50+ MCQ’s On E-Commerce | Computer Systems and Applications

MCQ’s On E-Commerce

MCQ's On E-Commerce
MCQ’s On E-Commerce

1. Affiliate revenue is also called as _______.
(a) Commission
(b) Brokerage
(c) Referral Fee
(d) Discount

2. Standards of EDI are decided by ______
(a) ASCII
(b) ANSI
(c) USA
(d) Government

3. ______ means converting readable text to unreadable text.
(a) Conversion
(b) Decryption
(c) Encryption
(d) Decoding

4. ______ means converting unreadable text to readable text.
(a) Conversion
(b) Decryption
(c) Encryption
(d) Decoding

5. _____ changes URL from http to https.
(a) SSL
(b) SET
(c) E-COMMERCE
(d) M-COMMERCE

6. In ____ server-side authentication is compulsory.
(a) SSL
(b) SET
(c) E-COMMERCE
(d) M-COMMERCE

7. An online retail store is called as _____.
(a) Trader
(b) Retailer
(c) E-tailer
(d) Amazon

8. In _______, one consumer deals with another consumer.
(a) C2C
(b) B2C
(c) B2B
(d) P2P

9. Full form of SET is _________
(a) Safe Electronic Transaction
(b) Secured Electronic Transaction
(c) Safe Electrical Transaction
(d) Secured E-commerce Transaction

10. amazon.com is an example of ______
(a) B2B
(b) B2C
(c) C2C
(d) P2P

Answers: 1-Referral Fee, 2-ANSI, 3-Encryption, 4-Decryption, 5-SSL, 6-SSL, 7-E-tailer, 8-C2C, 9-Secured Electronic Transaction, 10-B2C

11. In SSL encryption is done using ____ key.
(a) Public
(b) Private
(c) Session
(d) Symmetric

12. ____ is an online retail store.
(a) Portal
(b) Service Provider
(c) E-Tailer
(d) Content Provider

13. Identify the identity of a person or entity with whom you are dealing on Internet is known as ______.
(a) Integrity
(b) Authenticity
(c) Authorisation
(d) None of These

14. ____ means that the information being displayed on a Web site/transmitted/received over the Internet has not been changed in any way by an un-authorised party.
(a) Integrity
(b) Authenticity
(c) Authorisation
(d) None of These

15. In public key encryption ______ keys are used.
(a) Public and Private
(b) Only Public
(c) Only Private
(d) Session 

16. SET is developed by association led by _________.
(a) Master Card and Visa
(b) Master Card
(c) Visa
(d) Rupay

17. The technology behind M-commerce is based on ______.
(a) HTTP
(b) HTTPS
(c) WAP
(d) POP

18 PayPal is an example of _____
(a) Digital Cash
(b) Online Stored Value
(c) Credit Card
(d) Digital Cheque

19. ________ is virtual representation of physical market.
(a) EDI
(b) Electronic Market
(c) E-Commerce
(d) Internet Commerce

20. _____ allows you paperless transactions.
(a) EDI
(b) Electronic Market
(c) E-Commerce
(d) Internet Commerce

Answers: 11-Session, 12-E-Tailer, 13-Authenticity, 14-Integrity, 15-Public and Private, 16-Master Card and Visa, 17-WAP, 18-Online Stored Value, 19-Electronic Market, 20-EDI

21. _____ means the information being displayed on a Web site or transmitted or received over the Internet has not been changed in any way by an unauthorized party.
(a) Integrity
(b) Confidentiality
(c) Authenticity
(d) Privacy

22. The protocol used for M-Commerce is ____
(a) Internet Protocol
(b) Mobile Internet Protocol
(c) Wireless Application Protocol
(d) File Transfer Protocol

23. In ________ encryption is performed with session key.
(a) Public Key
(b) Private Key
(c) SSL
(d) SET

24. Full form of SSL is _______
(a) Secure Systematic Language
(b) Secure Sockets Layer
(c) Simple Secure Layer
(d) Shopping Secure Line

