MCQOPTIONS
Saved Bookmarks
This section includes 144 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
A model describes how the firm will earn revenue, make profit and produce abetter return on invested capital is |
| A. | revenue model |
| B. | competitive advantage |
| C. | value proposition |
| D. | markets strategy |
| Answer» B. competitive advantage | |
| 52. |
…………………….is designed to protect a persons personal information |
| A. | data integrity |
| B. | cyber law |
| C. | private legislation |
| D. | none |
| Answer» D. none | |
| 53. |
SSL is the most widely deployed |
| A. | security protocol |
| B. | data encryption |
| C. | cryptography |
| D. | none |
| Answer» B. data encryption | |
| 54. |
This the process of making information un intelligible to the unauthorized reader |
| A. | encryption |
| B. | decryption |
| C. | uncryption |
| D. | none |
| Answer» B. decryption | |
| 55. |
Which is used for transferring money from one bank account to another directlywithout involving cash |
| A. | eft |
| B. | e-cash |
| C. | micropayment |
| D. | none |
| Answer» B. e-cash | |
| 56. |
The new advertising medium is |
| A. | newspaper |
| B. | radio |
| C. | magazines |
| D. | internet |
| Answer» E. | |
| 57. |
……………… e commerce is conducted between two separate business andhas been in effect for many years |
| A. | b2b |
| B. | c2c |
| C. | p2p |
| D. | b2c |
| Answer» B. c2c | |
| 58. |
…………… is an internet standard (or) set of rules that allows the exchange ofinformation on the www |
| A. | http |
| B. | ftp |
| C. | tcp/ip |
| D. | telnet |
| Answer» B. ftp | |
| 59. |
The most commonly used protocols are |
| A. | ftp |
| B. | tcp/ip |
| C. | http |
| D. | all the above |
| Answer» E. | |
| 60. |
The private content of transaction, if unprotected can be intercepted when it gothrough the route over the internet called. |
| A. | spoofing |
| B. | snooping |
| C. | sniffing |
| D. | eavesdropping |
| Answer» E. | |
| 61. |
Which aspects include in supply chain planning |
| A. | demand forecasting |
| B. | inventory simulation |
| C. | manufacturing planning |
| D. | all the above |
| Answer» E. | |
| 62. |
Google is one of the most popular |
| A. | portal |
| B. | search engine |
| C. | browser |
| D. | none |
| Answer» C. browser | |
| 63. |
This type of portal is application oriented |
| A. | application centric portals |
| B. | b2b portals |
| C. | horizontal portals |
| D. | none |
| Answer» B. b2b portals | |
| 64. |
EDI stands for |
| A. | electric data interface |
| B. | electronic data interchange |
| C. | electronic data interface |
| D. | name of these |
| Answer» C. electronic data interface | |
| 65. |
…… provide security and privacy for the use of the web page content |
| A. | http |
| B. | html |
| C. | ftp |
| D. | none |
| Answer» B. html | |
| 66. |
This type of electronic payment systems is highly useful to those customers whowould like to control over spending |
| A. | post paid payment system |
| B. | pre paid payment system |
| C. | spot payment system |
| D. | none |
| Answer» C. spot payment system | |
| 67. |
The word internet was coined from the word |
| A. | interconnection and network |
| B. | intra connection and net transfer |
| C. | interlink and network |
| D. | inter activity net work |
| Answer» B. intra connection and net transfer | |
| 68. |
…………………… is a new architecture if or the development of loosely coupleddistributed application |
| A. | s0a |
| B. | wsdl |
| C. | soap |
| D. | uddi |
| Answer» B. wsdl | |
| 69. |
This is a form of advt. on the web that appears between web pages that theuser requests |
| A. | banner advt |
| B. | floating advt |
| C. | interstitials |
| D. | none |
| Answer» D. none | |
| 70. |
SET Means |
| A. | standard electronic technology |
| B. | standard electronic transfer |
| C. | secure electronic transaction |
| D. | none |
| Answer» D. none | |
| 71. |
EDI is an early form of |
| A. | traditional commerce |
| B. | digital commerce |
| C. | e-commerce |
| D. | mobile commerce |
| Answer» D. mobile commerce | |
| 72. |
This is a website that provide a gateway to other resources on the internet |
| A. | portal |
| B. | browser |
| C. | search engine |
| D. | none |
| Answer» B. browser | |
| 73. |
This is a service that communicates with clients through a set of standardprotocols and technologies |
| A. | voip |
| B. | web services |
| C. | xml |
| D. | none |
| Answer» B. web services | |
| 74. |
ATA stands for |
| A. | analog telegraphic adaptor |
| B. | analog telephone adaptor |
| C. | analog tele system |
| D. | adaptor telephone analog |
| Answer» C. analog tele system | |
| 75. |
PPC engines is called |
| A. | per –pay click |
| B. | pay- per click |
| C. | pay - pay click |
| D. | none |
