In Electronic cash payment

a. a debit card payment system is used

b. a customer buys several electronic coins which are digitally signed by coin issuing bank

c. a credit card payment system is used

d. RSA cryptography is used in the transactions 

1 Answer

Answer :

b. a customer buys several electronic coins which are digitally signed by coin issuing bank 

Related questions

Description : In Electronic cash payment (i) a customer withdraws “coins” in various denominations signed by the bank (ii)the bank has a database of issued coins (iii) the bank has a database of spent coins (iv) the bank cannot trace a customer a. i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv 

Last Answer : b. i, ii, iii 

Description : The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services 

Last Answer : a. credit card payment  

Description : Disadvantages of e-Commerce in India are  (i) internet access is not universally available  (ii) Credit card payment security is not yet guaranteed  (iii) Transactions are de-personalized and human contact is missing  (iv) Cyberlaws ... i and ii b. ii and iii c. i, ii, iii d. i, ii, iii, iv

Last Answer : c. i, ii, iii  

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : In the NetBill's protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii)the vendor is guaranteed payment when information is delivered  (iii) the customer ... , ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv 

Last Answer : d. i, ii, iv

Description : In SET protocol a customer encrypts credit card number using a. his private key b. bank’s public key c. bank’s private key d. merchant’s public key 

Last Answer : b. bank’s public key  

Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys

Last Answer : c. his private key using his signature hardware  

Description : In electronic cheque payments developed, it is assumed that most of the transactions will be a. customers to customers b. customers to business c. business to business d. banks to banks

Last Answer : c. business to business

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : By Electronic Commerce we mean: a. Commerce of electronic goods b. Commerce which depends on electronics c. Commerce which is based on the use of internet d. Commerce which is based on transactions using computers connected by telecommunication network

Last Answer : d. Commerce which is based on transactions using computers connected by telecommunication network

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : The bank has to have the public keys of all customers in SET protocol as it has to a. check the digital signature of customers b. communicate with merchants c. communicate with merchants credit card company d. certify their keys 

Last Answer : a. check the digital signature of customers 

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : For carrying out C2C e-Commerce the following infrastructure is essential  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v)Secure electronic communication link ... a. i and ii b. ii and iv c. i and iii d. i and iv

Last Answer : c. i and iii  

Description : For carrying out B2C e-Commerce the following infrastructure is essential  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v) Secure electronic communication link ... . i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv

Last Answer : a. i, iv

Description : For carrying out B2B e-Commerce the following infrastructure is essential:  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v)Secure electronic communication link ... . ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v

Last Answer : c. ii, iii, iv, v 

Description : Advantages of B2C commerce to customers are  (i)wide variety of goods can be accessed and comparative prices  can be found  (ii) shopping can be done at any time  (iii)privacy of transactions can be guaranteed  (iv) ... be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : a. i and ii  

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : Hashed message is signed by a sender using a. his public key b. his private key c. receiver’s public key d. receiver’s private key

Last Answer : b. his private key  

Description : Which one is not online payment mode? a) Cash on delivery b) Debit card c) Credit card d) E-cheque

Last Answer : d) E-cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : If transactions not made by the cardholder appear on the statement of account the card holder should dispute them with the card issuing Bank within how many days of the transaction date?

Last Answer : 30

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : EDI standard a. is not easily available b. defines several hundred transaction sets for various business forms c. is not popular d. defines only a transmission protocol

Last Answer : b. defines several hundred transaction sets for various business forms 

Description : Advantages of B2C commerce are  (i) Business gets a wide reach to customers  (ii) Payment for services easy  (iii)Shop can be open 24 hours a day seven days a week  (iv)Privacy of transaction always maintained a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii  

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : Electronic Data Interchange is necessary in a. B2C e-Commerce b. C2C e-Commerce c. B2B e-Commerce d. Commerce using internet

Last Answer : c. B2B e-Commerce 

Description : What's better when traveling, use your credit card to get cash or use your bank debit card?

Last Answer : I would guess that withdrawing cash from an ATM is cheaper using a debit card than a credit card as the credit card company nomally charge you a fee on top of the higher rate of interest.

Description : Speedy Bike Company received a $940 check from a customer for the balance due. The transaction was erroneously recorded as a debit to Cash $490 and a credit to Service Revenue $490. The ... Receivable, $940. d. debit Accounts Receivable, $940; credit Cash, $450 and Service Revenue, $490.

Last Answer : c. debit Cash, $450 and Service Revenue, $490; credit Accounts Receivable, $940.

Description : The Aadhaar-Enabled Payment Systems(AEPS) is a bank led model that facilitates banking facilities by allowing transactions at Point of Sale through the Business Correspondent (BC) using the Aadhaar ... . Cash Withdrawal C. Online Payment D. Cash Deposit E. Aadhaar to Aadhaar funds transfer

Last Answer : C. Online Payment Explanation: Services Offered by AEPS: Balance Enquiry Cash Withdrawal Cash Deposit Aadhaar to Aadhaar Fund Transfer Gateway Authentication Services

Description : Payment Banks can not issue ________ A. Credit Card B. Debit Card C. loans D. Both (B) and (C) E. Both (A) and (C)

Last Answer : E. Both (A) and (C) Explanation: Payment banks cannot issue loans and credit cards while at the same time current account and savings accounts can be operated by such banks.

Description : Which one is not an E-payment method used in India a) Debit card b) Credit card c) E-cheque d) None of the above

Last Answer : d) None of the above

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque

Last Answer : d. E‐cheque

Description : What does ECS in banking transactions stand for? (1) Excess Credit Supervisor (2) Extra Cash Status (3) Exchange Clearing Standard (4) Electronic Clearing Service

Last Answer : (4) Electronic Clearing Service Explanation: Electronic Clearing Service is a mode of electronic funds transfer from one bank account to another bank account using the services of a Clearing ... tax, etc or for loan installments of financial institutions/banks or regular investments of persons.

Description : Which one is also known as plastic money? a) Credit card b) Debit card c) Paper cash d) All of the above

Last Answer : a) Credit card

Description : …………………. Is a form of E - Currency that exists only in cyber space. a. ATM Card b. Credit Card c. Digital Cash d. Debit Card

Last Answer : c. Digital Cash

Description : Which one is also known as plastic money? a. Credit card b. Debit card c. Paper cash d. All of the above

Last Answer : a. Credit card

Description : (i) Excess of a total of debit side over a total of credit side of Cash Book, Bank column.

Last Answer : Give one word/term/phrase which can substitute each of the following statements: (i) Excess of a ... balance of the bank column of the Cash Book.

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : The acronym DES stands for a. Digital Evaluation System b. Digital Encryption Standard c. Digital Encryption System d. Double Encryption Standard

Last Answer : b. Digital Encryption Standard 

Description : On October 4, 2008, Terry Corporation had credit sales transactions of $2,800 from merchandise having cost $1,900. The entries to record the day's credit transactions include a a. debit of $2,800 to ... c. debit of $1,900 to Merchandise Inventory. d. credit of $1,900 to Cost of Goods Sold.

Last Answer : b. credit of $2,800 to Sales.

Description : Certification of Digital signature by an independent authority is needed because a. it is safe b. it gives confidence to a business c. the authority checks and assures customers that the public ... business which claims its ownership d. private key claimed by a sender may not be actually his 

Last Answer : c. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership 

Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES 

Last Answer : c. public keys of subscribers  

Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security