E Commerce Set 10
On This Page
This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 10
Q1 | ____ is an online retail store.
- portal
- service provider
- e-tailer
- content provider
Q2 | Identify the identity of a person or entity with whom you are dealing on Internet is knownas ______.
- integrity
- authenticity
- authorisation
- none of these
Q3 | ____ means that the information being displayed on a Web site/transmitted/received overthe Internet has not been changed in any way by an un-authorised party.
- integrity
- authenticity
- authorisation
- none of these
Q4 | In public key encryption ______ keys are used.
- public and private
- only public
- only private
- session
Q5 | SET is developed by association led by _________.
- master card and visa
- master card
- visa
- rupay
Q6 | The technology behind M-commerce is based on ______.
- http
- https
- wap
- pop
Q7 | ________ is virtual representation of physical market.
- edi
- electronic market
- e-commerce
- internet commerce
Q8 | _____ allows you paperless transaction.
- edi
- electronic market
- e-commerce
- internet commerce
Q9 | _____ means the information being displayed on a Web site or transmitted or receivedover the Internet has not been changed in any way by an unauthorized party.
- integrity
- confidentiality
- authenticity
- privacy
Q10 | In ________ encryption is performed with session key.
- public key
- private key
- ssl
- set
Q11 | olx.com is an example of ________
- b2b
- b2c
- c2c
- p2p
Q12 | ______ are sites that creates a digital online environment where people with similarinterest can transact.
- community provider
- market creator
- portal
- service provider
Q13 | Flipkart.com is an example of _______.
- b2b
- b2c
- c2c
- p2p
Q14 | Normally in M-commerce language used to create web pages is _______.
- html
- wml
- vb
- xml
Q15 | _____ is an art of attempting to acquire information by masked as trustworthy entity.
- hacking
- phishing
- sniffing
- spoofing
Q16 | SSL can be used only with _____.
- ftp
- http
- pop
- smtp
Q17 | _____ means converting cipher text to plain text.
- encryption
- decryption
- conversion
- de-conversion
Q18 | ______ means converting plain text to cipher text.
- encryption
- decryption
- conversion
- de-conversion
Q19 | In Public Key Encryption ______ key is used for Encryption.
- receiver’s public
- receiver’s private
- sender’s public
- sender’s private
Q20 | In Public Key Encryption ______ key is used for Decryption.
- receiver’s public
- receiver’s private
- sender’s public
- sender’s private
Q21 | _____ can read the cipher text.
- sender
- receiver
- any one
- no one
Q22 | When message & data are available only to those who are authorized to view them isknown as ______ .
- integrity
- confidentiality
- authenticity
- privacy
Q23 | Digital Accumulating Balance Payment System is generally used for ______ payments.
- micro
- macro
- credit card
- debit card
Q24 | Scope of E-Commerce is ______.
- local
- global
- within own country
- within own state
Q25 | ______ means found everywhere.
- universal
- ubiquity
- global
- local