

MCQOPTIONS
Saved Bookmarks
This section includes 155 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Commerce (B Com) knowledge and support exam preparation. Choose a topic below to get started.
51. |
refers to a kind of e-commerce which refers to a company selling or buying from other company |
A. | B2G |
B. | B2E |
C. | B2B |
D. | P2P |
Answer» D. P2P | |
52. |
Trademark uniquely differentiate products from other |
A. | Inventors |
B. | Products |
C. | Investors |
D. | Pioneers |
Answer» C. Investors | |
53. |
A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers |
A. | Online broker |
B. | E-payment. |
C. | Traditional Market |
D. | Commerce |
Answer» C. Traditional Market | |
54. |
Electronic Data Interchange(EDI) standards are: |
A. | Not universally available |
B. | Essential for B2B ecommerce |
C. | Not Essential for B2B ecommerce |
D. | Still being evolved. |
Answer» C. Not Essential for B2B ecommerce | |
55. |
When the exchange of goods and service takes place between a business entity and customers, over the internet, then it is known as |
A. | Business to Customers model |
B. | Business to Business model |
C. | Customers to Business model |
D. | Customer to Customer model |
Answer» B. Business to Business model | |
56. |
A person who breaks in or trespasses a computer system: |
A. | Hacker |
B. | Snooper |
C. | Operator |
D. | Spoofer |
Answer» B. Snooper | |
57. |
Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence? |
A. | Hacker |
B. | Software |
C. | Computer Virus |
D. | Computer Anti-virus |
Answer» D. Computer Anti-virus | |
58. |
An informational websitethatprovides information to the public about the company rather than transacting business or providing other services |
A. | Portal |
B. | Blog |
C. | Ereader |
D. | Corporate Website. |
Answer» E. | |
59. |
Which of the following is a correct syntax of HTML? |
A. | <!doctype HTML> |
B. | <doctype! HTML> |
C. | <HTML !doctype> |
D. | <HTML doctype!> |
Answer» B. <doctype! HTML> | |
60. |
Which of the following is basically a concept that consists of the sale of products or services from a business to the general public? |
A. | B2G |
B. | B2E |
C. | B2B |
D. | B2C |
Answer» E. | |
61. |
When some words, pictures or videos is banned from public notice it is called |
A. | Spamming |
B. | Censorship |
C. | Authentication |
D. | Hiding |
Answer» C. Authentication | |
62. |
Which of the following facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties? |
A. | Metamediary |
B. | Intermediary |
C. | Middlemen |
D. | All of these |
Answer» B. Intermediary | |
63. |
This model of e-commerce consists of the sale of products or services from a business to the general public |
A. | B2C. |
B. | B2B |
C. | B2G |
D. | B2E |
Answer» B. B2B | |
64. |
Which e-commerce transaction involves the electronic facilitation of transaction between customers through some third party. |
A. | C2C |
B. | B2E |
C. | B2B |
D. | B2G |
Answer» B. B2E | |
65. |
.e-commerce involves the electronic facilitation of transaction between customers through some third party. |
A. | C2C |
B. | B2E |
C. | B2B |
D. | B2G |
Answer» B. B2E | |
66. |
.in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer |
A. | customer |
B. | issuer |
C. | Merchant |
D. | Acquirer |
Answer» B. issuer | |
67. |
Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine? |
A. | SSl |
B. | SET |
C. | Both of these |
D. | None of these |
Answer» C. Both of these | |
68. |
_________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business |
A. | Dynamic website |
B. | Static Website |
C. | phish site |
D. | none of these |
Answer» D. none of these | |
69. |
In Biometrics, ID system is designed to prevent more than one person from using a single identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» B. Negative ID system | |
70. |
All of the following are major B2C business model except __________. |
A. | Content provider |
B. | Industry consortium |
C. | Transaction broker |
D. | Service provider |
Answer» E. | |
71. |
Public Sector Marketing is also called |
A. | B2C |
B. | B2B |
C. | B2G. |
D. | B2E |
Answer» D. B2E | |
72. |
When goods are purchased without debiting money from your account what type of purchase method are you using? |
A. | Debit card Purchase |
B. | Cheque purchase |
C. | Credit card Purchase |
D. | Bank transfer purchase |
Answer» D. Bank transfer purchase | |
73. |
Which of the following is not suitable for a B2C transaction? |
