Explore topic-wise MCQs in Bachelor of Commerce (B Com).

This section includes 155 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Commerce (B Com) knowledge and support exam preparation. Choose a topic below to get started.

51.

refers to a kind of e-commerce which refers to a company selling or buying from other company

A. B2G
B. B2E
C. B2B
D. P2P
Answer» D. P2P
52.

Trademark uniquely differentiate products from other

A. Inventors
B. Products
C. Investors
D. Pioneers
Answer» C. Investors
53.

A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers

A. Online broker
B. E-payment.
C. Traditional Market
D. Commerce
Answer» C. Traditional Market
54.

Electronic Data Interchange(EDI) standards are:

A. Not universally available
B. Essential for B2B ecommerce
C. Not Essential for B2B ecommerce
D. Still being evolved.
Answer» C. Not Essential for B2B ecommerce
55.

When the exchange of goods and service takes place between a business entity and customers, over the internet, then it is known as

A. Business to Customers model
B. Business to Business model
C. Customers to Business model
D. Customer to Customer model
Answer» B. Business to Business model
56.

A person who breaks in or trespasses a computer system:

A. Hacker
B. Snooper
C. Operator
D. Spoofer
Answer» B. Snooper
57.

Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?

A. Hacker
B. Software
C. Computer Virus
D. Computer Anti-virus
Answer» D. Computer Anti-virus
58.

An informational websitethatprovides information to the public about the company rather than transacting business or providing other services

A. Portal
B. Blog
C. Ereader
D. Corporate Website.
Answer» E.
59.

Which of the following is a correct syntax of HTML?

A. <!doctype HTML>
B. <doctype! HTML>
C. <HTML !doctype>
D. <HTML doctype!>
Answer» B. <doctype! HTML>
60.

Which of the following is basically a concept that consists of the sale of products or services from a business to the general public?

A. B2G
B. B2E
C. B2B
D. B2C
Answer» E.
61.

When some words, pictures or videos is banned from public notice it is called

A. Spamming
B. Censorship
C. Authentication
D. Hiding
Answer» C. Authentication
62.

Which of the following facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties?

A. Metamediary
B. Intermediary
C. Middlemen
D. All of these
Answer» B. Intermediary
63.

This model of e-commerce consists of the sale of products or services from a business to the general public

A. B2C.
B. B2B
C. B2G
D. B2E
Answer» B. B2B
64.

Which e-commerce transaction involves the electronic facilitation of transaction between customers through some third party.

A. C2C
B. B2E
C. B2B
D. B2G
Answer» B. B2E
65.

.e-commerce involves the electronic facilitation of transaction between customers through some third party.

A. C2C
B. B2E
C. B2B
D. B2G
Answer» B. B2E
66.

.in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

A. customer
B. issuer
C. Merchant
D. Acquirer
Answer» B. issuer
67.

Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine?

A. SSl
B. SET
C. Both of these
D. None of these
Answer» C. Both of these
68.

_________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business

A. Dynamic website
B. Static Website
C. phish site
D. none of these
Answer» D. none of these
69.

In Biometrics, ID system is designed to prevent more than one person from using a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» B. Negative ID system
70.

All of the following are major B2C business model except __________.

A. Content provider
B. Industry consortium
C. Transaction broker
D. Service provider
Answer» E.
71.

Public Sector Marketing is also called

A. B2C
B. B2B
C. B2G.
D. B2E
Answer» D. B2E
72.

When goods are purchased without debiting money from your account what type of purchase method are you using?

A. Debit card Purchase
B. Cheque purchase
C. Credit card Purchase
D. Bank transfer purchase
Answer» D. Bank transfer purchase
73.

Which of the following is not suitable for a B2C transaction?

A. Clothes
B. Flowers
C. Airline Reservation
D. None of the above
Answer» E.
74.

In HTML the
tag is used for making

A. Paragraph
B. Italics
C. Bar
D. Line break
Answer» E.
75.

Web pages starts with which ofthe following tag?

