Explore topic-wise MCQs in Master of Business Administration (MBA).

This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Master of Business Administration (MBA) knowledge and support exam preparation. Choose a topic below to get started.

1.

is a set of standards developed in the 1960s to exchange business information and to do electronic transactions

A. EDI
B. Protocols
C. TCP/IP
D. None of these
Answer» B. Protocols
2.

is concerned with the buying and selling information, products and services over computer communication networks

A. Commerce
B. E-Commerce
C. E-Business
D. None of these
Answer» C. E-Business
3.

is the exchange of goods or items or commodities and services or applications used for money and deals the money matters

A. E-commerce
B. Commerce
C. Both of these
D. none
Answer» C. Both of these
4.

is an approach to deliver information differentiated business values called services by combining the system and process generally called resources

A. E-busines
B. E-commerce
C. any of these
D. none
Answer» B. E-commerce
5.

is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products.

A. E-commerce
B. EDI
C. SCM
D. Networking
Answer» D. Networking
6.

is a systems approach to Managing the entire flow of information, materials, and services from raw material suppliers through factories and warehouses to the end customer.

A. CRM
B. SRM
C. EDI
D. SCM
Answer» E.
7.

is a form of supply chain where a series of assembly operations are carried out to obtain the final product

A. Converging supply chain
B. Diverging supply chain
C. Any of these
D. None
Answer» B. Diverging supply chain
8.

streamlines the flow of information and self service capabilities through automation

A. SCC
B. CRM
C. CRP
D. SCM
Answer» B. CRM
9.

credit card gives all the advantages of a normal credit card without worrying about the interest charges

A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer» B. Post paid
10.

is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer» B. E-Cheques
11.

is a kind of payment card that transfers fund directly from the consumer s bank account to the merchants account

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» B. Electronic purse
12.

..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» C. credit card
13.

The verification of credit card is done by using with a communications link to the merchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer» D. none of these
14.

In Biometrics, ID system is designed to prevent more than one person from using a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» B. Negative ID system
15.

are program developed by some dishonest people to destroy the computer system and the valuable information in it.

A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer» C. both of these
16.

In Biometrics, ID system is designed to prevent one person from using more than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» C. both of these
17.

acts like a gate keeper that examines each users identification before allowing them to enter to the organization s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
18.

Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
19.

Gain entry into the user s system and scan your file system for personal information is known as .

A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» C. Sniffing
20.

Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as .

A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» B. Snooping
21.

is the reverse process of encryption, to make the information readable once again

A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Answer» C. Sniffing
22.

A is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer» C. SSL
23.

A provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer» C. SSL
24.

e-commerce consists of the sale of products or services from a business to the general public

A. B2G
B. B2E
C. B2B
D. B2C
Answer» E.
25.

e-commerce involves the electronic facilitation of transaction between customers through some third party.

A. B2G
B. B2E
C. B2B
D. C2C
Answer» E.
26.

is an online auctioning site that facilitates the trade of privately owned items between individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer» B. Amazon.com
27.

is a form of advertisement on the web that appears between web pages that the user requests.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» D. Unicast ads
28.

A company that manufacturers bicycles may use the internet to purchase tyres from their suppliers. This is an example of transaction.

A. B2G
B. B2E
C. B2B
D. P2P
Answer» D. P2P
29.

are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content.

A. Ultramercial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» B. pop-up ads
30.

A is a software that scours the internet collecting data about every website and every webpage within it

A. spider
B. Search Engines
C. robots
D. none of these
Answer» C. robots
31.

Search Engines databases are selected and built by computer robot programs called

A. spider
B. Search Engines
C. robots
D. none of these
Answer» B. Search Engines
32.

is an internet network that allows users with the same network in software to connect to each other s hard disks and exchange files

A. P2P
B. B2E
C. B2B
D. B2C
Answer» B. B2E
33.

is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants

A. Mobile Commerce
B. e-commerce
C. both of these
D. none of these
Answer» B. e-commerce
34.

e-commerce involves customers gathering information, purchasing and receiving products over an electronic network

A. B2G
B. B2E
C. B2B
D. B2C
Answer» E.
35.

is a programme designed o replicate and spread generally with the victim being oblivious to its existence

A. hacker
B. software
C. Computer virus
D. none of these
Answer» D. none of these
36.

A is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

A. Hacker
B. spoofer
C. operator
D. none of these
Answer» B. spoofer