Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above
Last Answer : Answer: D
Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary
Last Answer : d. financial cybermediary
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above
Last Answer : c. electronic bill presentment and payment
Description : Which one is also known as plastic money? a. Credit card b. Debit card c. Paper cash d. All of the above
Last Answer : a. Credit card
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque
Last Answer : d. E‐cheque
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Last Answer : d. All the above
Description : What is an electronic representation of cash? a. Digital cash b. Electronic cash c. E‐cash d. All of the above
Last Answer : d. All of the above
Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks
Last Answer : b. financial electronic data interchange
Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace
Last Answer : d. Electronic marketplace
Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more
Last Answer : d. All of the above and more
Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange
Last Answer : b. use secure electronic transactions
Description : The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. a. Memory b. Microchip c. E‐cash d. None of the above
Last Answer : b. Microchip
Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA
Last Answer : b. FTP
Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above
Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above
Description : What is C stands in CIA of smart card? a. confidentiality b. conference c. congress d. None of the above
Last Answer : a. confidentiality
Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above
Last Answer : b. authenticity
Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above
Last Answer : b. Integrity
Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C
Last Answer : a) Contact smart card
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only. a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C
Last Answer : c) Proximity smart card
Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C
Last Answer : d) Both B and C
Description : Trust card is introduced by a. BSNL and itzcash b. BSNL and oxicash c. BSNL only d. None
Last Answer : a. BSNL and itzcash
Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above
Last Answer : a. Encryption
Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
Last Answer : SMTP
Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability
Last Answer : d. Interoperability
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : What is another name for? a. Direct materials b. Indirect materials c. EDI d. None of the above
Last Answer : b. Indirect materials
Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP
Last Answer : d. SMTP
Description : Which is used to identify mobile money a. MCID b. MMID c. RSID d. NONE OF THE ABOVE
Last Answer : b. MMID
Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen
Last Answer : b. There is only one standard
Description : ................. uses electronic means to transfer funds directly from one account to another rather than by cheque or cash? (A) M-Banking (B) E-Banking (C) O-Banking (D) C-Banking
Last Answer : (B) E-Banking
Description : I tried to transfer balance from one Robi SIM to another Robi SIM but it says "You are not registered". The question is how to register ? I tried transferring balance from one Robi SIM to another Robi SIM but it says "You are not registered". The question is how to register ??
Last Answer : Balance transfer rules. To transfer the balance for the first time, type the amount in the message option and send the number of the recipient of 1212 balance. . For example , write 30 and ... Robi Balance Transfer Service. This service can be used from any Robi pre-paid or post-paid connection.
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce a. EFT b. EPS c. PayPal d. None of these
Last Answer : b. EPS
Description : E‐Banking is also known as a. ATMs b. Net banking c. Traditional banking d. None of these
Last Answer : b. Net banking