190+ Essentials of Ecommerce Solved MCQs

101.

Internet advertising is cost effective because it is/can be

A. relatively inexpensive
B. personalized for a particular audience
C. tracked and measured
D. All of the above
Answer» D. All of the above
102.

The form of internet marketing wherein the advertisers pay the search engine or the publisher of the ads whenever their ads are clicked is

A. Cost per Click
B. Cost per Mille
C. Cost per Lead
D. Cost per Action
Answer» A. Cost per Click
103.

Internet advertising suffers from weaknesses like

A. low response rate
B. intrusiveness
C. Both of the above
D. Neither of the above
Answer» C. Both of the above
104.

Mobile commerce can categorized into

A. Mobile shopping
B. Mobile banking
C. Mobile payments
D. All of the above
Answer» D. All of the above
105.

Which of the following is the most common way for purchasing an online advertising?

A. CPM
B. CPC
C. Any of these
D. None of these
Answer» C. Any of these
106.

Which of the following is a software that scours the internet collecting data about every website and every webpage within it?

A. Spiders
B. Search Engines
C. Robots
D. None of these
Answer» B. Search Engines
107.

Search Engines databases are selected and built by computer robot programs called:

A. Spiders
B. Search Engines
C. Robots
D. None of these
Answer» A. Spiders
108.

A portal that helps to establish relations and to conduct transactions between various organizations is termed as:

A. B2B Portal
B. C2C Portal
C. Both of these
D. None of these
Answer» A. B2B Portal
109.

Which among the following is not an example for Search engine?

A. Google
B. Alta Vista
C. Bing
D. Internet Explorer
Answer» D. Internet Explorer
110.

Web pages are prepared using their language as:

A. HTML
B. HTTP
C. FTP
D. All of the above
Answer» A. HTML
111.

The user reaches this page when they specify the address of a website:

A. Summery Page
B. Web Page
C. Home Page
D. Page List
Answer» C. Home Page
112.

Which of the following is a correct syntax of HTML?

A. <!doctype HTML>
B. <doctype! HTML>
C. <HTML !doctype>
D. <HTML doctype!>
Answer» A. <!doctype HTML>
113.

Software which allows user to view the webpage is called as __________.

A. Interpreter
B. Internet browser
C. Website
D. Operating system
Answer» B. Internet browser
114.

Which of the following website is used to search other website by typing a keyword ?

A. Social Networks
B. Search Engine
C. Routers
D. None of these
Answer» B. Search Engine
115.

Which of the following is valid Website Address ?

A. ww#.helenlowry.com
B. www.helenlowry.com
C. helenlowry@.com
D. www.helenlowry
Answer» B. www.helenlowry.com
116.

Whenever user opens any website then main page is called as ____.

A. Backend page
B. Home page
C. Dead page
D. None of these
Answer» B. Home page
117.

_________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business

A. Dynamic website
B. Static Website
C. phish site
D. none of these
Answer» C. phish site
118.

HTML stands for?

A. Hyper Text Markup Language
B. High Text Markup Language
C. Hyper Tabular Markup Language
D. None of these
Answer» A. Hyper Text Markup Language
119.

HTML is a subset of

A. SGMT
B. SGML
C. SGMD
D. None of these
Answer» A. SGMT
120.

A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers

A. Online broker
B. E-payment.
C. Traditional Market
D. Commerce
Answer» B. E-payment.
121.

E-cash was created by

A. David Chaum.
B. Mark Zuckerberg
C. Jack Maa
D. Benjamin Young
Answer» A. David Chaum.
122.

A plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments etc

A. Debit card
B. Smart Card.
C. E-cheque
D. E-Wallet
Answer» B. Smart Card.
123.

The first universal credit card, which could be used at a variety of establishments, was introduced by

A. VISA
B. American Express
C. Diners’ Club.
D. SBI
Answer» C. Diners’ Club.
124.

Example of Digital wallet

A. Paytm
B. Mobikwik
C. Ali Pay
D. All of the above.
Answer» D. All of the above.
125.

A type of fraud that involves diverting the client Internet connection to a counterfeit website.

