Вы находитесь на странице: 1из 5


I. Multiple Choice Questions:-

1. The architecture of hardware, software, content and data is known as:

a. E-business web structure
b. E-business web structure
c. E-commerce infrastructure
d. E-business infrastructure
2. The level of e-business infrastructure which refers to information processed and displayed is:
a. Infrastructure
b. Application content
c. Processing
d. Storage/physical
3. The level of e-business infrastructure which refers to computation and logic is:
a. Processing
b. Application content
c. Storage/physical
d. Infrastructure
4. A service provider that manages the server used to host an organisation website and its connections to
the Internet backbones is known as:
a. Client server
b. Hosting provider
c. Internet service provide
d. All of the above
5. The website for a company is hosted on a:
a. Web client
b. Web server
c. Web infrastructure
d. Web page
6. The website content of a company is accessed by an end user through using:
a. Web e-mail
b. Web server
c. Web client/server
d. Web browser
7. The popular enabling home or business users access and web hosting services for the internet is referred
to as:
a. Online solutions providers
b. Internet solutions providers
c. Internet service providers
d. Application service providers
8. The likelihood of a poor response from a website can be reduced through:
a. Selecting high bandwidth connection
b. Selecting a dedicated server
c. Signing a service level agreement
d. Both the second and third answer above
9. The most common way of publishing information on the internet accessed through web browsers may
surprise some but it is known as :
a. Usenet newsgroups
b. Web application frameworks
c. Web application servers
d. World wide web
10. A private network within a company can be used to provide shared content for staff is known as
a. Open source
b. Extranet
c. Intranet
d. Internet
11. Which of the following could be seen as business of an extranet?
a. Cost reduction
b. Improved levels of customer service
c. Information sharing in secure environment
d. All the above
12. An API , which is a method of integrating different software or programs and used by companies such as
Google and Facebook stands for ?
a. Appliance programming interface
b. Application programming interface
c. Applied portable interface
d. All the above
13. Skype offers free calls or video-conferencing between internet connected computers and is an example of
a. Really simple syndication
b. Voice over IP
c. Instant Messaging
d. iPTV
14. Which of the following is an example of an embedded application
a. Google Apps
b. Facebook Apps
c. Twitter or RSS
d. Skype
15. XML which is used for exchanging data between different systems, stands for
a. Extensible microformat language
b. Extensible machine language
c. X-programming markup language
d. Extensible markup language
16. Which of the following could be accepted as a component of an e-business infrastructure?
a. E-business transport or network layer
b. E-business content and data layer
c. E-busines services application layer
d. All the above’
17. Where do local internet service provider come into the picture?
a. They provide home and business users with a connection to access the internet
b. They filter out erroneous data to avoid the internet slowing down
c. They relay messages to speed up transmission
d. They form part of a country’s infrastructure
18. How much percentage of the world’s population are using internet?
a. 19.9%
b. 22.2%
c. 30.2%
d. 18.5%
19. Which one of the following is not an advantage for a marketing intranet?
a. Reduced costs through higher productivity and saving on hard copy
b. Better customer service that is more responsive and personalized
c. Lengthened product life cycles
d. Distribution of information through remote offices nationally and globally
20. Which is not a business benefit of using and extranet?
a. Improved customer service
b. Greater order processing and product distribution
c. Significant cost increases
d. Information sharing in a secure environment
21. Which of the following are key questions to investigate when creating a new extranet?
a. Is the quality of the information adequate and up to date
b. Is it effective and efficacious
c. Will the levels of usage be sufficient to justify investment
d. All the above
22. What is the term used for specialized software to prevent unauthorized access to company data from
a. Middleware
b. Enterprise application integration
c. Firewall
d. Web analytics system
23. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari and Google Chrome examples of ?
a. Web servers
b. Web browsers
c. Web application servers
d. All the above
24. Which internet tool can be described as having the ability to blend real world digital data capture to
create a browser based digital representation or experience mimicking that of the real world?
a. Augmented reality
c. Podcasting
d. Voice over Internet Protocol
25. The body that regulates domain names is_______
b. The world wide web consortium
d. The internet society
26. While governments in many countries take certain views on internet access, there is a principle to provide
equal access to different internet services by telecommunications service providers. This is known as:
a. Net neutrality principle
b. Telecommunication information networking principle
c. Internet governance
d. Open source principle
27. The problems due to poor internet provision can be reduced through various actions such as:
a. Reducing costs through selecting a shared server
b. Having a dedicated server
c. Not being constrained by signing a service level agreement
d. All the above
28. Whatis C standsin CIA ofsmart card?
a. confidentiality
b. conference
c. congress
d. None ofthe above
29. Which is not a feature of e-comerce
a. SCM
b. EDI
c. WWW
d. BPR
30. Which of the smart card uses a sim like structure for reading and writing data?
a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. B&C

II Fill in the blanks:

1. CAN-Spam is the new anti spam bill.

2. Copyright is the legal protection afforded of expression of an idea, song or documents
3. Key logger software is a program when installed on a computer records every keystroke and mouse click.
4. E-cash/Digital cast is an electronic representation of cash.
5. Smart card is better protected than other cards using Encryption
6. Trust card is introduced by BSNL & itzcash
7. PaisaPay is offered only by eBay.in
8. The E-payment mechanism widely used in B2B is E-cheque
9. Credit card is also known as plastic money.
10. E-cheques are prepaid.
11. The presence of microchip make the smart card smart
12. Proximity smart card is read only.
13. CIA of smart card stands for Confidentiality Authenticity Integrity
14. Oxicash/PayMate/PayPass is the third party payment providers who offer digital wallets for E-merchants
15. MMID is used to identify mobile money
16. Secret key is used for private key cryptography
17. SSL/S-HTTP is a communication channel security protocol
18. The protocol which allows the file transfer between computers is FTP
19. VAN stands for value added network
20. EPS is the backbone of all E-payments in E-commerce
21. RSA/DES is an encryption technique
22. Hacking is a logical threat
23. An extranet uses the TCP/IP protocol
24. The internet with tunneling technology is known as Virtually private Network
25. The Intranet servers are protected by Firewall
26. Digital signature is used for the authentication of senders by applying public key cryptography in reverse
27. Decoding data that has been included is known as decryption
28. A set of rules that determine how two computers communicate with one another over a network is
called protocol
29. Cryptography is the process of encryption and decryption message
30. Digital certificates are issued by certificate authorities

III Short Answer Questions:

1. Define Internet
2. Define Protocol
3. Define Intranet
4. Define Extranet
5. List any three security issues in e-commerce
6. List any three tax issues in e-commerce
7. Define Encryption
8. List out the types of payment systems
9. List the legal issues in e-commerce
10. List the ethical issues in e-commerce