Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

30501.

Write your own role to prevent the child marriage.

Answer»

We will meet parents and children to make them convinced of the drawbacks of the early marriage as— 

1. Early marriages leave adverse effect on the physical and mental health of both the sexes. 

2. Children married at an early age are burdened with responsibilities and liabilities for which they are not yet matured enough. 

3. They are hard pressed even financially and find it hard to meet two ends meet. 

4. The period of progeny increases and as a result the size of the families grows, leaving further impact on the health of the females and mental set up of the males. 

By narrating this negative effect of the early marriages we can help to create an atmosphere unfavourable for the early marriages.

30502.

What was the aim of establishing Walter Hitakarini Sabha?

Answer»

Walter Hitakarini Sabha was created with the following aims— 

1. To abolish completely the polygamy system. 

2. To fix marriage age for girls (14 years) and for boys (18 years) 

3. To impose complete ban on the marriage related rituals as Reet and Tika.

30503.

What were the types of slaves in Rajputana?

Answer»

There used to be four types of slaves in Rajasthan: 

1. Both males and females who were the prisoners of war. 

2. Males and females gifted as dowry in marriage. 

3. Local sevaks (male attendent) and Sevikas (female attendants). 

4. Ancestral attendants (males and females) who were the illegitimate offspring of their lord (master). Their generations (descendants) continued the practice of master and servant through ages.

30504.

What were the two aims of the Desh Hiteshini Sabha?

Answer»

Aims of the Desh Hiteshini Sabha were: 

1. To limit the marriage expense and 

2. To frame rules to ban polygamy.

30505.

What steps were taken to check the witch practice in the 19th century?

Answer»

The British officers discouraged the witch practice. In 1853 A.G.G. (Agent to Governor General) pressurised the rulers to enact a law to ban this inhumane practice. In 1853 the Mewar Maharan, Jawan Singh declared the witch practice illegal, on the advice of Mewar Resident, Col. Eden.

30506.

Why could the Walter Hitakarini Sabha’s reform not be enforced?

Answer»

Many steps for the social reforms were taken by the Walter Hitakarini Sabha but they could not be effective. They got stuck in the Bureaucratic tables and could not be enforced successfully. Bureaucratic system posed a major problem.

30507.

For which society was, first of all, the British Agent pressurised by Maharana to enact the anti female infanticide act?

Answer»

Maharana pressurised the British government to enact the anti-female infanticide act for the Rajputana samaj.

30508.

What attempts were made in the direction of social reforms during the period of the British Supremacy?

Answer»

During the period of the British Supremacy efforts were made for the social reforms in the following direction:

1. The British created a favourable atmosphere through administrative, judicial, economic, religious and educational changes and motivated the people in the right direction. 

2. Social reformers like Swami Vivekanand and Swami Dayanand Saraswati played a major role in curbing the social evils. 

3. Between 1919-1947 the social reforms became a part of the political movement.

30509.

Write the names of two prominent social reformers of India?

Answer»

Two prominent social reformers of India:

1. Swami Vivekanand and 

2. Swami Dayanand Saraswati

30510.

The British Supremacy period is the- (a) Post 1919 period (b) Post 1857 period (c) Pre 1919 period (d) Pre 1857 period

Answer»

(b) Post 1857 period

30511.

Social Reforms activities were conducted between 1919-1947 under the directions of-(a) Swami Dayanand (b) Swami Vivekanand (c) Political movement (d) Walter Hitakarini Sabha

Answer»

(c) Political movement

30512.

Charles Wood was designated the Secretary for India in- (a) 1881 (b) 1882 (c) 1895 (d) 1981

Answer»

Charles Wood was designated the Secretary for India in 1881.

30513.

Which two rulers of the medieval period attempted to curb the Sati Pratha?

Answer»

Muhammad-Bin-Tuglaq and Akbar attempted to curb the Sati Pratha practice in the medieval period.

30514.

Trademark is an intellectual property.

Answer»

True 

Copyright, patents and trademarks are the intellectual property.

30515.

In one of its decisions the Rajasthan High Court declared Sati Pratha illegal in- (a) Sept. 1987 (b) Sept. 1978 (c) Oct. 1978 (d) Oct. 1987

Answer»

(a) Sept. 1987

30516.

Lord William Bentick got an inspiration to pass the Sati abolition act from- (a) Swami Vivekanand (b) Pt. Madan Mohan Malviya (c) Swami Dayanand Sarswati (d) Raja Ram Mohan Roy

Answer»

(d) Raja Ram Mohan Roy

30517.

Name the British officiai who sent an order to the rulers of Kota, Bundi and Jhalawar to declare Sati Pratha illegal?

Answer»

Captain Richardson sent a circular (order) to the rulers of Kota, Bundi and Jhalawar to declare Sati Pratha illegal.

