Description : For carrying out C2C e-Commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)Secure electronic communication link ... a. i and ii b. ii and iv c. i and iii d. i and iv
Last Answer : c. i and iii
Description : For carrying out B2C e-Commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v) Secure electronic communication link ... . i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv
Last Answer : a. i, iv
Description : For carrying out B2B e-Commerce the following infrastructure is essential: (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)Secure electronic communication link ... . ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v
Last Answer : c. ii, iii, iv, v
Description : In B2B e-Commerce (i) Co-operating Business should give an EDI standard to be used (ii) Programs must be developed to translate EDI forms to a form accepted by application program (iii) Method of transmitting/receiving data should be ... . i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : b. i, ii, iii
Description : Which type of e-commerce focuses on consumers dealing with each other? a. B2B b. B2C c. C2Bs d. C2C
Last Answer : d. C2C
Description : Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? a. B2B b. B2C c. C2B d. C2C
Last Answer : a. B2B
Description : Most individuals are familiar with which form of e‐commerce? a. B2B b. B2C c. C2B d. C2C
Last Answer : b. B2C
Description : Which type of e‐commerce focuses on consumers dealing with each other? a. B2B b. B2C c. C2B d. C2C
Description : Advantages of B2C commerce to customers are (i)wide variety of goods can be accessed and comparative prices can be found (ii) shopping can be done at any time (iii)privacy of transactions can be guaranteed (iv) ... be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : a. i and ii
Description : B2C commerce a. includes services such as legal advice b. means only shopping for physical goods c. means only customers should approach customers to sell d. means only customers should approach business to buy
Last Answer : a. includes services such as legal advice
Description : Advantages of B2C commerce are (i) Business gets a wide reach to customers (ii) Payment for services easy (iii)Shop can be open 24 hours a day seven days a week (iv)Privacy of transaction always maintained a. i and ii b. ii and iii c. i and iii d. iii and iv
Description : EDI standards are a. not universally available b. essential for B2B commerce c. not required for B2B commerce d. still being evolved
Last Answer : b. essential for B2B commerce
Description : By Electronic Commerce we mean: a. Commerce of electronic goods b. Commerce which depends on electronics c. Commerce which is based on the use of internet d. Commerce which is based on transactions using computers connected by telecommunication network
Last Answer : d. Commerce which is based on transactions using computers connected by telecommunication network
Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks
Last Answer : b. financial electronic data interchange
Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace
Last Answer : d. Electronic marketplace
Description : Which of the following type of business relationships can be facilitated via e- marketing a. B2B b. B2C c C2C d. all the above
Description : .Which of the following type of business relationships can be facilitated via e-marketing- a. B2B b. B2C c. C2C d. all the above
Last Answer : d. all the above
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv
Last Answer : It's D
Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce
Last Answer : c. filters packets travelling from and to the intranet from the internet
Description : Disadvantages of e-Commerce in India are (i) internet access is not universally available (ii) Credit card payment security is not yet guaranteed (iii) Transactions are de-personalized and human contact is missing (iv) Cyberlaws ... i and ii b. ii and iii c. i, ii, iii d. i, ii, iii, iv
Last Answer : c. i, ii, iii
Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably using- a. Digital wallets b. Electronic data interchange c. B2C d. Smart cards
Last Answer : b. Electronic data interchange
Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv
Description : Which of the following is part of the four main types for e‐commerce? a. B2B b. B2C c. C2B d. All of the above
Last Answer : d. All of the above
Description : What is the name for direct computer to computer transfer of transaction information contained in business document? a) Internet commerce b) E-commerce c) Transaction information transfer d) Electronic data interchange
Last Answer : d) Electronic data interchange
Description : What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? a. internet commerce b. e-commerce c.transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably usinga. Digital wallets b. Electronic data interchange c. B2C d. Smart cards
Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.
Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.
Description : EDIFACT is a standard a. for representing business forms used in e-Commerce b. for e-mail transaction for e-Commerce c. for ftp in e-Commerce d. protocol used in e-Commerce
Last Answer : a. for representing business forms used in e-Commerce
Description : The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services
Last Answer : a. credit card payment
Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Description : In Electronic cash payment (i) a customer withdraws “coins” in various denominations signed by the bank (ii)the bank has a database of issued coins (iii) the bank has a database of spent coins (iv) the bank cannot trace a customer a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Description : In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions
Last Answer : b. a customer buys several electronic coins which are digitally signed by coin issuing bank
Description : In electronic cheque payments developed, it is assumed that most of the transactions will be a. customers to customers b. customers to business c. business to business d. banks to banks
Last Answer : c. business to business
Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender
Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows
Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services
Last Answer : b. to allow intranet users to securely use specified internet services
Description : The practice of lending money to unrelated individuals, or “peers”, without going through a traditional financial intermediary such as a bank or other traditional financial institution is called__________ A. B2B transactions B. C2C transactions C. P2P lending D. PPP Model E. P2P Investing
Last Answer : C. P2P lending Explanation: P2P lending, is the practice of lending money to individuals or businesses through online services that match lenders directly with borrowers.
Description : EDI over internet uses a. MIME to attach EDI forms to e-mail messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms
Last Answer : a. MIME to attach EDI forms to e-mail messages
Description : Which segment is eBay an example? a. B2B b. C2B c. C2C d. None of the above
Last Answer : d. None of the above
Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv
Description : In the NetBill's protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii)the vendor is guaranteed payment when information is delivered (iii) the customer ... , ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv
Last Answer : d. i, ii, iv
Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : d. i and iv
Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : c. i, ii, iii, iv
Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Description : A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user’s application programs
Last Answer : a. routers which connect intranet to internet
Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet
Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
Description : For secure EDI transmission on internet a. MIME is used b. S/MIME is used c. PGP is used d. TCP/IP is used
Last Answer : b. S/MIME is used