e-commerce management - university of · pdf filee-commerce management - ... e-commerce refers...
TRANSCRIPT
E-Commerce Management -
Complementary course of Bcom – III semester – CUCBCSS 2014 Admn onwards
Prepared by: Smt Susheela Menon, Rayirath House, Kottapuram Road,
Punkunnam. P.O
Thrissur- 680 002 Kerala, India
Scrutinised by: Sri. K.O. Francis Chairman, Board of Studies in Commerce UG
Question Bank
Module I
1. The internet is
a
) Web site
b
) Network of networks
c) Host
d
) Server 2. EDI is an early form of
a
) Traditional commerce b) Digital commercec) E-Commerce d) Mobile commerce
3. E-commerce refers to paperless exchange of business information using
a
) Electronics data interchange
b
) Electronic Mail
c) Bulleting boards
d
) All the above4. EDI is a set of standards developed in
a
) 1960’s
b
) 1970’s
c) 1980’s
d
) 1950’s5. ASCX12 standards were established is
a)198
6 b) 1984c)1982 d) 1987
6. Today the largest electronic commerce is
a)B2 b B2E
1
B )
c)P2P
d
) All the above7. Which is much helpful to do business beyond cultural and national boundaries
a
) E-Commerce
b
)
Traditional
commerce
c) Mobile commerce
d
) retailing8. Which is not a feature of e-commerce
a) Universal standard
b
) Global reach
c) Ample information
d
) Retailing9. Electronic exchange of business documents in a standard format is known as:
a
) E Commerce
b
) E business
c) EDI
d
) None of these10.This is essentially a business process that connects manufactures retailers,
customers and suppliers in the form of a chain to develop deliver products
a
) E-Commerce
b
) EDI
c) SCM
d
) Net working11.EDI stands for
a
) Electric data interface
b
) Electronic data interchange
c) Electronic data interface
d
) Name of these12.Both buyers and sellers actively participate and exchange products services in
a
) SCM
b
) EDI
c) E-COMMERCE
d
)
Traditional
commerce13.Bargaining is possible only in ………… business model
a Traditional commerce b E commerce
2
) )
c) M commerce
d
) Name of these14.In e- Commerce , they can not explore the stores shelves and product space.
They can only search a
a
) Electronic items
b
) Specific copy
c) Digital catalogue
d
) none15.……………………………. Refers to companies for which internet is one of
several channels to customers and perhaps not even the primary one
a
) Traditional Commerce
b
) E- commerce
c) EDI
d
) None of these16.E commerce refers to
a
) Direct buying
b
) Retailing
c) SCM
d
) Online transaction 17.E – commerce firms ……………………..large inventory
a
) Need not stock
b
) Need stock
c) Need to stock
d
) Non of these18.EDI cannot be implemented ……………… but requires the co-operation of
trading partners
a
) Unilaterally
b
) Bilaterally
c) Multilaterally
d
) All the above19.EDI soft ware translates the information
a) from structured to unstructured format
b)From unstructured to structured format
c) from structured to semi structured format
d) Non of these
3
20.Components of SCM system includes
a
)
SCM software and
hardware
b
) Business processes
c) Users
d
) All the above21.Which aspects include in supply chain planning
a
) Demand forecasting
b
) Inventory simulation
c) Manufacturing planning
d
) All the above22.Supply chain execution is the process of putting supply chain planning in to
…………….
a
) Action
b
) Operation
c) Maintenance
d
) control23.The cost of participating in a public exchange is significantly …………….. than
implementing out own SCM systems
a
) Higher
b
) Lower
c) Medium
d
) Non 24.Which of the following are not a drawback of public B2B exchanges
a
) Lack of customization
b
) Limited supper participants
c) Customers satisfaction
d
) Non
Module II
25.Essential elements needed to develop successful business model in any field
are…………………….
a
) Value proposition
b
) Revenue model
c) Competitive advantage
d
) All the above
4
26.A model describes how the firm will earn revenue, make profit and produce a
better return on invested capital is
a
) Revenue model b) Competitive advantage c) value proposition d) Markets strategy
27. ……………… e commerce is conducted between two separate business and
has been in effect for many years
a)B2
B
b
) C2C
c)P2P
d
) B2C28.Which of the following are not the major business models utilized in the B2B are
a
) E DISTRIBUTOR b) E-Procurement c) B2B hubs d) None of these
29.The sale of products (or) service from a business to general public is …………..
