Digital Business MCQ SPPU
Digital Business MCQ SPPU
3) ………….is concerned with the buying and selling information, products and
services over computer communication networks
(a) Commerce (b) E-Commerce (c) E-Business (d) None of these
15) ……………….and ………………… were the enabling technologies that laid the
ground work for E- commerce
(a) SET and SCL (b)SCM and ERP (c)EDI and EFT (d) None of these
18) …………..is a form of supply chain where a series of assembly operations are
carried out to obtain the final product
(a) Converging supply chain (b)Diverging supply chain
(c)Any of these (d)None
19) ……...is a form of supply chain where a wide variety of finished goods are produced
with limited number of raw material or components.
(a) Converging structure (b)Diverging structure
(c)Any of these (d)None
20) ……….is the exchange of services, information or product from one business to a
government agency
a) B2G b) B2E c) B2B d) P2P
26) English physicist Tim Berner’s Lee was famous for the establishment of 1990.
a) internet b) WWW c) Intranet d) none of these
27) ………. refers to a kind of e-commerce which refers to a company selling or buying
from other company
a) B2G b) B2E c) B2B d) P2P
29) A company that manufacturers bicycles may use the internet to purchase tyres
from their suppliers. This is an example of transaction.
a) B2G b) B2E c) B2B d) P2P
31) Among the alternate models of B2B e-commerce……is the best means to obtain a
competitive advantage in the Market place.
a) Process based b) strategic relationship based
c) transaction-based d) any of these
42) ………...is an online auctioning site that facilitates the trade of privately owned
items between individuals.
a) e-Bay b) Amazon.com c) Rentalic.com d) all of these
44) …………...is an internet network that allows users with the same network in
software to connect to each other’s hard disks and exchange files
a) P2P b) B2E c) B2B d) B2C
45) This is a protocol which allows files to be transferred from one computer to another
computer
a) TCP/IP b) FTP c) HTTP d) none of these
50) A presents information from diverse sources in a unified way in a web site.
a) Web portal b) Link page c) Both of these d) none of these
51) A portal is a specialized entry point to a specific market place or industry niche.
a) Vertical portal b) horizontal portal c) both of these d) none of these
52) ………. are general interest portals covering a wide range of topics and features
a) Vertical portal b) horizontal portal c) both of these d) none of these
54) A portal that helps to establish relations and to conduct transactions between
various organizations is termed as………………
a) B2B portals b) C2C portals c) both of these d) none of these
55) A is a software that scours the internet collecting data about every website
and every webpage within it
a) spiders b) Search Engines c) robots d) none of these
56) Search Engines databases are selected and built by computer robot programs
called………………………
a) spiders b) Search Engines c) robots d) none of these
57) Which among the following is not an example for Search engine?
a) Google b) MSN c) Alta vista d) none of these
60. The user reaches this page when they specify the address of a website
a) home page b) Web page c) Summary page d) None of these
62) ……… is an example for a software that visits suggested pages and return the
appropriate information to be indexed by the search Engine
a) Robot b) Spiders c) Ants d) All
63) ……… appears as rectangular graphics near the top of the page
a) Banner ads b) floating ads c) interstitials ads d) Unicast ads
64) ……….. take up the entire screen and are more powerful than banner ads.
a) Banner ads b) floating ads c) interstitials ads d) Unicast ads
65) ………… is a form of advertisement on the web that appears between web pages
that the user requests.
a) Banner ads b) floating ads c) interstitials ads d) Unicast ads
66) ……….. is basically a TV commercial that runs in the browser window.
a) Banner ads b) floating ads c) interstitials ads d) Unicast ads
69) …... is an unsolicited e-mail sent to every e-mail address that a business can find
a) Advertorials b) pop-up ads c) Spam e-mail d) none of these
70) ……….. is the buying and selling of goods and services through wireless handled
devices such as cellular phone and Personal Digital Assistants
a) Mobile Commerce b) e-commerce c) both of these d) none of these
71) ………. is a class of advertising methods which are considered unethical and may
even be illegal.
a) Advertorials b) pop-up ads c) Spam e-mail d) malware
72) ……….. is the most common way for purchasing an online advertising
a) CPM b) CPC c) Both of these d) none of these
73)………. are animated full screen ads placed at the entry of a site before a user
reaches the intended content.
a) Intromercials b) pop-up ads c) Spam e-mail d) malware
74) ………… are interactive online ads that require the user to respond intermittently
in order to wade through the message before reaching the intended content.
a) Ultramercials b) pop-up ads c) Spam e-mail d) malware
75) …………… facilitates transactions between buyer and sellers by providing
comprehensive information and ancillary services, without being involved in the actual
exchange of goods and services between the parties.
