

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    16/31

    97.WhatharnessesfarflungcomputerstogetherbywayoftheInternetoravirtualprivatenetwork

    toshareCPUpower,databases,anddatabasestorage?

    a. Computervirus

    b. Worm

    c. Denialofserviceattack

    d.

    Noneof

    the

    above

    Answer:D

    98.Whatconsistsoftheidentificationofrisksorthreats,theimplementationofsecuritymeasures,

    andthemonitoringofthosemeasuresforeffectiveness?

    a. Riskmanagement

    b. Riskassessment

    c. Security

    d. Noneoftheabove

    Answer:A

    99.WhatistheprocessofevaluatingITassets,theirimportancetotheorganization,andtheir

    susceptibilityto

    threats,

    to

    measure

    the

    risk

    exposure

    of

    these

    assets?

    a. Riskmanagement

    b. Riskassessment

    c. Security

    d. Noneoftheabove

    Answer:B

    100. Whatistheprocessofmakingacopyoftheinformationstoredonacomputer?

    a. Backup

    b. Antivirus

    c. Firewall

    d.

    Biometrics

    Answer:A

    101. Whatsoftwaredetectsandremovesorquarantinescomputerviruses?

    a. Backup

    b. Antivirus

    c.

    Firewall

    d. Biometrics

    Answer:B

    102. Whatishardwareand/orsoftwarethatprotectscomputersfromintruders?

    a. Backup

    b.

    Antivirus

    c. Firewall

    d. Biometrics

    Answer:C

    103. Whatistheuseofphysicalcharacteristicssuchasyourfingerprint,thebloodvessels

    intheretinaofyoureye,thesoundofyourvoice,orperhapsevenyourbreathtoprovide

    identification?

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    17/31

    a. Backup

    b. Antivirus

    c. Firewall

    d. Biometrics

    Answer:D

    104.

    Allof

    the

    following

    are

    considered

    biometrics,

    except:

    a. Fingerprint

    b. Retina

    c. Password

    d. Voice

    Answer:C

    105. Whatscramblesthecontentsofafilesoyoucan'treaditwithouthavingtheright

    decryptionkey?

    a. Encryption

    b. Intrusiondetectionsoftware

    c.

    Securityauditing

    software

    d. Alloftheabove

    Answer:A

    106. Whatisanencryptionsystemthatusestwokeys:apublickeythateveryonecanhave

    andaprivatekeyforonlytherecipient?

    a.

    Encryption

    b. Publickeyencryption

    c. Intrusiondetectionsoftware

    d. Securityauditingsoftware

    Answer:B

    107.

    Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting

    suspiciously?

    a. Encryption

    b. Publickeyencryption

    c. Intrusiondetectionsoftware

    d.

    Securityauditingsoftware

    Answer:C

    108. Whatchecksoutyourcomputerornetworkforpotentialweaknesses?

    a. Encryption

    b. Publickeyencryption

    c.

    Securityauditingsoftware

    d. Noneoftheabove

    Answer:C

    109. Whichofthefollowingtovirusesharm?

    a. Yourkeyboard

    b.

    Yourmonitor

    c. Yourprocessor

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    18/31

    d. Virusesdonotharmanyoftheabove

    Answer:D

    110. Whichofthefollowingcanavirusdo?

    a. Hurtyourhardware

    b. Hurtanyfilestheyweren'tdesignedtoattack

    c.

    Infectfiles

    on

    write

    protected

    disks

    d. Noneoftheabove

    Answer:D

    111. Insimpleterms,whatdoesriskassessmentask?

    a. Whatcangowrong?

    b. Howlikelyisittogowrong?

    c. Whatarethepossibleconsequencesifitdoesgowrong?

    d. Alloftheabove

    Answer:D

    112. Whichofthefollowingisacharacteristicofafirewall?

    a.

    Examineseach

    message

    as

    it

    seeks

    entrance

    to

    the

    network

    b. Blocksmessageswithoutthecorrectmarkingsfromenteringthenetwork

    c. DetectscomputerscommunicatingwiththeInternetwithoutapproval

    d. Alloftheabove

    Answer:D

    113.

    Whichofthefollowingarewaystoproveaccessrights?

    a. Whatyouknow,likeapassword

    b. Whatyouhave,likeanATMcard

    c. Whatyoulooklike

    d. Alloftheabove

    Answer:D

    114. Whichitemcanapasswordbeusedtoprotect?

    a. Network

    b. File

    c. Folder

    d.

