You are on page 1of 17

Sikkim Manipal University DDE Master in Business Administration (MBA) Semester IV MI0039-E-Commerce - 4 Credits Book ID: B1325 Model

l Question Paper Answers Keys Time: 2 hours Total Marks: 140

Section A 1 Mark Questions Answer all questions. Each question carries 1 mark 50 * 1= 50 Marks

1. ____________________ is a process of conducting electronic commerce between businesses. a. b. c. d. B2C e-commerce B2E e-commerce B2Ae-commerce B2B e-commerce

2. _______________ is a process of buying and selling of goods or services using electronic systems. a. b. c. d. e-commerce e-banking e-networking e-marketing

3. Electronic commerce is based on a common set of required services and standards that allow __________________. a. b. c. d. Flexibility Interoperability Transaction devices Legacy systems

4. __________________is the main place that is used to store and handle the information about products or collection of products. a. b. c. d. Shopping cart Payment gateway Online product catalogue Merchant account

5. ___________________is a commonly used interface that customers apply to pick products that they want to purchase.

a. b. c. d.

Shopping cart Payment gateway Online product catalogue Merchant account

6. ____________________is a protected service that moves payment and credit card details from a website to a merchant account assigned by a bank.

a. b. c. d.

Shopping cart Payment gateway Online product catalogue Merchant account

7. The following are electronic payment systems, except: a. b. c. d. PC-Banking Credit cards Electronic cheques Electronic cash

8. ________________________refers to online transfer of money, which is conducted over the internet. a. b. c. d. Debit or prepaid Credit or postpaid Cash or real time Checks or wire transfers

9. _______________ are one of the financial instruments which are in the form of electronic cash or cheques. a. b. c. d. Electronic data Electronic tokens Electronic money Electronic cards

10. The _________________is started by either downloading a file, or by an operator keying data into a computer by following instructions on the screen. a. b. c. d. Electronic data interchange process Wire transfer process Electronic transfer Electronic banking

11. The _____________ organisations are mostly specialised in Oracle Applications and Sage Integrated solutions training and support. a. b. c. d. e-Marketing e- Commerce e-business e-Enterprise

12. _________________include all strategic functions of management of the organisation. a. b. c. d. Performance functions Management functions Support functions Business functions

13. ________________ enterprise is a process driven, technology based company, which adopts its own data and knowledge to perform its role. a. b. c. d. e-Marketing e- Commerce e-business e-Enterprise

14. ____________________represent the core business activities and they include manufacturing of products or services. a. b. c. d. Performance functions Management functions Support functions Business functions

15. _______________ is a relationship that exists between a company and the public at large. a. b. c. d. B2C e-commerce B2E e-commerce B2Ae-commerce B2B e-commerce

16. ________________________is a relationship between a company and the public sector. a. b. c. d. B2C e-commerce B2E e-commerce B2Ae-commerce B2B e-commerce

17. ____________________include the functions that support performance functions to ensure appropriate functioning of the enterprise. a. b. c. d. Performance functions Management functions Support functions Business functions

18. ____________________ is the communication done in more efficient way in electronic age, via a combination of audio and video technologies. a. b. c. d. e-commerce e-communication e-business e-collaboration

19. ______________________ describes the protocols that are required to have a logical interaction between the computers that are linked by the physical network in ecommerce systems. a. b. c. d. Logical layer Physical layer Networking services layers Messaging layer

20. _________________ supplies services on the internet infrastructure and the main service initially was the e-mail service. a. b. c. d. Logical layer Physical layer Networking services layers Messaging layer

21. __________________ is a protocol which helps in providing services that are necessary for many applications. a. b. c. d. Application layer Internet work layer Network layer Transport layer

22. ___________________ looks after IP addressing and domain name service (DNS). a. b. c. d. Application layer Internet work layer Network layer Transport layer

23. ________________________ is defined as a connection-oriented transport protocol that transmits data in the form of a stream of bytes.

a. b. c. d.

