E – Business and Trade (CSIT723)-Semester III
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes
1st Module Assessment
Which is not the application area of e-commerce?
a.
E-Learning
b.
E-Banking
c.
E-Auction
d.
None of the above
Question 2. The ability to change the product to better fit the needs of the customer is called ______________.
a.
customization
b.
privacy
c.
accessibility
d.
personalization
Question 3. Which of the following is a measure of the percentage of purchasers who return to a website within a year?
a.
loyalty
b.
reach
c.
recency
d.
unique visitors
Question 4. Which of the following describes E‐commerce?
a.
Doing business electronically
b.
Doing business
c.
Sale of goods
d.
All of the above
Question 5. The most widely used encryption standard is ______________.
a.
Advanced Encryption Standard (AES)
b.
Data Encryption Standard (DES)
c.
Universal Encryption Standard (UES)
d.
Optimal Encryption Standard (OES)
Question 6. The largest component of a website budget is ______________.
a.
system maintenance
b.
system development
c.
content design and development
d.
telecommunications
Question 7. The dimension of e-commerce that enables commerce across national boundaries is called ______________.
a.
interactivity
b.
richness
c.
ubiquity
d.
global reach
Question 8. E-commerce technologies have improved upon traditional commerce technologies in ______________.
a.
richness
b.
reach
c.
both richness and reach
d.
neither richness nor reach
Question 9. Promotion of products in e-commerce can be done by:
a.
Social media
b.
Online Ads
c.
Blog
d.
All of the above
Question 10. Which is a function of E‐commerce?
a.
marketing
b.
advertising
c.
warehousing
d.
All of the above
Which service encompasses all technologies used to transmit and process information on and across a network? Select one:
a. Interoperability
b. Scalability
c. Benchmarking
d. Web services
Question 11. E-business can be defined as:
a.
the uninhibited flow of information and goods on the Web
b.
the use of the Internet and the Web to transact business
c.
digitally enabled transactions and processes within an organization
d.
commercial transactions involving electronic goods
Question 12. Which of the following is the primary characteristic of an intranet?
a.
People outside the organization can access it
b.
People inside the organization can’t access it
c.
People outside the organization can’t access it
d.
None of the above
Question 13. Which of the following represents a limiting factor for the growth of e-commerce?
a.
Persistent cultural attraction of physical markets and traditional shopping experiences
b.
E-commerce lacks the convenience of other methods of transacting business
c.
The potential audience for e-commerce is too low to support it as a widespread method of commerce
d.
Inadequate selection of goods compared to physical marketplaces.
Question 14. Which of the following describes an ERP system?
a.
ERP systems provide a foundation for collaboration between departments
b.
ERP systems enable people in different business areas to communicate
c.
ERP systems have been widely adopted in large organisations to store critical knowledge used to make the decisions that drive the organisation’s performance
d.
All of the above
Identify the incorrect statement :
a. The internet has evolved into phenomenally successful e-commerce engine
b. e-business is synonymous with e-commerce
c. The e-commerce model B2C did not begin with billboard ware
d. The e-commerce model G2C began with billboard ware
Question 15. E-commerce is:
a.
an organization using electronic media to purchase from to its suppliers
b.
any electronically mediated communication between an organization and its stakeholders
c.
t he use of electronic communications for all business processes
d.
an organization using electronic media to sell direct to its customers
Question 16. Which of the following describes E-commerce?
a.
Buying products from each other
b.
Buying services from each other
c.
Selling services from each other
d.
All of the above
Question 17. _______________ is the encompassing term that involves the use of electronic platforms – intranets, extranets and the Internet – to conduct a company’s business.
a.
E-commerce
b.
E-marketing
c.
E-procurement
d.
E-business
29
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes
2nd Module Assessment
Which type of add appears on a web page?
Select one:
a.
pop‐under ad
b.
Pop‐up ad
c.
Banner ad
d.
Discount ad
Question 2. What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?
a.
B2B marketplace
b.
Intranet
c.
