MCQs - Chapter 4
Chapter 4 - E-Commerce, M-Commerce and Emerging Technologies
(1)Identify
the one which is not an Operating system:
(a) Google Android OS
(b) Microsoft Windows OS
(c)
Microsoft Surface OS
(2)Which of the following is not an advantage of E-Commerce?
(a) E-commerce saves time
(b) Delivers goods instantly
(c) Accessible 24/7
(3)Who developed Unified Payment Interface (UPI)?
(a) National Payment Corporation of India
(b) Reserve Bank
(c) Ministry of Finance
(4)Which of the following is not
a prerequisite for doing m-commerce transaction?
(a) An Internet Connection
(b) A handheld Device capable of
connecting to vendor’s web server
(c) Vendor’s Mobile/Web
Application
(d) A registered account with Vendor
(5)What does SSL stands for?
(a) Secure Socket Layer
(b) Standard Security Layer
(c) Security Standard Layer
(d) Socket Security Level
Click here for answer
(6) Which of the following s an interface that allows user to interact with the e-commerce / m-commerce vendor in two tier architecture?
(6) Which of the following s an interface that allows user to interact with the e-commerce / m-commerce vendor in two tier architecture?
(a)
Presentation Tier
(b) Database Tier
(c) Physical Tier
(d) Application Tier
(7) What does DBMS stands for?
(a) Database Migration System
(b) Database Management
System
(c) Data and Business Management System
(d) Data Backup Management System
(8) Dynamic Load Balancing is possible in which of the following
architecture?
(a) Two Tier Architecture
(b) Three Tier
Architecture
(c) Single Tier Architecture
(9)Which of the following layer allows customer to check details of a
particular product?
(a) Presentation Layer
(b) Application
Layer
(c) Database Layer
(d) Desktop Layer
(10)What is the benefit of architecture with business logic and databases are physically close?
(a) High Flexibility
(b) Dynamic Load Balancing
(c) High System
Performance
(d) Faster Change Management
Click here for answer
(11) Which of following online payment method does not involve card processing?
(11) Which of following online payment method does not involve card processing?
(a) Credit Card Payment
(b) Debit Card Payment
(c)
Netbanking Payment
(d) Forex Card Payment
Click here for answer
(12) Which of the following is not a card issuing brand?
(12) Which of the following is not a card issuing brand?
(a) VISA
(b) Master Card
(c) Rupay
(d)
SBI Card
Click here for answer
(13) _______ is the payment facilitator through which customers shall make payments for their purchases?
(13) _______ is the payment facilitator through which customers shall make payments for their purchases?
(a)
Payment Gateway
(b) Payment Hub
(c) Payment Agent
(d) Payment Merchant
Click here for answer
(14) Which of the following is not an acceptable payment method for e-commerce transaction?
(14) Which of the following is not an acceptable payment method for e-commerce transaction?
(a) Netbanking Payment
(b)
Cheque Payment
(c) Cash on Delivery Payment
(d) Credit Card Payment
Click here for answer
(15) What does OTP stand for?
(15) What does OTP stand for?
(a) One Time Payment
(b) One Time Phrase
(c)
One Time Password
(d) One Term Payment
Click here for answer
(16)Which of the following is not a Cyber threats for the vendor?
(16)Which of the following is not a Cyber threats for the vendor?
(a) Unprotected Online Transactions
(b)
Theft of goods in Transit
(c) Phishing Attack
(d) Theft of PII
Click here for answer
(17)Which of the following principle is most secure for grating user access to application data?
(17)Which of the following principle is most secure for grating user access to application data?
(a) Maximum Privilege Principle
(b)
Need to Know Principle
(c) Access for All Principle
(d) Authority Based Access Principle
Click here for answer
(18)Which of the following is most useful control for addressing hacking threat for the company?
(18)Which of the following is most useful control for addressing hacking threat for the company?
(a) Reconciliation of Transactions
(b) Customer Awareness
(c)
Employee Training and Awareness
(d) E-Commerce Return Policy
Click here for answer
(19)Which
of the following control is most useful in reducing risk of Intrusion?
(a)
Regular Software Updates
(b) 24*7 monitoring Control
(c) Policies and Procedures
(d) Change Management Control
Click here for answer
(20)Which
of the following policy need not be communicated by merchant to his customers?
(a) Return Policy
(b) Privacy Policy
(c) Shopping and Billing Policy
(d)
Information Security Policy
Click here for answer
(21)
Which of the following regulator issues guidelines for Online Payment
processing by merchants?