A. | Clothes |
B. | Flowers |
C. | Airline Reservation |
D. | None of the above |
Answer» E. | |
74. |
In HTML the
|
A. | Paragraph |
B. | Italics |
C. | Bar |
D. | Line break |
Answer» E. | |
75. |
Web pages starts with which ofthe following tag? |
A. | <Body> |
B. | <Head> |
C. | <HTML>. |
D. | <Title> |
Answer» D. <Title> | |
76. |
Web pages are prepared using their language as: |
A. | HTML |
B. | HTTP |
C. | FTP |
D. | All of the above |
Answer» B. HTTP | |
77. |
Which of the following is the most common way for purchasing an online advertising? |
A. | CPM |
B. | CPC |
C. | Any of these |
D. | None of these |
Answer» D. None of these | |
78. |
Which among the following product is suitable for E-Commerce? |
A. | Books |
B. | Furnitures |
C. | All of these |
D. | None of these |
Answer» D. None of these | |
79. |
Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic? |
A. | Biometrics |
B. | PIN |
C. | Password |
D. | All of the above |
Answer» B. PIN | |
80. |
E-cash was created by |
A. | David Chaum. |
B. | Mark Zuckerberg |
C. | Jack Maa |
D. | Benjamin Young |
Answer» B. Mark Zuckerberg | |
81. |
Example of Digital wallet |
A. | Paytm |
B. | Mobikwik |
C. | Ali Pay |
D. | All of the above. |
Answer» E. | |
82. |
Which of the following e-commerce transaction has the advantage of eliminating middlemen? |
A. | B2G |
B. | B2B |
C. | B2E |
D. | B2C |
Answer» D. B2C | |
83. |
A magazine published in electronic form on a computer network. |
A. | Tablet |
B. | E-zines. |
C. | E-mag |
D. | E-Scroll. |
Answer» C. E-mag | |
84. |
A type of fraud that involves diverting the client Internet connection to a counterfeit website. |
A. | Phishing |
B. | Pharming. |
C. | Ddos |
D. | Virus |
Answer» C. Ddos | |
85. |
Among the following, which one is not the limitation of e-commerce? |
A. | Security |
B. | High Labour Cost |
C. | Lack of Privacy |
D. | Legal issue |
Answer» C. Lack of Privacy | |
86. |
Peer to Peer *P2P+ is also used to describe |
A. | C2C |
B. | B2E |
C. | B2B |
D. | B2C |
Answer» B. B2E | |
87. |
When money is debited from your account when purchasing goods, you are using |
A. | Debit Card Purchase |
B. | Credit card Purchase |
C. | Cash Purchase |
D. | Credit Promissory note purchase |
Answer» B. Credit card Purchase | |
88. |
Which one of this is not used for trademarking products |
A. | Logo |
B. | Words |
C. | Feature |
D. | Symbol |
Answer» D. Symbol | |
89. |
A .is a software that scours the internet collecting data about every website and every webpage within it |
A. | spiders |
B. | Search Engines |
C. | robots |
D. | none of these |
Answer» C. robots | |
90. |
Web portals which focus only on one specific industry or domain. |
A. | Blog |
B. | Corporate Portal |
C. | Vertical Portal. |
D. | Vlog |
Answer» D. Vlog | |
91. |
Which among the following is not an example for computer virus? |
A. | I Love You |
B. | Jerusalem |
C. | Melissa |
D. | Network Firewall |
Answer» E. | |
92. |
A businesstransaction between businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a retailer. |
A. | B2C |
B. | B2B. |
C. | B2G |
D. | B2E |
Answer» C. B2G | |
93. |
Which one of them is not an online payment method? |
A. | Mobile Payment |
B. | Demand Draft |
C. | Internet Payment |
D. | Credit Card |
Answer» C. Internet Payment | |
94. |
The first search engine in the world is |
A. | Yahoo |
B. | |
C. | Archie. |
D. | Mozart |
Answer» D. Mozart | |
95. |
The long term success of an online business depends on |
A. | Product differentiation |
B. | Cost effectiveness |
C. | Supply Chain Managemen |
D. | All of the above |
Answer» E. | |
96. |
Gaining control of client computer through network is called |
A. | Snooping |
B. | Sniffing |
C. | Buffing |
D. | Dialling |
Answer» B. Sniffing | |
97. |
E-mail which contain useless material is termed as: |
A. | Spam Mail |
B. | Trunk Mail |
C. | Junk Mail |
D. | Inbox Mail |
Answer» D. Inbox Mail | |
98. |
Internet advertising suffers from weaknesses like |
A. | low response rate |
B. | intrusiveness |
C. | Both of the above |
D. | Neither of the above |
Answer» D. Neither of the above | |
99. |
Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure? |
A. | Black Hat Hacker |
B. | Spoofer |
C. | Operator |
D. | White Hat Hacker |
Answer» B. Spoofer | |
100. |
Which one of this is not a search engine? |
A. | |
B. | Netscape |
C. | Duck-Duck-Go |
D. | Bing |
Answer» C. Duck-Duck-Go | |