540+ E-Commerce Solved MCQs

301.

Which among the following is an example of C2C ?

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer» D. all of these
302.

Peer to Peer [P2P] is also used to describe………………………….

A. C2C
B. B2E
C. B2B
D. B2C
Answer» A. C2C
303.

…………………….is an online auctioning site that facilitates the trade of privately owned items between individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer» A. e-Bay
304.

Monster.com is an example of ……………………..website

A. C2C
B. B2E
C. B2B
D. B2C
Answer» A. C2C
305.

………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files

A. P2P
B. B2E
C. B2B
D. B2C
Answer» A. P2P
306.

This is a protocol which allows files to be transferred from one computer to another computer

A. TCP/IP
B. FTP
C. HTTP
D. none of these
Answer» B. FTP
307.

A ……………….is a document, typically written in plain text interspersed with formatting instructions of html

A. Web page
B. home page
C. domain
D. none of these
Answer» A. Web page
308.

………………….is the first page of a web site.

A. Web page
B. home page
C. domain
D. none of these
Answer» B. home page
309.

……………..allows the person to type ion just the main word or words and the site will come in

A. Web page
B. home page
C. domain
D. none of these
Answer» C. domain
310.

A ………………….. presents information from diverse sources in a unified way on a website.

A. Web portal
B. Link page
C. Both of these
D. none of these
Answer» C. Both of these
311.

A……………portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» A. Vertical portal
312.

………………..are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» B. horizontal portal
313.

Which among the following is an example for vertical portal ?

A. i-village
B. Yahoo
C. Google
D. Net scape
Answer» A. i-village
314.

A portal that helps to establish relations and to conduct transactions between various organizations is termed as………………

A. B2B portals
B. C2C portals
C. both of these
D. none of these
Answer» A. B2B portals
315.

A …………………….is a software that scours the internet collecting data about every website and every webpage within it

A. spiders
B. Search Engines
C. robots
D. none of these
Answer» B. Search Engines
316.

Search Engines databases are selected and built by computer robot programs called………………………

A. spiders
B. Search Engines
C. robots
D. none of these
Answer» A. spiders
317.

Which among the following is not an example for Search engine ?

A. Google
B. MSN
C. Alta vista
D. none of these
Answer» D. none of these
318.

Web pages are prepared using their language as…………………

A. html
B. FTP
C. HTTP
D. None of these
Answer» A. html
319.

A web page is transferred to users computer through ……………………..

A. html
B. FTP
C. HTTP
D. None of these
Answer» C. HTTP
320.

The user reaches this page when they specify the address of a website

A. Home page
B. Web page
C. Summary page
D. None of these
Answer» A. Home page
321.

The purpose of ………………page is to provide links to other pages

A. Home page
B. Web page
C. Summary page
D. None of these
Answer» A. Home page
322.

……………is an example for a software that visits suggested pages and return the appropriate information to be indexed by the search Engine

A. Robot
B. Spiders
C. Ants
D. All
Answer» D. All
323.

………………………………..ads appears as rectangular graphics near the top of the page

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer» A. Banner ads
324.

………………….ads take up the entire screen and are more powerful than banner ads.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer» B. floating ads
325.

………………………….is a form of advertisement on the web that appears between web pages that the user requests.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer» C. interstitials
326.

……………………is basically a TV commercial that runs in the browser window.

A. Banner ads
B. floating ads
C. interstitials
D. Unicast ads
Answer» D. Unicast ads
327.

Advertisements take the form of a website copy are called…………………………

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» A. Advertorials
328.

………………..is the most unwanted of online advertising methods.

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» B. pop-up ads
329.

…………………..is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» C. Spam e-mail
330.

…………………..is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer» A. Mobile Commerce
331.

…………………is a class of advertising methods which are considered unethical and may even be illegal

A. Advertorials
B. pop-up ads
C. Spam e-mail
D. malware
Answer» D. malware
332.

……………….is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these
Answer» C. Any of these
333.

………………are animated full screen ads placed at the entry of a site before a user reaches the intended content.

A. Intromercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer» A. Intromercials
334.

………………….are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content.

A. Ultramercials
B. pop-up ads
C. Spam e-mail
D. malware
Answer» A. Ultramercials
335.

………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer» A. Mobile Commerce
336.

…………….provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these
Answer» A. HTTP
337.

…………………….website is one that changes or customizes itself frequently and automatically based on certain criteria

A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer» A. Dynamic website
338.

………………site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer» C. phish site
339.

……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» A. customer
340.

……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments

A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» D. Acquirer
341.

In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
342.

………………type of payment system is highly useful to those customers who would like to control overspending,

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
343.

……………………….credit card gives all the advantages of a normal credit card without worrying about the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» A. Prepaid
344.

……………………facility helps the customer to pay only a small amount of the total outstanding and revolve the rest of the payment to the next month.

A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer» B. Revolver
345.

………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer» A. Credit card
346.

To accept a credit card for payment, we have to open a …………………account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer» C. Merchant account
347.

………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» A. Debit Card
348.

……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» B. Electronic purse
349.

………………is basically a secure gate between our organization data and internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» A. Network firewall
350.

……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

A. SSL
B. SET
C. both of these
D. none of these
Answer» B. SET
351.

………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.

A. Biometrics
B. PIN
C. both of these
D. none of these
Answer» A. Biometrics
352.

In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» A. Positive ID system
353.

In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» B. Negative ID system
354.

…………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer» B. computer virus
355.

Which among the following is not an example for computer virus ?

A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer» D. None of these
356.

……………………are special type of software meant for limiting the risks of being hit by computer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
357.

A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

A. Hacker
B. spoofer
C. operator
D. none of these
Answer» A. Hacker
358.

……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» A. Network firewall
359.

…………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» A. Network firewall
360.

