Explore topic-wise MCQs in Bachelor of Commerce (B Com).

This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Commerce (B Com) knowledge and support exam preparation. Choose a topic below to get started.

1.

This is essentially a business process that connects manufactures retailers, customers and suppliers in the form of a chain to develop deliver products

A. e-commerce
B. edi
C. scm
D. net working
Answer» D. net working
2.

In e- Commerce , they can not explore the stores shelves and product space. They can only search a

A. electronic items
B. specific copy
C. digital catalogue
D. none
Answer» D. none
3.

. Refers to companies for which internet is one of several channels to customers and perhaps not even the primary one

A. traditional commerce
B. e- commerce
C. edi
D. none of these
Answer» C. edi
4.

is a card with a microchip that can be used instead of cash and coins for every thing.

A. electronics cash
B. fast cash
C. electronic purse
D. none
Answer» D. none
5.

There are different types of risks connected with information protection such as disruption, disaster.

A. unauthorized access
B. publicity
C. consumer
D. none
Answer» B. publicity
6.

are electronic files that are used to uniquely identify people and resources over the internet

A. digital signature
B. digital certificate
C. encryption recourse
D. none
Answer» C. encryption recourse
7.

.. techniques make use of secret codes (or) keys to encrypt information

A. cryptography
B. encryption
C. digital certificate
D. none
Answer» B. encryption
8.

can catch the transmissions to obtain customers sensitive information

A. fire wall
B. anti virus
C. hackers
D. none
Answer» D. none
9.

Which is used for transferring money from one bank account to another directly without involving cash

A. eft
B. e-cash
C. micropayment
D. none
Answer» B. e-cash
10.

The two types of credit cards today namely credit cards issued by credit card companies

A. master card , visa
B. smart card credit card
C. debit card, e cash
D. none
Answer» B. smart card credit card
11.

There are two main concerns for using digital coins: anonymity of the consumer and :-

A. prepaid system
B. post paid system
C. electronic tokens
D. online verification
Answer» E.
12.

. Is the process of coding and scrambling of messages to prevent un authorized access to under standing of data being transmitted

A. cryptography
B. encryption
C. security key
D. none
Answer» C. security key
13.

. Encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

A. ssl
B. set
C. secret key
D. none
Answer» C. secret key
14.

. Is used to keep transmissions privacy through the use of data encryption techniques.

A. data encryption
B. crytography
C. security key
D. non e
Answer» C. security key
15.

Which refers to the automatic identification (or) identity verification of living persons using their enduring physical or behavioral characteristics

A. biometrics
B. cryptography
C. encryption
D. none
Answer» B. cryptography
16.

The private content of transaction, if unprotected can be intercepted when it go through the route over the internet called.

A. spoofing
B. snooping
C. sniffing
D. eavesdropping
Answer» E.
17.

Creating illegitimate site that appear to published by established organizations are by this name

A. spoofing
B. snooping
C. sniffing
D. none
Answer» B. snooping
18.

Gain entry into the user s system and scan your file system for personal information is known as

A. spoofing
B. snooping
C. sniffing
D. none
Answer» B. snooping
19.

This is a service that communicates with clients through a set of standard protocols and technologies

A. voip
B. web services
C. xml
D. none
Answer» B. web services
20.

Which is the creation and development o f communication strategies specifically for brands to have meaning and context on the web

A. e branding
B. branding
C. advertising
D. none
Answer» B. branding
21.

Which is a web- roaming program used to find documents pertaining to your search

A. spider
B. meta search engine
C. metatags
D. indexers
Answer» B. meta search engine
22.

Key factors that distinguish mobile marketing form other more traditional informs of marketing is

A. two way
B. permission based
C. targeted
D. all the above
Answer» E.
23.

TV Viewer can interact with what is happening on screens using their mobile phone is

A. cable tv
B. interactive
C. set off box
D. none
Answer» C. set off box
24.

The cyber crime related to monitoring data flow between shoppers computer and e commerce website

A. spoofing
B. hacking
C. sniffing
D. phishing
Answer» C. sniffing
25.

This acts like a gate keeper that examines each users identification before allowing them to enter to the organization internal networks

A. antivirus program
B. biometrics
C. fire wall
D. none
Answer» C. fire wall
26.

This type of electronic payment systems is highly useful to those customers who would like to control over spending

A. post paid payment system
B. pre paid payment system
C. spot payment system
D. none
Answer» C. spot payment system
27.

Which is defined as a financial exchange that takes place on line between buyers and sellers

A. e payment
B. prepaid payment
C. post paid payment
D. non e
Answer» B. prepaid payment
28.

This is a financial instrument which can be used more than once to borrow money or products or credit

A. credit card
B. debit card
C. e- cash
D. non e
Answer» B. debit card
29.

A model describes how the firm will earn revenue, make profit and produce a better return on invested capital is

A. revenue model
B. competitive advantage
C. value proposition
D. markets strategy
Answer» B. competitive advantage
30.

e commerce is conducted between two separate business and has been in effect for many years

A. b2b
B. c2c
C. p2p
D. b2c
Answer» B. c2c
31.

The internets open TCP/IP design was origin ally inspired by use for radio communication network in the

A. 1960 s
B. 1980 s
C. 1970 s
D. 2000 s
Answer» D. 2000 s
32.

is a new architecture if or the development of loosely coupled distributed application

A. s0a
B. wsdl
C. soap
D. uddi
Answer» B. wsdl
33.

This type of network does not allow an external user to access the company data

A. interanet
B. internet
C. extranet
D. none
Answer» B. internet
34.

is a representation language used to create hypertext documents containing text list boxes and graphic

A. html
B. http
C. java
D. none
Answer» B. http
35.

This is a protocol which allows file to be transferred from one computer to another computer

A. tcp/ip
B. ftp
C. http
D. none
Answer» C. http
36.

Which among these is a cheap alternative method to traditional printed catalogues

A. paper catalogue
B. floppy
C. cd rom s
D. none
Answer» D. none
37.

This is an internet based interactive search device that enables a user to search for information on the internet.

A. portal
B. browser
C. search engine
D. none
Answer» C. search engine
38.

is an internet standard (or) set of rules that allows the exchange of information on the www

A. http
B. ftp
C. tcp/ip
D. telnet
Answer» B. ftp
39.

Arrange the steps to Ecommerce1) Security2) Process payment3) Service & support4) Generating demand5) ordering & fulfillment

A. 4,5,2,3
B. 5,3,1,2,4
C. 1,2,3,4,5
D. 3,2,5,1,4
Answer» B. 5,3,1,2,4
40.

These portals simply provide tools , information articles, research & statistics on the specific industry

A. horizontal
B. vertical
C. enterprise
D. none
Answer» C. enterprise
41.

Business to consumer involves customers gathering information, purchasing and receiving products through.

A. catalogue
B. store
C. electronic network
D. none
Answer» D. none
42.

This is a form of advt. on the web that appears between web pages that the user requests

A. banner advt
B. floating advt
C. interstitials
D. none
Answer» D. none
43.

EDI cannot be implemented but requires the co-operation of trading partners

A. unilaterally
B. bilaterally
C. multilaterally
D. all the above
Answer» B. bilaterally
44.

The cost of participating in a public exchange is significantly .. than implementing out own SCM systems

A. higher
B. lower
C. medium
D. non
Answer» C. medium
45.

Supply chain execution is the process of putting supply chain planning in to .

A. action
B. operation
C. maintenance
D. control
Answer» B. operation
46.

Essential elements needed to develop successful business model in any field are .

A. value proposition
B. revenue model
C. competitive advantage
D. all the above
Answer» E.