a) Metamediary b) Intermediary c) middlemen d) all of these
76) ………….. is any transaction, involving the transfer or rights to use goods and
services, which is initiated and or completed by using mobile access to computer
mediated networks with the help of an electronic device.
a) Mobile Commerce b) e-commerce c) both of these d) none of these
77) ……….. provide security and privacy for the use of the web page content
a) HTTP b) html c) FTP d) none of these
78) ………… website is one that changes or customizes itself frequently and
automatically based on certain criteria
a) Dynamic website b) Static Website c) phish site d) none of these
80) ……………….in the e-commerce may be a holder of a payment card such as credit
card or debit card from an issuer
a) customer b) issuer c) Merchant d) Acquirer
83) ………………type of payment system is highly useful to those customers who would
like to control overspending
a) Prepaid b) Post-paid c) both of these d) none of these
84) …………... credit card gives all the advantages of a normal credit card without
worrying about the interest charges
a) Prepaid b) Post-paid c) both of these d) none of these
85) …………. facility helps the customer to pay only a small amount of the total
outstanding and revolve the rest of the payment to the next month.
a) Cash advance b) Revolver c) Tele draft d) None of these
86) …………. is the system of purchasing cash credits in relatively small amounts,
storing the credits in our computer, and then spending them, when making electronic
purchases over the internet.
a) E-cash b) Digi cash c) Cyber cash d) any of these
87) …………… is a financial instrument which can be used more than once to borrow
money or buy products and services on credit.
a) Credit card b) E-Cheques c) E-cash d) none of these
88) To accept a credit card for payment, we have to open account with our bank
a) Savings Bank b) Current account c) Merchant account d) any of these
91) ……………. is a card with a microchip that can be used instead of cash and coins
for everything from vending machines to public transportation.
a) Debit Card b) Electronic purse c) credit card d) any of these
92) …………. is basically a secure gate between our organization data and internet.
a) Network firewall b) Antivirus c) both of these d) none of these
93)…………… encrypts payment card transaction data and verifies that both parties in
the transactions are genuine.
a) SSL b) SET c) both of these d) none of these
96) In Biometrics………… is designed to prevent one person from using more than one
identity
a) Positive ID system b) Negative ID system
c)both of these d) none of these
97) ……….. are program developed by some dishonest people to destroy the computer
system and the valuable information in it.
a) Network firewall b) computer virus
c)both of these d) none of these
98) Which among the following is not an example for computer virus?
a) Chernobyl b) Melissa c) Kill me d) None of these
99) ……….. are special type of software meant for limiting the risks of being hit by
computer viruses
a) Network firewall b) Antivirus c) both of these d) none of these
100) A is a person who gains unauthorized access to a computer network for profit,
criminal mischief or personal pleasure.
a) Hacker b) spoofer c) operator d) none of these
101) ………….. acts like a gate keeper that examines each user’s identification before
allowing them to enter to the organization’s internal networks.
a) Network firewall b) Antivirus c) both of these d) none of these
102) Prevents unauthorized communication into and out of the network, allowing the
organization to enforce a security policy on traffic between its network and the
internet.
a) Network firewall b)Antivirus c)both of these d)none of these
104) The verification of credit card is done by using………. with a communications link
to the merchants acquiring bank
a) Credit card payment terminal b) Point of Sale
c)Both of these d) none of these
106) Gain entry into the user’s system and scan your file system for personal
information is known as……………….
a) Spoofing b) Snooping c) Sniffing d) None of these
107)………… attacks are difficult and are only successful if the attacker knows
something about the shopper
a) Spoofing b) Snooping c) Sniffing d) Guessing passwords
109) ………… is the reverse process of encryption, to make the information readable
once again
a) Spoofing b) Decryption c) Sniffing d) Cryptography
110) A provides a way to associate the message with the sender and is the equivalent of
an ordinary signature.
a) cyber signature b) Digital signature c) SSL d) none of these
111) A is an electronic file that uniquely identifies individuals and websites on the
internet and enables secure confidential communications
a) Digital signature b) Digital certificates c) SSL d) none of these
112) The information Technology Act [IT ACT] came into effect on
a) 16th November 2000 b)15th December 2000
c) 17th October 2000 d) none of these
113) Information sent over the Internet commonly uses the set of rules called………
a) TCP/IP b) FTP c) HTTP d) gopher
117) Which of the following crimes were not covered under IT (Amendment) Act,
2008?
a) Cyber terrorism b) Child pornography
c)Video voyeurism d) None of these
118) Trade mark, copyright, patent law etc comes under the purview of………………
a) Data protection b) Telecommunication laws
c)Intellectual property laws d) None
119)………. is a programme designed on replicate and spread generally with the victim
being oblivious to its existence
a) hacker b) software
c) Computer virus d) none of these
120) Which one of the following is not a principle of e-commerce?
a) privacy b) integrity c) authentication d) none of these