E-Commerce BPSC Computer Science questions with answers
Ques1: The dimension of e-commerce that enables commerce across national boundaries is called _______.
a) interactivity b) global reach c) richness d) ubiquity
Ques2: Which of the following describes e‐commerce?
a) Doing business electronically b) Doing business c) Sale of goods d) All of the above
Ques3: Which of the following is part of the four main types for e‐commerce?
a) B2B b) B2C c) C2B d) All of the above
Ques4: Which of the following is not considered to be one of the three phases of e-commerce?
a) Innovation b) Consolidation c) Preservation d) Reinvention
Ques5: Which segment do eBay, Amazon.com belong?
a) B2Bs b) B2Cs c) C2Bs d) C2Cs
Ques6: The idealistic market envisioned at the outset of the development of e-commerce is called a ______.
a) Bailey market b) Baxter market c) Bergman market d) Bertrand market
Ques7: Which one is not a physical threat
a) Hacking b) Storm c) Fire d) Flood
Ques8: Which one is a communication channel security protocol?
a) SSL b) SET c) S-HTTP d) All of the above
Ques9: Which one is used to identify mobile money
a) MCID b) MMID c) RSID d) None of the above
Ques10: Unclassified email is called?
a) Extra mail b) Spam c) junk mail d) None of the above
Ques11: Which of the following refers to creating products tailored to individual customers?
a) Customization b) Adaptation c) Direct material d) Auction
Ques12:Which form of e-marketplace brings together buyers and sellers from the same industry?
a) Horizontal b) Vertical c) Integrated d) isolated
Ques13: Which of the following is done by Secure Sockets Layers?
a) creates a secure, private connection to a web server b) Encrypts information
c) Sends information over the internet d) All of the above
Ques14: The source of revenue in a subscription revenue model is ______.
a) Fees from advertisers in exchange for advertisements
b) Fees for business referrals
c) Fees from subscribers in exchange for access to content or services
d) Fees for enabling or execution a transaction
Ques15: Public key cryptography is also known as -----
a) Private key b) Symetric c) Asymmetric d) None of the above
Ques16: All of the following are major B2C business models except ______.
a) content provider b) industry consortium c) transaction broker d) service provider
Ques17: The solution for all business needs is.
a) EDI b) ERP c) SCM d) None of the above
Ques18: The _________ business model involves an independently owned vertical digital marketplace for direct inputs.
a) e-distributor b) exchange c) e-procurement d) private industrial network
Ques19: All of the following are techniques B2C e‐commerce companies use to attract customers, except:
a) Registering with search engines b) Viral marketing c) Online ads d) Virtual marketing
Ques20: Industry structure is defined as __________.
a. the nature of the players in an industry and their relative bargaining power
b. a set of plans for achieving long term returns on the capital invested in a business firm
c. set of planned activities designed to result in a profit in a marketplace
d. how a company's product or service fulfills the needs of customers
Ques21: The area of actual or potential commercial value in which a company intends to operate is a _______.
a) market space b) marketplace c) perfect market d) Bertrand market
Ques22: Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?
a) Affiliate programs b) Click‐through c) Spam d) All of the above
Ques23: A perfect market is one in which __________.
a) One firm develops an advantage based on a factor of production that other firms cannot purchase
b) One participant in the market has more resources than the others
c) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
d) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage
Ques24: What is the percentage of customers who visit a Web site and actually buy something called?
a) Affiliate programs b) Click‐through c) Spam d) Conversion rate
Ques25: Which of the following is not a horizontal portal?
a) AOL b) Yahoo c) Sailnet d) MSN/Windows Live
Ques26: What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?
a) Direct materials b) Indirect materials c) EDI d) None of the above
Ques27: A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________.
a) a value web b) value chain c) profit d) commoditization
Ques28: What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?
a) Direct materials b) Indirect materials c) EDI d) None of the above
Ques29: A strategy designed to compete in all markets around the globe is called a _________ strategy.
a) scope b) differentiation c) cost d) focus
Ques30: What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?
a) B2B marketplace b) Intranet c) Reverse auction d) Internet
Ques31: Which of the following is not one of the stages of the development of the Internet?
a) Innovation b) Institutionalization c) Globalization d) Commercialization
Ques32: What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a) Customer relationship management systems cards b) E‐government identity cards
c) FEDI cards d) Smart cards
Ques33: Which of the following are advantages normally associated with B2B e‐commerce?
a) Shorter cycle times b) Reduction in costs c) Reaches wider audiences d) all of the above
Ques34:A business competing in a commodity like environment must focus on which of the following?
