154
91k

120+ Digital Business Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Master of Business Administration (MBA) .

51.

A portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» A. Vertical portal
52.

are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» B. horizontal portal
53.

Which among the following is an example for vertical portal ?

A. i-village
B. Yahoo
C. Google
D. Net scape
Answer» A. i-village
54.

A portal that helps to establish relations and to conduct transactions between various organizations is termed as………………

A. B2B portal
B. C2C portals
C. both of these
D. none of these
Answer» A. B2B portal
55.

A is a software that scours the internet collecting data about every website and every webpage within it

A. spider
B. Search Engines
C. robots
D. none of these
Answer» B. Search Engines
56.

Search Engines databases are selected and built by computer robot programs called………………………

A. spider
B. Search Engines
C. robots
D. none of these
Answer» A. spider
57.

Which among the following is not an example for Search engine ?

A. Google
B. MSN
C. Alta vista
D. none of these
Answer» D. none of these
58.

Web pages are prepared using their language as…………………

A. html
B. FTP
C. HTTP
D. None of these
Answer» A. html
59.

A web page is transferred to users computer through ……………………..

A. html
B. FTP
C. HTTP
D. None of these
Answer» C. HTTP
60.

The user reaches this page when they specify the address of a website

A. Home page
B. Web page
C. Summary page
D. None of these
Answer» A. Home page
61.

The purpose of page is to provide links to other pages

A. Home page
B. Web page
C. Summary page
D. None of these
Answer» A. Home page
62.

is an example for a software that visits suggested pages and return the appropriate information to be indexed by the search Engine

A. Robot
B. Spiders
C. Ants
D. All
Answer» D. All
63.

ads appears as rectangular graphics near the top of the page

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» A. Banner ad
64.

ads take up the entire screen and are more powerful than banner ads.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» B. floating ads
65.

is a form of advertisement on the web that appears between web pages that the user requests.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» C. interstitials
66.

is basically a TV commercial that runs in the browser window.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» D. Unicast ads
67.

Advertisements take the form of a website copy are called…………………………

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» A. Advertorial
68.

………………..is the most unwanted of online advertising methods.

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» B. pop-up ads
69.

is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» C. Spam e-mail
70.

is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer» A. Mobile Commerce
71.

is a class of advertising methods which are considered unethical and may even be illegal

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» D. malware
72.

is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these
Answer» C. Any of these
73.

are animated full screen ads placed at the entry of a site before a user reaches the intended content.

A. Intromercial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» A. Intromercial
74.

are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content.

A. Ultramercial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» A. Ultramercial
75.

facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties.

A. Metamediary
B. Intermediary
C. middlemen
D. all of these
Answer» A. Metamediary
76.

is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer» A. Mobile Commerce
77.

provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these
Answer» A. HTTP
78.

website is one that changes or customizes itself frequently and automatically based on certain criteria

A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer» A. Dynamic website
79.

………………site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer» C. phish site
80.

……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» A. customer
81.

……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments

A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» D. Acquirer
82.

In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
83.

………………type of payment system is highly useful to those customers who would like to control overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
84.

credit card gives all the advantages of a normal credit card without worrying about the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
85.

facility helps the customer to pay only a small amount of the total outstanding and revolve the rest of the payment to the next month.

A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer» B. Revolver
86.

is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.

A. E-cash
B. Digicash
C. Cyber cash
D. any of these
Answer» D. any of these
87.

is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer» A. Credit card
88.

To accept a credit card for payment, we have to open a account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer» C. Merchant account
89.

A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.

A. smart Card
B. E-Cheques
C. E-cash
D. none of these
Answer» A. smart Card
90.

is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» A. Debit Card
91.

……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» B. Electronic purse
92.

is basically a secure gate between our organization data and internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» A. Network firewall
93.

encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these
Answer» B. SET
94.

is automated methods of recognizing a person based on a physiological or behavioral characteristic.

A. Biometric
B. PIN
C. both of these
D. none of these
Answer» A. Biometric
95.

In Biometrics,… ID system is designed to prevent more than one person from using a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» A. Positive ID system
96.

In Biometrics,… ID system is designed to prevent one person from using more than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» B. Negative ID system
97.

are program developed by some dishonest people to destroy the computer system and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer» B. computer virus
98.

Which among the following is not an example for computer virus ?

A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer» D. None of these
99.

are special type of software meant for limiting the risks of being hit by computer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
100.

A is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

A. Hacker
B. spoofer
C. operator
D. none of these
Answer» A. Hacker

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.