E-Commerce MCQs - Prof. Prabha Kumari
E-Commerce MCQs - Prof. Prabha Kumari
E-Commerce MCQs - Prof. Prabha Kumari
A. Key logger
B. Packet sniffer
D. Screen captures
B. Doing business
C. Sale of goods
3. Which of the following is part of the four main types for e-commerce?
A. B2B
B. B2C
C. C2B
A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
5. Which type of e-commerce focuses on consumers dealing with each
other?
A. B2B
B. B2C
C. C2B
D. C2C
A. B2B
B. C2B
C. C2C
A. B2B
B. B2C
C. C2B
D. C2C
A. Ebay.com
B. Amazon.com
C. Yepme.com
D. None of these
A. Small products
B. Digital products
C. Specialty products
D. Fresh products
10. Which products are people most likely to be more uncomfortable buying
on the Internet?
A. Books
B. Furniture
C. Movies
11. Which products are people most likely to be comfortable buying on the
Internet?
A. Books
B. PCs
C. CDs
12. Digital products are best suited for B2C e-commerce because they:
A. EDI
B. ERP
C. SCM
14. All of the following are techniques B2C e-commerce companies use to
attract customers, except
B. Viral marketing
C. Online ads
D. Virtual marketing
A. marketing
B. advertising
C. warehousing
A. marketing
B. advertising
C. warehousing
17. Which term represents a count of the number of people who visit one
site, click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click-through
C. Spam
18. What is the percentage of customers who visit a Web site and actually
buy something called?
A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
A. Direct materials
B. Indirect materials
C. EDI
A. Direct materials
B. Indirect materials
C. EDI
A. Direct materials
B. Indirect materials
C. EDI
22. What is another name for materials which cannot be linked to a specific
product or process?
A. Direct materials
B. Indirect materials
C. EDI
23. What is the process in which a buyer posts its interest in buying a certain
quantity of items, and sellers compete for the business by submitting
successively lower bids until there is only one seller left?
A. B2B marketplace
B. Intranet
C. Reverse auction
D. Internet
24. What are plastic cards the size of a credit card that contains an
embedded chip on which digital information can be stored?
C. FEDI cards
D. Smart cards
A. B2B
B. B2C
C. C2B
D. C2C
26. Which form of e-commerce currently accounts for about 97% of all e-
commerce revenues?
A. B2B
B. B2C
C. C2B
D. C2C
27. Which of the following are advantages normally associated with B2B e-
commerce?
B. Reduction in costs
30. If it is easy for competitors to enter the market, the threat of new entrants
is considered:
A. High
B. Low
C. More
D. Less
31. An industry is less attractive for suppliers when the rivalry among existing
competitors is:
A. High
B. Low
C. More
D. Less
A. New products
C. Engineering products
A. eBay.co.in
B. amazon.com
C. flipkart.com
A. encryption
B. decryption
C. firewall
A. encryption
B. decryption
C. e-cash
A. Switching costs
B. Loyalty programs
C. Entry barriers
D. Affiliate programs
37. Which of the following statements accurately reflect the impact of
technology?
38. A business cannot be all things to all people. Instead, a business must:
A. Using e-medias
A. automobiles
B. books
C. softwares
D. none
A. Price
C. Ease of ordering
A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
43. Materials used in the normal operation of a business but not related to
primary business operations are called what?
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
A. Banner ads
B. Pop-up ads
C. Affiliate programs
D. Viral marketing
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
46. Which form of e-marketplace brings together buyers and sellers from
multiple industries, often for MRO materials?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
47. Which form of e-marketplace brings together buyers and sellers from the
same industry?
A. horizontal
B. Vertical
C. Integrated
D. Inclined
A. pop-under ad
B. Pop-up ad
C. Banner ad
D. Discount ad
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
A. pop-under ad
B. pop-up ad
C. banner ad
D. discount ad
51. Which, if any, of the following types of ads are people most willing to
tolerate?
A. pop-under ad
B. pop-up ad
C. banner ad
A. electronic check
C. conversion rates
D. financial cybermediary
A. electronic check
B. credit card
C. e-transfer
A. e-commerce
B. online banking
C. e-cash
D. check
55. If you need to transfer money to another person via the internet, which of
the following methods could you use?
