E-Commerce bpsc computer science pdf

 E-Commerce BPSC Computer Science questions with answers

Ques1: The dimension of e-commerce that enables commerce across national boundaries is called _______.

 a) interactivity b) global reach c) richness d) ubiquity 

Ques2: Which of the following describes e‐commerce? 

a) Doing business electronically b) Doing business c) Sale of goods d) All of the above 

Ques3: Which of the following is part of the four main types for e‐commerce?

 a) B2B b) B2C c) C2B d) All of the above 

Ques4: Which of the following is not considered to be one of the three phases of e-commerce?

 a) Innovation b) Consolidation c) Preservation d) Reinvention 

Ques5: Which segment do eBay, Amazon.com belong?

 a) B2Bs b) B2Cs c) C2Bs d) C2Cs 

Ques6: The idealistic market envisioned at the outset of the development of e-commerce is called a ______.

 a) Bailey market b) Baxter market c) Bergman market d) Bertrand market 

Ques7: Which one is not a physical threat 

a) Hacking b) Storm c) Fire d) Flood 

Ques8: Which one is a communication channel security protocol?

 a) SSL b) SET c) S-HTTP d) All of the above 

Ques9: Which one is used to identify mobile money

 a) MCID b) MMID c) RSID d) None of the above 

Ques10: Unclassified email is called? 

a) Extra mail b) Spam c) junk mail d) None of the above 

Ques11: Which of the following refers to creating products tailored to individual customers?

 a) Customization b) Adaptation c) Direct material d) Auction 

Ques12:Which form of e-marketplace brings together buyers and sellers from the same industry?

 a) Horizontal b) Vertical c) Integrated d) isolated 

Ques13: Which of the following is done by Secure Sockets Layers?

 a) creates a secure, private connection to a web server b) Encrypts information 

c) Sends information over the internet d) All of the above 

Ques14: The source of revenue in a subscription revenue model is ______.

 a) Fees from advertisers in exchange for advertisements 

b) Fees for business referrals 

c) Fees from subscribers in exchange for access to content or services 

d) Fees for enabling or execution a transaction 

Ques15: Public key cryptography is also known as -----

 a) Private key b) Symetric c) Asymmetric d) None of the above 

Ques16: All of the following are major B2C business models except ______.

 a) content provider b) industry consortium c) transaction broker d) service provider 

Ques17: The solution for all business needs is. 

a) EDI b) ERP c) SCM d) None of the above 

Ques18: The _________ business model involves an independently owned vertical digital marketplace for direct inputs.

 a) e-distributor b) exchange c) e-procurement d) private industrial network 

Ques19: All of the following are techniques B2C e‐commerce companies use to attract customers, except:

 a) Registering with search engines b) Viral marketing c) Online ads d) Virtual marketing 

Ques20: Industry structure is defined as __________.

 a. the nature of the players in an industry and their relative bargaining power 

b. a set of plans for achieving long term returns on the capital invested in a business firm 

c. set of planned activities designed to result in a profit in a marketplace 

d. how a company's product or service fulfills the needs of customers 

Ques21: The area of actual or potential commercial value in which a company intends to operate is a _______.

 a) market space b) marketplace c) perfect market d) Bertrand market 

Ques22: Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?

 a) Affiliate programs b) Click‐through c) Spam d) All of the above 

Ques23: A perfect market is one in which __________. 

a) One firm develops an advantage based on a factor of production that other firms cannot purchase 

b) One participant in the market has more resources than the others 

c) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production 

d) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage 

Ques24: What is the percentage of customers who visit a Web site and actually buy something called? 

a) Affiliate programs b) Click‐through c) Spam d) Conversion rate

Ques25: Which of the following is not a horizontal portal?

 a) AOL b) Yahoo c) Sailnet d) MSN/Windows Live  

Ques26: What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?

 a) Direct materials b) Indirect materials c) EDI d) None of the above 

Ques27: A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________. 

a) a value web b) value chain c) profit d) commoditization 

Ques28: What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? 

a) Direct materials b) Indirect materials c) EDI d) None of the above 

Ques29: A strategy designed to compete in all markets around the globe is called a _________ strategy.

 a) scope b) differentiation c) cost d) focus

Ques30: What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?

 a) B2B marketplace b) Intranet c) Reverse auction d) Internet  

Ques31: Which of the following is not one of the stages of the development of the Internet? 

a) Innovation b) Institutionalization c) Globalization d) Commercialization 

Ques32: What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? 

a) Customer relationship management systems cards b) E‐government identity cards

 c) FEDI cards d) Smart cards 

Ques33: Which of the following are advantages normally associated with B2B e‐commerce? 

a) Shorter cycle times b) Reduction in costs c) Reaches wider audiences d) all of the above 

Ques34:A business competing in a commodity like environment must focus on which of the following? 

