Description : Which is a function of ERP? a. Warehousing b. sales c. scheduling d. all of the above
Last Answer : d. all of the above
Description : Which is not a function of ERP? a. Warehousing b. sales c. scheduling d. None of the above
Last Answer : d. None of the above
Description : ERP stands for a. Enterprise resolution planning b. Enterprise reverse planning c. Enterprise resource planning d. None of the above
Last Answer : c. Enterprise resource planning
Description : Which is not a function of E‐commerce a. marketing b. advertising c. warehousing d. none of the above
Last Answer : c. warehousing
Description : Which is a function of E‐commerce a. marketing b. advertising c. warehousing d. all of the above
Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft
Last Answer : d. Cybersoft
Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Last Answer : a. firewall
Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above
Last Answer : b. ERP
Description : Which is a function of ERP? a. Warehousing b. Sales c Scheduling d. all of the above
Last Answer : b. Sales
Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange
Last Answer : b. use secure electronic transactions
Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks
Last Answer : b. financial electronic data interchange
Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above
Last Answer : c. electronic bill presentment and payment
Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above
Last Answer : Answer: D
Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary
Last Answer : d. financial cybermediary
Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : b. Risk assessment
Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : a. Risk management
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : What is a technology‐enabled microchip implanted into the human body? a. Wearable computer b. GPS c. Implant chip d. None of the above
Last Answer : c. Implant chip
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : What is Enterprise Resource Planning (ERP ) ?
Last Answer : Enterprise resource planning (ERP) coordinates the overall external and internal information management of an organization, including the organization's finances / accounting , manufacturing , sales and ... and network configurations. It usually controls a database as a repository of information.
Description : ERP stands for a) Enterprise resolution planning b) Enterprise reveres planning c) Enterprise resource planning d) None of the above
Last Answer : c) Enterprise resource planning
Description : ERP is an acronym for ______: a) Enterprise Retirement Planning b) Enterprise Relationship Planning c) Enterprise Resource Planning d) Enterprise Reorder Planning e) Enterprise Retention Planning
Last Answer : c) Enterprise Resource Planning
Description : Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)? (A) ERP automates and integrates majority of business processes. (B) ERP provides access to information in a Real Time Environment. (C) ERP is ... (A) and (B) true; (C) false (4) (A) true; (B) and (C) are false
Last Answer : Answer: 3
Description : is root cause for financial accounting (a) Stewardship accounting (b) Social accounting (c) Management accounting (d) Human resource accounting
Last Answer : (a) Stewardship accounting
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Last Answer : d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above
Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above
Last Answer : a. Hacking
Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above