E-commerce
E-commerce, or electronic commerce, refers to buying and selling goods or services online. It involves transactions conducted over the internet through websites or apps. E-commerce includes online shopping, digital payments, online auctions, and internet banking, transforming traditional business models worldwide.
1. What is the full form of EDI?
A) Electronic Data Interchange ✅
B) Electronic Direct Interchange
C) Electronic Data Information
D) Electronic Data Interconnection
2. What is the abbreviation of CGI?
A) Computer Gateway Interface
B) Common Gateway Interface ✅
C) Computer Gateway Interconnection
D) Common Gateway Interconnection
3. Which type of E-Commerce is payment Gateway?
A) B2B
B) B2C
C) G2C ✅
D) G2B
4. Which type of E-Commerce is tenders and submission of application?
A) B2B
B) B2C
C) G2C
D) G2B ✅
5. Which type of E-Commerce is Amazon?
A) B2B
B) B2C ✅
C) G2B
D) G2C
6. What is the full form of ATM?
A) Any Time Money
B) Automated Transaction Management
C) Automated Teller Machine ✅
D) None of them
7. What is called sale or purchase of items without physically visiting a shop?
A) E-Commerce ✅
B) POS
C) Traditional Commerce
D) E-Service
8. Which scope of E-Commerce business platforms like Amazon, eBay, etc?
A) National
B) Local
C) Global ✅
D) Virtual
9. What is the full form of COD in E-Commerce?
A) Cash on Delivery ✅
B) Cash on Demand
C) Commerce on Delivery
D) Cart on Delivery
10. Which one is an E-Commerce site?
A) Yahoo
B) Bing
C) Google
D) Amazon ✅
11. Which one is an online payment?
A) Flipkart
B) Paytm ✅
C) Gmail
D) Reliance Jio
12. Which type of attack is a method of defeating a cryptographic scheme by trying a large number of possibilities?
A) Teardrop attack
B) Brute force attack ✅
C) Phlashing
D) Smurf attack
13. Which is the model in E-Commerce, if the seller and buyer are both business firms?
A) Consumer to Business
B) Business to Consumer
C) Business to Business ✅
D) Consumer to Consumer
14. Which is the model in E-Commerce, if the seller is a business and the individual is a consumer?
A) Consumer to Business
B) Business to Consumer ✅
C) Business to Business
D) Consumer to Consumer
15. Which is the model in E-Commerce, if the seller is an individual and the buyer is a business firm?
A) Consumer to Business ✅
B) Business to Consumer
C) Business to Business
D) Consumer to Consumer
16. Which is the model in E-Commerce, if the seller and the buyer are both individuals?
A) Consumer to Business
B) Business to Consumer
C) Business to Business
D) Consumer to Consumer ✅
17. Which option in E-Commerce helps to keep selected products until checkout/payment?
A) Basket
B) Cart ✅
C) Tray
D) COD
18. Which is the function of specifying access rights to resources related to information security?
A) OTP
B) PIN
C) Authorization ✅
D) Passcode
19. Which refers to paying the money back to the buyer after the price has been deducted from the account?
A) Refund ✅
B) Return
C) Deduction
D) Chargeback
20. Which card permits online payment using balance amount available in the bank account?
A) Credit card
B) PayPal
C) Debit card ✅
D) Wallet
21. Which is the set of rules that limits access to information?
A) Availability
B) Integrity
C) Authenticity
D) Confidentiality ✅
22. Which is the process of ensuring the data, transactions, communication, or documents are genuine?
A) Availability
B) Integrity
C) Authenticity ✅
D) Confidentiality
23. What is the purpose of the OLX website?
A) Uploading Files
B) Buying and selling products ✅
C) Searching Documents
D) Recovering files
24. Which of the following authenticates and handles credit card payment for E-Commerce?
A) Payment gateway ✅
B) E-Commerce gateway
C) Software gateway
D) E-Wallets
25. What is another name for PDoS?
A) Brute force attack
B) Non-technical attack
C) Phlashing ✅
D) Smurf attack
26. Example of an online marketplace is ________.
A) eBay ✅
B) Snapdeal
C) Flipkart
D) All of them
27. Which one is not a cyber security threat?
A) Virus
B) Hacking
C) Firewalls ✅
D) Phishing
28. Which is an example of a cyber crime?
A) Online Shopping
B) Sending Emails
C) Phishing ✅
D) Video Calling
29. Which is a strong password example?
A) password123
B) 12345678
C) P@ssw0rd#2025 ✅
D) qwerty
30. What is the purpose of antivirus software?
A) Speed up internet
B) Detect and remove malware ✅
C) Design websites
D) Backup files
31. Which of the following is a cyber attack?
A) Data Encryption
B) Denial of Service (DoS) ✅
C) Software Installation
D) Creating a Folder
32. What does SSL stand for in E-Commerce?
A) Secure Software Login
B) System Security Layer
C) Secure Sockets Layer ✅
D) Secure Server Link
33. Which tool helps protect a computer from unauthorized access?
A) Scanner
B) Printer
C) Firewall ✅
D) Monitor
34. Which of the following is used for secure online communication?
A) HTTP
B) FTP
C) HTTPS ✅
D) WWW
35. Which of the following is a form of cyberbullying?
A) Sending money online
B) Sending threatening messages ✅
C) Online banking
D) Cloud storage
36. Which component of cyber security ensures information is not altered?
A) Availability
B) Integrity ✅
C) Confidentiality
D) Accessibility
37. Which is the process of converting data into a coded form?
A) Compression
B) Encryption ✅
C) Formatting
D) Scanning
38. Which of the following is an example of identity theft?
A) Using your own ID online
B) Using someone else’s personal details without permission ✅
C) Creating a Facebook account
D) Saving passwords
39. Which file extension usually indicates a virus or malware?
A) .docx
B) .jpg
C) .exe ✅
D) .html
40. Which is a safe practice for online banking?
A) Using public Wi-Fi
B) Sharing passwords
C) Clicking unknown links
D) Logging out after use ✅