| Answer» C. pay - pay click | |
| 76. |
Which is not a feature of e-commerce |
| A. | universal standard |
| B. | global reach |
| C. | ample information |
| D. | retailing |
| Answer» E. | |
| 77. |
The two types of credit cards today namely credit cards issued by credit cardcompanies |
| A. | master card , visa |
| B. | smart card credit card |
| C. | debit card, e cash |
| D. | none |
| Answer» B. smart card credit card | |
| 78. |
ATM card is a |
| A. | credit card |
| B. | debit card |
| C. | e cash |
| D. | smart card |
| Answer» C. e cash | |
| 79. |
This is essentially a business process that connects manufactures retailers,customers and suppliers in the form of a chain to develop deliver products |
| A. | e-commerce |
| B. | edi |
| C. | scm |
| D. | net working |
| Answer» D. net working | |
| 80. |
………………. Is used to keep transmissions privacy through the use ofdata encryption techniques. |
| A. | data encryption |
| B. | crytography |
| C. | security key |
| D. | non e |
| Answer» C. security key | |
| 81. |
EDI soft ware translates the information |
| A. | from structured to unstructured format |
| B. | from unstructured to structured format |
| C. | from structured to semi structured format |
| D. | non of these |
| Answer» C. from structured to semi structured format | |
| 82. |
Which of the following are not a drawback of public B2B exchanges |
| A. | lack of customization |
| B. | limited supper participants |
| C. | customers satisfaction |
| D. | non |
| Answer» D. non | |
| 83. |
Arrange the steps to Ecommerce 1) Security 2) Process payment 3) Service & support 4) Generating demand 5) ordering & fulfillment |
| A. | 4,5,2,3 |
| B. | 5,3,1,2,4 |
| C. | 1,2,3,4,5 |
| D. | 3,2,5,1,4 |
| Answer» B. 5,3,1,2,4 | |
| 84. |
The process of encrypted data readable once again is called, |
| A. | encryption |
| B. | decryption |
| C. | uncryption |
| D. | none |
| Answer» B. decryption | |
| 85. |
E commerce refers to |
| A. | direct buying |
| B. | retailing |
| C. | scm |
| D. | online transaction |
| Answer» E. | |
| 86. |
These are mega portals dealing in wide range of topics |
| A. | horizontal |
| B. | vertical |
| C. | enterprise |
| D. | non e |
| Answer» B. vertical | |
| 87. |
Components of SCM system includes |
| A. | scm software and hardware |
| B. | business processes |
| C. | users |
| D. | all the above |
| Answer» E. | |
| 88. |
These are online magazines generally covering topic of interest |
| A. | banner adv’s |
| B. | search engineers |
| C. | e-zines |
| D. | none |
| Answer» D. none | |
| 89. |
Which are not the benefits of B2c E commerce |
| A. | lower marketing cost |
| B. | lower order processing cost |
| C. | better customer service |
| D. | narrow market |
| Answer» E. | |
| 90. |
Meta crawler is also an example for |
| A. | mega search engine |
| B. | meta-search engine |
| C. | search engine |
| D. | none |
| Answer» C. search engine | |
| 91. |
UNCITRAL model law on E commerce is |
| A. | 1996 |
| B. | 1994 |
| C. | 1995 |
| D. | 1997 |
| Answer» B. 1994 | |
| 92. |
Supply chain execution is the process of putting supply chain planning in to……………. |
| A. | action |
| B. | operation |
| C. | maintenance |
| D. | control |
| Answer» B. operation | |
| 93. |
The cyber crime related to monitoring data flow between shoppers computer ande commerce website |
| A. | spoofing |
| B. | hacking |
| C. | sniffing |
| D. | phishing |
| Answer» C. sniffing | |
| 94. |
The participants in an online electronic payment transaction include |
| A. | the customer |
| B. | the issuer |
| C. | the merchant |
| D. | all above |
| Answer» E. | |
| 95. |
Which are used for signing and endorsing electronic changes |
| A. | manual signature |
| B. | thump impression |
| C. | digital signature |
| D. | spot signature |
| Answer» D. spot signature | |
| 96. |
Which is the creation and development o f communication strategies specificallyfor brands to have meaning and context on the web |
| A. | e branding |
| B. | branding |
| C. | advertising |
| D. | none |
| Answer» B. branding | |
| 97. |
……….. refers to supply of goods and services for online govt. procurement |
| A. | c2c |
| B. | b2g |
| C. | b2e |
| D. | b2b |
| Answer» C. b2e | |
| 98. |
Gain entry into the user’s system and scan your file system for personalinformation is known as |
| A. | spoofing |
| B. | snooping |
| C. | sniffing |
| D. | none |
| Answer» B. snooping | |
| 99. |
Which of the following are not the major business models utilized in the B2B are |
| A. | e distributor |
| B. | e-procurement |
| C. | b2b hubs |
| D. | none of these |
| Answer» E. | |
| 100. |
The structure of a web page is called it’s |
| A. | web design |
| B. | web layout |
| C. | architecture |
| D. | none |
| Answer» D. none | |