Bcom Ecommerce MCQ Notes Online test

Bcom Ecommerce MCQ Notes

Bcom ecommerce MCQ Notes :-  hello dear students how are you today ? i hope you are awesome. In this article we are share bcom ecommerce mcq. basically ecommerce subject is based on internet shopping/ online shopping so that we are provided you mcq multiple choice question based on your exam this subject is very useful for all coursed . 

ये सभी प्रश्न हिंदी में देखने के लिए यहाँ क्लिक करे |

B.com Ecommerce Notes Links : 

 

(ENGLISH VERSION)
UNIT – 1 ( E-COMMERCE : AN INTRODUCTION

 

(1) E-commerce has created a new environment for business transactions by using

(a) Digital data
(b) Internet
(c) electronic technologies
(d) communication services.

(2) E-commerce did online-sale for the first time

(a) 1938
(b) 1992
(c) 1994
(d) 2009

(3) E-commerce means

(a) buying and selling of goods using the internet
(b) Accessing services using the Internet
(c) Transfer of money and data for transactions.
(d) All of the above.

(4) Presently come under e-commerce

(a) Internet Banking
(b) Travel Booking
(c) Online Falcate
(d) All these.

(5). ……… is always done with the help of internet.

(a) E-commerce
(b) e-business
(c) e-distribution
(d) None of these.

(6) The field of e-commerce includes

(a) Financial Services
(b) Music service..
(c) Book Market
(d) All these.

(7) In which field was e-commerce first used?

(a) tourism
(b) Banking
(c) buying and selling
(d) Stock market.

(8) E-commerce is a resource

(a) Electronic market
(b) electronic data exchange
(c) e-business
(d) All these.

(9). Always operates on the Internet.

(a) E-commerce
(b) E-Business
(c) EDI
(d) None of these.

(10) The buying and selling of goods and services on the Internet is called.

(a) Electronic Transactions
(b) Electronic market
(c) Electronic Data Interchange
(d) Internet commerce.

(11) An electronic market is a network of interactions and relationships where

(a) Exchange of payments
(b) Transfer of funds
(c) Both (a) and (b)
(d) None of these.

(12) Electronic communication of documents between two or more users at different locations.

(a) Electronic Banking
(b) Electronic Data Interchange
(c) Internet commerce
(d) E-mail.

(13) Electronic Data Interchange (EDI) is commonly used by large companies for the purpose of e-commerce

(a) Transfer of Funds
(b) for employee care
(c) sending orders to warehouses
(d) None of these.

(14) Internet commerce is a sub-function of e-commerce which includes commercial activities

(a) to order
(b) Transfer of funds
(c) Auction
(d) All these.

(15) Supply chain gives a sequence of various activities of the firm.

(a) Develop products
(b) Create value
(c) both (a) and (b) ,
(d) None of the above.

(16) Higher efficiencies can be achieved by electronic data interchange

(a) Human storage of data
(b) Reduction in the cost of labor and paper
(c) Sending and receiving data within minutes
(d) None of the above.

(17) Eliminates manual and repetitive entries

(a) cost of labor
(b) errors
(c) notation of data
(d) None of these.

(18) E-commerce is related.

(a) Media data.
(b) video
(c) web page
(d) All these.

(19) These activities convert natural resources into finished goods and transport them to the final consumer.

(a) Market
(b) trade
(c) supply chain
(d) None of these.

(20) The transfer of information electronically from buyer to seller is

(a) security system
(b) Data Management
(c) communication service
(d) None of these.

(21) The most important benefit of e-commerce to the organization is

(a) It makes the market national and international
(b) Availability of goods at low prices
(c) 24 hours reach
(d) All of the above.

(22) E-business means

(a) Exchange of information related to purchase and sale
(b) Customer service and coordination with business associates
(c) Both (a) and (b)
(d) None of the above.

(23) The impact of e-commerce on business is

(a) It changes the way goods and services are manufactured, sold and delivered to customers
(b) It changes the way the organization works with its partners
(c) Both (a) and (b)
(d) None of the above.

(24) The advantage of e-commerce is

(a) increase in productivity
(b) saving in costs
(c) Good consumer services.
(d) All these.

(25) The efficiency of the business can be increased further

(a) reaching the global customer
(b) through the use of internet
(c) by automating the business process
(d) Both (b) and (c)  |

(26) E-commerce reduces stock and expenses

(a) By increasing the size of the market
(b) By reducing the cost of paper based information
(c) by providing supply chain management
(d) All of the above.

(27) E-commerce reduces the time taken in

(a) Tally Communication and Value Added Network
(b) Capital expenditure and receipt of goods and services
(c) Productivity and production.
(d) None of the above.

(28) Less expensive goods and services are provided to the customers through e-commerce.

(a) giving them the option to shop from multiple places
(b) by quick comparison
(c) giving customers the option to interact with other customers
(d) Both (a) and (b).

(29) An important technical limitation of e-commerce is

(a) Dependence on the Internet
(b) Lack of security –
(c) need for more applications
(d) All these.

(30) The important feature of e-commerce business is

(a) Automated Process
(b) no need for storage of goods
(c) Online sales and sales promotion
(d) All of the above.

(31) There are non-technical limitations of e-commerce

(a) Security and Privacy
(b) lack of trust
(c) system conflict
(d) All these.

(32) E-commerce is beneficial for the society because

(a) It enables individuals to work less at home
(b) Provides public services at low cost
(c) Prompt delivery of goods and services
(d) Provides many choices to the consumers.

(33) E-commerce is a composite process

(a) Electronic Data Interchange
(b) electronic mail
(c) Internet Application
(d) All these.

(34) E-commerce enables people from third world countries and rural areas

(a) enjoying products and services that are not available to them
(b) To get services at low cost
(c) getting more options
(d) None of the above.

(35) The scope of e-commerce can be expanded

(a) by the development of business relations
(b) by business development
(c) By selecting the best product.
(d) By providing all the above services.

(36) Salient feature of e-commerce which explains its nature

(a) Universality
(b) intercommunication
(c) technology based
(d) All these.

(37) The technical basis of e-commerce is

(a) Internet
(b) www
(c) Protocol
(d) All these.

(38) The performance of the entire e-commerce application depends on

(a) Web Server Software Platform
(b) Web Server Hardware Platform
(c) Number of e-commerce transactions
(d) None of the above.

(39) Cash payment is charged for reconciliation at the time of purchase through credit card or any other e-cash mode

(a) Electronic Data Interchange
(b) Internet commerce
(c) Cash Business Cycle
(d) None of these.

(40) Displaying the list of houses, shops for rent or sale on the website is called services.

(a) Online buying and selling
(b) Online Real Estate
(c) Online Banking
(d) Online delivery.

(41) Retail trade on the Internet is called

(a) E-tailing
(b) Supply Chain Management
(c) Online Sale
(d) Digital Marketing.

(42) Import-export trade has an important role in

(a) Electronic Retailing
(b) Electronic Payment
(c) Electronic Marketing
(d) Internet Marketing.

(43) Network is the most popular means of publishing

(a) Internet
(b) www.
(c) E-commerce
(d) Multimedia.

(44) The nature of publication of information is decided

(a) Public Policy
(b) Privacy Issue
(c) Technical Standard (Technical Standard)
(d) None of the above.

(45) Content and information flow both up and down

(a) in the organization
(b) in the supply chain
(c) at the distribution center
(d) In electronic systems.

(46) When the supply chain is managed electronically, it is called

(a) Upward supply chain
(b) Downward supply chain
(c) e-supply chain
(d) Purchasing e-commerce.

(47) How do small businesses and individuals have the opportunity to develop content on the web

(a) HTML
(b) web server
(c) digital content
(d) Web publishing.

(48) The success of the e-supply chain is dependent on

(a) at speed
(b) at cost
(c) on quality
(d) All these.

(49) Online presence of business is called

(a) E-tailing
(b) E-Business
(c) ERP
(d) CRM.

(50) Which of the following is not included in the three phases of e-commerce

(a) Innovation
(b) Consolidation
(c) Preservation
(d) Punoj (Reinvention).

(51) E-commerce is not a function of

(a) Marketing
(b) Advertisement
(c) storage
(d) All these.

(52) Transactions in e-commerce take place

(a) by using e-media
(b) by using computer only
(c) by mobile use only
(d) None of these.

(53) EDI means

(a) Electronic Data Interface
(b) Electronic Digital Interchange
(c) Electronic Data Interchange
(d) None of these.

(54) Data transfer takes place in EDI.

(a) Sometimes in standard form and sometimes in non-standard form
(b) in standard and pre-determined format
(c) without any standard format
(d) None of the above.

(55) Which one is not correct regarding EDI?

(a) Data interchange in EDI is a business document and message.
(b) It is the exchange of data electronically between business partners
(c) It reduces paper work
(d) Data transfer does not take place in the standard and prescribed form.

(56) Which of the following is not an EDI standard

(a) TCI / IP
(b) X.12
(C) EDIFACTS
(d) X.400.

(57) ……….. assures that the EDI has been sent correctly.

(a) van
(b) FTPS
(c) VPN
(d) FEDI.

(58) ACH stands for

(a) N Clearing House
(b) Automatic Clearing House
(c) Automatic Credit House
(d) None of these.

(59) Uses on bank cheques/drafts

(a) Bar code.
(b) MICR
(c) OMR
(d) UPC.

(60) Which of the following is post processed

(a) Debit Card
(b) credit card
(c) Both (a) and (b)
(d) Smart card.

(61) In which card the processing information is kept in the form of processing chip?

(a) Smart Card
(b) Debit Card
(c) credit card
(d) None of these.

(62) Electronic cash services are used by

(a) credit card
(b) Cash purchase from currency server
(c) by banking
(d) Debit card.

(63) Used for micropayment in e-commerce

(a) Electronic Wallet
(b) e-cash
(c) credit card
(d) None of these.

(64) Electronic fund transfer is

(a) Finance EDI
(b) Good EDI
(c) Non-financial EDI
(d) Bad EDIT

(65) EDI has benefits

(a) no time delay
(b) No Uncertainty.
(c) no error –
(d) All these.

(66) EDI is the future

(a) dangerous
(b) great
(c) more informative, more two-way conversational
(d) None of the above.

(67) The complete string of an EDI message is called

(a) Transaction
(b) Data segment
(c) Data Document
(d) Data Transaction.

(68) POS means

(a) Place of Sale
(b) Point of scale
(c) Priority of Sale
(d) None of these.

