Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

1.

During E‐commerce transaction we should ensure ___________.

A. ntegrity
B. ecurity
C. onfidentiality
D. ll the above
Answer» E.
2.

The study of encryption is called ___________.

A. ecryption
B. ryptography
C. irewall
D. ll the above
Answer» C. irewall
3.

Which will harm computer resources

A. orm
B. irus
C. rojan horse
D. ll the above
Answer» E.
4.

Which one is not layer of E‐commerce infrastructure?

A. hysical layer
B. roduct layer
C. ervice layer
D. one
Answer» E.
5.

What is an arrangement made between e‐commerce sites that direct users from one site to the other?

A. pam
B. iral marketing
C. ffiliate programs
D. one of the above
Answer» D. one of the above
6.

Which one is not an online payment mode?

A. ash on delivery
B. ebit card
C. redit card
D. ‐cheque
Answer» B. ebit card
7.

Which one is an offline payment mode?

A. ash on delivery
B. ash before delivery
C. redit card
D. oth a and b
Answer» E.
8.

Which one is not an offline payment mode?

A. ash on delivery
B. ash before delivery
C. emand drafts
D. ‐cheque
Answer» E.
9.

Which one is threat for E‐commerce?

A. rojan horse
B. irewall
C. ncryption
D. one
Answer» B. irewall
10.

Public key cryptography is also known as _________ cryptography.

A. rivate key
B. ymmetric
C. symmetric
D. one
Answer» D. one
11.

Private Key cryptography is also known as __________ cryptography.

A. ublic key
B. ymmetric
C. symmetric
D. one
Answer» C. symmetric
12.

Which one is not a threat for E‐commerce?

A. rojan horse
B. iruses
C. orm
D. one
Answer» E.
13.

which one is not an E‐payment method used in India?

A. ebit card
B. redit card
C. ‐cheque
D. one
Answer» E.
14.

The basic elements of website is.

A. ome page
B. eb pages
C. inks and banners
D. ll the above
Answer» E.
15.

Which one is a physical threat?

A. hishing
B. torm
C. arthquake
D. ll the above
Answer» E.
16.

Which one is not a physical threat?

A. acking
B. torm
C. hishing
D. one of the above
Answer» B. torm
17.

Which one is not an encryption technique?

A. SA
B. ES
C. ES
D. TP
Answer» E.
18.

Which one is a client level threat?

A. alicious code
B. iruses
C. ctive contents
D. ll the above
Answer» E.
19.

__________ is backbone of all E‐payments in E‐commerce.

A. FT
B. PS
C. ayPal
D. one of these
Answer» C. ayPal
20.

E‐Banking is also known as.

A. TMs
B. et banking
C. raditional banking
D. one of these
Answer» C. raditional banking
21.

Which one is communication channel security protocol?

A. SL
B. ‐HTTP
C. ET
D. LL OF THE ABOVE
Answer» E.
22.

Which one is communication channel threat?

A. niffer programs
B. yber vandalism
C. ntegrity threats
D. ll of the above
Answer» E.
23.

Secret key is used for.

A. ublic key cryptography
B. rivate key cryptography
C. symmetric key cryptography
D. one of these
Answer» C. symmetric key cryptography
24.

Which e‐government arena is being used when governmental agencies send out and accept bids for work?

A. 2G
B. 2B
C. 2C
D. 2G
Answer» C. 2C
25.

What is A stands in CIA of smart card?

A. uditing
B. uthenticity
C. uthorized
D. one of the above
Answer» C. uthorized
26.

What is I stands in CIA of smart card?

A. nternational
B. ntegrity
C. dentity
D. one of the above
Answer» C. dentity
27.

Which is not a feature of eCommerce?

A. CM
B. DI
C. WW
D. PR
Answer» E.
28.

‐‐‐‐‐‐‐‐‐ card is read only mode.

A. ontact smart card
B. ontactless smart card
C. roximity smart card
D. oth B and C
Answer» D. oth B and C
29.

Which one is not a encryption technique?

A. SA
B. ES
C. ES
D. ONE OF THE ABOVE
Answer» E.
30.

‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.

A. hreat
B. anger
C. rror
D. one of the above
Answer» B. anger
31.

Which is used to identify mobile money?

A. CID
B. MID
C. SID
D. ONE OF THE ABOVE
Answer» C. SID
32.

Which one is the third party payment providers who offer digital wallets for E‐merchants?

A. xicash
B. ayMate
C. ayPass
D. ll the above
Answer» E.
33.

The two main types of Internet-based B2B commerce are_________.

A. et marketplaces and private industrial networks
B. DI and collaborative commerce
C. et marketplaces and collaborative commerce
D. DI and private industrial networks
Answer» E.
34.

What is the unauthorized use, duplication, distribution or sale of copyrighted software?

A. air Use Doctrine
B. irated software
C. ounterfeit software
D. rivacy
Answer» C. ounterfeit software
35.

The foundation for contemporary supply chain management systems includes all of the following except _________.

A. upply chain simplification
B. ontinuous inventory replenishment
C. RP systems
D. 2B electronic storefronts
Answer» E.
36.

The viruses spreads through __________.

A. ails
B. en drives and cds
C. ebsites
D. ll the above
Answer» E.
37.

The virus that are attached with vb and java files are called.

A. acro
B. rojan horse
C. cript virus
D. one of the above
Answer» D. one of the above
38.

The virus that are commonly found in word documents are called __________.

A. acro
B. rojan horse
C. cript virus
D. one of the above
Answer» B. rojan horse
39.

What is the name of the new anti‐Spam bill?

A. o‐Spam
B. AN‐Spam
C. pam‐Away
D. top Spam
Answer» C. pam‐Away
40.

Goods directly involved in the production process are known as _________.

A. RO goods
B. rocured goods
C. ndirect goods
D. irect goods
Answer» E.
41.

Unsolicited e‐mail is called what?

A. unk mail
B. pam
C. xtra mail
D. one of the above
Answer» C. xtra mail
42.

The smart card which use antenna for reading and writing data.

A. ontact smart card
B. ontactless smart card
C. roximity smart card
D. oth B and C
Answer» E.
43.

The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

A. emory
B. icrochip
C. ‐cash
D. one of the above
Answer» C. ‐cash
44.

Which one is the component of cybercash payment system?

A. C user software
B. C merachant software
C. C Server Software
D. ll of the above
Answer» E.
45.

E‐cheques are ________

A. repaid
B. ostpaid
C. oth prepaid and postpaid
D. one of these
Answer» B. ostpaid
46.

The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.

A. CD
B. DI
C. DE
D. CB
Answer» C. DE
47.

Cyber slacking consists of what activities?

A. isiting “inappropriate” web sites
B. isiting news sites
C. hatting online with others about non‐work topics
D. ll of the above
Answer» E.
48.

An auction that has multiple winners that all pay the same price is an example of________.

A. niform pricing
B. iscriminatory pricing
C. id rigging
D. rice matching
Answer» B. iscriminatory pricing
49.

A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?

A. hishing
B. arding
C. rand spoofing
D. ll of the above
Answer» E.
50.

Which of the following portal revenue models involves charging for premium content?

A. SP services
B. eneral advertising
C. ubscription fees
D. enancy deals
Answer» D. enancy deals