Sie sind auf Seite 1von 13

Course : BSCIT

Semester 5
Paper Code : BKID-B1186-BT8902
Paper Name : E-Commerce

Question
Number

Question Statement
1 marks question ( Question 1 to 40)

"A system where goods or services are directly exchanged for other goods or services without a
common unit of exchange" is called as ___________
a. EFT
b. Transaction
c. E-commerce system
d. Barter System

________has information about the products sold or services being offered


a. Shopping Cart
b. Catalog
c. Bar code
d. Product data

In Electronic Commerce Systems ___________is the collection of steps that a company takes to
transform raw components into the final product
a. Interactive marketing
b. Supply chain
c. Online point of sale
d. Product data exchange

_______________ transactions are called as market transactions


a. Business to consumer
b. Business to Business
c. Consumer to Business
d. Consumer to Consumer

____________ are the suppliers of technology or Internet ECommerce services


a. Vendors
b. Integrators
c. Consumers
b. Distributors

Identify the types of man power for any organization which involves in E Commerce related
activities are

a. Technical Staff
b. Operational Managers
c. Executive
d. All of the above

ARPANET stands for_____________


a. Agency of Research Project Advanced Network
b. Advanced Research Project Agency Network
c. Agency of Research Protocol Advanced Network
d. Advanced Research Protocol Agency Network

A ____________ is a computer network that interconnects computers in a limited area such as a


home, school network media

a. Wide Area Network


b. Local Area Network
c. Metropolitan Area Network
d. Campus Area Network

___________ is a text file containing information of users preference and maintains state
information of HTTP requests and responses
a. Web browser
b. HTTP
c. Cookie
d. None of the above

10

__________is an organization that provides access to the Internet


a. Internet service provider (ISP)
b. Dial Up
c. Modem
b. Wi-Fi

11

____________ is a repository of information spread all over the world and linked together
a. Portal
b. ISP
c. World Wide Web
d. Website

12

State True or False


"Dial up provides faster internet service than DSL"
a. True
b. False

13

___________ is a type of transmission where only one device can send signal and the other device
can only receive the signal

a. Duplex
b. Simplex
c. Half duplex
d. Full duplex

14

________ is network protocol used on the Internet or local area network connections
a. TCP/IP
b. HTTP
c. Telnet
d. UDP

15

In OSI model __________ layer is responsible for source to destination (end to end) delivery of the
entire message

a. Transport
b. Data link

c. Network
d. Physical

16

____________ specification is used to define the standard style sheet language for XML
a. XML Pointer Language (X Pointer)
b. Extensible Markup Language (XML) 1.0
c. Extensible Style Language (XSL)
d. XML Linking Language (X Link)

17

____________ is referred to as the transition path from HTML to XML


a. XHTML
b. SGML
c. XXHTML
b. SHTML

18

___________helps businesses to convert raw information into a useful analytical tool for business
decision making
a. HTML
b. XML
c. Data warehouse
d. Metadata

19

Online data access depends on the ________ requirements


a. Bandwidth
b. Network
c. Customer
b. Content

20

Number of individual, authenticated user sessions, Authenticated user sessions by location and
Authenticated user profiles by region are few examples of ________ metrics
a. Visitation
b. Direct
c. Indirect
d. None of the above

21

______ are the professionals who spend a good deal of time online, mainly at their places of
business
a. Cyber surfers
b. Cyber consumers
c. Cyber buyers
d. All of the above

22

________ replaces a document or an application with its own code and then uses that code position
itself
a. Logic Bomb
b. Trojan Horse
c. Worm
d. Firewall

23

__________is a system or group of systems that enforces a security policy between an organizations
network and the internet
a. Firewall
b. Protocol
c. DoS
b. Trojan Horse

24

________is a small program that inserts itself into other program files that then become "infected"
a. Worm
b. Logic Bomb
c. Virus
d. DoS attack

25

Debit card is popularly known as ________ product


a. pay now
b. pay in
c. pay
b. None of the above

26

A bank enables its customers to access their account information and perform certain bank
transactions using a personal computer and a modem is called as ___________
a. Online Transaction Banking
b. Net Banking
c. PC Banking
d. None of the above

27

__________ is an encryption technology on the server that scrabbles important data such as credit
card numbers and order information when it is being stored or passed from one computer to another
a. Cipher
b. Secure Socket Layer
c. Server
d. None of the above

28

_______ is an interactive computer based systems which help decision makers utilize data and
models to solve unstructured problems
a. Decision support systems
b. Business logic and rules repository
c. Campaign management
b. None of the above

29

___________ is the final aspect of a complete CRM solution


a. Workflow Management
b. Collateral Management
c. True channel management
d. Forecasting and planning tools

30

_____________a fusion of a series of functions, skills, processes and technologies, which together
allows companies to be more profitably manage customers as tangible assets
a. Business
b. E-commerce
c. Customer relationship management
d. Security Management

31

In supply chain management the purpose of ________ is to reduce number of suppliers


a. Supplier Management
b. Inventory Management
c. Distribution Management
d. Channel Management

32

In supply chain management _________reduces the order-ship-bill cycle


a. Distribution Management
b. Supplier Management
c. Inventory Management
d. Security Management

33

Movement of material from one business to another is a _________ problem

a. Supplier
b. Customer
c. Business
d. Logistics

34

___________is a protocol that supports mobile computing


a. Wireless Application Protocol (WAP)
b. Wireless Transaction Protocol (WTP)
c. Wireless Session Protocol (WSP)
d. Wireless Datagram Protocol (WDP)

35

_______is a voice-only-analog transport


a. TDMA
b. AMPS
c. CDMA
d. GSM

36

In WAP _________ acts as encoder and decoder


a. Gateway
b. Client
c. Origin server
d. User

37

Which one of the following is not a feature of knowledge management?


a. Expressing Knowledge
b. Storing Knowledge
c. Refining Knowledge
d. None of the above

38

________is a group of application programs that allows an organization to share documents and
exchange emails
a. Lotus Domino
b. EPS systems
c. Intranet
d. Lotus notes

39

___________is a nationwide funds transfer system that aims to facilitate transfer of funds from any
bank branch to any other bank branch
a. EFT
b. Pay pal
c. NEFT
d. None of the above

40

WWW.EBAY.COM is example for __________ website


a. B2B
b. C2B
c. C2C
d. B2C

2 marks questions(Question 41 to 60)


41

Indentify the Components of E Commerce


1. Catalog
2. Shopping cart
3. Electronic Data Interchange
4. Payment mode
a. 1, 2 and 3
b. 1, 2 and 4
c. 1, 3 and 4
d. 2, 3 and 4

42

Catalog, the component of E-Commerce contains the following


a. The picture of the product
b. The details of the product
c. The cost of the product
d. All of the above

43

Differentiate the products listed below can be delivered via physically delivery mode or virtual
delivery mode

1. Physical Delivery Mode


2. Virtual Delivery Mode
A. Ornaments
B. Music
C. Software
D. Toys
a. 1A, 2B, 1C, 1D
b. 1A, 2B, 2C, 1D
c. 1A, 1B, 2C, 2D
d. 2A, 2B, 1C, 1D

44

Identify the activities of E-commerce


A. Product or Service Search
B. Price Search
C. Actual Purchase
D. Payments
a. A, B, C
b. B, C, D
c. A, C, D
d. A, B, C, D

45

Identify the Elements of network


A. IP Address
B. Client PC
C. Server PC
D. Network
a. A, B, C
b. A, B, C, D
c. B, C, D
d. A, C, D

46

Identify the building blocks of network


A. Nodes
B. Hubs
C. Backbone
D. Workstation
a. A, C, D
b. A, B, C
c. B, C, D
d. A, B, C, D

47

Identify the characteristics of the Portals


A. A portal is a major visiting centre for internet users
B. A portal is a destination site for users of a particular class
C. Portal acts as a powerful marketing utility
D. Portals are very helpful for business
a. A, B, C
b. B, C, D
c. A , B, C, D
d. A, C, D

48

Categories of DSL are ________ and_________

a. HDSL, ASDL
b. ADSL, SDSL
c. ISDN, SDSL
d. ADSL, ISDN

49

In OSI model __________ , ___________ and __________ are the responsibilities of the
Presentation Layer
a. Translation, Encryption and Decryption
b. Synchronization, Encryption and Translation
c. Translation, Encryption and Compression
d. Synchronization, Encryption and Compression

50

A _________is a single logical path between the source and the destination that is associated with all
________ in a message
a. Connection, streams
b. Connection, Packets
c. Layer, nodes
d. Connection, headers

51

What is the difference between XML and HTML?


a. HTML is used for exchanging data, XML is not
b. XML is used for exchanging data, HTML is not
c. HTML can have user defined tags, XML cannot
d. HTML allows granular updation, XML does not

X/Secure provides ___________and ______for the safety of the data to be transmitted world wide
52

a. XML digital signatures and XML decryption


b. XML digital signatures and XML encryption
c. XML encryption and XML decryption
d. XHTML and XML digital signatures

53

What are the limitations of indirect metrics?


A. Click through captures
B. Time spent
C. Time spent searching
a. A, B
b. B, C
c. A, B, C
d. A, C

54

A security policy includes _______,________ and __________


a. People, Process and Product
b. Technology, People, Product
c. Product, Policy and Technology
d. People, Policy and Technology

55

The modern payment card system is an excellent example of _________, ____________ growth
a. Scientific, User-driven
b. Organic, Socially-driven
c. Organic, User-driven
d. Friendly, Customer-driven

56

________ and ___________ are technologies used in Decision support systems


a. OLAP and ROLAP
b. OLAP and OLTP
c. ROLAP and MOLAP
d. OLTP and HOLAP

57

A companys life cycle consists of ______________, ____________ and ______________


a. Knowledge, Business, Customers
b. Distribution, growth, consolidation
c. Distribution, Development, Growth
d. Start up, growth and consolidation

58

The second generation (2G) wireless communications comprises technologies namely


_____________ and _______________
a. GSM and FDMA
b. GSM and TDMA
c. TDMA and WDMA
d. GSM and CDMA

59

_________ and _____________ are mobile computing based business applications


a. Structured application and data services to mobile users
b. Networking application and internetworking application
c. Structured application and Unstructured application
d. Mail enabled applications and data services to mobile users

60

_________ and _________ are two types of knowledge


a. Structured and unstructured
b. Implicit and Explicit
c. Internal and External
d. Tacit and Explicit

4 marks questions(Question 61 to 75)


61

Match the following E-commerce categories


Part A
1. B2B Business to Business
2. B2C Business to Consumer
3. C2B Consumer to Business
4. C2C Consumer to Consumer
Part B
A. A consumer posts his requirements and companies, capable of meeting the requirements, bid on
the project
B. Represents the business transactions taking place between the manufacturers and distributors
C. The consumer posts his products on a website and another consumer purchases it through the
online auction method
D. Represents the selling of products of a merchant to the general public takes place through
catalogs utilizing the shopping cart software
a. 1A, 2B, 3C, 4D
b. 1D, 2C, 3B, 4A
c. 1A, 2D, 3C, 4B
d. 1B, 2D, 3A, 4C

62

The impact on the organization is calculated on the basis of following segments


A. Appetite for change
B. Risk aversion
C. State of the current operation
D. Competition and financial stability
a. A, B, C
b. B, C, D
c. A, B, C, D
d. A, C, D

63

Match the following URL parts with their description


Part A
1. Transfer protocol
2. Server name
3. Directory path
4. File name
Part B
A. It is the directory of the server that contains the web pages
B. Starts with http://
C. Represents the file that has to be accessed
D. Looks like www.yahoo.com
a. 1D, 2A, 3C, 4D
b. 1C, 2B, 3A, 4D
c. 1A, 2C, 3D, 4B
d. 1B, 2D, 3A, 4C

64

Match the following ISP services


PART A
A. Dial Up Service
B. DSL Service
C. ISDN Service
D. Satellite Internet Service
PART B
1. Service is offered for people who are not able to receive DSL or Cable options
2. Telephone lines are used to access internet
3. Used to send Voice, Video, and Data over digital Telephone lines or normal Telephone wires
4. Uses cable internet, allows users to surf the Net and use the phone at the same time
a. A1, B2, C4, D3
b. A2, B3, C1, D4
c. A2, B4, C3, D1
d. A4, B1, C2, D3

65

Match the following


Part A
A. Internet Protocol (IP)
B. Hyper Text Transfer Protocol (HTTP)
C. TELNET
D. Post Office Protocol (POP)
Part B
1. Client-server protocol
2. Data-oriented protocol
3. Internet standard protocol
4. Communications protocol
a. A1, B3, C2, D4
b. A3, B2, C4, D1
c. A2, B4, C1, D3
d. A4, B1, C3, D1

66

Match the following


Part A
1. Simplex

2. Full duplex
3. Half duplex
Part B
A. Two devices can send and receive, but the transmission cannot take place simultaneously
B. Only one device can send and the other device can only receive
C. Two devices can send and receive simultaneously
a. 1A, 2C, 3B
b. 1B, 2A, 3C
c. 1B, 2C, 3A
d. 1C, 2B, 3A

67

Match the following


Part A
A. XSL
B. X Link
C. X Pointer
Part B
1. Defines a standard way to represent links between resources
2. Defines how to address a resource
3. Defines the standard style sheet language for XML
a. A2, B1, C3
b. A1, B3, C2
c. A1, B2, C3
d. A3, B1, C2

68

From the following metrics differentiate as Direct metrics or Indirect metrics


Part A
A. Indirect Metrics
B. Direct Metrics
Part B
1. Number of hits per page
2. Number of individual, authenticated user sessions
3. Authenticated user sessions by location
4. Average user session time in seconds
a. A1, A2, B3, B4
b. A1, A4, B2, B3
c. A2, A4, B1, B3
d. A1, A4, B2, B3

69

Match the following types of viruses


Part A
A. Logic Bomb
B. Trojan Horse

C. Worm
Part B
1. It appears to do something useful or entertaining but actually destroys files
2. Is a virus whose attack is triggered by some event such as the date on a computers system clock
3. It replaces a document or an application with its own code and then uses that code position itself
a. A2, B3, C1
b. A2, B1, C3
c. A3, B2, C1
d. A1, B3, C2

70

Match the followings


Part A
A. Acceptability
B. Anonymity
C. Convertibility
D. Efficiency
Part B
1. Identity of the customers should be protected
2. Payment infrastructure needs to be widely accepted
3. Digital money should be convertible to any type of fund
4. Cost per transaction should be near zero
a. A2, B3, C4, D1
b. A2, B1, C3, D4
c. A3, B2, C4, D1
d. A1, B3, C4, D2

71

Identify the Tools and technologies involved in the Customer's Information Repository
A. Date extraction tools
B. Cleansing tools
C. Relational database
D. House holding software
E. Data Loading tools
a. A, B, C, D, E
b. B, C, D, E
c. A, B, C, D
d. A, C, D, E

72

Match the following functions of Supply Chain Management


Part A
A. Supplier Management
B. Inventory Management
C. Distribution Management
D. Channel Management
E. Payment Management
Part B
1. Helps in quickly disseminating information about changing operational conditions, to trading
partners
2. Reduces the number of suppliers and identify specific supplier and make them partners in business
3. Assists company to link directly with the suppliers and distributors so that payments can be sent
and received electronically
4. Reduces the order-ship-bill cycle
5. Helps in moving documents relating to shipping such as bills of lading, purchase orders, advanced
ship notices and manifest claims
a. A5, B4, C2, D1, E3
b. A3, B1, C4, D5, E2
c. A4, B2, C1, D3, E5
d. A2, B4, C5, D1, E3

73

Match the following Wireless Technologies


Part A
A. AMPS
B. TDMA
C. CDMA
D. GSM
Part B
1. It assigns a unique code to each wireless connection and then broadcasts its data out on the
channel simultaneously with all other connections
2. Is a voice-only-analog transport
3. Is a digital transport that divides the frequency range allotted to it into a series of channels
4. Include direct connect internet access without requiring a modem
a. A2, B1, C4, D1
b. A2, B4, C3, D1
c. A2, B3, C1, D4
d. A4, B3, C4, D2

74

Identify the features of knowledge management


A. Expressing Knowledge
B. Storing Knowledge
C. Sharing Knowledge
D. Loading Knowledge
E. Refining Knowledge
F. Retaining Knowledge
a. B, C, D, E, F
b. A, B, C, D, F
c. A, B, C, E, F
d. A, B, D, E, F

75

Match the following


Part A
A. Mode of selling product
B. Mode of payment

Part B
1. Online Auction
2. Paisa Pay
3. Fixed Price
4. Demand Draft
a. A2, A3, B1, B4
b. A1, A3, B2, B4
c. A3, A4, B1, B2
d. A1, A4, B2, B3

Das könnte Ihnen auch gefallen