A. <Body>
B. <Head>
C. <HTML>.
D. <Title>
Answer» D. <Title>
76.

Web pages are prepared using their language as:

A. HTML
B. HTTP
C. FTP
D. All of the above
Answer» B. HTTP
77.

Which of the following is the most common way for purchasing an online advertising?

A. CPM
B. CPC
C. Any of these
D. None of these
Answer» D. None of these
78.

Which among the following product is suitable for E-Commerce?

A. Books
B. Furnitures
C. All of these
D. None of these
Answer» D. None of these
79.

Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic?

A. Biometrics
B. PIN
C. Password
D. All of the above
Answer» B. PIN
80.

E-cash was created by

A. David Chaum.
B. Mark Zuckerberg
C. Jack Maa
D. Benjamin Young
Answer» B. Mark Zuckerberg
81.

Example of Digital wallet

A. Paytm
B. Mobikwik
C. Ali Pay
D. All of the above.
Answer» E.
82.

Which of the following e-commerce transaction has the advantage of eliminating middlemen?

A. B2G
B. B2B
C. B2E
D. B2C
Answer» D. B2C
83.

A magazine published in electronic form on a computer network.

A. Tablet
B. E-zines.
C. E-mag
D. E-Scroll.
Answer» C. E-mag
84.

A type of fraud that involves diverting the client Internet connection to a counterfeit website.

A. Phishing
B. Pharming.
C. Ddos
D. Virus
Answer» C. Ddos
85.

Among the following, which one is not the limitation of e-commerce?

A. Security
B. High Labour Cost
C. Lack of Privacy
D. Legal issue
Answer» C. Lack of Privacy
86.

Peer to Peer *P2P+ is also used to describe

A. C2C
B. B2E
C. B2B
D. B2C
Answer» B. B2E
87.

When money is debited from your account when purchasing goods, you are using

A. Debit Card Purchase
B. Credit card Purchase
C. Cash Purchase
D. Credit Promissory note purchase
Answer» B. Credit card Purchase
88.

Which one of this is not used for trademarking products

A. Logo
B. Words
C. Feature
D. Symbol
Answer» D. Symbol
89.

A .is a software that scours the internet collecting data about every website and every webpage within it

A. spiders
B. Search Engines
C. robots
D. none of these
Answer» C. robots
90.

Web portals which focus only on one specific industry or domain.

A. Blog
B. Corporate Portal
C. Vertical Portal.
D. Vlog
Answer» D. Vlog
91.

Which among the following is not an example for computer virus?

A. I Love You
B. Jerusalem
C. Melissa
D. Network Firewall
Answer» E.
92.

A businesstransaction between businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a retailer.

A. B2C
B. B2B.
C. B2G
D. B2E
Answer» C. B2G
93.

Which one of them is not an online payment method?

A. Mobile Payment
B. Demand Draft
C. Internet Payment
D. Credit Card
Answer» C. Internet Payment
94.

The first search engine in the world is

A. Yahoo
B. Google
C. Archie.
D. Mozart
Answer» D. Mozart
95.

The long term success of an online business depends on

A. Product differentiation
B. Cost effectiveness
C. Supply Chain Managemen
D. All of the above
Answer» E.
96.

Gaining control of client computer through network is called

A. Snooping
B. Sniffing
C. Buffing
D. Dialling
Answer» B. Sniffing
97.

E-mail which contain useless material is termed as:

A. Spam Mail
B. Trunk Mail
C. Junk Mail
D. Inbox Mail
Answer» D. Inbox Mail
98.

Internet advertising suffers from weaknesses like

A. low response rate
B. intrusiveness
C. Both of the above
D. Neither of the above
Answer» D. Neither of the above
99.

Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure?

A. Black Hat Hacker
B. Spoofer
C. Operator
D. White Hat Hacker
Answer» B. Spoofer
100.

Which one of this is not a search engine?

A. Google
B. Netscape
C. Duck-Duck-Go
D. Bing
Answer» C. Duck-Duck-Go