{"id":17639,"date":"2022-04-07T13:07:36","date_gmt":"2022-04-07T07:37:36","guid":{"rendered":"https:\/\/scholarsclasses.com\/blog\/?p=17639"},"modified":"2025-12-27T12:28:13","modified_gmt":"2025-12-27T06:58:13","slug":"mcqs-on-e-commerce","status":"publish","type":"post","link":"https:\/\/scholarsclasses.com\/blog\/mcqs-on-e-commerce\/","title":{"rendered":"50+ MCQ&#8217;s On E-Commerce | Computer Systems and Applications"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\"><strong style=\"white-space: normal;\"><strong style=\"white-space: normal;\">MCQ&#8217;s On E-Commerce<\/strong><\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/scholarsclasses.com\/blog\/wp-content\/uploads\/2022\/04\/MCQ_s-On-E-Commerce-1024x576.webp\" alt=\"MCQ&#039;s On E-Commerce\" class=\"wp-image-17651 lazyload\" title=\"\" data-srcset=\"https:\/\/scholarsclasses.com\/blog\/wp-content\/uploads\/2022\/04\/MCQ_s-On-E-Commerce-1024x576.webp 1024w, https:\/\/scholarsclasses.com\/blog\/wp-content\/uploads\/2022\/04\/MCQ_s-On-E-Commerce-300x169.webp 300w, https:\/\/scholarsclasses.com\/blog\/wp-content\/uploads\/2022\/04\/MCQ_s-On-E-Commerce-768x432.webp 768w, https:\/\/scholarsclasses.com\/blog\/wp-content\/uploads\/2022\/04\/MCQ_s-On-E-Commerce-1536x864.webp 1536w, https:\/\/scholarsclasses.com\/blog\/wp-content\/uploads\/2022\/04\/MCQ_s-On-E-Commerce.webp 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><figcaption class=\"wp-element-caption\">MCQ&#8217;s On E-Commerce<\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/scholarsclasses.com\/blog\/tybcom-sem-6-computer-systems-and-applications-mcq\/\"><strong>MCQs on other topics of Computer Systems and Applications<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.icsi.edu\/media\/webmodules\/modelquestionpaper\/CMA-MCQ%20100.pdf\" data-type=\"URL\" data-id=\"https:\/\/www.icsi.edu\/media\/webmodules\/modelquestionpaper\/CMA-MCQ%20100.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Cost Accounting MCQs pdf <\/strong><\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>1. Affiliate revenue is also called as _______.<br><\/strong>(a) Commission <br>(b) Brokerage <br>(c) Referral Fee <br>(d) Discount<\/p>\n\n\n\n<p><strong>2. Standards of EDI are decided by ______<br><\/strong>(a) ASCII <br>(b) ANSI <br>(c) USA <br>(d) Government<\/p>\n\n\n\n<p><strong>3. ______ means converting readable text to unreadable text.<br><\/strong>(a) Conversion <br>(b) Decryption <br>(c) Encryption <br>(d) Decoding<\/p>\n\n\n\n<p><strong>4. ______ means converting unreadable text to readable text.<br><\/strong>(a) Conversion <br>(b) Decryption <br>(c) Encryption <br>(d) Decoding<\/p>\n\n\n\n<p><strong>5. _____ changes URL from http to https.<br><\/strong>(a) SSL <br>(b) SET <br>(c) E-COMMERCE <br>(d) M-COMMERCE<\/p>\n\n\n\n<p><strong>6. In ____ server-side authentication is compulsory.<br><\/strong>(a) SSL <br>(b) SET <br>(c) E-COMMERCE <br>(d) M-COMMERCE<\/p>\n\n\n\n<p><strong>7. An online retail store is called as _____.<br><\/strong>(a) Trader <br>(b) Retailer <br>(c) E-tailer <br>(d) Amazon<\/p>\n\n\n\n<p><strong>8. In _______, one consumer deals with another consumer.<br><\/strong>(a) C2C <br>(b) B2C <br>(c) B2B <br>(d) P2P<\/p>\n\n\n\n<p><strong>9. Full form of SET is _________<br><\/strong>(a) Safe Electronic Transaction <br>(b) Secured Electronic Transaction<br>(c) Safe Electrical Transaction <br>(d) Secured E-commerce Transaction<\/p>\n\n\n\n<p><strong>10. amazon.com is an example of ______<br><\/strong>(a) B2B <br>(b) B2C <br>(c) C2C <br>(d) P2P<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Answers:<\/strong> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">1-Referral Fee, 2-ANSI, 3-Encryption, 4-Decryption, 5-SSL, 6-SSL, 7-E-tailer, 8-C2C, 9-Secured Electronic Transaction, 10-B2C<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>11. In SSL encryption is done using ____ key.<br><\/strong>(a) Public <br>(b) Private <br>(c) Session <br>(d) Symmetric<\/p>\n\n\n\n<p><strong>12. ____ is an online retail store.<br><\/strong>(a) Portal <br>(b) Service Provider <br>(c) E-Tailer <br>(d) Content Provider<\/p>\n\n\n\n<p><strong>13. Identify the identity of a person or entity with whom you are dealing on Internet is known&nbsp;as ______.