Sunday, September 25, 2016

Top 100 Interview Questions On E-Commerce Part-3



Which of the following is not one of the benefits of B2B e-commerce except.
A. Reduced amount of 'first-mover' advantages.
B. Decreased product cycle time
C. Increased opportunities for collaborating with suppliers and distributes.
D. Increased production flexibility

2) The development of ........... has been more evolutionary than revolutionary
A. consumer focused e-commerce
B. B2C e-commerce
C. the dot coms
D. intra business e-commerce 

3) The two main types of Internet based B2B commerce are 
A. Net Marketplaces and Private Industrial Networks
B. EDI and Collaborative Commerce 
C. Net Marketplaces and collaborative commerce 
D. EDI and Private Industrial Networks

4) ....... is the act of modifying a product or service to fit a given user's requirements, is a possible e-commerce source of sustainable competitive advantage. 
A. specialization
B. customization
C. targeting 
D. tuning

5) Electronic Data Interchange is necessary in 
A. B2C e-commerce 
B. C2C e-commerce
C. B2B e-commerce
D. Commerce using internet 

6) Achieving marketing objectives through the use of any electronic communication technology refers to 
A. E-business 
B. E-commerce
C. E-marketing
D. Internet Marketing

7) Consumer interaction is the essence of consumer focused(B2C) e-commerce, is the front end to ......
A. the value chain (intra business e-commerce)
B. the supply chain (B2B e-commerce)
C. none of the above
D. both a and b 

8) Security in E-Commerce means 
i) Protecting an organization's data resource from unauthorized access
ii) Preventing disasters from happening 
iii) Authenticating messages received by an organization 
iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations.
A. i and ii
B. ii and iii
C. iii and iv 
D. i, iii and iv

9) What does EDI stand for? 
A. Electronic Data Interface
B. E-Commerce Data Interface
C. Electronic Data Interaction
D. Electronic Data Interchange 

10) When Wal-Mart uses the Internet to purchase inventory items from a vendor company, it is using the ....... e-commerce model. 
A. C2C
B. B2B 
C. B2E
D. B2C

11) The acronym DES stands for 
A. Digital Evaluation System
B. Digital Encryption Standard
C. Digital Encryption System
D. Double Encryption Standard 

12) In the E-Commerce security environment, which of the following constitutes the inner-most layer?
A. People
B. Data
C. Technology solutions
D. Organizational policies and procedures

13) An example of B2C is ....
A. a law firm buying computer software for employees
B. Wal-Mart buying pet food directly from the manufacturer
C. a student buying a T-shirt form the Amazon website
D. a university buying desks from a manufacturer

14) The European Union's ........... establishes a high level of legal protection for the privacy individuals and personal data. 
A. Health Insurance Portability and Accountability Act
B. National Infrastructure Protection Center
C. Data Protection Directive 
D. Code of Ethics

15) Which of the following describes E-Commerce? 
A. Buying products from each other 
B. Buying services from each other 
C. Selling services from each other 
D. All of the above 

16) When ordering a new computer from Dell's website, the individual in initiating a(n) ......... transaction on the internet. 
A. B2C
B. C2C
C. B2B
D. B2E

17) The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as 
A. Digital rights management
B. Digital protection schemes
C. Digital distribution regulation
D. Digital rights protection 

18) A code of ethics should address all of the following EXCEPT for 
A. policy and privacy
B. permission to record personal information
C. intended use of recorded personal information
D. scalability

19) A technique used to gain personal information for the purpose of identity theft, often by e-mail is called? 
A. Phishing 
B. Carding 
C. Brand spoofing
D. All of the above 

20) ...... are used by consumers to locate the best price for a desired product.
A. Shopping bots
B. Search engines 
C. Middle-ware routines 
D. Worms 



1) A. Reduced amount of 'first-mover' advantages
2) D. intra business e-commerce 
3) D. EDI and Private Industrial Networks
4) B. customization
5) C. B2B e-commerce
6) C. E-marketing
7) D. both a and b  
8) D. i, iii and iv
9) D. Electronic Data Interchange 
10) B. B2B 
11) B. Digital Encryption Standard
12) B. Data
13) C. a student buying a T-shirt form the Amazon website
14) C. Data Protection Directive 
15) D. All of the above 
16) A. B2C
17) A. Digital rights management
18) D. scalability
19) D. All of the above
20) A. Shopping bots