Reverse auction
d.
Internet
Question 3. Which of the following is part of the four main types for e‐commerce?
a.
B2B
b.
B2C
c.
C2B
d.
All of the above
Question 4. All of the following are major B2C business models except ______________.
a.
content provider
b.
industry consortium
c.
transaction broker
d.
service provider
Question 5. What is the percentage of customers who visit a website and actually buy something called?
a.
Affiliate programs
b.
Click‐through
c.
Spam
d.
Conversion rate
Question 6. This E-Commerce business model mainly focuses on selling products or services online.
a.
Indirect Marketing
b.
Marketplace
c.
Online Direct Marketing
d.
Brick & Mortar
Question 7. All of the following are types of social marketing except ______________.
a.
affiliate marketing
b.
blog advertising
c.
social network advertising
d.
game advertising
Question 8. Which segment do eBay, Amazon.com belong to?
a.
B2Bs
b.
B2Cs
c.
C2Bs
d.
C2Cs
Question 9. Which portal business model best describes Yahoo?
a.
general purpose portal
b.
affinity group based vertical market
c.
focused content based vertical market
d.
none of the above
Question 10. The basic element(s) of website is/are:
a.
Home page
b.
Web pages
c.
Links and banners
d.
All the above
Question 11. Which of the following describes paid content’s relation to free user-generated content?
a.
Free content jeopardizes paid content
b.
Paid content jeopardizes free content
c.
Free content and paid content can both work in tandem cooperatively
d.
Paid content is viable now but will not be in the future
Question 12. All of the following are challenges to online retail except ______________.
a.
Consumer concerns about the security of transactions
b.
Consumer concerns about the privacy of personal information given to Web sites
c.
Delays in delivery of goods when compared to store shopping
d.
Inability to change prices nearly instantly
Question 13. The two main types of Internet-based B2B commerce are:
a.
Net marketplaces and private industrial networks
b.
EDI and collaborative commerce
c.
Net marketplaces and collaborative commerce
d.
EDI and private industrial networks
Question 14. An example of a cost-saving benefit from creating an e-commerce web site is:
a.
the ability to reach overseas markets without a sales presence.
b.
more rapid response to customer enquiries.
c.
tracking of number of customers using different parts of site.
d.
all of the above
The online content revenue model in which free content drives offline revenues is called the ______________. Select one:
a. marketing model
b. advertising model
c. pay-per-view model
d. subscription model
Question 15. Which of the following portals are more specific, offering a great deal of information pertaining to a single area of interest?
a.
Horizontal
b.
Vertical
c.
(a) and (b) both
d.
None of above
Question 16. Click and mortar business are business that have:
a.
only physical presence
b.
both an online and an offline presence
c.
neither online nor offline presence
d.
None of above
Question 17. A buy-side supplier threat of e-commerce is:
a.
Drives down cost of commoditized products
b.
Reduction in customer loyalty
c.
Increase in cost of supplies
d.
None of above
30
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes
3rd Module Assessment
Which of the following can be used to help identify people in a crowd?
Select one:
a.
Biochip
b.
Implant chip
c.
Facial recognition software
d.
Vision chip
Question 2. Online journals where people post their reviews and thoughts on narrow topic are classified as ____________.
a.
Business domain website
b.
Corporate website
c.
Blogs
d.
Marketing website
Question 3. The use of smart card represents a form of:
a.
password encryption
b.
authorization
c.
authentication
d.
both b and c
Which of the following is the correct depiction of Digital Marketing?
Select one:
a.E-mail Marketing
b.Social Media Marketing
c.Web Marketing
d.all of the above
Question 4. ____________ is the encompassing term that involves the use of electronic platform-intranets, extranet and the internet to conduct a company’s business.
a.
e- procurement
b.
e-business
c.
e-commerce
d.
e-marketing
Question 5. EFT stands for ____________.
a.
Electronic fund transmission
b.
Electronic foreign transmission
c.
Electronic feature transfer
d.