(69(PCI) means

(a) Payment Card Industry
(b) Payment Cash Industry
(c) Payment Card Internet
(d) Payment Cash Internet.

(70) FEDI means

(a) Funding electronic data interchange
(b) Financial Electronic Data Interchange
(c) Functional Electronic Data Interchange
(d) Financial Electronic Data Interface.

(71) EDI Standards.

(a) not universally available
(b) are necessary for B to B business
(c) B to B are unnecessary for business
(d) still being developed.

(72) Which of the following cannot be used as a mechanism of protection

(a) Encryption
(b) cryptography
(c) Wallet
(d) Digital Signature.

(73) The lifeline of any banking system is ……….

(a) Count
(b) Data aggregation
(c) Check Collection
(d) Conveyance.

 

Bcom Ecommerce MCQ Notes
UNIT – 2 ( PLANING OF ONLINE BUSINESS)

 

(1) An important part of online business is the hand.

(a) electronic platform
(b) Customer
(c) Internet
(d) All these.

(2) Online trading has a scheduled time. this statement

(a) true
(b) False
(c) Suspicious
d) None of these.

(3) In SWOT analysis ‘w’ stands for

(a) weakness
(b) week
(c) weight
(d) None of these.

(4) Which one of the following can be an occasion

(a) Online market
(b) Financial position
(c) reduction in expenses
(d) All these.

(5) E-commerce is most commonly used

(a) America
(b) in India
(c) Bangladesh
(d) Nepal.

(6) To make purchases through e-commerce, it is necessary to have

(a) mobile
(b) Computer
(c) Internet
(d) All these.

(7) can access broadband internet through internet service providers

(a) Cable TV
(b) fiber connection
(c) Video calling
(d) All these.

(8) Which of the following is not a wireless Internet access network technology?

(a) bluetooth
(b) Gigapop
(c) Wi-Fi
(d) None of these.

(9) The popular website of online shopping is

(a) Amazon
(b) Flipkart
(c) Myntra
(d) All these.

(10) The data sent through the Internet is called

(a) Message
(b) Datum
(c) Byte
(d) All these.

(11) C2C stands for

(a) consumer to consumer
(b) consumption to consumer
(c) confirm to consumer
(d) None of these.

(12) Flipkart is example

(a) B2B
(b) B2C
(c) C2C
(d) All these.

(13) Which of the following is not an example of C2C

(a) Amazon.com
(b) Flipcart.com
(c) Up Govt.com
(d) None of these.

(14) Products that are less purchased through e-commerce are

(a) clothes
(b) Shoes
(c) Automobiles.
(d) Medicines.

(15) All business needs can be solved.

(a)  ERP
(b) EDI
(c) ERE
(d) SCM (SCM).

(16) What are the benefits of e-marketing

(a) speed
(b) low cost
(c) Access and Penetration
(d) All these

(17) Interchange of lectonic data is necessary

(a) B2C e-commerce
(b) B2B e-commerce
(c) C2C-commerce
(d) All of these.

(18) Transactions in e-commerce take place-

(a) through internet
(b) through mobile phone
(c) through e-media
(d) None of these.

(19) EDI Stands

(a) For B2B commerce
(b) For B2C commerce
(c) For C2B commerce
(d) None of these.

(20) B2B commerce includes

(a) Services like legal advice
(b) Services like buying physical goods
(c) Advertising Services
d) all these

(21) Example of C-BAY is

(a) Online shipping site.
(b) Online class site
(c) Online Music Site
d) all these

(22) The biggest advantage of B2C is

(a) No hassle of opening a shop
(b) The shop can be opened 24 hours a day.
(c) It is easy to pay for the service
(d) All transactions are completely secure.

(23) e-bay is an example

(a) C2C
(b) B2C
(c) B2B
(d) G2G

(24) ANSIX.12 standard is developed by

(a) International Standard Institute
(b) American National Standards Institute
(c) by the World Trade Organization
(d) Microsoft company.

(25) Full form of CMS is

(a) Core Managing System
(b) Care Managing System
(c) Content Management System
(d) Care Management System.

(26) The limit of each separate NO.. of a valid IP address is from 0 to ……….
(a) 254
(b) 255
(c) 256
(d) 257

(27) In which state the e-Seva Project has been implemented.
(a) Arunachal Pradesh
(b) Andhra Pradesh
(c) Haryana
(d) Rajasthan

(28) In which state has the Khajana Project been implemented?
(a) Goa
(b) Uttar Pradesh
(c) Karnataka
(d) Rajasthan.

(29) State the full form of SWANs
(a) State Wide Area Networks
(b) Secured Wide Area Networks –
(c) State Wise Area Networks:
(d) Secured With Area Networks…

(30) Which of the following transaction is not suitable for B2C
(a) Airline Reservation
(b) Railway Reservation
(c) buying cloth
(d) None of these.

(31) Who among the following cannot be users of B2C
(a) publisher
(b) seller
(c) Printers
(d) None of these.

(32) Myntra is an example of ………….
(a) B2B
(b) C2B
(c) C2C
(d) All these.

(33) Currently the highest revenue in the world. The generating e-commerce company is
(a) e-bay
(b) Amazon
(c) Flipkart
(d) Myntra.

(34)…….. demonstrated the first online shopping system in 1979.
(a) Michael Aldrich
(b) Tim Berner Lee
(c) John Bill
(d) marshal

(35) It is an electronic card in which a micro chip is installed, through which the collection of personal information and data can be kept.
(a) Smart Card
(b) Debit Card
(c) credit card
(d) All these.

(36) We can withdraw cash from Smart Card
(a) true
(b) False
(c) Suspicious
(d) None of these.

(37) is the official website of BHIM app.
(a) www.bhimupi.in
(b) www.bhimupi.net
(c) www.bhim.com
(d) www.bhimupi.org.in

(38) Full form of EFT is
(a) Easy Fund Transfer
(b) Electronic Fund Transfer
(c) Easy Fast Transaction
(d) Electronic Fast Transaction.

(39) Credit card cannot be used to withdraw money from ATM machine.
(a) true
(b) False
(c) Suspicious
(d) None of these.

(40) Most of the people know E-commerce
(a) B2B
(b) G2B
(c) B2C
(d) C2B.

(41) Brick and click business happens
(a) Operation of offline stores in BRICS
(b) Operation of online store at Crix
(c) both true (a) and (b)
(d) None of the above.

(42) Two popular examples of C2C platforms are ….
(a) E-Bay and Kerglest.
(b) Amazon and Flipkart
(c) Amazon a Myntra
(d) None of these.

(43) For payment in C2C, the help of ………… is taken.
(a) Internet
(b) mobile
(c) Paypal
(d) Paytm.

(44) The most popular strategy of cyber criminals is
(a) Virus
(b) Stolen Password
(c) hacking
(d) All these.

(45) Internet address is called
(a) IP address
(b) e-address
(c) Internet Protocol
(d) All these.

(46) Internet service is in the following
(a) E-mail
(b) Use of the World Wide Web
(c) Google
(d) All these.

(47)  Internet Explorer is
(a) browser
(b) Server
(c) Safari
(d) None of these.

(48) The most popular web browser is
(a) Google Chrome
(b) Safari
(c) Mozilla Firefox
(d) All these.

(49) Amazon company belongs to which country?
(a) India
(b) China
(c) America
(d) Japan.

(50) Amazon is the owner of the company
(a) Mark Zuckerberg
(b) Jeff Bezos
(c) Mukesh Ambani
(d) Steve Jobs.

(51) The world’s largest e-commerce company is
(a) Flipkart
(b) Myntra
(c) Amazon
(d) All these.

(52) Myntra is a company of which country?
(a) India
(b) China
(c) America
(d) Japan.

(53) Who was the founder of Apple company
(a) Steve Jobs
(b) Jeff Bezos
(c) Mark Zuckerberg
(d) None of these.

(54) Which of the following technology attracts customers through e-commerce?
(a) Online Advertisement
(b) Virtual Marketing
(c) search engine
(d) Browser.

(55) Which product is bought the most through the internet
(a) cloth
(b) mobile
(c) Shoe
(d) All these.

(56) A secure EDI transmission using the Internet is via ………S/MIME
(a) true
(b) False
(c) Suspicious
(d) None of these.

(57) Which of the following electronic e-commerce is facilitated by a third party between a consumer?
(a) B2C
(b) C2C
(c) G2G
(d) B2B.

(58) FBIFACT is a standard
(a) For FTP in e-commerce
(b) E-mail transactions for e-commerce
(c) Trade in e-commerce for presentation
(d) All of the above.

(59) Web browser is a ……… application.
(a) Hardware
(b) Software
(c) Internet
(d) Google Chrome.

(60) Connecting computers to each other through the Internet and sharing information is called
(a) Sharing
(b) Browsing
(c) Networking
(d) All these.

(61) Which of the following e-commerce gives more emphasis on one-to-one consumer dealings?
(a) B2B
(b) G2C
(c) C2C
(d) B2C

(62) A physical store or building in e-commerce is called
(a) Bricks and Mortar Facility
(b) brick facility
(c) Steel facility
(d) None of these.

(63) In e-commerce ‘e’ means
(a) Electric
(b) Electronic
(c) Easy
(d) None of these.

(64) Who designed the BHIM app?
(a) by the Ministry of Commerce
(b) NPCI
(c) by the Ministry of Finance
(d) None of these.

(65) Almost more than ……… of e-commerce is related to B2B.
(a) 75%
(b) 80%
(c) 90%
(d). 95%

(66) E-commerce means doing business through internet. This
(a) true
(b) False
(c) Suspicious
(d) None of these.

(67) In B2B companies do business transactions among themselves
(a) true
(b) False
(c) Suspicious
(d) None of these.

(68) The largest e-commerce company in India is called
(a) Walmart
(b) Amazon
(c) Flipkart
(d) Jio-Mart.

(69) Registered domain in India
(a) .ru
(b) .de
(c) .in
(d) .uk

(70) Electronic market does
(a) Reduction in buyer’s cost
(b) increase in the efficiency of the market
(c) Availability of goods to the customers at the lowest cost
(d) All of the above.

(71) It is necessary to run the website
(a) domain name
(b) traffic
(c) disk space
(d) All these.

(72) Payment is made when making purchases over the Internet
(a) by debit card
(b) by credit card
(c) by smart card
(d) All these.

(73) Presently the prevailing modes of payment are
(a) Paytm
(b) Google pay
(c) R.T.G.S.
(d) All these.

(74) Contains in front page HTML web
(a) ASP
(b) DHTM
(c) HMTI
(d) All these.