Top 100 Interview Questions On E-Commerce Part-5

B. Information accuracy
C. Information focus
D. Information design/structure

2) Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner? 
A. impression rate 
B. view-through rate 
C. click-through rate
D. stickiness ratio 

3) Certification of Digital signature by an independent authority is needed because 
A. it is safe 
B. it gives confidence to a business
C. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership.
D. private key claimed by a sender may not be actually his

4) Which of the following is the best advantage of e-books? 
A. Reduced transaction costs for the user
B. Requirement of expensive devices to use
C. Portability compared to print books 
D. Copyright management 

5) Which of the following is not a primary function of a portal? 
A. navigation of the web
B. social networking 
C. commerce 
D. content 

6) In electronic cheque payments developed, it is assumed that most of the transactions will be ....
A. customers to customers
B. customers to business 
C. business to business 
D. banks to banks 

7) .......... are used by consumers to locate the best price for a desired product.
A. Shopping bots
B. Search engines 
C. Middle-ware routines 
D. Worms

8) A ......... network is an extranet with poor security that is relatively inexpensive to set up and maintain.
A. public
B. secure private
C. virtual private 
D. Internet virtual private 

9) Which of the following best describes predicted growth in C2C and B2C auction spending?
A. B2C spending will overtake C2C spending
B. Both type of spending will increase 
C. C2C spending will decrease while B2C increases
D. Both types of spending will decline at similar rates.

10) An electronic check is one form of what?
A. E-commerce 
B. Online banking 
C. E-cash 
D. Check 

11) While shopping online, ............ are used to keep track of what the customer has placed in the shopping cart. 
A. spiders 
B. cookies 
C. registers
D. proxy servers

12) What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? 
A. Risk management 
B. Risk assessment 
C. Security 
D. None of the above 

 13) A secure private network physically attaches intranets to an extranet through
A. coaxial cables 
B. fiber optics 
C. private leased phone lines
D. microwave and wireless transmissions

14) Which of the following statements about privacy is true?
A. It is a normal right to be left alone
B. Only corporations and government need to be concerned about it. 
C. It has only just recently become a concern.
D. It is most easily obtained on the Internet. 

15) What is the unauthorized use, duplication, distribution or sale of copyrighted software? 
A. Accessed software
B. Pirated software
C. Counterfeit software
D. Privacy 

16) An e-business that allows consumer to name their own price for produces and services is following which e-business model? 
A. B2B
B. B2G
C. C2C
D. C2B 

17) E-business can be defined as .....
A. the uninhibited flow of information and goods on the web.
B. the use of the Internet and the web to transact business. 
C. digitally enabled transactions and processes within an organization. 
D. commercial transactions involving electronic goods. 

18) The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ..........
A. hardware platform 
B. content platform
C. transaction platform 
D. scalability platform 

19) Advantages of B2C commerce to customers are 
i) wide variety of goods can be accessed and comparative prices can be found 
ii) shopping can be done at any time 
iii) privacy of transactions can be guaranteed 
iv) security of transactions can be guaranteed 
A. i and ii 
B. ii and iii
C. iii and iv 
D. i and iv 

20) The process of getting customers to pass along a company's marketing messaged to friends, family and colleagues is known as .....
A. affiliate marketing 
B. viral marketing 
C. permission marketing 
D. blog marketing 


1) B. Information accuracy
2) C. click-through rate
3) C. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership.
4) A. Reduced transaction costs for the user
5) B. social networking 
6) C. business to business 
7) A. Shopping bots
8) A. public
9) B. Both type of spending will increase 
10) B. Online banking 
11) B. cookies 
12) A. Risk management
13) C. private leased phone lines
14) A. It is a normal right to be left alone
15) B. Pirated software
16) D. C2B 
17) C. digitally enabled transactions and processes within an organization.
18) A. hardware platform 
19) A. i and ii 
20) B. viral marketin

Solved MCQ Questions On E-Commerce Set-3

1) Which products are people most likely to be more uncomfortable buying on the Internet? 
A. Books 
B. Furniture 
C. Movies 
D. All of the above 

2) Encryption can be done 
A. only on textual data 
B. only on ASCII coded data
C. on any bit string 
D. only on mnemonic data 

3) Which term represents a count of the number of people who visit one site, click on the ad, and are taken to the site of the advertiser? 
A. Affiliate programs 
B. Click-through
C. Spam
D. All of the above 

4) EDI standard 
A. is not easily available 
B. defines several hundred transaction sets for various business forms 
C. is not popular 
D. defines only a transmission protocol 