    Alloftheabove

    Answer:D

    115. WhichisthemostimportantcomponentofIT?

    a. Information

    b. People

    c.

    Informationtechnology

    d. Computers

    Answer:B

    116. Whichofthefollowingappliestotheimplementationofanidea?

    a. Copyright

    b.

    Intellectualproperty

    c. Patent

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    19/31

    d. Denialofserviceattack

    Answer:C

    117. Whenyoupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?

    a. ThecostoftheCDs,manuals,anddevelopmentofthesoftware

    b. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopment

    c.

    Ashare

    of

    the

    cost

    of

    software

    development

    d. Alloftheabove

    Answer:D

    118. Whichofthefollowingisnotadimensionofprivacy?

    a. Needforpersonalspace

    b. Needtofeelincontrolofourpossessions

    c. Needtofeelincontrolofourpersonalinformation

    d. Alloftheabovearedimensionsofprivacy

    Answer:D

    119. Whichofthefollowingcapturesscreenimages?

    a.

    Keylogger

    b. Packetsniffer

    c. Loganalysistools

    d. Screencapturesoftware

    Answer:D

    120.

    Whichofthefollowingexaminesinformationpassingthroughswitches,hubs,or

    routers?

    a. Keylogger

    b. Packetsniffer

    c. Loganalysistools

    d.

    Screencaptures

    Answer:B

    121. Whichofthefollowingrecordslogonsanddeletions?

    a. Keylogger

    b. Packetsniffer

    c.

    Loganalysistools

    d. Screencaptures

    Answer:C

    122. Emailmessagesmaybestoredonwhichofthefollowingcomputers?

    a. Sender'scomputer

    b.

    Sender'sserver

    c. Recipient'sserver

    d. Alloftheabove

    Answer:D

    123. Whatmightidentitythievesdowithyouridentity?

    a.

    Applyforandusecreditcards

    b. Applyforaloan

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    20/31

    c. Changetheiridentity

    d. Alloftheabove

    Answer:D

    124. Whichofthefollowingisnotacommonapproachtophishing?

    a. Sendanofficiallookingemailaskingforconfidentialinformation

    b.

    Askpeople

    to

    fill

    out

    and

    return

    afake

    letter

    using

    postal

    mail

    c. Askpeopletoclickalinkinanemailtoopenasubmissionformonawebpage

    d. Alloftheaboveareuncommonapproachestophishing

    Answer:B

    125. Atechniqueusedtogainpersonalinformationforthepurposeofidentitytheft,oftenby

    email,iscalled?

    a. Phishing

    b. Carding

    c. Brandspoofing

    d. Alloftheabove

    Answer:D

    126. Companiescangatherinformationaboutemployeesandpotentialemployeesfrom

    whichofthefollowingplaces?

    a. Jobapplications

    b. Creditreports

    c.

    CompaniesthattrackWebsurfers

    d. Alloftheabove

    Answer:D

    127.

    Cyber

    slacking

    consists

    of

    what

    activities?

    a. Visitinginappropriatewebsites

    b. Visitingnewssites

    c. Chattingonlinewithothersaboutnonworktopics

    d.

    Alloftheabove

    Answer:D

    128. Cookiesareusedtodowhichofthefollowing?

    a. StoreyourIDandpasswordforsubsequentlogonstothesite

    b. Storecontentsofelectronicshoppingcarts

    c.

    Totrackwebactivity

    d.

    Allof

    the

    above

    and

    more

    Answer:D

    129. Unsolicitedemailiscalledwhat?

    a. Junkmail

    b.

    Spam

    c. Extramail

    d. Noneoftheabove

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    21/31

    Answer:B

    130. WhatisthenameofthenewantiSpambill?

    a. NoSpam

    b. CANSpam

    c. SpamAway

    d.

    StopSpam

    Answer:B

    131. Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video

    game,andsometypesofproprietarydocuments?

    a. Ethics

    b. Intellectualproperty

    c. Copyright

    d. FairUseDoctrine

    Answer:C

    132. Whatistheunauthorizeduse,duplication,distributionorsaleofcopyrightedsoftware?

    a. FairUseDoctrine

    b. Piratedsoftware

    c. Counterfeitsoftware

    d.

