You are on page 1of 6

E-Business Course Materials

Monojit Banerjee
Asst. Professor, School of Management Studies, Techno India

E-Business MCQ Question Bank with Solutions

Q.1) Disintermediation refers to


a) new opportunities for middlemen to aggregate content, products and services.
b) the disappearance of market middlemen and the destruction of traditional distribution channels.
c) hypercompetition
d) the fact that when everyone uses the same tool or product, all participants receive more value.

Ans: (b) the disappearance of market middlemen and the destruction of traditional distribution channels.

Q.2) eBay.com uses all the following business models except


a) C2C b) market creator
c) m-commerce d) service provider

Ans: (d) service provider

Q.3) eBay is an example of a/an . e-commerce site.


a) B2C b) EDI
c) C2C d) B2B

Ans: (c) C2C

Q.4) Amazon.com comes under the model


a) B2B b) B2C
c) C2C d) C2B

Ans: (b) B2C

========================================================================================

Q.5a) The addresses used by browsers to identify the location of content on the web are called
a) Domain names b) uniform resource location
c) IP addresses d) hypertext transfer protocol

Ans: (b) uniform resource location [actually: URL uniform resource locators ]

Q.5b) The addresses used by browsers to identify the location of content on the web are called
a) domain names b) uniform resource locaters
c) IP addresses d) hypertext transfer protocol

Ans: (b) uniform resource locaters

========================================================================================

E-Business MCQ QB Page 1 of 6 Monojit Banerjee


Q.6) Symmetric key encryption is known as
a) public key encryption b) secret key encryption
c) PGP d) PKI

Ans: (b) secret key encryption

========================================================================================

Q.7a) A __________ is a software application that acts as a filter between a companys closed group network
and the internet.
a) firewall b) virtual private network
c) proxy server d) PPTP

Ans: (a) firewall

Q.7b) A ____________ is a software application that acts as a filter between a companys closed group network
and the internet.
a) Firewall b) virtual private network
c) proxy server d) router

Ans: (a) firewall

========================================================================================

Q.8) The primary e-book revenue model is


a) advertising b) subscription
c) pay-per-download d) marketing

Ans: (c) pay-per-download

Q.9) Microsofts Passport is an example of


a) client based digital wallet b) server based digital wallet
c) digital credit card d) smart card

Ans: (b) server based digital wallet

Q.10) OSI is related with


a) Computer network b) EFT
c) Call centre d) None of these

Ans: (a) Computer network

Q.11) RSA is
a) a business model b) an application protocol
c) an encryption algorithm d) none of these

Ans: (c) an encryption algorithm

E-Business MCQ QB Page 2 of 6 Monojit Banerjee


Q.12) Digital signature provides
a) security b) privacy
c) authentication d) all of these

Ans: (d) all of these

Q.13) Firewall lies between


a) two computers b) two LANs
c) LAN and external network d) all of these

Ans: (d) all of these

========================================================================================

Q.14a) Which of the following is a security protocol?


a) TCP b) UDP
c) SSL d) IP

Ans: (c) SSL

Q.14b) Which of the following is a security protocol?


a) SSL b) HTTPS
c) TCP d) IP

Ans: (a) SSL

========================================================================================

Q.15a) One way to make e-commerce more efficient and secure is to use a
a) digital signature b) digital envelope
c) digital certificate d) none of these

Ans: (a), (b) or (c). Preferred answer: (b) digital envelope (efficient)

Q.15b) One way to make e-commerce more efficient and secure is to use
a) a digital signature b) a digital envelope
c) a digital certificate d) an encryption

Ans: (a), (b) , (c) or (d). Preferred answer: (b) digital envelope (efficient)

========================================================================================

Q.16) XML is a
a) Security Software b) Webpage Development Language
c) type of virus d) none of these

Ans: (b) Webpage Development Language (closest match). [XML is actually a document formatting language]

E-Business MCQ QB Page 3 of 6 Monojit Banerjee


Q.17) The class of address 198.76.9.23 is
a) class A b) class B
c) class C d) cannot be said