(75) Electronic infrastructure consists of
(a) e-server
(b) Software
(c) Integration Services
(d) All these.

(76) Web was developed.
(a) 1975
(b) 1980
(c) 1985
(d) 1990.

(77) The main models of e-commerce are
(a) business-consumer
(b) trade-trade
(c) trade-client
(d) All these.

(78) E-commerce is a technology
(a) developed
(b) underdeveloped
(c) developing
(d) None of these.

(79) Information is stored in the web
(a) in the form of graphical images
(b) as text
(c) in the form of digital media files
(d) All these.

(80) The advantages of a server based network are
(a) easy access
(b) centralized demand
(c) Dedicated Security
(d) All these.

(81) E-commerce would have been the primary source of financial support in the early stages of the companies.
(a) Venture Capital Fund
(b) Bank loan
(c) Government assistance
(d) None of these.

(82) Amazon.com is an example of ……… website.
(a) B2B
(b) C2C
(c) B2C
(d) B2E

(83) Craigslist is an example of …..market.
(a) First Party
(b) the other party
(c) third party
(d) None of these.

(84) The purpose of the portal is to
(a) Provides single point access to multiple shopping websites. ,
(b) Provides single point access to web services and content.
(c) Provides customer information.
(d) All of the above.

(85) The general protocol is
(a) FTP FTP
(b) HTTPS
(c) HTP
(d) All these.

(86) P2P is used
(a) B2B
(b) B2E
(c) C2C
(d) G2G.

(87) www. Internet is a way of sharing information. this statement
(a) true
(b) False
(c) Suspicious
(d) None of these.

(88) Darkweb has legitimate methods
(a) To protect the privacy of journalists
(b) maintaining confidentiality of intelligence
(c) Maintaining confidentiality of activists and whistleblowers
(d) All of the above.

(89) Internet connects the whole world to each other. this statement
(a) true
(b) False
(c) Suspicious
(d) None of these.

(90) Full Form of ERP is
(a) Enterprises Resource Planning
(b) Enterprises Reverse Planning 2012
(c) Enterprises Resolution Planning
(d) None of the above.

(91) The first standard address is ……….
(a) IPv5
(b) IPv4
(c) IPv9
(d) IPv2

(92) Website is a marketing platform
(a) true
(b) False
(c) Suspicious
(d) All these.

(93) ……. acts as an intermediary between the user and the Internet.
(a) prototype
(b) TCP
(c) Internet Protocol
(d) All these.

(94) Which of the following is an example of a portal
(a) Yahoo
(b) Myntra
(c) eBay
(d) YouTube

(95) Microsoft company is related to which country?
(a) America
(b) India
(c) China
(d) South Korea.

(96) Which is the largest IT company of India
(a) TCS
(b) INFOSYS
(c) Tech Mahindra
(d) WIPRO

(97) Snapdeal is related to
(a) e-commerce company
(b) IT company
(c) Banking company
(d) All these.

(98) E-commerce means buying and selling of any product or service online. this statement
(a) true
(b) False
(c) Suspicious
(d) None of these.

(99) The credit for bringing computers to the common people goes to
(a) Steve Jobs
(b) Bill Gates
(c) to both
(d) None of these.

(100) E-commerce was started in India
(a) 2001
(b) 2002
(c) 2003
(d) 2004.

 

 

Bcom Ecommerce MCQ Notes
UNIT – 3 ( TECHNOLOGY FOR ONLINE BUSINESS)

 

(1) Technology enables the effective management of
(a) customer orders
(b) Distribution and Return
(c) Payment for the goods purchased
(d) All these.

(2) Self-contained internal network connecting many users through Internet technology
(a) Internet
(b) Intranet
(c) Extranet
(d) www

(3) Intranet is useful for organizations because
(a) They share common business objectives
(b) They have general information needs
(c) cooperation with them
(d) All of the above.

(4) An electronic communication network that links computer networks and organizational computer facilities around the world
(a) Internet
(c) E-mail
(b) Intranet
(d) Extranet

(5) The sharing of information distributed among persons means
(a) Internet
(b) Intranet
(c) www
(d) Extranet |

(6) Messages stored in computers are exchanged by telecommunications—
(a) Intranet
(b) www
(c) E-mail
(d) None of these.

(7) Intranet is protected from outside access through
(a) Virtual Private Network
(b) Network Gateway and Firewall
(c) Telnet
(d) None of these.

(8) Extranet extends a private network over the Internet with special provisions for ……..
(a) Authentication and authorization
(b) Encryption
(c) Participation
(d) All these.

(9)  Intranet is used in everything from sophisticated corporate directories, sales and customer relationship management tools to ……….
(a) Facility to work in groups
(b) Teleconferencing facility
(c) improved productivity
(d) Screening of incoming messages.

(10) Website traffic in large intranets can be better understood by using …….
(a) Web matrices software to track overall activity
(b) firewall server to access public internet
(c) Special encryption/decryption
(d) None of the above.

(11)  Big business users within the intranet……. Allows access to the public internet through
(a) Virtual Private Network
(b) Encryption / Decryption
(c) through firewall server
(d) Public network.

(12) The limitation of the Internet is that it…. Maybe.
(a) Distribution of unreliable and uncontrolled information
(b) threat to national security
(c) Understanding theft and loss
(d) All of the above.

(13) TCP/IP account is ……  in comparison to shell account.
(a) sharp
(b) slow
(c) easy to operate
(d) Both (a) and (c).

(14)  ISP . is an abbreviation for.
(a) Intranet Service Provider
(b) Internet Security Provider
(c) Internet Service Provider
(d) Intranet Security Provider.

(15) A program that is used to make your computer talk to the modem is
(a) Telephone connection
(b) communication software
(c) browser
(d) E-mail software.

(16)  ISP is such a company that ………
(a) provides access to the Internet
(b) allows us to mail our information
(c) establishes telephone lines
(d) None of the above.

(17)  Browsers like Netscape and Internet Explorer have created programs for ……….
(a) Browsing
(b) E-mail
(c)  Communication
(d) None of these.

(18) Intranet is being used as a platform for further development of applications for
(a) to improve the services provided
(b) Schedule Transfer
(c) to support business operations
(d) Viewing data and information.

(19)  Users can view information and data through …….
(a) web browser
(b) Manual of Procedure
(c) Internal phone list
(d) Necessary forms.

(20)  Intranet users are specialized who require …….
(a) written application
(b) Database / network authentication before access
(c) use of hypermedia and web technologies
(d) none of the above

(21)  Intranet promotes a common corporate culture i.e.
(a) Internet developers have to work on the same browser.
(b) Every user has the ability to see the same information within the intranet.
(c) Intranet is designed for a single audience.
(d) It uses a common platform.

(22) Intranet can be connected to a company’s management information system which supports …….
(a) business operations and decisions
(b) Database/Network Authentication
(c) Distributed Computing Architecture
(d) None of the above.

(23)  Most organizations dedicate a lot of resources to the planning of their intranets including …….
(a) Levels of planning
(b) Functional Planning and Information Architecture
(c) Persons or departments responsible for management and implementation
(d) All of the above.

(24) is an abbreviation for DNS
(a) Domain Name Security
(b) Domain Name Server
(c) Domain Network Security
(d) None of these.

(25) Information superhighways and electronic webs that connect people and businesses that have access to the network
(a) Intranet
(b) Internet
(c) Extranet
(d) None of these.

(26) The main condition for getting a connection to the Internet and using the vast services is
(a) physical connectivity to the Internet
(b) Selecting the right hardware and required software
(c) Equipment and technology for providing Internet service
(d) None of the above.

(27) The use of a software application which enables computer users to locate and access web pages
(a) Internet Explorer
(b) browser
(c) Router
(d) None of these.

(28) The standard e-mail protocol of the Internet is –
(a) SMTP
(b) ARPANET
(c) POP
(d) None of these.

(29) This protocol is used to send or collect mail from a remote server
(a) SMTP
(b) POP
(c) FTP
(d) None of these.

(30) A system of interlacing hypertext documents accessed via the Internet
(a) web
(b) Website
(c) Internet
(d) Browser.

(31)  User has to enter the desired information details using the user interface for ……….
(a) Search sites
(c) using search engines
(b) using the internet
(d) None of these.

(32) Search engine is a software which
(a) maintains a huge database
(b) provides a specific way to the user
(c) both (a) and (b)
(d) None of the above.

(33)  Intranet provides centralized scheduling system which means that
(a) There is shared access to the documents.
(b) Its use is controlled.
(c) Everyone lives on the same page.
(d) They are completely measurable.

(34) When more than one group within an organization builds and serves a website, then
(a) Intranet is centralized.
(b) Intranet is decentralized.
(c) Intranet is standard based.
(d) None of the above.

(35) Internet and Web technologies are based on open systems technology standards that ensure
(a) Viability Internet network
(b) Scalability on a Global Basic
(c) both (a) and (b)
(d) None of the above.

(36) An intranet consisting of a group or individual responsible for developing a technical and informational infrastructure
(a) Centralized Intranet
(b) Decentralized Intranet
(c) scalable intranet
(d) None of these.

(37) Intranets built around the web are proving useful as they enable the creation of applications that have –
(a) There is a high degree of business process integration
(b) is an integrated set of specific activities
(c) Platform is neutral design.
(d) None of the above.

(38) …….. is used by companies to keep in touch with customers, traders, business patterns, suppliers and many other audiences that contribute to operational effectiveness.
(a) Intranet
(b) Virtual Private Network
(c) Internet
(d) Extranet

(39)  In the beginning, ARPANET had ……… nodes named host.
(a) four
(b) five
(c) six
(d) Seven.

(40)  All applications used by an enterprise for internal purposes and to provide its services to customers are included in ………….
(a) Hardware
(b) Software
(c) Meatware
(d) Network.

(41) ……. Required to establish internal and external communication of all components and devices.
(a) Hardware
(b) Software
(c) Network
(d) None of these.

(42)  What type of infrastructure service provides voice and video connectivity to employees, customers and suppliers?
(a) Networking
(b) Telephone
(c) VOI
(d) Telecommunications.

(43) The most used part of the Internet by businesses is
(a) Virtualization technology
(b) Internet Marketing and Advertising
(c) Enterprise environment
(d) Web Services.

(44)  ……involves various technologies and platforms that facilitate the availability of backend network resources for frontend applications.
(a) Hardware
(b) Software
(c) Middleware
(d) Firmware.

(45) To facilitate interoperability between distributed applications, middleware is used.
(a) Application interface
(b) network and communication interface
(c) Access Gateway
(d) Database interface.

