0% found this document useful (0 votes)
56 views16 pages

Ecomerce

Uploaded by

prince pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views16 pages

Ecomerce

Uploaded by

prince pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Roll No. ....................................

Question Booklet Number

O. M. R. Serial No.

B. C. A. (Sixth Semester) EXAMINATION, 2022-23


e-COMMERCE
Questions Booklet
Paper Code Series

B C A 6 0 3 N A
Time : 1:30 Hours ] [ Maximum Marks : 75

Instructions to the Examinee : ijh{kkfFkZ;ksa ds fy, funsZ’k %

1. Do not open the booklet unless you are 1. iz’u&iqfLrdk dks rc rd u [kksyas tc rd vkils dgk
asked to do so. u tk,A

2. The booklet contains 100 questions. 2. iz’u&iqfLrdk esa 100 iz’u gSaA ijh{kkFkhZ dks 75 iz’uksa
Examinee is required to answer 75 dks dsoy nh xbZ OMR vkUlj&’khV ij gh gy djuk
questions in the OMR Answer-Sheet
gS iz’u&iqfLrdk ij ughaA lHkh iz’uksa ds vad leku
provided and not in the question booklet.
All questions carry equal marks. gSaA

3. Examine the Booklet and the OMR Answer- 3. iz’uksa ds mŸkj vafdr djus ls iwoZ iz’u&iqfLrdk rFkk
Sheet very carefully before you proceed. OMR vkUlj&’khV dks lko/kkuhiwod
Z ns[k ysAa nks”kiw.kZ
Faulty question booklet due to missing or
iz’u&iqfLrdk ftlesa dqN Hkkx Nius ls NwV x, gksa ;k
duplicate pages/questions or having any
iz’u ,d ls vf/kd ckj Ni x, gksa ;k mlesa fdlh
other discrepancy should be got
immediately replaced. vU; izdkj dh deh gks rks mls rqjUr cny ysAa

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
(Only for Rough Work)

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
5. Which of the following is rights of a
1. What is e-Commerce ?
copyright owner ?
(A) Doing business electronically
(A) Publish their work and perform
(B) Doing business
their work in public
(C) Sale of goods (B) Translate and broadcast their work
(D) All of the above (C) Prevent others from making
unauthorized use of copyrighted
2. Who is part of the four main types for
work
e-Commerce ?
(D) All of the above
(A) B2B
6. Which type deals with auction ?
(B) B2C
(A) B2B
(C) C2B
(B) B2C
(D) All of the above (C) C2B

3. Which of the following is not type of (D) C2C

patent ? 7. Organizations suppliers value chain are


known as :
(A) Utility patents
(A) upstream value chain
(B) Copyright
(B) downstream value chain
(C) Design patents
(C) value chain
(D) Plant patents
(D) None of these

4. Which type of e-commerce focuses on


8. The best products to sell in B2C
consumers dealing with each other ? e-Commerce are :

(A) B2B (A) Small products

(B) B2C (B) Digital products

(C) C2B (C) Speciality products

(D) Fresh products


(D) C2C

BCA-603(N) (3) Set-A


9. Which products are people most likely to 13. All of the following are techniques B2C
be more uncomfortable buying on the e-Commerce companies use to attract

Internet ? customers, except :

(A) Registering with search engines


(A) Books
(B) Viral marketing
(B) Furniture

(C) Movies (C) Online ads

(D) All of the above (D) Virtual marketing

10. Which products are people most likely to 14. Which is a function of E-commerce ?

be comfortable buying on the Internet ? (A) Marketing


(A) Books (B) Advertising
(B) PCs (C) Warehousing
(C) CDs
(D) All of the above
(D) All of the above
15. Which is not a function of E-commerce ?
11. Digital products are best suited for B2C
(A) Marketing
e-Commerce because they :
(B) Advertising
(A) Are commodity like products
(C) Warehousing
(B) Can be mass-customized and
(D) None of the above
personalized

(C) Can be delivered at the time of 16. Which term represents account of the
purchase number of people who visit one site,
(D) All of the above click on an ad, and are taken to the site of
the advertiser ?
12. The solution for all business needs is :