5) What encourages users of a product or service supplied by a B2C company to ask friends to join in as well? 
A. Spam
B. Viral marketing 
C. Affiliate programs 
D. None of the above 

6) In B2B e-commerce 
i) Co-operating Business should give an EDI standard to be used 
ii) Programs must be developed to translate EDI forms to a form accepted by application program 
iii) Method of transmitting/receiving data should be mutually agreed 
iv) It is essential to use internet 
A. i and ii
B. i, ii and iii
C. i, ii, iii and iv 
D. ii, iii and iv 

7) Compared to B2C e-commerce, B2B e-commerce is .......
A. of equal size 
B. slightly smaller
C. slightly larger 
D. much larger 

8) All of the following are techniques B2C e-commerce companies use to attract customers, except
A. Registering with search engines 
B. Viral marketing
C. Online Ads
D. Virtual marketing 

9) A hashing function for digital signature 
i) must give a hashed message which is shorter than the original message 
ii) must be hardware implementable 
iii) two different messages should not give the same hashed message 
iv) is not essential for implementing digital signature 
A. i and ii
B. ii and iii
C. i and iii
D. iii and iv 

10) In the e-commerce security environment, which of the following constitutes the inner-most layer? 
A. people 
B. data 
C. technology solutions
D. organizational policies and procedures 
11) The digital product delivery internet business model 
A. concentrates information about products and services from multiple providers at one central point.
B. provides an electronic clearinghouse for products where price and availability are constantly changing, sometimes in response to customer actions. 
C. enables groups of people who want to purchase a particular product to signup and then seek a volume discount from vendors.
D. sells and delivers software, multimedia, and other digital products over the internet. 

12) In Electronic cash payment 
A. a debit card payment system is used 
B. a customer buys several electronic coins which are digitally signed by coin issuing bank 
C. a credit card payment system is used 
D. RSA cryptography is used in the transactions 

13) All of the following are metrics for e-mail campaigns except.....
A. open rate 
B. delivery rate
C. bounce-back rate
D. cart conversion rate 

14) All of the following are advantages of using an intranet Except
A. cross-platform capability
B. security restrictions so employees cannot access the company network from home
C. open standards 
D. reduced hardware and software costs 

15) A person to person payment system 
A. supports electronic payment for on-line and physical store purchases of goods or services after the purchase has takes place.
B. Sends money using the web to individuals who are not setup to accept credit card payments
C. refers to digital currency that can be used for micro-payments
D. provides secure services for credit card payments on the internet 

16) What is the name of the card which can be used by the buyers during the time of purchase and in which the amount will be immediately debited from the buyers account?
A. E-Distributor
B. Debit Card
C. Credit Card
D. Power Card 

17) Which of the following is not considered to be a drawback of Internet auctions? 
A. market inefficiency
B. trust risks
C. fulfillment costs 
D. delayed consumption costs 

18) Internet virtual private networks are preferred over extra-nets for all of the following reasons Except. 
A. data can be encapsulated 
B. communications are kept private 
C. good security
D. use of inexpensive leased phone lines  

19) Set of independent Electronic Stores can be generally labeled as 
A. Electronic Shopping Mall 
B. Electronic Wallet 
C. Electronic Stores
D. Generalized Stores 

20) The two main types of Internet based B2B commerce are......
A. Net marketplaces and private industrial networks 
B. EDI and collaborative commerce 
C. Net marketplaces and collaborative commerce 
D. EDI and private industrial networks 


1) B. Furniture 
2) C. on any bit string 
3) B. Click-through
4) B. defines several hundred transaction sets for various business forms 
5) B. Viral marketing
6) B. i, ii and iii
7) D. much larger
8) D. Virtual marketing 
9) C. i and iii
10) B. data
11) D. sells and delivers software, multimedia, and other digital products over the internet. 
12) B. a customer buys several electronic coins which are digitally signed by coin issuing bank 
13) D. cart conversion rate 
14) B. security restrictions so employees cannot access the company network from home
15) B. Sends money using the web to individuals who are not setup to accept credit card payments
16) B. Debit Card
17) A. market inefficiency
18) D. use of inexpensive leased phone lines
19) A. Electronic Shopping Mall
20) D. EDI and private industrial networks