(46)  . Facilitates the unique identification of an organization or organization on the Internet.
(a) Middleware
(b) DNS
(c) IP address
(d) Application interface.

(47) DNS matches the domain name of an organization to its …….
(a) IP address
(b) Internet Application
(c) E-commerce site
(d) Address block.

(48)  ……….. is related to maintaining the entire IP address space of the Internet.
(a) DNS name registration
(b) IP address block allocation
(c) Protocol Parameters
(d) None of these.

(49)  There is an adhesive between the client and server parts of the application
(a) Middleware
(b) Firmware
(c) Package
(d) System software.

(50)  is the full form of TTL.
(a) Time to Live
(b) Time Telephone Lock
(c) Time Telephone Live
(d) None of these.

(51)  is the protocol family of records.
(a) type
(b) class
(c) TTL
(d) Data.

(52)  ……… is important from traffic generation to websites.
(a) Web Content
(b) web interface
(c) web technology
(d) Application Service

(53)  ……. uses Internet technology to satisfy and retain customers who purchase its products and services.
(a) e-business
(b) Web Content Management
(c) Metadata Application
(d) Network Services.

(54)  The development that drives the need for e-business integration
(a) Package Application
(b) Mergers and Acquisitions
(c) Business Process Re-engineering
(d) All these.

(55). E-business is the root cause of integration.
(a) Synchronizing data between information systems
(b) Separation of applications and businesses
(c) Streamlining the multi step business process
(d) All of the above.

(56). Synchronizing data between systems can be done periodically by ……..
(a) batch transfer
(b) by recurring transactions from time to time
(c) both (a) and (b)
(d) None of the above.

(57). Business process automation helps companies to do ……….
(a) less cost
(b) improving customer satisfaction
(c) accelerate business processes
(d) All of the above.

(58). Software that manages computer resources and activities and acts as an interface for the user
(a) Data Management and Storage
(b) Internet Platform
(c) Operating System
(d) Oracle.

(59) ……….. Dedicated high speed networks connect multiple storage devices.
(a) LANs
(b) MANs
(c) WANs
(d) SANs.

(60) . ……are older transaction processing systems designed for mainframe computers to avoid the high cost of replacing or redesigning them.
(a) Internet Platform
(b) Legacy System
(c) Enterprise Application
(d) None of these.

(61)  Enterprise integration technologies enable applications to communicate with each other for ……….
(a) automating business processes
(b) Synchronizing customer information
(c) to settle the parts of the business
(d) Connecting different systems together.

(62)  . …….maintains a large web server or chain of servers and provides fee paying customers with space to maintain their websites.
(a) Middleware software
(b) Web Hosting Service
(c) Legacy System
(d) Conservation Area Network.

(63)  …….. is an ultra thin server designed for dedicated applications and mounted in space saving racks.
(a) Blade Server
(c) web server
(b) Legacy System
(d) None of these.

(64) The process of keeping an address in memory for future use is called
(a) Routing
(b) Solution
(c) Caching
(d) None of these.

(65) The first network that planted the seeds of the Internet was
(a) ARPANET
(b) NSF net
(c) both (a) and (b)
(d) Vnet.

(66) Voice mail, e-mail, online service, Internet and www are all examples.
(a) Computer categories
(b) connectivity
(c) Telecom
(d) None of these.

(67) In fact, Internet Protocol is only ……. recognizes.
(a) an IP address
(b) a place of the host
(c) a postal mail address
(d) None of these.

(68) A small network that makes up the Internet and consists of a small number of computers within it, is called
(a) Host
(b) Address
(c) subdomain
(d) None of these.

(69) For a small website, one needs to take space from …….
(a) ISP
(b) Telephone Exchange
(c) network administrator
(d) None of these.

(70) A host on the Internet has his ……. Detects another host via.
(a) Postal Address
(b) IP address
(c) electronic address
(d) None of these.

(71) TCP/IP is mainly used for …….
(a) File Transfer
(b) E-mail
(c) Remote Login Service
(d) All these.

(72) Which of the following is not necessary for internet?
(a) Operating System
(b) DOS
(c) web browser
(d) Modem.

(73) Which protocol is used for browsing website?
(a) TCP
(b) HTTP
(c) FTP
(d) TFTP.

(74) The location of a resource on the Internet is given by its …….
(a) Protocol
(b) URL
(c) e-mail address
(d) ICQ.

(75) Software programs which legally allow copying of files and removing them at no cost are called
(a) probeware
(b) Timeshare
(c) shareware
(d) Public Domain.

(76) ARPANET used the concept of packet switching network consisting of subnets and ……
(a) Local
(b) remote
(c) Host
(d) Network.

(77) Prior to ARPANET, networks were basically telephone networks that worked on the ……… principle.
(a) closed switching
(b) linear switching
(c) packet switching
(d) circuit switching

(78) To arrange the machines in the domain …….. was created and the hostname was mapped to the IP address.
(a) Domain addressing system
(b) Domain Naming System
(c) Host naming system
(d) Domain mapping system.

(79) Firstly, ARPANET was aimed at fault tolerant computer networks. was to support.
(a) Military Research
(b) Educational Research
(c) Government Research
(d) Scientific research.

(80) DNS uses a structure like ……… to organize data fields.
(a) Tree
(b) Bus
(c) Ring
(d) Star. ,

(81)  …….. eliminates human interference by enabling one application to interact directly with another.
(a) integration
(b) Management
(c) Automation
(d) Synchronization.

(82) Peoplesoft is a ……….
(a) Network Platform
(b) System Integration Service
(c) Enterprise Application
(d) Operating system platform.

(83) Through HTTP it is possible to associate content on the web with …….
(a) hyperlink
(b) Internet
(c) web server
(d) web browser

(84) The popularity of …….. led to the development of intranet and extranet.
(a) Internet
(b) web browser
(c) communication network
(d) websites

(85) Which of the following is unregulated and uncensored?
(a) Internet
(b) Intranet
(c) Extranet
(d) Networking.

(86) A piece of icon or image on a web page linked to another web page is called ……..
(a) URL
(b) hyperlink
(c) Plugin
(d) Extension.

(87) Dynamic Web Pages :
(a) is the same every time it appears
(b) generated by the program on demand or on request from the browser
(c) Both times are same whenever displayed and generated on demand of a program or a request of browser
(d) always varies in a predetermined order.

(88) Use of Common Gateway Interfaces
(a) used by the web server to generate executable files from the web content
(b) used to create web pages
(c) is used to stream video
(d) Used to download media files.

(89) CTI stands for
(a) Computer Technology Integration
(b) Computer telephony interface
(c) Computer Telephony Integration
(d) Computer Technology Interface.

(90) What are the many different types of software that are in the middle and provide connectivity between two or more software applications?
(a) Middleware
(b) Enterprise Application Integration Middleware
(c) Automated business process
(d) E-business infrastructure

(91) EAI stands for
(a) Enterprise Applied Integration
(b) Enterprise Association for Integration
(c) Enterprise Application Integration
(d) None of the above.

(92) Transaction data accumulated over a period of time and processed from time to time is called
(a) Online transaction
(b) Tatkal Transaction
(c) Sell transaction
(d) Database transaction.

(93) is a component of CRM.
(a) Accounting Information System
(b) Human Resource Information System
(c) Supply Chain Management System
(d) Marketing Information System.

(94) If a university establishes a web-based information system, whose faculty can access a record of a student’s grades and to advise students, it would be an example of……..
(a) CRM
(b) Intranet
(c) ERP
(d) Extranet

(95) CRM technology helps.
(a) to design direct marketing efforts
(b) developing new pricing models
(c) to process transactions faster
(d) All of the above.

(96) In job designing concept, BPR stands for
(a) Business Process Resource
(d) Business Process Remodeling.
(b) Business Process Re-engineering
(c) Business Process Reporting

(97) The key to the e-business drivers of e-business is—
(a) integration
(b) Privatization
(c) synchronization
(d) Status.

(98) All of the following are targets of the Internet except ……..
(a) To create a leading core with very high speed network capability for the national research community.
(b) to eliminate censorship from the Internet
(c) enable revolutionary internet applications
(d) To ensure faster transfer of new network services and applications to the wider Internet community.

(99) The set of applications and technologies that allow users to create, edit and distribute online containers.
(a) Internet
(c) Virtual Life
(b) Social networking
(d) Web 2.0.

(100) ……… is a term that includes the use of electronic platforms – intranet, extranet and internet – to conduct business of a company.
(a) e-marketing
(b) E-Business
(c) E-procurement
(d) E-commerce

 

Bcom Ecommerce MCQ Notes
UNIT – 4 ( E-PAYMENT SYSTEM)

 

(1) Online Banking provides its services through ……….

  • (a) Telephone
  • (b) Internet
  • (c) Client and proprietary software
  • (d. All of the above.

(2) Which of the following is processed later

  • (a) Debit Card
  • (b) credit card
  • (c) both (a) and (b)
  • (d) Smart card.

(3) Which card contains processing information in the form of processing chip

  • (a) Debit Card
  • (b) credit card
  • (c) Smart Card
  • (d) None of the above.

(4) Electronic cash services can be accessed through …..

  • (a) Purchase of cash from currency server
  • (b) General Banking
  • (c) credit card
  • (d) Debit card.

(5) Which of the following is commonly used for micro payments in e-commerce

  • (a) e-cash
  • (b) credit card
  • (c) Electronic Wallet
  • (d) None of the above.

(6) Full form of EFT is

  • (a) Electronic File Transfer
  • (b) Electronic Funds Transfer
  • (c) electronic function
  • (d) None of the above.

(7) Financial transactions carried out without the use of paper documents are—

  • (a) EDI
  • (b) electronic payment
  • (c) Credit Card Association
  • (d) None of the above.

(8) A financial institution which provides a credit card or other means of payment to a customer is—

  • (a) Credit Card Association
  • (b) customer issuing bank
  • (c) Merchant Account
  • (d) Payment Gateway.

(9) is a service providing connectivity between merchants, customers and financial networks for authorization and processing of payments

  • (a) Acquisition of the bank
  • (b) Authority
  • (c) Payment Gateway
  • (d) Agreement.

(10) A large data centre that processes credit card transactions and funds merchants

  • (a) Credit Card Association
  • (b) customer issuing bank
  • (c) Processor
  • (d) None of the above.

(11) Transactions whose authorization codes are sent to the processor to make payment to the merchant, this process is called

  • (a) Processing
  • (b) Settlement
  • (c) Payment Gateway
  • (d) None of the above.

