Which e‐government arena is being used when governmental agencies send out and
accept bids for work?
a) G2G  
b) G2B
c) G2C
d) G2G

1 Answer

Answer :

b) G2B

Related questions

Description : Which among the following relationship is not covered in e-governance? a. G2C b. G2B c. B2B d. G2G

Last Answer : c. B2B

Description : Which among the following relationship is not covered in e-governance? a. G2C b. G2B c. B2B d. G2G

Last Answer : c. B2B

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : A major problem with complex pricing structures is that they A)fail to generate the level of revenues needed by an organisation. B)confuse customers and lead to customer dissatisfaction. C) ... to regulation by governmental agencies. D)are almost always viewed as being deceptive by customers.

Last Answer : B)confuse customers and lead to customer dissatisfaction.

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce a. EFT b. EPS c. PayPal d. None of these

Last Answer : b. EPS

Description : E‐Banking is also known as a. ATMs b. Net banking c. Traditional banking d. None of these

Last Answer : b. Net banking

Description : Which one is the third party payment providers who offer digital wallets for E‐ merchants a. Oxicash b. PayMate c. PayPass d. All the above

Last Answer : d. All the above

Description : The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. a. Memory b. Microchip c. E‐cash d. None of the above

Last Answer : b. Microchip

Description : E‐cheques are ………………… a.Prepaid b.Postpaid c. Both prepaid and postpaid

Last Answer : a.Prepaid

Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque

Last Answer : d. E‐cheque

Description : What is an electronic representation of cash? a. Digital cash b. Electronic cash c. E‐cash d. All of the above

Last Answer : d. All of the above

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks

Last Answer : b. financial electronic data interchange

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above

Last Answer : a. electronic check

Description : Which form of e‐marketplace brings together buyers and sellers from the same industry? a. horizontal b. Vertical c. Integrated d. Inclined

Last Answer : b. Vertical

Description : Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials? a. horizontal b. Vertical c. Integrated d. Inclined

Last Answer : a. horizontal

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : How the transactions occur in e‐commerce? a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e‐medias

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Which of the following are advantages normally associated with B2B e‐commerce? a. Shorter cycle times b. Reduction in costs c. Reaches wider audiences d. all of the above

Last Answer : d. all of the above

Description : Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? a. B2B b. B2C c. C2B d. C2C

Last Answer : a. B2B

Description : Most individuals are familiar with which form of e‐commerce? a. B2B b. B2C c. C2B d. C2C

Last Answer : b. B2C

Description : Which is not a function of E‐commerce a. marketing b. advertising c. warehousing d. none of the above

Last Answer : c. warehousing

Description : Which is a function of E‐commerce a. marketing b. advertising c. warehousing d. all of the above

Last Answer : d. all of the above

Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing

Last Answer : d. Virtual marketing

Description : Digital products are best suited for B2C e‐commerce because they: a. Are commodity like products b. Can be mass‐customized and personalized c. Can be delivered at the time of purchase d. All of the above

Last Answer : d. All of the above

Description : The best products to sell in B2C e‐commerce are: a. Small products b. Digital products c. Specialty products d. Fresh products

Last Answer : b. Digital products

Description : Which type of e‐commerce focuses on consumers dealing with each other? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C