E Commerce Mcqs
E Commerce Mcqs
com/commerce/practice-mcq-question-on-ecommerce/
section1
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
1.
A. interactivity
B. global reach
C. richness
D. ubiquity
2.
B. Doing business
C. Sale of goods
Answer: Option A
Solution:
Doing business electronically describes e‐commerce. E-commerce (EC), an abbreviation for
electronic commerce, is the buying and selling of goods and services, or the transmitting of funds or
data, over an electronic network, primarily the internet.
3.
A. C2B
B. B2C
C. B2B
D. C2C
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
C2B is not one of the major types of e-commerce. The C2B, or consumer-to-business model, is
when customers offer products or services to businesses.
4.
Which of the following is part of the four main types for e‐commerce?
A. B2B
B. B2C
C. C2B
Answer: Option D
Solution:
B2B, B2C and C2B is part of the four main types for e‐commerce.
5.
A. Innovation
B. Consolidation
C. Preservation
D. Reinvention
Answer: Option C
Solution:
Preservation is not considered to be one of the three phases of e-commerce. The act of keeping
something the same or of preventing it from being damaged is basically preservation.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
6.
A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
Answer: Option B
Solution:
eBay, Amazon.com belong to B2Cs segments. The term business-to-consumer (B2C) refers to the
process of selling products and services directly between consumers who are the end-users of its
products or services.
7.
A. Bailey market
B. Baxter market
C. Bergman market
D. Bertrand market
Answer & Solution Discuss in Board Save for Later
Answer: Option D
Solution:
The idealistic market envisioned at the outset of the development of e-commerce is called a
Bertrand market.
8.
A. B2B
B. B2C
C. C2B
D. C2C
Answer: Option D
Solution:
C2C type of e‐commerce focuses on consumers dealing with each other. Consumer to consumer,
or C2C, is the business model that facilitates commerce between private individuals. Whether it's
for goods or services, this category of e-commerce connects people to do business with one
another.
9.
A. bank loans
Answer: Option C
Solution:
The primary source of financing during the early years of e-commerce was venture capital funds.
Venture Capital is money invested in businesses that are small; or exist only as an initiative, but
have huge potential to grow. The people who invest this money are called venture capitalists (VCs).
The venture capital investment is made when a venture capitalist buys shares of such a company
and becomes a financial partner in the business.
10.
A. B2B
B. C2B
C. C2C
Answer: Option D
Solution:
Ebay Stores allows you to set up an online store that sells products at a set price, instead of
allowing people to bid in auction format. This business model is preferred by many eBay
entrepreneurs because they can determine how much profit each product they sell will make.
1234567891011121314
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
11.
A. spy ware
B. cookies
C. Gmail
D. anonymizers
Answer: Option D
Solution:
All of the following are technologies used to gather information about you online except
anonymizers. An anonymizer or an anonymous proxy is a tool that attempts to make activity on the
Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield
between a client computer and the rest of the Internet.
12.
A. Ebay.com
B. Amazon.com
C. Yepme.com
D. None of these
Answer: Option A
Solution:
In Ebay.com Global Easy Buy is facilitated.
13.
A. business model
B. profit model
C. business plan
D. revenue model
Answer: Option A
Solution:
A business model is the set of planned activities designed to result in a profit in a marketplace.
14.
A. Small products
B. Digital products
C. Specialty products
D. Fresh products
Answer: Option B
Solution:
The best products to sell in B2C e‐commerce are Digital products. A digital product is an intangible
asset or piece of media that can be sold and distributed repeatedly online without the need to
replenish inventory.
15.
A. value proposition
B. competitive advantage
C. market strategy
D. universal standards
Answer: Option D
Solution:
Universal standards is not a key element of a business model.
8 Key Elements of a business model and types of E commerce Business models are
1) Value Proposition.
2) Revenue Model.
3) Market Opportunity.
4) Competitive Environment.
5) Competitive Advantage.
6) Market Strategy.
7) Organizational Development.
8) Management Team.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
16.
A. Books
B. Furniture
C. Movies
Answer: Option B
Solution:
The products that people are most likely to be more uncomfortable buying on the Internet are
Furniture among the given options.
17.
Answer: Option C
Solution:
The source of revenue in a subscription revenue model is Fees from subscribers in exchange for
access to content or services. The subscription business model is a business model in which a
customer must pay a recurring price at regular intervals for access to a product or service.
18.
A. Books
B. PCs
C. CDs
Answer: Option D
Solution:
The products that people are most likely to be more uncomfortable buying on the Internet are
Books, PCs and CDs.
19.
A. Amazon
B. eBay
C. Yahoo
D. Face book
Answer: Option C
Solution:
Yahoo is an example of a portal. Yahoo! is an Internet portal that incorporates a search engine and
a directory of World Wide Web sites organized in a hierarchy of topic categories.
20.
Digital products are best suited for B2C e‐commerce because they:
Answer: Option D
Solution:
Digital products are best suited for B2C e‐commerce because they are commodity like products,
can be mass‐customized and personalized and can be delivered at the time of purchase.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
21.
All of the following are major B2C business models except ______.
A. content provider
B. industry consortium
C. transaction broker
D. service provider
Answer: Option B
Solution:
All of the following are major B2C business models except industry consortium. An industry
consortium is a group that involves representatives from several different companies. Usually,
consortia are composed of companies from within a single industry.
22.
A. EDI
B. ERP
C. SCM
Answer: Option B
Solution:
The solution for all business needs is ERP. Enterprise resource planning (ERP) is business process
management software that allows an organization to use a system of integrated applications to
manage the business and automate many back office functions related to technology, services and
human resources.
23.
A. e-distributor
B. exchange
C. e-procurement
Answer: Option B
Solution:
The exchange business model involves an independently owned vertical digital marketplace for
direct inputs.
24.
B. Viral marketing
C. Online ads
D. Virtual marketing
25.
B. slightly fewer
C. much fewer
D. much larger
Answer: Option D
Solution:
Compared to Internet users, the number of cell phone subscribers is much larger.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
26.
A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
Answer: Option A
Solution:
Industry structure is defined as the nature of the players in an industry and their relative bargaining
power. Industry structure pertains to the number and size distribution of competitors in an industry,
according to University of Maryland University College.
27.
A. market space
B. marketplace
C. perfect market
D. Bertrand market
Answer: Option A
Solution:
The area of actual or potential commercial value in which a company intends to operate is a market
space. Minimum Viable Product or MVP is the most basic version of the product which the
company wants to launch in the market.
28.
Which term represents a count of the number of people who visit one
site, click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs
B. Click‐through
C. Spam
Answer: Option B
Solution:
Click‐through term represents a count of the number of people who visit one site, click on an ad,
and are taken to the site of the advertiser.
29.
A. One firm develops an advantage based on a factor of production that other firms cannot purchase
B. One participant in the market has more resources than the others
C. there are no competitive advantages or asymmetries because all firms have equal access to all the
factors to production
D. competition is at a minimum, as each niche market within an industry is served by the company with
the greatest competitive advantage
Answer: Option C
Solution:
A perfect market is one in which there are no competitive advantages or asymmetries because all
firms have equal access to all the factors to production.
30.
What is the percentage of customers who visit a Web site and actually
buy something called?
A. Affiliate programs
B. Click‐through
C. Spam
D. Conversion rate
Answer: Option D
No explanation is given for this question Let's Discuss on Board
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
31.
A. AOL
B. Yahoo
C. Sailnet
D. MSN/Windows Live
Answer: Option C
Solution:
Sailnet is not a horizontal portal. Specialized website (portal) that serves as an entry point to
several firms in the same industry or to the same type of suppliers.
32.
A. Direct materials
B. Indirect materials
C. EDI
Answer: Option A
Solution:
Direct materials used in production in a manufacturing company or are placed on the shelf for sale
in a retail environment.
33.
A. a value web
B. value chain
C. profit
D. commoditization
Answer: Option D
Solution:
A situation where there are no differences among products or services, and the only basis of
choosing products is price is known as commoditization. Commoditization refers to the process of
making something into a commodity. A commodity is a fundamental good used in commerce that is
interchangeable with other commodities of the same type.
34.
B. Indirect materials
C. EDI
Answer: Option B
Solution:
Indirect materials are necessary for running a modern corporation, but do not relate to the
company's primary business activities.
35.
A. scope
B. differentiation
C. cost
D. focus
Answer: Option A
Solution:
A strategy designed to compete in all markets around the globe is called a scope strategy. Strategic
scope refers to the products and services a company plans to offer over a specific period, and
indicates where and to which target markets they will be sold.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
36.
What is the process in which a buyer posts its interest in buying a
certain quantity of items, and sellers compete for the business by
submitting successively lower bids until there is only one seller left?
A. B2B marketplace
B. Intranet
C. Reverse auction
D. Internet
Answer: Option C
Solution:
Reverse auction is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids until there is only
one seller left.
37.
A. Innovation
B. Institutionalization
C. Globalization
D. Commercialization
38.
What are plastic cards the size of a credit card that contains an
embedded chip on which digital information can be stored?
C. FEDI cards
D. Smart cards
Answer: Option D
Solution:
Smart cards are plastic cards of the size of a credit card that contains an embedded chip on which
digital information can be stored. A smart card, chip card, or integrated circuit card (ICC) is a
physical electronic authorization device, used to control access to a resource.
39.
A. Leonard Kleinrock
B. Ray Tomlinson
C. Bob Metcalfe
D. Vint Cerf
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
In 1961, Leonard Kleinrock published a paper on "packet switching" networks. Kleinrock convinced
Roberts of the theoretical feasibility of communications using packets rather than circuits, which
was a major step along the path towards computer networking.
40.
A. B2B
B. B2C
C. C2B
D. C2C
Answer: Option B
Solution:
Most individuals are familiar with B2C form of e‐commerce. B2C eCommerce refers to the process
of selling to individual customers directly.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
41.