<br><\/strong>(a) Integrity <br>(b) Authenticity <br>(c) Authorisation <br>(d) None of These<\/p>\n\n\n\n<p><strong>14. ____ means that the information being displayed on a Web site\/transmitted\/received over&nbsp;the Internet has not been changed in any way by an un-authorised party.<br><\/strong>(a) Integrity <br>(b) Authenticity <br>(c) Authorisation <br>(d) None of These<\/p>\n\n\n\n<p><strong>15. In public key encryption ______ keys are used.<br><\/strong>(a) Public and Private <br>(b) Only Public <br>(c) Only Private <br>(d) Session&nbsp;<\/p>\n\n\n\n<p><strong>16. SET is developed by association led by _________.<br><\/strong>(a) Master Card and Visa <br>(b) Master Card <br>(c) Visa <br>(d) Rupay<\/p>\n\n\n\n<p><strong>17. The technology behind M-commerce is based on ______.<br><\/strong>(a) HTTP <br>(b) HTTPS <br>(c) WAP <br>(d) POP<\/p>\n\n\n\n<p><strong>18 PayPal is an example of _____<br><\/strong>(a) Digital Cash<br>(b) Online Stored Value <br>(c) Credit Card <br>(d) Digital Cheque<\/p>\n\n\n\n<p><strong>19. ________ is virtual representation of physical market.<br><\/strong>(a) EDI <br>(b) Electronic Market <br>(c) E-Commerce <br>(d) Internet Commerce<\/p>\n\n\n\n<p><strong>20. _____ allows you paperless transactions.<br><\/strong>(a) EDI <br>(b) Electronic Market <br>(c) E-Commerce <br>(d) Internet Commerce<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Answers:<\/strong> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">11-Session, 12-E-Tailer, 13-Authenticity, 14-Integrity, 15-Public and Private, 16-Master Card and Visa, 17-WAP, 18-Online Stored Value, 19-Electronic Market, 20-EDI<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>21. _____ means the information being displayed on a Web site or transmitted or received&nbsp;over the Internet has not been changed in any way by an unauthorized party.<br><\/strong>(a) Integrity <br>(b) Confidentiality <br>(c) Authenticity <br>(d) Privacy<\/p>\n\n\n\n<p><strong>22. The protocol used for M-Commerce is ____<br><\/strong>(a) Internet Protocol <br>(b) Mobile Internet Protocol<br>(c) Wireless Application Protocol <br>(d) File Transfer Protocol<\/p>\n\n\n\n<p><strong>23. In ________ encryption is performed with session key.<br><\/strong>(a) Public Key <br>(b) Private Key <br>(c) SSL <br>(d) SET<\/p>\n\n\n\n<p><strong>24. Full form of SSL is _______<br><\/strong>(a) Secure Systematic Language <br>(b) Secure Sockets Layer<br>(c) Simple Secure Layer <br>(d) Shopping Secure Line<\/p>\n\n\n\n<p><strong>25. olx.com is an example of ________<br><\/strong>(a) B2B <br>(b) B2C <br>(c) C2C <br>(d) P2P<\/p>\n\n\n\n<p><strong>26. ______ are sites that creates a digital online environment where people with similar&nbsp;interest can transact.<br><\/strong>(a) Community Provider <br>(b) Market Creator <br>(c) Portal <br>(d) Service Provider<\/p>\n\n\n\n<p><strong>27. Flipkart.com is an example of _______.<br><\/strong>(a) B2B <br>(b) B2C <br>(c) C2C <br>(d) P2P<\/p>\n\n\n\n<p><strong>28. Normally in M-commerce language used to create web pages is _______.<br><\/strong>(a) HTML <br>(b) WML <br>(c) VB <br>(d) XML<\/p>\n\n\n\n<p><strong>29. _____ is an art of attempting to acquire information by masked as trustworthy entity.<br><\/strong>(a) Hacking <br>(b) Phishing <br>(c) Sniffing <br>(d) Spoofing<\/p>\n\n\n\n<p><strong>30. SSL can be used only with _____.<br><\/strong>(a) FTP <br>(b) HTTP <br>(c) POP <br>(d) SMTP<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Answers:<\/strong> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">21-Integrity, 22-Wireless Application Protocol, 23-SSL, 24-Secure Sockets Layer, 25-C2C, 26-Community Provider, 27-B2C, 28-WML, 29-Phishing, 30-HTTP&nbsp;<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>31. _____ means converting cipher text to plain text.<br><\/strong>(a) Encryption <br>(b) Decryption <br>(c) Conversion <br>(d) De-conversion<\/p>\n\n\n\n<p><strong>32. ______ means converting plain text to cipher text.<br><\/strong>(a) Encryption <br>(b) Decryption<br>(c) Conversion<br>(d) De-conversion<\/p>\n\n\n\n<p><strong>33. In Public Key Encryption ______ key is used for Encryption.<br><\/strong>(a) Receiver\u2019s Public <br>(b) Receiver\u2019s Private <br>(c) Sender\u2019s Public <br>(d) Sender\u2019s Private<\/p>\n\n\n\n<p><strong>34. In Public Key Encryption ______ key is used for Decryption.