30518.

What makes Khadi and Handloom sector of the textile industry still very important even in this modern large-scale industrial era? Give two reasons.

Answer»

Khadi and Handloom textiles produce durable and colourful patterns which are cheap when compared with the products of the modern large scale industries. 

The reasons for their importance are: 

(i) They bring pride to the country. 

(ii) They provide money to the workers.  

30519.

Which of the following does not characterise business activity? (i) Production of goods and services (ii) Presence of risk (iii) Sale or exchange of goods and services (iv) Salary or wages 

Answer»

(iv) Salary or wages

30520.

The President of India is elected by:(a) The Electoral College(b) The Legislative Assemblies(c) The Parliament(d) The People

Answer»

Correct option is (a) The Electoral College

30521.

Which of the broad categories of industries covers oil refinery and sugar mills? (i) Primary (ii) Secondary (iii) Tertiary (iv) None of them

Answer»

The Right option is :(i) Primary 

30522.

Which of the broad categories of industries covers oil refinery and sugar mills?(a) Primary(b) Secondary(c) Tertiary(d) None of them

Answer»

(b) Secondary

30523.

Which of the following cannot be classified as an auxiliary to trade? (a) Mining (b) Insurance (c) Warehousing (d) Transport

Answer»

Mining cannot be classified as an auxiliary to trade.

30524.

The industries which provide support services to other industries are known as (a) Primary industries . (b) Secondary industries (c) Commercial industries (d) Tertiary industries

Answer»

Correct Answer is: (d) Tertiary industries

30525.

‘The occupation in which people work for others and get remunerated in return is known as (a) Business (b) Employment (c) Profession (d) None of them

Answer»

Correct Answer is:(b) Employment

30526.

The occupation in which people work for others and get remunerated in return is known as (i) Business (ii) Employment (iii) Profession (iv) None of them

Answer»

(ii) Employment

30527.

Why company decisions get delayed?

Answer»

Company needs to hold meetings of Board of Directors for taking major decisions. For this it needs to inform the company members in advance. Moreover, there might be differences among directors. All these consumes a lot of time.

30528.

Between a Website and Payment Processor there is a _______.(A) Payment  Gateway(B) Credit Card Association(C) Credit Card Issuing Bank

Answer»

Between a Website and Payment Processor there is a Payment  Gateway.


Between a Website and Payment Processor there is a Payment Gateway .

Because In the payment gateway, it asks about the Mode of Payment options
30529.

Identity which is not a security technology in Ecommerce transaction.(a) Encryption(b) Authentication technology(c) Authentication protocol(d) Integrity

Answer»

(d) Integrity

30530.

List the different types of security technologies in ECommerce?

Answer»

1. Encryption technology is an effective information security protection.

2. It is defined as converting a Plaintext into meaningless Ciphertext using encryption algorithm thus ensuring the confidentiality of the data.

3. The encryption or decryption process use a key to encrypt or decrypt the data.

30531.

Write a short note on: Payment Processor. 

Answer»
  • Payment Processors are the link between payment gateway and the Card Associations such as Visa / Mastercard / Amex.
  • They provide e‐payment processing services for merchants who accept online payments. 
  • Payment Processors provide the merchants with a simple, secure and cost effective mechanism for online payments.
  • They provide multi method services with the help of different connectivity mechanisms.
  • The task of the payment processor is to collect the card information from the payment gateway and forward it to the card association.
  • Once the payment is authorized, they again collect the information from the card association and give it back to the payment gateway. 
  • ‘Paynet’ and ‘Paypal’ are the well known payment processors. 
30532.

Write short note on the following: Online transactions

Answer»

Online transactions enable customers to conduct trade from anywhere in the world and at anytime through the mode of internet. 

The following are the various steps involved in online trading: 

Step 1: Find an appropriate and reliable shopping website and register with it so as to be able to conduct the trade activities. 

Step 2: Browse through the various products available with the site, select the desired ones and place the final order. 

Step 3: Proceed to the payment window and choose a suitable mode of payment out of the various options available such as cash on delivery, cheque, net banking, credit or debit cards and digital cash.

30533.

How does outsourcing represent a new mode of business?

Answer»

Outsourcing represents a new mode of business. It is fast becoming an emerging mode of business. Firms have started increasingly outsourcing one or more of their processes which can be efficiently and effectively carried on by others. Outsourcing can be qualified as emerging mode of business because its acceptance is increasing as a fundamental business policy and philosophy, as opposed to the earlier philosophy of doing it all by yourself.

30534.

Write a short note on Secure Socket Layer (SSL).