Electronic feature transmit
Question 6. _____ is an approach to information management in which data are stored in a network of documents connected by links.
a.
Hypertext
b.
Linked text
c.
Hyperdata
d.
none
Question 7. Which of the following advantages is/are normally associated with B2B e‐commerce?
a.
Shorter cycle times
b.
Reduction in costs
c.
Reaches wider audiences
d.
All of the above
Question 8. The process of getting customers to pass along a company’s marketing message to friends, family, and colleagues is known as ______________.
a.
affiliate marketing
b.
permission marketing
c.
blog marketing
d.
viral marketing
Question 9. The limitations of e-marketing is ____________.
a.
the inability to touch and feel
b.
instant cash payment
c.
touch and feel
d.
immediate delivery
Question 10. Which of the following is the correct depiction of Digital Marketing?
a.
E-mail Marketing
b.
Social Media Marketing
c.
Web Marketing
d.
All of the above
_________is a unique address on the world wide web that provides the exact location of every data in the universal network.
Select one:
a.
URL
b.
http
c.
www
d.
none
Question 11. Which of the following statements accurately reflects the impact of technology?
a.
Technology has caused buyer power to increase
b.
Technology has lessened the entry barriers for many industries
c.
Technology has increased the threat of substitute products and services
d.
all of the above
Question 12. Which of the following is not one of the benefits of e-commerce to sellers?
a.
e-commerce can help to reduce coSts
b.
e-commerce is a powerful tool for customer relationship building
c.
e-commerce increases the net cost per contact
d.
e-commerce offers greater flexibility in meeting customer needs.
Question 13. Identify the incorrect statement:
a.
The overall strategy drives the e-commerce data warehousing strategy.
b.
Data warehousing in an e-commerce environment should be done in a classical manner.
c.
E-commerce opens up an entirely new world of web servers.
d.
E-commerce security threats can be grouped into three major categories.
Question 14. All of the following are potential benefits of B2B e-commerce except:
a.
reduced amount of ‘first-mover’ advantages
b.
decreased product cycle time
c.
increased opportunities for collaborating with suppliers and distributors
d.
increased production flexibility
Which of the following are the key characteristics of e-business?
I. Customer is king.
II. E-business leads to intermediation.
III. Entry barriers are low.
IV. Economies of scale.
Select one:
a. Both (I) and (II) above
b. Both (II) and (III) above
c. Both (III) and (IV) above
d. (I), (III) and (IV) above
Question 15. Which of the following is not a challenge of e-learning?
a.
E-learning is not always designed by skilled educators.
b.
Online learning increases social interaction among children.
c.
Copyright breach.
d.
All of above.
Question 16. Many e-tailers often offer lower prices to:
a.
Generate brand awareness
b.
Increase site traffic
c.
Increase customer loyalty
d.
All of above
Question 17. Which of the following is not true for online travel?
a.
People can save time and money by booking their travel arrangements on the Web
b.
There is a great deal of competition among travel Web sites; each offers better service, low fares and more features.
c.
Customers now have the power to bypass a travel agent
d.
None of above
29
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes
4th Module Assessment
The redirection of traffic from a legitimate site to an infringing site is called ______________.
a.
cybersquatting
b.
cyberpiracy
c.
metatagging
d.
keywording
Question 2. When hackers flood a website with useless traffic to overwhelm the network, it is called ______________.
a.
phishing
b.
pharming
c.
a Denial of Service (DoS) attack
d.
spoofing
Question 3. If you need to transfer money to another person via the internet, which of the following methods can you use?
a.
financial cybermediary
b.
electronic check
c.
electronic bill presentment and payment
d.
All of the above
Question 4. Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?
a.
electronic check
b.
electronic bill presentment and payment
c.
conversion rates
d.
financial cybermediary
Question 5. Which of the following is not related to security mechanism?
a.
encryption
b.
decryption
c.
e‐cash
d.
All of the above
Question 6. What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for E‐commerce or commerce‐related activities?
a.
Direct marketplace
b.
