When a transaction is processed online, how can the merchant verify the customer's identity?
a. use secure sockets layers
b. use secure electronic transactions
c. use electronic data interchange
d. use financial electronic data interchange

1 Answer

Answer :

b. use secure electronic transactions

Related questions

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks

Last Answer : b. financial electronic data interchange

Description : ……….. allows customers to conduct financial transactions on a secure Website. -Technology

Last Answer : E-banking allows customers to conduct financial transactions on a secure Website.

Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : Answer: D

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably using- a. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably usinga. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : c. electronic bill presentment and payment

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : For carrying out C2C e-Commerce the following infrastructure is essential  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v)Secure electronic communication link ... a. i and ii b. ii and iv c. i and iii d. i and iv

Last Answer : c. i and iii  

Description : For carrying out B2C e-Commerce the following infrastructure is essential  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v) Secure electronic communication link ... . i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv

Last Answer : a. i, iv

Description : For carrying out B2B e-Commerce the following infrastructure is essential:  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v)Secure electronic communication link ... . ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v

Last Answer : c. ii, iii, iv, v 

Description : What is the name for direct computer to computer transfer of transaction information contained in business document? a) Internet commerce b) E-commerce c) Transaction information transfer d) Electronic data interchange

Last Answer : d) Electronic data interchange

Description : What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? a. internet commerce b. e-commerce c.transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : How the transactions occur in e‐commerce? a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e‐medias

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing

Last Answer : d. Virtual marketing

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above

Last Answer : d. All of the above

Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above

Last Answer : b. Integrity

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : Which of the following refers to creating products tailored to individual customers? a. customization b. aggregation c. Direct materials d. Reverse auction

Last Answer : a. customization

Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above

Last Answer : c. all of the above

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : The threat of new entrants is high when it is: a. Hard for customers to enter the market b. Hard for competitors to enter the market c. Easy for competitors to enter the market d. Easy for customers to enter the market

Last Answer : c. Easy for competitors to enter the market

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.

Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud

Description : What is an electronic representation of cash? a. Digital cash b. Electronic cash c. E‐cash d. All of the above

Last Answer : d. All of the above

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above

Last Answer : a. electronic check

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : What is SSL (Secure Sockets Layer)? (easy words)

Last Answer : answer:Easy words. SSL is a method of scrambling (or encrypting) web communications so that the only people that can read it are the sender and the receiver. To everyone else it is gobbledegook. - It is more complicated than that, of course.

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services 

Last Answer : a. credit card payment  

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : Which is not a function of ERP? a. Human resource management b. financial c. warehousing d. None of the above

Last Answer : d. None of the above

Description : VIRUS stands for 1) Very Important Resource Under Search 2) Virtual Information Resource Under Resize 3) Verify Interchange Result Until Source 4) Very Important Record User Searched

Last Answer : 2) Virtual Information Resource Under Resize

Description : VIRUS stands for 1 Very Important Resource Under Search 2 Virtual Information Resource Under Resize 3 Verify Interchange Result Until Source 4 Very Important Record User Searched

Last Answer : 2 Virtual Information Resource Under Resize

Description : In electronic cheque payments developed, it is assumed that most of the transactions will be a. customers to customers b. customers to business c. business to business d. banks to banks

Last Answer : c. business to business

Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : d) Both B and C

Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : a) Contact smart card

Description : What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? a. Performance b. Capacity planning c. Benchmarking d. Data cleansing

Last Answer : c. Benchmarking

Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : b. recovery

Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : a. backup

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : EDI stands for: a. Electronic Data Information b. Electronic Data Interchange c Exchange Data Interchange d. Electronic Device Information

Last Answer : a. Electronic Data Information

Description : Electronic Data Interchange is necessary in a. B2C e-Commerce b. C2C e-Commerce c. B2B e-Commerce d. Commerce using internet

Last Answer : c. B2B e-Commerce 

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above