Answer»
  • Secure Socket Layers (SSL) was developed by the company ‘Netscape’ in the nineties for transmitting private documents over the Internet. 
  • SSL is a standard security technology for establishing an encrypted link, or a secure connection, between a server and a client. 
  • SSL allows sensitive information such as credit card numbers, social security numbers and login credentials to be transmitted securely.
  • The encryption is done using mathematical programmes or protocols which use logical reasoning.

SSL is the most widely deployed security protocol used today. SSL is used in today’s modern e‐commerce enabled / online workflow and service society in the following ways:

  • To secure online credit card transactions.
  • To secure system logins and any sensitive information exchanged online.
  • To secure webmail and applications like Outlook Web Access, Exchange and Office Communications Server.
  • To secure the connection between an email client such as Microsoft Outlook and an email server such as Microsoft Exchange.
  • To secure the transfer of files over https and FTP(s) services such as website owners updating new pages to their websites or transferring large files.
  • To secure internet based traffic file sharing, extranets.
  • To secure network logins.  

Any website which uses SSL security has URL as https://www.xyz.com rather than http://www.xyz.com . Further as a proof that the website is secured by SSL, the SSL logo is placed at the bottom left of the website.  

30535.

Write short note on the following: Business to Consumer (B to C)

Answer»

B to C or business to consumer refers to transactions that take place between a business firm and the customers. In other words, B to C includes transactions where a business firm sells to consumers, the goods and services fit for final consumption. B to C e-commerce transactions include not only activities such as sale or purchase of goods and services but also marketing activities that can be conducted online, for example, pre-sale activities (such as promoting products through advertisements), pre-sale services (such as providing product information and cash-on-delivery services) and post-sale services (such as customer care services).

30536.

Write short note on the following: E-business

Answer»

E-business refers to the business activities that take place online or through the web. It is primarily derived from the terms ‘email’ and ‘e-commerce’; however, it is a broader concept compared to e-commerce, as e-commerce deals with only the trading aspect of online business. E-business, on the other hand, includes various other business activities such as manufacturing, buying, selling and management of the whole business through the internet. Moreover, e-business offers many other advantages over traditional business like low set-up cost, easy formation and wider reach in the market.

30537.

By which act government checks restrictive trade? A. Industrial Policy Act 1991 B. MRTPAct C. FEMAact D. None of these

Answer»

Correct Answer is: B. MRTPAct

30538.

Describe briefly any two applications of E-business.

Answer»

Two applications of E-business are discussed below: 

1. e-Procurement: It involves internet based sales transactions between business firms including both, “reverse auctions” that facilitate online trade between a single business purchaser and many sellers, and, digital market places that facilitate online trading between multiple byers.

2. e-Delivery: It includes electronic delivery of computer software, photographs, videos, books (e-journals) and other multimedia content to the other’s computer. It also includes rendering of legal, accounting, medical and other consulting services electronically. In fact, internet provides the firms with the opportunities for outsourcing of a host of Information Technology Enabled Services (ITES).

30539.

E-business and E-commerce are: (a) Synonyms (b) Antonyms (c) Former is wider than latter (d) Former is narrow than latter.

Answer»

(c) Former is wider than latter 

30540.

Give the full form of VIRUS?

Answer»

Vital Information under Siege.

30541.

Discuss the limitations of electronic mode of doing business. Are these limitations severe enough to restrict its scope? Give reasons for your answer.

Answer»

e-business has its otyn limitations as discussed below:

(i) Low Personal Touch e-business lacks the warmth of interpersonal interactions and personal touch for satisfaction of customer. Thus, it is relatively less suitable mode of business for product categories requiring personal touch for convincing the customers such as garments, etc.

(ii) Incongruence between Order Taking/Giving and Order Fulfillment Speed In e-business orders can be placed at the click of a mouse, but the physical delivery of the product takes time. Customers are sometimes not patient enough to bear with this incongruence. At times the users even get frustrated due to technical reasons when web sites take unusually long time to open.

(iii) Need for Technology Capability and Competence of Parties to e-business e-business requires the parties to be fairly familiar with computers and internet. The digital divide has thus limited the use of e-business.

(iv) Increased Transaction Risk Internet transactions occur between cyber personalities and it is difficult to establish the identity of the parties or know the location from where the parties may be operating, e-business is also risky due to additional hazards of impersonation and leakage of confidential information such as credit card details. Problems of ‘virus’ attacks and ‘hacking’ also pose security concerns in ebusiness.

(v) Resistance to Change The process of adjustment to new technology and new way of doing things causes stress and a sense of insecurity due to change. As a result, people may resist a change from traditional business to e-business.

(vi) Ethical Fallouts Companies use an ‘electronic eye to keep track of the computer files, e-mail account and the websites visited by their employees or others who use their network systems which is not considered right on ethical grounds. But most of the limitations of e-business discussed above are in the process of being overcome. Websites are becoming more and more interactive to overcome the problem of ‘low touch. Speed and quality of communication through internet is being improved through communication technology innovations.