Transmission Control Protocol Internet Control Message Protocol Internet Group Management Protocol Broadcasting Management Protocol

24. ____________________ comprises operating system, and graphical user interface which facilitate users to have proper interaction with the computer and its peripherals. a. b. c. d. Application software User-written software Server software Platform software

25. ____________________is more frequently brought separately from computer hardware. a. b. c. d. Application software User-written software Server software Platform software

26. _____________________ represent the core business activities, and they include manufacturing of products or services. a. b. c. d. Management functions Support functions Performance functions Quality functions

27. __________________ helps in providing the essential service or getting datagrams to their last destination. a. b. c. d. Application layer Internet work layer Network layer Transport layer

28. The typical options for __________ are coordinated by function, product or category, customer or market, etc. to name a few.

a. b. c. d.

Strategic grouping Design procedure Functional design Conventional design procedure

29. ________________ is an efficient approach for examining risks and implementing risk controls. a. b. c. d. Risk assessment Risk analysis Risk prioritisation Risk identification

30. _____________________methods are used to minimise the amount of inherent risk.

a. b. c. d.

Risk control Risk analysis Risk prioritisation Risk identification

31. A/An _________________ is a list or itemised display, as of titles, course offerings, or articles for exhibition or sale, usually including descriptive information or illustrations. a. b. c. d. Brochure Product note Pilot catalogue Online catalogue

32. ____________________ is a method to identify and assess factors that may put the success of an application at risk. a. b. c. d. Risk control Risk analysis Risk prioritisation Risk identification

33. The _________________ used in e-commerce is a modified catalogue, which is used for internet users. a. b. c. d. Brochure Product note Pilot catalogue Online catalogue

34. _________________ is the process of selling products electronically and moving the products via distribution channels.

a. b. c. d.

e-Finance e-Merchandise e-Insurance e-commerce

35. _____________________ is communication by computer transmissioncommunication by means of transmitted signals. a. b. c. d. e-commerce e-communication e-business e-collaboration

36. ___________________category contains the services that offer specific e-commerce functions, including user validation or credit card payment processing. a. b. c. d. Commerce service providers Electronic commerce environment Server requirements Infrastructure services

37. ______________________is a process of carrying out financial activities via electronic communication and computation. a. b. c. d. e-Finance e-Merchandise e-Insurance e-Commerce

38. _________________ category includes the procedures and frameworks intended to create a favourable business environment.

a. b. c. d.

Commerce service providers Electronic commerce environment Server requirements Infrastructure services

39. ____________________is also called as Peer2Peer (P2P) a. b. c. d. Consumer 2 Business (C2B) Business 2 Administration (B2A) Consumer 2 Consumer (C2C) Business 2 Consumer (B2C)

40. ________________ is a business organisation and with respect to computer industry, e-enterprise is more often used to describe any large organisation that utilizes computers. a. b. c. d. e-Finance e-Merchandise e-Insurance e-Enterprise

41. ___________________ are the tools that customers use to get an access to the interactive multimedia contents of e-commerce. a. b. c. d. Consumer access requirements Local on ramps Global institution information networks Distribution of scant resources

42. ______________ level in the internet hierarchy of needs is about the skill to make connections between the documents and sites and its consequent implications. a. b. c. d. Organisation needs Semantic needs Existence needs Connectivity needs

43. ______________________form the infrastructure that connects countries and continents. a. b. c. d. Consumer access requirements Local on ramps Global institution information networks Distribution of scant resources

44. __________________ level in internet hierarchy of needs deals with fundamental elements required for the internet to function. a. b. c. d. Organisation needs Semantic needs Existence needs Connectivity needs

45. ________________ is a combination of marketing acumen and technology. a. b. c. d. e-commerce e-communication e-marketing e-collaboration

46. A ________________is an essential component for successful online marketing. a. b. c. d. High traffic website Low traffic website Search engine marketing Advertising

47. On the internet, promotion of a business is completely dependent on the________________. a. b. c. d. Marketing executive Business owner Marketing managers Business illustrators

48. __________________is the process of achieving the top position or ranking in the listings on the result pages of a search engine after particular key words are typed in. a. b. c. d. Search Engine Optimization Pay Per Click Trusted feed including paid for inclusion Search Engine Marketing

49. The main targets of ________________ websites are viewers who do online shopping. a. b. c. d. Community websites Information websites Corporate websites e-Commerce websites

50. _____________________ represents the plan implemented by the company or an organisation to generate revenue and gain enormous profit from its operations. a. b. c. d. Marketing model Structured model Business model Revenue model