A. TCP
B. IP
Answer: Option B
Solution:
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the
actual delivery of packets is IP. TCP/IP is a shorthand for the two most important protocols used to
make the Internet work. The Internet Protocol (IP) is responsible for transferring these data packets,
while the Transmission Control Protocol (TCP) makes sure all packets arrive safely, retransmitting
them if necessary.
42.
A. B2B
B. B2C
C. C2B
D. C2C
Answer: Option A
Solution:
B2B form of e‐commerce currently accounts for about 97% of all e‐commerce revenues. Business-
to-business is a situation where one business makes a commercial transaction with another.
43.
Which protocol permits users to transfer files from the server to their
client computer, and vice versa?
A. HTTP
B. SMTP
C. IMAP
D. FTP
44.
B. Reduction in costs
Answer: Option D
Solution:
Shorter cycle times, reduction in costs and it reaches wider audiences are advantages normally
associated with B2B e‐commerce.
45.
__________ is a program that you can run from the DOS prompt in the
Windows operating system in order to check the connection between
your client and the server.
A. Ping
B. Telnet
C. Tracert
D. SSL
Answer: Option A
Solution:
Ping is a program that you can run from the DOS prompt in the Windows operating system in order
to check the connection between your client and the server. Ping is used to test the ability of one
network host to communicate with another. Simply enter the Ping command, followed by the name
or the IP address of the destination host.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
46.
Answer: Option C
Solution:
If the threat of substitute products or services is low it is an advantage to the supplier.
47.
A. 100 Kbps
B. 56.6 Kbps
C. 30 Kbps
D. 10 Kbps
Answer: Option A
Solution:
Broadband is generally considered to be any communication technology allowing streaming audio
and video at or above 100 Kbps.
48.
Answer: Option C
Solution:
The threat of new entrants is high when it is Easy for competitors to enter the market. A high threat
of new entrants makes an industry less attractive – there are low barriers to entry. Therefore, new
competitors are able to easily enter into the industry, compete with existing firms, and take market
share. There is a reduced profit potential as more competitors are in the industry.
49.
A. DSL
B. cable modem
C. T1
D. T3
Answer: Option D
Solution:
T3 connections allows the fastest download speeds. T3 Internet service lines operate at speeds of
45 Mbps (672 times faster than a 56K dial-up, and 29 times faster than T1 connection).
50.
A. High
B. Low
C. More
D. Less
Answer: Option A
Solution:
If it is easy for competitors to enter the market, the threat of new entrants is considered high. Threat
of new entrants refers to the threat new competitors pose to existing competitors in an industry.
Therefore, a profitable industry will attract more competitors looking to achieve profits.
1234567891011121314
Read More Section(Ecommerce)
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
51.
D. best-efforts QOS
Answer: Option C
Solution:
Insufficient reach is not a limitation of the current Internet.
52.
A. New products
C. Engineering products
Answer: Option B
Solution:
Unique value auction is mainly applies to Second hand products.
53.
A. Creating a leading-edge very high-speed network capability for the national research community
D. Ensuring the rapid transfer of new network services and applications to the broader Internet community
Answer: Option B
Solution:
All of the following are goals of Internet 2 except Eliminating censorship from the Internet.
54.
A. eBay.co.in
B. amazon.com
C. flipkart.com
Answer: Option A
Solution:
Paisapay is facilitated in. eBay.co.in. PaisaPay is eBay's online payment service, where buyers can
pay sellers through credit card or Online Bank Transfer.
55.
A. XML
B. diffserv
C. blogs
D. CDMA
Answer: Option C
Solution:
Blogs is a new and disruptive Web feature or service. A blog (shortening of “weblog”) is an online
journal or informational website displaying information in the reverse chronological order, with latest
posts appearing first. It is a platform where a writer or even a group of writers share their views on
an individual subject.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
56.
A. encryption
B. decryption
C. firewall
Answer: Option D
Solution:
Encryption, decryption and firewall is a useful security mechanism when considering business
strategy and IT.
57.
A. CDMA
B. W-CDMA
C. TDMA
D. GSM
Answer: Option B
Solution:
All of the following are examples of 2G wireless phone technologies except W-CDMA. WCDMA is
the most commonly used variant of the Universal Mobile Telecommunications System (UMTS ).
58.
A. encryption
B. decryption
C. e‐cash
Answer: Option C
Solution:
e‐cash is not related to security mechanism. It is also known as electronic cash, it is a digital money
product that provides a way to pay for products and services without resorting to paper or coin
currency.
59.
A. Wi-Fi
B. Bluetooth
C. Zigbee
D. GigaPoP
Answer: Option D
Solution:
All of the following are wireless Internet access network technologies except GigaPoP. A gigabit
point of presence (GigaPOP) is an individual access point to something called Internet2 that
represents a high-speed IP network maintained by universities and other parties.
60.
A. Switching costs
B. Loyalty programs
C. Entry barriers
D. Affiliate programs
Answer: Option C
Solution:
A product or service that customers have come to expect from an industry, which must be offered
by new entrants if they wish to compete and survive, is known as an Entry barriers.
1234567891011121314
Read More Section(Ecommerce)
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
61.
A. 0.07
B. 0.17
C. 0.27
D. 0.47
Answer: Option B
Solution:
Internet users account for about 0.17 of the world's population.
62.
Answer: Option D
Solution:
Technology has caused buyer power to increase, Technology has lessened the entry barriers for
many industries and Technology has increased the threat of substitute products and services
statements accurately reflect the impact of technology.
63.
A. Mosaic
B. Mozilla
C. Netscape Navigator
D. Internet Explorer
Answer: Option C
Solution:
Netscape Navigator was the first commercial Web browser. Netscape Navigator browser was
released by the Mosaic (later Netscape) Corporation. Before Microsoft's Internet Explorer became
the dominant browser, Netscape Navigator was the most popular way to connect to the Web.
64.
Answer: Option C
Solution:
A business cannot be all things to all people. Instead, a business must Identify target customers
and Identify the value of products/services as perceived by customers.
65.
All of the following are steps in the systems development life cycle
except ______.
A. Systems Design
B. Testing
C. Implementation
D. Debugging
Answer: Option D
Solution:
All of the following are steps in the systems development life cycle except Debugging. Debugging is
the process of finding and resolving defects or problems within a computer program that prevent
correct operation of computer software or a system.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
66.
A. Using e‐medias
Answer: Option A
Solution:
The transactions occur in e‐commerce using e‐medias.
67.
A. system design
B. logical design
C. tactical design
D. physical design
Answer: Option B
Solution:
A logical design describes the flow of information at your e-commerce site and the infrastructure
that will be used in the system. Logical design is the conceptual design of a system. It describes the
flow of information at your e-commerce site, the processing functions that must be performed, the
database that will be used, the security and emergency backup procedures that will be instituted,
and the controls that will be used in the system.
68.
A. automobiles
B. books
C. softwares
D. none
Answer: Option A
Solution:
Automobiles type of products is lesser purchased using eCommerce.
69.
All of the following are factors in optimizing Web site performance
except _________.
A. page retrieval
B. page generation
C. page delivery
D. page content
Answer: Option A
Solution:
All of the following are factors in optimizing Web site performance except page retrieval. Page
retrieval is a part that uses web robot to retrieve the desired web page to database.
70.
A. Price
C. Ease of ordering
Answer: Option D
Solution:
A business competing in a commodity like environment must focus on Price, Ease / speed of
delivery and Ease of ordering.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Section2
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
1.
The dominant Web server software is __________.
A. Zeus
B. Apache
C. Microsoft IIS
D. Google
Answer: Option B
Solution:
The dominant Web server software is Apache. Apache played a key role in the initial growth of the
World Wide Web, quickly overtaking NCSA HTTPd as the dominant HTTP server, and has
remained most popular since April 1996.
2.
A. customization
B. aggregation
C. Direct materials
D. Reverse auction
Answer: Option A
Solution:
Customization refers to creating products tailored to individual customers. It is the action of making
or changing something according to the buyer's or user's needs.
3.
C. Data capture
D. Security services
Answer: Option D
Solution:
Security services Web server functionality allows it verify usernames and passwords and process
certificates and encryption information.
4.
A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Answer: Option C
Solution:
Materials used in the normal operation of a business but not related to primary business operations
are called Indirect materials. Indirect materials are materials used in the production process, but
which cannot be linked to a specific product or job.
5.
A. hardware platform
B. content platform
C. transaction platform
D. scalability platform
Answer: Option A
Solution:
The underlying computing equipment that the system uses to achieve its e-commerce functionality
is called a hardware platform.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
6.
A. Banner ads
B. Pop‐up ads
C. Affiliate programs
D. Viral marketing
Answer: Option C
Solution:
Amazon.com is well‐known for Affiliate programs e‐commerce marketing technique.
7.
A. pages that work, load quickly, and point the customer toward your product offerings
Answer: Option D
Solution:
Redundant navigation refers to alternative navigation to the same content. Redundant navigation
can help users find what they're looking for. Redundancy in documentation is usually bad: When
you have the same content (in different words) in two places, you pay twice for localization – yet
you probably only remember to update one of the items.
8.
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Answer: Option D
Solution:
Electronic marketplace is the name given to an interactive business providing a centralized market
where many buyers and suppliers can come together for e‐commerce or commerce‐related
activities.
9.
D. VBScript
Answer: Option C
Solution:
The set of standards for communication between a browser and a program running on a server that
allows for interaction between the user and the server is known as Common Gateway Interface
(CGI).
10.
B. Vertical
C. Integrated
D. Inclined
Answer: Option A
Solution:
Horizontal form of e‐marketplace brings together buyers and sellers from multiple industries, often
for MRO materials. Horizontal e-commerce outfits focus on the breadth of product offerings, while
vertical ones concentrate on depth.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
11.
D. Broadvision Commerce
Answer: Option A
Solution:
Microsoft Commerce Server is not a widely used midrange or high-end e-commerce suite. Microsoft
is one of the providers of commerce servers. Microsoft Commerce Server was first released in 2000
and was used to creatie e-commerce systems. It uses Microsoft's .NET technology.