(a)
Reserve Bank of India (RBI)
(b) Competition Comptroller of India
(CCI)
(c) Security Exchange Board of India
(SEBI)
(d) Telecom Regulation Authority of
India (TRAI)
Click here for answer
(22) Why the provisions of Indian Contract Act are applicable to E-commerce?
(a) Indian Contract Act deals with
digital records
(b) Online Payment Regulations are
defined in Indian Contract Act
(c)
E-commerce transaction is a contract between buyer and seller
(d) All of the above
Click here for answer
(23) What is full form of FEMA?
(23) What is full form of FEMA?
(a) Foreign Exchange Monitoring Act
(b)
Foreign Exchange Management Act
(c) Foreign Export Managerial Act
Click here for answer
(24) Which of following law is primarily governing electronic commerce in India?
(24) Which of following law is primarily governing electronic commerce in India?
(a) The Indian Contract Act (1872)
(b) Income Tax Act (1961)
(c) Goods & Services Act (2017)
(d)
Information Technology Act (2000)
Click here for answer
(25)
Which of the following law addresses customer litigations in e-commerce
transactions?
(a) The Competition Act 2002
(b)
Consumer Protection Act 1986
(c) The Indian Contract Act (1872)
(d) Information Technology Act (2000)
Click here for answer
(26)What is the full for of UPI?
(a) Union Payment Interface
(b) Unified Paid Interface
(c)
Unified Payment Interface
(d) Unified Payment Interaction
Click here for answer
(27) Which of the following is BHIM (Bharat Interface for Money) an example of?
(27) Which of the following is BHIM (Bharat Interface for Money) an example of?
(a) Mobile Device Manager
(b) Mobile Hardware Manager
(c) Mobile Operating System
(d)
Mobile Wallet
Click here for answer
(28) What is full form of AEPS?
(28) What is full form of AEPS?
(a) Aadhaar Encrypted Payment Station
(b) Aadhaar Encrypted Paid Service
(c)
Aadhaar Enabled Payment Service
(d) Aadhaar Enterprise Payment Service
Click here for answer
(29)Which of the following is a risk when using digital payment?
(29)Which of the following is a risk when using digital payment?
(a)
Data Theft
(b) Stealing of Cash
(c) Delay in Payment Processing
(d) Difficult to trace record
Click here for answer
(30) Which of the following uses Unified Payment Interface for payment processing?
(30) Which of the following uses Unified Payment Interface for payment processing?
(a) Internet Banking
(b)
BHIM Application
(c) Credit Card
(d) Mobile Banking
Click here for answer
(31) Identify the one which is not a best practice under Green Computing:
(31) Identify the one which is not a best practice under Green Computing:
(a) E-waste disposal as per regulations.
(b) Buying electronic items on
environmental attributes
(c) Switching off electronic devices
during extended periods of inactivity
(d)
Use Cathode Ray Tube (CRT) monitors than Liquid Crystal Display (LCD) monitors
Click here for answer
(32) What is full form of GSM stands?
(32) What is full form of GSM stands?
(a) Good Service for Mobile
Communication
(b)
Global System for Mobile Communication
(c) Global Service for Mobile
Communication
(d) Global System for Mobile
Codification
Click here for answer
(33) Which of the following is the correct sequence of Mobile Computing?
(i)Entering the data using the
application on handheld computing device
(ii)Both
systems (handheld and
site’s computer) have
the same information and are in
sync
(iii)The process work the same way
starting from the other direction
(iv)Using one of several connecting
technologies, the new data are transmitted from handheld to site’s information
system where files are updated and the new data are accessible to other system
user
(a) (i), (ii), (iii), (iv)
(b) (iv), (iii), (ii), (i)
(c) (i), (ii), (iv), (iii)
(d)
(i), (iv), (ii), (iii)
Click here for answer
(34)Identify
one of the following instance of SaaS which allows users to explore
functionality of Web services such as Google Maps, Payroll processing, and
credit card processing services etc.?
(a) Security as a Service (SECaaS)
(b) Communication as a Service (CaaS)
(c) Data as a Service (DaaS)
(d)
API as a Service (APIaaS)
Click here for answer
(35)Which of the following is not a subset of Infrastructure as a Service (IaaS) module?
(a)
Software as a Service (SaaS)
(b) Network as a Service (NaaS)
(c) Storage as a Service (STaaS)
(d) Desktop as a Service (DTaaS)
Click here for answer