(12) The process by which a customer’s credit card is actively verified is called

  • (a) Settlement
  • (b) Payment Gateway
  • (c) Authority
  • (d) Credit and Association.

(13) There is an open standard to protect confidentiality and ensure the authenticity of electronic transactions

  • (a) Merchant Authentication
  • (b) secure electronic transactions
  • (c) Cardholder Account Authentication
  • (d) None of the above.

(14) Enables SET cardholders to verify that

  • (a) A trader has a relationship with a financial institution.
  • (b) He is a valid user of a valid Card Account Number.
  • (c) Intimation of payment is sent to the merchants.
  • (d) Payment information is secure, as it travels across the network

(15) EFT is a set of techniques, which allow –

  • (a) of transfer between large organisations
  • (b) Execution of financial transactions by electronic messages
  • (c) Repayment of credit card account
  • (d) None of the above.

(16) Transfer money to third party account

  • (a) Cashback
  • (c) Deposit
  • (b) payment
  • (d) Inquiry (investigation).

(17) are a transaction without financial implications

  • (a) Withdrawal
  • (b) Refund
  • (c) check
  • (d) Cashback |

(18) A transaction in which the cardholder withdraws funds from his own account at the same time as making a purchase

  • (a) Withdrawal
  • (b) Cashback
  • (c) Refund
  • (d) Payment.

(19) EFT method is commonly used in ……….

  • (a) depositing payroll checks
  • (b) depositing money into the bank account
  • (c) depositing school fees in the school treasury
  • (d) All of the above.

(20) A wide card with a microchip or a plastic card with a magnetic stripe which records the currency balance is

  • (a) Debit Card
  • (b) Smart Card
  • (c) Stored Value Card
  • (d) Credit card.

(21) A card capable of storing data by modifying the magnetism of iron-based magnetic particles on a band of magnetic components on a card is-

  • (a) Smart Card
  • (b) credit card
  • (c) Magnetic Stripe Card
  • (d) Stored Value Card.

(22) Cards that use magnetic stripe technology or integrated circuits to store customer specific information

  • (a) Stored Value Card
  • (b) Smart Card
  • (c) Magnetic card
  • (d) Debit card.

(23) The fault of e-cash is its

  • (a) inability to be divided into smaller quantities
  • (b) Price change in business transaction
  • (c) the quality of double spending
  • (d) None of the above.

(24) Smart cards are also called electronic wallets or virtual wallets, which store electronic funds, are examples of ……….

  • (a) Immediate payment or cash
  • (b) Debit or Prepaid
  • (c) credit or postpaid
  • (d) None of the above.

(25) The quality by which e-cash should be returned in cash or by bank authorised credit is called

  • (a) monetary value
  • (b) Interoperability
  • (c) Diversity
  • (d) None of these.

(26) Diversity of e-cash means that

  • (a) It is easy to copy or copy.
  • (b) It is available in many denominations.
  • (c) It is interchangeable as payment for other e-cash.
  • (d) It can be stored on the memory of a remote computer.

(27) An e-cheque carries the digital equivalent of a signature which..

  • (a) Transfers money to the accounting server.
  • (b) forwards it to the buyer’s bank.
  • (c) Authenticates a check coming from the owner of the account.
  • (d) None of the above.

(28) E-checking is designed in such a way that

  • (a) The paperwork involved is greatly reduced.
  • (b) The receiver can obtain authorization from the sender’s bank.
  • (c) The processing time is greatly increased.
  • (d) They require double expenditure.

(29) A collectible value card refers to the monetary value on a card. Where

  • (a) The money is deposited with the issuer.
  • (b) The data is maintained on the computer associated with the card issuer.
  • (c) Cash transactions are instant.
  • (d) None of the above.

(30) The major potential of an electronic payment system is that it

  • (a) Increases cases of corruption.
  • (b) The beginning of a cashless society.
  • (c) Increases transactions of very little value.
  • (d) None of the above.

(31) E-cash technology uses an electronic cash issuing server called

  • (a) Digital Signature
  • (b) E-Mint 
  • (c) e-cheque
  • (d) None of the above.

(32) E-cheque consists of a pair of numeric keys where

  • (a) Encoding key is private and decoding key is public.
  • (b) Both the keys are private.
  • (c) Both the keys are public.
  • (d) Encoding key is public and the decoding key is private.

(33) Online payment problem with plain credit card

  • (a) Confidentiality of credit card number
  • (b) Authentication of the customer
  • (c) both (a) and (b)
  • (d) None of the above.

(34) The integrity of the content of the message can be protected by ……..

  • (a) to maintain a public server with all public keys
  • (b) Hashing the message between the customer and the seller
  • (c) To encrypt the message.
  • (d) Authentication of the key(s) of the customer.

(35) Customers register with third parties on the Internet in third party processing for ……..

  • (a) buying and selling on the internet
  • (b) to verify electronic transactions through credit cards
  • (c) sending electronic messages to others
  • (d) to deliver goods or services online.

(36) When the balance on the electronic purse is exhausted,—

  • (a) The purse is inserted into the vending machine.
  • (b) The purse can be recharged with a higher amount.
  • (c) both (a) and (b)
  • (d) None of the above.

(37) Smart card technology can be used online from the personal computer of the customer because

  • (a) Smart card slots and relevant software are available.
  • (b) The seller is ready to accept the smart card payment online.
  • (c) He is ready to transfer the money.
  • (d) None of the above.

(38) In the design of new electronic payment systems for the complete success of the system, it is important to address ……….

  • (a) Confidentiality
  • (b) Pricing
  • (c) Security
  • (d) All these.

(39) Transactions are processed by banks through this system that links all US financial institutions to

  • (a) Electronic Funds Transfer
  • (b) Automated Clearing House
  • (d) Stored Value Card System.
  • (c) Credit card system

(40) Direct Deposit The most widely used EFT program in which

  • (a) Fund transfer is done through an electronic terminal.
  • (b) Payroll is reflected directly into the employee’s bank account.
  • (c) Funds are transferred to the bank of the billing company.
  • (d) Financial transaction is done.

(41) Online shopping is a form of electronic commerce where

  • (a) Transactions are carried out between consumers.
  • (b) The buyer is directly connected to the seller’s computer online which is normally through the Internet.
  • (c) is an intermediary service.
  • (d) The sale and purchase transactions go together.

(42) Physical security of electronic payment systems. depends on.

  • (a) technical process
  • (b) certification
  • (c) current technology
  • (d) All these.

(43) Standardisation of the electronic payment system for ……… is desirable.

  • (a) Scalability
  • (b) Interoperability
  • (c) Security
  • (d) Pricing |

(44) An ideal e-payment system processes that quality

  • (a) Which reduces the cases of corruption.
  • (b) thereby allowing easy tracking of payments.
  • (c) Which it entrusts to agencies fighting corruption.
  • (d) All of the above.

(45) Well suited for electronic cheques…..

  • (a) Clearing of micro payments
  • (b) multiple accounting servers
  • (c) Refund of payment transaction
  • (d) All of the above.

(46) E-cheque is a form of credit payment

  • (a) One who flows money among his customers.
  • (b) which allows customers to use digital online checks to make payments directly to web merchants.
  • (c) One who exchanges e-cash.
  • (d) None of the above.

(47) The advantage of using smart cards is that they can provide …….

  • (a) Ability to reduce immigration fraud
  • (b) Full identity in construction industries
  • (c) both (a) and (b)
  • (d) None of the above.

(48) Smart cards are stored value cards that can be used for

  • (a) To store information
  • (b) To control access to accounts
  • (c) to buy goods or services
  • (d) All of the above.

(49) The test card debits funds from the user’s account on the occasion whereby

  • (a) The transaction can be finalised at the time of purchase.
  • (b) The need to pay the credit card bill at a later date is bypassed.
  • (c) Writes an unsecured check containing the personal information of the account holder.
  • (d) All of the above.

(50) The term used when money is provided by a merchant other than an ATM…. it happens.

  • (a) Cashback
  • (b) Cash advance
  • (c) payment
  • (d) Inter Account Transfer.

(51) A small plastic card issued to users of the system is part of a system of payment in the name of –

  • (a) credit card
  • (b) Debit Card
  • (c) e-cash
  • d) E-money.

(52) A secured credit card is a type of credit card secured by …….

  • (a) Deposit accounts owned by the cardholder
  • (b) credit union or building society
  • (c) growth of currency counter
  • (d) Storage of bit strings representing electronic coins

(53) Fees are posted to the payer’s account.

  • (a) Debit based system
  • (b) Credit card system
  • (c) e-cash
  • (d) None of these.

(54) The electronic representation of traditional money is

  • (a) e-cheque
  • (b) e-cash
  • (c) electronic money
  • (d) of these

(55) One unit of electronic money is commonly referred to as ……..

  • (a) Electronic Wallet
  • (b) e-cash
  • (c) Digital coins
  • (d) E-cheque.

(56) Stored value is software or hardware devices

  • (a) Electronic Wallet
  • (b) Smart Card
  • (d) None of these.
  • (c) e-cheque

(57). The electronic wallet can be loaded with a specific value by ……….

  • (a) Growth of money counter
  • (b) Strong bit strings representing electronic coins
  • (c) both (a) and (b)
  • (d) None of the above.

(58) It is an internet based system which allows to transfer money anonymously

  • (a) e-cash
  • (c) Smart Card
  • (b) e-cheque
  • (d) Debit

(59) The electronic document which replaces the paper check document is

  • (a) e-cheque
  • (b) e-cash
  • (c) e-banking
  • (d) Electronic Wallet.

(60) The main advantage of a debit card is that

  • (a) There is no need to carry cash.
  • (b) There is no need to worry about losing cash.
  • (c) There is a facility to access money at the ATM machine at any time of the day and night.
  • (d) All of the above.

(61). Allows the customers of a financial institution to carry out financial transactions on a secured basis by the institution.

  • (a) e-cash
  • (b) e-banking
  • (c) Debit based account
  • (d) Credit based account.

(62) The basic feature of online banking is that

  • (a) Customers can view their accounts.
  • (b) Customers pay bills and manage investments.
  • (c) both (a) and (b)
  • (d) None of the above.

(63) The advantage of a secured card for someone with a negative or no credit history is that

  • (a) The cardholder is expected to make regular payments.
  • (b) Most companies regularly report to the major credit bureaus.
  • (c) Deposit amount will not be debited for one or two payments.
  • (d) None of the above.