25. olx.com is an example of ________
(a) B2B
(b) B2C
(c) C2C
(d) P2P

26. ______ are sites that creates a digital online environment where people with similar interest can transact.
(a) Community Provider
(b) Market Creator
(c) Portal
(d) Service Provider

27. Flipkart.com is an example of _______.
(a) B2B
(b) B2C
(c) C2C
(d) P2P

28. Normally in M-commerce language used to create web pages is _______.
(a) HTML
(b) WML
(c) VB
(d) XML

29. _____ is an art of attempting to acquire information by masked as trustworthy entity.
(a) Hacking
(b) Phishing
(c) Sniffing
(d) Spoofing

30. SSL can be used only with _____.
(a) FTP
(b) HTTP
(c) POP
(d) SMTP

Answers: 21-Integrity, 22-Wireless Application Protocol, 23-SSL, 24-Secure Sockets Layer, 25-C2C, 26-Community Provider, 27-B2C, 28-WML, 29-Phishing, 30-HTTP 

31. _____ means converting cipher text to plain text.
(a) Encryption
(b) Decryption
(c) Conversion
(d) De-conversion

32. ______ means converting plain text to cipher text.
(a) Encryption
(b) Decryption
(c) Conversion
(d) De-conversion

33. In Public Key Encryption ______ key is used for Encryption.
(a) Receiver’s Public
(b) Receiver’s Private
(c) Sender’s Public
(d) Sender’s Private

34. In Public Key Encryption ______ key is used for Decryption.
(a) Receiver’s Public
(b) Receiver’s Private
(c) Sender’s Public
(d) Sender’s Private

35. _____ can read the cipher text.
(a) Sender
(b) Receiver
(c) Any One
(d) No one

36. When message & data are available only to those who are authorized to view them is known as ______ .
(a) Integrity
(b) Confidentiality
(c) Authenticity
(d) Privacy

37. Digital Accumulating Balance Payment System is generally used for ______ payments.
(a) Micro
(b) Macro
(c) Credit Card
(d) Debit Card

38. Scope of E-Commerce is ______.
(a) Local
(b) Global
(c) within own country
(d) within own state

39. ______ means found everywhere.
(a) Universal
(b) Ubiquity
(c) Global
(d) Local

40. E-Commerce Lacks _______ touch.
(a) Social
(b) Smooth
(c) Personal
(d) Communication

Answers: 31-Decryption, 32-Encryption, 33-Sender’s Public, 34-Receiver’s Private, 35-No one, 36-Confidentiality, 37-Micro, 38-Global, 39-Ubiquity, 40-Personal

41. In SSL _______ key is used for encryption.
(a) Public
(b) Private
(c) Session
(d) OTP

42. To handle credit card transaction on internet _____ is developed by Visa and Master card.
(a) SSL
(b) SET
(c) SAT
(d) Encryption

43. The sender and receiver will have the same key in _____ Key Encryption.
(a) Symmetric
(b) Asymmetric
(c) Public
(d) Private

44. In SSL URL will change from HTTP to _______.
(a) Cipher Text
(b) HTTPS
(c) SHTTP
(d) SMTP

45. __________ is a best example of Online Stored Value System.
(a) Google
(b) Yahoo
(c) PayPal
(d) Go Daddy

46. BitTorrent.Com is an example of _____
(a) B2B
(b) B2C
(c) C2C
(d) P2P

47. E-Tailer revenue model is ______ revenue.
(a) Sales
(b) Subscription
(c) Advertising
(d) Affiliate

48. The percentage of people who visit web site and buy something is known as _____
(a) Hits
(b) Conversion Rate
(c) Affiliate
(d) Walk-in-Customer

49. In _______ user can share files and computer resources directly.
(a) B2B
(b) B2C
(c) C2C
(d) P2P

50. E-tailer can be Pure Plays or _______ .
(a) Impure Plays
(b) Indirect Plays
(c) Bricks & Clicks
(d) Direct Plays

Answers: 41-Session, 42-SET, 43-Symmetric, 44-HTTPS, 45-PayPal, 46-P2P, 47-Sales, 48-Conversion Rate, 49-P2P, 50-Bricks & Clicks

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *