235
113.7k

540+ E-Commerce Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration (BBA) , Bachelor of Science in Computer Science (BSc CS) , Bachelor of Commerce (B Com) .

151.

E-mail which contains useless material is termed as……………

A. spam
B. useless mail
C. trunk mail
D. junk mail
Answer» D. junk mail
152.

India has enacted the first IT Act in the year……………………

A. 2001
B. 2002
C. 2009
D. 2000
Answer» D. 2000
153.

Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. cyber terrorism
B. child pornography
C. video voyeurism
D. none of these
Answer» D. none of these
154.

Trade mark, copyright, patent law etc comes under the purview of……………………

A. data protection
B. telecommunication laws
C. intellectual property laws
D. none
Answer» C. intellectual property laws
155.

Which one of the following is not a principle of e-commerce ?

A. privacy
B. integrity
C. authentication
D. none of these
Answer» D. none of these
156.

………………is basically a secure gate between our organization data and internet.

A. network firewall
B. antivirus
C. both of these
D. none of these
Answer» A. network firewall
157.

………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.

A. biometrics
B. pin
C. both of these
D. none of these
Answer» A. biometrics
158.

……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments.

A. customer
B. issuer
C. merchant
D. acquirer
Answer» D. acquirer
159.

In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.

A. prepaid
B. post paid
C. both of these
D. none of these
Answer» A. prepaid
160.

.……………….is the exchange of goods or items or commodities and services or applications used for money and deals the money matters

A. e-commerce
B. commerce
C. both of these
D. none
Answer» B. commerce
161.

……………….always operate on intranet

A. e--commerce
B. e-business
C. edi
D. none of these
Answer» B. e-business
162.

Which among the following is not an example for E-commerce

A. amazon.com
B. baazar.com
C. e-trade.com
D. none of these
Answer» C. e-trade.com
163.

………………were the first to establish prominent E-commerce Brands

A. baazar.com
B. e-bay and amazon
C. e-trade.com
D. none of these
Answer» B. e-bay and amazon
164.

…………….is a form of supply chain where a series of assembly operations are carried out to obtain the final product

A. converging supply chain
B. diverging supply chain
C. any of these
D. none
Answer» A. converging supply chain
165.

.…………………is a form of supply chain where a wide variety of finished goods are produced with limited number of raw material or components.

A. converging structure
B. diverging structure
C. any of these
D. none
Answer» B. diverging structure
166.

……………………is the exchange of services, information or product from one business to a government agency

A. b2g
B. b2e
C. b2b
D. p2p
Answer» A. b2g
167.

………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files

A. b2c
B. b2e
C. b2b
D. p2p
Answer» D. p2p
168.

”Google” is one of the most popular………………..

A. portal
B. browser
C. search engine
D. none of these
Answer» C. search engine
169.

A ………………….. Presents information from diverse sources in a unified way in a web site.

A. web portal
B. link page
C. both of these
D. none of these
Answer» C. both of these
170.

……………………….is a person who breaks in or trespasses a computer system

A. hacker
B. snooper
C. operator
D. spoofer
Answer» A. hacker
171.

Peer to Peer [P2P] is also used to describe ………………………

A. c2c
B. b2e
C. b2b
D. b2c
Answer» A. c2c
172.

……………..allows the person to type ion just the main word or words and the site will come in

A. web page
B. home page
C. domain
D. none of these
Answer» C. domain
173.

A ………………….. presents information from diverse sources in a unified way in a web site

A. web portal
B. link page
C. both of these
D. none of these
Answer» C. both of these
174.

In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity

A. positive id system
B. negative id system
C. both of these
D. none of these
Answer» B. negative id system
175.

…………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.

A. network firewall
B. computer virus
C. both of these
D. none of these
Answer» B. computer virus
176.

he dimension of e-commerce that enables commerce across national boundaries is called ______________.

A. interactivity
B. global reach
C. richness
D. ubiquity
Answer» B. global reach
177.

The primary source of financing during the early years of e-commerce was ______________.

A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Answer» C. venture capital funds
178.

The source of revenue in a subscription revenue model is ______________.

A. fees from advertisers in exchange for advertisements
B. fees for business referrals
C. fees from subscribers in exchange for access to content or services
D. fees for enabling or execution a transaction
Answer» C. fees from subscribers in exchange for access to content or services
179.

Industry structure is defined as ______________.

A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company\s product or service fulfills the needs of customers
Answer» A. the nature of the players in an industry and their relative bargaining power
180.

The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ______________.

A. tcp
B. ip
C. the network layer
D. the application layer
Answer» B. ip
181.

Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone
B. network architecture limitations
C. insufficient reach
D. best-efforts qos
Answer» C. insufficient reach
182.

Internet users account for about ______________ of the world's population.

A. 7%
B. 17%
C. 27%
D. 47%
Answer» B. 17%
183.

The most common type of Internet crime according to the IC3 is ______________.

A. credit card fraud
B. check fraud
C. non-delivery
D. auction fraud
Answer» D. auction fraud
184.

When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.

A. phishing
B. pharming
C. a denial of service (dos) attack
D. spoofing
Answer» C. a denial of service (dos) attack
185.

______________ influence the behavior of others through their personality, skills, or other factors.

A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups
Answer» A. opinion leaders
186.

A(n) ______________ represents data as two-dimensional tables with records organized in rows and attributes in columns.

A. database management system
B. data warehouse
C. sql query
D. relational database
Answer» D. relational database
187.

Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________.

A. versioning
B. bundling.
C. transactive content
D. price discrimination
Answer» A. versioning
188.

Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

A. loyalty
B. reach
C. recency
D. unique visitors
Answer» A. loyalty
189.

Which of the following statements about privacy is true?

A. it is a moral right to be left alone
B. only corporations and government need to be concerned about it
C. it has only just recently become a concern
D. it is most easily obtained on the internet
Answer» A. it is a moral right to be left alone
190.

The redirection of traffic from a legitimate site to an infringing site is called ______________.

A. cybersquatting
B. cyber piracy
C. met tagging
D. key wording
Answer» B. cyber piracy
191.

A security plan begins with a(n) is ______________.

A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer» B. risk assessment
192.

______________ influence the behavior of others through their personality, skills, or other factors.

A. opinion leaders
B. direct reference groups
C. indirect reference groups
D. lifestyle groups
Answer» A. opinion leaders
193.

Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________.

A. versioning
B. bundling.
C. transitive content
D. price discrimination
Answer» A. versioning
194.

Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

A. loyalty
B. reach
C. regency
D. unique visitors
Answer» A. loyalty
195.

______________ are networks that connect people within a company to each other and to the company network.

A. bitstreams
B. extranets
C. internets
D. intranets
Answer» D. intranets
196.

A website offering content created by third party transparently to customers is an example of ______________.

A. reinter mediation
B. syndication
C. virtual manufacturing
D. build-to-order
Answer» B. syndication
197.

E-commerce technologies have improved upon traditional commerce technologies in ______________.

A. richness
B. reach
C. both richness and reach
D. neither richness nor reach
Answer» C. both richness and reach
198.

All of the following are technologies used to gather information about you online except ______________.

A. spy ware
B. cookies
C. gmail
D. anonymizers
Answer» D. anonymizers
199.

______________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.

A. ping
B. telnet
C. tracert
D. ssl
Answer» A. ping
200.

Which of the following is a new and disruptive Web feature or service?

A. xml
B. diffserv
C. blogs
D. cdma
Answer» C. blogs

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.