Download PDF
Free download in PDF E-Commerce Multiple Choice Questions(MCQs) and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams. These short solved questions or quizzes are provided by Gkseries.
(1)
………………is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means
[A]
SCM
[B]
EDI
[C]
E-commerce
[D]
None of these
(2)
Which of the following is not a party of SCM ?
[A]
Distributors
[B]
Customers
[C]
Suppliers
[D]
Manufacturers
(3)
………………. is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products.
[A]
SCM
[B]
Networking
[C]
E-commerce
[D]
EDI
(4)
Electronic Exchange of business documents in a standard format is known as ………………
[A]
E-commerce
[B]
E-Business
[C]
EDI
[D]
None of these
(5)
……………allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company.
[A]
Business applications
[B]
EDI
[C]
Protocols
[D]
Standards
(6)
Which among the following product is suitable for E-Commerce ?
[A]
Vegetables
[B]
Books
[C]
All of these
[D]
None of these
(7)
………………..is a set of standards developed in the 1960s to exchange business information and to do electronic transactions
[A]
TCP/IP
[B]
Protocols
[C]
EDI
[D]
None of these
(8)
………………..is concerned with the buying and selling information, products and services over computer communication networks
[A]
E-Commerce
[B]
Commerce
[C]
E-Business
[D]
None of these
(9)
……………….is an early form of E-commerce
[A]
SCM
[B]
EDI
[C]
Both of these
[D]
None of these
(10)
World Wide Web (WWW) was introduced in the year ……………………
[A]
1996
[B]
1990
[C]
1994
[D]
1992
(11)
A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.
[A]
operator
[B]
Hacker
[C]
spoofer
[D]
none of these
(12)
……………………are special type of software meant for limiting the risks of being hit by computer viruses
[A]
Network firewall
[B]
Antivirus
[C]
both of these
[D]
none of these
(13)
Which among the following is not an example for computer virus ?
[A]
Chernobyl
[B]
Melissa
[C]
I Love You
[D]
None of these
(14)
…………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.
[A]
Network firewall
[B]
computer virus
[C]
both of these
[D]
none of these
(15)
In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity
[A]
Positive ID system
[B]
Negative ID system
[C]
both of these
[D]
None of above
Answer: Negative ID system
(16)
In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity
[A]
Negative ID system
[B]
Positive ID system
[C]
both of these
[D]
none of these
Answer: Positive ID system
(17)
………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.
[A]
PIN
[B]
Biometrics
[C]
both of these
[D]
none of these
(18)
……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.
[A]
SSL
[B]
SET
[C]
both of these
[D]
none of these
(19)
………………is basically a secure gate between our organization data and internet.
[A]
Network firewall
[B]
Antivirus
[C]
both of these
[D]
none of these
(20)
Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in the Market place.
[A]
Process based
[B]
strategic relationship based
[C]
transaction based
[D]
any of these
Answer: strategic relationship based
Please share this page