

MCQOPTIONS
Saved Bookmarks
This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Commerce (B Com) knowledge and support exam preparation. Choose a topic below to get started.
1. |
This is essentially a business process that connects manufactures retailers, customers and suppliers in the form of a chain to develop deliver products |
A. | e-commerce |
B. | edi |
C. | scm |
D. | net working |
Answer» D. net working | |
2. |
In e- Commerce , they can not explore the stores shelves and product space. They can only search a |
A. | electronic items |
B. | specific copy |
C. | digital catalogue |
D. | none |
Answer» D. none | |
3. |
. Refers to companies for which internet is one of several channels to customers and perhaps not even the primary one |
A. | traditional commerce |
B. | e- commerce |
C. | edi |
D. | none of these |
Answer» C. edi | |
4. |
is a card with a microchip that can be used instead of cash and coins for every thing. |
A. | electronics cash |
B. | fast cash |
C. | electronic purse |
D. | none |
Answer» D. none | |
5. |
There are different types of risks connected with information protection such as disruption, disaster. |
A. | unauthorized access |
B. | publicity |
C. | consumer |
D. | none |
Answer» B. publicity | |
6. |
are electronic files that are used to uniquely identify people and resources over the internet |
A. | digital signature |
B. | digital certificate |
C. | encryption recourse |
D. | none |
Answer» C. encryption recourse | |
7. |
.. techniques make use of secret codes (or) keys to encrypt information |
A. | cryptography |
B. | encryption |
C. | digital certificate |
D. | none |
Answer» B. encryption | |
8. |
can catch the transmissions to obtain customers sensitive information |
A. | fire wall |
B. | anti virus |
C. | hackers |
D. | none |
Answer» D. none | |
9. |
Which is used for transferring money from one bank account to another directly without involving cash |
A. | eft |
B. | e-cash |
C. | micropayment |
D. | none |
Answer» B. e-cash | |
10. |
The two types of credit cards today namely credit cards issued by credit card companies |
A. | master card , visa |
B. | smart card credit card |
C. | debit card, e cash |
D. | none |
Answer» B. smart card credit card | |
11. |
There are two main concerns for using digital coins: anonymity of the consumer and :- |
A. | prepaid system |
B. | post paid system |
C. | electronic tokens |
D. | online verification |
Answer» E. | |
12. |
. Is the process of coding and scrambling of messages to prevent un authorized access to under standing of data being transmitted |
A. | cryptography |
B. | encryption |
C. | security key |
D. | none |
Answer» C. security key | |
13. |
. Encrypts payment card transaction data and verifies that both parties in the transaction are genuine. |
A. | ssl |
B. | set |
C. | secret key |
D. | none |
Answer» C. secret key | |
14. |
. Is used to keep transmissions privacy through the use of data encryption techniques. |
A. | data encryption |
B. | crytography |
C. | security key |
D. | non e |
Answer» C. security key | |
15. |
Which refers to the automatic identification (or) identity verification of living persons using their enduring physical or behavioral characteristics |
A. | biometrics |
B. | cryptography |
C. | encryption |
D. | none |
Answer» B. cryptography | |
16. |
The private content of transaction, if unprotected can be intercepted when it go through the route over the internet called. |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | eavesdropping |
Answer» E. | |
17. |
Creating illegitimate site that appear to published by established organizations are by this name |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | none |
Answer» B. snooping | |
18. |
Gain entry into the user s system and scan your file system for personal information is known as |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | none |
Answer» B. snooping | |
19. |
This is a service that communicates with clients through a set of standard protocols and technologies |
A. | voip |
B. | web services |
C. | xml |
D. | none |
Answer» B. web services | |
20. |
Which is the creation and development o f communication strategies specifically for brands to have meaning and context on the web |
A. | e branding |
B. | branding |
C. | advertising |
D. | none |
Answer» B. branding | |
21. |
Which is a web- roaming program used to find documents pertaining to your search |
A. | spider |
B. | meta search engine |
C. | metatags |
D. | indexers |
Answer» B. meta search engine | |
22. |
Key factors that distinguish mobile marketing form other more traditional informs of marketing is |
A. | two way |
B. | permission based |
C. | targeted |
D. | all the above |
Answer» E. | |