Ans: (c) class C

Q.18) The class of address 172.16.10.2


a) class A b) class B
c) class C d) none of these

Ans: (b) class B

Q.19) IP provides a/an _____________ datagram service


a) reliable b) unreliable
c) uninterrupted d) none of these

Ans: (a)reliable

Q.20) Which of the following is not an E-payment method?


a) E-cheque b) E-draft
c) E-cash d) E-card

Ans: (b) E-draft

========================================================================================

Q.21a) TCP/IP is a __________ layer protocol


a) 7 b) 10
c) 4 d) 5

Ans: (c) 4

Q.21b) TCP / IP is a _______________ layer protocol


a) 7 b) 10
c) class C4 d) 5

Ans: The option (c) is a printing mistake. TCP / IP is a 4 layer protocol.

Q.21c) TCP / IP is a layer protocol


a) 7 b) 10
c) 8 d) 5

Ans: The options do not include the correct answer. TCP / IP is a 4 layer protocol.

========================================================================================

Q.22) Which of the following is not an E-business model based on transaction parties?
a) B2B b) C2C
c) B2C d) D2K

Ans: (d) D2K

E-Business MCQ QB Page 4 of 6 Monojit Banerjee


Q.23) Auctions are related to which of the following E-business model?
a) Subscription b) Brokerage
c) Advertising d) Affiliate

Ans: (b) Brokerage

Q.24) Which model of E-commerce deals with virtual auction?


a) Aggregator model b) Info-mediary model
c) Community model d) Brokerage model

Ans: (d) Brokerage

Q.25) CTR is a measure of


a) the number of times an ad is clicked
b) the number of times an ad is served
c) the number of https requests
d) the number of pages viewed

Ans: (a) the number of times an ad is clicked [CTR Click Through Rate]

Q.26) Which of the following is a passive attack?


a) Interruption b) Interception
c) Fabrication d) Modification

Ans: (b) Interception

Q.27) RSA
a) a business model b) an application protocol
c) an encryption algorithm d) none of these

Ans: (c) an encryption algorithm

Q.28) E-commerce is not suitable for


a) sale / purchase of expensive jewellery and antiques
b) sale / purchase of mobile phones
c) sale / purchase of branded clothes
d) online job searching

Ans: (a) sale / purchase of expensive jewellery and antiques

Q.29) Hubs are present in the network


a) to diagnose line failures, measure and manage traffic flow and simplify reconfiguring LANS
b) to interconnect the LAN with LANs
c) to interconnect the WANs with WANs
d) to interconnect the WANs with LANs

Ans: (a) to diagnose line failures, measure and manage traffic flow and simplify reconfiguring LANS

E-Business MCQ QB Page 5 of 6 Monojit Banerjee


Q.30) Firewalls operate by
a) using a proxy server during Internet access
b) isolating Intranet from Extranet
c) screening packets to/from the Network and provide controllable filtering of network traffic
d) none of these

Ans: (c) screening packets to/from the Network and provide controllable filtering of network traffic

Q.31) The mercantile process model consists of


a) the pre-purchase phase b) purchase consumption phase
c) post-purchase interaction phase d) all of these

Ans: (d) all of these

Q.32) E-business S/W is best defined as to manage


a) Internal administrative applications b) Buy-side applications
c) Sell-side applications d) All of these

Ans: (d) All of these

Q.33) The Internet layer of TCP/IP is responsible for


a) Placing packets on and receiving them from the network medium
b) Addressing, packaging and routing messages
c) Providing communication with the application by acknowledging and sequencing the packets to
and from the application
d) Providing a variety of application with the ability to access the services of the lower layers.

Ans: b) Addressing, packaging and routing messages

Q.34) SSL differs from SET in the fact that SET cannot provide
a) Authentication b) irrefutability
c) both (a) and (b) d) none of these

Ans: (d) none of these

E-Business MCQ QB Page 6 of 6 Monojit Banerjee

You might also like