12.
B. Vertical
C. Integrated
D. Inclined
Answer: Option B
Solution:
Vertical form of e‐marketplace brings together buyers and sellers from the same industry. It is an e-
marketplace that offer goods and services directly related to the production process of a specific
industrial sector.
13.
The ability to change the product to better fit the needs of the customer
is called ________.
A. customization
B. personalization
C. privacy
D. accessibility
Answer: Option A
Solution:
The ability to change the product to better fit the needs of the customer is called customization. It is
the action of modifying something to suit a particular individual or task.
14.
A. pop‐under ad
B. Pop‐up ad
C. Banner ad
D. Discount ad
Answer: Option C
Solution:
Banner ad appears on a web page.
15.
All of the following are tools for optimizing a Web site's location in
search engine listings except ________.
C. buying ads
D. benchmarking
Answer: Option D
Solution:
All of the following are tools for optimizing a Web site's location in search engine listings except
benchmarking. Benchmarking is a process of measuring the performance of a company's products,
services, or processes against those of another business considered to be the best in the industry,
aka “best in class.”
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
16.
What type of ad appears on top of a web page?
A. pop‐under ad
B. pop‐up ad
C. banner ad
D. discount ad
Answer: Option B
Solution:
pop‐up ad type of ad appears on top of a web up ad. Pop-up ads or pop-ups are forms of online
advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area,
usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
17.
The most common type of Internet crime according to the IC3 is ______.
B. Check fraud
C. Non-delivery
D. Auction fraud
Answer: Option D
Solution:
The most common type of Internet crime according to the IC3 is Auction fraud. Internet auction
fraud involves schemes attributable to the misrepresentation of a product advertised for sale
through an Internet auction site or the non-delivery of products purchased through an Internet
auction site.
18.
A. pop‐under ad
B. pop‐up ad
C. banner ad
D. discount ad
Answer: Option A
Solution:
Pop‐under ad appears under a web page. A type of window that appears behind the browser
window of a Web site that a user has visited. In contrast to a pop-up ad, which appears over (on top
of) the browser window, a pop-under is less obtrusive as it hides behind other windows.
19.
A. people
B. data
C. technology solutions
Answer: Option B
Solution:
In the e-commerce security environment, data constitutes the inner-most layer. E-Commerce
security refers to the principles which guide safe electronic transactions, allowing the buying and
selling of goods and services through the Internet, but with protocols in place to provide safety for
those involved.
20.
Which, if any, of the following types of ads are people most willing to
tolerate?
A. pop‐under ad
B. pop‐up ad
C. banner ad
Answer: Option D
Solution:
people most willing doesn't tolerate any type of ads.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
21.
A. Macro viruses
B. File-infecting viruses
C. Script viruses
D. Trojan viruses
Answer: Option D
Solution:
All of the following are major categories of computer viruses except Trojan viruses. Trojan or Trojan
horse is a type of malicious software. Trojan virus is designed to spy on the victims computer,
access files or to extract sensitive data.
22.
A. electronic check
C. conversion rates
D. financial cybermediary
Answer: Option D
Solution:
A financial cybermediary is an internet based company that makes it easy to transfer money from
one person to another.
23.
Answer: Option A
Solution:
A worm is designed to spread from computer to computer. A computer worm is a standalone
malware computer program that replicates itself in order to spread to other computers. Often, it
uses a computer network to spread itself, relying on security failures on the target computer to
access it.
24.
A. electronic check
B. credit card
C. e‐transfer
Answer: Option A
Solution:
Electronic check is a method of transferring money from one person's account to another. An
electronic check, also referred to as an e-check, is a form of payment made via the Internet, or
another data network, designed to perform the same function as a conventional paper check.
25.
Malicious hackers who act with the intention of causing harm are
__________.
A. White hats
B. Black hats
C. Grey hats
D. Brown hats
Answer: Option B
Solution:
Malicious hackers who act with the intention of causing harm are Black hats. Black hat refers to a
hacker who breaks into a computer system or network with malicious intent. A black hat hacker
may exploit security vulnerabilities for monetary gain; to steal or destroy private data; or to alter,
disrupt or shut down websites and networks.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
26.
A. e‐commerce
B. online banking
C. e‐cash
D. check
Answer: Option B
Solution:
An electronic check is one form of online banking. An eCheck (or electronic check) is an electronic
version of a paper check used to make payments online.
27.
When hackers flood a Web site with useless traffic to overwhelm the
network, it is called ______.
A. phishing
B. pharming
D. spoofing
Answer: Option C
Solution:
When hackers flood a Web site with useless traffic to overwhelm the network, it is called a Denial of
Service (DoS) attack. A denial-of-service attack (DoS attack) is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its intended users by
temporarily or indefinitely disrupting services of a host connected to the Internet.
28.
If you need to transfer money to another person via the internet, which
of the following methods could you use?
A. financial cybermediary
B. electronic check
Answer: Option D
Solution:
If you need to transfer money to another person via the internet, the methods that could be use are
financial cybermediary, electronic check and electronic bill presentment and payment.
29.
A. availability
B. message integrity
C. nonrepudiation
D. confidentiality
Answer: Option A
Solution:
Availability is not a dimension of e-commerce security provided by encryption. eCommerce security
refers to the principles which guide safe electronic transactions, allowing the buying and selling of
goods and services through the Internet, but with protocols in place to provide safety for those
involved.
30.
A. financial cybermediary
B. electronic check
Answer: Option C
Solution:
Electronic bill presentment and payment permits the transmission of a bill, along with payment of
that bill, to be conducted over the Internet. Electronic Bill Payment & Presentment (EBPP) is a
process, which companies use to collect payments via the Internet, direct dial access, Automated
Teller Machine (ATM), or other electronic method. Electronic Bill Payment & Presentment is a core
component of many financial institutions' online banking offerings.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
31.
Answer: Option A
Solution:
The most widely used encryption standard is Advanced Encryption Standard (AES). The Advanced
Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect
classified information and is implemented in software and hardware throughout the world to encrypt
sensitive data.
32.
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
A combination of software and information designed to provide security and information for
payment is called digital wallet. A digital wallet is a system that securely stores users' payment
information and passwords for numerous payment methods and websites.
33.
A. S-HTTP
B. VPNs
C. SSL
D. PPTP
Answer: Option C
Solution:
The most common form of securing channels is through SSL. SSL (Secure Sockets Layer) is a
standard security technology for establishing an encrypted link between a server and a client—
typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook).
34.
A. internet commerce
B. e‐commerce
C. transaction information transfer
Answer: Option D
Solution:
The name for direct computer‐to‐computer transfer of transaction information contained in standard
business documents is electronic data interchange. Electronic Data Interchange (EDI) is the
electronic interchange of business information using a standardized format; a process which allows
one company to send information to another company electronically rather than with paper.
35.
Answer: Option C
Solution:
Firewalls perform all of the following functions except Eliminates viruses and other malicious
attacks.
1234567891011121314
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
36.
A. e‐commerce
Answer: Option B
Solution:
Financial electronic data interchange is used in B2B to pay for purchases. Business-to-business is
a situation where one business makes a commercial transaction with another.
37.
A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer: Option B
Solution:
A security plan begins with a risk assessment. Risk assessment is a term used to describe the
overall process or method where you: Identify hazards and risk factors that have the potential to
cause harm (hazard identification). Analyze and evaluate the risk associated with that hazard (risk
analysis, and risk evaluation).
38.
Public key encryption uses multiple keys.ne key is used to encrypt data,
while another is used to decrypt data.he key used to encrypt data is
called the _______ key, while the key used to decrypt data is called the
________ key.
A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Answer: Option D
No explanation is given for this question Let's Discuss on Board
39.
A. Credit card
B. Accumulating balance
C. Stored value
D. Cash
Answer: Option D
Solution:
The only payment system that is instantly convertible without intermediation is Cash.
40.
B. encrypts information
Answer: Option D
Solution:
Secure Sockets Layers creates a secure, private connection to a web server, encrypts information
and sends information over the internet.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
41.
A. PayPal
B. checks
C. credit cards
D. debit
Answer: Option C
Solution:
The most prevalent online payment method is credit cards. Over the years, credit cards have
become one of the most common forms of payment for e-commerce transactions.
42.
Answer: Option B
Solution:
When a transaction is processed online, use secure electronic transactions the merchant can verify
the customer's identity by using secure electronic transactions.
43.
A. US-CERT
B. OECD
C. IC3
D. P3P
Answer: Option A
Solution:
US-CERT is the name of the division of the U.S. Department of Homeland Security that coordinates
cyber incident warnings and responses across government and private sectors.
44.
The practice of forging a return address on an e‐mail so that the
recipient is fooled into revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer: Option D
Solution:
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing
private information is termed as spoofing. A spoofing attack is a situation in which a person or
program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
45.
D. getting news
Answer: Option C
Solution:
After sending e-mail, using a search engine to find information is most common among Internet
users.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
46.
What is a model of a proposed product, service, or system?
A. Prototyping
B. Prototype
C. Proof‐of‐concept prototype
D. Selling prototype
Answer: Option B
Solution:
Prototype is a model of a proposed product, service, or system. A prototype is an original model,
form or an instance that serves as a basis for other processes.
47.
A. Opinion leaders
D. Lifestyle groups
Answer: Option A
Solution:
Opinion leaders influence the behavior of others through their personality, skills, or other factors.
Opinion leaders are individuals or organizations that are able to influence people by their opinion.
48.
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer: Option B
Solution:
Intranet is an internal organizational Internet that is guarded against outside access by a special
security feature called a firewall (which can be software, hardware, or a combination of the two). An
intranet is a private network that is contained within an enterprise. It may consist of many interlinked
local area networks and also use leased lines in the wide area network.
49.