A. financial cybermediary
B. electronic check
56. Which of the following permits the transmission of a bill, along with
payment of that bill, to be conducted over the Internet?
A. financial cybermediary
B. electronic check
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
A. internet commerce
B. e-commerce
A. e-commerce
D. electronic checks
60. Public key encryption uses multiple keys. One key is used to encrypt
data, while another is used to decrypt data. The key used to encrypt data is
called the _____ key, while the key used to decrypt data is called the _____
key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
B. encrypts information
62. When a transaction is processed online, how can the merchant verify the
customers identity?
63. The practice of forging a return address on an e-mail so that the recipient
is fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
64. What is a model of a proposed product, service, or system?
A. Prototyping
B. Prototype
C. Proof-of-concept prototype
D. Selling prototype
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
B. Hot site
C. Cold site
B. Hot site
C. Cold site
69. What is a separate and fully equipped facility where the company can
move immediately after the disaster and resume business?
B. Hot site
C. Cold site
70. What charts (1) the cost to your organisation of the unavailability of
information and technology and (2) the cost to your organisation of
recovering from a disaster over time?
B. Hot site
C. Cold site
71. Which factor determines when the IT system will be available for
knowledge workers to access?
A. Availability
B. Accessibility
C. Reliability
A. Availability
B. Accessibility
C. Reliability
D. Scalability
73. Which factor ensures the IT systems are functioning correctly and
providing accurate information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
74. Which factor represents how well your system can adapt to increased
demands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
A. Workflow
B. ASP
C. Workflow system
D. EIP
79. What defines all of the steps or business rules, from beginning to end,
required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
A. firewall
B. Virus
C. Trojan horse
A. Warehousing
B. sales
C. scheduling
A. Warehousing
B. sales
C. scheduling
A. Integration
B. Web services
C. Scalability
D. Interoperability
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
87. Which process can prevent data from losing due to computer problems
or human errors?
A. backup
B. recovery
C. benchmarking
D. data cleansing
88. Which process is used to reinstall data from a copy when the original
data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
A. Performance
B. Capacity planning
C. Benchmarking
D. Data cleansing
90. Who protects system from external threats?
A. firewall
B. EDI
C. ERP
D. Script kiddies
91. Who breaks into other peoples computer systems and steals and
destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
92. What is software that comes hidden in free downloadable software and
tracks your online movements, mines the information stored on your
computer, or uses your computers CPU and storage for some task you know
nothing about?
A. Web log
B. Clickstream
A. Legacy systems
B. Bolt on applications
C. Operational database
D. Cybersoft
B. financial
C. warehousing
96. What is a type of virus that spreads itself, not just from file to file, but
from computer to computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
97. What floods a Web site with so many requests for service that it slows
down or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
A. Computer virus
B. Worm
C. Denial-of-service attack
A. Risk management
B. Risk assessment
C. Security
A. Risk management
B. Risk assessment
C. Security
***
Answer Key
1. B
2. A
3. D
4. B
5. D
6. D
7. D
8. A
9. B
10. B
11. D
12. D
13. B
14. D
15. D
16. C
17. B
18. D
19. A
20. B
21. B
22. B
23. C
24. D
25. B
26. A
27. D
28. C
29. C
30. A
31. A
32. B
33. A
34. D
35. C
36. C
37. D
38. C
39. A
40. A
41. A
42. A
43. C
44. C
45. D
46. A
47. B
48. C
49. B
50. A
51. D
52. D
53. A
54. C
55. D
56. C
57. A
58. D
59. B
60. D
61. D
62. B
63. D
64. B
65. B
66. C
67. A
68. C
69. B
70. D
71. A
72. B
73. C
74. D
75. A
76. D
77. C
78. C
79. A
80. D
81. A
82. D
83. D
84. C
85. D
86. D
87. A
88. B
89. C
90. A
91. A
92. D
93. C
94. D
95. D
96. B
97. C
98. D
99. A
100.A