<br><\/strong>(a) Receiver\u2019s Public <br>(b) Receiver\u2019s Private <br>(c) Sender\u2019s Public <br>(d) Sender\u2019s Private<\/p>\n\n\n\n<p><strong>35. _____ can read the cipher text.<br><\/strong>(a) Sender <br>(b) Receiver <br>(c) Any One <br>(d) No one<\/p>\n\n\n\n<p><strong>36. When message &amp; data are available only to those who are authorized to view them is&nbsp;known as ______ .<br><\/strong>(a) Integrity <br>(b) Confidentiality <br>(c) Authenticity <br>(d) Privacy<\/p>\n\n\n\n<p><strong>37. Digital Accumulating Balance Payment System is generally used for ______ payments.<br><\/strong>(a) Micro <br>(b) Macro <br>(c) Credit Card <br>(d) Debit Card<\/p>\n\n\n\n<p><strong>38. Scope of E-Commerce is ______.<br><\/strong>(a) Local <br>(b) Global <br>(c) within own country <br>(d) within own state<\/p>\n\n\n\n<p><strong>39. ______ means found everywhere.<br><\/strong>(a) Universal <br>(b) Ubiquity <br>(c) Global <br>(d) Local<\/p>\n\n\n\n<p><strong>40. E-Commerce Lacks _______ touch.<br><\/strong>(a) Social <br>(b) Smooth <br>(c) Personal <br>(d) Communication<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Answers:<\/strong> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">31-Decryption, 32-Encryption, 33-Sender\u2019s Public, 34-Receiver\u2019s Private, 35-No one, 36-Confidentiality, 37-Micro, 38-Global, 39-Ubiquity, 40-Personal<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>41. In SSL _______ key is used for encryption.<br><\/strong>(a) Public <br>(b) Private <br>(c) Session <br>(d) OTP<\/p>\n\n\n\n<p><strong>42. To handle credit card transaction on internet _____ is developed by Visa and Master card.<br><\/strong>(a) SSL <br>(b) SET <br>(c) SAT <br>(d) Encryption<\/p>\n\n\n\n<p><strong>43. The sender and receiver will have the same key in _____ Key Encryption.<br><\/strong>(a) Symmetric <br>(b) Asymmetric <br>(c) Public <br>(d) Private<\/p>\n\n\n\n<p><strong>44. In SSL URL will change from HTTP to _______.<br><\/strong>(a) Cipher Text <br>(b) HTTPS <br>(c) SHTTP <br>(d) SMTP<\/p>\n\n\n\n<p><strong>45. __________ is a best example of Online Stored Value System.<br><\/strong>(a) Google <br>(b) Yahoo <br>(c) PayPal <br>(d) Go Daddy<\/p>\n\n\n\n<p><strong>46. BitTorrent.Com is an example of _____<br><\/strong>(a) B2B <br>(b) B2C <br>(c) C2C <br>(d) P2P<\/p>\n\n\n\n<p><strong>47. E-Tailer revenue model is ______ revenue.<br><\/strong>(a) Sales <br>(b) Subscription <br>(c) Advertising <br>(d) Affiliate<\/p>\n\n\n\n<p><strong>48. The percentage of people who visit web site and buy something is known as _____<br><\/strong>(a) Hits <br>(b) Conversion Rate <br>(c) Affiliate <br>(d) Walk-in-Customer<\/p>\n\n\n\n<p><strong>49. In _______ user can share files and computer resources directly.<br><\/strong>(a) B2B <br>(b) B2C <br>(c) C2C <br>(d) P2P<\/p>\n\n\n\n<p><strong>50. E-tailer can be Pure Plays or _______ .<br><\/strong>(a) Impure Plays <br>(b) Indirect Plays <br>(c) Bricks &amp; Clicks <br>(d) Direct Plays<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Answers:<\/strong> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">41-Session, 42-SET, 43-Symmetric, 44-HTTPS, 45-PayPal, 46-P2P, 47-Sales, 48-Conversion Rate, 49-P2P, 50-Bricks &amp; Clicks<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":17651,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,7],"tags":[4811],"class_list":["post-17639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bcom","category-degree-college","tag-mcqs-on-e-commerce"],"_links":{"self":[{"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/posts\/17639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/comments?post=17639"}],"version-history":[{"count":6,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/posts\/17639\/revisions"}],"predecessor-version":[{"id":36238,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/posts\/17639\/revisions\/36238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/media\/17651"}],"wp:attachment":[{"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/media?parent=17639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/categories?post=17639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scholarsclasses.com\/blog\/wp-json\/wp\/v2\/tags?post=17639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}