

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Commerce (B Com) .
101. |
Internet advertising is cost effective because it is/can be |
A. | relatively inexpensive |
B. | personalized for a particular audience |
C. | tracked and measured |
D. | All of the above |
Answer» D. All of the above |
102. |
The form of internet marketing wherein the advertisers pay the search engine or the publisher of the ads whenever their ads are clicked is |
A. | Cost per Click |
B. | Cost per Mille |
C. | Cost per Lead |
D. | Cost per Action |
Answer» A. Cost per Click |
103. |
Internet advertising suffers from weaknesses like |
A. | low response rate |
B. | intrusiveness |
C. | Both of the above |
D. | Neither of the above |
Answer» C. Both of the above |
104. |
Mobile commerce can categorized into |
A. | Mobile shopping |
B. | Mobile banking |
C. | Mobile payments |
D. | All of the above |
Answer» D. All of the above |
105. |
Which of the following is the most common way for purchasing an online advertising? |
A. | CPM |
B. | CPC |
C. | Any of these |
D. | None of these |
Answer» C. Any of these |
106. |
Which of the following is a software that scours the internet collecting data about every website and every webpage within it? |
A. | Spiders |
B. | Search Engines |
C. | Robots |
D. | None of these |
Answer» B. Search Engines |
107. |
Search Engines databases are selected and built by computer robot programs called: |
A. | Spiders |
B. | Search Engines |
C. | Robots |
D. | None of these |
Answer» A. Spiders |
108. |
A portal that helps to establish relations and to conduct transactions between various organizations is termed as: |
A. | B2B Portal |
B. | C2C Portal |
C. | Both of these |
D. | None of these |
Answer» A. B2B Portal |
109. |
Which among the following is not an example for Search engine? |
A. | |
B. | Alta Vista |
C. | Bing |
D. | Internet Explorer |
Answer» D. Internet Explorer |
110. |
Web pages are prepared using their language as: |
A. | HTML |
B. | HTTP |
C. | FTP |
D. | All of the above |
Answer» A. HTML |
111. |
The user reaches this page when they specify the address of a website: |
A. | Summery Page |
B. | Web Page |
C. | Home Page |
D. | Page List |
Answer» C. Home Page |
112. |
Which of the following is a correct syntax of HTML? |
A. | <!doctype HTML> |
B. | <doctype! HTML> |
C. | <HTML !doctype> |
D. | <HTML doctype!> |
Answer» A. <!doctype HTML> |
113. |
Software which allows user to view the webpage is called as __________. |
A. | Interpreter |
B. | Internet browser |
C. | Website |
D. | Operating system |
Answer» B. Internet browser |
114. |
Which of the following website is used to search other website by typing a keyword ? |
A. | Social Networks |
B. | Search Engine |
C. | Routers |
D. | None of these |
Answer» B. Search Engine |
115. |
Which of the following is valid Website Address ? |
A. | ww#.helenlowry.com |
B. | www.helenlowry.com |
C. | helenlowry@.com |
D. | www.helenlowry |
Answer» B. www.helenlowry.com |
116. |
Whenever user opens any website then main page is called as ____. |
A. | Backend page |
B. | Home page |
C. | Dead page |
D. | None of these |
Answer» B. Home page |
117. |
_________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business |
A. | Dynamic website |
B. | Static Website |
C. | phish site |
D. | none of these |
Answer» C. phish site |
118. |
HTML stands for? |
A. | Hyper Text Markup Language |
B. | High Text Markup Language |
C. | Hyper Tabular Markup Language |
D. | None of these |
Answer» A. Hyper Text Markup Language |
119. |
HTML is a subset of |
A. | SGMT |
B. | SGML |
C. | SGMD |
D. | None of these |
Answer» A. SGMT |
120. |
A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers |
A. | Online broker |
B. | E-payment. |
C. | Traditional Market |
D. | Commerce |
Answer» B. E-payment. |
121. |
E-cash was created by |
A. | David Chaum. |
B. | Mark Zuckerberg |
C. | Jack Maa |
D. | Benjamin Young |
Answer» A. David Chaum. |
122. |
A plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments etc |
A. | Debit card |
B. | Smart Card. |
C. | E-cheque |
D. | E-Wallet |
Answer» B. Smart Card. |
123. |
The first universal credit card, which could be used at a variety of establishments, was introduced by |
A. | VISA |
B. | American Express |
C. | Diners’ Club. |
D. | SBI |
Answer» C. Diners’ Club. |
124. |
Example of Digital wallet |
A. | Paytm |
B. | Mobikwik |
C. | Ali Pay |
D. | All of the above. |
Answer» D. All of the above. |
125. |
A type of fraud that involves diverting the client Internet connection to a counterfeit website. |
A. | Phishing |
B. | Pharming. |
C. | Ddos |
D. | Virus |
Answer» B. Pharming. |
126. |
_________identifies a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computer |
A. | Physiological biometric authentication |
B. | Advance biometric authentication |
C. | Behavioral biometric authentication. |
D. | None of the above |
Answer» C. Behavioral biometric authentication. |
127. |
The grace period of a credit card normally runs from |
A. | The end of a billing cycle to the next starting date |
B. | The end of a previous due till next starting date. |
C. | The starting of a billing cycle to the next payment due date |
D. | The end of a billing cycle to the next payment due date. |
Answer» D. The end of a billing cycle to the next payment due date. |
128. |
…………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet. |
A. | E-cash |
B. | Digicash |
C. | Cyber cash |
D. | any of these |
Answer» D. any of these |
129. |
………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit. |
A. | Credit card |
B. | E-Cheques |
C. | E-cash |
D. | none of these |
Answer» A. Credit card |
130. |
A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone. |
A. | smart Cards |
B. | E-Cheques |
C. | E-cash |
D. | none of these |
Answer» A. smart Cards |
131. |
………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account |
A. | Debit Card |
B. | Electronic purse |
C. | credit card |
D. | any of these |
Answer» A. Debit Card |
132. |
………………type of payment system is highly useful to those customers who would like to control overspending, |
A. | Postpaid |
B. | Prepaid |
C. | both of these |
D. | none of these |
Answer» B. Prepaid |
133. |
.……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation. |
A. | Debit Card |
B. | credit card |
C. | Electronic purse |
D. | any of these |
Answer» C. Electronic purse |
134. |
……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer |
A. | customer |
B. | issuer |
C. | Merchant |
D. | Acquirer |
Answer» A. customer |
135. |
In Biometrics, …………………………ID system is designed to prevent more than one person from using a single identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» A. Positive ID system |
136. |
In Online Payment System one can transfer money through |
A. | Post |
B. | Bank |
C. | Internet |
D. | Money transfer company |
Answer» C. Internet |
137. |
One advantage of online payment system is |
A. | Overseas purchase |
B. | Privacy |
C. | Security |
D. | Service fee |
Answer» A. Overseas purchase |
138. |
Which one of them is not an online payment method? |
A. | Mobile Payment |
B. | Demand Draft |
C. | Internet Payment |
D. | Credit Card |
Answer» B. Demand Draft |
139. |
When goods are purchased without debiting money from your account what type of purchase method are you using? |
A. | Debit card Purchase |
B. | Cheque purchase |
C. | Credit card Purchase |
D. | Bank transfer purchase |
Answer» C. Credit card Purchase |
140. |
When money is debited from your account when purchasing goods, you are using |
A. | Debit Card Purchase |
B. | Credit card Purchase |
C. | Cash Purchase |
D. | Credit Promissory note purchase |
Answer» A. Debit Card Purchase |
141. |
Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called |
A. | Interception |
B. | Hacking |
C. | Snooping |
D. | Man-In-The-Middle |
Answer» D. Man-In-The-Middle |
142. |
Encryption means |
A. | Block contents |
B. | Filter contents |
C. | Password protection |
D. | Censorship |
Answer» C. Password protection |
143. |
Finger print recognition is a type of |
A. | Behavioural Biometric |
B. | Physiological Biometric |
C. | Encrypted Protection |
D. | Program Protected |
Answer» B. Physiological Biometric |
144. |
Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation? |
A. | Debit Card |
B. | Credit Card |
C. | Electronic Wallet / Electronic Purse |
D. | Any of these |
Answer» C. Electronic Wallet / Electronic Purse |
145. |
Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine? |
A. | SSl |
B. | SET |
C. | Both of these |
D. | None of these |
Answer» B. SET |
146. |
Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic? |
A. | Biometrics |
B. | PIN |
C. | Password |
D. | All of the above |
Answer» A. Biometrics |
147. |
Which among the following is not an example for computer virus? |
A. | I Love You |
B. | Jerusalem |
C. | Melissa |
D. | Network Firewall |
Answer» D. Network Firewall |
148. |
Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure? |
A. | Black Hat Hacker |
B. | Spoofer |
C. | Operator |
D. | White Hat Hacker |
Answer» A. Black Hat Hacker |
149. |
SET means: |
A. | Standard Electronic Transfer |
B. | Standard Electronic Technology |
C. | Secure Electronic Transfer |
D. | Secure Electronic Transaction |
Answer» D. Secure Electronic Transaction |
150. |
The verification of credit card is done by using: |
A. | Credit Card Payment |
B. | Point of Sale |
C. | All of the above |
D. | None of these |
Answer» C. All of the above |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.