E-COMMERCE B. COM. YEAR-1, SEMESTER-II- MCQs on Computer System and Applications
E-COMMERCE
B. COM. YEAR-1, SEMESTER-II-
MCQs on Computer System and Applications
1. Affiliate revenue is also called as _______.
(a) Commission
(b) Brokerage
(c) Referral Fee
(d) Discount
2. Standards of EDI are decided by ______
(a) ASCII
(b) ANSI
(c) USA
(d) Government
3. ______ means converting readable text to unreadable text.
(a) Conversion
(b) Decryption
(c) Encryption
(d) Decoding
4. ______ means converting unreadable text to readable text.
(a) Conversion
(b) Decryption
(c) Encryption
(d) Decoding
5. _____ changes URL from http to https.
(a) SSL
(b) SET
(c) E-COMMERCE
(d) M-COMMERCE
6. In ____ server-side authentication is compulsory.
(a) SSL
(b) SET
(c) E-COMMERCE
(d) M-COMMERCE
7. An online retail store is called as _____.
(a) Trader
(b) Retailer
(c) E-tailer
(d) Amazon
8. In _______, one consumer deals with another consumer.
(a) C2C
(b) B2C
(c) B2B
(d) P2P
9. Full form of SET is _________
(a) Safe Electronic Transaction
(b) Secured Electronic Transaction
(c) Safe Electrical Transaction
(d) Secured E-commerce Transaction
10. amazon.com is an example of ______
(a) B2B
(b) B2C
(c) C2C
(d) P2P
11. In SSL encryption is done using ____ key.
(a) Public
(b) Private
(c) Session
(d) Symmetric
12. ____ is an online retail store.
(a) Portal
(b) Service Provider
(c) E-Tailer
(d) Content Provider
13. Identify the identity of a person or entity with whom you are dealing on Internet is known as ______.
(a) Integrity
(b) Authenticity
(c) Authorisation
(d) None of These
14. ____ means that the information being displayed on a Web site/transmitted/received over the Internet has not been changed in any way by an un-authorised party.
(a) Integrity
(b) Authenticity
(c) Authorisation
(d) None of These
15. In public key encryption ______ keys are used.
(a) Public and Private
(b) Only Public
(c) Only Private
(d) Session
16. SET is developed by association led by _________.
(a) Master Card and Visa
(b) Master Card
(c) Visa
(d) Rupay
17. The technology behind M-commerce is based on ______.
(a) HTTP
(b) HTTPS
(c) WAP
(d) POP
18 PayPal is an example of _____
(a) Digital Cash
(b) Online Stored Value
(c) Credit Card
(d) Digital Cheque
19. ________ is virtual representation of physical market.
(a) EDI
(b) Electronic Market
(c) E-Commerce
(d) Internet Commerce
20. _____ allows you paperless transaction.
(a) EDI
(b) Electronic Market
(c) E-Commerce
(d) Internet Commerce
21. _____ means the information being displayed on a Web site or transmitted or received over the Internet has not been changed in any way by an unauthorized party.
(a) Integrity
(b) Confidentiality
(c) Authenticity
(d) Privacy
22. The protocol used for M-Commerce is ____
(a) Internet Protocol
(b) Mobile Internet Protocol
(c) Wireless Application Protocol
(d) File Transfer Protocol
23. In ________ encryption is performed with session key.
(a) Public Key
(b) Private Key
(c) SSL
(d) SET
24. Full form of SSL is _______
(a) Secure Systematic Language
(b) Secure Sockets Layer
(c) Simple Secure Layer
(d) Shopping Secure Line
25. olx.com is an example of ________
(a) B2B
(b) B2C
(c) C2C
(d) P2P
26. ______ are sites that creates a digital online environment where people with similar interest can transact.
(a) Community Provider
(b) Market Creator
(c) Portal
(d) Service Provider
27. Flipkart.com is an example of _______.
(a) B2B
(b) B2C
(c) C2C
(d) P2P
28. Normally in M-commerce language used to create web pages is _______.
(a) HTML
(b) WML
(c) VB
(d) XML
29. _____ is an art of attempting to acquire information by masked as trustworthy entity.
