If you need to transfer money to another person via the internet, which of the following
methods could you use?
a. financial cybermediary
b. electronic check
c. electronic bill presentment and payment
d. all of the above

1 Answer

Answer :

Answer: D

Related questions

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : c. electronic bill presentment and payment

Description : Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet? a. electronic cheque b. electronic bill payment c. Conversion rates d. Financial cybermediary

Last Answer : d. Financial cybermediary

Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above

Last Answer : a. electronic check

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks

Last Answer : b. financial electronic data interchange

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b

Last Answer : d. Both a and b

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : Which one is the third party payment providers who offer digital wallets for E‐ merchants a. Oxicash b. PayMate c. PayPass d. All the above

Last Answer : d. All the above

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque

Last Answer : d. E‐cheque

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : What is an electronic representation of cash? a. Digital cash b. Electronic cash c. E‐cash d. All of the above

Last Answer : d. All of the above

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : What is the name of the new anti‐Spam bill? a. No‐Spam b. CAN‐Spam c. Spam‐Away d. Stop Spam

Last Answer : b. CAN‐Spam

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : Presentment of an acceptance is required in case of A. Every Bill of exchange B. Every Bill of exchange payable after sight C. Every promissory note D. Every cheque

Last Answer : C. Every promissory note

Description : A promissory note or bill of exchange which is not expressed to be payable on demand, at sight or on presentment is at maturity A. On the 30th day after the day on which it is expressed to be ... expressed to be payable D. On the 4th day after the day on which it is expressed to be payable.

Last Answer : D. On the 4th day after the day on which it is expressed to be payable.

Description : Which is not a function of ERP? a. Human resource management b. financial c. warehousing d. None of the above

Last Answer : d. None of the above

Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA

Last Answer : b. FTP

Description : Which of the following an accurate statement about internet phone calls? a. They are possible but not yet free b. They are not possible c. They are currently standard practice d. None of the above is an accurate statement about internet phone calls

Last Answer : a. They are possible but not yet free

Description : Which type of technology will increase portability and mobility? a. Implant chips b. Micro‐payments c. Internet phone calls d. All of the above

Last Answer : d. All of the above

Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above

Last Answer : d. All of the above

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : Which products are people most likely to be comfortable buying on the Internet? a. Books b. PCs c. CDs d. All of the above

Last Answer : d. All of the above

Description : Which products are people most likely to be more uncomfortable buying on the Internet? a. Books b. Furniture c. Movies d. All of the above

Last Answer : b. Furniture

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : What is another name for? a. Direct materials b. Indirect materials c. EDI d. None of the above

Last Answer : b. Indirect materials

Description : Which is used to identify mobile money a. MCID b. MMID c. RSID d. NONE OF THE ABOVE

Last Answer : b. MMID

Description : Which one is also known as plastic money? a. Credit card b. Debit card c. Paper cash d. All of the above

Last Answer : a. Credit card

Description : The term 'negotiation' in section 14 of the Negotiable Instruments Act, 1881 refers to A. The transfer of a bill of exchange, promissory note or cheque to any person, so as to constitute the ... the instrument C. The bargaining between the parties to a negotiable instrument D. All of the above

Last Answer : A. The transfer of a bill of exchange, promissory note or cheque to any person, so as to constitute the person the holder thereof

Description : I would like to order a T-shirt from Red bubble, but I'm not 18 yet, so I need advice on how to pay by card (via mom) how it works, whether as a normal transfer or how? :)

Last Answer : Need Answer

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : d) Both B and C

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above

Last Answer : d. All of the above

Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : d. Biometrics