(A) EDI (A) Affiliate programs

(B) ERP (B) Click-through

(C) SCM (C) Spam

(D) None of the above (D) All of the above

BCA-603(N) (4) Set-A


17. What is the percentage of customers who 21. What is EDI name ?
visit a Website and actually buy (A) Electronic Direct Interchange
something called ?
(B) Indirect materials
(A) Affiliate programs
(C) Electronic Data Interchange
(B) Click-through
(D) None of the above
(C) Spam
(D) Conversion rate 22. What is the process in which a buyer
posts its interest in buying a certain
18. What are materials used in production in
quantity of items, and sellers compete for
a manufacturing company or a replaced
the business by submitting successively
on the shelf for sale in a retail
lower bids until there is only one seller
environment ?
left ?
(A) Direct materials
(A) B2B marketplace
(B) Indirect materials
(C) EDI (B) Intranet

(D) None of the above (C) Reverse auction


(D) Internet
19. What are materials that are necessary for
running a modern corporation, but do not 23. What is B2B e-Commerce ?
relate to the company’s primary business (A) Business-to-business e-commerce
activities ?
(B) Business-to-consumer e-commerce
(A) Direct materials
(C) Consumer-to-consumer e-
(B) Indirect materials
commerce
(C) EDT
(D) Government-to-consumer
(D) None of the above
e-commerce
20. Which of the following is an example of
24. Most individuals are familiar with which
e-commerce ?
form of e-Commerce ?
(A) Buying groceries at a supermarket
(A) B2B
(B) Ordering food at a restaurant
(C) Booking a hotel room online (B) B2C

(D) Visiting a physical store to buy (C) C2B


clothes (D) C2C

BCA-603(N) (5) Set-A


25. Which form of c-commerce currently 29. If it is easy for competitors to enter the
accounts for about 97% of all market, the threat of new entrants is
e-Commerce revenues ?
considered :
(A) B2B
(A) High
(B) B2C
(C) C2B (B) Low
(D) C2C (C) More

26. Which of the following are advantages (D) Less


normally associated with B2B e-
30. An industry is less attractive for suppliers
Commerce ?
(A) Shorter cycle times when the rivalry among existing

(B) Reduction in costs competitors is :


(C) Reaches wider audiences
(A) High
(D) All of the above
(B) Low
27. If the threat of substitute products or
(C) More
services is low it is an :
(D) Less
(A) Disadvantage to the supplier
(B) Advantage to the buyer 31. Unique value auction is mainly applies to :
(C) Advantage to the supplier
(A) New products
(D) None of the above
(B) Second hand products
28. The threat of new entrants is high when
it is : (C) Engineering products

(A) Hard for customers to enter the (D) None of the above
market
32. Paisapay is facilitated in :
(B) Hard for competitors to enter the
market (A) eBay.co.in
(C) Easy for competitors to enter the (B) amazon.com
market
(C) flipkart.com
(D) Easy for customers to enter the
market (D) None of the above

BCA-603(N) (6) Set-A


33. Which of the following is a useful 37. A business cannot be all things to all
security mechanism when considering people. Instead, a business must :
business strategy and IT ?
(A) Identify target customers
(A) encryption
(B) Identify the value of
(B) decryption
products/services as perceived by
(C) firewall
customers
(D) All the above
(C) All of the above
34. Which of the following is not related to
(D) None of the above
security mechanism ?
(A) encryption 38. How do the transactions occur in

(B) decryption e-Commerce ?


(C) e-cash (A) Using e-medias
(D) All the above (B) Using computers only
35. The best products to sell in B2C (C) Using mobile phones only
e-commerce are : (D) None of the above
(A) small products
39. Which type of products is lesser
(B) digital products
purchased using e-Commerce ?
(C) speciality products
(D) fresh product (A) Automobiles
(B) Books
36. Which of the following statements
(C) Softwares
accurately reflect the impact of
technology ? (D) None of the above

(A) Technology has caused buyer 40. A business competing in a commodity


power to increase
like environment must focus on which of
(B) Technology has lessened the entry
the following ?
barriers for many industries
(A) Price
(C) Technology has increased the
threat of substitute products and (B) Ease / speed of delivery

services (C) Ease of ordering


(D) All of the above (D) All of the above

BCA-603(N) (7) Set-A


41. Which of the following refers to 45. Which form of c-marketplace brings
creating products tailored to individual together buyers and sellers from multiple
customers ? industries, often for MRO materials ?
(A) Customization
(A) Horizontal
(B) Aggregation
(B) Vertical
(C) Direct materials
(C) Integrated
(D) Reverse auction
(D) Inclined
42. Materials used in then or mal operation
of a business but not related to primary 46. Which form of e-market place brings

business operations are called what ? together buyers and sellers from the same

(A) Supplies industry ?

