MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
During E‐commerce transaction we should ensure ___________. |
| A. | ntegrity |
| B. | ecurity |
| C. | onfidentiality |
| D. | ll the above |
| Answer» E. | |
| 2. |
The study of encryption is called ___________. |
| A. | ecryption |
| B. | ryptography |
| C. | irewall |
| D. | ll the above |
| Answer» C. irewall | |
| 3. |
Which will harm computer resources |
| A. | orm |
| B. | irus |
| C. | rojan horse |
| D. | ll the above |
| Answer» E. | |
| 4. |
Which one is not layer of E‐commerce infrastructure? |
| A. | hysical layer |
| B. | roduct layer |
| C. | ervice layer |
| D. | one |
| Answer» E. | |
| 5. |
What is an arrangement made between e‐commerce sites that direct users from one site to the other? |
| A. | pam |
| B. | iral marketing |
| C. | ffiliate programs |
| D. | one of the above |
| Answer» D. one of the above | |
| 6. |
Which one is not an online payment mode? |
| A. | ash on delivery |
| B. | ebit card |
| C. | redit card |
| D. | ‐cheque |
| Answer» B. ebit card | |
| 7. |
Which one is an offline payment mode? |
| A. | ash on delivery |
| B. | ash before delivery |
| C. | redit card |
| D. | oth a and b |
| Answer» E. | |
| 8. |
Which one is not an offline payment mode? |
| A. | ash on delivery |
| B. | ash before delivery |
| C. | emand drafts |
| D. | ‐cheque |
| Answer» E. | |
| 9. |
Which one is threat for E‐commerce? |
| A. | rojan horse |
| B. | irewall |
| C. | ncryption |
| D. | one |
| Answer» B. irewall | |
| 10. |
Public key cryptography is also known as _________ cryptography. |
| A. | rivate key |
| B. | ymmetric |
| C. | symmetric |
| D. | one |
| Answer» D. one | |
| 11. |
Private Key cryptography is also known as __________ cryptography. |
| A. | ublic key |
| B. | ymmetric |
| C. | symmetric |
| D. | one |
| Answer» C. symmetric | |
| 12. |
Which one is not a threat for E‐commerce? |
| A. | rojan horse |
| B. | iruses |
| C. | orm |
| D. | one |
| Answer» E. | |
| 13. |
which one is not an E‐payment method used in India? |
| A. | ebit card |
| B. | redit card |
| C. | ‐cheque |
| D. | one |
| Answer» E. | |
| 14. |
The basic elements of website is. |
| A. | ome page |
| B. | eb pages |
| C. | inks and banners |
| D. | ll the above |
| Answer» E. | |
| 15. |
Which one is a physical threat? |
| A. | hishing |
| B. | torm |
| C. | arthquake |
| D. | ll the above |
| Answer» E. | |
| 16. |
Which one is not a physical threat? |
| A. | acking |
| B. | torm |
| C. | hishing |
| D. | one of the above |
| Answer» B. torm | |
| 17. |
Which one is not an encryption technique? |
| A. | SA |
| B. | ES |
| C. | ES |
| D. | TP |
| Answer» E. | |
| 18. |
Which one is a client level threat? |
| A. | alicious code |
| B. | iruses |
| C. | ctive contents |
| D. | ll the above |
| Answer» E. | |
| 19. |
__________ is backbone of all E‐payments in E‐commerce. |
| A. | FT |
| B. | PS |
| C. | ayPal |
| D. | one of these |
| Answer» C. ayPal | |
| 20. |
E‐Banking is also known as. |
| A. | TMs |
| B. | et banking |
| C. | raditional banking |
| D. | one of these |
| Answer» C. raditional banking | |
| 21. |
Which one is communication channel security protocol? |
| A. | SL |
| B. | ‐HTTP |
| C. | ET |
| D. | LL OF THE ABOVE |
| Answer» E. | |
| 22. |
Which one is communication channel threat? |
| A. | niffer programs |
| B. | yber vandalism |
| C. | ntegrity threats |
| D. | ll of the above |
| Answer» E. | |
| 23. |
Secret key is used for. |
| A. | ublic key cryptography |
| B. | rivate key cryptography |
| C. | symmetric key cryptography |
| D. | one of these |
| Answer» C. symmetric key cryptography | |
| 24. |
Which e‐government arena is being used when governmental agencies send out and accept bids for work? |
| A. | 2G |
| B. | 2B |
| C. | 2C |
| D. | 2G |
| Answer» C. 2C | |
| 25. |
What is A stands in CIA of smart card? |
| A. | uditing |
| B. | uthenticity |
| C. | uthorized |
| D. | one of the above |
| Answer» C. uthorized | |
| 26. |
What is I stands in CIA of smart card? |
| A. | nternational |
| B. | ntegrity |
| C. | dentity |
| D. | one of the above |
| Answer» C. dentity | |
| 27. |
Which is not a feature of eCommerce? |
| A. | CM |
| B. | DI |
| C. | WW |
| D. | PR |
| Answer» E. | |
| 28. |
