0% found this document useful (0 votes)
22 views

BBA Solved Mcq Paper

The document is an examination question booklet for a BBA course on Fundamentals of E-Commerce, conducted in July 2022. It contains instructions for filling out the OMR sheet and a series of multiple-choice questions related to e-commerce concepts, terminology, and applications. The questions cover various aspects of e-commerce, including its definitions, features, and related technologies.

Uploaded by

askeladd915
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

BBA Solved Mcq Paper

The document is an examination question booklet for a BBA course on Fundamentals of E-Commerce, conducted in July 2022. It contains instructions for filling out the OMR sheet and a series of multiple-choice questions related to e-commerce concepts, terminology, and applications. The questions cover various aspects of e-commerce, including its definitions, features, and related technologies.

Uploaded by

askeladd915
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Paper Code Á’uiqfLrdk Øekad

Question Booklet No.


Roll No.----------------------
3 5 9
(To be filled in the
OMR Sheet)

O.M.R. Serial No. Á’uiqfLrdk lhjht


Question Booklet Series
A
BBA (Sixth Semester) Examination, July-2022
BBA-606(N)
Fundamentals of E-Commerce
Time : 1:30 Hours Maximum Marks-100

tc rd dgk u tk;] bl Á’uiqfLrdk dks u [kksysa


funsZ’k % & 1. ijh{kkFkhZ vius vuqØekad] fo”k; ,oa Á’uiqfLrdk dh lhjht dk fooj.k ;FkkLFkku lgh& lgh Hkjsa]
vU;Fkk ewY;akdu esa fdlh Hkh Ádkj dh folaxfr dh n’kk esa mldh ftEesnkjh Lo;a ijh{kkFkhZ dh gksxhA
2. bl Á’uiqfLrdk esa 100 Á’u gSa] ftues ls dsoy 75 Á’uksa ds mRrj ijh{kkfFkZ;ksa }kjk fn;s tkus gSA
ÁR;sd Á’u ds pkj oSdfYid mRrj Á’u ds uhps fn;s x;s gSaA bu pkjksa esa ls dsoy ,d gh mRrj
lgh gSA ftl mRrj dks vki lgh ;k lcls mfpr le>rs gSa] vius mRrj i=d (O.M.R.
ANSWER SHEET) esa mlds v{kj okys o`Rr dks dkys ;k uhys cky IokabV isu ls iwjk Hkj nsaA
;fn fdlh ijh{kkFkhZ }kjk fdlh iz’u dk ,d ls vf/kd mŸkj fn;k tkrk gS] rks mls xyr mŸkj ekuk
K-359

tk;sxkA
3. ÁR;sd Á’u ds vad leku gSaA vki ds ftrus mRrj lgh gksaxs] mUgha ds vuqlkj vad Ánku fd;s
tk;saxsA
4. lHkh mRrj dsoy vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij gh fn;s tkus
gSaA mRrj i=d esa fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k mRrj ekU; ugha gksxkA
5. vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij dqN Hkh fy[kus ls iwoZ mlesa fn;s
x;s lHkh vuqns’kksa dks lko/kkuhiwoZd i<+ fy;k tk;A
6. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks viuh vksŒ,eŒvkjŒ ‘khV miyC/k djkus ds ckn
gh ijh{kk d{k ls ÁLFkku djsaA
7. fuxsfVo ekfdZax ugha gSA
egRoiw.kZ % & Á’uiqfLrdk [kksyus ij ÁFker% tkWp dj ns[k ysa fd Á’uiqfLrdk ds lHkh i`”B HkyhHkkWfr Nis gq, gSaA ;fn
Á’uiqfLrdk esa dksbZ deh gks] rks d{k fujh{kd dks fn[kkdj mlh lhjht dh nwljh Á’uiqfLrdk ÁkIr dj ysaA
Series-A BBA 606(N) / K-359 Page - 2
1. E-Commerce involves exchange of information through____________.
(A) Mobile
(B) Laptop
(C) Internet
(D) None
2. In E-Commerce ‘E’ refers to___________.
(A) Email
(B) Electronic
(C) Internet
(D) None
3. _____________is not one of the perspectives of ecommerce.
(A) Communication
(B) Business
(C) Offline
(D) Businessman
4. ____________are one of the perspectives of ecommerce.
(A) Service
(B) Business
(C) Online
(D) All of these
5. Brick n mortar refers to ___________.
(A) Online store
(B) Website
(C) Cloud
(D) Off line store

