Govt. J Buana College



CBCSCOMMERCESIXTH SEMESTERBC/6/CC/24 E : ESSENTIALS OF ECOMMERCEChoose the correct answerUnit 11. A computer-to-computer exchange of business documents in a standard electronic format between business partnersa)Emailb)TCPc)EDId)LAN2.Which among the following product is suitable for E-Commerce ?a)Books b)Vegetablesc)None of the aboved)a) and b)3.The supply chain management philosophy emerged in which decade?a)1960sb)1970sc)1980sd)1990s4.By Electronic Commerce we mean:a)Commerce of electronic goodsb)Commerce which depends on electronicsc)Electronic marketd)Commerce which is based on transactions using computers connected by telecommunication network.pared to B2C e-commerce, B2B e-commerce is ______.a)of equal sizeb)slightly smallerc)slightly largerd)much larger.6.The idealistic market envisioned at the outset of the development of e-commerce is called a.a)Bailey market.b)Baxter market.c)Bertrand market. d)Bergman market7.The first ecommerce website deals witha)Groceryb)Books.c)Clothesd)Essential commodities8.The purpose of supply chain management isa)provide customer satisfaction b)improve quality of a product c)integrating supply and demand management .d)increase production9. .……………….is the exchange of goods or items or commodities and services or applications used for money and deals the money mattersa) E-commerce b) Commerce c) Both of these d) none10.…………….is an approach to deliver information differentiated business values called services by combining the system and process generally called resourcesa) E-business b) E-commerce c) any of these d) none11. Which among the following is not an example for E-commercea) b) c) E- d) None of these12.………………were the first to establish prominent E-commerce Brandsa) b) E-bay and Amazon c) E- d) none of these13.By Electronic Commerce we mean: a) Commerce of electronic goods b) Commerce which depends on electronics c) Commerce which is based on the use of internet d) Commerce which is based on transactions using computers connected by telecommunication network 14.Which among the following product is suitable for E-Commerce ?a) Books b) Vegetables c) All of these d) None of these15. Which of the following is not a party of SCM ?a) Suppliers b) Manufacturers c) Distributors d) Customers.16.………………is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic meansa) E-commerce b) SCM c) EDI d) None of these17 . E-commerce transactions involve the sale or purchase of goods or services between a) Businessesb) Householdsc) Governmentsd) All of the above18. Customization is to _____________ as standardization is to___________.a) e-commerce; traditional commerceb) traditional commerce; e-commercec) websites; email d) None of the above19. _________ is not confined to buying and selling of goods but includes other activities like providing customer service and communicating with employees, client or business partners.a) E-commerceb) EDIc) E-businessd) B2B20. Online shopping was pioneered in the United Kingdom in 1979 by.a) Michael Aldrichb) Jeff Bezosc) Tim Berners-Leed) Steve Jobs21. EDIFACT stands for a) Electronic Data Interface For Administration, Commerce and Transportb) E-commerce Data Interface For Administration, Commerce and Transportc) Electronic Data Interchange For Administration, Commerce and Transitd) Electronic Data Interchange For Administration, Commerce and Transport22. E-commerce systems perform the following business functions between producers, suppliers and customersa) providing informationb) distribution and delivery logistics c) payment processing d) All of the above23. The impacts of e-commerce do not includea) Disintermediationb) Responsible Consumptionc) Re-internediationd) Cannibalization24. The basic purpose of supply chain management is toa) reduce customer satisfactionb) improve quality of a productc) make inventory readily availabled) increase production25.World Wide Web (WWW) was introduced in which of the following year?a)1994b)1996c)1992d)199026.Which of the following describes e-commerce?a)Doing business electronicallyb)Doing Businessc)Sale of Goodsd)All of the above27.Which among the following product is suitable for E-Commerce?a)Booksb)Furnituresc)All of thesed)None of these28.Electronic Exchange of business documents in a standard format is known asa)E-Commerceb)E-Businessc)EDId)None of these29.Which of the following is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products?a)E-Commerceb)EDIc)Networkingd)SCM30.Which of the following is not a party of SCM?a)Suppliersb)Manufacturersc)Distributorsd)Customers31.Among the following, which one is not the limitation of e-commerce?a)Securityb)High Labour Costc)Lack of Privacyd)Legal issue32.Which of the following is not true about e-commerce?a)24*7 availabilityb)Government interferencec)Cheerful Lifestyled)Easy Transaction33.Which of the following best describe ecommerce?a)Doing business electronicallyb) Doing businessc) Sale of good.d) All of the above34.Electronic Exchange of business documents in a standard format is known as ………………a) E-commerce b) E-Business c) EDI d) None of these35. ………………..is concerned with the buying and selling information, products and services over computer communication networksa)Commerce b) E-Commerce c) E-Business d) None of these36.