Efforts are on to overcome the digital divide through setting up of community tele-centres in villages and rural areas with the involvement of government agencies, NGOs and international institutions. Thus, we can say that despite limitations, e-business is here to stay and bring a positive change in the businesses, governance and the economies.

30542.

Write a short note on the scope of e-business.

Answer»

Scope of e-business is very wide. It is summarized below:

1. B2B Commerce: Business to Business—Both the parties are business firms, e.g. Manufacturer of an automobile requires assembly of a large number of components which are being manufactured by different firms; Maruti Udyog, Bajaj Auto etc. use B2B commerce. 

2. B2C Commerce: Business to Customer—Transaction taking place between business and individual customers. It facilitates promotion of products on line. e.g. music or film. Companies sell products and services on line to customer e.g. Amul.com sell Amul products online.

3. Intra – B. Commerce: Parties involved are from within a given business firm. It makes it possible for the marketing department to interact constantly with the production department to get information about customer requirement. 

4. C2C Commerce: Consumer to consumer—Business originates from the consumer and the ultimate destination is also consumer. Its area of application is the formation of consumer forum, e.g. selling used books over the internet.

30543.

When a customer claims that he has made payment but the seller does not get it, it is called: (a) Default on Delivery (b) Default on Order Taking (c) Bed Debts (d) Default on Payment

Answer»

(d) Default on Payment

30544.

What is hacking in e-business?

Answer»

Hacking means unauthorised entry into a website. Hackers destroy the data and interrupt the messages sent on internet. They interpret confidential information. They misuse such information or modify and even destroy its contents to harm the parties.

30545.

Differentiate between traditional business and e-business.

Answer»

Differences between traditional business and e-business is summarized below:

BasisTraditional businesse-business
1.Formation Difficultsimple
2.physical presenceRequiredNot required
3.Location requirementMarketNone
4.cost of setting upHighLow/no requirement of physical facility
5.Shape of organizational structure vertical due to hierarchy or chain of commandHorizontal due to directness of command and communication
6.opportunity for inter personal touchMoreLess
7.Ease of expansionMoreLess
8.Nature of contact with the suppliers and customersIndirect through intermediaries Direct 

30546.

Describe briefly the data storage and transmission risks in E-business.

Answer»

In the present century, information is acting as power. If the relevant information of the business reaches into wrong hands, it may create a lot of loss for the company concerned. There is a risk of en route being stolen or modified by wrong people for their selfish motives. It is exposed to the risk of VIRUS and hacking. VIRUS stands for Vital Information Under Seize. Installing and timely updating anti virus programmes and scanning the files and disks with them provides protection to the files, folders and systems from the attack of virus. Another risk involved is interception of data in the course of transmission. To protect data against this, cryptography is used. Cryptography refers to the art of protecting information by transforming it into an unreadable format called ‘cyphertext’. Thereafter only those who have a secret key can decrypt the message into ‘plaintext’. It is like coding and decoding.

30547.

Ethics is important for a. Top management b. Middle-level managers c. Non-managerial employees d. Air pollution

Answer»

Correct Answer is: d. Air pollution

30548.

Explain the transaction and data storage and transmission risks of e-business.

Answer»

The various risks involved in online transactions are:

I. Transaction Risks:

  • Default on Order Giving or order taking: Default on order giving or order taking is one of the transaction risks associated with e-business. 
  • Default on Order Giving or Order Taking: Default on order giving or order taking is one of the transaction risks associated with e-business. 
  • Default on Payment: Default on payment is yet another transaction risk. The customer may claim that the payment was made, but the seller might not have got the payment for the goods supplied.

II Data Storage and Transmission Risks: Data storage and transmission risks also are involved in e-business.

Data stored by computer systems is exposed to several risks. Those risks are:

  • People may steal or distort the data for selfish motives or just for fun. 
  • VIRUS (Vital Information under Siege) and hacking are well known threats.

The data storage and transmission risks can be controlled by installing anti-virus programmes and updating them from time to time.

III. Risks to Intellectual Property and Privacy: Internet is a open space, anybody can copy the data and supply it to others. Lot of advertising and promotional literature may be dumped into our email box. Such junk mail is a great problem. E-business can succeed only when both buyers’ and sellers trust the system of exchange. This trust can be generated by ensuring security of e-business transactions.

30549.

Which of the following is used to handle data storage risk? (a) VIRUS (b) Hacking (c) Cryptography (d) All of the Above

Answer»

(c) Cryptography 

30550.

BPO ———cost and———- excellence. (a) Reduces, Reduces (b) Increases, Increases (c) Reduces, Increases (d) Increases, Reduces

Answer»

(c) Reduces, Increases