(B) Direct materials (A) Horizontal


(C) Indirect materials (B) Vertical
(D) Daily stuff
(C) Integrated
43. Amazon.com is well-known for which (D) Inclined
e-commerce marketing technique ?
47. Which type of add appears on a web
(A) Banner ads
page ?
(B) Pop-up ads
(C) Affiliate programs (A) pop-under ad

(D) Viral marketing (B) Pop-up ad

(C) Banner ad
44. What is the name given to an interactive
business providing a centralized market (D) Discount ad

where many buyers and suppliers can


48. What type of ad appears on top of a web
come together for e-commerce or
page ?
commerce-related activities ?
(A) Pop-under ad
(A) Direct marketplace
(B) pop-up ad
(B) B2B
(C) B2C (C) banner ad

(D) Electronic marketplace (D) discount ad

BCA-603(N) (8) Set-A


49. What type of ad appears under a web 53. An electronic check is one form of
page ? what ?
(A) e-commerce
(A) pop-under ad
(B) online banking
(B) pop-up ad
(C) e-cash
(C) banner ad
(D) check
(D) discount ad
54. If you need to transfer money to another
50. Which, if any, of the following types of rperson via the internet, which of the
ads are people most willing to tolerate ? following methods could you use ?
(A) Financial cyber mediary
(A) pop-under ad
(B) Electronic check
(B) pop-up ad
(C) Electronic bill presentment and
(C) banner ad payment
(D) None of the above (D) All of the above

51. Which of the following is an Internet- 55. Which of the following permits the

based company that makes it easy for one transmission of a bill, along with
payment of that bill, to be conducted
person to pay another over the Internet ?
over the Internet ?
(A) electronic check
(A) Financial cyber mediary
(B) electronic bill presentment and (B) Electronic check
payment (C) Electronic bill presentment and
(C) conversion rates payment
(D) All of the above
(D) financial cyber mediary
56. A combination of software and
52. Which of the following is a method of
information designed to provide security
transferring money from one person’s
and information for payment is called a
account to another ? what ?
(A) electronic check (A) digital wallet
(B) credit card (B) pop up ad
(C) e-transfer (C) shopping cart
(D) None of the above (D) encryption

BCA-603(N) (9) Set-A


57. What is the name for direct computer-to- 60. Secure Sockets Layers does which of the

computer transfer of transaction following ?

information contained in standard (A) creates a secure, private connection


to a web server
business documents ?
(B) encrypts information
(A) internet commerce (C) sends information over the internet
(B) e-commerce
(D) All of the above
(C) transaction information transfer

(D) electronic data interchange 61. When a transaction is processed online,


how can themerchant verify the
58. Which of the following is used in B2B to customer’s identity ?
pay for purchases ? (A) Use secure sockets layers

(A) e-commerce (B) Use secure electronic transactions


(C) Use electronic data interchange
(B) financial electronic data
(D) Use financial electronic data
interchange
interchange
(C) electronic data exchange
62. The practice off orging are turn address
(D) electronic checks on an e-mail so that the recipient is
fooled into revealing private information
59. Public key encryption uses multiple keys.
is termed as :
One key is used to encrypt tdata, while
(A) hacking
another is used to decrypt data. The key
(B) cracking
used to encrypt data is called the (C) dumpster diving
______key, while the key used to decrypt (D) spoofing

data is called the—key. 63. What is a model of a proposed product,

(A) encryption, decryption service, or system ?


(A) Prototyping
(B) private, public
(B) Prototype
(C) encryption, public
(C) Proof-of-concept prototype
(D) public, private (D) Selling prototype

BCA-603(N) ( 10 ) Set-A
64. What is an internal organizational 67. What is a separate facility that does not

Internet that is guarded against outside have any computer equipment but is a

access by a special security feature called place where the knowledge workers can

a firewall (which can be software, move after the disaster ?

hardware, or a combination of the two) ? (A) Disaster recovery plan

(A) Client/server network (B) Hot site

(B) Intranet (C) Cold site

(D) Disaster recovery cost curve


(C) Extranet

(D) Thin client 68. What is a separate and fully equipped

facility where the company can move


65. What is an intranet that is restricted to an
immediately after the disaster and resume
organization and certain outsiders, such
business ?
as customers and suppliers ?
(A) Disaster recovery plan
(A) Client/server network
(B) Hot site
(B) Intranet
(C) Cold site
(C) Extranet
(D) Disaster recovery cost curve
(D) Thin client
69. What charts (1) the cost to your
66. What is a detailed process for recovering
organization of the unavailability of
information or an IT system in the event
information and technology and (2) the
of a catastrophic disaster such as a fire or cost to your organization of recovering
flood ? from a disaster over time ?