…………allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company.a) EDI b) Protocols c) Standards d) Business applications37.The purpose of supply chain management isa)provide customer satisfactionb)improve quality of a productc)integrating supply and demand managementd)increase production38.Which of the following creates an online supply chain community that enables partners to collaborate on design, procurement, demand and supply management, and other supply chain activities?a)collaborative designb)collaborative fulfillmentc)supply chain exchanged)supply chain event management39.Electronic Data Interchange(EDI) standards are:a)Not universally availableb)Essential for B2B ecommercec)Not Essential for B2B ecommerced)Still being evolved.40.Which products are people most likely to be more uncomfortable buying on the internet?a)Booksb)Furniturec)Moviesd)All of the aboveUNIT 241.Which type of e-commerce focuses on customers dealing with each other?a) B2Bb)B2Cc)C2Bd)C2C.42.Which segment do and belongs?a) B2Bb)B2C.c) C2Bd) C2C43.Web site that displays electronic catalogs from several suppliers, and charges commission from them for the sales revenue generated at that sitea)Emalls.b)Eshopsc)Etailersd)Ebooks44.Public Sector Marketing is also calleda)B2Cb)B2Bc)B2G.d)B2E45.An intrabusiness network which allows companies to provide products and/ or services to their employeesa)B2Cb)B2Bc)B2Gd)B2E.46.A businesstransaction between businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a retailer.a)B2Cb)B2B.c)B2Gd)B2E47.This model of e-commerce consists of the sale of products or services from a business to the general publica)B2C.b)B2Bc)B2Gd)B2E48.Which of the following is not suitable for a B2C transaction ?a)Clothesb)Flowerc)Airline Reservationd)None of the Above49. …………………is basically a concept of online marketing and distributing of products and services over the interneta) B2G b) B2Ec) B2C d) B2B50.Which of the following is not suitable for a B2C transaction ?a) clothes b) flowers c) airline reservation d) none51. ………………….e-commerce involves the electronic facilitation of transaction between customers through some third party.a) C2C b) B2E c) B2B d) B2G52. Which among the following is an example of C2C ?a) e-Bay b) c) d) all of panies use………………………networks to automate employee related corporate processes.a) B2G b) B2E c) B2B d) P2P54.………refers to a kind of e-commerce which refers to a company selling or buying from other company a) B2G b) B2E c) B2B d) P2P55.Peer to Peer [P2P] is also used to describe ………………………a) C2C b) B2E c) B2B d) B2C56.For carrying out B2C e-Commerce the following infrastructure is essential (i) World Wide Web(ii) Corporate network(iii) Electronic Data Interchange standards(iv) Secure Payment Services(v) Secure electronic communication link connecting businesses a) i, iv ( b) i, iii, iv c) ii, iii d) i, ii, iii, iv57. Business to Business (B2B) e-commerce takes place between sellers and buyers that are a) both individual customers b) business and customers respectivelyc) both business entitiesd) customers and business respectively58. When the exchange of goods and service takes place between a business entity and customers, over the internet, then it is known as a) Business to Customers model b) Business to Business modelc) Customers to Business modeld) Customer to Customer model59. ___________ companies are a new type of e-commerce model whereby customers can trade with each other on an online platform.a) Business to Employee b) Customer to Customerc) Business to Customer d) Business to Business60. _____________ e-commerce model provides a platform for businesses to bid on government projects or contracts.a) Supply Chain Managementb) Business to Governmentc) Government to Businessd) Solicitation61. The intention of developing a _____________ portal is to increase not only efficiency, but also employee satisfaction and a sense of community within the organization.a) Business to Employerb) Business to Customerc) Business to Employee d) Business to Organization62. Which of the following is NOT part of the four main types of e-commerce? a) B2Bb) B2Cc) B2Gd) B2O63. An e-commerce ________ is a summary of how a business entity plans to achieve its goals and advance its position in the market using the internet.a) strategyb) planc) platformd) website64. The long term success of an online business depends ona) Product differentiationb) Cost effectivenessc) Supply Chain Managemend) All of the above65.Which of the following is not the major type of e-commerce?a)C2Bb)B2Cc)B2Bd)C2C66.Which of the following is basically a concept that consists of the sale of products or services from a business to the general public?a)B2Gb)B2Ec)B2Bd)B2C67.Which of the following is not suitable for a B2C transaction?a)Clothesb)Flowersc)Airline Reservationd)None of the above68.Which of the following e-commerce transaction has the advantage of eliminating middlemen?a)B2Gb)B2Bc)B2Ed)B2C69.Which e-commerce transaction involves the electronic facilitation of transaction between customers through some third party.a)C2Cb)B2Ec)B2Bd)B2G70.Which of the following sites act as an intermediary between someone wanting a product or service and potential providers?a)Brokering Sitesb)Information