PaisaPay is offered only by
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none

1 Answer

Answer :

b. eBay.in

Related questions

Description : Paisapay is facilitated in a. eBay.co.in b. amazon.com c. flipkart.com d. none of the above

Last Answer : a. eBay.co.in

Description : In which website Global Easy Buy is facilitated? a. Ebay.com b. Amazon.com c. Yepme.com d. None of these

Last Answer : a. Ebay.com

Description : Which segment do eBay, Amazon.com belong? a. B2Bs b. B2Cs c. C2Bs d. C2Cs

Last Answer : b. B2Cs

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : Which segment is eBay an example? a. B2B b. C2B c. C2C d. None of the above

Last Answer : d. None of the above

Description : Do you have experience selling books on ebay or Amazon.com?

Last Answer : I have an account on Amazon.com and I have listed a few books. It's very hit or miss though. The person has to choose your business to purchase the book from. You know when you purchase ... charges you to use their service, but so does Ebay. I found Amazon more lucrative, because of lesser fees.

Description : .Paisa pay is facilitated in a. eBay.co.in b. amazon.com c. flipcart.com d. none of the abo

Last Answer : a. eBay.co.in

Description : Which of the following would be the most appropriate example of a transaction site? a. Amazon.com b. Yahoo c AOL d. eBay

Last Answer : a. Amazon.com

Description : Paisa pay is facilitated in a. eBay.co.in b. amazon.com c. flipcart.com d. none of the above

Last Answer : a. eBay.co.in

Description : Paisa pay is facilitated in a. eBay.co.in b. amazon.com c. flipcart.com d. none of the above

Last Answer : a. eBay.co.in

Description : Which of the following would be the most appropriate example of a search engine/portal? a. Amazon.com b. Yahoo c. AOL d. eBay

Last Answer : b. Yahoo

Description : Which of the following would be the most appropriate example of a transaction site?a. Amazon.com b. Yahoo c. AOL d. eBay

Last Answer : d. eBay

Description : Which of the following is a social network ? (A) amazon.com (B) eBay (C) gmail.com (D) Twitter 

Last Answer : (D) Twitter

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only. a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : c) Proximity smart card

Description : Trust card is introduced by a. BSNL and itzcash b. BSNL and oxicash c. BSNL only d. None

Last Answer : a. BSNL and itzcash

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : How the transactions occur in e‐commerce? a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e‐medias

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None

Last Answer : a. On Time Password

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b

Last Answer : d. Both a and b

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above

Last Answer : d. All the above

Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above

Last Answer : d. All the above

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : Which one is an encryption technique? a. RSA b. DES c. AES d. All of the above

Last Answer : d. All of the above

Description : Which one is not an encryption technique? a. RSA b. DES c. AES d. FTP

Last Answer : d. FTP