1) ........... include legacy event types such as "mousedown", "mousemove", "mouseup", "keydown", "keypress","keyup","touchmove" and "gesturechange" events. A. Device dependent input events B. Device independent input events C. User interface events D. State change events 2) ............ are not triggered directly by user activity, but by network or browser activity, and indicate some kind of lifecycle. A. Device dependent input events B. Device independent input events C. User interface events D. State change events 3) ............ include the focus event, the change event when the user changes the value and the submit event when the user clicks a submit button. A. Device dependent input events B. Device independent input events C. User interface events D. State change events 4) ........... allows the same event handler function to be registered more than once. When an event of the specified type occurs, the registered function will be invoked as many times as it was registered. A. addEvent() B. addMultipltEvent() C. attachEvent() D. reattachEvent() 5) Which of the following statements about the arguments of addEventListener() is/are True. i) The first argument to addEventListener() is the event type for which the handler is being registered. ii) The second argument to addEventListener() is the function that should be invoked when the specified type of event occurs. iii) The third argument to addEventListener() is a numerical value. A. i and ii only B. i and iii only C. ii and iii only D. All i, ii and iii 6) When an event occurs on an object, all of the handlers registered for that type of event are invoked, in the order in which they were ......... A. occurred B. registered C. invoked D. initialized 7) Invoking .......... more than once on the same object with the same arguments has no effect, the handler function remains registered only once, and repeated invocation does not alter the order in which handlers are invoked. A. addEvent() B. addMultipltEvent() C. attachEvent() D. addEventListener() 8) State which of the following statements are True or False about the rules of invocation order for event handler in JavaScript. i) Handlers registered by setting an object property of HTML attribute, if any are always invoked first. ii) Handlers registered with addEventListner() are invoked in the order in which they were registered. iii) Handlers registered with attachEvent() may be invoked in any order and the code should not depend on sequential invocation. A. i-True, ii-True, iii-False B. i-True, ii-False, iii-False C. i-True, ii-True, iii-True D. i-False, ii-False, iii-True 9) .......... is universally supported also it works in all browsers including IE, and works for all handlers, regardless of how they are registered. A. Event bubbling B. Event handling C. Event capturing D. Event registering 10) ............, only works with event handlers registered with addEventListner() when the third argument is True. A. Event bubbling B. Event handling C. Event capturing D. Event registering 11) In browsers that support addEventListner(), we can also cancel the default action for an event by invoking the ........... method of the event object. A. preventBrowsers() B. preventDefault() C. preventPropagation() D. preventEvent() 12) The .............. event is fired when the document has been loaded and parsed and any deferred scripts have been executed. A. DOMContent() B. DOMContentLoad() C. DOMLoaded() D. DOMContentLoaded() 13) .......... is a user interface for transferring data between a "drag source" and "drop target" that may be in the same application or in different applications. A. Drag-and-drop B. User-drag-and-drop C. Drag source-and-drop target D. Source-drag-and-drop-target 14) Which of the following statements are True about the APIs for Implementing Drag-and-drop. i) They have to tie into the underlying OS so that they can work between unrelated applications. ii) They must provide a way for a drag source to specify the icon or image to be dragged. iii) They must provide event-based notification to both the drag source and drop target of the progress of the Drag-and-drop interaction. A. i and ii only B. i and iii only C. ii and iii only D. All i, ii and iii 15) ......... objects have altKey, ctrlKey, metaKey and shiftKey properties, which are set to True if the corresponding modifier key is held down when the event occurs. A. Key down B. Key event C. Key up D. Key press Answers 1) A. Device dependent input events 2) D. State change events 3) C. User interface events 4) C. attachEvent() 5) A. i and ii only 6) B. registered 7) D. addEventListener() 8) C. i-True, ii-True, iii-True 9) A. Event bubbling 10) C. Event capturing 11) B. preventDefault() 12) D. DOMContentLoaded() 13) A. Drag-and-drop 14) D. All i, ii and iii 15) B. Key event Related Posts: Solved MCQ of JavaScript set-1 MCQ of JavaScript with Answer set-2 Solved MCQ on Basic Client Side JavaScript set-3 Solved MCQ on JavaScript Window Object set-4 Solved MCQ on Scripting Documents in JavaScript set-5 MCQ on Scripting Documents in Client Side JavaScript set-6 MCQ on Scripting Documents in Client Side JavaScript set-7 Solved Objective Questions of CSS set-4 Solved MCQ of Java Set-1

1) ........... include legacy event types such as "mousedown", "mousemove", "mouseup", "keydown", "keypress","keyup","touchmove" and "gesturechange" events.