A. Price B. Ease / speed of delivery C. Ease of ordering D. all of the above

Ques35: A combination of software and information designed to provide security and information for payment is called a what? 

a) digital wallet b) pop up ad c) shopping cart d) encryption  

Ques36:What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? 

a) internet commerce b) e‐commerce c) transaction information transfer d) electronic data interchange

Ques37: The only payment system that is instantly convertible without intermediation is _______.

 a) Credit card b) Accumulating balance c) Stored value d) Cash  

Ques38: When a transaction is processed online, how can the merchant verify the customer's identity? 

a) use secure sockets layers 

b) use secure electronic transactions 

c) use electronic data interchange

 d) use financial electronic data interchange 

Ques39: The online content revenue model in which free content drives offline revenues is called the _____.

 a) marketing model b) advertising model c) pay-per-view model d) subscription model 

Ques40:Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.

 a) Bertrand's Law b) the Law of Universal Prices c) the Law of One Price 

d) the Law of Perfect Commerce 

Ques41: What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? 

a) Disaster recovery plan b) Hot site c) Cold site d) Disaster recovery cost curve 

Ques42: What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

 a) Disaster recovery plan b) Hot site c) Cold site d) Disaster recovery cost curve 

Ques43: What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

 a) Disaster recovery plan b) Hot site c) Cold site d) Disaster recovery cost curve 

Ques44: The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______. 

A. affiliate marketing B. viral marketing C. permission marketing D. blog marketing 

Ques45: Which factor determines when your IT system will be available for knowledge workers to access?

 a) Availability b) Accessibility c) Reliability d) None of the above 

Ques46: Which factor determines who has the right to access different types of IT systems and information?

 a) Availability b) Accessibility c) Reliability d) Scalability 

Ques47: Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______.

 a) versioning b) bundling c) transactive content d) price discrimination 

Ques48: E-business can be defined as_______.

 a. the uninhibited flow of information and goods on the Web

 b. the use of the Internet and the Web to transact business 

c. digitally enabled transactions and processes within an organization 

d. commercial transactions involving electronic goods 

Ques49: What is a set of conditions used to measure how well a product or system functions? 

a) Flexibility b) Performance c) Capacity planning d) Benchmark 

Ques50: If it is easy for competitors to enter the market, the threat of new entrants is considered: 

a) High b) Low c) More d) Less 

Ques51: __________ is backbone of all E‐payments in E‐commerce.

 a) EFT b) EPS c) PayPal d) None of these 

Ques52: Secure communication means.

 a) Protect transmission of credit card number

 b) Guarantee privacy of customer

 c) authorized access of payment details 

d) All the above 

Ques53: Which one is not an online payment mode? 

a) Cash on delivery b) Debit card c) Credit card d) e‐cheque 

Ques54: What is an arrangement made between e‐commerce sites that direct users from one site to the other?

 a) Spam b) Viral marketing c) Affiliate programs d) None of the above 

Ques55: Which of the following is not a type of media convergence? 

a) technological convergence b) content convergence c) industry convergence 

d) community convergence 

Ques56: The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________. 

a) Digital rights management b) Digital protection schemes c) Digital distribution regulation

 d) Digital rights protection 

Ques57: Which of the following is not an entertainment industry value chain model? 

a) content owner direct model b) user distribution model c) aggregator model

 d) Internet innovator model 

Ques58: Which of the following applies to the implementation of an idea?

 a) Copyright b) Intellectual property c) Patent d) Denial‐of‐service attack 

Ques59: Which of the following records logons and deletions?

 A. Key logger B. Packet sniffer C. Log analysis tools D. Screen captures 

Ques60: Digital products are best suited for B2C e‐commerce because they: 

a) Are commodity like products 

b) Can be mass‐customized and personalized 

c) Can be delivered at the time of purchase 

d) All of the above 

Ques61: The primary source of financing during the early years of e-commerce was _______

a) bank loans b) large retail firms c) venture capital funds d) initial public offerings 

Ques62: All of the following are technologies used to gather information about you online except ______. 

a) spy ware b) cookies c) Gmail d) anonymizers 

Ques63: In which website Global Easy Buy is facilitated? 

a) Ebay.com b) Amazon.com c) Yepme.com d) None of these 

Ques64: A _________ is the set of planned activities designed to result in a profit in a marketplace.

 a) business model b) profit model c) business plan d) revenue model 

Ques65: The best products to sell in B2C e‐commerce are: 

a) Small products b) Digital products c) Specialty products d) Fresh products 

Ques66: Which of the following is not a key element of a business model? 

a) value proposition b) competitive advantage c) market strategy d) universal standards 

Ques67: What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?

 a) Encryption b) Public key encryption c) Intrusion‐detection software d) Security‐auditing software 

Ques68: What checks out your computer or network for potential weaknesses? 

a) Encryption b) Public key encryption c) Security‐auditing software d) None of the above 

Ques69: Which of the following to viruses harm? 

a) Your keyboard b) Your monitor c) Your processor d) Viruses do not harm any of the above 

Ques70: The most common form of securing channels is through ________. 

a) S-HTTP b) VPNs c) SSL d) PPTP

E-Commerce Notes

👉Multimedia



Tausif

Hi! My name is TAUSIF AHMAD I have completed B.Tech in Computer Science from Maulana Azad National Urdu University Hyderabad. I am always ready to have new experiences meet new people and learn new things. 1. I am very interested in Frontend Development. 2. I love video editing and graphics designing. 3. I enjoy challenges that enables to grow. 4. I am part time Blogger.

Post a Comment (0)
Previous Post Next Post