Top 550+ Solved E-Commerce MCQ Questions Answer
Q. What is the name given to an interactive business providing a centralisedmarket where many buyers and suppliers can come together for ecommerce or commerce-related activities?
a. Direct marketplace
b. B2B
c. B2C
d. Electronic marketplace
Q. Which form of e-marketplace brings together buyers and sellers frommultiple industries, often for MRO materials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Q. Which form of e-marketplace brings together buyers and sellers from thesame industry?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Q. Which, if any, of the following types of ads are people most willing totolerate?
a. pop-under ad
b. pop-up ad
c. banner ad
d. none of the above
Q. Which of the following is an Internet-based company that makes it easyfor one person to pay another over the Internet?
a. electronic check
b. electronic bill presentment and payment
c. conversion rates
d. financial cybermediary
Q. Which of the following is a method of transferring money from onepersons account to another?
a. electronic check
b. credit card
c. e-transfer
d. none of the above
Q. If you need to transfer money to another person via the internet, which ofthe following methods could you use?
a. financial cybermediary
b. electronic check
c. electronic bill presentment and payment
d. all of the above
Q. Which of the following permits the transmission of a bill, along withpayment of that bill, to be conducted over the Internet?
a. financial cybermediary
b. electronic check
c. electronic bill presentment and payment
d. all of the above
Q. A combination of software and information designed to provide securityand information for payment is called a?
a. digital wallet
b. pop up ad
c. shopping cart
d. encryption
Q. What is the name for direct computer-to-computer transfer of transactioninformation contained in standard business documents?
a. internet commerce
b. e-commerce
c. transaction information transfer
d. electronic data interchange
Q. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.
a. encryption, decryption
b. private, public
c. encryption, public
d. public, private
Q. When a transaction is processed online, how can the merchant verify thecustomers identity?
a. use secure sockets layers
b. use secure electronic transactions
c. use electronic data interchange
d. use financial electronic data interchange
Q. The practice of forging a return address on an e-mail so that the recipientis fooled into revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Q. What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client