A. Price B. Ease / speed of delivery C. Ease of ordering D. all of the above
Ques35: A combination of software and information designed to provide security and information for payment is called a what?
a) digital wallet b) pop up ad c) shopping cart d) encryption
Ques36:What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?
a) internet commerce b) e‐commerce c) transaction information transfer d) electronic data interchange
Ques37: The only payment system that is instantly convertible without intermediation is _______.
a) Credit card b) Accumulating balance c) Stored value d) Cash
Ques38: When a transaction is processed online, how can the merchant verify the customer's identity?
a) use secure sockets layers
b) use secure electronic transactions
c) use electronic data interchange
d) use financial electronic data interchange
Ques39: The online content revenue model in which free content drives offline revenues is called the _____.
a) marketing model b) advertising model c) pay-per-view model d) subscription model
Ques40:Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
a) Bertrand's Law b) the Law of Universal Prices c) the Law of One Price
d) the Law of Perfect Commerce
Ques41: What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
a) Disaster recovery plan b) Hot site c) Cold site d) Disaster recovery cost curve
Ques42: What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
a) Disaster recovery plan b) Hot site c) Cold site d) Disaster recovery cost curve
Ques43: What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
a) Disaster recovery plan b) Hot site c) Cold site d) Disaster recovery cost curve
Ques44: The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
A. affiliate marketing B. viral marketing C. permission marketing D. blog marketing
Ques45: Which factor determines when your IT system will be available for knowledge workers to access?
a) Availability b) Accessibility c) Reliability d) None of the above
Ques46: Which factor determines who has the right to access different types of IT systems and information?
a) Availability b) Accessibility c) Reliability d) Scalability
Ques47: Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______.
a) versioning b) bundling c) transactive content d) price discrimination
Ques48: E-business can be defined as_______.
a. the uninhibited flow of information and goods on the Web
b. the use of the Internet and the Web to transact business
c. digitally enabled transactions and processes within an organization
d. commercial transactions involving electronic goods
Ques49: What is a set of conditions used to measure how well a product or system functions?
a) Flexibility b) Performance c) Capacity planning d) Benchmark
Ques50: If it is easy for competitors to enter the market, the threat of new entrants is considered:
a) High b) Low c) More d) Less
Ques51: __________ is backbone of all E‐payments in E‐commerce.
a) EFT b) EPS c) PayPal d) None of these
Ques52: Secure communication means.
a) Protect transmission of credit card number
b) Guarantee privacy of customer
c) authorized access of payment details
d) All the above
Ques53: Which one is not an online payment mode?
a) Cash on delivery b) Debit card c) Credit card d) e‐cheque
Ques54: What is an arrangement made between e‐commerce sites that direct users from one site to the other?
a) Spam b) Viral marketing c) Affiliate programs d) None of the above
Ques55: Which of the following is not a type of media convergence?
a) technological convergence b) content convergence c) industry convergence
d) community convergence
Ques56: The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.
a) Digital rights management b) Digital protection schemes c) Digital distribution regulation
d) Digital rights protection
Ques57: Which of the following is not an entertainment industry value chain model?
a) content owner direct model b) user distribution model c) aggregator model
d) Internet innovator model
Ques58: Which of the following applies to the implementation of an idea?
a) Copyright b) Intellectual property c) Patent d) Denial‐of‐service attack
Ques59: Which of the following records logons and deletions?
A. Key logger B. Packet sniffer C. Log analysis tools D. Screen captures
Ques60: Digital products are best suited for B2C e‐commerce because they:
a) Are commodity like products
b) Can be mass‐customized and personalized
c) Can be delivered at the time of purchase
d) All of the above
Ques61: The primary source of financing during the early years of e-commerce was _______.
a) bank loans b) large retail firms c) venture capital funds d) initial public offerings
Ques62: All of the following are technologies used to gather information about you online except ______.
a) spy ware b) cookies c) Gmail d) anonymizers
Ques63: In which website Global Easy Buy is facilitated?
a) Ebay.com b) Amazon.com c) Yepme.com d) None of these
Ques64: A _________ is the set of planned activities designed to result in a profit in a marketplace.
a) business model b) profit model c) business plan d) revenue model
Ques65: The best products to sell in B2C e‐commerce are:
a) Small products b) Digital products c) Specialty products d) Fresh products
Ques66: Which of the following is not a key element of a business model?
a) value proposition b) competitive advantage c) market strategy d) universal standards
Ques67: What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
a) Encryption b) Public key encryption c) Intrusion‐detection software d) Security‐auditing software
Ques68: What checks out your computer or network for potential weaknesses?
a) Encryption b) Public key encryption c) Security‐auditing software d) None of the above
Ques69: Which of the following to viruses harm?
a) Your keyboard b) Your monitor c) Your processor d) Viruses do not harm any of the above
Ques70: The most common form of securing channels is through ________.
a) S-HTTP b) VPNs c) SSL d) PPTP
![]() |
E-Commerce Notes |