A good or service for which there are many dealers supplying the same
product, and all products in the segment are essentially identical is
known as _______.
A. commodity
B. core product
C. actual product
D. augmented product
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
A good or service for which there are many dealers supplying the same product, and all products in
the segment are essentially identical is known as commodity. A commodity is a basic good used in
commerce that is interchangeable with other commodities of the same type. Commodities are most
often used as inputs in the production of other goods or services.
50.
A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer: Option C
Solution:
Extranet is an intranet that is restricted to an organization and certain outsiders, such as customers
and suppliers. An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or operations with
suppliers, vendors, partners, customers, or other businesses.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
51.
A. Bertrand's Law
Answer: Option C
Solution:
Complete price transparency in a perfect information marketplace is necessary for the Law of One
Price to take effect. The law of one price states that in the absence of trade frictions, and under
conditions of free competition and price flexibility, identical goods sold in different locations must
sell for the same price when prices are expressed in a common currency.
52.
B. Hot site
C. Cold site
Answer: Option A
Solution:
Disaster recovery plan is a detailed process for recovering information or an IT system in the event
of a catastrophic disaster such as a fire or flood. A disaster recovery plan (DRP) is a documented,
structured approach with instructions for responding to unplanned incidents.
53.
B. data warehouse
C. SQL query
D. relational database
Answer: Option D
Solution:
A relational database represents data as two-dimensional tables with records organized in rows
and attributes in columns. A relational database is a set of formally described tables from which
data can be accessed or reassembled in many different ways without having to reorganize the
database tables.
54.
What is a separate facility that does not have any computer equipment
but is a place where the knowledge workers can move after the
disaster?
B. Hot site
C. Cold site
Answer: Option C
Solution:
Cold site is a separate facility that does not have any computer equipment but is a place where the
knowledge workers can move after the disaster. A cold site is a business location that is used for
backup in the event of a disruptive operational disaster at the normal business site.
55.
Answer: Option A
Solution:
All of the following are types of data mining except selective data mining.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
56.
What is a separate and fully equipped facility where the company can
move immediately after the disaster and resume business?
B. Hot site
C. Cold site
Answer: Option B
Solution:
Hot site is a separate and fully equipped facility where the company can move immediately after the
disaster and resume business. A hot site is a commercial disaster recovery service that allows a
business to continue computer and network operations in the event of a computer or equipment
disaster.
57.
Which of the following market entry strategies are the most common for
existing firms?
A. first mover
B. fast follower
C. brand extender
D. alliances
Answer: Option C
Solution:
Brand extender market entry strategies are the most common for existing firms. Brand Extension is
the use of an established brand name in new product categories.
58.
B. Hot site
C. Cold site
Answer: Option D
Solution:
Disaster recovery cost curve charts the cost to your organization of the unavailability of information
and technology and the cost to your organization of recovering from a disaster over time.
59.
A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Answer: Option B
Solution:
The process of getting customers to pass along a company's marketing message to friends, family,
and colleagues is known as viral marketing. Viral marketing or viral advertising is a business
strategy that uses existing social networks to promote a product.
60.
A. Availability
B. Accessibility
C. Reliability
D. None of the above
Answer: Option A
Solution:
Availability factor determines when your IT system will be available for knowledge workers to
access.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
61.
A. decreases
B. increases
Answer: Option B
Solution:
The per-product price consumers are willing to pay for a bundle increases as the number of goods
in the bundle increases. The willingness of consumers to pay can, at times, be quite volatile. With
bundle pricing, the seller lowers the variance on this willingness to pay and increases its profit by
selling bundles of products instead of selling all products separately.
62.
Which factor determines who has the right to access different types of
IT systems and information?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer: Option B
Solution:
Accessibility factor determines who has the right to access different types of IT systems and
information.
63.
A. versioning
B. bundling
C. transactive content
D. price discrimination
Answer: Option A
Solution:
Creating multiple versions of information goods and selling essentially the same product to different
market segments at different prices is called versioning. Versioning is the creation and
management of multiple releases of a product, all of which have the same general function but are
improved, upgraded or customized.
64.
B. Accessibility
C. Reliability
D. Scalability
Answer: Option C
Solution:
Reliability factor ensures your IT systems are functioning correctly and providing accurate
information. The term reliability in psychological research refers to the consistency of a research
study or measuring test.
65.
Answer: Option D
Solution:
All of the following are examples of intelligent agent technology except online web bugs.
1234567891011121314
Read More Section(Ecommerce)
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
66.
Which factor represents how well your system can adapt to increased
demands?
A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer: Option D
Solution:
Scalability factor represents how well your system can adapt to increased demands. Scalability is
an attribute that describes the ability of a process, network, software or organization to grow and
manage increased demand.
67.
Answer: Option C
Solution:
E-business can be defined as digitally enabled transactions and processes within an organization.
E-business or Online business means business transactions that take place online with the help of
the internet. The term e-business came into existence in the year 1996. E-business is an
abbreviation for electronic business.
68.
Which factor represents a system's ability to change quickly?
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer: Option A
Solution:
Flexibility factor represents a system's ability to change quickly. Flexibility is Key to E-commerce
Stability.
69.
The set of applications and technologies that allow users to create, edit,
and distribute content online is known as______.
A. Internet
B. social networking
C. virtual life
D. Web 2.0
Answer: Option D
Solution:
The set of applications and technologies that allow users to create, edit, and distribute content
online is known as Web 2.0. Web 2.0 Websites allow users to do more than just retrieve
information.
70.
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer: Option D
Solution:
Benchmark is a set of conditions used to measure how well a product or system functions.
Benchmarking is the process through which a company measures its products, services, and
practices against its toughest competitors, or those companies recognized as leaders in its industry.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 3
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Section3
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
1.
D. The potential audience for e-commerce is too low to support it as a widespread method of commerce
2.
A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer: Option C
Solution:
Capacity planning determines the future IT infrastructure requirements for new equipment and
additional network capacity.
3.
A. banner ads
B. pop-up ads
D. pop-under ads
Answer: Option C
Solution:
The fastest growing form of online advertising is rich media/video ads. Online advertising, also
called online marketing or Internet advertising or web advertising, is a form of marketing and
advertising which uses the Internet to deliver promotional marketing messages to consumers.
4.
A. Workflow
B. ASP
C. Workflow system
D. EIP
Answer: Option C
Solution:
Workflow system automates business processes. A workflow management system provides an
infrastructure for the set-up, performance and monitoring of a defined sequence of tasks, arranged
as a workflow application.
5.
All of the following are among the most common categories of spam
except ______.
A. fraud
B. commercial products
C. finance
D. health (drugs)
Answer: Option A
Solution:
All of the following are among the most common categories of spam except fraud. Fraud is
intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
6.
What defines all of the steps or business rules, from beginning to end,
required for a process to run correctly?
A. Workflow
B. EIP
C. Workflow system
D. SLA
Answer: Option A
Solution:
Workflow defines all of the steps or business rules, from beginning to end, required for a process to
run correctly.
7.
A. affiliate marketing
B. blog advertising
D. game advertising
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
All of the following are types of social marketing except affiliate marketing. Affiliate marketing is the
process of earning a commission by promoting other people's (or company's) products.
8.
Answer: Option D
Solution:
Messaging‐based workflow system sends work assignments through an e‐mail system.
9.
A. impression rate
B. view-through rate
C. click-through rate
D. stickiness ratio
Answer: Option C
Solution:
click-through rate measures the percentage of people exposed to an online advertisement who
actually click on the banner. Click-through rate (CTR) is the ratio of users who click on a specific
link to the number of total users who view a page, email, or advertisement.
10.
A. firewall
B. Virus
C. Trojan horse
Answer: Option A
Solution:
Firewall is not a computer resources. A firewall is a hardware or software device designed to permit
or deny data through a computer network in order to protect the resources of a private network from
users from other networks.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
11.
A. loyalty
B. reach
C. recency
D. unique visitors
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
Loyalty is a measure of the percentage of purchasers who return to a Web site within a year.
12.
A. Warehousing
B. sales
C. scheduling
Answer: Option D
Solution:
Enterprise resource planning (ERP) is a method of using computer technology to link various
Functions—such as accounting, inventory control, and human resources—across an entire
company. However, there are certain things that we need to consider in the ERP to enhance the
business processes.
13.
All of the following are metrics for e-mail campaigns except _________.
A. open rate
B. delivery rate
C. bounce-back rate
D. cart conversion rate
Answer: Option D
Solution:
All of the following are metrics for e-mail campaigns except cart conversion rate. The conversion
rate is the number of conversions divided by the total number of visitors.
14.
A. Warehousing
B. sales
C. scheduling
Answer: Option D
Solution:
The function of ERP are Warehousing, sales and scheduling.
15.
A. remain constant
B. decrease
C. increase
D. rapidly increase
Answer: Option B
Solution:
As consumers become more accustomed to new online advertising formats, click-through rates
tend to decrease.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
16.
Answer: Option C
Solution:
People outside the organization can't access it is the primary characteristic of an intranet.
17.
The ethical principle which states that if an action is not right for all
situations, then it is not right for any situation is known as __________.
B. Slippery Slope
C. No Free Lunch
D. Universalism
Answer & Solution Discuss in Board Save for Later
Answer: Option D
Solution:
The ethical principle which states that if an action is not right for all situations, then it is not right for
any situation is known as Universalism. Universalism is defined as an action that should be same in
all the situations.
18.
A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer: Option D
Solution:
Interoperability concept suggests that different applications and computer systems should be able
to communicate with one another. Interoperability is the ability of different information systems,
devices or applications to connect, in a coordinated manner, within and across organizational
boundaries to access, exchange and cooperatively use data amongst stakeholders, with the goal of
optimizing the health of individuals and populations.
19.
Answer: Option A
Solution:
Privacy is a moral right to be left alone. Privacy is the ability of an individual or group to seclude
themselves, or information about themselves, and thereby express themselves selectively. The
boundaries and content of what is considered private differ among cultures and individuals.