A. Phishing
B. Pharming.
C. Ddos
D. Virus
Answer» B. Pharming.
126.

_________identifies a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computer

A. Physiological biometric authentication
B. Advance biometric authentication
C. Behavioral biometric authentication.
D. None of the above
Answer» C. Behavioral biometric authentication.
127.

The grace period of a credit card normally runs from

A. The end of a billing cycle to the next starting date
B. The end of a previous due till next starting date.
C. The starting of a billing cycle to the next payment due date
D. The end of a billing cycle to the next payment due date.
Answer» D. The end of a billing cycle to the next payment due date.
128.

…………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.

A. E-cash
B. Digicash
C. Cyber cash
D. any of these
Answer» D. any of these
129.

………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer» A. Credit card
130.

A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.

A. smart Cards
B. E-Cheques
C. E-cash
D. none of these
Answer» A. smart Cards
131.

………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» A. Debit Card
132.

………………type of payment system is highly useful to those customers who would like to control overspending,

A. Postpaid
B. Prepaid
C. both of these
D. none of these
Answer» B. Prepaid
133.

.……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

A. Debit Card
B. credit card
C. Electronic purse
D. any of these
Answer» C. Electronic purse
134.

……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» A. customer
135.

In Biometrics, …………………………ID system is designed to prevent more than one person from using a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» A. Positive ID system
136.

In Online Payment System one can transfer money through

A. Post
B. Bank
C. Internet
D. Money transfer company
Answer» C. Internet
137.

One advantage of online payment system is

A. Overseas purchase
B. Privacy
C. Security
D. Service fee
Answer» A. Overseas purchase
138.

Which one of them is not an online payment method?

A. Mobile Payment
B. Demand Draft
C. Internet Payment
D. Credit Card
Answer» B. Demand Draft
139.

When goods are purchased without debiting money from your account what type of purchase method are you using?

A. Debit card Purchase
B. Cheque purchase
C. Credit card Purchase
D. Bank transfer purchase
Answer» C. Credit card Purchase
140.

When money is debited from your account when purchasing goods, you are using

A. Debit Card Purchase
B. Credit card Purchase
C. Cash Purchase
D. Credit Promissory note purchase
Answer» A. Debit Card Purchase
141.

Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called

A. Interception
B. Hacking
C. Snooping
D. Man-In-The-Middle
Answer» D. Man-In-The-Middle
142.

Encryption means

A. Block contents
B. Filter contents
C. Password protection
D. Censorship
Answer» C. Password protection
143.

Finger print recognition is a type of

A. Behavioural Biometric
B. Physiological Biometric
C. Encrypted Protection
D. Program Protected
Answer» B. Physiological Biometric
144.

Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation?

A. Debit Card
B. Credit Card
C. Electronic Wallet / Electronic Purse
D. Any of these
Answer» C. Electronic Wallet / Electronic Purse
145.

Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine?

A. SSl
B. SET
C. Both of these
D. None of these
Answer» B. SET
146.

Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic?

A. Biometrics
B. PIN
C. Password
D. All of the above
Answer» A. Biometrics
147.

Which among the following is not an example for computer virus?

A. I Love You
B. Jerusalem
C. Melissa
D. Network Firewall
Answer» D. Network Firewall
148.

Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure?

A. Black Hat Hacker
B. Spoofer
C. Operator
D. White Hat Hacker
Answer» A. Black Hat Hacker
149.

SET means:

A. Standard Electronic Transfer
B. Standard Electronic Technology
C. Secure Electronic Transfer
D. Secure Electronic Transaction
Answer» D. Secure Electronic Transaction
150.

