**--
E-COMMERCE --**
QUESTION
BANK
Q.1
Fill in The Blanks
1. E
– Commerce means selling and
buying products and services through web storefronts. (Mar-2010,11,14)
2. E – Commerce provides round to
clock business opportunities.(mar -2014)
3. E – Commerce is the paperless exchange of business information. (mar-2010,14)
4. E
– Commerce is an
application of technology towards the automation of business transaction.(
mar-2013,15)
5. Electronic market is the virtual representation of physical Market.(mar -2012,14)
6. Electronic market is the virtual representation of physical Market.(mar- 2010,14)
7. Airline booking system is an example of Electronic market.(mar – 2016,17)
8. In traditional commerce scope is local.(mar- 2010,12)
9. In traditional commerce marketing focus is product oriented.(mar- 2017)
10. The scope of
the e-commerce is global.(mar
- 2010)
11. The scope of traditional commerce is local.(mar -2010,12)
12. Warrantee, services etc. are aftersales activities.(mar -2010,12,14,15)
13. Aftersales phase of trade cycle deals service and
warrantee.(mar – 2016,17)
14. Search and
Negotiate are pre-sale phases/stages of trade cycle.(mar – 2011,12)
15. Search and Negotiate are the phases /stages of pre-sale in
trade cycle.(mar – 2015,16)
16. Digital
signature is used to
authenticate the identity of the sender of the electronic document. (mar -
2011)
17. In business to consumer odel, business and consumer are involved.(mar
-2011,14)
18. Firewall is a barrier between two networks.(mar – 2010,17)
19. Decryption
technique is used to
decode the data.(mar- 2010)
20. To change the original data into secrete code encryption technique is used.(mar -2010,11)
21. Conversion of data into cipher text is called as encryption (mar -2010,11)
22. Conversion of data into code is called as encryption (mar -2010,11 )
23. The final use of Internet commerce is for after sales services.(mar - 2011)
24. Internet
Commerce type of E-commerce is
mapped with all the phases of trade cycle.(mar – 2011,13,14,16 )
25. Internet
Commerce can be used for
advertising goods and services and transaction once off deal.(mar – 2012,14,17)
26. In e – commerce product attributes are selected by buyer.(mar - 2010)
27. In e-commerce trade cycle, irregular transaction in
once-off trading relationship where execution and settlement are typically combined
are known as cash transaction (mar
-2010,14,15,16,17)
28. A Trade
cycle is a series of exchanges between a customer and supplier during
execution of commercial exchange.(mar – 2010,12,14)
29. Trade
cycle means business process
starting from finding product till warrantee and services.( mar -2011,12,14)
30. In e-commerce trade cycle, irregular transactions between
commercial trading partners where execution and settlement are separated, is
called as credit transactions.
(mar- 2010,11,14)
31. Irregular transactions in once-off trading
relationship where execution and settlement are typically combined is called as
cash trade cycle.(mar- 2013)
32. B2B stands for Business-to-Business.(mar
2016,17)
33. C2C stands for Consumer-to-Consumer.(mar
-2017)
34. C2B stands for Consumer-to-Business.(mar-
2017)
35. The C2C
model facilities the online transaction of goods and service between two
people.(mar - 2014)
36. E-bay site is an example of C2C type of model of e-commerce.(mar -20165,17)
37. Aamazan.com, Flipcart are examples for Business to Consumer model in E-commerce
.(mar- 2015,16,17)
38. Two methods used for internet security are encryption
and decryption. (mar
-2010,12)
39. E-Market stands for Electronic Market (mar- 2010)
40. E-Market
is common place for worldwide buyers and
sellers.(mar - 2010)
41. The principal
function of E-Market type of
E-commerce is to facilitate the search for the required product or service.(mar
-2016,17)
42. Decryption is the process of changing unintelligible data into
intelligible data. (mar- 2014)
43. In encryption process plain text is converted into
random text called as cipher
text.(mar -2010,14,15,17)
44. The text converted from plain text into random text
is called cipher text (mar -
2015)
45. Cipher
text is unreadable to human
in encryption.(mar – 2013,14,15)
46. Access
control is used to provide
access to authorized users.( mar -2010)
47. EDI is a paperless
technology of E-commerce.(mar-2014)
48. EDI is commonly applied to execution and settlement phase of trade
cycle.(mar 2012,15)
49. Full form of EDI I is Electronic Data Interchanges.(mar- 2010,11,14,15,16,17)
50. The important aspects of EDI are security and privacy.(mar -2015)
51. EDI is mapped with settlement and execution phase of trade cycle.(mar –
2011,14,16)
52. EDI is mapped with settlement and execution phase of trade
cycle.(mar -2016-17)
53. Supermarket is an example of EDI scope or type of E-Commerce.(mar- 2015,17)
54. EDI is an alternative to paper based method of
communication and storage of information.(mar -2010)
55. EDI provides efficient transaction of recurrent trade
exchange between commercial organization.(mar -2010,13,14)
56. Online trading and auctions are called as electronic market.(mar-
2010,14,16,17)
57. Pre-sale: is a search phase of trade cycle.(mar -2010,12)
58. Execution
phase of trade cycle
helps the user to place order.(mar - 2014)
59. E-Commerce
expands the business
and creates new markets.(mar- 2011,14)
60. Ship
order is the last stage in
the business process of trade cycle to send the product to the customer.
61. E-market can be mapped with Pre sale phase of trade cycle.(mar - 2011)
62. EPS stands for Electronic
Procurement System (mar- 2010)
63. Cryptography consists of encryption and decryption process.(mar
-2010)
64. C2B stand for Consumer to Business.(mar -2010)
65. Online selling and buying means E-commerce. (mar-2010,14)
66. E-commerce includes two types of taxes such as state
tax and local tax.(mar-2010,12,14)
67. Password is unique word which protects unauthorized
access.(m-2010)
68. Execution
/Settlement phase of trade
cycle consists of taking delivery and making payment of goods.(mar - 2010)
69. Encryption
means a conversion of
intelligent data into apparently random text.(mar -2010,11,14)
70. The control of access by user is referred as authentication .
No comments:
Post a Comment