On This Page

This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 7

Q1 | E-mail which contains useless material is termed as……………
  • spam
  • useless mail
  • trunk mail
  • junk mail
Q2 | India has enacted the first IT Act in the year……………………
  • 2001
  • 2002
  • 2009
  • 2000
Q3 | Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
  • cyber terrorism
  • child pornography
  • video voyeurism
  • none of these
Q4 | Trade mark, copyright, patent law etc comes under the purview of……………………
  • data protection
  • telecommunication laws
  • intellectual property laws
  • none
Q5 | Which one of the following is not a principle of e-commerce ?
  • privacy
  • integrity
  • authentication
  • none of these
Q6 | ………………is basically a secure gate between our organization data and internet.
  • network firewall
  • antivirus
  • both of these
  • none of these
Q7 | ………………is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
  • biometrics
  • pin
  • both of these
  • none of these
Q8 | ……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.
  • customer
  • issuer
  • merchant
  • acquirer
Q9 | In …………………..type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
  • prepaid
  • post paid
  • both of these
  • none of these
Q10 | .……………….is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters
  • e-commerce
  • commerce
  • both of these
  • none
Q11 | ……………….always operate on intranet
  • e--commerce
  • e-business
  • edi
  • none of these
Q12 | Which among the following is not an example for E-commerce
  • amazon.com
  • baazar.com
  • e-trade.com
  • none of these
Q13 | ………………were the first to establish prominent E-commerce Brands
  • baazar.com
  • e-bay and amazon
  • e-trade.com
  • none of these
Q14 | …………….is a form of supply chain where a series of assembly operations are carriedout to obtain the final product
  • converging supply chain
  • diverging supply chain
  • any of these
  • none
Q15 | .…………………is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.
  • converging structure
  • diverging structure
  • any of these
  • none
Q16 | ……………………is the exchange of services, information or product from onebusiness to a government agency
  • b2g
  • b2e
  • b2b
  • p2p
Q17 | ………………….is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files
  • b2c
  • b2e
  • b2b
  • p2p
Q18 | ”Google” is one of the most popular………………..
  • portal
  • browser
  • search engine
  • none of these
Q19 | A ………………….. Presents information from diverse sources in a unified way in aweb site.
  • web portal
  • link page
  • both of these
  • none of these
Q20 | ……………………….is a person who breaks in or trespasses a computer system
  • hacker
  • snooper
  • operator
  • spoofer
Q21 | Peer to Peer [P2P] is also used to describe ………………………
  • c2c
  • b2e
  • b2b
  • b2c
Q22 | ……………..allows the person to type ion just the main word or words and the site willcome in
  • web page
  • home page
  • domain
  • none of these
Q23 | A ………………….. presents information from diverse sources in a unified way in aweb site
  • web portal
  • link page
  • both of these
  • none of these
Q24 | In Biometrics,…………………………ID system is designed to prevent one personfrom using more than one identity
  • positive id system
  • negative id system
  • both of these
  • none of these
Q25 | …………………..are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.
  • network firewall
  • computer virus
  • both of these
  • none of these