The verification of credit card is done by using:

A. Credit Card Payment
B. Point of Sale
C. All of the above
D. None of these
Answer» C. All of the above
151.

The reverse process of encryption, to make the information readable once again is:

A. Sniffing
B. Decryption
C. Cryptography
D. Translation153.
Answer» B. Decryption
152.

An Electronic Check is one form of what?

A. Ecommerce
B. Online Banking
C. E-cash
D. Check
Answer» B. Online Banking
153.

A combination of software and information designed to provide security and information for payment is called?

A. Digital wallet
B. Pop up ads
C. Shoppng cart
D. Encryption
Answer» A. Digital wallet
154.

A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer» B. Digital certificates
155.

……………………….is a person who breaks in or trespasses a computer system

A. Hacker
B. Snooper
C. operator
D. spoofer
Answer» A. Hacker
156.

E-mail which contain useless material is termed as……………

A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer» A. Spam
157.

What is Biometrics ?

A. It is a branch of biology
B. It recognizes individuals based on their inherent physical or behavioral characteristics.
C. a)&b).
D. None of these
Answer» B. It recognizes individuals based on their inherent physical or behavioral characteristics.
158.

SET means ………………

A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Answer» B. Standard Electronic Transfer
159.

Patents protects

A. Expression of an idea
B. Inventions.
C. Books and Articles
D. Company Logo
Answer» B. Inventions.
160.

The minimum punishment for an infringement of copyright in India is

A. 3 months imprisonment and minimum of Rs 50,000 fine
B. 3 months imprisonment and minimum of Rs 60,000 fine
C. 6 months imprisonment and minimum of Rs 50,000 fine.
D. 6 months imprisonment and minimum of Rs 30,000 fine
Answer» C. 6 months imprisonment and minimum of Rs 50,000 fine.
161.

A________ is a right, granted by the government, to exclude others from making, using, or selling your invention

A. Copyright
B. Patents.
C. Trademark
D. Trade Secret
Answer» B. Patents.
162.

TheTerm of every patent in India is

A. 50 years
B. 40 years
C. 30 years
D. 20 years.
Answer» D. 20 years.
163.

The Trademarks Act 1999 protects well-known trademarks from:

A. an action against the registration of similar marks.
B. an action against the misuse of someones identity
C. an action against copying someones lyrics
D. All of the above
Answer» A. an action against the registration of similar marks.
164.

The penalties for infringement of Trademarked content in India

A. Minimum 3 months imprisonment and fine of INR 20,0000
B. Minimum 4 months imprisonment and fine of INR 30,0000
C. Minimum 5 months imprisonment and fine of INR 40,0000
D. Minimum 6 months imprisonment and fine of INR 50,0000.
Answer» D. Minimum 6 months imprisonment and fine of INR 50,0000.
165.

When did IT Act 2000 came into effect

A. October 17, 2000.
B. October 17, 2001
C. November 11, 2000
D. November 11, 2001
Answer» A. October 17, 2000.
166.

How many schedules are there in IT Act 2000

A. 3
B. 4.
C. 5
D. 6
Answer» B. 4.
167.

Trade mark, copyright, patent law etc comes under the purview of……………………

A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer» C. Intellectual property laws
168.

Which of the following is an example of Intellectual property ?

A. Patent
B. Trade Marks
C. Copyright
D. All of above
Answer» D. All of above
169.

Copyright protection is available for

A. Literary work
B. Musical work
C. Artistic work
D. All the above
Answer» D. All the above
170.

Plan of a building can be protected by

A. Copyright
B. Patent
C. Trade secret
D. Industrial Design
Answer» A. Copyright
171.

Copyright protects

A. Idea
B. Expression
C. Both a) and b)
D. None of the above
Answer» B. Expression
172.

Patent of addition can be filed by

A. Inventor
B. Patentee
C. Both a) and b)
D. None of the above
Answer» C. Both a) and b)
173.

What is the updated version of the IT Act, 2000?

