MCQOPTIONS
Saved Bookmarks
This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Master of Business Administration (MBA) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
is a set of standards developed in the 1960s to exchange business information and to do electronic transactions |
| A. | EDI |
| B. | Protocols |
| C. | TCP/IP |
| D. | None of these |
| Answer» B. Protocols | |
| 2. |
is concerned with the buying and selling information, products and services over computer communication networks |
| A. | Commerce |
| B. | E-Commerce |
| C. | E-Business |
| D. | None of these |
| Answer» C. E-Business | |
| 3. |
is the exchange of goods or items or commodities and services or applications used for money and deals the money matters |
| A. | E-commerce |
| B. | Commerce |
| C. | Both of these |
| D. | none |
| Answer» C. Both of these | |
| 4. |
is an approach to deliver information differentiated business values called services by combining the system and process generally called resources |
| A. | E-busines |
| B. | E-commerce |
| C. | any of these |
| D. | none |
| Answer» B. E-commerce | |
| 5. |
is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products. |
| A. | E-commerce |
| B. | EDI |
| C. | SCM |
| D. | Networking |
| Answer» D. Networking | |
| 6. |
is a systems approach to Managing the entire flow of information, materials, and services from raw material suppliers through factories and warehouses to the end customer. |
| A. | CRM |
| B. | SRM |
| C. | EDI |
| D. | SCM |
| Answer» E. | |
| 7. |
is a form of supply chain where a series of assembly operations are carried out to obtain the final product |
| A. | Converging supply chain |
| B. | Diverging supply chain |
| C. | Any of these |
| D. | None |
| Answer» B. Diverging supply chain | |
| 8. |
streamlines the flow of information and self service capabilities through automation |
| A. | SCC |
| B. | CRM |
| C. | CRP |
| D. | SCM |
| Answer» B. CRM | |
| 9. |
credit card gives all the advantages of a normal credit card without worrying about the interest charges |
| A. | Prepaid |
| B. | Post paid |
| C. | both of these |
| D. | none of these |
| Answer» B. Post paid | |
| 10. |
is a financial instrument which can be used more than once to borrow money or buy products and services on credit. |
| A. | Credit card |
| B. | E-Cheques |
| C. | E-cash |
| D. | none of these |
| Answer» B. E-Cheques | |
| 11. |
is a kind of payment card that transfers fund directly from the consumer s bank account to the merchants account |
| A. | Debit Card |
| B. | Electronic purse |
| C. | credit card |
| D. | any of these |
| Answer» B. Electronic purse | |
| 12. |
..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation. |
| A. | Debit Card |
| B. | Electronic purse |
| C. | credit card |
| D. | any of these |
| Answer» C. credit card | |
| 13. |
The verification of credit card is done by using with a communications link to the merchants acquiring bank |
| A. | Credit card payment terminal |
| B. | Point of Sale |
| C. | All of these |
| D. | none of these |
| Answer» D. none of these | |
| 14. |
In Biometrics, ID system is designed to prevent more than one person from using a single identity |
| A. | Positive ID system |
| B. | Negative ID system |
| C. | both of these |
| D. | none of these |
| Answer» B. Negative ID system | |
| 15. |
are program developed by some dishonest people to destroy the computer system and the valuable information in it. |
| A. | Network firewall |
| B. | computer virus |
| C. | both of these |
| D. | none of these |
| Answer» C. both of these | |
| 16. |
In Biometrics, ID system is designed to prevent one person from using more than one identity |
| A. | Positive ID system |
| B. | Negative ID system |
| C. | both of these |
| D. | none of these |
| Answer» C. both of these | |
| 17. |
acts like a gate keeper that examines each users identification before allowing them to enter to the organization s internal networks. |
| A. | Network firewall |
| B. | Antivirus |
| C. | both of these |
| D. | none of these |
| Answer» B. Antivirus | |
| 18. |
Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet. |
| A. | Network firewall |
| B. | Antivirus |
| C. | both of these |
| D. | none of these |
| Answer» B. Antivirus | |
| 19. |
Gain entry into the user s system and scan your file system for personal information is known as . |
| A. | Spoofing |
| B. | Snooping |
| C. | Sniffing |
| D. | None of these |
| Answer» C. Sniffing | |
| 20. |
Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as . |
| A. | Spoofing |
| B. | Snooping |
| C. | Sniffing |
| D. | None of these |
| Answer» B. Snooping | |
| 21. |
is the reverse process of encryption, to make the information readable once again |
| A. | Spoofing |
| B. | Decryption |
| C. | Sniffing |
| D. | Cryptography |
| Answer» C. Sniffing | |
| 22. |
A is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications |
| A. | Digital signature |
| B. | Digital certificates |
| C. | SSL |
| D. | none of these |
| Answer» C. SSL | |
| 23. |
A provides a way to associate the message with the sender and is the equivalent of an ordinary signature. |
| A. | cyber signature |
| B. | Digital signature |
| C. | SSL |
| D. | none of these |
| Answer» C. SSL | |
| 24. |
e-commerce consists of the sale of products or services from a business to the general public |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | B2C |
| Answer» E. | |
| 25. |
e-commerce involves the electronic facilitation of transaction between customers through some third party. |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | C2C |
| Answer» E. | |
| 26. |
is an online auctioning site that facilitates the trade of privately owned items between individuals. |
| A. | e-Bay |
| B. | Amazon.com |
| C. | Rentalic.com |
| D. | all of these |
| Answer» B. Amazon.com | |
| 27. |
is a form of advertisement on the web that appears between web pages that the user requests. |
| A. | Banner ad |
| B. | floating ads |
| C. | interstitials |
| D. | Unicast ads |
| Answer» D. Unicast ads | |
| 28. |
A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an example of transaction. |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | P2P |
| Answer» D. P2P | |
| 29. |
are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content. |
| A. | Ultramercial |
| B. | pop-up ads |
| C. | Spam e-mail |
| D. | malware |
| Answer» B. pop-up ads | |
| 30. |
A is a software that scours the internet collecting data about every website and every webpage within it |
| A. | spider |
| B. | Search Engines |
| C. | robots |
| D. | none of these |
| Answer» C. robots | |
| 31. |
Search Engines databases are selected and built by computer robot programs called |
| A. | spider |
| B. | Search Engines |
| C. | robots |
| D. | none of these |
| Answer» B. Search Engines | |
| 32. |
is an internet network that allows users with the same network in software to connect to each other s hard disks and exchange files |
| A. | P2P |
| B. | B2E |
| C. | B2B |
| D. | B2C |
| Answer» B. B2E | |
| 33. |
is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants |
| A. | Mobile Commerce |
| B. | e-commerce |
| C. | both of these |
| D. | none of these |
| Answer» B. e-commerce | |
| 34. |
e-commerce involves customers gathering information, purchasing and receiving products over an electronic network |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | B2C |
| Answer» E. | |
| 35. |
is a programme designed o replicate and spread generally with the victim being oblivious to its existence |
| A. | hacker |
| B. | software |
| C. | Computer virus |
| D. | none of these |
| Answer» D. none of these | |
| 36. |
A is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure. |
| A. | Hacker |
| B. | spoofer |
| C. | operator |
| D. | none of these |
| Answer» B. spoofer | |