a
) B2C
b
) B2B
c) B2G
d
) B2E30.20north .com, flipkart.com. are an example for
a
) B2B
b
) B2E
c) B2G
d
) B2C31.Which are not the benefits of B2c E commerce
a
) LOWER marketing cost
b
) Lower order processing cost
c) Better customer service
d
) Narrow market32.………….. were considered as the “gateways” to the internet
a
) Portal
b
) E tailer
5
c) Content provider
d
) Narrow market33.Service providers offer service ………………..
a)offline
b
) Direct c)indirec
t
d
) online34.An online auction is an example of
a
) B2B
b
) C2C
c) B2C
d
) None of these
35.……….. refers to supply of goods and services for online govt. procurement
a
) C2c
b
) B2g
c) B2E
d
) B2B36.…………… is sometimes called ‘ intra business ecommerce
a
) B2E
b
) B2G
c) B2B
d
) C2C37.Which commerce model permits mobile access:
a
) E COMMERCE
b
) Mobile commerce
c) Traditional commerce
d
) None 38.Which among these is a cheap alternative method to traditional printed
catalogues
a
) Paper catalogue
b
) Floppy
c) CD–ROM S
d
) none
6
39.Arrange the steps to Ecommerce 1) Security 2) Process payment 3) Service &
support 4) Generating demand 5) ordering & fulfillment
a)4,5,2,3
b
) 5,3,1,2,4c)1,2,3,4,
5
d
) 3,2,5,1,440.Which of following is the reasons for the failure of E-commerce
a
) Poor management
b
) High cost
c) Poor planning
d
) All the above41.The word internet was coined from the word
a
)
Interconnection and
network
b
)
Intra connection and net
transfer
c) Interlink and network
d
) Inter activity net work 42.The most commonly used protocols are
a
) FTP
b
) TCP/IP
c) HTTP
d
) All the above43.…………… is an internet standard (or) set of rules that allows the exchange of
information on the www
a
) HTTP
b
) FTP
c) TCP/IP
d
) Telnet44.This is a protocol which allows file to be transferred from one computer to
another computer
a
) TCP/IP
b
) FTP
c) HTTP
d
) none45.B2C sells
a Products or service directly to b Products or services directly to
7
) consumers ) companies
c)Products or services directly to govt
d)
Non e
46.B2B E commerce has been conducted between
a
) Business to customer
b
) Business to bank
c) Business to business
d
) None 47.Which of the following is C2C ecommerce
a
) Financial service
b
) Product distribution
c) Online auction
d
) None48.Business to consumer involves customers gathering information, purchasing and
receiving products through.
a
) Catalogue
b
) Store
c) Electronic network
d
) None 49.A web page is created using
a
) HTML
b
) Web browsing
c) Documents
d
) None 50.Internet browsing also called
a
) Net surfing
b
) Net hunting
c) Net chatting
d
) none51.VOIP services convert our voice into ……………. Signal
a
) Electronic
b
) Wireless
c) Digital
d
) none52.ATA stands for
a Analog telegraphic adaptor b Analog telephone adaptor
8
) )
c) Analog tele system
d
) Adaptor telephone analog
53.Which of the following are important among HTTP
a
) HTTP is stateless
b
) HTTP is media independent
c) HTTP is connection less
d
) All the above 54.GET method, HEAD method , the post methods are the methods of
a
) HTTP methods
b
) HPTP method
c) Current standard
d
) None 55.…………………… is a new architecture if or the development of loosely coupled
distributed application
a
) S0A
b
) WSDL
c) SOAP
d
) UDDI56.VOIP began to be used regularly for long distance voice communication in
a
) 2005
b
) 2002
c) 2001
d
) 200357.The internets open TCP/IP design was origin ally inspired by use for radio
communication network in the
a
) 1960’s
b
) 1980’s
c) 1970’s
d
) 2000’s58. This type of network does not allow an external user to access the company
data
a
) Interanet
b
) Internet
9
c) Extranet
d
) None 59.The IP was originally designed for
a
) Data net working
b
) Data processing
c) Data Execution
d
) none
Module III
MCQ
60.The structure of a web page is called it’s
a
) Web design
b
) Web layout
c) Architecture
d
) None 61.……………… is a representation language used to create hypertext documents
containing text list boxes and graphic
a
) HTML
b
) HTTP
c) JAVA
d
) none62.……………… is a client server based internet standards or set of rules
a
) HTML
b
) HTTP
c) HPTP
d
) None63.Which are the important concepts in the development of web site
a
) Information Presentation b) Good navigation & usabilityc) Feed back d) All the above
64.Which are not the types of web pages
a
) Summary page
b
) Content page c) Support page d Help me page
10
)65.Web pages are prepared using this language
a
) HTML
b
) HTTP
c) NTTP
d
) None 66.A web page is transferred to users of computer through
a
) HTML
b
) NTTP
c) HTTP
d
) None 67.The user reaches this page when they specify the address of a web site.