Sitesc)Industry Portalsd)None of these71.Which of the following is not an example for B2B e-commerce?a)Sending and receiving ordersb)Invoice and shoppingc)All of thesed)None of the above72.Which of the following facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties?a)Metamediaryb)Intermediaryc)Middlemend)All of these73.Which among the following is an example of C2C ?a) e-Bay b) c) d) all of these74. Which one of the following is not one of the major types of e-commerce?a)C2Bb)B2Cc)B2Bd)C2C75.Which segment do eBay, belong?a)B2Bsb)B2Csc)C2Bsd)C2Cs76. Which type of ecommerce focuses on consumer dealing with each other.a)B2Bb)B2Cc)C2Bd)C2C77. The best products to sell in B2C e-commerce are:a)Small Productsb)Digital Productsc)Specialty Productsd)Fresh Products78. All of the following are major B2C business model except __________.a)Content providerb)Industry consortiumc)Transaction brokerd)Service provider79. Which of the following is not suitable for a B2C transaction ?a) clothes b) flowers c) airline reservation d) none80.………………….e-commerce involves customers gathering information, purchasing and receiving products over an electronic networka) B2G b) B2E c) B2B d) B2CUnit 381. An informational websitethat provides information to the public about the company rather than transacting business or providing other servicesa) Portalb) Blogc) Ereaderd)Corporate Website.82. A web site that provides a gateway, or linkl, to other resources on the Interneta) Blogb)Portal.c) Ereaderd) None of the above83. Web portals which focus only on one specific industry or domain.a)Blogb)Corporate Portalc)Vertical Portal.d)Vlog84. The first search engine in the world isa)Yahoob)Googlec)Archie.d)Mozart85. A magazine published in electronic form on a computer network.a)Tabletb)E-zines.c)E-magd)E-Scroll.86. A TV commercial internet ads that runs in the browser windowa)Contextual Ads b)Unicast Ads.c)Takeover Ads d)Rich Media Ads87.This the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets a)Online marketingb)Remote Commercec)Wireless Marketingd)M-commerce.88. Web pages starts with which ofthe following tag?a)<Body>b)<Head>c)<HTML>.d)<Title>89. ……………….is the most common way for purchasing an online advertisinga) CPM b) CPC c) Any of these d) none of these90. ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.a) Mobile Commerce b) e-commerce c) both of these d) none of these91.…………………is an application layer protocol for distributed, collaborative, hypermedia information systems.a) html b) HTTP c) Bothe of these d) None of these92. A……………portal is a specialized entry point to a specific market place or industry niche.a) Vertical portal b) horizontal portal c) both of these d) none of these93.………………..are general interest portals covering a wide range of topics and featuresa) Vertical portal b) horizontal portal c) both of these d) none of these94. A portal that helps to establish relations and to conduct transactions between various organizations is termed as………………a) B2B portals b) C2C portals c) both of these d) none of these95. A …………………….is a software that scours the internet collecting data about every website and every webpage within ita) spiders b) Search Engines c) robots d) none of these96.Which among the following is not an example for Search engine ?a) Google b) MSN c) Alta vista d) none of these97. HTML stands fora) Hypertext Multi Languageb) Hidden Text Mark-up Languagec) Hypertext Mark-up Languaged) Hypertext Multi Load98. Which one of this is not a search engine?a) Googleb) Netscapec) Duck-Duck-God) Bing99. When designing a website for E – Commerce, the main purpose should bea) Promote salesb) Customer Servicec) Customer Communicationd) Idea generation100. In HTML the <BR> tag is used for makinga) Paragraphb) Italicsc) Bard) Line break101. Internet advertising is cost effective because it is/can bea) relatively inexpensiveb) personalized for a particular audiencec) tracked and measuredd) All of the above102. The form of internet marketing wherein the advertisers pay the search engine or the publisher of the ads whenever their ads are clicked isa) Cost per Clickb) Cost per Millec) Cost per Leadd) Cost per Action103. Internet advertising suffers from weaknesses likea) low response rate b) intrusivenessc) Both of the aboved) Neither of the above104. Mobile commerce can categorized intoa) Mobile shoppingb) Mobile bankingc) Mobile paymentsd) All of the above105.Which of the following is the most common way for purchasing an online advertising?a)CPMb)CPCc)Any of thesed)None of these106.Which of the following is a software that scours the internet collecting data about every website and every webpage within it?a)Spidersb)Search Enginesc)Robotsd)None of these107. Search Engines databases are selected and built by computer robot programs called:a)Spidersb)Search Enginesc)Robotsd)None of these108. A portal that helps to establish relations and to conduct transactions between various organizations is termed as:a)B2B Portalb)C2C Portalc)Both of thesed)None of these109. Which among the following is not an example for Search engine?a)Googleb)Alta Vistac)Bingd)Internet Explorer110. Web pages are prepared using their language as:a)HTMLb)HTTPc)FTPd)All of the above111. The user reaches this page when they specify the address of a website:a)Summery Pageb)Web Pagec)Home Paged)Page List112.Which of the following is a correct syntax of HTML?a)<!doctype HTML>b)<doctype! HTML>c)<HTML !doctype>d)<HTML doctype!