Section-B Answer all questions. Each question carries 2 marks

25 * 2 = 50 Marks

51. _______________ and ___________ are the categories of the electronic payment system. a. Electronic cash, electronic debit-card systems

b. Smart cards, electronic cheque system c. Credit cards, electronic cash system d. Micro payment, Online credit card payment system 52. Consider the following statements: i. Online marketing includes search engine marketing, article marketing, blog marketing, pay-per-click advertising, and e-mail marketing. ii. Electronic collaboration is the most measurable and cost effective marketing strategy. State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True 53. Which of the following are the techniques of the search engine marketing for making a company and its products visible? 1. 2. 3. 4. a. b. c. d. Search Engine Optimisation Pay per Click Internet marketing Electronic commerce 2, 3 1, 2 3, 4 1, 4

54. Identify the following options that are some of the method by which risks can be avoided. 1. 2. 3. 4. e. f. g. h. Antivirus protection Risk management Encryption Decryption 2, 3 1, 4 3, 4 1, 3

55. Identify the statement that is related to the risk monitoring. a. It provides assurance to the site owners that the sites are working properly and no risk has been found out.

b. It can be defined as the emergence of reality, the resultant impact on the variables that influence the outcome. c. It is about defining the process of how to connect and manage risk management activities for an application. d. It is about the methods that are used to minimise the amount of inherent risk. 56. Consider the following statements: i. A disaster recovery plan helps by providing an organised way to take decisions when risk occurs. ii. Risk management planning is about defining the process of how to connect and manage risk management activities for an application. State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True 57. Which of the following statements explains about the internet based B2B ecommerce? a. It describes transactions between businesses, such as between two organisations or between a manufacturer and wholesalers. b. It involves all transactions between and among consumers. c. It is an e-commerce business model in which consumers offer products and services to companies and the companies pay the consumers. d. It is carried out through industry-sponsored marketplaces and through private exchanges, and these are conducted by large companies. 58. Identify the options that include I-way issues. 1. 2. 3. 4. a. b. c. d. Price Connectivity needs Actualisation Subsidies 2, 3 1, 4 3, 4 1, 3

59. Identify the components from the following that includes the logical layer. 1. 2. 3. 4. Search engines Internet Intranet Software agents

a. b. c. d.

2, 3 1, 4 3, 4 1, 3

60. Consider the following statement: i. Exchanging messages and documents between users in e-commerce is the most essential requirement. ii. Messaging layer provides the necessary services to e-commerce users to assist in making their transactions easier State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True 61. Fill in the blanks: i. __________________ is an extension of an intranet to allow access to customers and users outside the company. ii. _______________is the process of coding information using an algorithm to make it unreadable to unauthorised users. a. (i)Intranet, (ii)decryption b. (i)Internet, (ii)illumination c. (i)Extranet, (ii)encryption d. (i)Firewall, (ii)illustration 62. Which of the following include the key points of interactive online marketing? 1. 2. 3. 4. a. b. c. d. Spam mail E-mail chain letters Mailing newsletters Encourage participation 2, 3 1, 4 3, 4 1, 3

63. Which of the following are the advantages of using EDI? 1. 2. 3. 4. Reduced time delay Outbound translation Reduced labour cost Communication

a. b. c. d.

2, 3 1, 4 3, 4 1, 3

64. Consider the following statements that are related to EDI. i. EDI is difficult to implement because users have to deal with two technologies such as the EDI and the EDI application. ii. An EDI system can be distinguished as partially or fully integrated EDI systems. State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True 65. Following are the business model that work together in e-enterprise, except. 1. 2. 3. 4. a. b. c. d. e-business e-marketing e-sales e-communication 2, 3 1, 4 3, 4 1, 3

66. Which of the following are the characteristics of electronic payment systems that make attractive payment system over the internet? 1. 2. 3. 4. a. b. c. d. Authority Privacy Monetary value Storability 2, 3 1, 4 3, 4 1, 3

67. ________________ and ____________________are classified as two types of smart cards.

a. b. c. d.