‐‐‐‐‐‐‐‐‐ card is read only mode. |
| A. | ontact smart card |
| B. | ontactless smart card |
| C. | roximity smart card |
| D. | oth B and C |
| Answer» D. oth B and C | |
| 29. |
Which one is not a encryption technique? |
| A. | SA |
| B. | ES |
| C. | ES |
| D. | ONE OF THE ABOVE |
| Answer» E. | |
| 30. |
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. |
| A. | hreat |
| B. | anger |
| C. | rror |
| D. | one of the above |
| Answer» B. anger | |
| 31. |
Which is used to identify mobile money? |
| A. | CID |
| B. | MID |
| C. | SID |
| D. | ONE OF THE ABOVE |
| Answer» C. SID | |
| 32. |
Which one is the third party payment providers who offer digital wallets for E‐merchants? |
| A. | xicash |
| B. | ayMate |
| C. | ayPass |
| D. | ll the above |
| Answer» E. | |
| 33. |
The two main types of Internet-based B2B commerce are_________. |
| A. | et marketplaces and private industrial networks |
| B. | DI and collaborative commerce |
| C. | et marketplaces and collaborative commerce |
| D. | DI and private industrial networks |
| Answer» E. | |
| 34. |
What is the unauthorized use, duplication, distribution or sale of copyrighted software? |
| A. | air Use Doctrine |
| B. | irated software |
| C. | ounterfeit software |
| D. | rivacy |
| Answer» C. ounterfeit software | |
| 35. |
The foundation for contemporary supply chain management systems includes all of the following except _________. |
| A. | upply chain simplification |
| B. | ontinuous inventory replenishment |
| C. | RP systems |
| D. | 2B electronic storefronts |
| Answer» E. | |
| 36. |
The viruses spreads through __________. |
| A. | ails |
| B. | en drives and cds |
| C. | ebsites |
| D. | ll the above |
| Answer» E. | |
| 37. |
The virus that are attached with vb and java files are called. |
| A. | acro |
| B. | rojan horse |
| C. | cript virus |
| D. | one of the above |
| Answer» D. one of the above | |
| 38. |
The virus that are commonly found in word documents are called __________. |
| A. | acro |
| B. | rojan horse |
| C. | cript virus |
| D. | one of the above |
| Answer» B. rojan horse | |
| 39. |
What is the name of the new anti‐Spam bill? |
| A. | o‐Spam |
| B. | AN‐Spam |
| C. | pam‐Away |
| D. | top Spam |
| Answer» C. pam‐Away | |
| 40. |
Goods directly involved in the production process are known as _________. |
| A. | RO goods |
| B. | rocured goods |
| C. | ndirect goods |
| D. | irect goods |
| Answer» E. | |
| 41. |
Unsolicited e‐mail is called what? |
| A. | unk mail |
| B. | pam |
| C. | xtra mail |
| D. | one of the above |
| Answer» C. xtra mail | |
| 42. |
The smart card which use antenna for reading and writing data. |
| A. | ontact smart card |
| B. | ontactless smart card |
| C. | roximity smart card |
| D. | oth B and C |
| Answer» E. | |
| 43. |
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. |
| A. | emory |
| B. | icrochip |
| C. | ‐cash |
| D. | one of the above |
| Answer» C. ‐cash | |
| 44. |
Which one is the component of cybercash payment system? |
| A. | C user software |
| B. | C merachant software |
| C. | C Server Software |
| D. | ll of the above |
| Answer» E. | |
| 45. |
E‐cheques are ________ |
| A. | repaid |
| B. | ostpaid |
| C. | oth prepaid and postpaid |
| D. | one of these |
| Answer» B. ostpaid | |
| 46. |
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________. |
| A. | CD |
| B. | DI |
| C. | DE |
| D. | CB |
| Answer» C. DE | |
| 47. |
Cyber slacking consists of what activities? |
| A. | isiting “inappropriate” web sites |
| B. | isiting news sites |
| C. | hatting online with others about non‐work topics |
| D. | ll of the above |
| Answer» E. | |
| 48. |
An auction that has multiple winners that all pay the same price is an example of________. |
| A. | niform pricing |
| B. | iscriminatory pricing |
| C. | id rigging |
| D. | rice matching |
| Answer» B. iscriminatory pricing | |
| 49. |
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? |
| A. | hishing |
| B. | arding |
| C. | rand spoofing |
| D. | ll of the above |
| Answer» E. | |
| 50. |
Which of the following portal revenue models involves charging for premium content? |
| A. | SP services |
| B. | eneral advertising |
| C. | ubscription fees |
| D. | enancy deals |
| Answer» D. enancy deals | |