(64) The Cardholder spends money which has been collected by way of pre-deposit in the Cardholder or parent or

  • (a) Prepaid Debit Card
  • (b) Prepaid credit card
  • (c) Smart Card
  • (d) None of the above.

(65) Visa, MasterCard, American Express or Discover.

  • (a) Smart Card
  • (b) credit card
  • (c) Debit Card
  • (d) None of the above.

(66) Any transaction involving some exchange of value over a communication network is

  • (a) Electronic commerce
  • (b) e-cheque
  • (c) electronic money
  • (d) E-cash.

(67) To participate in any particular electronic payment system, a customer and a merchant

  • (a) Must be able to access the Internet.
  • (b) must first be registered with the respective payment service provider.
  • (c) both (a) and (b)
  • (d) none of the above

(68) Payment Gateway acts as an intermediary between the traditional payment infrastructure and ……

  • (a) Internet
  • (b) communication network
  • (c) Electronic Payment Infrastructure
  • (d) Authorised signatory

(69) the bank which actually issues the payment instrument which the customer uses for payment,

  • (a) issuing bank
  • (b) the acquittal bank
  • (c) Payment Authority
  • (d) None of these.

(70) A payer and a payer are online to each other during a payment transaction in ……..

  • (a) Online system
  • (b) Offline system
  • (c) Electronic Payment System
  • (d) None of these.

(71) Fees are posted to the payee’s account in ……..

  • (a) Debit based system
  • (b) Credit based system
  • (c) Electronic Payment System
  • (d) None of these.

(72) An electronic payment system in which relatively large amounts of money can be exchanged is called

  • (a) Macro Payment System
  • (b) Micro Payment System
  • (c) Offline Payment System
  • (d) Online payment system.

(73) Paper money is credit card and cheque.

  • (a) Digital Payment System
  • (b) Online Payment System
  • (c) Traditional means of payment are called
  • (d) electronic documents

(74) Electronic representation of traditional payment instruments

  • (a) electronic money
  • (b) electronic check
  • (c) Electronic Cash
  • (d) both (a) and (b)

(75) The payer withdraws a certain amount from his account and uses that money whenever he wants to make a payment in …….

  • (a) check-like system
  • (b) Cash-like system
  • (c) Electronic check
  • (d) None of these.

(76) The money remains in the account of the payer till the purchase is made ……..

  • (a) Cash-like system
  • (b) check-like system
  • (c) Electronic Payment System
  • (d) Credit card system.

(77) The most popular means of payment in the Internet are

  • (a) Debit Card
  • (b) credit card
  • (c) Smart Card
  • (d) None of these.

(78) The need to protect the confidentiality of payment transaction data arises out of cases of …..

  • (a) Non-authority
  • (b) large scale fraud
  • (c) Stolen credit card numbers
  • (d) All these.

(79) Fraudsters use the root word for credit card number from …….

  • (a) Anonymous problems.
  • (b) information hiders
  • (c) dishonest traders
  • (d) Both (b) and (c).

(80) During a payment transaction, the customer gives his credit card information(s)

  • (a) to the merchant
  • (b) to the familiar bank
  • (c) issuing bank
  • (d) None of these.

(81) Against the information concealment of credit card numbers only by can be protected.

  • (a) double signature
  • (b) Encryption
  • (c) Digital Signature
  • (d) Credit card number ‘surname’.

(82) An online system requires the online presence of a…….

  • (a) issuing bank
  • (b) Acquaintance Bank
  • (c) Authorization Server
  • (d) None of these.

(83) The payer’s account is debited immediately after the transaction is processed in …….

  • (a) Offline system
  • (b) Debit based system
  • (c) Credit based system
  • (d) Online payment system.

(84) Merchant receives payment record from ……..

  • (a) issuing bank
  • (d) None of these.
  • (c) Payment Gateway
  • (d) None of these.

(85) Credit card numbers to ……. protected against unscrupulous traders.

  • (a) Encryption
  • (b) double signature
  • (c) Credit card number ‘surname’
  • (d) None of these.

(86) A secure message-oriented communication protocol designed for use in conjunction with HTTP is

  • (a) SHEN
  • (b) S-HTTP
  • (c) SSL
  • (d) None of these.

(87) S-HTTP does not require client side public key certificate because

  • (a) This requires the individual user to have an established public key.
  • (b) It supports symmetric key(s) only in operation mode.
  • (c) It leverages the certification infrastructure.
  • (d) None of the above.

(88) S-HTTP is compatible with HTTP and supports ……….

  • (a) cryptographic message format standards
  • (b) interrelationship between different types of implementations
  • (c) both (a) and (b)
  • (d) None of the above.

(89) S-HTTP cannot be used for…..

  • (a) Secure Transactions
  • (b) VPN security
  • (c) personal messages
  • (d) Web communication.

(90) The development of smart cards is linked to the development of……

  • (a) microcomputer chip
  • (b) Magnetic Stripe Card
  • (c) both (a) and (b)
  • (d) None of these.

(91) Applications that use smart cards include

  • (a) phone card
  • (b) Health Insurance Card
  • (c) Banking and Payment Applications
  •  (d) All these

(92) The processor chip of a typical smart card contains

  • (a) RAM
  • (b) Maskable Memory ROM
  • (c) Data Storage EEPROM
  • (d) All these.

(93) The issues of security of smart cards are generally related to ……….

  • (a) Operating System Security
  • (b) Hardware Security
  • (c) Card body protection
  • (d) All these.

(94) S-HTTP provides complete flexibility of …….

  • (a) cryptographic algorithm, mode and parameters
  • (b) Transaction Mode
  • (c) both (a) and (b)
  • (d) None of the above.

(95) Using S-HTTP……. is used to encrypt.

  • (a) communication channel
  • (b) personal messages
  • (c) VAN security
  • (d) Public Key (Key) Certificates.

(96) For the purpose of better performance……… is used in smart cards.

  • (a) Digital Signature
  • (b) Terminal Application
  • (c) cryptographic coprocessor
  • (d) None of these.

(97) Electronic verification systems allow traders to verify that

  • (a) The card is valid.
  • (b) A customer holding a credit card has enough credit to complete the purchase in a few seconds.
  • (c) both (a) and (b)
  • (d) None of the above.

(98) In …… the cardholder pays for the purchase and the merchant passes the transaction to the acquirer.

  • (a) Benching
  • (b) Authority
  • (c) Funding
  • (d) None of these.

(99) Payment …… means that both the payer and the payee have to prove their payment identity which is not identical to their actual identity.

  • (a) certification
  • (b) integration
  • (c) Authority
  • (d) None of these.

(100) The confidentiality of one or more parts of payment transaction data is called

  • (a) Authority
  • (b) Confidentiality
  • (c) certification
  • (d) Integration.

(101) Once the payment is made to the acquirer, the acquirer pays the dealer in ……….

  • (a) batching
  • (b) Clearing
  • (c) Funding
  • (d) Settlement.

(102) Payment…..Ensures that no money can be taken from a customer’s account or smart card without his express permission.

  • (a) Authority
  • (b) certification
  • (c) integration
  • (d) None of these.

(103) Payment transaction data includes.

  • (a) identity of the donor
  • (b) Shopping Content
  • (c) identity of the payee
  • (d) All these.

(104) One of the major advantages of online banking is that it

  • (a) convenient.
  • (b) is fast, efficient and effective.
  • (c) both (a) and (b)
  • (d) None of these.

(105) Includes security parameters during card development and manufacturing

  • (a) Chip protection system
  • (b) Control of physical access to the card’s data
  • (c) Evaluation and testing of data
  • (d) All of the above.

(106) Most of the attacks on smart card hardware are done during card usage because

  • (a) They only implement documented features.
  • (b) There is practically no physical security.
  • (c) both (a) and (b)
  • (d) None of the above.

(107) An important measure of the ability of an e-commerce star to attract users is

  • (a) Websites
  • (b) visit
  • (c) Channels
  • (d) Advertisement.

(108) We can see which channels do the best job of bringing in visits by doing ……….

  • (a) Divide the traffic.
  • (b) generate sales
  • (c) traffic boost
  • (d) None of the above.

(109) ……… measures the number of individual persons accessing the website.

  • (a) Online visitors
  • (b) Anokhi Visit
  • (c) frequent visits
  • (d) Total Visits

(110) All the segments of the website are continuously monitored by the server so that it can be determined

  • (a) Number of frequent visitors
  • (b) Valuable database of information
  • (c) How many visits did each get
  • (d) Total number of visits

(111) When a web server processes a file request, it enters ……….

  • (a) Server Log
  • (b) Website
  • (c) webpage
  • (d) Server’s site.

(112) …… The tool is designed to help us automate our social media marketing to drive our sales.

  • (a) Acquire Live Chat
  • (b) Maintu
  • (c) Mailchimp
  • (d) Google Analytics

(113) ……provides us a single repository of all purchases, activities, events, intentions, social footprints, browsing history and updates in real time.

  • (a) Maintu
  • (b) betaout
  • (c) Mailchimp
  • (d) Marillo.

(114) The most preferred way to track most of the data on our e-commerce site is-

  • (a) Google browser
  • (b) Matrillo
  • (c) Google Analytics
  • (d) Vigjo.

(115) Heatmap is an important feature of ‘Crazy Egg Tool’ which allows us to –

  • (a) Provides a picture of where people click on our site.
  • (b) Returns a picture of how far down the page the visitor has to scroll.
  • (c) Reports the number of clicks of each element on our page.
  • (d) None of the above.

(116) 360 degree user profiling, email personalization, personalised notification, etc. are the features provided by this tool.

  • (a) Vigjo
  • (b) Maintu
  • (c) Google Analytics
  • (d) Matrillo.

(117) We……. You can advertise with Facebook ads.

  • (a) page set
  • (b) Selection of a particular advertising audience
  • (c) track customer actions on the website
  • (d) All of the above.

(118) ………The technology converts our data into predictive monitoring and suggests the best contracting channel for marketing action.

  • (a) Vigjo
  • (b) Maintu
  • (c) Matrillo
  • (d) Crazy Egg.

(119) Square’s screen sharing feature allows agents to…..

  • (a) creating better targeted emails
  • (b) to determine different types of reward and incentive programs
  • (c) to gain temporary access to the customer’s computer
  • (d) Increase contract and efficiency.

(120) We……. To create targeted campaigns, automate follow-ups and send back-in-stock messages.