    Privacy

    Answer:B

    133. Whatisaprogram,wheninstalledonacomputer,recordseverykeystrokeandmouse

    click?

    a.

    Keyloggersoftware

    b.

    Hardware

    key

    logger

    c. Cookie

    d. Adware

    Answer:A

    134.

    Whatissoftwareyoudon'twanthiddeninsidesoftwareyoudowant?

    a.

    Adware

    b. Trojanhorsesoftware

    c. Spyware

    d. Alloftheabove

    Answer:D

    135.

    Whatis

    an

    electronic

    representation

    of

    cash?

    a. Digitalcash

    b. Electroniccash

    c. Ecash

    d.

    Alloftheabove

    Answer:D

    136. Whatisafullyequippedcomputerthatyouwearasapieceofclothingorattachedtoa

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    22/31

    pieceofclothingsimilartothewayyouwouldcarryyourcellphoneonyourbelt?

    a. Wearablecomputer

    b. GPS

    c. Implantchip

    d. Noneoftheabove

    Answer:A

    137. Whatisatechnologyenabledmicrochipimplantedintothehumanbody?

    a. Wearablecomputer

    b. GPS

    c. Implantchip

    d. Noneoftheabove

    Answer:C

    138. Whichofthefollowingisnotareasonwhydigitalcashhasturnedouttobeextremely

    difficult?

    a.

    Ifyour

    system

    crashes

    you

    lose

    your

    money

    b. Thereisonlyonestandard

    c.

    Digitalcashmakesmoneylaunderingeasy

    d. DigitalcashtravelsacrossthevastInternetandissusceptibletobeginstolen

    Answer:B

    139. Smartcardisbetterprotectedthanothercardsusing

    a. Encryption

    b.

    Firewall

    c. Hub

    d. Alltheabove

    Answer:A

    140. Trustcardisintroducedby

    a.

    BSNLanditzcash

    b. BSNLandoxicash

    c. BSNLonly

    d. None

    Answer:A

    141.

    PaisaPayisofferedonlyby

    a. Homeshop18.com

    b. eBay.in

    c.

    amazon.com

    d.

    none

    Answer:B

    142. TheEpaymentmechanismwidelyusedinB2Bis

    a. Creditcard

    b. Debitcard

    c.

    Mastercard

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    23/31

    d. Echeque

    Answer:D

    143. Whichtypeoftechnologywillincreaseportabilityandmobility?

    a. Implantchips

    b. Micropayments

    c.

    Internetphone

    calls

    d. Alloftheabove

    Answer:D

    144. Whichofthefollowinganaccuratestatementaboutinternetphonecalls?

    a. Theyarepossiblebutnotyetfree

    b. Theyarenotpossible

    c. Theyarecurrentlystandardpractice

    d. Noneoftheaboveisanaccuratestatementaboutinternetphonecalls

    Answer:A

    145. Whatarethemostcommonlyusedinputdevicestoday?

    a.

    Keyboard

    b. Mouse

    c. Alloftheabove

    d. Noneoftheabove

    Answer:C

    146.

    Whichofthefollowingcanbeusedtohelpidentifypeopleinacrowd?

    a. Biochip

    b. Implantchip

    c. Facialrecognitionsoftware

    d. Visionchip

    Answer:C

    147. Whichoneisalsoknownasplasticmoney?

    a. Creditcard

    b. Debitcard

    c. Papercash

    d.

    Alloftheabove

    Answer:A

    148. Echequesare

    a.Prepaid

    b.Postpaid

    c.

    Bothprepaidandpostpaid

    Answer:A

    149. Digitalsignatureisa

    a. Digitalid,sendasanattachmenttoawebpage/email/message

    b. Isusedforverifyingtheattachmentssendusingweb

    c.

    Bothaandb

    d. Noneofthese

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    24/31

    Answer:C

    150.

    Whichoneisthecomponentofcybercashpaymentsystem

    a. CCusersoftware

    b. CCmerachantsoftware

    c.

    CCServer

    Software

    d. Alloftheabove

    Answer:D

    151. Thepresence ofmakethesmartcardsmart.

    a. Memory

    b. Microchip

    c. Ecash

    d.