>113. Software which allows user to view the webpage is called as __________.a)Interpreterb)Internet browserc)Websited)Operating system114. Which of the following website is used to search other website by typing a keyword ?a)Social Networksb)Search Enginec)Routersd)None of these115. Which of the following is valid Website Address ?a)ww#.b)c)helenlowry@.comd)helenlowry116. Whenever user opens any website then main page is called as ____.a)Backend pageb)Home pagec)Dead paged)None of these117. _________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business a) Dynamic website b) Static Website c) phish site d) none of these118 …………………is an application layer protocol for distributed, collaborative, hypermedia information systems. a) html b) HTTP c) Bothe of these d) None of these119. HTML stands for?a)Hyper Text Markup Languageb)High Text Markup Languagec)Hyper Tabular Markup Languaged)None of these120. HTML is a subset ofa) SGMTb) SGMLc) SGMDd) None of theseUnit 4121. A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellersa)Online brokerb)E-payment.c)Traditional Marketd)Commerce122. E-cash was created bya) David Chaum.b) Mark Zuckerbergc) Jack Maad) Benjamin Young123.A plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments etca)Debit cardb)Smart Card.c)E-chequed)E-Wallet124. The first universal credit card, which could be used at a variety of establishments, was introduced bya)VISAb)American Expressc)Diners’ Club.d)SBI125. Example of Digital wallet a)Paytmb)Mobikwikc)Ali Payd)All of the above.126. A type of fraud that involves diverting the client Internet connection to a counterfeit website.a)Phishingb)Pharming.c)Ddosd)Virus127._________identifies a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computera)Physiological biometric authenticationb)Advance biometric authenticationc)Behavioral biometric authentication.d)None of the above128.The grace period of a credit card normally runs from a)The end of a billing cycle to the next starting dateb)The end of a previous due till next starting date.c)The starting of a billing cycle to the next payment due dated)The end of a billing cycle to the next payment due date.129.…………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.a) E-cash b) Digicash c) Cyber cash d) any of these130 .………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.a) Credit card b) E-Cheques c) E-cash d) none of these131. A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.a) smart Cards b) E-Cheques c) E-cash d) none of these132. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants accounta) Debit Card b) Electronic purse c) credit card d) any of these133.………………type of payment system is highly useful to those customers who would like to control overspending,a)Postpaidb)Prepaid c)both of these d) none of these134..……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.a) Debit Card b) credit cardc) Electronic purse d) any of these135. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuera) customer b) issuer c) Merchant d) Acquirer136. In Biometrics, …………………………ID system is designed to prevent more than one person from using a single identitya) Positive ID system b) Negative ID system c) both of these d) none of these137. In Online Payment System one can transfer money througha) Postb) Bankc) Internetd) Money transfer company138. One advantage of online payment system isa) Overseas purchaseb) Privacyc) Securityd) Service fee139. Which one of them is not an online payment method?a) Mobile Paymentb) Demand Draftc) Internet Paymentd) Credit Card140. When goods are purchased without debiting money from your account what type of purchase method are you using?a) Debit card Purchaseb) Cheque purchasec) Credit card Purchased) Bank transfer purchase141. When money is debited from your account when purchasing goods, you are usinga) Debit Card Purchaseb) Credit card Purchasec) Cash Purchased) Credit Promissory note purchase142. Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is calleda) Interceptionb) Hackingc) Snoopingd) Man-In-The-Middle143. Encryption meansa) Block contentsb) Filter contentsc) Password protectiond) Censorship144. Finger print recognition is a type ofa) Behavioural Biometricb) Physiological Biometricc) Encrypted Protectiond) Program Protected145.Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation?a)Debit Cardb)Credit Cardc)Electronic Wallet / Electronic Pursed)Any of these146.Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine?a)SSlb)SETc)Both of thesed)None of these147.Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic?a)Biometricsb)PINc)Passwordd)All of the above148.Which among the following is not an example for computer virus?a)I Love Youb)Jerusalemc)Melissad)Network Firewall149.Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure?a)Black Hat Hacker b)Spooferc)Operatord)White Hat Hacker150.SET means:a)Standard Electronic Transferb)Standard Electronic Technologyc)Secure Electronic Transferd)Secure Electronic Transaction151.The verification of credit card is done by using:a)Credit Card Payment b)Point of Salec)All of the aboved)None of these152.The reverse process of encryption, to make the information readable once again is:a)Sniffingb)Decryptionc)Cryptographyd)Translation153.153. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuera) customer b) issuer c) Merchant d) Acquirer 154). An Electronic Check is one form of what?a)Ecommerceb)Online Bankingc)E-cashd)Check155. A combination of software and information designed to provide security and information for payment is called?a)Digital walletb)Pop up adsc)Shoppng cartd)Encryption156. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communicationsa) Digital signature b) Digital certificates c) SSL d) none of these157. ……………………….is a person who breaks in or trespasses a computer systema) Hacker b) Snooper c) operator d) spoofer158. E-mail which contain useless material is termed as……………a) Spam b) useless mail c) trunk mail d) Junk mail 159. What is Biometrics ?a) It is a branch of biologyb) It recognizes individuals based on their inherent physical or behavioral characteristics. c) a) & b). d) None of these 160. SET means ………………a) Standard Electronic Technology b) Standard Electronic Transferc) Secure Electronic Transaction d) None of theseUNIT 5161. Patents protectsa)Expression of an ideab)Inventions.c)Books and Articlesd)Company Logo162. The minimum punishment for an infringement of copyright in India is a)3 months imprisonment and minimum of Rs 50,000 fineb) 3 months imprisonment and minimum of Rs 60,000 finec) 6 months imprisonment and minimum of Rs 50,000 fine.d) 6 months imprisonment and minimum of Rs 30,000 fine163. A________ is a right, granted by the government, to exclude others from making, using, or selling your inventiona)Copyrightb)Patents.c)Trademarkd)Trade Secret164. TheTerm of every patent in India is a)50 yearsb)40 yearsc)30 yearsd)20 years.165. The Trademarks Act 1999 protects well-known trademarks from:a)an action against the registration of similar marks.b)an action against the misuse of someones identityc)an action against copying someones lyricsd)All of the above166. The penalties for infringement of Trademarked content in India a)Minimum 3 months imprisonment and fine of INR 20,0000b)Minimum 4 months imprisonment and fine of INR 30,0000c)Minimum 5 months imprisonment and fine of INR 40,0000d)Minimum 6 months imprisonment and fine of INR 50,0000.167. When did IT Act 2000 came into effecta)October 17, 2000.b)October 17, 2001c)November 11, 2000d)November 11, 2001168. How many schedules are there in IT Act 2000a)3b)4.c)5d)6169. Trade mark, copyright, patent law etc comes under the purview of……………………a) Data protection b) Telecommunication lawsc) Intellectual property laws d) None170. Which of the following is an example of Intellectual property ?a) Patentb) Trade Marksc) Copyrightd) All of above171. Copyright protection is available for a) Literary work b) Musical work c) Artistic work d) All the above172. Plan of a building can be protected by a) Copyrightb) Patent c) Trade secret d) Industrial Design173.Copyright protects a) Idea b) Expression c) Both a) and b) d) None of the above174.Patent of addition can be filed by a) Inventor b) Patentee c) Both a) and b) d) None of the above175.What is the updated version of the IT Act, 2000?a) IT Act, 2007b) Advanced IT Act, 2007c) IT Act, 2008 d) Advanced IT Act, 2008176. _______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind.a)Censorshipb)Patentc) Trademarkd) Copyright177. An unauthorised entry into other people’s electronic device is calleda) Spammingb) Hackingc) Copyrightingd) Breaching178. Gaining control of client computer through network is calleda) Snoopingb) Sniffingc) Buffingd) Dialling179. A copyright owner can give authority to anyone toa) Duplicate intellectual propertyb) Process intellectual propertyc) Copy intellectual propertyd) Sell intellectual property180. Patent right gives the sole authority to produce fora) Consumersb) Investorsc) Industryd) Inventors181. Trademark uniquely differentiate products from othera) Inventorsb) Productsc) Investorsd) Pioneers182. Which one of this is not used for trademarking productsa) Logob) Wordsc) Featured) Symbol183. When some words, pictures or videos is banned from public notice it is calleda) Spammingb) Censorshipc) Authenticationd) Hiding184. When unwanted or unexpected email or messages is sent to an electronic device it is known asa) Bulk messageb) Phishingc) Advertisingd) Spamming185.The information Technology Act [IT ACT] came into effect on:a)16th November 2000b)15th December 2000c)17th October 2000d)14th November 2000186. A person who breaks in or trespasses a computer system:a)Hackerb)Snooperc)Operatord)Spoofer187.E-mail which contain useless material is termed as:a)Spam Mailb)Trunk Mailc)Junk Maild)Inbox Mail188.Which of the following crimes were not covered under IT (Amendment) Act, 2008?a)Cyber Terrorismb)Child Pornographyc)Video voyeurismd)None of these189.Trade mark, copyright, patent law, etc. comes under the purview of:a)Data Protectionb)Telecommunication Lawsc)Intellectual Property Lawsd)All of the above190.Which one of the following is not a principle of e-commerce?a)Privacyb)Integrityc)Authenticationd)None of these191.Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?a)Hackerb)Softwarec)Computer Virusd)Computer Anti-virus192.An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:a)Digital Signatureb)Digital Certificatesc)SSLd)None of these193. India has enacted the first IT Act in the year……a) 2001 b) 2002 c) 2009 d) 2000 194. Trade mark, copyright, patent law etc comes under the purview of………a) Data protection b) Telecommunication lawsc) Intellectual property laws d) None 195. All of the following are examples of real security and privacy risks EXCEPT:a)hackers.b)spam.c)viruses.d)identity theft196. Digital Cash has following characteristica)Anonymity b)Security c)Confidentiality d)All of Above197. Who breaks into other people’s computer system and steals and destroys information:a)Hackers b)Softwarec)Hacktivists d)Script Kiddies198. Which process is used to re install data from a copy when the original data has been lost a)Backupb)Recoveryc)Bench marking d)Data cleansing199. Which service encompasses all technologies used to transmit and process information on an across a network? a)Interoperabilityb)Scalabilityc)Benchmarking d)Web services200. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed? a)hacking b)cracking c)dumpster diving d)spoofingFill in the blanksUnit - 1The two most common documents exchanged using EDI are purchase orders and____________.EDI stands for ___________________________The first recorded online shopping gadget (teletext) was invented by ____________ in 1979The first recorded ecommerce online shopping website crested in 1991 was called________________.………………..is concerned with the buying and selling information, products and services over computer communication networks. ………………. is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products. Electronic Exchange of business documents in a standard format is known as ……………… .………………..is a set of standards developed in the 1960s to exchange business information and to do electronic transactions.?E-commerce includes ___________ trading of goods and services.EDI stands for Electronic Data _______________.______?is the process of removing the middleman or intermediary from future transactions.Using e-commerce, buyers and sellers can communicate without having a __________ interaction.__________________ is the father of HTML / Web Page.SCM stands for ______________________________________EDI stands for _______________________________________Peer to Peer [P2P] is also used to describe _________________17. ________.is an early form of E-commerce.18. _________is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means.19. ________is the management of the flow of goods and services in order to deliver value to the end customer effectively along with optimizing the process of delivering it.20. __________ involves face to face and in person dealing with all the parties to perform the exchange of goods and services with predefined prices.Unit - 2Intra-business e-commerce is sometimes called __________ e-commerce. is an _______________________ ecommerceA business model that refers to businesses selling products, services or information to governments or government agencies is called ____________________ is an example of ________________ ecommerceBusiness to _________e-commerce consists of the sale of products or services from a business to the general public. Business to ________ is the sale and?marketing of goods?and services to federal, state, or local agencies. To commerce between two businesses rather than to commerce between a business and an individual consumer is called ___________ E commerce. ________ is a?business model,?whereby customers can trade with each other, typically, in an online environment. B2B e-commerce facilitates _________________ interaction and transaction.__________ to buyer e-commerce focuses on consumers dealing with each other.Search Engine _______________ can help e-commerce sites to promote themselves.SCM is designed to improve organizational processes by __________the flow of information, goods and services between buyers and suppliers in the value chain. is an example of ________________ website.34._______________is a class of advertising methods which are considered unethical and may even be illegal.35._______________are animated full screen ads placed at the entry of a site before a user reaches the intended content.36._______________are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content.37.________________is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.38. _________is basically a concept of online marketing and distributing of products and services over the internet.39. _________commerce consists of the sale of products or services from a business to the general public.40. ____________is a business model that refers to businesses selling products, services or information to governments or government agencies.Unit - is a portal that focus on a wide array of interests and topics and is one type of Web portal called _________ portal__________________is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers.An HTML tag for scrolling a text in a webpage is called _________________________A website that provides information to the public about the company rather than transacting business is called __________________ …………………..commerce is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants. _________is a set of tools for delivering promotional messages to people, worldwide, using the Internet as a global marketing platformInternet________?is a?software system?that is designed to carry out?web search?