(A) Disaster recovery plan (A) Disaster recovery plan


(B) Hot site (B) Hot site

(C) Cold site (C) Cold site

(D) Disaster recovery cost curve (D) Disaster recovery cost curve

BCA-603(N) ( 11 ) Set-A
70. Which factor determines when your IT 74. Which factor represents a system’s
system will be available for knowledge ability to change quickly ?
workers to access ? (A) Flexibility
(A) Availability (B) Performance
(B) Accessibility (C) Capacity planning
(C) Reliability (D) Benchmark
(D) None of the above
75. What is a set of conditions used to
71. Which factor determines who has the
measure how well a product or system
right to access different types of IT
functions ?
systems and information ?
(A) Flexibility
(A) Availability
(B) Performance
(B) Accessibility
(C) Capacity planning
(C) Reliability
(D) Benchmark
(D) Scalability
76. What determines the future IT
72. Which factor ensures your IT systems are
infrastructure requirements for new
functioning correctly and providing
equipment and additional network
accurate information ?
capacity ?
(A) Availability
(A) Flexibility
(B) Accessibility
(B) Performance
(C) Reliability
(C) Capacity planning
(D) Scalability
(D) Benchmark
73. Which factor represents how well your
system can adapt to increased demands ? 77. What automates business processes ?

(A) Availability (A) Workflow

(B) Accessibility (B) ASP

(C) Reliability (C) Workflow system

(D) Scalability (D) EIP

BCA-603(N) ( 12 ) Set-A
78. What defines all of the steps or business 82. Which is a function of ERP ?
rules, from beginning to end, required for
(A) Warehousing
a process to run correctly ?
(B) Sales
(A) Workflow
(B) EIP (C) Scheduling

(C) Workflow system (D) All of the above


(D) SLA
83. Which of the following is the primary
79. What sends work assignments through an
characteristic of an intranet ?
e-mail system ?

(A) Database-based enterprise (A) People outside the organization can

information portal access it


(B) Messaging-based enterprise
(B) People inside the organization
information portal
can’t access it
(C) Database based work flow system
(C) People outside the organization
(D) Messaging-based workflow system
can’t access it
80. Which will not harm computer
resources ? (D) None of the above

(A) Firewall
84. Which concept suggests that different
(B) Virus
applications and computer systems
(C) Trojan horse
should be able to communicate with one
(D) None of the above
another ?
81. EDT is the electronic interchange of
business information using _______ . (A) Integration

(A) Internet (B) Web services


(B) Middleman
(C) Scalability
(C) Standardized Format
(D) Interoperability
(D) Secured Server

BCA-603(N) ( 13 ) Set-A
85. Business entities conducting business 89. Who protects system from external
electronically are called : threats ?
(A) trading partners
(A) Firewall
(B) electronic partners
(B) EDI
(C) business partners
(C) ERP
(D) customers
(D) Script kiddies
86. Which process can prevent data from
lose due to computer problems or human 90. Who breaks into other people’s computer
errors ?
systems and steals and destroys
(A) backup
information ?
(B) recovery
(A) Hackers
(C) benchmarking
(D) data cleansing (B) Softwares

(C) Hacktivists
87. Which process is used to reinstall data
from a copy when the original data has (D) Script kiddies

been lost ?
91. What is software that comes hidden in
(A) backup
free downloadable software and tracks
(B) recovery
your online movements, mines the
(C) benchmarking
(D) data cleansing information stored on your computer, or

uses your computer’s CPU and storage


88. What describes a process of continuously
measuring results and comparing those for some task you know nothing about ?
results to optimal performance so that
(A) Web log
actual performance may be improved ?
(A) Performance (B) Click stream

(B) Capacity planning (C) Anonymous Web browsing service


(C) Benchmarking
(D) None of the above
(D) Data cleansing

BCA-603(N) ( 14 ) Set-A
92. ERP stands for : 97. Collection of hyperlinked documents on
the internet forms the ?. ?
(A) Enterprise resolution planning
(B) Enterprise reverse planning (A) World Wide Web (WWW)
(C) Enterprise resource planning (B) E-mail system
(D) None of the above
(C) Mailing list
93. The term FTP stands for ? (D) Hypertext markup language
(A) File transfer program
98. What consists of the identification of
(B) File transmission protocol
risks or threats, the implementation of
(C) File transfer protocol
security measures, and the monitoring of
(D) File transfer protection
those measures for effectiveness ?
94. Which is not a function of ERP ?
(A) Risk management
(A) Human resource management
(B) Risk assessment
(B) Financial
(C) Warehousing (C) Security

