0% found this document useful (0 votes)
232 views6 pages

Multiple Choice Questions

The document contains 40 multiple choice questions about e-commerce topics like the different types of e-commerce (B2B, B2C, C2B, C2C), examples of companies that fall under each type (Amazon, eBay), products best suited for different e-commerce models, functions of e-commerce (marketing, advertising, warehousing), components of IT, intellectual property concepts (patents, copyrights), encryption techniques (RSA, DES, AES), communication security protocols (SSL), file transfer protocols (FTP), e-banking/payments (PayPal, EPS), threats (malicious code, viruses), and affiliate marketing programs. It also includes 15 very short answer questions defining and explaining basic

Uploaded by

Dev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
232 views6 pages

Multiple Choice Questions

The document contains 40 multiple choice questions about e-commerce topics like the different types of e-commerce (B2B, B2C, C2B, C2C), examples of companies that fall under each type (Amazon, eBay), products best suited for different e-commerce models, functions of e-commerce (marketing, advertising, warehousing), components of IT, intellectual property concepts (patents, copyrights), encryption techniques (RSA, DES, AES), communication security protocols (SSL), file transfer protocols (FTP), e-banking/payments (PayPal, EPS), threats (malicious code, viruses), and affiliate marketing programs. It also includes 15 very short answer questions defining and explaining basic

Uploaded by

Dev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Multiple Choice Questions :

1.Which of the following describes e-commerce?

a. Doing business electronically b. Doing business c. Sale of goods d. All of the above

Answer: A

2.Which of the following is part of the four main types for e-commerce?

a. B2B b. B2C c. C2B d. All of the above

Answer: D

3.Which segment do eBay, Amazon.com belong?

a. B2Bs b. B2Cs c. C2Bs d. C2Cs

Answer: B

4.Which type of e-commerce focuses on consumers dealing with each other?

a. B2B b. B2C c. C2B d. C2C

Answer: D

5.Which segment is eBay an example?

a. B2B b. C2B c. C2C d. None of the above

Answer: D

6.Which type deals with auction?

a. B2B b. B2C c. C2B d. C2C

Answer: D

7.In which website Global Easy Buy is facilitated?

a. Ebay.com b. Amazon.com c. Yepme.com d. None of these

Answer: A

8.The best products to sell in B2C e-commerce are:

a. Small products b. Digital products c. Specialty products d. Fresh products

Answer: B

9.Which products are people most likely to be more uncomfortable buying on the Internet?
a. Books b. Furniture c. Movies d. All of the above

Answer: B

10. Which products are people most likely to be comfortable buying on the Internet?

a. Books b. PCs c. CDs d. All of the above

Answer: D

11. Digital products are best suited for B2C e-commerce because they:

a. Are commodity like products

b. Can be mass-customized and personalized

c. Can be delivered at the time of purchase

d. All of the above

Answer: D

12. The solution for all business needs is

a. EDI b. ERP c. SCM d. None of the above

Answer: B

13. All of the following are techniques B2C e-commerce companies use to attract customers, except:
a. Registering with search engines

b. Viral marketing

c. Online ads

d. Virtual marketing

Answer: D

14. Which is a function of E-commerce

a. marketing b. advertising c. warehousing d. all of the above

Answer: D

15. Which is not a function of E-commerce

a. marketing b. advertising c. warehousing d. none of the above

Answer: C

16. Which is the most important component of IT?

a. Information b. People c. Information technology d. Computers


Answer: B

17. Which of the following applies to the implementation of an idea?

a. Copyright b. Intellectual property c. Patent d. Denial-of-service attack

Answer: C

18. When you purchase copyrighted software, what actually are you paying for?

a. The cost of the CDs, manuals, and development of the software

b. The cost of the CDs, manuals, and a share of the cost of the software development

c. A share of the cost of software development

d. All of the above

Answer: D

19.Which one is not a encryption technique

a. RSA

b. DES

c. AES

d. NONE OF THE ABOVE

Answer:D

20.Which one is not used as a security mechanism?

a. Encryption b. Cryptography c. Wallets d. Digital signature

Answer :C

21. Which e-government arena is being used when governmental agencies send out and accept bids
for work?

a) G2G b) G2B c) G2C d) G2G

Answer: B

22. Secret key is used for

a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of
these

Answer: B

23. Which one is a communication channel threat?


a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above Answer: D

24. Which one is a communication channel security protocol?

a. SSL b. S-HTTP c. SET d. ALL OF THE ABOVE

Answer: D

25. The protocol which allows the file transfer between computers is

a. TCP/IP b. FTP c. HTTP d. SOA

Answer: B

26. E-Banking is also known as

a. ATMs b. Net banking c. Traditional banking d. None of these

Answer: B

27. -------------- is backbone of all E-payments in E-commerce

a. EFT b. EPS c. PayPal d. None of these

Answer: B

28. Which one is a client level threat?

a. Malicious code b. Viruses c. Active contents d. All the above

Answer: D

29. Which one is not an encryption technique?

a. RSA b. DES c. AES d. FTP

Answer: D

30. Which one is an encryption technique?

a. RSA b. DES c. AES d. All of the above

Answer: D

31. Private Key cryptography is also known as ---------------cryptography.

a. Public key b. Symmetric c. Asymmetric d. None

Answer: B

32. Public key cryptography is also known as ---------------cryptography.

a. Private key b. Symmetric c. Asymmetric d. None


Answer: C

33. What is the legal protection afforded an expression of an idea, such as a song, video game, and
some types of proprietary documents?

a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Answer: C

34. Cyber slacking consists of what activities?

a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about
non-work topics d. All of the above

Answer: D

35. What is an arrangement made between e-commerce sites that direct users from one site to the
other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Answer: C

36. Which type deals with auction?

a. B2B b. B2C c. C2B d. C2C

Answer: D

37. Which one is not a layer of E-commerce infrastructure

a. Physical layer b. Product layer c. Service layer d. None

Answer: D

38. The study of encryption is called---------------

a. Decryption b. Cryptography c. Firewall d. All the above

Answer: B

39. During E-commerce transaction we should ensure------------- a. Integrity b. Security c.


Confidentiality d. All the above

Answer: D

40. The virus that are commonly found in word documents are called--------------

a. Macro b. Trojan horse c. Script virus d. None of the above

Answer: A

Very Short Answer Type Questions

1. What exactly is ecommerce?


2. What is e-commerce trade cycle?
3. What is meant by EDI?
4. What are EDI transactions?
5. What is EDI example?
6. What is EDI and its features?
7. Write any two security issues of e–commerce.
8. What is the role of e- payment system?
9. What Defines a Trademark?
10. What is a trademark and what does it protect?
11. What are the three types of trademarks?
12. what is the benefits of Encryption?
13. What is Symmetric and Asymmetric cryptosystem?
14. Which is better asymmetric or symmetric encryption?
15. What are the different categories of e-commerce?

You might also like