(a) Hacking
(b) Phishing
(c) Sniffing
(d) Spoofing
30. SSL can be used only with _____.
(a) FTP
(b) HTTP
(c) POP
(d) SMTP
31. _____ means converting cipher text to plain text.
(a) Encryption
(b) Decryption
(c) Conversion
(d) De-conversion
32. ______ means converting plain text to cipher text.
(a) Encryption
(b) Decryption
(c) Conversion
(d) De-conversion
33. In Public Key Encryption ______ key is used for Encryption.
(a) Receiver’s Public
(b) Receiver’s Private
(c) Sender’s Public
(d) Sender’s Private
34. In Public Key Encryption ______ key is used for Decryption.
(a) Receiver’s Public
(b) Receiver’s Private
(c) Sender’s Public
(d) Sender’s Private
35. _____ can read the cipher text.
(a) Sender
(b) Receiver
(c) Any One
(d) No one
36. When message & data are available only to those who are authorized to view them is known as ______ .
(a) Integrity
(b) Confidentiality
(c) Authenticity
(d) Privacy
37. Digital Accumulating Balance Payment System is generally used for ______ payments.
(a) Micro
(b) Macro
(c) Credit Card
(d) Debit Card
38. Scope of E-Commerce is ______.
(a) Local
(b) Global
(c) within own country
(d) within own state
39. ______ means found everywhere.
(a) Universal
(b) Ubiquity
(c) Global
(d) Local
40. E-Commerce Lacks _______ touch.
(a) Social
(b) Smooth
(c) Personal
(d) Communication
41. In SSL _______ key is used for encryption.
(a) Public
(b) Private
(c) Session
(d) OTP
42. To handle credit card transaction on internet _____ is developed by Visa and Master card.
(a) SSL
(b) SET
(c) SAT
(d) Encryption
43. The sender and receiver will have the same key in _____ Key Encryption.
(a) Symmetric
(b) Asymmetric
(c) Public
(d) Private
44. In SSL URL will change from HTTP to _______.
(a) Cipher Text
(b) HTTPS
(c) SHTTP
(d) SMTP
45. __________ is a best example of Online Stored Value System.
(a) Google
(b) Yahoo
(c) PayPal
(d) Go Daddy
46. BitTorrent.Com is an example of _____
(a) B2B
(b) B2C
(c) C2C
(d) P2P
47. E-Tailer revenue model is ______ revenue.
(a) Sales
(b) Subscription
(c) Advertising
(d) Affiliate
48. The percentage of people who visit web site and buy something is known as _____
(a) Hits
(b) Conversion Rate
(c) Affiliate
(d) Walk-in-Customer
49. In _______ user can share files and computer resources directly.
(a) B2B
(b) B2C
(c) C2C
(d) P2P
50. E-tailer can be Pure Plays or _______ .
(a) Impure Plays
(b) Indirect Plays
(c) Bricks & Clicks
(d) Direct Plays
Answers:
Answers: 1-Referral Fee,
2-ANSI,
3-Encryption,
4-Decryption,
5-SSL,
6-SSL,
7-E-tailer,
8-C2C,
9-Secured Electronic Transaction,
10-B2C
11-Session,
12-E-Tailer,
13-Authenticity,
14-Integrity,
15-Public and Private,
16-Master Card and Visa,
17-WAP,
18-Online Stored Value,
19-Electronic Market,
20-EDI
21-Integrity,
22-Wireless Application Protocol,
23-SSL,
24-Secure Sockets Layer,
25-C2C,
26-Community Provider,
27-B2C,
28-WML,
29-Phishing,
30-HTTP
31-Decryption,
32-Encryption,
33-Sender’s Public,
34-Receiver’s Private,
35-No one,
36-Confidentiality,
37-Micro,
38-Global,
39-Ubiquity,
40-Personal
41-Session,
42-SET,
43-Symmetric,
44-HTTPS,
45-PayPal,
46-P2P,
47-Sales,
48-Conversion Rate,
49-P2P,
50-Bricks & Clicks
टिप्पणियाँ
एक टिप्पणी भेजें