    Noneoftheabove

    Answer:B

    152. Thesmartcardwhichuseantennaforreadingandwritingdata

    a)

    Contactsmart

    card

    b) Contactlesssmartcard

    c)

    Proximitysmartcard

    d) BothBandC

    Answer:D

    153. cardisreadonly.

    a) Contactsmartcard

    b) Contactlesssmartcard

    c)

    Proximitysmartcard

    d)

    BothB

    and

    C

    Answer:C

    154. Whichofthesmartcardusesasimlikestructureforreadingandwritingdata

    a)

    Contactsmartcard

    b)

    Contactlesssmartcard

    c) Proximitysmartcard

    d) BothBandC

    Answer:A

    155.

    Which

    is

    not

    a

    feature

    of

    ecommerce

    a. SCM

    b. EDI

    c.

    WWW

    d. BPR

    Answer:D

    156. WhatisIstandsinCIAofsmartcard?

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    25/31

    a. International

    b. Integrity

    c. Identity

    d. Noneoftheabove

    Answer:B

    157. WhatisAstandsinCIAofsmartcard?

    a. auditing

    b. authenticity

    c. authorized

    d. Noneoftheabove

    Answer:B

    158. WhatisCstandsinCIAofsmartcard?

    a. confidentiality

    b. conference

    c.

    congress

    d. Noneoftheabove

    Answer:A

    159. WhichoneisthethirdpartypaymentproviderswhoofferdigitalwalletsforE

    merchants

    a.

    Oxicash

    b. PayMate

    c. PayPass

    d. Alltheabove

    Answer:D

    160.

    Whichisusedtoidentifymobilemoney

    a. MCID

    b. MMID

    c. RSID

    d. NONEOFTHEABOVE

    Answer:B

    161. isanactthatposesdangertocomputerassets.

    a. Threat

    b. Danger

    c. Error

    d.

    Noneoftheabove

    Answer:A

    162. Whichoneisnotaencryptiontechnique

    a. RSA

    b. DES

    c.

    AES

    d. NONEOFTHEABOVE

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    26/31

    Answer:D

    163. Whichoneisnotusedasasecuritymechanism?

    a. Encryption

    b. Cryptography

    c. Wallets

    d. Digitalsignature

    Answer:C

    164. Whichegovernmentarenaisbeingusedwhengovernmentalagenciessendoutand

    acceptbidsforwork?

    a)G2G

    b)G2B

    c)G2C

    d)

    G2G

    Answer:B

    165.

    Secretkeyisusedfor

    a. Publickeycryptography

    b. Privatekeycryptography

    c. Asymmetrickeycryptography

    d. Noneofthese

    Answer:B

    166. Whichoneis acommunicationchannelthreat?

    a.

    Snifferprograms

    b. Cybervandalism

    c.

    Integritythreats

    d.

    Alloftheabove

    Answer:D

    167. Whichoneis acommunicationchannelsecurityprotocol?

    a. SSL

    b.

    SHTTP

    c.

    SET

    d. ALLOFTHEABOVE

    Answer:D

    168. Theprotocolwhichallowsthefiletransferbetweencomputersis

    a. TCP/IP

    b. FTP

    c. HTTP

    d. SOA

    Answer:B

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    27/31

    169. EBankingisalsoknownas

    a. ATMs

    b. Netbanking

    c. Traditionalbanking

    d. Noneofthese

    Answer:B

    170. isbackboneofallEpaymentsinEcommerce

    a. EFT

    b. EPS

    c. PayPal

    d. Noneofthese

    Answer:B

    171. Whichoneisaclientlevelthreat?

    a. Maliciouscode

    b. Viruses

    c.

    Activecontents

    d. Alltheabove

    Answer:D

    172. Whichoneisnotanencryptiontechnique?

    a. RSA

    b.

    DES

    c. AES

    d. FTP

    Answer:D

    173. Whichoneis anencryptiontechnique?

    a.

    RSA

    b. DES

    c. AES

    d. Alloftheabove

    Answer:D

    174.

    Whichoneisnotaserverlevelthreat?

    a. Maliciouscode

    b. CGIthreats

    c. Databasethreats

    d. Bufferoverflows

    Answer:A

    175. Whichoneisnotaphysicalthreat?

    a. Hacking

    b. Storm

    c. Phishing

    d.

    Noneoftheabove

    Answer:A

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    28/31

    176. Whichoneisaphysicalthreat?

    a. Phishing

    b. Storm

    c. Earthquake

    d. Alltheabove

    Answer:D

    177. Whichoneisalogicalthreat?

    a. Hacking

    b. Storm

    c. Phishing

    d. Noneoftheabove

    Answer:A

    178. Thebasicelementsofwebsiteis

    a. Homepage

    b. Webpages

    c.