20.
A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer: Option D
Solution:
Web services encompasses all technologies used to transmit and process information on an across
a network. Web services is a standardized way or medium to propagate communication between
the client and server applications on the World Wide Web.
1234567891011121314
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
21.
A. Security
B. Enforcement
C. Choice/Consent
D. Access/Participation
Answer: Option D
Solution:
The ability of consumers to review and contest the accuracy and completeness of data collected
about them involves Access/Participation FTC fair information practice principles.
22.
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer: Option A
Solution:
Backup process can prevent from lose due to computer problems or human errors. Backup, or data
backup, or the process of backing up, refers to the copying into an archive file of computer data that
is already in secondary storage—so that it may be used to restore the original after a data loss
event.
23.
The __________ is the first major effort to adjust the copyright laws to
the Internet age.
A. Platform for Privacy Preferences (P3P)
Answer: Option C
Solution:
The Digital Millennium Copyright Act (DMCA) is the first major effort to adjust the copyright laws to
the Internet age. The Digital Millennium Copyright Act is a 1998 United States copyright law that
implements two 1996 treaties of the World Intellectual Property Organization. It criminalizes
production and dissemination of technology, devices, or services intended to circumvent measures
that control access to copyrighted works.
24.
Which process is used to reinstall data from a copy when the original
data has been lost?
A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer: Option B
Solution:
Recovery process is used to reinstall data from a copy when the original data has been lost. Data
restore is the process of copying backup data from secondary storage and restoring it to its original
location or a new location.
25.
A. 10
B. 20
C. 30
D. 40
Answer: Option B
Solution:
A patent grants the owner an exclusive monopoly on the ideas behind the invention for 20 years.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
26.
A. Performance
B. Capacity planning
C. Benchmarking
D. Data cleansing
Answer: Option C
Solution:
Benchmarking describes a process of continuously measuring results and comparing those results
to optimal performance so that actual performance may be improved.
27.
A. substantially smaller
B. slightly smaller
C. close to equal
D. equal
Answer: Option A
Solution:
The number of business methods patents granted is substantially smaller compared to the number
of patents applied for.
28.
A. firewall
B. EDI
C. ERP
D. Script kiddies
29.
A. cyber squatting
B. cyber piracy
C. meta tagging
D. key wording
Answer: Option B
Solution:
The redirection of traffic from a legitimate site to an infringing site is called cyber piracy. Piracy is
the unauthorized distribution, theft, reproduction, copying, performance, storage, sale or other use
of intellectual property (IP) protected under copyright law. It is a form of copyright infringement.
30.
Who breaks into other people's computer systems and steals and
destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
Hackers breaks into other people's computer systems and steals and destroys information. Hacking
refers to activities that seek to compromise digital devices, such as computers, smartphones,
tablets, and even entire networks.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
31.
B. Privatization
C. Self-Regulation
D. Governmental Regulation
Answer: Option B
Solution:
During Privatization period of Internet governance was Network Solutions given a monopoly to
assign and track high-level domains.
32.
A. Web log
B. Clickstream
Answer: Option D
Solution:
Spyware is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computer's CPU and
storage for some task you know nothing about.
33.
All of the following are acts Congress has passed or attempted to pass
to protect children online except __________.
Answer: Option A
Solution:
All of the following are acts Congress has passed or attempted to pass to protect children online
except Video Privacy Protection Act. The Video Privacy Protection Act of 1988 is United States
legislation that prevents wrongful disclosure of an individual's personally identifiable information
stemming from their rental or purchase of audiovisual material, including videotapes, DVDs and
video games.
34.
Answer: Option C
Solution:
ERP stands for Enterprise resource planning. It's a business process management software that
manages and integrates a company's financials, supply chain, operations, reporting, manufacturing,
and human resource activities.
35.
A. Cdt.org
B. PrivacyInternational.org
C. Epic.org
D. Privacy.org
Answer: Option A
Solution:
Cdt.org is a privacy advocacy group that is a foundation- and business-supported group with a
legislative focus.
1234567891011121314
Read More Section(Ecommerce)
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
36.
A. Legacy systems
B. Bolt on applications
C. Operational database
D. Cybersoft
Answer: Option D
Solution:
Cybersoft is not a component of ERP. Cybersoft is a leading provider of innovative business
software solutions, information technology and consulting services.
37.
Answer: Option B
Solution:
The first step in a P3P-enabled transaction is http GET request Web page.
38.
B. financial
C. warehousing
Answer: Option D
Solution:
Enterprise resource planning (ERP) is a method of using computer technology to link various
Functions such as accounting, inventory control, and human resources across an entire company.
However, there are certain things that we need to consider in the ERP to enhance the business
processes. All the above are functions of ERP.
39.
A. patents
B. trademarks
C. governance
D. copyrights
Answer: Option C
Solution:
All of the following are types of intellectual property protection except governance. Governance
encompasses the system by which an organisation is controlled and operates, and the mechanisms
by which it, and its people, are held to account.
40.
What is a type of virus that spreads itself, not just from file to file, but
from computer to computer via e‐mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial‐of‐service attack
Answer: Option B
Solution:
Worm is a type of virus that spreads itself, not just from file to file, but from computer to computer
via e‐mail and other Internet traffic. A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
41.
B. Consumer concerns about the privacy of personal information given to Web sites
Answer: Option D
Solution:
All of the following are challenges to online retail except Inability to change prices nearly instantly.
42.
What floods a Web site with so many requests for service that it slows
down or crashes?
A. Computer virus
B. Worm
C. Denial‐of‐service attack
Answer: Option C
Solution:
Denial‐of‐service attack floods a Web site with so many requests for service that it slows down or
crashes. A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims
to render a computer or other device unavailable to its intended users by interrupting the device's
normal functioning.
43.
A. barriers to entry
B. power of suppliers
C. power of consumers
Answer: Option A
Solution:
Barriers to entry is an industry strategic factor that relates to whether new entrants face a
disadvantage when attempting to enter an industry.
44.
A. Computer virus
B. Worm
C. Denial‐of‐service attack
Answer: Option D
Solution:
Grid computing harnesses far-flung computers together by way of the Internet or a virtual private
network to share CPU power, databases, and database storage.
45.
A. supply-push model
B. demand-push model
C. supply-pull model
D. demand-pull model
Answer: Option A
Solution:
Products are made to prior to orders received based on estimated demand under a supply-push
model. A company's supply chain stretches from the factory where its products are made to the
point the products are in customer hands.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
Section 1 Section 2 Section 3 Section 4 Section 5
46.
A. Risk management
B. Risk assessment
C. Security
Answer: Option A
Solution:
Risk management consists of the identification of risks or threats, the implementation of security
measures, and the monitoring of those measures for effectiveness. Risk management is the
process of identifying, assessing and controlling threats to an organization's capital and earnings.
47.
C. reducing commissions
Answer: Option B
Solution:
The major impact of Internet real estate sites is in influencing offline decisions..
48.
A. Risk management
B. Risk assessment
C. Security
Answer: Option B
Solution:
Risk assessment is the process of evaluating IT assets, their importance to the organization, and
their susceptibility to threats, to measure the risk exposure of these assets. A risk assessment is
the combined effort of: identifying and analyzing potential events that may negatively impact
individuals, assets, and/or the environment; and making judgments "on the tolerability of the risk on
the basis of a risk analysis" while considering influencing factors.
49.
A. Travelocity
B. Orbitz
C. Priceline
D. Expedia
Answer: Option D
Solution:
Expedia is the largest online travel service. Expedia is one of the fastest growing online travel
portals in Asia, offering travellers an extensive selection of hotels, activities and travel services to
meet every budget and activities of every kind at competitive rates.
50.
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer: Option A
Solution:
Backup is the process of making a copy of the information stored on a computer. Backup refers to
making copies of data so that the copies may be used to restore the original data after a data loss
event. Backups are extrememly important for computer management.
1234567891011121314
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
51.
Which of the following is not one of the top three online career service
providers?
A. CareerBuilder
B. Monster
C. HotJobs
D. USAJobs
Answer: Option D
Solution:
USAJobs is not one of the top three online career service providers. USAJobs is the United States
Government's website for listing civil service job opportunities with federal agencies.
52.
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer: Option B
Solution:
Anti‐virus software detects and removes or quarantines computer viruses. Antivirus software is a
program or set of programs that are designed to prevent, search for, detect, and remove software
viruses, and other malicious software like worms, trojans, adware, and more.
53.
D. Managerial recruitment
Answer: Option A
Solution:
The largest segment in the recruitment business is General job recruitment.
54.
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer: Option C
Solution:
Firewall is software that protects computers from intruders. A firewall typically establishes a barrier
between a trusted internal network and untrusted external network, such as the Internet.
55.
B. Employment agencies
D. Internet only
Answer: Option C
Solution:
The majority of job seekers rely on Internet and newspapers equally.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
56.
A. Backup
B. Anti‐virus
C. Firewall
D. Biometrics
Answer: Option D
Solution:
Biometrics is the use of physical characteristics — such as your fingerprint, the blood vessels in the
retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification.
57.
B. radio
C. Internet
D. newspaper
Answer: Option A
Solution:
The most popular type of media in terms of total hours of consumption per year is television.
Though consumption of video on digital platforms is on the rise in the country, good old television
continues to score in terms of penetration and has large headroom left to fill.
58.
A. Fingerprint
B. Retina
C. Password
D. Voice
Answer: Option C
Solution:
All of the following are considered biometrics, except Password. Biometrics are more secure than
traditional passwords and PINs.
59.
Which of the following describes paid content's relation to free user-
generated content?
C. Free content and paid content can both work in tandem cooperatively
Answer: Option C
Solution:
Free content and paid content can both work in tandem cooperatively describes paid content's
relation to free user-generated content.
60.
What scrambles the contents of a file so you can't read it without having
the right decryption key?
