This document contains a question bank with 50 multiple choice questions related to e-commerce. The questions cover topics such as the history of the internet and e-commerce, key players and companies in e-commerce such as Amazon, eBay and PayPal, different business models in e-commerce like B2B, B2C and C2C, technologies used for online payments and security, and cybercrimes.
This document contains a question bank with 50 multiple choice questions related to e-commerce. The questions cover topics such as the history of the internet and e-commerce, key players and companies in e-commerce such as Amazon, eBay and PayPal, different business models in e-commerce like B2B, B2C and C2C, technologies used for online payments and security, and cybercrimes.
This document contains a question bank with 50 multiple choice questions related to e-commerce. The questions cover topics such as the history of the internet and e-commerce, key players and companies in e-commerce such as Amazon, eBay and PayPal, different business models in e-commerce like B2B, B2C and C2C, technologies used for online payments and security, and cybercrimes.
This document contains a question bank with 50 multiple choice questions related to e-commerce. The questions cover topics such as the history of the internet and e-commerce, key players and companies in e-commerce such as Amazon, eBay and PayPal, different business models in e-commerce like B2B, B2C and C2C, technologies used for online payments and security, and cybercrimes.
QUESTION BANK 1. Internet was first known as ___________. a) ARPANET b) WWW c) Minitel d) PayPal 2. Shopping _______ is like a trolley of a shopping mall a) Cart b) Profile c) Payment Gateways d) Filters 3. _______ refers to electronic currency that exists in cyberspace. a) Digital Cash b) Cash On Delivery c) Credit Card Payments d) Wallet 4. Under _______ the e-commerce business forms sell directly to consumers. a) B2C b) B2B c) C2C d) B2G 5. _______ is the latency between the initiation and execution of a process. a) Lead Time b) Completion c) Time Processing Time d) Communication 6. Net market place is also referred to as _______. a) Hubs b) Centre c) Malls d) Shops 7. In _______ World Wide Web was created. a) 1990 b) 1995 c) 2000 d) 2010 8. Netscape launches _______ the first widely used web browser. a) Navigator b) Google c) ARPANET d) Minitel 9. In 1998, _______ was founded to facilitate online payments. a) Paypal b) Paytm c) Paymate d) Google Pay 10. In 1995, _______ started amazon. a) Jeff Bezos b) Bill Gates c) Pierre Omidyar d) Ed Gilbert 11. B2B Stands For _______. a) Business To Business b) Business To Customer c) Customer To Customer d) Business To Government 12. First ever sale made by amazon in the year _______. a) 1995 b) 1996 c) 1997 d) 1998 13. Who is also known as father of Edi _______. a) Ed Gilbert b) Washington c) Michael Range d) Bill Gates 14. Ebay acquires paypal in the year _______. a) 2002 b) 2003 c) 2004 d) 2005 15. First ever online order for pizza hut made in the year _______. a) 1994 b) 1995 c) 1996 d) 1997 16. Startup stage is also known _______. a) Introductory Stage b) Growth Stage c) Maturity Stage d) Decline Stage 17. Posterior Profit Made By Amazon In The Year _______. a) 2003 b) 2004 c) 2005 d) 2006 18. _______ technology can be used for delivery of packages to customers. a) Drone b) Dried c) Ultra d) Device 19. In CRM 'C' stands for a) Consumption b) Customer c) Confidential d) Confidence 20. Under _______ promotional Strategy the intermediaries get incentives. a) Push b) Pull c) Please d) Promotion M.COM PART I (SEM II)/PAPER CODE – 66704/E-COMMERCE QUESTION BANK 21. When goods & services are traded between business to customers a) Retailers b) Wholesalers c) Wholesalers d) Agents 22. WAN stands for _______. a) Wide Area Network b) Wide Array Network c) Wide Section Network d) Wide social Network 23. ERP stands for _______. a) Enterprise Resource planning b) Enterprise Region Plan c) Enterprise Race plan d) Enterprise Ram plan 24. ICANN 'I' stands for _______. a) International b) Internet c) Informatics d) Invalid 25. Name used to identify Internet protocol address a) Domain b) Internet c) E-mail d) User 26. The global system of interchanged computer networks a) Internet b) HTML c) WWW d) URL 27. Predicts sales and inventory requirement. a) Forecasting b) Regression c) Association d) Interpretation 28. Collection of online discussions grouped into communities. a) Usenet group b) Chat rooms c) Forums d) Social media 29. In MIS 'M' Stands for _______. a) Management b) Manual c) Minutes d) Marketing 30. Medium & large corporations often organize and store data in a central repository a) Data mining b) Data warehouse c) Data integration d) Data sales 31. _______ is a process of marketing a product using the internet. a) E- marketing b) M- marketing c) Personal marketing d) B- marketing 32. A _______ is a computer software program that indicates the no. Of visitors web page has received. a) Web counter b) SEM c) SEO d) Click meter 33. _______ E-commerce facilitates purchase of raw materials for undertaking production activities. a) C2C b) B2B c) B2C d) B2G 34. Electronic magazines are known as _______. a) E-zines b) Entines c) Ejournal d) Ebooks 35. _______is a secured 3 digit number required for credit card payments a) Atm pin b) CVV c) OTP d) Password 36. _______is a form of banner ad. a) Flash ad b) Mural ad c) Video ad d) Ad card 37. A _______ to a digital software that allows to make transactions without cash. a) Credit card b) Debit card c) Digital wallet d) Cheque 38. In EFT transfer the customer is informed by _______. a) Letter b) Coupon c) SMS d) MMS 39. There are no interest or charges for transaction through _______. a) Debit card b) Credit card c) International credit card d) Smart card 40. _______allows only limited no. Of characters in a message. a) Facebook b) Twitter c) Snapchat d) Instagram 41. Cyber crimes are addressed by _______ act in India a) IT b) RBI c) FEMA d) FERA M.COM PART I (SEM II)/PAPER CODE – 66704/E-COMMERCE QUESTION BANK 42. Online bank information theft is one of the _______ crime. a) Personal b) Cyber c) Social d) Federal 43. Offenses committed using internet with criminal motive comes under_______ law. a) Cyber b) Civil c) Family d) Company 44. Section_______ of IT act deals with Cyber terrorism. a) 66 b) 57 c) 67 d) 69 45. _______ is right which protects the content on internet. a) Copyright b) Patent c) Registration d) certificate 46. Impersonating other person on internet is called _______. a) Robbery b) Forgery c) Theft d) Acting 47. _______looks to be a normal program but has a hidden code to harm computer. a) Worm b) E- bomb c) Ransom ware d) Trojan 48. _______ is a safe link to protect the data which is transferred electronically. a) CVV b) Encryption c) SET d) HTML 49. _______ means unauthorized entry into other computer system. a) Snooping b) Hacking c) Theft d) Scanning 50. Sending spam email and asking for financial transactions with intention to theft is known as _______. a) E marketing b) Spam mail c) Phishing d) Decryption