B2B
c.
B2C
d.
Electronic marketplace
Question 7. Secure Sockets Layers does which of the following?
a.
creates a secure, private connection to a web server
b.
encrypts information
c.
sends information over the internet
d.
All of the above
Question 8. Which web server functionality allows it to verify usernames and passwords and process certificates and encryption information?
a.
Processing of HTTP requests File Transfer Protocol
b.
Data capture
c.
Security services
Question 9. Which of the following is a useful security mechanism when considering business strategy and IT?
a.
encryption
b.
decryption
c.
firewall
d.
All of the above
Question 10. A security plan begins with a ______________.
a.
security policy
b.
implementation plan
c.
security organization
d.
risk assessment
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed as ____________.
a. hacking b. cracking c. dumpster diving d. spoofing
Question 11. Which of the following statements about privacy is true?
a.
It is a moral right to be left alone
b.
Only corporations and government need to be concerned about it
c.
It has only just recently become a concern
d.
It is most easily obtained on the Internet
Question 12. Digital signature is a:
a.
Digital id,send as an attachment to a web page/e‐mail/message
b.
Is used for verifying the attachments send using web
c.
Both a and b
d.
None of these
Question 13. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key.
a.
encryption, decryption
b.
private, public
c.
encryption, public
d.
public, private
Question 14. Secure communication means:
a.
Protect transmission of credit card number
b.
Guarantee privacy of customer
c.
Unauthorized access of payment details
d.
All the above
A digital signature is required: i) to tie an electronic message to the sender’s identity ii) for non repudiation of communication by a sender iii) to prove that a message was sent by the sender in a Court of law. Iv) in all e-mail transactions Select one: a. i and ii b. i, ii and iii c. I, ii, iii and iv d. ii, iii and iv
Question 15. What is considered while creating a front page of the website or homepage?
a.
References of other websites
b.
Logos portraying the number of awards won by the web designer
c.
A brief elaboration about the company
d.
None of the above
Question 16. Micro-blogging can be defined as __________.
a.
Mobile related blogs
b.
Blogs posted by companies instead of an individual
c.
Blogs encompassing limited individual posts, which are typically limited by character count.
d.
None of the above
Question 17. Which of the following factors are responsible for leaving an impact on the Google PageRank?
a.
The text depicting inbound links to a page of a website.
b.
The subject matter of the site providing the inbound link to a page of a website.
c.
The number of outbound links on the page that contains the inbound link to a page of a website.
d.
A total number of inbound links to a website’s page.
30
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes
5th Module Assessment
Which concept suggests that different applications and computer systems should be able to communicate with one another?
a.
Integration
b.
Web services
c.
Scalability
d.
Interoperability
Question 2. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as fire or flood?
a.
Disaster recovery plan
b.
Hot site
c.
Cold site
d.
Disaster recovery cost curve
Question 3. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a.
Customer relationship management systems cards
b.
E‐government identity cards
c.
FEDI cards
d.
Smart cards
Question 4. What floods a website with so many requests for service that it slows down or crashes?
a.
Computer virus
b.
Worm
c.
Denial‐of‐service attack
d.
None of the above
Question 5. A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called ____________.
a.
Phishing
b.
Carding
c.
Brand spoofing
d.
All of the above
Question 6. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
a.
Client/server network
b.
Intranet
c.
Extranet
d.
Thin client
Question 7. What looks for people on the network who shouldn’t be there or who are acting suspiciously?
a.
Encryption
b.
Public key encryption
c.
Intrusion‐detection software
d.
Security‐auditing software
Question 8. What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?
a.
internet commerce
b.
e‐commerce
c.
transaction information transfer
d.
electronic data interchange
Question 9. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?
a.
Affiliate programs
b.
Click‐through
c.
Spam
d.
All of the above
Which of the following refers to creating products tailored to individual customers?
a. customization
b. aggregation c. Direct materials d. Reverse auction
Question 10. Cyber slacking consists of what activities?
a.
Visiting “inappropriate” web sites
b.