A. Encryption
B. Intrusion‐detection software
C. Security‐auditing software
Answer: Option A
Solution:
Encryption scrambles the contents of a file so you can't read it without having the right decryption
key. Encryption is the process of encoding a message or information in such a way that only
authorized parties can access it and those who are not authorized cannot. Encryption does not
itself prevent interference, but denies the intelligible content to a would-be interceptor.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
61.
The top U.S online video site is ______.
A. MySpace
B. YouTube
C. AOL
D. Google Video
Answer: Option B
Solution:
The top U.S online video site is YouTube. The most popular video hosting website is YouTube, with
1.8 billion logged-in users per month and the most extensive catalog of online videos.
62.
What is an encryption system that uses two keys: a public key that
everyone can have and a private key for only the recipient?
A. Encryption
C. Intrusion‐detection software
D. Security‐auditing software
Answer: Option B
Solution:
Public-key encryption is a cryptographic system that uses two keys - a public key known to
everyone and a private or secret key known only to the recipient of the message.
63.
A. technological convergence
B. content convergence
C. industry convergence
D. community convergence
Answer: Option D
Solution:
Community convergence is not a type of media convergence. Communities-Convergence means to
converge is an ancient custom; it means to reunite, to reconnect, to share, to celebrate, to
cooperate, to learn, to support, to dream and act as a single community that speaks with the same
voice and loves as one heart!
64.
What looks for people on the network who shouldn't be there or who are
acting suspiciously?
A. Encryption
C. Intrusion‐detection software
D. Security‐auditing software
65.
The online content revenue model in which free content drives offline
revenues is called the _________.
A. marketing model
B. advertising model
C. pay-per-view model
D. subscription model
Answer: Option A
Solution:
The online content revenue model in which free content drives offline revenues is called the
marketing model. Marketing mix modeling is statistical analysis such as multivariate regressions on
sales and marketing time series data to estimate the impact of various marketing tactics on sales
and then forecast the impact of future sets of tactics.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
66.
A. Encryption
C. Security‐auditing software
67.
Answer: Option A
Solution:
The combination of technical and legal means for protecting digital content from unlimited
reproduction without permission is known as Digital rights management. Digital rights management
(DRM) is a systematic approach to copyright protection for digital media.
68.
A. Your keyboard
B. Your monitor
C. Your processor
Answer: Option D
Solution:
Some computer viruses are programmed to harm your computer by damaging programs, deleting
files, or reformatting the hard drive.
69.
A. video
B. comments on blogs
C. RSS feeds
D. podcasts
Answer: Option C
Solution:
RSS feeds is the most commonly offered interactive feature of newspaper Web sites. RSS (Really
Simple Syndication) and Atom are two specialized formats that create what's commonly called a
news feed, or just feed. A feed is an easy way for sites to share headlines and stories so that you
can read them without having to visit two dozen different web pages everyday.
70.
Answer: Option D
Solution:
Some computer viruses are programmed to harm your computer by damaging programs, deleting
files, or reformatting the hard drive.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 4
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Section4
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
1.
D. copyright management
Answer: Option A
Solution:
Reduced transaction costs for the user is an advantage of e-books. An electronic book, also known
as an e-book or eBook, is a book publication made available in digital form, consisting of text,
images, or both, readable on the flat-panel display of computers or other electronic devices.
2.
Answer: Option D
Solution:
In simple terms, risk assessment can ask What can go wrong? How likely is it to go wrong? and
What are the possible consequences if it does go wrong?
3.
A. video games
B. music
C. radio
D. film
Answer: Option D
Solution:
After television, the next largest major player in the commercial entertainment industry is film.
4.
B. Blocks messages without the correct markings from entering the network
C. Detects computers communicating with the Internet without approval
Answer: Option D
Solution:
The characteristic of a firewall Examines each message as it seeks entrance to the network, Blocks
messages without the correct markings from entering the network and Detects computers
communicating with the Internet without approval.
5.
C. aggregator model
Answer: Option B
Solution:
User distribution model is not an entertainment industry value chain model. Distribution model
defines which applications in your distributed systems communicate with each other and which
types of data are distributed.
1234567891011121314
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
6.
Answer: Option D
Solution:
What you know, like a password, What you have, like an ATM card and What you look like all are
ways to prove access rights.
7.
Answer: Option D
Solution:
Technologies that help enhance resolution of e-book reader display screens are known as sub-pixel
display technologies. Subpixel rendering is a way to increase the apparent resolution of a
computer's liquid crystal display (LCD) or organic light-emitting diode (OLED) display by rendering
pixels to take into account the screen type's physical properties.
8.
A. Network
B. File
C. Folder
Answer: Option D
Solution:
Network, File and Folder can be protected by using a password.
9.
Answer: Option C
Solution:
All of the following are characteristics of a social network except always feature shared goals and
purposes.
10.
B. People
C. Information technology
D. Computers
Answer: Option B
Solution:
People is the most important component of IT. Their human-resource systems shine! People play a
vital role in most operational systems and processes. Knowledge, skills and attitudes often
determine the quality and quantity of system output.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
11.
A. advertising
B. subscriptions
C. donations
D. service fees
Answer: Option A
Solution:
Social networking sites primarily earn their revenue through advertising. The most common way for
websites to generate revenue is to allow companies to advertise on the site. Web advertising is still
an emerging market.
12.
A. Copyright
B. Intellectual property
C. Patent
D. Denial‐of‐service attack
Answer: Option C
Solution:
Patent applies to the implementation of an idea.
13.
A. general community
B. practice network
C. affinity community
Answer: Option D
Solution:
The type of social network described as a community built around a common interest such as
games, sports, music, and so on is called interest-based social network. An interest-based network
is exactly what it sounds like: a social network built around interests, using common threads to
bring members of an audience together. Whether for travel, food, fashion or cats, interest-based
networks are taking over the social media scene, and brands that get it stand to reap the benefits.
14.
When you purchase copyrighted software, what actually are you paying
for?
B. The cost of the CDs, manuals, and a share of the cost of the software development
Answer: Option D
Solution:
When we purchase copyrighted software, we are actually paying for The cost of the CDs, manuals,
and development of the software, The cost of the CDs, manuals, and a share of the cost of the
software development and A share of the cost of software development.
15.
A. dynamic
B. fixed
C. trigger
D. utilization
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
16.
Which of the following is not a dimension of privacy?
Answer: Option D
Solution:
Need for personal space, Need to feel in control of our possessions and Need to feel in control of
our personal information all are dimension of privacy.
17.
A. market inefficiency
B. trust risks
C. fulfillment costs
Answer: Option A
Solution:
Market inefficiency is not considered to be a drawback of Internet auctions. A market anomaly (or
market inefficiency) in a financial market is a price and/or rate of return distortion that seems to
contradict the efficient-market hypothesis.
18.
A. Key logger
B. Packet sniffer
Answer: Option D
Solution:
Screen capture software captures screen images. Screen recording software lets you capture your
screen to share with others, in support tickets, product videos, onboarding training, and more.
19.
20.
A. Key logger
B. Packet sniffer
D. Screen captures
Answer: Option B
Solution:
Packet sniffer examines information passing through switches, hubs and routers. Packet sniffing is
the act of capturing packets of data flowing across a computer network. The software or device
used to do this is called a packet sniffer.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
21.
A dynamically priced market that features few buyers and many sellers
is a market that exhibits ______.
A. market neutrality
B. buyer bias
C. seller bias
D. owner bias
Answer: Option B
Solution:
A dynamically priced market that features few buyers and many sellers is a market that exhibits
buyer bias.
22.
A. Key logger
B. Packet sniffer
D. Screen captures
Answer: Option C
Solution:
Log analysis tools records logons and deletions. Log analysis helps us in understanding what has
happened and derive useful metrics in monitoring, performance, digital marketing etc.
23.
C. English auction
24.
A. Sender's computer
B. Sender's server
C. Recipient's server
Answer: Option D
Solution:
E‐mail messages may be stored on Sender's computer, Sender's server and Recipient's server.
25.
B. social networking
C. commerce
D. content
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
26.
What might identity thieves do with your identity?
Answer: Option D
Solution:
Once identity thieves have your personal information, they can drain your bank account, run up
charges on your credit cards, open new utility accounts, or get medical treatment on your health
insurance. An identity thief can file a tax refund in your name and get your refund.
27.
Answer: Option A
Solution:
General purpose portal business model best describes Yahoo. Yahoo! is an Internet portal that
incorporates a search engine and a directory of World Wide Web sites organized in a hierarchy of
topic categories.
28.
B. Ask people to fill out and return a fake letter using postal mail
C. Ask people to click a link in an e‐mail to open a submission form on a web page
Answer: Option B
Solution:
Asking people to fill out and return a fake letter using postal mail is not a common approach to
phishing.
29.
A. ISP services
B. General advertising
C. Subscription fees
D. Tenancy deals
Answer: Option C
Solution:
Subscription fees portal revenue models involves charging for premium content.
30.
A. Phishing
B. Carding
C. Brand spoofing
Answer: Option D
Solution:
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is
called Phishing, Carding and Brand spoofing.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
31.
Which of the following best describes predicted growth in C2C and B2C
auction spending?
Answer: Option B
Solution:
Both types of spending will increase best describes predicted growth in C2C and B2C auction
spending.
32.
A. Job applications
B. Credit reports
Answer: Option D
Solution:
Companies can gather information about employees and potential employees from Job
applications, Credit reports and Companies that track Web surfers.
33.
An auction that has multiple winners that all pay the same price is an
example of________.
A. uniform pricing
B. discriminatory pricing
C. bid rigging
D. price matching
34.
Answer: Option D
Solution:
Cyber slacking consists of Visiting “inappropriate” web sites, Visiting news sites and Chatting online
with others about non‐work topics.
35.