Prepaid cards, legal tender Credits, wire transfer Prepaid, post-paid Smart credit cards, electronic purses

68. Consider the following statements: i. All managing credit risk ensures privacy of the customers transactions. ii. An important concern in the net settlement system is credit risk as, failure of the bank to settle its net position may lead to continuous failure of the bank. State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True 69. A ______________, which is also called as a reciprocal agreement, is an agreement with another company that may have the same computing needs like software, hardware, and _____________________.

a. b. c. d.

Security aid agreement, service bureaus Risk management agreement, intranet Mutual aid agreement, communication network Data safety agreement, internal networks

70. Identify the options that include in the layers of software. 1. 2. 3. 4. a. b. c. d. Application layer Development layer User layer Structured layer 2, 3 1, 4 3, 4 1, 3

71. Consider the following statements: i. Web server management software is software that is designed to execute on web servers to deal with all the features using a web interface. ii. Security helps in detecting the ability of your Web server software to develop, as your web site grows

State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True 72. Which of the following factors should be considered when selecting server software? 1. 2. 3. 4. a. b. c. d. Security Scalability Liability Accessibility 2, 3 1, 4 3, 4 1, 2

73. Identify the options that include the different types of connectivity in internet. 1. 2. 3. 4. a. b. c. d. Dial-up internet access Leased line Server access Leased line 2, 3 1, 4 3, 4 1, 2

74. Consider the following statements: i. Solicited email is an acceptable and widely used marketing practice. ii. In solicited email, messages are sent to people who have already expressed interest in receiving information from a company about its goods and services.

State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True

75. Consider the following statements: i. The billboards of the information superhighway are banner ads. ii. The two types of banners are static and dynamic. State True or False. a. (i)-True, (ii)-True b. (i)-False, (ii)-False c. (i)-True, (ii)-False d. (i)-False, (ii)-True

Section-C Answer all the following questions. (Descriptive questions to be answered in not more than 200 words) 10Marks x 4 = 40Marks
Sl. No. 76. a) Questions Marks

b)

77. c)

d)

Explain about the e-commerce Sales Life Cycle model. (5 marks) 10 Marks) Refer unit 6, section 6.4 Explain the risks involved in business transaction between trading partners. (5 marks) Refer unit 7, section 7.5 Discuss the different dimensions of risk in e-Commerce system development. (5 marks) (10 Marks) Refer unit 8, section 8.4, fig 8.1 Explain about the properties of electronic cash. (5 marks) Refer unit 9, section 9.3

Read the following case study thoroughly and answer the following questions: ABC and XYZ both are the tyre manufacturing companies. They manufacture different types of tyres for two wheelers, four wheelers, light weight trucks and heavy weight trucks. Both companies have their own retail outlets at different places. Comparing with the Company XYZ, ABC companys profit is less. But quality wise everything was same as XYZ. While the profit of the ABC company is decreasing, XYZ company was growing very fast with good profits. Immediately the company conducted a survey to find out the secret of XYZ companys growth. They found two reasons; one of the main reasons was lack of advertisement of the tyres manufactured by ABC. Another reason was restricted access. If any customer wanted to buy tyres they had to come to the outlet. However, due to the busy life, customers were not showing interest to visit the outlets and buy tyres. Instead the customers looked for outlets that gave them the facility of online marketing. This resulted in ABC losing its customers and XYZ company making good profits. Therefore, ABC company also decided to launch one website to sell tyres online. It took two weeks to get the website ready and they provided clear details about tyres price, quality, warranty, sample videos of tyres, etc., and most importantly the facility to place an order online.

ABC also took the help of the print media to advertise about its tyres. They also provided free shipping facility and exchange facility if any tyre turned out to be defective. Gradually the sales increased and the profits too. Being a little different from XYZ, ABC gave more discounts on online orders than offline purchases. With this differentiation, the profits of ABC soared high. To answer the questions for this case you should know the concepts of online marketing and e-Marketing(unit 11)
78. a) b)

79. c)

Discuss about the prevalence of online marketing. Is it a necessity or a trend? (5 marks) (10 Marks) Does e-marketing require other forms of advertisements (electronic and print) or e-marketing in itself is advertisement? (5 marks) Discuss the factors that played hindrance to ABCs growth. (10 Marks) How did e-marketing help ABC to spring back to business?

You might also like