Visiting news sites
c.
Chatting online with others about non‐work topics
d.
All of the above
Question 11. Which of the following is/are not basic e-business model(s)?
I. B2B.
II. B2C.
III. C2C.
IV. C2B.
a.
Only (II) above()
b.
Only (IV) above()
c.
(I) (II) and (III) above
d.
Both (I) and (IV) above()
Question 12. Disadvantages of E-commerce in India are:
(i) internet access is not universally available
(ii) credit card payment security is not yet guaranteed
(iii) transactions are de-personalized and human contact is missing
(iv) cyber laws are not in place
a.
i and ii
b.
ii and iii
c.
i, ii, iii
d.
i, ii, iii, iv
E-business is:
Select one:
a.the use of electronic communications for all business processes
b.an organization using electronic media to purchase from to its suppliers
c.any electronically mediated communication between an organization and its stakeholders
d.all of the above
Question 13. Which is the most realistic relationship between these two concepts?
a.
E-business is a subset of E-commerce
b.
E-commerce is broadly equivalent to E-business
c.
E-commerce is a subset of E-business
d.
E-commerce has some overlap with E-business
Question 14. An example of benefits from creating an E-commerce website is:
a.
more rapid response to customer enquiries
b.
tracking of number of customers using different parts of site
c.
lower paper costs needed for marketing and fewer staff needed in contact centre
d.
All the above
Question 15. Which of the following statements accurately reflect the impact of technology?
a.
technology has caused buyer power to increase
b.
technology has lessened the entry barriers for many industries
c.
technology has increased the threat of substitute products and services
d.
all of the above
Question 16. Which of the following is true for Insurance Online?
a.
Insurance is complicated; the Web offers instruction and helpful documentation.
b.
Free quotes and calculators help consumers make informed decisions.
c.
Lower rates are often found on the Web for insurance.
d.
all of the above
Question 17. In what ways can site traffic help in assessing the market value?
a.
Overall site traffic can be followed, and a general idea of marketing’s impact can be determined.
b.
There is no association between the site traffic and marketing
c.
Ads can send receivers to a specific landing page, which can be tracked
d.
Product sales from the company website can be attributed directly to the marketing campaign
29
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes
Assignment 2
While ecommerce has been growing rapidly, it still only comprised a small percentage of overall retail sales. For example, in the U.S., on an adjusted basis, ecommerce accounted for 11.8% of all retail sales in the first quarter of 2020, according to the U.S. Census Bureau.
That was for Q1. Then in Q2, the number jumped to 16.1% – a 44.5% change from the same quarter a year ago. To put that number in perspective, Q2 2019 grew “only” 13.8% over Q2 2018.
What changed? The COVID-19 pandemic, of course. Even with ecommerce’s double-digit growth over the years, brick-and-mortar retail still had many advantages over ecommerce. Some products (like groceries) are hard to ship and easier and less expensive to buy in person. Brick-and-mortar retail has an experiential draw that ecommerce can’t match – from trying on a shirt to being wowed by an in-store (and Instagram-worthy) display. The ability to make a human connection and learn about a product or service.
Suddenly everything changed. That human connection became a detriment. And a no-touch version of goods and even services was preferable if not essential.
What of these softwares comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer’s CPU and storage for some task you know nothing about?
a.
Web log
b.
Clickstream
c.
Anonymous Web browsing service
d.
None of the above
Question 2. What type of virus spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?
a.
Computer virus
b.
Worm
c.
Denial‐of‐service attack
d.
None of the above
Question 3. What is an electronic representation of cash?
a.
Digital cash
b.
Electronic cash
c.
E‐cash
d.
All of the above
Question 4. During E‐commerce transaction, we should ensure ____________.
a.
Integrity
b.
Security
c.
Confidentiality
d.
All the above
Question 5. Encryption prevents ____________ from viewing data that is transmitted over telecommunications channels.
a.
snoopers
b.
other prying seyes
c.
hackers
d.
All the above
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes