B. COM. - SEMESTER-II - E-COMMERCE-MCQs on other topics of Computer System and Applications

B. COM. - SEMESTER-II - E-COMMERCE-MCQs on other topics of Computer System and Applications



1. Affiliate revenue is also called as _______.

(a) Commission 

(b) Brokerage 

(c) Referral Fee 

(d) Discount


2. Standards of EDI are decided by ______

(a) ASCII 

(b) ANSI 

(c) USA 

(d) Government


3. ______ means converting readable text to unreadable text.

(a) Conversion 

(b) Decryption 

(c) Encryption 

(d) Decoding


4. ______ means converting unreadable text to readable text.

(a) Conversion 

(b) Decryption 

(c) Encryption 

(d) Decoding


5. _____ changes URL from http to https.

(a) SSL 

(b) SET 

(c) E-COMMERCE 

(d) M-COMMERCE


6. In ____ server-side authentication is compulsory.

(a) SSL 

(b) SET 

(c) E-COMMERCE 

(d) M-COMMERCE


7. An online retail store is called as _____.

(a) Trader 

(b) Retailer 

(c) E-tailer 

(d) Amazon


8. In _______, one consumer deals with another consumer.

(a) C2C 

(b) B2C 

(c) B2B 

(d) P2P


9. Full form of SET is _________

(a) Safe Electronic Transaction 

(b) Secured Electronic Transaction

(c) Safe Electrical Transaction 

(d) Secured E-commerce Transaction


10. amazon.com is an example of ______

(a) B2B 

(b) B2C 

(c) C2C 

(d) P2P


11. In SSL encryption is done using ____ key.

(a) Public 

(b) Private 

(c) Session 

(d) Symmetric


12. ____ is an online retail store.

(a) Portal 

(b) Service Provider 

(c) E-Tailer 

(d) Content Provider


13. Identify the identity of a person or entity with whom you are dealing on Internet is known as ______.

(a) Integrity 

(b) Authenticity 

(c) Authorisation 

(d) None of These


14. ____ means that the information being displayed on a Web site/transmitted/received over the Internet has not been changed in any way by an un-authorised party.

(a) Integrity 

(b) Authenticity 

(c) Authorisation 

(d) None of These


15. In public key encryption ______ keys are used.

(a) Public and Private 

(b) Only Public 

(c) Only Private 

(d) Session 


16. SET is developed by association led by _________.

(a) Master Card and Visa 

(b) Master Card 

(c) Visa 

(d) Rupay


17. The technology behind M-commerce is based on ______.

(a) HTTP 

(b) HTTPS 

(c) WAP 

(d) POP


18 PayPal is an example of _____

(a) Digital Cash

(b) Online Stored Value 

(c) Credit Card 

(d) Digital Cheque


19. ________ is virtual representation of physical market.

(a) EDI 

(b) Electronic Market 

(c) E-Commerce 

(d) Internet Commerce


20. _____ allows you paperless transaction.

(a) EDI 

(b) Electronic Market 

(c) E-Commerce 

(d) Internet Commerce


21. _____ means the information being displayed on a Web site or transmitted or received over the Internet has not been changed in any way by an unauthorized party.

(a) Integrity 

(b) Confidentiality 

(c) Authenticity 

(d) Privacy


22. The protocol used for M-Commerce is ____

(a) Internet Protocol 

(b) Mobile Internet Protocol

(c) Wireless Application Protocol 

(d) File Transfer Protocol


23. In ________ encryption is performed with session key.

(a) Public Key 

(b) Private Key 

(c) SSL 

(d) SET


24. Full form of SSL is _______

(a) Secure Systematic Language 

(b) Secure Sockets Layer

(c) Simple Secure Layer 

(d) Shopping Secure Line


25. olx.com is an example of ________

(a) B2B 

(b) B2C 

(c) C2C 

(d) P2P


26. ______ are sites that creates a digital online environment where people with similar interest can transact.

(a) Community Provider 

(b) Market Creator 

(c) Portal 

(d) Service Provider


27. Flipkart.com is an example of _______.

(a) B2B 

(b) B2C 

(c) C2C 

(d) P2P


28. Normally in M-commerce language used to create web pages is _______.

(a) HTML 

(b) WML 

(c) VB 

(d) XML


29. _____ is an art of attempting to acquire information by masked as trustworthy entity.