  • (a) Maintu
  • (b) Mailchimp
  • (c) Matrillo
  • (d) Confettiion

 

Bcom E-commerce MCQ
UNIT – 5 ( SECURITY AND LEGAL ASPECTS OF E-COMMENCE)

 

(1) Guidelines that ensure secure transactions through the Internet are referred to as—

(a) Information Security

(b) E-commerce security

(c) Data Security

(d) Computer Security

 

(2) When we refer to the protection of information from disclosure to unauthorised parties, it is—

(a) integrity

(b) Confidentiality

(c) Availability

(d) Truthfulness.

 

(3) A major component of protecting information confidentiality is—

(a) Authority

(b) Encryption

(c) non-abandonment

(d) None of these.

 

(4) Information confidentiality can be ensured

(a) by enforcing file permissions

(b) by access to a control list to restrict access to sensitive information

(c) both (a) and (b)

(d) None of the above.

 

(5) To protect information from being modified by unauthorised parties—

(a) Authority

(b) truthfulness

(c) Integrity

(d) Confidentiality.

 

(6) A commonly used method to protect data integrity is

(a) Hashing of the obtained data

(b) Compare with the hash of the actual message

(c) both (a) and (b)

(d) none of the above

 

(7) The ability to identify any person or entity with whom you are acting on the Internet is—

(a) truthfulness

(b) integrity

(c) Availability

(d) Confidentiality.

 

(8) the ability to ensure that participants do not refuse their online auctions,

(a) truthfulness

(b) Availability

(c) non-abandonment

(d) Confidentiality.

 

(9) The purpose of a high availability system is to be available for containment at all times

(a) Hardware failure

(b) Upgradation of the system

(c) Disruption of service due to power outage

(d) All of the above.

 

(10) a computer program having the ability to replicate or make copies thereof and to be spread to other files,

(a) Credit card theft

(b) faulty code

(c) virus

(d) Hacking.

 

(11) The type of virus, which changes the file system of the disk-

(a) cluster virus

(b) Bomb

(c) E-mail virus

(d) boot sector virus

 

(12) One of the most hostile types of virus that copies itself into memory is where it can hide and infect other disks,

(a) cluster virus

(b) boot sector virus

(c) E-mail virus

(d) Bomb.

 

(13) It is designed to infect a specific type of document file such as MS Word or Excel file,

(a) File infected virus

(b) boot sector virus

(c) cluster virus

(d) Macro virus.

 

(14) These viruses reside in the memory of the computer, which makes it difficult to detect them, are called

(a) Stealth Virus

(b) Leech Program

(c) Polymorphic virus

(d) Trojan Horse.

 

(15) Software application in which advertising banners are displayed while the program is running is called

(a) browser parasite

(b) Adware

(c) spyware

(d) user keystrokes

 

(16) A program that changes certain settings in the browser

(a) spyware

(b) Adware

(c) browser parasite

(d) bot.

 

(17) It can be used to capture passwords and other very sensitive data entered by the user

(a) Screen Snapshot

(b) user keystrokes

(c) spyware

(d) Adware.

 

(18) A way for authors to make money from a product, other than selling it to the user

(a) Adware

(b) spyware

(c) Scream Snapshot

(d) Keystrokes |

 

(19) Phishing attacks do not involve faulty code, but rely on—

(a) on the personal information of the individual

(b) On setting up a fake website

(c) For making false statements and fraud

(d) None of the above.

 

(20) is a fraudulent process of stealing personal data

(a) Spoofing

(b) Identity Theft

(c) Phishing

(d) None of the above.

 

(21) Hackers and crackers gain unauthorised access to—

(a) By hacking government websites

(b) By hacking the files of e-commerce sites

(c) by detecting weaknesses in the security practises of websites

(d) All of the above.

 

(22) An offence in which an imposter or cheater obtains or obtains body parts of personal information is called-

(a) Phishing

(b) Identity Theft

(c) hacking

(d) Cyber ​​vandalism.

 

(23) A group of hackers who work in software and hardware and report to companies to improve them, is called

(a) Black Hat Hackers

(b) Grey Hat Hackers

(c) White Hat Hackers

(d) None of these.

 

(24) a breach of integrity which is an electronic defacement of a page of an existing website—

(a) Identity Theft

(b) Cyber ​​vandalism

(c) Credit card fraud

(d) Spoofing

 

(25) Credit card fraud scheme with reference to unauthorised access to credit card accounts in the name of another person

(a) Application fraud

(b) Account acquisition

(c) skimming

(d) Cyber ​​vandalism.

 

(26) When business workers illegally access customers’ credit card information, it is

(a) Account acquisition

(b) Application fraud

(c) skimming

(d) Spoofing.

 

(27) A program which performs a desired function but also includes an unlikely function—

(a) bot

(b) virus

(c) Trojan Horse

(d) Warm.

 

(28) A botnet is a collection of authorised computers, which are used by—

(a) sending spam

(b) stealing information from computers

(c) storing network traffic for later analysis

(d) All of the above.

 

(29) It involves redirecting a web link to a different address against the will

(a) Spam website

(b) Spoofing

(c) Phishing

(d) Skimming.

 

(30) Spoofing does not directly damage files or network servers, but—

(a) threat to the integrity of a site

(b) redirects customers to a fake website

(c) steals business from legitimate sites

(d) None of the above.

 

(31) A denial of service attack is an act of harm that attempts to

(a) Segregating web servers

(b) Too many requests to be processed on a network server or web server

(c) preventing legitimate users of a service from using that service

(d) preventing a particular person from accessing any service.

 

(32) Account acquisition usually involves

(a) Criminal hijacking of an existing credit card account

(b) unauthorised opening of credit card accounts

(c) Unauthorised access to other credit card information

(d) None of the above.

 

(33) A type of web attack that seeks to disrupt the normal functioning of the desired computer network –

(a) Denial of Service Attack

(b) Distributed DOS

(c) Cyber ​​vandalism

(d) Identity theft.

 

(34) Secure computer networks that allow users to remotely access a company’s data files are

(a) Antivirus software

(b) Virtual Private Network

(c) firewall

(d) None of these.

 

(35) A software or hardware that allows only external users who have specific features to access a protected network or site is called

(a) Antivirus software

(b) firewall

(c) Virtual Private Network

(d) Identification service.

 

(36) Dedicated network security hardware and software equipment that provides security for all areas of the network and enables secure connections—

(a) switch

(b) Router

(c) firewall

(d) Virtual Private Network.

 

(37) A digital signature is an electronic signature which can be used for—

(a) Authenticating the identity of the sender of a message

(b) ensure that the original content of the message or document sent remains unchanged

(c) The message is valid, in proving that a message is effectively coming from a sender

(d) All of the above.

 

(38) A rate that encapsulates valid issues related to the use of network information, devices’ communication, transaction and distributional aspects

(a) Cyber ​​vandalism

(b) Cyber ​​Law

(c) Cyber ​​Space

(d) Cyber ​​theft.

 

(39) an access control mechanism that ensures that properly authenticated users are allowed to access only those resources who are entitled to their use—

(a) Password protection

(b) Biometrics

(c) firewall

(d) All these.

 

(40) The information sent between the customer’s system and the e-commerce server may be secured by–

(a) firewall

(b) network security

(c) Encryption

(d) None of these.

 

(41) When HTTP is used to encrypt traffic, a connection is made between the client and the server.

(a) Network

(b) SSL

(c) Data

(d) dial-up.

 

(42) There is a significant security problem facing service providers

(a) Denial of Service Attack

(b) excessive traffic

(c) resource degradation

(d) All of the above.

 

(43) To redirect Internet traffic to meet the needs of criminally inclined persons. is used.

(a) DNS information

(b) BGP routing

(c) device agreement

(d) blackhole routing

 

(44) Take advantage of routing protocols as a security tool.

(a) sinkhole

(b) blackhole routing

(c) Backscatter Rebels

(d) Traffic scrubbing.

 

(45). Useful for spoof attacks, where attackers use the source address from a personal or bogan IP address space.

(a) blackhole routing

(b) backscatter traceback

(c) sinkhole

(d) Traffic scrubbing.

 

(46) When a part of the network is exposed to a DDOS attack, it is done. is applied to

(a) traffic scrubbing

(c) Routine Table

(b) device agreement

(d) None of these.

 

(47) Freedom of speech is understood as a multi-faceted right, the aspects of which include

(a) Right to seek information and views

(b) Right to information and views

(c) Right to provide information and ideas

(d) All of the above.

 

(48) The protection of freedom of speech as a right includes not only the elements, but also

(a) Freedom of opinion

(b) means of expression

(c) Human and people’s rights

(d) None of these.

 

(49) The suppression of Internet censorship is controlled by

(a) moral, religious or commercial reasons

(b) What can be seen, published or accessed on the Internet

(c) discussion among citizens

(d) Traditional media.

 

(50) ….. URL strings are scanned for target keywords regardless.

(a) use of encrypted protocol

(b) the domain name specified in the URL

(c) encrypted connection

(d) None of these.

 

(51) Packet filtering when a certain number of controversial keywords are detected

(a) Uses an encrypted connection.

(b) reduces the amount of text contained in the packet

(c) TCP ends the packet transmission

(d) Affects protocols based on TCP.

 

(52) The specific circumferential method of filtering packets is—

(a) use of an encrypted connection

(b) Avoiding HTML elements

(c) reducing the MTU/MSS of the TCP/IP stack

(d) All of the above.

 

(53) There is a troubleshooting method to reset the connection

(a) Finding the location of the block

(b) reducing the amount of tax

(c) ignore reset packets sent by the firewall

(d) None of the above.

 

(54) Prevents denial of service attacks as well as attacks that sabotage hostile websites

(a) Interruption in service

(b) access to certain websites or online services

(c) blocking users or websites

(d) None of the above.

 

(55) There is a troubleshooting method for DNS filtering

(a) Finding an alternate DNS route that resolves domain names correctly

(b) Blocking the domain name server

(c) modifying the hosts file

(d) Typing an IP address in addition to the domain name.

 

(56) A reflection of the tax system of the nation is

(a) communal values

(b) Values ​​who are in power

(c) both (a) and (b)

(d) None of these.

 

(57) In order to create a system of taxation, the choice of a nation with respect to ……… should do.

(a) How tax is collected

(b) Who will pay the taxes

(c) Distribution of tax burden

(d) How much will be paid.

 

(58) The moneys provided by taxation are used by the States—

(a) Enforcement of law and public order

(b) in economic infrastructure

(c) Public Works and Social Practice

(d) All of the above.

 

(59) The government uses different types of taxes and these taxes are levied by –

(a) Foreign aid and military undertaking

(b) influencing the macroeconomic performance of the economy

(c) modifying the modes of consumption or employment

(d) All of the above.