23. |
TV Viewer can interact with what is happening on screens using their mobile phone is |
A. | cable tv |
B. | interactive |
C. | set off box |
D. | none |
Answer» C. set off box | |
24. |
The cyber crime related to monitoring data flow between shoppers computer and e commerce website |
A. | spoofing |
B. | hacking |
C. | sniffing |
D. | phishing |
Answer» C. sniffing | |
25. |
This acts like a gate keeper that examines each users identification before allowing them to enter to the organization internal networks |
A. | antivirus program |
B. | biometrics |
C. | fire wall |
D. | none |
Answer» C. fire wall | |
26. |
This type of electronic payment systems is highly useful to those customers who would like to control over spending |
A. | post paid payment system |
B. | pre paid payment system |
C. | spot payment system |
D. | none |
Answer» C. spot payment system | |
27. |
Which is defined as a financial exchange that takes place on line between buyers and sellers |
A. | e payment |
B. | prepaid payment |
C. | post paid payment |
D. | non e |
Answer» B. prepaid payment | |
28. |
This is a financial instrument which can be used more than once to borrow money or products or credit |
A. | credit card |
B. | debit card |
C. | e- cash |
D. | non e |
Answer» B. debit card | |
29. |
A model describes how the firm will earn revenue, make profit and produce a better return on invested capital is |
A. | revenue model |
B. | competitive advantage |
C. | value proposition |
D. | markets strategy |
Answer» B. competitive advantage | |
30. |
e commerce is conducted between two separate business and has been in effect for many years |
A. | b2b |
B. | c2c |
C. | p2p |
D. | b2c |
Answer» B. c2c | |
31. |
The internets open TCP/IP design was origin ally inspired by use for radio communication network in the |
A. | 1960 s |
B. | 1980 s |
C. | 1970 s |
D. | 2000 s |
Answer» D. 2000 s | |
32. |
is a new architecture if or the development of loosely coupled distributed application |
A. | s0a |
B. | wsdl |
C. | soap |
D. | uddi |
Answer» B. wsdl | |
33. |
This type of network does not allow an external user to access the company data |
A. | interanet |
B. | internet |
C. | extranet |
D. | none |
Answer» B. internet | |
34. |
is a representation language used to create hypertext documents containing text list boxes and graphic |
A. | html |
B. | http |
C. | java |
D. | none |
Answer» B. http | |
35. |
This is a protocol which allows file to be transferred from one computer to another computer |
A. | tcp/ip |
B. | ftp |
C. | http |
D. | none |
Answer» C. http | |
36. |
Which among these is a cheap alternative method to traditional printed catalogues |
A. | paper catalogue |
B. | floppy |
C. | cd rom s |
D. | none |
Answer» D. none | |
37. |
This is an internet based interactive search device that enables a user to search for information on the internet. |
A. | portal |
B. | browser |
C. | search engine |
D. | none |
Answer» C. search engine | |
38. |
is an internet standard (or) set of rules that allows the exchange of information on the www |
A. | http |
B. | ftp |
C. | tcp/ip |
D. | telnet |
Answer» B. ftp | |
39. |
Arrange the steps to Ecommerce1) Security2) Process payment3) Service & support4) Generating demand5) ordering & fulfillment |
A. | 4,5,2,3 |
B. | 5,3,1,2,4 |
C. | 1,2,3,4,5 |
D. | 3,2,5,1,4 |
Answer» B. 5,3,1,2,4 | |
40. |
These portals simply provide tools , information articles, research & statistics on the specific industry |
A. | horizontal |
B. | vertical |
C. | enterprise |
D. | none |
Answer» C. enterprise | |
41. |
Business to consumer involves customers gathering information, purchasing and receiving products through. |
A. | catalogue |
B. | store |
C. | electronic network |
D. | none |
Answer» D. none | |
42. |
This is a form of advt. on the web that appears between web pages that the user requests |
A. | banner advt |
B. | floating advt |
C. | interstitials |
D. | none |
Answer» D. none | |
43. |
EDI cannot be implemented but requires the co-operation of trading partners |
A. | unilaterally |
B. | bilaterally |
C. | multilaterally |
D. | all the above |
Answer» B. bilaterally | |
44. |
The cost of participating in a public exchange is significantly .. than implementing out own SCM systems |
A. | higher |
B. | lower |
C. | medium |
D. | non |
Answer» C. medium | |
45. |
Supply chain execution is the process of putting supply chain planning in to . |
A. | action |
B. | operation |
C. | maintenance |
D. | control |
Answer» B. operation | |
46. |
Essential elements needed to develop successful business model in any field are . |
A. | value proposition |
B. | revenue model |
C. | competitive advantage |
D. | all the above |
Answer» E. | |