Series-A BBA 606(N) / K-359 Page - 3


6. Full form of Email is-
(A) Electrical mail
(B) Electronic mail
(C) Employee mail
(D) Electric mail
7. EBB means Electronic _____________ Board.
(A) Business
(B) Bulletin
(C) Bureau
(D) None of these
8. Full form of EFT is ____________.
(A) Electronic fact transfer
(B) Electronic fund transfer
(C) Both
(D) None
9. Full form of EDI is-
(A) Electrical Data Interchange
(B) Electrical Data Interface
(C) Electronic Data Interchange
(D) Electrical Digital Interchange
10. ATM with-drawls are an example of ___________.
(A) ETI
(B) EDI
(C) EPI
(D) EBI

Series-A BBA 606(N) / K-359 Page - 4


11. Full form of ATM is _________.
(A) Automatic Teller Machine
(B) Atomic Teller Machine
(C) Automated Teller Machine
(D) None of these
12. EDI is not based on-
(A) Standards
(B) Computer
(C) Human Intervention
(D) None of these
13. EBB is also called as________ way of sharing information.
(A) Public
(B) Private
(C) Both
(D) None
14. Email is also called as__________ way of sharing information.
(A) Public
(B) Private
(C) Both
(D) None
15. EFT does not include__________ based exchange of money.
(A) Digital
(B) Paper
(C) Both
(D) None

Series-A BBA 606(N) / K-359 Page - 5


16. The features of E-Commerce are____________.
(A) Support
(B) 24x7 availability
(C) Non Cash Payment
(D) All of the above
17. One of the disadvantage of E-Commerce is___________.
(A) Support
(B) Lack of personal touch
(C) 24x7 Access
(D) All of the above
18. The infrastructural requirement for E-Commerce include___________.
(A) Tele-communication
(B) Digital Devices
(C) Connectivity
(D) All of the above
19. G2B refers to ____________.
(A) Govt. to Business
(B) Governor to Business
(C) Govt. to Bureaucrat
(D) None of these
20. C2C refers to _____________.
(A) Class to Class
(B) Consumer to Consumer
(C) City to City
(D) None of these

Series-A BBA 606(N) / K-359 Page - 6


21. ____________ is an electronic communication network around the world.
(A) Network
(B) Digital
(C) Internet
(D) None of these
22. Internet is a _____________wide area network.
(A) Local
(B) Global
(C) Value
(D) None of these
23. Internet uses wide set of communication _____________.
(A) Experiment
(B) Survey
(C) Protocols
(D) None of these
24. ARPA in year 1960 initiated ____________as an experiment.
(A) Email
(B) Internet
(C) ATM
(D) None of these
25. Internet is use for-
(A) Exploration
(B) Communication
(C) Connecting
(D) All of these

Series-A BBA 606(N) / K-359 Page - 7


26. What is TCP/IP ?
(A) Mail
(B) Online store
(C) Protocol
(D) None of these
27. Full form of IP is-
(A) Internet pack
(B) Internet protocol
(C) Internet payment
(D) None of these
28. Full form of www is-
(A) World wide web
(B) Web world wide
(C) World web wide
(D) None of these
29. Full form of HTML is-
(A) Hypertext Max up Language
(B) Hypertext Markup Language
(C) Hypertext Massive Language
(D) None the these
30. HTML supports-
(A) Picture
(B) Audio
(C) Video
(D) All of these

Series-A BBA 606(N) / K-359 Page - 8


31. AV means ___________.
(A) Audio
(B) Visual
(C) Both (A) & (B)
(D) None of these
32. FTP refers to ________.
(A) File tracking
(B) File transfer protocol
(C) File folder
(D) None of these
33. FTP uses_____________ for communication.
(A) Input
(B) Output
(C) Ports
(D) None
34. Data cable, modem, switch router are related to-
(A) Computer
(B) Mobile
(C) Network
(D) None
35. An open protocol standard is also referred as _________.
(A) EDI
(B) FTP
(C) TCP
(D) None

