GkSeries.com

E-Commerce Quiz | E-Commerce Multiple Choice Questions(MCQs) and Answers

(1) ………………is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means
[A] SCM
[B] EDI
[C] E-commerce
[D] None of these
Answer: E-commerce
(2) Which of the following is not a party of SCM ?
[A] Distributors
[B] Customers
[C] Suppliers
[D] Manufacturers
Answer: Distributors

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) ………………. is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products.
[A] SCM
[B] Networking
[C] E-commerce
[D] EDI
Answer: SCM
(4) Electronic Exchange of business documents in a standard format is known as ………………
[A] E-commerce
[B] E-Business
[C] EDI
[D] None of these
Answer: EDI
(5) ……………allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company.
[A] Business applications
[B] EDI
[C] Protocols
[D] Standards
Answer: EDI
(6) Which among the following product is suitable for E-Commerce ?
[A] Vegetables
[B] Books
[C] All of these
[D] None of these
Answer: Books
(7) ………………..is a set of standards developed in the 1960s to exchange business information and to do electronic transactions
[A] TCP/IP
[B] Protocols
[C] EDI
[D] None of these
Answer: EDI
(8) ………………..is concerned with the buying and selling information, products and services over computer communication networks
[A] E-Commerce
[B] Commerce
[C] E-Business
[D] None of these
Answer: E-Commerce
(9) ……………….is an early form of E-commerce
[A] SCM
[B] EDI
[C] Both of these
[D] None of these
Answer: EDI
(10) World Wide Web (WWW) was introduced in the year ……………………
[A] 1996
[B] 1990
[C] 1994
[D] 1992
Answer: 1994
(11) A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.
[A] operator
[B] Hacker
[C] spoofer
[D] none of these
Answer: Hacker
(12) ……………………are special type of software meant for limiting the risks of being hit by computer viruses
[A] Network firewall
[B] Antivirus
[C] both of these
[D] none of these
Answer: Antivirus
(13) Which among the following is not an example for computer virus ?
[A] Chernobyl
[B] Melissa
[C] I Love You
[D] None of these
Answer: None of these
(14) …………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.
[A] Network firewall
[B] computer virus
[C] both of these
[D] none of these
Answer: computer virus
(15) In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity
[A] Positive ID system
[B] Negative ID system
[C] both of these
[D] None of above
Answer: Negative ID system
(16) In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity
[A] Negative ID system
[B] Positive ID system
[C] both of these
[D] none of these
Answer: Positive ID system
(17) ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.
[A] PIN
[B] Biometrics
[C] both of these
[D] none of these
Answer: Biometrics
(18) ……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.
[A] SSL
[B] SET
[C] both of these
[D] none of these
Answer: SET
(19) ………………is basically a secure gate between our organization data and internet.
[A] Network firewall
[B] Antivirus
[C] both of these
[D] none of these
Answer: Network firewall
(20) Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in the Market place.
[A] Process based
[B] strategic relationship based
[C] transaction based
[D] any of these
Answer: strategic relationship based

Please share this page

Click Here to Read more questions

Teacher Eligibility Test