(D) None of the above (D) None of the above

95. What is a type of virus that spreads itself, 99. Factor that affects ethical and unethical
not just from file to file, but from behaviour :
computer to computer via e-mail and
(A) Ethical dilemma
other Internet traffic ?
(B) Diversity
(A) Computer virus
(B) Worm (C) Teamwork

(C) Denial-of-service attack (D) Open communication


(D) None of the above
100. What is the process of making a copy of
96. Which one of the following is the most the information stored on a computer ?
common internet protocol ?
(A) Backup
(A) HTML
(B) Anti-virus
(B) NetBEUI
(C) TCP/IP (C) Firewall

(D) IPX/SPX (D) Biometrics

BCA-603(N) ( 15 ) Set-A
4. Four alternative answers are mentioned for 4. iz’u&iqfLrdk esa izR;sd iz’u ds pkj lEHkkfor mŸkj
each question as—A, B, C & D in the booklet. A, B, C ,oa D gSaA ijh{kkFkhZ dks mu pkjksa fodYiksa esa ls
The candidate has to choose the correct
answer and mark the same in the OMR
lgh mŸkj Nk¡Vuk gSA mŸkj dks OMR vkUlj&’khV esa
Answer-Sheet as per the direction : lEcfU/kr iz’u la[;k esa fuEu izdkj Hkjuk gS %
Example : mnkgj.k %
Question : iz’u %
Q. 1 iz’u 1
Q. 2 iz’u 2
Q. 3 iz’u 3
Illegible answers with cutting and viBuh; mŸkj ;k ,sls mŸkj ftUgsa dkVk ;k cnyk x;k
over-writing or half filled circle will be gS ;k xksys esa vk/kk Hkjdj fn;k x;k mUgsa fujLr dj
cancelled.
fn;k tk,xkA
5. Each question carries equal marks. Marks 5. izR;sd iz’u ds vad leku gSaA vkids ftrus mŸkj
will be awarded according to the number of lgh gksxa ]s mUgha ds vuqlkj vad iznku fd;s tk;saxAs
correct answers you have.
6. All answers are to be given on OMR Answer 6. lHkh mŸkj dsoy vks- ,e- vkj- mŸkj&i=d (OMR
sheet only. Answers given anywhere other Answer Sheet) ij gh fn;s tkus gSaA mŸkj&i=d esa
than the place specified in the answer sheet fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k
will not be considered valid.
mŸkj ekU; ugha gksxkA
7. Before writing anything on the OMR Answer 7. vks- ,e- vkj- mŸkj&i=d (OMR Answer Sheet) ij
Sheet, all the instructions given in it should dqN Hkh fy[kus ls iwoZ mlesa fn;s x;s lHkh vuqns’kksa dks
be read carefully. lko/kkuhiwoZd i<+ fy;k tk;sA
8. After the completion of the examination 8. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks
candidates should leave the examination hall viuh OMR Answer Sheet miyC/k djkus ds ckn
only after providing their OMR Answer gh ijh{kk d{k ls izLFkku djsaA ijh{kkFkhZ vius lkFk
Sheet to the invigilator. Candidate can carry
their Question Booklet.
iz’u&iqfLrdk ys tk ldrs gSaA
9. There will be no negative marking. 9. fuxsfVo ekfd±x ugha gSA
10. Rough work, if any, should be done on the 10. dksbZ Hkh jQ dk;Z iz’u&iqfLrdk ds vUr esa jQ&dk;Z
blank pages provided for the purpose in the
booklet.
ds fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A
11. To bring and use of log-book, calculator, 11. ijh{kk&d{k esa ykWx&cqd] dSydqysVj] istj rFkk lsY;qyj
pager and cellular phone in examination hall Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA
is prohibited.
12. In case of any difference found in English 12. iz’u ds fgUnh ,oa vaxszth :ikUrj.k esa fHkUurk gksus dh
and Hindi version of the question, the n’kk esa iz’u dk vaxst
z h :ikUrj.k gh ekU; gksxkA
English version of the question will be held
authentic.
Impt. : On opening the question booklet, first egRoiw.kZ % iz’uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysa
check that all the pages of the question fd iz’u&iqfLrdk ds lHkh i`”B HkyhHkk¡fr Nis gq, gSaA
booklet are printed properly. If there is ny ;fn iz’uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks
discrepancy in the question Booklet, then
after showing it to the invigilator, get
fn[kkdj mlh fljht dh nwljh iz’u&iqfLrdk izkIr
another question Booklet of the same series. dj ysaA

You might also like