Series-A BBA 606(N) / K-359 Page - 9


36. Full form of TCP is-
(A) Technical Control protocol
(B) Transmission Control Protocol
(C) Tele Control Protocols
(D) None
37. Operating software is an interface between user and__________.
(A) Computer
(B) Website
(C) Web Service
(D) None
38. Intranet is a private network?
(A) True
(B) False
(C) Can’t say
(D) None
39. Full form of VAN is-
(A) Value added network
(B) Variable area network
(C) Both
(D) None of these
40. Full form of WAN is-
(A) Value added network
(B) Wide area network
(C) Working area network
(D) None of these

Series-A BBA 606(N) / K-359 Page - 10


41. Which of the following model help in e-governance?
(A) C2G
(B) G2C
(C) B2G
(D) None
42. Which process is used to reinstall data from a copy when the original data has been
lost?
(A) Backup
(B) Recovery
(C) Benchmarking
(D) Data cleansing
43. The E-Commerce platform should provide facility for transaction for_________
electronic payment.
(A) Unprotected
(B) Secure
(C) Unsafe
(D) Uncontrolled
44. Which of the following is the primary characteristic of an intranet?
(A) People outside the organization can access it
(B) People inside the organization can’t access it
(C) People outside the organization can’t access it
(D) None of the above
45. After placing an order, the buyer is provided __________for tracking the progress
of shipment till delivery.
(A) Waybill number
(B) Postal registration number
(C) Consignment tracking ID
(D) Any one of these

Series-A BBA 606(N) / K-359 Page - 11


46. Which will not harm computer resources?
(A) Firewall
(B) Virus
(C) Trojan horse
(D) None of the above
47. After ordering a product, the buyer might__________ the product, which will
result in unnecessary transport expense to the seller.
(A) Fail to pay for
(B) Reject
(C) Find defects in
(D) All of them
48. What is an intranet that is restricted to an organization and certain outsiders, such
as customers and suppliers?
(A) Client/server network
(B) Intranet
(C) Extranet
(D) Thin client
49. During transit, a product might________, which will result in customer
dissatisfaction.
(A) Get damaged
(B) Get broken
(C) Be affected by excess light/radiation
(D) All of them
50. Description of a product by the seller might_________, which will result in
customer dissatisfaction.
(A) Not match the product
(B) Be insufficient
(C) Hide certain defects
(D) All of them

Series-A BBA 606(N) / K-359 Page - 12


51. What is a model of a proposed product, service, or system?

(A) Prototyping

(B) Prototype

(C) Proof-of-concept prototype

(D) Selling prototype

52. When a transaction is processed online, how can the merchant verify the

customer’s identity?

(A) Use secure sockets layers

(B) Use secure electronic transactions

(C) Use electronic data interchange

(D) Use financial electronic data interchange

53. Public key encryption uses multiple keys. One key is used to encrypt data, while

another is used to decrypt data. The key used to encrypt data is called the key,

while the key used to decrypt data is called the key-

(A) Encryption, decryption

(B) Private, Public

(C) Encryption, Public

(D) Public, Private

54. What is the name for direct computer-to-computer transfer of transaction

information contained in standard business documents?

(A) Internet commerce

(B) E-commerce

(C) Transaction information transfer

(D) Electronic data interchange

Series-A BBA 606(N) / K-359 Page - 13


55. The geographical domain of business of an E-Commerce platform is called
___________of the platform.
(A) Length
(B) Height
(C) Scope
(D) Sales
56. E-Commerce platforms like Snapdeal, Flipkart, Shopclues, etc. have
_________scope of business.
(A) National
(B) Local
(C) Global
(D) None of them
57. If you need to transfer money to another person via the internet, which of the
following methods could you use?
(A) Financial cybermediary
(B) Electronic check
(C) Electronic bill presentment and payment
(D) All of the above
58. E-Commerce may be carried out using modes-
(A) SMS/ phone conversation
(B) Web
(C) Email
(D) All of them
59. Which of the following authenticates and handles credit card payment for E-
Commerce?
(A) Payment gateway
(B) E-Commerce gateway
(C) Software gateway
(D) E-Wallets

Series-A BBA 606(N) / K-359 Page - 14


60. Which is the process of ensuring the data, transactions, communication or
documents are genuine?
(A) Availability
(B) Integrity
(C) Authenticity
(D) Confidentiality
61. Which is the set of rules that limits access to information?
(A) Availability
(B) Integrity
(C) Authenticity
(D) Confidentiality
62. Which refers to paying the money back to the buyer after the price has been
deducted from the account?
(A) Refund
(B) Return
(C) Deduction
(D) Charge base
63. Which is the function of specifying access rights to resources related to information
security?
(A) OTP
(B) Pin
(C) Authorization
(D) Passcode
64. What type of ad appears on top of a web page?
(A) Pop-under ad
(B) Pop-up ad
(C) Banner ad
(D) Discount ad

Series-A BBA 606(N) / K-359 Page - 15


65. Amazon.com is well-known for which e-commerce marketing technique?
(A) Banner ads
(B) Pop-up ads
(C) Affiliate programs
(D) Viral marketing
66. Which of the following refers to creating products tailored to individual customers?
(A) Customization
(B) Aggregation
(C) Direct materials
(D) Reverse auction
67. A business competing in a competing environment must focus on which of the
following?
(A) Price
(B) Ease/speed of delivery
(C) Ease of ordering
(D) All of the above
68. Which of the following statements accurately reflect the impact of technology?
(A) Technology has caused buyer power to increase
(B) Technology has lessened the entry barriers for many industries
(C) Technology has increased the threat of substitute products and services
(D) All of the above
69. Which of the following is not related to security mechanism?
(A) Encryption
(B) Decryption
(C) E-cash
(D) All of the above

Series-A BBA 606(N) / K-359 Page - 16


70. Which of the following is a useful security mechanism when considering business

strategy and IT?

(A) Encryption

(B) Decryption

(C) Firewall

(D) All of the above

71. What are plastic cards the size of a credit card that contains an embedded chip on

which digital information can be stored?

(A) Customer relationship management systems cards

(B) E-government identity cards

(C) FEDI cards

(D) Smart cards

72. Which is the model in E–Commerce, if the seller is an individual and the buyer is a

business firm?

(A) Consumer to Business

(B) Business to Consumer

(C) Business to Business

(D) Consumer to Consumer

73. Which type of attack is a method of defeating a cryptographic scheme of trying a

large number of possibilities?

(A) Teardrop attack

(B) Brute force attack

(C) Phlashing

(D) Smurf attack

Series-A BBA 606(N) / K-359 Page - 17


74. Which type E-Commerce is tenders and submission of application?
(A) b2b
(B) b2c
(C) g2c
(D) g2b
75. Digital Cash has following characteristic-
(A) Anonymity
(B) Security
(C) Confidentiality
(D) All of the above
76. What is the percentage of customers who visit a website and actually buy
something?
(A) Affiliate Program
(B) Click-through
(C) Spam
(D) Conversion rate
77. Which one is not a layer of E-Commerce infrastructure?
(A) Physical Layer
(B) Product Layer
(C) Service Layer
(D) None
78. What is the process in which a buyer posts its interest in buying a certain quantity
of items, and sellers compete for the business by submitting successively lower
bids until there is only one seller left?
(A) B2B marketplace
(B) Intranet
(C) Reverse auction
(D) Internet

Series-A BBA 606(N) / K-359 Page - 18


79. Which term represents a count of the number of people who visit one site, click on
an ad, and are taken to the site of the advertiser?
(A) Affiliate programs
(B) Click through
(C) Spam
(D) All of the above
80. Digital products are best suited for B2C e-commerce because they-
(A) Are commodity like products
(B) Can be mass-customized and personalized
(C) Can be delivered at the time of purchase
(D) All of the above
81. Which type deals with auction?
(A) B2B
(B) B2C
(C) C2C
(D) C2B
82. What is Cyber Security?
(A) Cyber Security provides security against malware
(B) Cyber Security provides security against cyber-terrorists
(C) Cyber Security protects a system from cyber attacks
(D) All of these
83. What does cyber security protect?
(A) Cyber security protects criminals
(B) Cyber security protects internet-connected systems
(C) Cyber security protects hackers
(D) None of these

