E-commerce

E-commerce, or electronic commerce, refers to buying and selling goods or services online. It involves transactions conducted over the internet through websites or apps. E-commerce includes online shopping, digital payments, online auctions, and internet banking, transforming traditional business models worldwide.

1. What is the full form of EDI?
A) Electronic Data Interchange ✅
B) Electronic Direct Interchange
C) Electronic Data Information
D) Electronic Data Interconnection

2. What is the abbreviation of CGI?
A) Computer Gateway Interface
B) Common Gateway Interface ✅
C) Computer Gateway Interconnection
D) Common Gateway Interconnection

3. Which type of E-Commerce is payment Gateway?
A) B2B
B) B2C
C) G2C ✅
D) G2B

4. Which type of E-Commerce is tenders and submission of application?
A) B2B
B) B2C
C) G2C
D) G2B ✅

5. Which type of E-Commerce is Amazon?
A) B2B
B) B2C ✅
C) G2B
D) G2C

6. What is the full form of ATM?
A) Any Time Money
B) Automated Transaction Management
C) Automated Teller Machine ✅
D) None of them

7. What is called sale or purchase of items without physically visiting a shop?
A) E-Commerce ✅
B) POS
C) Traditional Commerce
D) E-Service

8. Which scope of E-Commerce business platforms like Amazon, eBay, etc?
A) National
B) Local
C) Global ✅
D) Virtual

9. What is the full form of COD in E-Commerce?
A) Cash on Delivery ✅
B) Cash on Demand
C) Commerce on Delivery
D) Cart on Delivery

10. Which one is an E-Commerce site?
A) Yahoo
B) Bing
C) Google
D) Amazon ✅

11. Which one is an online payment?
A) Flipkart
B) Paytm ✅
C) Gmail
D) Reliance Jio

12. Which type of attack is a method of defeating a cryptographic scheme by trying a large number of possibilities?
A) Teardrop attack
B) Brute force attack ✅
C) Phlashing
D) Smurf attack

13. Which is the model in E-Commerce, if the seller and buyer are both business firms?
A) Consumer to Business
B) Business to Consumer
C) Business to Business ✅
D) Consumer to Consumer

14. Which is the model in E-Commerce, if the seller is a business and the individual is a consumer?
A) Consumer to Business
B) Business to Consumer ✅
C) Business to Business
D) Consumer to Consumer

15. Which is the model in E-Commerce, if the seller is an individual and the buyer is a business firm?
A) Consumer to Business ✅
B) Business to Consumer
C) Business to Business
D) Consumer to Consumer

16. Which is the model in E-Commerce, if the seller and the buyer are both individuals?
A) Consumer to Business
B) Business to Consumer
C) Business to Business
D) Consumer to Consumer ✅

17. Which option in E-Commerce helps to keep selected products until checkout/payment?
A) Basket
B) Cart ✅
C) Tray
D) COD

18. Which is the function of specifying access rights to resources related to information security?
A) OTP
B) PIN
C) Authorization ✅
D) Passcode

19. Which refers to paying the money back to the buyer after the price has been deducted from the account?
A) Refund ✅
B) Return
C) Deduction
D) Chargeback

20. Which card permits online payment using balance amount available in the bank account?
A) Credit card
B) PayPal
C) Debit card ✅
D) Wallet

21. Which is the set of rules that limits access to information?
A) Availability
B) Integrity
C) Authenticity
D) Confidentiality ✅

22. Which is the process of ensuring the data, transactions, communication, or documents are genuine?
A) Availability
B) Integrity
C) Authenticity ✅
D) Confidentiality

23. What is the purpose of the OLX website?
A) Uploading Files
B) Buying and selling products ✅
C) Searching Documents
D) Recovering files

24. Which of the following authenticates and handles credit card payment for E-Commerce?
A) Payment gateway ✅
B) E-Commerce gateway
C) Software gateway
D) E-Wallets

25. What is another name for PDoS?
A) Brute force attack
B) Non-technical attack
C) Phlashing ✅
D) Smurf attack

26. Example of an online marketplace is ________.
A) eBay ✅
B) Snapdeal
C) Flipkart
D) All of them

27. Which one is not a cyber security threat?
A) Virus
B) Hacking
C) Firewalls ✅
D) Phishing

28. Which is an example of a cyber crime?
A) Online Shopping
B) Sending Emails
C) Phishing ✅
D) Video Calling

29. Which is a strong password example?
A) password123
B) 12345678
C) P@ssw0rd#2025 ✅
D) qwerty

30. What is the purpose of antivirus software?
A) Speed up internet
B) Detect and remove malware ✅
C) Design websites
D) Backup files

31. Which of the following is a cyber attack?
A) Data Encryption
B) Denial of Service (DoS) ✅
C) Software Installation
D) Creating a Folder

32. What does SSL stand for in E-Commerce?
A) Secure Software Login
B) System Security Layer
C) Secure Sockets Layer ✅
D) Secure Server Link

33. Which tool helps protect a computer from unauthorized access?
A) Scanner
B) Printer
C) Firewall ✅
D) Monitor

34. Which of the following is used for secure online communication?
A) HTTP
B) FTP
C) HTTPS ✅
D) WWW

35. Which of the following is a form of cyberbullying?
A) Sending money online
B) Sending threatening messages ✅
C) Online banking
D) Cloud storage

36. Which component of cyber security ensures information is not altered?
A) Availability
B) Integrity ✅
C) Confidentiality
D) Accessibility

37. Which is the process of converting data into a coded form?
A) Compression
B) Encryption ✅
C) Formatting
D) Scanning

38. Which of the following is an example of identity theft?
A) Using your own ID online
B) Using someone else’s personal details without permission ✅
C) Creating a Facebook account
D) Saving passwords

39. Which file extension usually indicates a virus or malware?
A) .docx
B) .jpg
C) .exe ✅
D) .html

40. Which is a safe practice for online banking?
A) Using public Wi-Fi
B) Sharing passwords
C) Clicking unknown links
D) Logging out after use ✅