A. ECD
B. EDI
C. IDE
D. BCB
Answer: Option B
Solution:
The communication standard for sharing business documents and settlement information that
emerged in the 1970s is called EDI. Electronic data interchange is the concept of businesses
electronically communicating information that was traditionally communicated on paper, such as
purchase orders and invoices.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
36.
Answer: Option D
Solution:
Cookies are used to Store your ID and password for subsequent logons to the site, Store contents
of electronic shopping carts and To track web activity.
37.
Answer: Option A
Solution:
All of the following are potential benefits of B2B e-commerce except reduced amount of 'first-mover'
advantages.
38.
A. Junk mail
B. Spam
C. Extra mail
Answer: Option B
Solution:
Unsolicited e‐mail is called Spam. Spam is electronic junk mail or junk newsgroup postings. Some
people define spam even more generally as any unsolicited email. However, if a long-lost brother
finds your email address and sends you a message, this could hardly be called spam, even though
it is unsolicited.
39.
A. MRO goods
B. procured goods
C. indirect goods
D. direct goods
Answer: Option D
Solution:
Goods directly involved in the production process are known as direct goods. Direct goods and
services are purchases that are directly related to the production of the particular good or service
that is being offered.
40.
A. No‐Spam
B. CAN‐Spam
C. Spam‐Away
D. Stop Spam
Answer: Option B
Solution:
CAN‐Spam is the name of the new anti‐Spam bill. Controlling the Assault of Non-Solicited
Pornography And Marketing (CAN-SPAM) is a law that establishes the rules for commercial email
and commercial messages, gives recipients the right to have a business stop emailing them, and
outlines the penalties incurred for those who violate the law.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
41.
A. spot purchasing
Answer: Option C
Solution:
A materials requirements planning (MRP) system is an example of a legacy computer system.
Material requirements planning (MRP) is a system for calculating the materials and components
needed to manufacture a product. It consists of three primary steps: taking inventory of the
materials and components on hand, identifying which additional ones are needed and then
scheduling their production or purchase.
42.
A. Ethics
B. Intellectual property
C. Copyright
Answer: Option C
Solution:
Copyright is the legal protection afforded an expression of an idea, such as a song, video game,
and some types of proprietary documents. Copyright refers to the legal right of the owner of
intellectual property. In simpler terms, copyright is the right to copy.
43.
The foundation for contemporary supply chain management systems
includes all of the following except _________.
C. ERP systems
Answer: Option D
Solution:
The foundation for contemporary supply chain management systems includes all of the following
except B2B electronic storefronts.
44.
B. Pirated software
C. Counterfeit software
D. Privacy
Answer: Option B
Solution:
Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted software.
Software piracy is the illegal copying, distribution, or use of software.
45.
Answer: Option D
Solution:
The two main types of Internet-based B2B commerce are EDI and private industrial networks.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
46.
C. Cookie
D. Adware
Answer: Option A
Solution:
Key logger software is a program, when installed on a computer, records every keystroke and
mouse click. A keylogger can be either a piece of software or a small hardware device that is used
to capture the keystrokes that are typed on the keyboard.
47.
A. industry consortium
B. independent exchange
C. e-distributor
D. e-procurement marketplace
Answer: Option C
Solution:
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an e-
distributor. E-distribution is a type of distribution that uses purely electronic media. It is often
interpreted as the buying or selling of services or goods over a public network without the physical
media; this is usually done by downloading from the Internet to the consumer's electronic device.
48.
A. Adware
B. Trojan‐horse software
C. Spyware
Answer: Option D
Solution:
Adware, Trojan‐horse software and Spyware is software we don't want hidden inside a software.
49.
A. e-procurement marketplace
B. e-distributors
C. industry consortia
D. independent exchanges
Answer: Option B
Solution:
The most common and easily understood type of Net marketplace is e-distributors. is a type of
distribution that uses purely electronic media. It is often interpreted as the buying or selling of
services or goods over a public network without the physical media; this is usually done by
downloading from the Internet to the consumer's electronic device.
50.
A. Digital cash
B. Electronic cash
C. E‐cash
D. All of the above
Answer: Option D
Solution:
Digital cash, Electronic cash and E‐cash is an electronic representation of cash.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
51.
Answer: Option B
Solution:
All of the following are objectives of private industrial networks except operating on a local scale.
52.
A. Wearable computer
B. GPS
C. Implant chip
Answer: Option A
Solution:
Wearable computer is a fully‐equipped computer that you wear as a piece of clothing or attached to
a piece of clothing similar to the way you would carry your cell phone on your belt.
53.
Answer: Option D
Solution:
E-commerce increases the net cost per contact is not one of the benefits of e-commerce to sellers.
54.
A. Wearable computer
B. GPS
C. Implant chip
D. None of the above
Answer: Option C
Solution:
Implant chip is a technology‐enabled microchip implanted into the human body. A human microchip
implant is typically an identifying integrated circuit device or RFID transponder encased in silicate
glass and implanted in the body of a human being.
55.
Answer: Option C
Solution:
The E-commerce domain that involves business activity initiated by the consumer and targeted to
businesses is known as Consumer to Business (C2B). Consumer-to-business (C2B) is a business
model in which consumers (individuals) create value and businesses consume that value.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
56.
Which of the following is not a reason why digital cash has turned out
to be extremely difficult?
Answer: Option B
Solution:
There is only one standard is not a reason why digital cash has turned out to be extremely difficult.
57.
A. bitstream
B. virtual network
C. web community
Answer: Option D
Solution:
A private trading network is a B2B trading network that links a particular seller with its own trading
partners. Private e-marketplaces, also known as private trading networks, are particularly well
suited for manufacturing organizations such as Cisco's that: Cisco's eHub Initiative.
58.
A. Encryption
B. Firewall
C. Hub
Answer: Option A
Solution:
Smart card is better protected than other cards using Encryption. Encryption is the process of
encoding a message or information in such a way that only authorized parties can access it and
those who are not authorized cannot.
59.
A. marketing
B. click-and-mortar
C. customer service
D. corporate
Answer: Option D
Solution:
The type of website that is designed to build customer goodwill and to supplement other sales
channels rather then sell the company's products directly is known as a corporate website. The
purpose of these sites is to provide information about the company and its products or services.
60.
C. BSNL only
D. None
Answer: Option A
Solution:
Trust card is introduced by BSNL and itzcash. Trust Card is a multipurpose prepaid payment card
brought to you by BSNL in association with ItzCash. With this card you can make payments for your
BSNL Bills (Postpaid bills & Prepaid top-ups), purchase BSNL Value Added Services viz.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
61.
A. Visceral
B. Virile
C. Viral
D. Virtual
Answer: Option C
Solution:
Viral marketing is the Internet version of word-of-mouth marketing. Viral Marketing is that which is
able to generate interest and the potential sale of a brand or product through messages that spread
like a virus, in other words, quickly, and from person to person. The idea is for it to be the users
themselves that choose to share the content.
62.
B. eBay.in
C. amazon.com
D. none
Answer: Option B
Solution:
PaisaPay is offered only by eBay.in. An eBay India owned, safe & secured payment service;
PaisaPay enables Buyers to pay for their purchases using Credit Card, Debit Card, Online Bank
Transfer or Cash on Delivery.
63.
B. To decrease costs
C. It is required in EC
Answer: Option A
Solution:
A merchant want to customize products because to charge a higher price.
64.
The E‐payment mechanism widely used in B2B is.
A. Credit card
B. Debit card
C. Master card
D. E‐cheque
Answer: Option D
Solution:
The E‐payment mechanism widely used in B2B is E‐cheque. An electronic version or
representation of a paper cheque. The account holder writes an e-check (or e-cheque) using a
computer or other type of electronic device and transmits the e-cheque to the payee electronically.
Like paper cheques, e-checks are signed by the payer and endorsed by the payee.
65.
A. Reintermediation
B. Syndication
C. Virtual Manufacturing
D. Build-to-order
Answer: Option B
Solution:
A website offering content created by third party transparently to customers is an example of
Syndication. a group of individuals or organizations combined or making a joint effort to undertake
some specific duty or carry out specific transactions or negotiations.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
66.
Which type of technology will increase portability and mobility?
A. Implant chips
B. Micro‐payments
Answer: Option D
Solution:
Implant chips, Micro‐payments and Internet phone calls type of technology will increase portability
and mobility.
67.
Answer: Option A
Solution:
An accurate statement about internet phone calls is that they are possible but not yet free.
68.
A. Keyboard
B. Mouse
Answer: Option C
Solution:
Keyboard and Mouse are the most commonly used input devices today.
69.
A. Biochip
B. Implant chip
D. Vision chip
Answer: Option C
Solution:
Facial recognition software can be used to help identify people in a crowd. A facial recognition
system is a technology capable of identifying or verifying a person from a digital image or a video
frame from a video source.
70.
A. Credit card
B. Debit card
C. Paper cash
Answer: Option A
Solution:
Credit card is also known as plastic money. Credit Card is a small plastic card that is issued by
financial institutions such as banks. As the name Credit when one buys using credit card, one is
buying by taking loan.
1234567891011121314
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 5
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Section5
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
1.
A. Prepaid
B. Postpaid
D. None of these
Answer: Option A
Solution:
E‐cheques are Prepaid. E-cheques are a mode of electronic payments.
2.
Digital signature is a.
C. Both a and b
D. None of these
Answer: Option C
Solution:
Digital signature is a Digital id,send as an attachment to a web page/e‐mail/message and it is used
for verifying the attachments send using web. A digital signature is a mathematical technique used
to validate the authenticity and integrity of a message, software or digital document.
3.
A. CC user software
B. CC merachant software
C. CC Server Software
Answer: Option D
Solution:
CC user software, CC merachant software and CC Server Software are the component of
cybercash payment system.
4.
A. Memory
B. Microchip
C. E‐cash
Answer: Option B
Solution:
The presence of Microchip make the smart card smart.
5.
The smart card which use antenna for reading and writing data.
D. Both B and C
Answer: Option D
Solution:
The smart card which use antenna for reading and writing data are Contactless smart card and
Proximity smart card.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
6.