A. IT Act, 2007
B. Advanced IT Act, 2007
C. IT Act, 2008
D. Advanced IT Act, 2008
Answer» C. IT Act, 2008
174.

_______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind.

A. Censorship
B. Patent
C. Trademark
D. Copyright
Answer» C. Trademark
175.

An unauthorised entry into other people’s electronic device is called

A. Spamming
B. Hacking
C. Copyrighting
D. Breaching
Answer» B. Hacking
176.

Gaining control of client computer through network is called

A. Snooping
B. Sniffing
C. Buffing
D. Dialling
Answer» A. Snooping
177.

A copyright owner can give authority to anyone to

A. Duplicate intellectual property
B. Process intellectual property
C. Copy intellectual property
D. Sell intellectual property
Answer» C. Copy intellectual property
178.

Patent right gives the sole authority to produce for

A. Consumers
B. Investors
C. Industry
D. Inventors
Answer» D. Inventors
179.

Trademark uniquely differentiate products from other

A. Inventors
B. Products
C. Investors
D. Pioneers
Answer» B. Products
180.

Which one of this is not used for trademarking products

A. Logo
B. Words
C. Feature
D. Symbol
Answer» C. Feature
181.

When some words, pictures or videos is banned from public notice it is called

A. Spamming
B. Censorship
C. Authentication
D. Hiding
Answer» B. Censorship
182.

When unwanted or unexpected email or messages is sent to an electronic device it is known as

A. Bulk message
B. Phishing
C. Advertising
D. Spamming
Answer» D. Spamming
183.

The information Technology Act [IT ACT] came into effect on:

A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. 14th November 2000
Answer» C. 17th October 2000
184.

A person who breaks in or trespasses a computer system:

A. Hacker
B. Snooper
C. Operator
D. Spoofer
Answer» A. Hacker
185.

E-mail which contain useless material is termed as:

A. Spam Mail
B. Trunk Mail
C. Junk Mail
D. Inbox Mail
Answer» C. Junk Mail
186.

Which of the following crimes were not covered under IT (Amendment) Act, 2008?

A. Cyber Terrorism
B. Child Pornography
C. Video voyeurism
D. None of these
Answer» D. None of these
187.

Trade mark, copyright, patent law, etc. comes under the purview of:

A. Data Protection
B. Telecommunication Laws
C. Intellectual Property Laws
D. All of the above
Answer» C. Intellectual Property Laws
188.

Which one of the following is not a principle of e-commerce?

A. Privacy
B. Integrity
C. Authentication
D. None of these
Answer» D. None of these
189.

Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?

A. Hacker
B. Software
C. Computer Virus
D. Computer Anti-virus
Answer» C. Computer Virus
190.

An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:

A. Digital Signature
B. Digital Certificates
C. SSL
D. None of these
Answer» B. Digital Certificates
191.

India has enacted the first IT Act in the year……

A. 2001
B. 2002
C. 2009
D. 2000
Answer» D. 2000
192.

Trade mark, copyright, patent law etc comes under the purview of………

A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer» C. Intellectual property laws
193.

All of the following are examples of real security and privacy risks EXCEPT:

A. hackers.
B. spam.
C. viruses.
D. identity theft
Answer» B. spam.
194.

Digital Cash has following characteristic

A. Anonymity
B. Security
C. Confidentiality
D. All of Above
Answer» D. All of Above
195.

Who breaks into other people’s computer system and steals and destroys information:

A. Hackers
B. Software
C. Hacktivists
D. Script Kiddies
Answer» A. Hackers
196.

Which process is used to re install data from a copy when the original data has been lost

A. Backup
B. Recovery
C. Bench marking
D. Data cleansing
Answer» B. Recovery
197.

Which service encompasses all technologies used to transmit and process information on an across a network?

A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer» D. Web services
198.

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer» D. spoofing
Tags
Question and answers in Essentials of Ecommerce, Essentials of Ecommerce multiple choice questions and answers, Essentials of Ecommerce Important MCQs, Solved MCQs for Essentials of Ecommerce, Essentials of Ecommerce MCQs with answers PDF download