SET means …………………………….

A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Answer» C. Secure Electronic Transaction
361.

The verification of credit card is done by using…………….. with a communications link to the merchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer» C. All of these
362.

Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as………………………….

A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» A. Spoofing
363.

Gain entry into the user’s system and scan your file system for personal information is known as……………….

A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» B. Snooping
364.

………………attacks are difficult and are only successful if the attacker knows something about the shopper

A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Answer» D. Guessing passwords
365.

…………………is the process of making information unintelligible to the unauthorized user.

A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Answer» D. Cryptography
366.

………………….is the reverse process of encryption, to make the information readable once again

A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Answer» B. Decryption
367.

A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer» B. Digital signature
368.

A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer» B. Digital certificates
369.

The information Technology Act [IT ACT] came into effect on

A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these
Answer» C. 17th October 2000
370.

Information sent over the Internet commonly uses the set of rules called………………………..

A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer» A. TCP/IP
371.

E-mail which contain useless material is termed as………………………

A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer» D. Junk mail
372.

India has enacted the first IT Act in the year……………………………………

A. 2001
B. 2002
C. 2009
D. 2000
Answer» D. 2000
373.

Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer» D. None of these
374.

Trade mark, copyright, patent law etc comes under the purview of……………………

A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer» C. Intellectual property laws
375.

……………….is a programme designed o replicate and spread generally with the victim being oblivious to its existence

A. hacker
B. software
C. Computer virus
D. none of these
Answer» C. Computer virus
376.

Which one of the following is not a principle of e-commerce ?

A. privacy
B. integrity
C. authentication
D. none of these
Answer» D. none of these
377.

Which of the below is/are goals of E-Commerce?

A. 24×7
B. reach out to larger audience
C. time saving
D. all of the above
Answer» D. all of the above
378.

In which one of the following type of E-Commerce, consumer sells to consumer directly?

A. C2B
B. B2C
C. B2B
D. C2C
Answer» D. C2C
379.

................ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format

A. Encapsulation
B. EDI
C. ERP
D. Transaction processing
Answer» B. EDI
380.

What does EDI stand for?

A. Electronic Data Interface
B. E-Commerce Data Interface
C. Electronic Data Interaction
D. Electronic Data Interchange
Answer» D. Electronic Data Interchange
381.

When a company buys some raw material from some other company, then it will come under:

A. B2B
B. B2C
C. C2B
D. C2C
Answer» A. B2B
382.

In traditional commerce, people buy goods and services :

A. over the internet
B. physical visit
C. Both online & offline
D. None of the mentioned
Answer» B. physical visit
383.

Promotion of products in e-commerce can be done by

A. Social media
B. Online Ads
C. Blog
D. All of the mentioned
Answer» D. All of the mentioned
384.

Which of the following is not a dimension of e- commerce security provided by encryption ?

A. availability
B. integrity
C. non-repudiation
D. confidentiality
Answer» A. availability
385.

Conversion of Plain text to Cipher Text is called………………

A. Encryption
B. Decryption
C. Cryptography
D. none of these
Answer» A. Encryption
386.

In Porter's Five Forces, the 'threat of new entrants' relates to:

A. Barriers to entry
B. Substitutes
C. Switching costs
D. Buyer power
Answer» A. Barriers to entry
387.

Which of the following is true for supply chain management?

A. The physical material moves in the direction
B. Flow of cash backwards through the chain
C. Exchange of information moves in both the
D. All of the above
Answer» D. All of the above
388.

Logistics is the part of a supply chain involved with the forward and reverse flow of

A. goods
B. services
C. cash
D. All of the above
Answer» D. All of the above
389.

BPM is about:

A. Aligning business processes to organisational
B. Maintaining a process view of the organisation rather than a functional
C. Establishing and maintaining an environment of continuous
D. All of the above
Answer» D. All of the above
390.

CRM is :

A. Customer Relationship
B. Customer Relationship
C. Customer Recovery
D. Consumer Relation
Answer» A. Customer Relationship
391.

The best products to sell in B2C e-commerce are:

A. Small Products
B. Digital Products
C. Special Products
D. Fresh Products
Answer» B. Digital Products
392.

Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption
B. decryption
C. firewall
D. All of the mentioned
Answer» D. All of the mentioned
393.

Which type of products is lesser purchased using e- commerce?

A. automobiles
B. books
C. groceries
D. None of the mentioned
Answer» A. automobiles
394.

Which is not the application area of e-commerce?

A. E-Learning
B. E-Banking
C. E-Auction
D. None of the mentioned
Answer» D. None of the mentioned
395.

In which year the IT Act was introduced?

A. 2000
B. 2020
C. 2001
D. 2010
Answer» A. 2000
396.

                           is an early form of E-Commerce.

A. SCM
B. EDI
C. Both SCM & EDI
D. None of the mentioned
Answer» B. EDI
397.

Which of the following is not related to security mechanism?

A. encryption
B. decryption
C. e-cash
D. All of the mentioned
Answer» C. e-cash
398.

Digital Products are best suited for B2C e-commerce because they:

A. Are commodity like products
B. Can be mass- customized and
C. Can be delivered at the time of
D. All of the mentioned
Answer» D. All of the mentioned
399.

Which of the following is part of the four main types of e-commerce?

A. B2B
B. B2C
C. C2B
D. All of the mentioned
Answer» D. All of the mentioned
400.

The dimension of E-Commerce that enables commerce across the boundaries is called                    

A. interactivity
B. global reach
C. richness
D. ubiquity
Answer» B. global reach
Tags
  • Question and answers in E-Commerce,
  • E-Commerce multiple choice questions and answers,
  • E-Commerce Important MCQs,
  • Solved MCQs for E-Commerce,
  • E-Commerce MCQs with answers PDF download