‐‐‐‐‐‐‐‐‐ card is read only mode.
D. Both B and C
Answer: Option C
Solution:
Proximity smart card is read only mode. A proximity card or prox card is a "contactless" smart card
which can be read without inserting it into a reader device, as required by earlier magnetic stripe
cards such as credit cards and "contact" type smart cards.
7.
Which of the smart card uses a sim like structure for reading and
writing data?
D. Both B and C
Answer: Option A
Solution:
Contact smart card uses a sim like structure for reading and writing data. This type of smart card
consists of electrical contacts which are used to connect to the card reader where the card is
inserted. The electrical contacts are deployed on a conductive gold plated coating on the card
surface.
8.
A. SCM
B. EDI
C. WWW
D. BPR
Answer: Option D
Solution:
BPR is not a feature of eCommerce. Business process re-engineering is a business management
strategy, originally pioneered in the early 1990s, focusing on the analysis and design of workflows
and business processes within an organization.
9.
A. International
B. Integrity
C. Identity
Answer: Option B
Solution:
I stands for Integrity in CIA of smart card. CIA stands for confidentiality, integrity and availability,
which are said to be the three most important elements of reliable security.
10.
A. auditing
B. authenticity
C. authorized
Answer: Option B
Solution:
A stands for authenticity in CIA of smart card.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
11.
A. confidentiality
B. conference
C. congress
Answer: Option A
Solution:
C stands for confidentiality in CIA of smart card.
12.
Which one is the third party payment providers who offer digital wallets
for E‐merchants?
A. Oxicash
B. PayMate
C. PayPass
Answer: Option D
Solution:
Oxicash, PayMate and PayPass is the third party payment providers who offer digital wallets for E‐
merchants.
13.
A. MCID
B. MMID
C. RSID
14.
A. Threat
B. Danger
C. Error
Answer: Option A
Solution:
Threat is an act that poses danger to computer assets.
15.
A. RSA
B. DES
C. AES
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
16.
Which one is not used as a security mechanism?
A. Encryption
B. Cryptography
C. Wallets
D. Digital signature
Answer: Option C
Solution:
Wallets is not used as a security mechanism. All the others are used.
17.
A. G2G
B. G2B
C. G2C
D. G2G
Answer: Option B
Solution:
G2B e‐government arena is being used when governmental agencies send out and accept bids for
work. In this type of interaction, e-Governance tools are used to help the business organizations
that provide goods and services to seamlessly interact with the government.
18.
D. None of these
Answer: Option B
Solution:
Secret key is used for Private key cryptography. A private key, also known as a secret key, is a
variable in cryptography that is used with an algorithm to encrypt and decrypt code. Secret keys are
only shared with the key's generator, making it highly secure. Private keys play an important role in
symmetric cryptography, asymmetric cryptography and cryptocurrencies.
19.
A. Sniffer programs
B. Cyber vandalism
C. Integrity threats
Answer: Option D
Solution:
Sniffer programs, Cyber vandalism and Integrity threats are communication channel threat.
20.
A. SSL
B. S‐HTTP
C. SET
Answer: Option D
Solution:
SSL, S‐HTTP and SET are communication channel security protocol.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
21.
The protocol which allows the file transfer between computers is.
A. TCP/IP
B. FTP
C. HTTP
D. SOA
Answer: Option B
Solution:
The protocol which allows the file transfer between computers is FTP. The File Transfer Protocol
(FTP) is a standard network protocol used for the transfer of computer files between a client and
server on a computer network.
22.
A. ATMs
B. Net banking
C. Traditional banking
D. None of these
Answer: Option B
Solution:
E‐Banking is also known as Net banking. Electronic banking has many names like e banking, virtual
banking, online banking, or internet banking. It is simply the use of electronic and
telecommunications network for delivering various banking products and services. Through e-
banking, a customer can access his account and conduct many transactions using his computer or
mobile phone. In this article, we will look at the importance and types of e-banking services.
23.
A. EFT
B. EPS
C. PayPal
D. None of these
24.
A. Malicious code
B. Viruses
C. Active contents
Answer: Option D
Solution:
Malicious code, Viruses and Active contents are client level threat.
25.
A. RSA
B. DES
C. AES
D. FTP
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
26.
Which one is an encryption technique?
A. RSA
B. DES
C. AES
Answer: Option D
Solution:
RSA, DES and AES are encryption technique.
27.
A. Malicious code
B. CGI threats
C. Database threats
D. Buffer overflows
Answer: Option A
Solution:
Malicious code is not a server level threat. Malicious code is the term used to describe any code in
any part of a software system or script that is intended to cause undesired effects, security
breaches or damage to a system. Malicious code is an application security threat that cannot be
efficiently controlled by conventional antivirus software alone.
28.
A. Hacking
B. Storm
C. Phishing
Answer: Option A
Solution:
Hacking is not a physical threat. Hacking generally refers to unauthorized intrusion into a computer
or a network.
29.
A. Phishing
B. Storm
C. Earthquake
Answer: Option D
Solution:
Phishing, Storm and Earthquake all are physical threat.
30.
A. Home page
B. Web pages
Answer: Option D
Solution:
The basic elements of website is Home page, Web pages and Links and banners.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
31.
A. Trojan horse
B. firewall
C. encryption
D. None
Answer: Option A
Solution:
Trojan horse is threat for E‐commerce. A Trojan horse or Trojan is a type of malware that is often
disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to
gain access to users' systems. Users are typically tricked by some form of social engineering into
loading and executing Trojans on their systems.
32.
Answer: Option D
Solution:
Secure communication means Protect transmission of credit card number, Guarantee privacy of
customer and Unauthorized access of payment details.
33.
A. Cash on delivery
C. Demand drafts
D. e‐cheque
Answer: Option D
Solution:
E‐cheque is not an offline payment mode. An eCheque is a payment that you make directly from
your bank account. You can only send an eCheque if your bank account is the only payment
method attached to your bank account, and you don't have a credit or debit card as a back-up
payment method.
34.
Which one is an offline payment mode?
A. Cash on delivery
C. Credit card
D. Both a and b
Answer: Option D
Solution:
Both Cash on delivery and Cash before delivery are offline payment mode.
35.
A. Cash on delivery
B. Debit card
C. Credit card
D. e‐cheque
Answer: Option A
Solution:
Cash on delivery is not an online payment mode. It is an offline payment mode.
12345678910
Read More Section(Ecommerce)
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
36.
A. Debit card
B. Credit card
C. e‐cheque
D. none
Answer: Option D
Solution:
Debit card, Credit card and e‐cheque all are E‐payment method used in India.
37.
B. On Time processing
D. None
Answer: Option A
Solution:
A one-time password (OTP), also known as one-time pin or dynamic password, is a password that
is valid for only one login session or transaction, on a computer system or other digital device.
38.
A. Trojan horse
B. Viruses
C. Worm
D. None
Answer: Option D
Solution:
Trojan horse, Viruses and Worm all are threat for E‐commerce.
39.
A. Public key
B. Symmetric
C. Asymmetric
D. None
Answer: Option B
Solution:
Private Key cryptography is also known as Symmetric cryptography. A private key is a tiny bit of
code that is paired with a public key to set off algorithms for text encryption and decryption. It is
created as part of public key cryptography during asymmetric-key encryption and used to decrypt
and transform a message to a readable format.
40.
A. Private key
B. Symmetric
C. Asymmetric
D. None
Answer: Option C
Solution:
Public key cryptography is also known as Asymmetric cryptography. Asymmetric cryptography, also
known as public key cryptography, uses public and private keys to encrypt and decrypt data. The
keys are simply large numbers that have been paired together but are not identical (asymmetric).
One key in the pair can be shared with everyone; it is called the public key.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
41.
A. Spam
B. Viral marketing
C. Affiliate programs
Answer: Option C
Solution:
Affiliate programs is an arrangement made between e‐commerce sites that direct users from one
site to the other.
42.
A. Physical layer
B. Product layer
C. Service layer
D. None
Answer: Option D
Solution:
Physical layer, Product layer and Service layer all are layer of E‐commerce infrastructure.
43.
A. Worm
B. Virus
C. Trojan horse
Answer: Option D
Solution:
Worm, Virus and Trojan horse will harm computer resources.
44.
A. Decryption
B. Cryptography
C. Firewall
Answer: Option B
Solution:
The study of encryption is called Cryptography. Cryptography is associated with the process of
converting ordinary plain text into unintelligible text and vice-versa.
45.
A. Integrity
B. Security
C. Confidentiality
Answer: Option D
Solution:
During E‐commerce transaction we should ensure Integrity, Security and Confidentiality.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us
Login
Home
Aptitude
English
Reasoning
DI
GK
Current Affairs
Interview
Computer
Programming
Engineering
More
Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
46.
The virus that are commonly found in word documents are called
__________.
A. Macro
B. Trojan horse
C. Script virus
Answer: Option A
Solution:
The virus that are commonly found in word documents are called Macro. A macro virus is a
computer virus written in the same macro language used for software programs, including Microsoft
Excel or word processors such as Microsoft Word.
47.
The virus that are attached with vb and java files are called.
A. Macro
B. Trojan horse
C. Script virus
Answer: Option C
Solution:
The virus that are attached with vb and java files are called Script virus. A Script Virus is spread via
webpages and has several properties such as being easy to program, malicious, and highly
infectious. Even if you are a rookie programmer you can create a new type of Script Virus in a short
time.
48.
A. Mails
C. Websites
D. All the above
Answer: Option D
Solution:
The viruses spreads through Mails, Pen drives and cds and Websites.
12345678910
Each Section contains maximum 70 questions. To get more questions visit other sections.
Ecommerce - Section 1
Ecommerce - Section 2
Ecommerce - Section 3
Ecommerce - Section 4
Copyright © 2019 Examveda.com
About Us |
Terms & Condition |
Privacy Policy |
Contact Us