

MCQOPTIONS
Saved Bookmarks
This section includes 144 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
51. |
A model describes how the firm will earn revenue, make profit and produce abetter return on invested capital is |
A. | revenue model |
B. | competitive advantage |
C. | value proposition |
D. | markets strategy |
Answer» B. competitive advantage | |
52. |
…………………….is designed to protect a persons personal information |
A. | data integrity |
B. | cyber law |
C. | private legislation |
D. | none |
Answer» D. none | |
53. |
SSL is the most widely deployed |
A. | security protocol |
B. | data encryption |
C. | cryptography |
D. | none |
Answer» B. data encryption | |
54. |
This the process of making information un intelligible to the unauthorized reader |
A. | encryption |
B. | decryption |
C. | uncryption |
D. | none |
Answer» B. decryption | |
55. |
Which is used for transferring money from one bank account to another directlywithout involving cash |
A. | eft |
B. | e-cash |
C. | micropayment |
D. | none |
Answer» B. e-cash | |
56. |
The new advertising medium is |
A. | newspaper |
B. | radio |
C. | magazines |
D. | internet |
Answer» E. | |
57. |
……………… e commerce is conducted between two separate business andhas been in effect for many years |
A. | b2b |
B. | c2c |
C. | p2p |
D. | b2c |
Answer» B. c2c | |
58. |
…………… is an internet standard (or) set of rules that allows the exchange ofinformation on the www |
A. | http |
B. | ftp |
C. | tcp/ip |
D. | telnet |
Answer» B. ftp | |
59. |
The most commonly used protocols are |
A. | ftp |
B. | tcp/ip |
C. | http |
D. | all the above |
Answer» E. | |
60. |
The private content of transaction, if unprotected can be intercepted when it gothrough the route over the internet called. |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | eavesdropping |
Answer» E. | |
61. |
Which aspects include in supply chain planning |
A. | demand forecasting |
B. | inventory simulation |
C. | manufacturing planning |
D. | all the above |
Answer» E. | |
62. |
Google is one of the most popular |
A. | portal |
B. | search engine |
C. | browser |
D. | none |
Answer» C. browser | |
63. |
This type of portal is application oriented |
A. | application centric portals |
B. | b2b portals |
C. | horizontal portals |
D. | none |
Answer» B. b2b portals | |
64. |
EDI stands for |
A. | electric data interface |
B. | electronic data interchange |
C. | electronic data interface |
D. | name of these |
Answer» C. electronic data interface | |
65. |
…… provide security and privacy for the use of the web page content |
A. | http |
B. | html |
C. | ftp |
D. | none |
Answer» B. html | |
66. |
This type of electronic payment systems is highly useful to those customers whowould like to control over spending |
A. | post paid payment system |
B. | pre paid payment system |
C. | spot payment system |
D. | none |
Answer» C. spot payment system | |
67. |
The word internet was coined from the word |
A. | interconnection and network |
B. | intra connection and net transfer |
C. | interlink and network |
D. | inter activity net work |
Answer» B. intra connection and net transfer | |
68. |
…………………… is a new architecture if or the development of loosely coupleddistributed application |
A. | s0a |
B. | wsdl |
C. | soap |
D. | uddi |
Answer» B. wsdl | |
69. |
This is a form of advt. on the web that appears between web pages that theuser requests |
A. | banner advt |
B. | floating advt |
C. | interstitials |
D. | none |
Answer» D. none | |
70. |
SET Means |
A. | standard electronic technology |
B. | standard electronic transfer |
C. | secure electronic transaction |
D. | none |
Answer» D. none | |
71. |
EDI is an early form of |
A. | traditional commerce |
B. | digital commerce |
C. | e-commerce |
D. | mobile commerce |
Answer» D. mobile commerce | |
72. |
This is a website that provide a gateway to other resources on the internet |
A. | portal |
B. | browser |
C. | search engine |
D. | none |
Answer» B. browser | |
73. |
This is a service that communicates with clients through a set of standardprotocols and technologies |
A. | voip |
B. | web services |
C. | xml |
D. | none |
Answer» B. web services | |
74. |
ATA stands for |
A. | analog telegraphic adaptor |
B. | analog telephone adaptor |
C. | analog tele system |
D. | adaptor telephone analog |
Answer» C. analog tele system | |
75. |
PPC engines is called |
A. | per –pay click |
B. | pay- per click |
C. | pay - pay click |
D. | none |