A. Device dependent input events

B. Device independent input events

C. User interface events

D. State change events


2) ............ are not triggered directly by user activity, but by network or browser activity, and indicate some kind of lifecycle.

A. Device dependent input events

B. Device independent input events

C. User interface events

D. State change events


3) ............ include the focus event, the change event when the user changes the value and the submit event when the user clicks a submit button.

A. Device dependent input events

B. Device independent input events

C. User interface events

D. State change events


4) ........... allows the same event handler function to be registered more than once. When an event of the specified type occurs, the registered function will be invoked as many times as it was registered.

A. addEvent()

B. addMultipltEvent()

C. attachEvent()

D. reattachEvent()


5) Which of the following statements about the arguments of addEventListener() is/are True.

i) The first argument to addEventListener() is the event type for which the handler is being registered.

ii) The second argument to addEventListener() is the function that should be invoked when the specified type of event occurs.

iii) The third argument to addEventListener() is a numerical value.

A. i and ii only

B. i and iii only

C. ii and iii only

D. All i, ii and iii



6) When an event occurs on an object, all of the handlers registered for that type of event are invoked, in the order in which they were .........

A. occurred

B. registered

C. invoked

D. initialized


7) Invoking .......... more than once on the same object with the same arguments has no effect, the handler function remains registered only once, and repeated invocation does not alter the order in which handlers are invoked.

A. addEvent()

B. addMultipltEvent()

C. attachEvent()

D. addEventListener()


8) State which of the following statements are True or False about the rules of invocation order for event handler in JavaScript.

i) Handlers registered by setting an object property of HTML attribute, if any are always invoked first.

ii) Handlers registered with addEventListner() are invoked in the order in which they were registered.

iii) Handlers registered with attachEvent() may be invoked in any order and the code should not depend on sequential invocation.

A. i-True, ii-True, iii-False

B. i-True, ii-False, iii-False

C. i-True, ii-True, iii-True

D. i-False, ii-False, iii-True


9) .......... is universally supported also it works in all browsers including IE, and works for all handlers, regardless of how they are registered.

A. Event bubbling

B. Event handling

C. Event capturing

D. Event registering


10) ............, only works with event handlers registered with addEventListner() when the third argument is True.

A. Event bubbling

B. Event handling

C. Event capturing

D. Event registering



11) In browsers that support addEventListner(), we can also cancel the default action for an event by invoking the ........... method of the event object.

A. preventBrowsers()

B. preventDefault()

C. preventPropagation()

D. preventEvent()


12) The .............. event is fired when the document has been loaded and parsed and any deferred scripts have been executed.

A. DOMContent()

B. DOMContentLoad()

C. DOMLoaded()

D. DOMContentLoaded()


13) .......... is a user interface for transferring data between a "drag source" and "drop target" that may be in the same application or in different applications.

A. Drag-and-drop

B. User-drag-and-drop

C. Drag source-and-drop target

D. Source-drag-and-drop-target


14) Which of the following statements are True about the APIs for Implementing Drag-and-drop.

i) They have to tie into the underlying OS so that they can work between unrelated applications.

ii) They must provide a way for a drag source to specify the icon or image to be dragged.

iii) They must provide event-based notification to both the drag source and drop target of the progress of the Drag-and-drop interaction.

A. i and ii only

B. i and iii only

C. ii and iii only

D. All i, ii and iii


15) ......... objects have altKey, ctrlKey, metaKey and shiftKey properties, which are set to True if the corresponding modifier key is held down when the event occurs.

A. Key down

B. Key event

C. Key up

D. Key press

Answers


1) A. Device dependent input events
2) D. State change events
3) C. User interface events
4) C. attachEvent()
5) A. i and ii only
6) B. registered
7) D. addEventListener()
8) C. i-True, ii-True, iii-True
9) A. Event bubbling
10) C. Event capturing
11) B. preventDefault()
12) D. DOMContentLoaded()
13) A. Drag-and-drop
14) D. All i, ii and iii
15) B. Key event

Related Posts:

  • Solved MCQ of JavaScript set-1

  • MCQ of JavaScript with Answer set-2

  • Solved MCQ on Basic Client Side JavaScript set-3

  • Solved MCQ on JavaScript Window Object set-4

  • Solved MCQ on Scripting Documents in JavaScript set-5

  • MCQ on Scripting Documents in Client Side JavaScript set-6

  • MCQ on Scripting Documents in Client Side JavaScript set-7

  • Solved Objective Questions of CSS set-4

  • Solved MCQ of Java Set-1