(Internet search), which means to search the?World Wide Web?in a systematic way for particular information specified in a textual?web search query. A?______?is a collection of?web pages?and related content that is identified by a common?domain name?and published on at least one?web server.Website are viewed in computer, smartphones and tablet through web _____Search engine search the network by using a method called _____The use of wireless handheld devices to conduct online transactions is called __________Pop-up _____________ are used to avoid intrusive internet ads.________________is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.________________website is one that changes or customizes itself frequently and automatically based on certain criteria.________________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business.__________________ in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer.57. A _______is a specially designed website that brings information from diverse sources, like emails, online forums and search engines,58. _______is the buying and selling of goods and services through wireless handheld devices.59. A ________is an online tool that searches for results in its database based on the search query (keyword) submitted by the internet user.60. __________allows the user to create and structure sections, paragraphs, headings, links, and blockquotes for web pages and applicationsUnit - 4First bank to introduce ATM in India was ______________ in 1987The first public bank to introduce Credit card in India is ____________.An e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content is ____________________A stored-value card which doesnt link to bank account and can be used for low-value payment system such as parking,public transport system etc is called ________________13. ______was created by Dr. David Chaum and implemented via his company, DigiCash, in 1990. A?________ is a payment?card?that deducts money directly from a consumer's checking account to pay for a purchase. A ________is an instrument to help you make instant credit based transactions. _______is the measurement and statistical analysis of people's unique physical and behavioral characteristics.Iris Recognition scan parts of the _____ eye that circles the pupil.Smart Card contains a ____ that can store small amount of data._____ Cash can be used for purchasing goods online with anonymity.Encrypted device/data cannot be accessed without _______________________ is a financial institution that establishes an account with a merchant and processes payment card authorization and payments.In _________________type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.___________________type of payment system is highly useful to those customers who would like to control overspending,____________________ is a financial instrument which can be used more than once to borrow money or buy products and services on credit.77. _________.card draw money directly from your checking account when you make the purchase.78. A ______recognizes individuals based on their inherent physical or behavioral characteristics.79. A _______card is a card that allows you to borrow money against a line of credit.80. Face recognition is one type of ______Unit -5The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable is called _____________________The use of messaging systems or email to send an unsolicited message , especially advertising, as well as sending messages repeatedly on the same website is called _________________The process or action of proving or showing something to be true, genuine, or valid is ___________The Information Technology Act, 2000 which consist of ________ Sections in 13 Chapters and with 4 Schedules. The information Technology Act [IT ACT] came into effect on ___________?18. India has enacted the first IT Act in the year…………………… ?19.?Information Technology (Amendment) Act, 2008 has come into force in ______.20. In _______ the Indian IT Act, 2000 got updated? 1. The process or action of verifying the identity of a user or process is called _____2. The Indian IT Act was passed in the year _____3. The IT Act Bill was passed and signed into law by the then President ______4. If hacking is carried on by any person he can be penalised by 3 years imprisonment and a fine of up to ____Information sent over the Internet commonly uses the set of rules called __________India has enacted the first IT Act in the year _______________A __________________ provides a way to associate the message with the sender and is the equivalent of an ordinary signature.________________acts like a gate keeper that examines each user identification before allowing them to enter to the organization’s internal networks.97. IT Act of India was framed in the year_________98. ? is a _______symbol.99. _________ is a protection that covers published and unpublished literary,scientific and artistic work.100. ______provides legal recognition of transaction carried out by means of ecommerce.KEY ANSWERChoose the correct answer:Unit 1(c) EDId) (a) and (b)(c) 1980sd) Commerce which is based on transactions using computers connected by telecommunication network.d)much larger.