Answer» C. pay - pay click | |
76. |
Which is not a feature of e-commerce |
A. | universal standard |
B. | global reach |
C. | ample information |
D. | retailing |
Answer» E. | |
77. |
The two types of credit cards today namely credit cards issued by credit cardcompanies |
A. | master card , visa |
B. | smart card credit card |
C. | debit card, e cash |
D. | none |
Answer» B. smart card credit card | |
78. |
ATM card is a |
A. | credit card |
B. | debit card |
C. | e cash |
D. | smart card |
Answer» C. e cash | |
79. |
This is essentially a business process that connects manufactures retailers,customers and suppliers in the form of a chain to develop deliver products |
A. | e-commerce |
B. | edi |
C. | scm |
D. | net working |
Answer» D. net working | |
80. |
………………. Is used to keep transmissions privacy through the use ofdata encryption techniques. |
A. | data encryption |
B. | crytography |
C. | security key |
D. | non e |
Answer» C. security key | |
81. |
EDI soft ware translates the information |
A. | from structured to unstructured format |
B. | from unstructured to structured format |
C. | from structured to semi structured format |
D. | non of these |
Answer» C. from structured to semi structured format | |
82. |
Which of the following are not a drawback of public B2B exchanges |
A. | lack of customization |
B. | limited supper participants |
C. | customers satisfaction |
D. | non |
Answer» D. non | |
83. |
Arrange the steps to Ecommerce 1) Security 2) Process payment 3) Service & support 4) Generating demand 5) ordering & fulfillment |
A. | 4,5,2,3 |
B. | 5,3,1,2,4 |
C. | 1,2,3,4,5 |
D. | 3,2,5,1,4 |
Answer» B. 5,3,1,2,4 | |
84. |
The process of encrypted data readable once again is called, |
A. | encryption |
B. | decryption |
C. | uncryption |
D. | none |
Answer» B. decryption | |
85. |
E commerce refers to |
A. | direct buying |
B. | retailing |
C. | scm |
D. | online transaction |
Answer» E. | |
86. |
These are mega portals dealing in wide range of topics |
A. | horizontal |
B. | vertical |
C. | enterprise |
D. | non e |
Answer» B. vertical | |
87. |
Components of SCM system includes |
A. | scm software and hardware |
B. | business processes |
C. | users |
D. | all the above |
Answer» E. | |
88. |
These are online magazines generally covering topic of interest |
A. | banner adv’s |
B. | search engineers |
C. | e-zines |
D. | none |
Answer» D. none | |
89. |
Which are not the benefits of B2c E commerce |
A. | lower marketing cost |
B. | lower order processing cost |
C. | better customer service |
D. | narrow market |
Answer» E. | |
90. |
Meta crawler is also an example for |
A. | mega search engine |
B. | meta-search engine |
C. | search engine |
D. | none |
Answer» C. search engine | |
91. |
UNCITRAL model law on E commerce is |
A. | 1996 |
B. | 1994 |
C. | 1995 |
D. | 1997 |
Answer» B. 1994 | |
92. |
Supply chain execution is the process of putting supply chain planning in to……………. |
A. | action |
B. | operation |
C. | maintenance |
D. | control |
Answer» B. operation | |
93. |
The cyber crime related to monitoring data flow between shoppers computer ande commerce website |
A. | spoofing |
B. | hacking |
C. | sniffing |
D. | phishing |
Answer» C. sniffing | |
94. |
The participants in an online electronic payment transaction include |
A. | the customer |
B. | the issuer |
C. | the merchant |
D. | all above |
Answer» E. | |
95. |
Which are used for signing and endorsing electronic changes |
A. | manual signature |
B. | thump impression |
C. | digital signature |
D. | spot signature |
Answer» D. spot signature | |
96. |
Which is the creation and development o f communication strategies specificallyfor brands to have meaning and context on the web |
A. | e branding |
B. | branding |
C. | advertising |
D. | none |
Answer» B. branding | |
97. |
……….. refers to supply of goods and services for online govt. procurement |
A. | c2c |
B. | b2g |
C. | b2e |
D. | b2b |
Answer» C. b2e | |
98. |
Gain entry into the user’s system and scan your file system for personalinformation is known as |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | none |
Answer» B. snooping | |
99. |
Which of the following are not the major business models utilized in the B2B are |
A. | e distributor |
B. | e-procurement |
C. | b2b hubs |
D. | none of these |
Answer» E. | |
100. |
The structure of a web page is called it’s |
A. | web design |
B. | web layout |
C. | architecture |
D. | none |
Answer» D. none | |