Series-A BBA 606(N) / K-359 Page - 19


84. Which of the following is defined as an attempt to steal, spy, damage or destroy
computer systems, networks, or their associated information?
(A) Cyber attack
(B) Computer security
(C) Cryptography
(D) Digital hacking
85. Which of the following is a type of cyber security?
(A) Cloud Security
(B) Network Security
(C) Application Security
(D) All of the above
86. Which of the following is not a cybercrime?
(A) Denial of service
(B) Man in the Middle
(C) Malware
(D) Advanced Encryption Standard
87. Which of the following is a type of cyber-attack?
(A) Phishing
(B) SQL Injections
(C) Password Attack
(D) All of the above
88. Which of the following is the hacking approach where cyber-criminals design fake
websites or pages for tricking or gaining additional traffic?
(A) Pharming
(B) Website-Duplication
(C) Mimicking
(D) Spamming

Series-A BBA 606(N) / K-359 Page - 20


89. What is the existence of weakness in a system or network is known as?
(A) Attack
(B) Exploit
(C) Vulnerability
(D) Threat
90. Which of the following can diminish the chance of data leakage?
(A) Steganography
(B) Chorography
(C) Cryptography
(D) Authentication
91. What is UN/EDIFACT?
(A) Standard
(B) Mail
(C) Cyber-Threat
(D) Firewall
92. Elements in EDI can be compared to ___________.
(A) Word
(B) Sentence
(C) Paragraph
(D) None
93. Segments in EDI can be compared to___________.
(A) Word
(B) Sentence
(C) Paragraph
(D) None
94. Transaction set in EDI can be compared to ___________.
(A) Word
(B) Sentence
(C) Paragraph
(D) None

Series-A BBA 606(N) / K-359 Page - 21


95. The smallest component of EDI standard-
(A) Transaction Set
(B) Segment
(C) Element
(D) None
96. Full form of SEO-
(A) Search Engine Organisation
(B) Search Engine Optimisation
(C) Service Engine Optimisation
(D) None of these
97. Digital documents are recognized after passing the Act-
(A) IP Act, 2000
(B) IT Act, 2000
(C) IC Act, 2000
(D) None of these
98. Objective of IT Act, 2000 are-
(A) Recognition to digital documents
(B) Recognition to digital signature
(C) Facility digital filling of forms
(D) All of these
99. Full form of PKI is _________.
(A) Public key Infrastructure
(B) Private key Infrastructure
(C) Any of these
(D) None of these
100. Full form of OTT is _________.
(A) Over the telephone
(B) Over the top
(C) Over the Television
(D) None of these

******
Series-A BBA 606(N) / K-359 Page - 22
Rough Work / jQ dk;Z

Series-A BBA 606(N) / K-359 Page - 23


DO NOT OPEN THE QUESTION BOOKLET UNTIL ASKED TO DO SO

1. Examinee should enter his / her roll number, subject and Question Booklet
Series correctly in the O.M.R. sheet, the examinee will be responsible for
the error he / she has made.
2. This Question Booklet contains 100 questions, out of which only 75
Question are to be Answered by the examinee. Every question has 4
options and only one of them is correct. The answer which seems
correct to you, darken that option number in your Answer Booklet
(O.M.R ANSWER SHEET) completely with black or blue ball point
pen. If any examinee will mark more than one answer of a particular
question, then the answer will be marked as wrong.
3. Every question has same marks. Every question you attempt correctly,
marks will be given according to that.
4. Every answer should be marked only on Answer Booklet (O.M.R
ANSWER SHEET). Answer marked anywhere else other than the
determined place will not be considered valid.
5. Please read all the instructions carefully before attempting anything on
Answer Booklet (O.M.R ANSWER SHEET).
6. After completion of examination, please hand over the O.M.R. SHEET to
the Examiner before leaving the examination room.
7. There is no negative marking.
Note: On opening the question booklet, first check that all the pages of the
question booklet are printed properly in case there is an issue please ask the
examiner to change the booklet of same series and get another one.

Series-A BBA 606(N) / K-359 Page - 24

You might also like