a
) Home page
b
) Web page
c) Summary page
d
) None68.The purpose of this page is to provide links to other pages
a
) Home page
b
) Web page
c) Summary page
d
) None 69.These are online magazines generally covering topic of interest
a
) Banner Adv’s
b
) Search engineers
c) E-Zines
d
) None
70.This is an internet based interactive search device that enables a user to search
for information on the internet.
a
) Portal
b
) BROWSER
c) SEARCH ENGINE
d
) NONE 71.Google is one of the most popular
11
a
) Portal
b
) Search engine
c) Browser
d
) None 72.This is a website that provide a gateway to other resources on the internet
a
) Portal
b
) Browser
c) Search engine
d
) None 73.These portals simply provide tools , information articles, research & statistics on
the specific industry
a
) Horizontal
b
) Vertical
c) Enterprise
d
) None 74.These are mega portals dealing in wide range of topics
a
) Horizontal
b
) Vertical
c) Enterprise
d
) Non e75.This is a form of advt. on the web that appears between web pages that the
user requests
a
) Banner advt
b
) Floating advt
c) Interstitials
d
) None 76.This is a service that communicates with clients through a set of standard
protocols and technologies
a
) VOIP
b
) Web services
c) XML
d
) None 77.Interoperable systems are essential to mass adoption of
a
) Mobile commerce
b
) E commerce
12
c) Traditional commerce
d
) None 78.Important site evaluation criteria are
a
) Key words
b
) Retention rates
c) Conversion rates
d
) All the above79.Which is the creation and development o f communication strategies specifically
for brands to have meaning and context on the web
a
) E branding
b
) Branding
c) Advertising
d
) None 80.This is the classic from of advertising on the net
a
) Floating advt
b
) Banner advt
c) Interstitials
d
) None 81.The advt which float over the page for 5 to 30 sec is
a
) Banner advt
b
) Interstitials
c) Floating advt
d
) None 82.The new advertising medium is
a
) Newspaper
b
) Radio
c) Magazines
d
) internet83.This type of portal is application oriented
a
) Application centric portals
b
) B2B portals
c) Horizontal portals
d
) None 84.An enterprise portal is also called as
a Vertical portal s b Corporate portal
13
) )
c) B2B portals
d
) None 85.Meta crawler is also an example for
a
) Mega search engine
b
) Meta-search engine
c) Search engine
d
) None 86.Which is a web- roaming program used to find documents pertaining to your
search
a
) Spider
b
) Meta search engine
c) Metatags
d
) Indexers 87.PPC engines is called
a
) Per –pay click
b
) Pay- per click
c) Pay - pay click
d
) none
88.Key factors that distinguish mobile marketing form other more traditional informs
of marketing is
a
) Two way
b
) Permission – based
c) Targeted
d
) All the above89.Business to consumer application of mobile commerce includes
a
) Advertising promotion
b
) An intelligent device
c) A connective device
d
)
A transactional
device 90.TV Viewer can interact with what is happening on screens using their mobile
phone is
a
) Cable TV
b
) Interactive
14
c) Set off box
d
) none
Module IV
91.The cyber crime related to monitoring data flow between shoppers computer and
e commerce website
a
) Spoofing
b
) Hacking
c) Sniffing
d
) phishing92.Secret key is used in
a
) Public key cryptography
b
) Symmetric cryptography
c) Asymmetric cryptography
d
) none93.This acts like a gate keeper that examines each users identification before
allowing them to enter to the organization internal networks
a
) Antivirus program
b
) Biometrics
c) Fire wall
d
) none94.This type of electronic payment systems is highly useful to those customers who
would like to control over spending
a
) Post paid payment system
b
) Pre paid payment system
c) Spot payment system
d
) none
95.This type of card includes an embedded ICC
a
) Credit card
b
) Debit card
c) E cash
d
) Smart card 96.ATM card is a
15
a
) Credit card
b
) Debit card
c) E cash
d
) Smart card 97.This is a financial instrument which can be used more than once to borrow
money or products or credit
a
) Credit card
b
) Debit card
c) e- Cash
d
) Non e98.SET Means
a
) Standard electronic technology
b
) Standard electronic transfer
c) Secure electronic transaction
d
) None 99.Which is defined as a financial exchange that takes place on line between
buyers and sellers
a
) E payment
b
) Prepaid payment
c) Post paid payment
d
) Non e100. The participants in an online electronic payment transaction include
a
) The customer
b
) The issuer
c) The merchant
d
) All above 101. Which is used for transferring money from one bank account to another
directly without involving cash
a
) EFT
b
) E-Cash
c) Micropayment
d
) None 102. Which system provides a service that is paid for prior to usage
a
) Post paid payment system
b
) Prepaid payment system
16
c) Spot cash system
d
) None103. Which is an electronic medium for making payment
a
) Smart card
b
) Debit card
c) e- cash
d
) All of the above
104. All credit cards are
a
) Smart cash
b
) Post paid cards
c) E cash
d
) None105. A popular example of E wallet is
a
) Micro soft wallet
b
) Mega soft wallet
c) Penta soft wallet
d
) None106. Which are made for small payment on the web
a
) Mega payments
b
) Micro payments
c) Spot payment
d
) All the above107. Which are used for signing and endorsing electronic changes
a
) Manual signature
b
) Thump impression
c) Digital signature
d
) Spot signature 108. The two types of credit cards today namely credit cards issued by credit
card companies
a
) Master card , visa b) Smart card credit card c) Debit card, e cash d) None
109. ……………………is a card with a microchip that can be used instead of
cash and coins for every thing.
17
a
) Electronics cash
b
) Fast cash
c) Electronic purse
d
) None110. Prepaid or real-time tokens are exchanged between
a
) Banker and applicant
b
) Payer and drawer
c) Buyer and seller
d
) None111. …………. Is a digital analogue of various forms of payment backed by a
bank
a
) Electronics cash
b
) Electronic purse
c) Electronic tokens
d
) Non e112. There are two main concerns for using digital coins: anonymity of the
consumer and :-
a
) Prepaid system
b
) Post paid system
c) Electronic tokens
d
) Online verification
113. SSL is the most widely deployed
a
) Security protocol
b
) Data encryption
c) Cryptography
d
) None 114. …………………. Encrypts payment card transaction data and verifies
that both parties in the transaction are genuine.
a
) SSL
b
) SET
c) Secret key
d
) None115. …………………. Is the process of coding and scrambling of messages to
prevent un authorized access to under standing of data being transmitted
18
a
) Cryptography
b
) Encryption
c) Security key
d
) none116. ………………. Is used to keep transmissions privacy through the use of
data encryption techniques.
a
) Data encryption
b
) Crytography
c) Security key
d
) Non e117. Which refers to the automatic identification (or) identity verification of
living persons using their enduring physical or behavioral characteristics
a
) Biometrics
b
) Cryptography
c) ENCRYPTION
d
) None118. ……………… involves checking to see if the signal is good quality
a
) Transmission
b
) Quality control
c) Decision
d
) none
Module V
119. The process of encrypted data readable once again is called,
a
) Encryption
b
) Decryption
c) Uncryption
d
) None 120. This the process of making information un intelligible to the unauthorized
reader
a
) Encryption
b
) Decryption
c) Uncryption
d
) none
19
121. The attacker monitors the data between the shoppers computer and the
server
a
) Spoofing
b
) snoofing
c) Sniffing
d
) none122. The private content of transaction, if unprotected can be intercepted
when it go through the route over the internet called.
a) spoofing b) Snoopingc) sniffing d) eavesdropping
123. Gain entry into the user’s system and scan your file system for personal
information is known as
a) spoofing b) Snoopingc) sniffing d) None
124. Creating illegitimate site that appear to published by established
organizations are by this name
a
) Spoofing
b
) Snooping
c) Sniffing
d
) None125. The IT act came into effect on
a
) 17 May 2000
b
) 17th December 2000
c) 17 Oct 2000
d
) 17 June 2000126. UNCITRAL model law on E commerce is
a
) 1996
b
) 1994
c) 1995
d
) 1997127. E commerce consists of commerce activities
a
) Electrically
b
) Technically
c) Electronically
d
) None128. …… provide security and privacy for the use of the web page content
20
a
) HTTP
b
) HTML
c) FTP
d
) None129. A digital signature performs a similar functions to a
a
) Thump impression
b
) Written Signature
c) Scanning
d
) None130. Digital signature acts as a ……………….. for e commerce
a
) Risk
b
) Virus
c) Security
d
) Boon131. Privacy laws of their host Coventry effect
a
) Domestic companies
b
) Overseas companies
c) Neighboring companies
d
) None132. …………………….is designed to protect a persons personal information
a
) Data integrity
b
) Cyber law
c) Private legislation
d
) None133. There are different types of risks connected with information protection
such as disruption, disaster.
a
) Unauthorized access
b
) Publicity
c) Consumer
d
) None134. ………………… are electronic files that are used to uniquely identify
people and resources over the internet
a
) Digital signature
b
) Digital certificatec) Encryption recourse d None
21
)135. ……………….. techniques make use of secret codes (or) keys to
encrypt information
a
) Cryptography
b
) Encryption
c) Digital certificate
d
) None136. The organization has to ensure that the …………… are sent to the
customers
a
) Ordered goods
b
) Unordered goods
c) Good quality goods
d
) None137. ………………… can catch the transmissions to obtain customers
sensitive information
a
) Fire wall
b
) Anti virus
c) Hackers
d
) None138. SATAN is an example
a
) Unauthorized disclosures
b
) Unauthorized actions
c) Snooping
d
) Spoofing
139. Customers are concerned about
a
) Privacy and security of information
b
) How things are managed
c) Business practices
d
) None140. Information sent over the internet commonly uses the set of rules called
a) FTP b) TCP/IPc) HTTP d) Gopher
22
Mod - 1
Mod 2
Mod 3
Mod 4 Mod 5
1 B 25 D
60 C
91 B
119 A
2 C 26 A
61 A
92 B
120 A
3 D 27 A
62 B
93 B
121 C
4 A 2 D 6 D 9 B 1 D
23
8 3 422
5 B 29 A
64 D
95 D
123 A
6 A 30 D
65 A
96 B
124 A
7 A 31 D
66 C
97 A
125 C
8 D 32 A
67 A
98 C
126 A
9 C 33 D
68 C
99 A
127 C
10 C
34 B
69 C
100 D
128 A
11 B
35 B
70 B
101 A
129 B
12 D
36 A
71 B
102 B
130 C
13 A
37 B
72 A
103 D
131 B
14 C
38 C
73 B
104 B
132 C
15 B
39 A
74 A
105 A
133 A
16 D
40 D
75 C
106 B
134 B
17 A
41 A
76 A
107 C
135 A
18 A
42 D
77 A
108 A
136 A
19
B 43
A 78
D 10
C 13
C
24
9 7
20 D
44 B
79 A
110 C
138 C
21 D
45 A
80 B
111 C
139 A
22 A
46 C
81 C
112 D
140 B
23 B
47 C
82 D
113 A
24 C
48 C
83 A
114 B
49 A
84 B
115 B
50 A
85 B
116 B
51 C
86 A
117 A
52 B
87 B
118 B
53 D
88 D
54 A
89 A
55 A
90 B
56 B
57 C
58 A
59 A
25