141
68k

190+ Essentials of Ecommerce Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Commerce (B Com) .

151.

The reverse process of encryption, to make the information readable once again is:

A. Sniffing
B. Decryption
C. Cryptography
D. Translation153.
Answer» B. Decryption
152.

An Electronic Check is one form of what?

A. Ecommerce
B. Online Banking
C. E-cash
D. Check
Answer» B. Online Banking
153.

A combination of software and information designed to provide security and information for payment is called?

A. Digital wallet
B. Pop up ads
C. Shoppng cart
D. Encryption
Answer» A. Digital wallet
154.

A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer» B. Digital certificates
155.

……………………….is a person who breaks in or trespasses a computer system

A. Hacker
B. Snooper
C. operator
D. spoofer
Answer» A. Hacker
156.

E-mail which contain useless material is termed as……………

A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer» A. Spam
157.

What is Biometrics ?

A. It is a branch of biology
B. It recognizes individuals based on their inherent physical or behavioral characteristics.
C. a)&b).
D. None of these
Answer» B. It recognizes individuals based on their inherent physical or behavioral characteristics.
158.

SET means ………………

A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Answer» B. Standard Electronic Transfer
159.

Patents protects

A. Expression of an idea
B. Inventions.
C. Books and Articles
D. Company Logo
Answer» B. Inventions.
160.

The minimum punishment for an infringement of copyright in India is

A. 3 months imprisonment and minimum of Rs 50,000 fine
B. 3 months imprisonment and minimum of Rs 60,000 fine
C. 6 months imprisonment and minimum of Rs 50,000 fine.
D. 6 months imprisonment and minimum of Rs 30,000 fine
Answer» C. 6 months imprisonment and minimum of Rs 50,000 fine.
161.

A________ is a right, granted by the government, to exclude others from making, using, or selling your invention

A. Copyright
B. Patents.
C. Trademark
D. Trade Secret
Answer» B. Patents.
162.

TheTerm of every patent in India is

A. 50 years
B. 40 years
C. 30 years
D. 20 years.
Answer» D. 20 years.
163.

The Trademarks Act 1999 protects well-known trademarks from:

A. an action against the registration of similar marks.
B. an action against the misuse of someones identity
C. an action against copying someones lyrics
D. All of the above
Answer» A. an action against the registration of similar marks.
164.

The penalties for infringement of Trademarked content in India

A. Minimum 3 months imprisonment and fine of INR 20,0000
B. Minimum 4 months imprisonment and fine of INR 30,0000
C. Minimum 5 months imprisonment and fine of INR 40,0000
D. Minimum 6 months imprisonment and fine of INR 50,0000.
Answer» D. Minimum 6 months imprisonment and fine of INR 50,0000.
165.

When did IT Act 2000 came into effect

A. October 17, 2000.
B. October 17, 2001
C. November 11, 2000
D. November 11, 2001
Answer» A. October 17, 2000.
166.

How many schedules are there in IT Act 2000

A. 3
B. 4.
C. 5
D. 6
Answer» B. 4.
167.

Trade mark, copyright, patent law etc comes under the purview of……………………

A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer» C. Intellectual property laws
168.

Which of the following is an example of Intellectual property ?

A. Patent
B. Trade Marks
C. Copyright
D. All of above
Answer» D. All of above
169.

Copyright protection is available for

A. Literary work
B. Musical work
C. Artistic work
D. All the above
Answer» D. All the above
170.

Plan of a building can be protected by

A. Copyright
B. Patent
C. Trade secret
D. Industrial Design
Answer» A. Copyright
171.

Copyright protects

A. Idea
B. Expression
C. Both a) and b)
D. None of the above
Answer» B. Expression
172.

Patent of addition can be filed by

A. Inventor
B. Patentee
C. Both a) and b)
D. None of the above
Answer» C. Both a) and b)
173.

What is the updated version of the IT Act, 2000?

A. IT Act, 2007
B. Advanced IT Act, 2007
C. IT Act, 2008
D. Advanced IT Act, 2008
Answer» C. IT Act, 2008
174.

_______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind.

A. Censorship
B. Patent
C. Trademark
D. Copyright
Answer» C. Trademark
175.

An unauthorised entry into other people’s electronic device is called

A. Spamming
B. Hacking
C. Copyrighting
D. Breaching
Answer» B. Hacking
176.

Gaining control of client computer through network is called

A. Snooping
B. Sniffing
C. Buffing
D. Dialling
Answer» A. Snooping
177.

A copyright owner can give authority to anyone to

A. Duplicate intellectual property
B. Process intellectual property
C. Copy intellectual property
D. Sell intellectual property
Answer» C. Copy intellectual property
178.

Patent right gives the sole authority to produce for

A. Consumers
B. Investors
C. Industry
D. Inventors
Answer» D. Inventors
179.

Trademark uniquely differentiate products from other

A. Inventors
B. Products
C. Investors
D. Pioneers
Answer» B. Products
180.

Which one of this is not used for trademarking products

A. Logo
B. Words
C. Feature
D. Symbol
Answer» C. Feature
181.

When some words, pictures or videos is banned from public notice it is called

A. Spamming
B. Censorship
C. Authentication
D. Hiding
Answer» B. Censorship
182.

When unwanted or unexpected email or messages is sent to an electronic device it is known as

A. Bulk message
B. Phishing
C. Advertising
D. Spamming
Answer» D. Spamming
183.

The information Technology Act [IT ACT] came into effect on:

A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. 14th November 2000
Answer» C. 17th October 2000
184.

A person who breaks in or trespasses a computer system:

A. Hacker
B. Snooper
C. Operator
D. Spoofer
Answer» A. Hacker
185.

E-mail which contain useless material is termed as:

A. Spam Mail
B. Trunk Mail
C. Junk Mail
D. Inbox Mail
Answer» C. Junk Mail
186.

Which of the following crimes were not covered under IT (Amendment) Act, 2008?

A. Cyber Terrorism
B. Child Pornography
C. Video voyeurism
D. None of these
Answer» D. None of these
187.

Trade mark, copyright, patent law, etc. comes under the purview of:

A. Data Protection
B. Telecommunication Laws
C. Intellectual Property Laws
D. All of the above
Answer» C. Intellectual Property Laws
188.

Which one of the following is not a principle of e-commerce?

A. Privacy
B. Integrity
C. Authentication
D. None of these
Answer» D. None of these
189.

Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?

A. Hacker
B. Software
C. Computer Virus
D. Computer Anti-virus
Answer» C. Computer Virus
190.

An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:

A. Digital Signature
B. Digital Certificates
C. SSL
D. None of these
Answer» B. Digital Certificates
191.

India has enacted the first IT Act in the year……

A. 2001
B. 2002
C. 2009
D. 2000
Answer» D. 2000
192.

Trade mark, copyright, patent law etc comes under the purview of………

A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer» C. Intellectual property laws
193.

All of the following are examples of real security and privacy risks EXCEPT:

A. hackers.
B. spam.
C. viruses.
D. identity theft
Answer» B. spam.
194.

Digital Cash has following characteristic

A. Anonymity
B. Security
C. Confidentiality
D. All of Above
Answer» D. All of Above
195.

Who breaks into other people’s computer system and steals and destroys information:

A. Hackers
B. Software
C. Hacktivists
D. Script Kiddies
Answer» A. Hackers
196.

Which process is used to re install data from a copy when the original data has been lost

A. Backup
B. Recovery
C. Bench marking
D. Data cleansing
Answer» B. Recovery
197.

Which service encompasses all technologies used to transmit and process information on an across a network?

A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer» D. Web services
198.

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer» D. spoofing

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.