 

(60) Colonial and modernising states use cash taxes

(a) In finding welfare services

(b) to attract or compel unwilling subsistence producers in cash economics

(c) To pay off debts and other requirements

(d) None of the above.

 

(61) The main complexity of e-commerce is focused on

(a) On the presence of legal and moral obligations

(b) on matters of copyright, ownership of data/information and presence of censorship

(c) On the presence of many controversial and developing issues

(d) None of the above.

 

(62) The increasing dependence of business on computers means

(a) Long lasting gain

(b) Positive impact on the financial bottom line

(c) Number of controversial issues related to morality

(d) careful consideration of the consequences.

 

(63) Laws are passed and developed by the Government—

(a) By strict legal rule

(b) by example of cases

(c) by general agreement

(d) by technological innovation

 

(64) Focuses on decision making in business

(a) Enlightened selfishness

(b) permanent profit

(c) Profit Maximisation

(d) All these.

 

(65) The law in the global content of e-commerce provides

(a) Profit for longer time

(b) Adequate guidance on how the business should be conducted

(c) New businesses practice with risk

(d) Strict legal rules governing the actions of citizens.

 

(66) Internet indecency is necessarily related to

(a) Protecting the world’s customers and cultural diversity

(b) suppressing pornography on the Internet

(c) by implementing an effective international regulation

(d) None of the above.

 

(67) Control of suppression of things that can be accessed, published or viewed on the Internet

(a) indecency

(b) Censorship

(c) Taxation

(d) Cyber ​​sitter.

 

(68) Censorship of Internet components and communications prohibits electronic commerce because

(a) It prohibits certain types of products and services from being sold or advertised.

(b) It lowers the interest level of many potential participants in online activities.

(c) It is not possible to sensor the objectionable information(s).

(d) It destabilised national security.

 

(69) Public information may be censored –

(a) for personal purpose

(b) for public policy reasons

(c) minority group

(d) None of these.

 

(70) Taxation is a matter of efficient economic management and dynamic governance which functions—

(a) Access to different levels of users

(b) to define, enable and constrain the historical meaning of the state

(c) Completion with offline marketing channels

(d) All of the above.

 

(71) The process for altering information to make it unreadable for anyone is—

(a) Encryption

(b) decryption

(c) Redundancy

(d) Cryptography

 

(72) In all encrypted messages some must maintain the redundancy which is necessary for …….

(a) Providing encrypted information

(b) prevent active intruders from sending garbage

(c) to work on plain text

(d) (b) and (c) both.

 

(73) Before the sender and receiver can communicate securely, they agree on a key, which is called—

(a) Symmetric Key Encryption

(b) Asymmetric Key Encryption

(c) Private Key (Key) Encryption

(d) Encrypted algorithm

 

(74) The security of a symmetric algorithm resides in the key which means

(a) the key (key) remains secret

(b) Anyone can encrypt and decrypt the message

(c) Expiration of secret information

(d) No private key(s) is shared or transmitted.

 

(75) A basic element of a legally binding contract is

(a) offer

(b) accept

(c) idea

(d) All these.

 

(76) IT Act provides the instrument

(a) establishing when contracts are to be entered into electronically

(b) effecting a transaction to be completed through an electronic medium

(c) to properly accept the terms and conditions of the contract

(d) None of the above. the meaning is

 

(77) The concept of consideration in electronic contracts has a core element.

(a) Choosing law and jurisdiction

(b) Each party should derive some benefit from the transaction

(c) Running a proper e-commerce operation

(d) Adaptation properly with the e-commerce environment.

 

(78) Willingness to have a legal relationship with.

(a) Concept of E-mail

(b) Summary of Online Contract

(c) Abstracts of contract, offer and acceptance

(d) None of the above.

 

(79) refers to an offer in an electronic contract

(a) invitation to dinner

(b) invitation by one party to give information to the other

(c) Acceptance of terms in the online environment

(d) None of the above.

 

(80) For a company to run a proper e-commerce operation it is necessary to ensure that

(a) It is capable of accepting an invitation for treatment

(b) its terms and conditions are properly accepted for the online environment

(c) It is given the same status as offline signature

(d) None of the above.

 

(81) Determines the moment of acceptance.

(a) at the time the contract was made

(b) the nationality of the laws which shall apply to the contract

(c) the jurisdiction which shall be the appropriate forum in which any dispute shall be adjudicated

(d) All of the above.

 

(82) Individuals enjoy their right to free speech on the Internet

(a) by entering the chat room

(b) posting on bulletin boards

(c) giving his opinion on everything

(d) All these.

 

(83) The process of using cryptography to decrypt a message is called

(a) Encryption

(b) decryption

(c) public key

(d) None of these.

 

(84) Works by encoding the text of the message with encryption.

(a) key

(b) Digital Signature

(c) lock

(d) None of these.

 

(85) Encryption keys ( keys ) are published for anyone in the country to access and encrypt.

(a) Symmetric Key Encryption

(b) Public Key (Key) Encryption

(c) Message Authentication

(d) None of these.

 

(86) Provide an easy user-friendly way to authenticate documents, content and transactions.

(a) electronic lock

(b) cryptography

(c) Digital Signature……

(d) None of these.

 

(87) is used to save data on reset such as files on the computer or storage device.

(a) Locking mechanism

(b) Encryption

(c) public key

(d) Digital Signature.

 

(88) Prevents digital rights management

(a) the unauthorised use or reproduction of copyrighted material

(b) to reverse engineering the software

(c) both (a) and (b)

(d) None of the above.

 

(89) Encryption is used to protect the data in transit i.e. data is transferred through

(a) Wireless Intercom System

(b) Bluetooth devices

(c) Bank Automatic Teller Machine

(d) All these.

 

(90) ………Digital signature and encryption should be implemented at the time of message generation.

(a) To ensure safety

(b) to avoid tampering

(c) to protect integrity

(d) All these.

 

(91) A term used to describe legal issues relating to the use of communications technology, especially cyberspace or the Internet.

(a) Cyber ​​Law

(b) Cyber ​​Documents

(c) Cyber ​​Solutions

(d) None of these.

 

(92) Unlawful acts where the computer is used as either a tool or a target or both

(a) Cyber ​​attack

(b) Cyber ​​Crime

(c) Cyber ​​destruction

(d) None of these.

 

(93) The main objective of cyber law is to facilitate

(a) Electronic filing with cyber agencies

(b) Efficient delivery of government services through electronic records

(c) both (a) and (b)

(d) None of the above.

 

(94) The purpose of the IT Act 2000 is to provide

(a) Legal framework

(b) Legal framework for e-commerce in India

(c) both (a) and (b)

(d) None of the above.

 

(95) Chapter-4 of the IT Act 2000. gives a plan for

(a) Power Governance

(b) regulation of certifying officers

(c) pasting the digital signature

(d) All of the above.

 

(96) Chapter-7 of the Act deals with the scheme of things which are related to—

(a) E-business and new economy in India

(b) Digital Signature Certificate

(c) Legal framework for e-commerce

(d) All of the above.

 

(97) deals with Chapter 11 of the Act.

(a) Offences involving publication of information, etc.

(b) Establishment of Cyber ​​Regulation Tribunal

(c) Constitution of Cyber ​​Regulations Advisory Committee

(d) Monitoring the activities of certifying officers.

 

(98) IT Act seeks to empower government departments

(a) To make purchase transaction

(b) To tackle cyber crimes

(c) To accept the determination, creation and filing of official documents

(d) None of the above.

 

(99) Companies now………. Able to carry out electronic commerce using

(a) electronic record

(b) Legal infrastructure provided by the Act

(c) Activities of Certifying Officers

(d) None of the above.

 

(100) The IT Act addresses important security issues, which are important for.

(a) Concept of Secure Digital Signature

(b) Success of electronic transaction

(c) System of security procedures

(d) All of the above.

 

(101) A mechanism that binds a public key (key) with the relevant user identity through a certificate authority.

(a) cryptography

(b) Public Key

(c) Public Key Infrastructure

(d) None of the above.

 

(102) The cryptography technology that enables users to communicate securely over unsecured public networks is

(a) Symmetric encryption

(b) Public Key Infrastructure

(c) Public Key Cryptography

(d) None of the above.

 

(103) The Schedule contains amendments to the Penal Code.

(a) first

(b) second

(c) third

(d) Fourth.

 

(104) Which schedule has been amended in the Banker’s Book Evidence Act?

(a) First Schedule

(b) Second Schedule

(c) Third Schedule

(d) Fourth Schedule.

 

(105) Which act is related to the regulation of fund transfer between banks and other financial institutions through electronic means-

(a) Bankers Books Evidence Act

(b) Indian Evidence Act

(c) Reserve Bank of India Act

(d) None of the above.

(106) ……. has given legal validity and sanction to the Act.

(a) Digital Signatures

(b) free speech

(c) secure electronic records

(d) Digital certificates.

 

(107) The amendment made under section 66A in 2008 made it punishable to send.

(a) computer resources

(b) offensive message

(c) electronic documents

(d) None of these.

 

(108) Punishment and adjudication under the IT Act, 2000 are prescribed under the section.

(a) 42 and 43

(b) 43 and 44

(c) 44 and 45

(d) 14 and 151

 

(109) Which schedule has expanded the scope of conditional documents to bring within its ambitious electronic documents?

(a) First Schedule

(b) Second Schedule

(c) Third Schedule

(d) Fourth Schedule

 

(110) The IT Act, 2000 is not applicable to…….

(a) Execution of a negotiable instrument

(b) Implementation of Power of Attorney

(c) building trust

(d) All of the above.

 

(111) to the IT Act, 2000 to……. also say.

(a) ITA-2000

(b) ITA-2001

(c) ITA-2002

(d) ITA-2003.

 

(112) IT Act Total……. spread over chapters.

(a) 11

(b) 12

(c) 13

(d) 14.

 

(113) The offences and punishments in the IT Act 2000 have been given under section…….

(a) 65

(b) 70

(c) 74

(d) 65-74.

 

(114) Under section 66F, any person who does not act electronically shall be called……. will be punished.

(a) life imprisonment

(b) 10,00,000

(c) 10 years imprisonment

(d) Fine of ₹ 1,00,000.

 

(115) Section 14 of the IT Act 2000 pertains to……..

(a) Secure Digital Signature

(b) Secure electronic record

(c) secure filing of documents

(d) Secure electronic storage of data

follow us on instagram : Sachindaksh01

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
Open chat
1
Scan the code
Hello
Can We Help You?