What are plastic cards the size of a credit card that contains an embedded chief on
which digital information can be stored?
a) Customer relationship management system cards
b) E-government identity cards
c) FEDI cards
d) Smart cards

1 Answer

Answer :

d) Smart cards

Related questions

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably using- a. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably usinga. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : In term of digital evidence , a smart card of use of example of (a) Communication system (b) Open system (c) Embedded system (d) None of above

Last Answer : (c) Embedded system

Description : E-marketers working in emerging economics should know and understand _____. a) How many credit cards are in circulation b) Consumer attitude towards credit card purchase c) All of the above d) None of the above

Last Answer : c) All of the above

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : d. None of the above

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, a Smart Card is an example of: A. Open computer systems B. Communication systems C. Embedded computer systems D. None of the above

Last Answer : C. Embedded computer systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : There are............types of Customer Relationship management (CRM) a) Four b) Three c) Seven d) Five

Last Answer : a) Four

Description : Customer Relationship Management (CRM) model is an organised approach of developing, managing and maintaining a profitable relationship with customers. a) True b) False c) Cannot say d) None of these

Last Answer : a) True

Description : Which one is also known as plastic money? a) Credit card b) Debit card c) Paper cash d) All of the above

Last Answer : a) Credit card

Description : A plastic card similar to a credit card but having some memory and a microprocessor embedded within it is a. Punched paper tape b. Chip card c. Card punch d. Magnetic tape

Last Answer : Punched paper tape

Description : A plastic card similar to a credit card but having some memory and a microprocessor embedded within it is a. Punched paper tape b. Chip card c. Card punch

Last Answer : a. Punched paper tape

Description : A plastic card similar to a credit card but having some memory and a microprocessor embedded within it is a. Punched paper tape b. Chip card c. Card punch d. Magnetic tape

Last Answer : a. Punched paper tape

Description : What type identity thieves do with your identity? a) Apply for and use credit cardsb) Apply for loan c) Change their identity d) All of the above

Last Answer : d) All of the above

Description : The evolution of customer relationship marketing has progressed from a. Mass, target, customer, to one-to-one marketing b. One-to-one, mass, target, to customer marketing c. Customer, mass, ... d. Mass, target, one-to-one, to customer marketing e. Customer relationship marketing has always existed

Last Answer : a. Mass, target, customer, to one-to-one marketing

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above

Last Answer : b. Integrity

Description : Which one is not online payment mode? a) Cash on delivery b) Debit card c) Credit card d) E-cheque

Last Answer : d) E-cheque

Description : Which one is not an E-payment method used in India a) Debit card b) Credit card c) E-cheque d) None of the above

Last Answer : d) None of the above

Description : What is the name of the card which can be used by the buyers during he time of purchase and in which the amount will be immediately debited from the buyers account? a. E-Distributor b. Debit Card c. Credit Card d. Power Card

Last Answer : b. Debit Card

Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above

Last Answer : d. All of the above

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : What type of computer is found inside the watch? a. Mini Computer b. Embedded Computer c. Micro Computer d. None of the these

Last Answer : b. Embedded Computer

Description : Which of the following statements is true? (A) Smart cards do not require an operating system. (B) Smart cards and PCs use some operating system. (C) COS is smart card operating system. (D) The communication between reader and card is in full duplex mode.

Last Answer : (C) COS is smart card operating system

Description : ......... is used to pointing / selecting the screen co-ordinates by detecting the light. A) Light Pen B) Bar Code Reader C) Digital Camera D) Smart Cards

Last Answer : A) Light Pen

Description : Crime through Internet includes: a) Telemarketing b) Internet fraud c) Identity Theft d) Credit Card account thefts e) All of the Above f) None of These

Last Answer : e) All of the Above

Description : The safeguarding brand include/s a) Discover b) Identity c) Monitor d) Above all are included

Last Answer : a) Discover

Description : The most prominent way to reinforce company brand identity on the website is known as a) Designing b) Logo c) Domain views d) None of these

Last Answer : b) Logo

Description : Travestism requires change of [A] Sexual orientation [B] Gender identity [C] Anatomy [D] Clothes

Last Answer : [B] Gender identity

Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : 8. The common name for the crime of stealing passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : In the NetBill's protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii)the vendor is guaranteed payment when information is delivered  (iii) the customer ... , ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv 

Last Answer : d. i, ii, iv

Last Answer : : About 20,000 old trees in the Mount Tai area of Shandong Province in eastern China now have digital ID cards.

Description : Your company just had a security breach and 50,000 customer credit cards were stolen, how do you handle the situation?

Last Answer : Find out what the best solution is that will protect your customers. Immediately find out who the 50,000 customers were. From there, issue a notice detailing what happened and explain ... the solution (which should be implemented immediately). Oer free credit protection services to the customers.

Description : Are the identity-theft-protection services that credit card companies repeatedly try to sell (via annoying telephone calls) effective at all?

Last Answer : Yes! They are worth it. But we don’t pay for ours. We had our identity stlen and during our recovery we were automatically put on a list where any unusual expenditures are flagged. This have been great for us.

Description : What companies, besides credit card companies, offer identity fraud protection?

Last Answer : Almost every bank and credit card service provides identity fraud protection. Any financial institution where you are placing your funds should offer you this option.

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : _________ is a combination of hardware and software that facilitates the sharing of information between computing devices. a) Network b) Peripheral c) Expansion Board d) Digital Device

Last Answer : a) Network

Description : Publishing false information in internet is an issue ofa. Computer ethics b. Morality c. Computer equity d. Digital Divide

Last Answer : a. Computer ethics

Description : Publishing false information in internet is an issue of a. Computer ethics b. Morality c. Computer equity d. Digital Divide

Last Answer : a. Computer ethics

Description : Plastic at the Pump- A Guide to Gas Credit Cards?

Last Answer : It is not a secret that gas prices are on the rise. Carpooling,fuel efficient vehicles and simply driving less are all solutionsthat some have tried to save money on fuel. However, if ... while still giving double cash back rewards onALL gas stations and restaurants. Unlike many gas credit ca

Description : Which of the following is known as plastic money ? 1. bearer cheques 2. credit cards 3. demand dreafts 4. gift cheques 5. None of these

Last Answer : credit cards