Description : EDI standard a. is not easily available b. defines several hundred transaction sets for various business forms c. is not popular d. defines only a transmission protocol
Last Answer : b. defines several hundred transaction sets for various business forms
Description : EDI over internet uses a. MIME to attach EDI forms to e-mail messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms
Last Answer : a. MIME to attach EDI forms to e-mail messages
Description : EDIFACT standard was developed by a. American National Standard Institute b. International Standard Institute c. European Common Market d. United Nations Economic Commission for Europe
Last Answer : d. United Nations Economic Commission for Europe
Description : In B2B e-Commerce (i) Co-operating Business should give an EDI standard to be used (ii) Programs must be developed to translate EDI forms to a form accepted by application program (iii) Method of transmitting/receiving data should be ... . i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : b. i, ii, iii
Description : Advantages of B2C commerce are (i) Business gets a wide reach to customers (ii) Payment for services easy (iii)Shop can be open 24 hours a day seven days a week (iv)Privacy of transaction always maintained a. i and ii b. ii and iii c. i and iii d. iii and iv
Last Answer : c. i and iii
Description : The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services
Last Answer : a. credit card payment
Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.
Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.
Description : B2C commerce a. includes services such as legal advice b. means only shopping for physical goods c. means only customers should approach customers to sell d. means only customers should approach business to buy
Last Answer : a. includes services such as legal advice
Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : a. i and ii
Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce
Last Answer : c. filters packets travelling from and to the intranet from the internet
Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv
Last Answer : It's D
Description : Electronic Data Interchange is necessary in a. B2C e-Commerce b. C2C e-Commerce c. B2B e-Commerce d. Commerce using internet
Last Answer : c. B2B e-Commerce
Description : Disadvantages of e-Commerce in India are (i) internet access is not universally available (ii) Credit card payment security is not yet guaranteed (iii) Transactions are de-personalized and human contact is missing (iv) Cyberlaws ... i and ii b. ii and iii c. i, ii, iii d. i, ii, iii, iv
Last Answer : c. i, ii, iii
Description : For carrying out C2C e-Commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)Secure electronic communication link ... a. i and ii b. ii and iv c. i and iii d. i and iv
Description : For carrying out B2C e-Commerce the following infrastructure is essential (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v) Secure electronic communication link ... . i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv
Last Answer : a. i, iv
Description : For carrying out B2B e-Commerce the following infrastructure is essential: (i) World Wide Web (ii) Corporate network (iii) Electronic Data Interchange standards (iv) Secure Payment Services (v)Secure electronic communication link ... . ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v
Last Answer : c. ii, iii, iv, v
Description : EDI standards are a. not universally available b. essential for B2B commerce c. not required for B2B commerce d. still being evolved
Last Answer : b. essential for B2B commerce
Description : Advantages of B2C commerce to customers are (i)wide variety of goods can be accessed and comparative prices can be found (ii) shopping can be done at any time (iii)privacy of transactions can be guaranteed (iv) ... be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv
Description : By Electronic Commerce we mean: a. Commerce of electronic goods b. Commerce which depends on electronics c. Commerce which is based on the use of internet d. Commerce which is based on transactions using computers connected by telecommunication network
Last Answer : d. Commerce which is based on transactions using computers connected by telecommunication network
Description : EDI requires a. representation of common business documents in computer readable forms b. data entry operators by receivers c. special value added networks d. special hardware at co-operating Business premises
Last Answer : a. representation of common business documents in computer readable forms
Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv
Description : In the NetBill's protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii)the vendor is guaranteed payment when information is delivered (iii) the customer ... , ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv
Last Answer : d. i, ii, iv
Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys
Last Answer : c. his private key using his signature hardware
Description : The bank has to have the public keys of all customers in SET protocol as it has to a. check the digital signature of customers b. communicate with merchants c. communicate with merchants credit card company d. certify their keys
Last Answer : a. check the digital signature of customers
Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers
Last Answer : c. the bank has to keep a database of the public keys of all customers
Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system
Last Answer : d. using digital Signature system
Description : In SET protocol a customer encrypts credit card number using a. his private key b. bank’s public key c. bank’s private key d. merchant’s public key
Last Answer : b. bank’s public key
Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Description : The acronym DES stands for a. Digital Evaluation System b. Digital Encryption Standard c. Digital Encryption System d. Double Encryption Standard
Last Answer : b. Digital Encryption Standard
Description : ANSI X.12 is a standard developed by a. American National Standard Institute b. International Standard Institute c. European Common Market d. United Nations Economic Commission for Europe
Last Answer : a. American National Standard Institute
Description : What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? a. internet commerce b. e-commerce c.transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Description : In electronic cheque payments developed, it is assumed that most of the transactions will be a. customers to customers b. customers to business c. business to business d. banks to banks
Last Answer : c. business to business
Description : Certification of Digital signature by an independent authority is needed because a. it is safe b. it gives confidence to a business c. the authority checks and assures customers that the public ... business which claims its ownership d. private key claimed by a sender may not be actually his
Last Answer : c. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : d. i and iv
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
Last Answer : SMTP
Description : .............. is a protocol used by e-mail clients to download emails to your computer. (A) TCP (B) FTP (C) SMTP (D) POP
Last Answer : Answer: D
Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP
Last Answer : d. SMTP
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP
Last Answer : A. SMTP
Description : Which protocol is commonly used to retrieve email from a mail server? a) FTP b) IMAP c) HTML d) TELNET
Last Answer : b) IMAP
Description : In Electronic cash payment (i) a customer withdraws “coins” in various denominations signed by the bank (ii)the bank has a database of issued coins (iii) the bank has a database of spent coins (iv) the bank cannot trace a customer a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Description : In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions
Last Answer : b. a customer buys several electronic coins which are digitally signed by coin issuing bank
Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES
Last Answer : c. public keys of subscribers
Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption
Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption
Description : Hashed message is signed by a sender using a. his public key b. his private key c. receiver’s public key d. receiver’s private key
Last Answer : b. his private key
Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv
Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender
Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows
Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it
Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message
Last Answer : a. if B knows it is from A he can decrypt it using A’s public key