(c) Bertrand market. (b) Books.(c) integrating supply and demand management .9.(b)Commerce 10.(a) E-business 11. (c) E- 12.(b) E-bay and Amazon 13.d) Commerce which is based on transactions using computers connected by telecommunication network 14.(a) Books 15. (c) Distributors 16.(a) E-commerce17. d) All of the above18. (a) e-commerce; traditional commerce19. (c) E-business20. (a) Michael Aldrich21. d) Electronic Data Interchange For Administration, Commerce and Transport22. d) All of the above23. (b) Responsible Consumption24. (c) make inventory readily available(a) 1994(a) Doing business electronically(c) All of these(c) EDId) SCM(c) Distributors(b) High Labour Cost(c) Cheerful Lifestyle(a)Doing business electronically(c) EDI (a)Commerce (a) EDI (c)integrating supply and demand managementd)supply chain event management(b)Essential for B2B ecommerce(b)FurnitureUnit 2d) C2C.(b)B2C.(a) Emalls.(c) B2G.d) B2E.(b) B2B.(a) B2C.d) None of the Above49.(c) B2C 50.d) none51.(a) C2C 52.d) all of these53.(b) B2E 54.(c) B2B 55.(a) C2C 56.(a) i, iv 57. (c) both business entities58. (a) Business to Customers model59. (b) Customer to Customer60. (b) Business to Government61. (c) Business to Employee62. d) B2O63. (a) strategy64. d) All of the above65.(a) C2B66.d) B2C67.d) None of the above68.(c) B2E69.(a) C2C70.(a) Brokering Sites71.d) None of the above72.(a) Metamediary73.(a) e-Bay 74.(c)B2B75.(a)B2Bs76.(a)B2B77.(c)Specialty Products78.d)Service provider79.(b) flowers 80.(b) B2E Unit 3d)Corporate Website.(b)Portal.(c) Vertical Portal.(c) Archie.(b) E-zines.(b) Unicast Ads.d) M-commerce.(c) <HTML>.(c) Any of these (a) Mobile Commerce (a) html (a) Vertical portal (b) horizontal portal (a) B2B portals (b) Search Engines d) none of these(c) Hypertext Mark-up Language(b) Netscape(a) Promote sales100. d) Line break101. d) All of the above102. (a) Cost per Click103. (c) Both of the above104. d) All of the above(c) All of these(b) Search Engines(a) Spiders(a) B2B Portald) Internet Explorer(a) HTML(c) Home Page(a) <!doctype HTML>113. (b)Internet browser114. (b)Search Engine115. (b)116. (b)Home page117. (c) phish site 118 (a) html 119. (a)Hyper Text Markup Language120. (a) SGMTUnit 4(b) E-payment.(a) David Chaum.(b) Smart Card.(c) Diners’ Club.d) All of the above.(b) Pharming.(c) Behavioral biometric authentication.d) The end of a billing cycle to the next payment due date.d) any of these(a) Credit card (a) smart Cards (a) Debit Card (b)Prepaid (c) Electronic purse (a) customer (a) Positive ID systemc) Interneta) Overseas purchaseb) Demand Draftc) Credit card Purchasea) Debit Card Purchase(d) Man-In-The-Middlec) Password protectionb) Physiological Biometricc) Electronic Wallet / Electronic Purseb) SETa) Biometrics(d) Network Firewalla) Black Hat Hacker(d) Secure Electronic Transactionc) All of the aboveb) Decryption153.a) customer 154b) Online Banking155a) Digital wallet156. b) Digital certificates 157. a) Hacker 158. a) Spam 159. b) It recognizes individuals based on their inherent physical or behavioral characteristics. 160. b) Standard Electronic TransferUnit 5(b) Inventions.(c) 6 months imprisonment and minimum of Rs 50,000 fine.(b) Patents.d) 20 years.(a) an action against the registration of similar marks.d) Minimum 6 months imprisonment and fine of INR 50,0000.(a) October 17, 2000.(b) 4.c) Intellectual property laws d) All of aboved) All the abovea) Copyrightb) Expression c) Both a) and b)c) IT Act, 2008 c) Trademarkb) Hackinga) Snoopingc) Copy intellectual propertyd) Inventorsb) Productsc) Featureb) Censorshipd) Spammingc) 17th October 2000a) Hackerc) Junk Maild) None of thesec) Intellectual Property Lawsd) None of thesec) Computer Virusb) Digital Certificatesd) 2000 c) Intellectual property laws b)spam.d)All of Abovea)Hackers b)Recoveryd)Web servicesd)spoofingFill in the blanksUnit - 1invoicesElectronic Data InterchangerelativeMichael E-CommerceSupply chain management. Electronic Data interchange EDIelectronic InterchangeDisintermediationface to faceTim Berners-LeeSupply Chain ManagementElectronic Data InterchangeC2C / Customer to CustomerEDIEcommerceSupply Chain ManagementTraditional commerceUnit - 2B2EB2CB2GC2CCustomer Government?Business-to-business Customer to customerinter-organizational BuyerOptimizationOptimizingC2C / Customer to CustomerPop-up AdsIntromercialsUltramercialsB2CB2CB2GB2BUnit - 3Horizontal PortalOnline Advertising<marquee>Corporate WebsiteMobile Internet advertisingsearch engine WebsiteBrowserIndexingmobile commerceblockersM-CommerceDynamicPhishingCustomerPortalMobile commerceSearch EngineHTMLUnit - 4HSBCCentral Bank of IndiaMicro paymentElectronic PurseeCash debit card? Credit card? BiometricsColoured ChipElectronicAuthorizationAcquirerPrepaidPrepaidCredit CardDebitBiometricsCreditBiometricsUnit - 5CensorshipSpammingAuthentication94 17th October 2000 2000October 2009 2008Authentication2000K.R. NarayananRs. 5,00,000TCP/IP2000Digital SignatureNetwork Firewall2000CopyrightCopyright100. IT ACT 2000................................................ ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download