112
83.9k

140+ E-Commerce Management Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Commerce (B Com) .

101.

Which is used for transferring money from one bank account to another directly without involving cash

A. eft
B. e-cash
C. micropayment
D. none
Answer» A. eft
102.

Which system provides a service that is paid for prior to usage

A. post paid payment system
B. prepaid payment system
C. spot cash system
D. none
Answer» B. prepaid payment system
103.

Which is an electronic medium for making payment

A. smart card
B. debit card
C. e- cash
D. all of the above
Answer» D. all of the above
104.

All credit cards are

A. smart cash
B. post paid cards
C. e cash
D. none
Answer» B. post paid cards
105.

A popular example of E wallet is

A. micro soft wallet
B. mega soft wallet
C. penta soft wallet
D. none
Answer» A. micro soft wallet
106.

Which are made for small payment on the web

A. mega payments
B. micro payments
C. spot payment
D. all the above
Answer» B. micro payments
107.

Which are used for signing and endorsing electronic changes

A. manual signature
B. thump impression
C. digital signature
D. spot signature
Answer» C. digital signature
108.

The two types of credit cards today namely credit cards issued by credit card companies

A. master card , visa
B. smart card credit card
C. debit card, e cash
D. none
Answer» A. master card , visa
109.

……………………is a card with a microchip that can be used instead of cash and coins for every thing.

A. electronics cash
B. fast cash
C. electronic purse
D. none
Answer» C. electronic purse
110.

Prepaid or real-time tokens are exchanged between

A. banker and applicant
B. payer and drawer
C. buyer and seller
D. none
Answer» C. buyer and seller
111.

…………. Is a digital analogue of various forms of payment backed by a bank

A. electronics cash
B. electronic purse
C. electronic tokens
D. non e
Answer» C. electronic tokens
112.

There are two main concerns for using digital coins: anonymity of the consumer and :-

A. prepaid system
B. post paid system
C. electronic tokens
D. online verification
Answer» D. online verification
113.

SSL is the most widely deployed

A. security protocol
B. data encryption
C. cryptography
D. none
Answer» A. security protocol
114.

…………………. Encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

A. ssl
B. set
C. secret key
D. none
Answer» B. set
115.

…………………. Is the process of coding and scrambling of messages to prevent un authorized access to under standing of data being transmitted

A. cryptography
B. encryption
C. security key
D. none
Answer» B. encryption
116.

………………. Is used to keep transmissions privacy through the use of data encryption techniques.

A. data encryption
B. crytography
C. security key
D. non e
Answer» B. crytography
117.

Which refers to the automatic identification (or) identity verification of living persons using their enduring physical or behavioral characteristics

A. biometrics
B. cryptography
C. encryption
D. none
Answer» A. biometrics
118.

……………… involves checking to see if the signal is good quality

A. transmission
B. quality control
C. decision
D. none
Answer» B. quality control
119.

The process of encrypted data readable once again is called,

A. encryption
B. decryption
C. uncryption
D. none
Answer» A. encryption
120.

This the process of making information un intelligible to the unauthorized reader

A. encryption
B. decryption
C. uncryption
D. none
Answer» A. encryption
121.

The attacker monitors the data between the shoppers computer and the server

A. spoofing
B. snoofing
C. sniffing
D. none
Answer» C. sniffing
122.

The private content of transaction, if unprotected can be intercepted when it go through the route over the internet called.

A. spoofing
B. snooping
C. sniffing
D. eavesdropping
Answer» D. eavesdropping
123.

Gain entry into the user’s system and scan your file system for personal information is known as

A. spoofing
B. snooping
C. sniffing
D. none
Answer» A. spoofing
124.

Creating illegitimate site that appear to published by established organizations are by this name

A. spoofing
B. snooping
C. sniffing
D. none
Answer» A. spoofing
125.

The IT act came into effect on

A. 17 may 2000
B. 17th december 2000
C. 17 oct 2000
D. 17 june 2000
Answer» C. 17 oct 2000
126.

UNCITRAL model law on E commerce is

A. 1996
B. 1994
C. 1995
D. 1997
Answer» A. 1996
127.

E commerce consists of commerce activities

A. electrically
B. technically
C. electronically
D. none
Answer» C. electronically
128.

…… provide security and privacy for the use of the web page content

A. http
B. html
C. ftp
D. none
Answer» A. http
129.

A digital signature performs a similar functions to a

A. thump impression
B. written signature
C. scanning
D. none
Answer» B. written signature
130.

Digital signature acts as a ……………….. for e commerce

A. risk
B. virus
C. security
D. boon
Answer» C. security
131.

Privacy laws of their host Coventry effect

A. domestic companies
B. overseas companies
C. neighboring companies
D. none
Answer» B. overseas companies
132.

…………………….is designed to protect a persons personal information

A. data integrity
B. cyber law
C. private legislation
D. none
Answer» C. private legislation
133.

There are different types of risks connected with information protection such as disruption, disaster.

A. unauthorized access
B. publicity
C. consumer
D. none
Answer» A. unauthorized access
134.

………………… are electronic files that are used to uniquely identify people and resources over the internet

A. digital signature
B. digital certificate
C. encryption recourse
D. none
Answer» B. digital certificate
135.

……………….. techniques make use of secret codes (or) keys to encrypt information

A. cryptography
B. encryption
C. digital certificate
D. none
Answer» A. cryptography
136.

The organization has to ensure that the …………… are sent to the customers

A. ordered goods
B. unordered goods
C. good quality goods
D. none
Answer» A. ordered goods
137.

………………… can catch the transmissions to obtain customers sensitive information

A. fire wall
B. anti virus
C. hackers
D. none
Answer» C. hackers
138.

SATAN is an example

A. unauthorized disclosures
B. unauthorized actions
C. snooping
D. spoofing
Answer» C. snooping
139.

Customers are concerned about

A. privacy and security of information
B. how things are managed
C. business practices
D. none
Answer» A. privacy and security of information
140.

Information sent over the internet commonly uses the set of rules called

A. ftp
B. tcp/ip
C. http
D. gopher
Answer» B. tcp/ip

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.