    Linksand

    banners

    d. Alltheabove

    Answer:D

    179. Whichoneis athreatforEcommerce

    a. Trojanhorse

    b.

    firewall

    c. encryption

    d. None

    Answer:A

    180. Securecommunicationmeans

    a.

    Protecttransmissionofcreditcardnumber

    b. Guaranteeprivacyofcustomer

    c. Unauthorizedaccessofpaymentdetails

    d. Alltheabove

    Answer:D

    181.

    Whichoneisnotanofflinepaymentmode?

    a. Cashondelivery

    b. Cashbeforedelivery

    c. Demanddrafts

    d. echeque

    Answer:D

    182. Whichoneis anofflinepaymentmode?

    a. Cashondelivery

    b. Cashbeforedelivery

    c. Creditcard

    d.

    Bothaandb

    Answer:D

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    29/31

    183. Whichoneisnotanonlinepaymentmode?

    a. Cashondelivery

    b. Debitcard

    c. Creditcard

    d. echeque

    Answer:A

    184. Whichoneis anonlinepaymentmode?

    a. Cashondelivery

    b. Cashbeforedelivery

    c. Demanddrafts

    d. echeque

    Answer:D

    185. whichoneisnotanEpaymentmethodusedinIndia

    a. Debitcard

    b. Creditcard

    c.

    echeque

    d. none

    Answer:D

    186. OTPstandsfor

    a. OnTimePassword

    b.

    OnTimeprocessing

    c. Onetimeprocessor

    d. None

    Answer:A

    187. WhichoneisnotathreatforEcommerce

    a.

    Trojanhorse

    b. Viruses

    c. Worm

    d. None

    Answer:D

    188.

    PrivateKeycryptographyisalsoknownascryptography.

    a. Publickey

    b. Symmetric

    c. Asymmetric

    d. None

    Answer:B

    189. Publickeycryptographyisalsoknownascryptography.

    a. Privatekey

    b. Symmetric

    c. Asymmetric

    d.

    None

    Answer:C

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    30/31

    190. Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video

    game,andsometypesofproprietarydocuments?

    a. Ethics

    b. Intellectualproperty

    c. Copyright

    d.

    FairUse

    Doctrine

    Answer:C

    191. Cyberslackingconsistsofwhatactivities?

    a. Visitinginappropriatewebsites

    b. Visitingnewssites

    c. Chattingonlinewithothersaboutnonworktopics

    d. Alloftheabove

    Answer:D

    192. Whatisanarrangementmadebetweenecommercesitesthatdirectusersfromone

    sitetotheother?

    a.

    Spam

    b. Viralmarketing

    c. Affiliateprograms

    d. Noneoftheabove

    Answer:C

    193.

    Whichtypedealswithauction?

    a. B2B

    b. B2C

    c. C2B

    d. C2C

    Answer:D

    194. Whichoneisnot alayerofEcommerceinfrastructure

    a. Physicallayer

    b. Productlayer

    c. Servicelayer

    d.

    None

    Answer:D

    195.

    Whichwillharm computerresources

    a.

    Worm

    b. Virus

    c. Trojanhorse

    d. Alltheabove

    Answer:D

    196. Thestudyofencryptioniscalled

  • 8/10/2019 III SEM - E-commerce(Bcom)(1)

    31/31

    a. Decryption

    b. Cryptography

    c. Firewall

    d. Alltheabove

    Answer:B

    197.

    DuringEcommerce

    transaction

    we

    should

    ensure

    a. Integrity

    b. Security

    c. Confidentiality

    d. Alltheabove

    Answer:D

    198. Thevirusthatarecommonlyfoundinworddocumentsarecalled

    a. Macro

    b. Trojanhorse

    c. Scriptvirus

    d.

    Noneof

    the

    above

    Answer:A

    199. Thevirusthatareattachedwithvbandjavafilesarecalled

    a.

    Macro

    b. Trojanhorse

    c. Scriptvirus

    d. Noneoftheabove

    Answer:C

    200. Thevirusesspreadsthrough

    a. Mails

    b.

    Pendrivesandcds

    c. Websites

    d. Alltheabove

    Answer:D