(a) Hacking 

(b) Phishing 

(c) Sniffing 

(d) Spoofing


30. SSL can be used only with _____.

(a) FTP 

(b) HTTP 

(c) POP 

(d) SMTP


31. _____ means converting cipher text to plain text.

(a) Encryption 

(b) Decryption 

(c) Conversion 

(d) De-conversion


32. ______ means converting plain text to cipher text.

(a) Encryption 

(b) Decryption

(c) Conversion

(d) De-conversion


33. In Public Key Encryption ______ key is used for Encryption.

(a) Receiver’s Public 

(b) Receiver’s Private 

(c) Sender’s Public 

(d) Sender’s Private


34. In Public Key Encryption ______ key is used for Decryption.

(a) Receiver’s Public 

(b) Receiver’s Private 

(c) Sender’s Public 

(d) Sender’s Private


35. _____ can read the cipher text.

(a) Sender 

(b) Receiver 

(c) Any One 

(d) No one


36. When message & data are available only to those who are authorized to view them is known as ______ .

(a) Integrity 

(b) Confidentiality 

(c) Authenticity 

(d) Privacy


37. Digital Accumulating Balance Payment System is generally used for ______ payments.

(a) Micro 

(b) Macro 

(c) Credit Card 

(d) Debit Card


38. Scope of E-Commerce is ______.

(a) Local 

(b) Global 

(c) within own country 

(d) within own state


39. ______ means found everywhere.

(a) Universal 

(b) Ubiquity 

(c) Global 

(d) Local


40. E-Commerce Lacks _______ touch.

(a) Social 

(b) Smooth 

(c) Personal 

(d) Communication


41. In SSL _______ key is used for encryption.

(a) Public 

(b) Private 

(c) Session 

(d) OTP


42. To handle credit card transaction on internet _____ is developed by Visa and Master card.

(a) SSL 

(b) SET 

(c) SAT 

(d) Encryption


43. The sender and receiver will have the same key in _____ Key Encryption.

(a) Symmetric 

(b) Asymmetric 

(c) Public 

(d) Private


44. In SSL URL will change from HTTP to _______.

(a) Cipher Text 

(b) HTTPS 

(c) SHTTP 

(d) SMTP


45. __________ is a best example of Online Stored Value System.

(a) Google 

(b) Yahoo 

(c) PayPal 

(d) Go Daddy


46. BitTorrent.Com is an example of _____

(a) B2B 

(b) B2C 

(c) C2C 

(d) P2P


47. E-Tailer revenue model is ______ revenue.

(a) Sales 

(b) Subscription 

(c) Advertising 

(d) Affiliate


48. The percentage of people who visit web site and buy something is known as _____

(a) Hits 

(b) Conversion Rate 

(c) Affiliate 

(d) Walk-in-Customer


49. In _______ user can share files and computer resources directly.

(a) B2B 

(b) B2C 

(c) C2C 

(d) P2P


50. E-tailer can be Pure Plays or _______ .

(a) Impure Plays 

(b) Indirect Plays 

(c) Bricks & Clicks 

(d) Direct Plays


Answers: 

Answers: 1-Referral Fee, 2-ANSI, 3-Encryption, 4-Decryption, 5-SSL, 6-SSL, 7-E-tailer, 8-C2C, 9-Secured Electronic Transaction, 10-B2C, 11-Session, 12-E-Tailer, 13-Authenticity, 14-Integrity, 15-Public and Private, 16-Master Card and Visa, 17-WAP, 18-Online Stored Value, 19-Electronic Market, 20-EDI 21-Integrity, 22-Wireless Application Protocol, 23-SSL, 24-Secure Sockets Layer, 25-C2C, 26-Community Provider, 27-B2C, 28-WML, 29-Phishing, 30-HTTP  31-Decryption, 32-Encryption, 33-Sender’s Public, 34-Receiver’s Private, 35-No one, 36-Confidentiality, 37-Micro, 38-Global, 39-Ubiquity, 40-Personal 41-Session, 42-SET, 43-Symmetric, 44-HTTPS, 45-PayPal, 46-P2P, 47-Sales, 48-Conversion Rate, 49-P2P, 50-Bricks & Clicks

टिप्पणियाँ

इस ब्लॉग से लोकप्रिय पोस्ट

PAPER-BUSINESS ORGANISATION QUESTION BANK

हिंदुस्तान जिंदाबाद था, जिंदाबाद है, और जिंदाबाद रहेगा।

What do you understand by business? Describe different types of business activities with examples.