Description : Digital products are best suited for B2C e‐commerce because they: a. Are commodity like products b. Can be mass‐customized and personalized c. Can be delivered at the time of purchase d. All of the above
Last Answer : d. All of the above
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above
Last Answer : c. all of the above
Description : What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? a. Direct materials b. Indirect materials c. EDI d. None of the above
Last Answer : a. Direct materials
Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs
Last Answer : c. Entry barriers
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA
Last Answer : a. Workflow
Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP
Last Answer : c. Workflow system
Description : What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : b. Hot site
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace
Last Answer : d. Electronic marketplace
Description : Materials used in the normal operation of a business but not related to primary business operations are called what? a. Supplies b. Direct materials c. Indirect materials d. Daily stuff
Last Answer : c. Indirect materials
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Last Answer : d. all the above
Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet
Last Answer : c. Reverse auction
Description : What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? a. Direct materials b. Indirect materials c. EDI d. None of the above
Last Answer : b. Indirect materials
Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above
Last Answer : b. ERP
Description : Which of the following describes e‐commerce? a. Doing business electronically b. Doing business c. Sale of goods d. All of the above
Last Answer : a. Doing business electronically
Description : Are there any grocery stores which offer "on-line grocery item ordering with delivery services for Demorest, GA?
Last Answer : I was unable to find any grocery stores in your area that offers delivery services. However, there are some delivery services that are located in the Atlanta, GA area however I would call them and see ... every location in the U.S. and we don't charge anything for individual orders to our members
Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C
Last Answer : a) Contact smart card
Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above
Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above
Last Answer : a. Hacking
Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above
Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above
Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows
Last Answer : a. Malicious code
Description : Which one is an encryption technique? a. RSA b. DES c. AES d. All of the above
Description : Which one is not an encryption technique? a. RSA b. DES c. AES d. FTP
Last Answer : d. FTP
Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce a. EFT b. EPS c. PayPal d. None of these
Last Answer : b. EPS