Description : What is a technology‐enabled microchip implanted into the human body? a. Wearable computer b. GPS c. Implant chip d. None of the above
Last Answer : c. Implant chip
Description : What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt? a. Wearable computer b. GPS c. Implant chip d. None of the above
Last Answer : a. Wearable computer
Description : Which type of technology will increase portability and mobility? a. Implant chips b. Micro‐payments c. Internet phone calls d. All of the above
Last Answer : d. All of the above
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above
Last Answer : c. all of the above
Description : Which is used to identify mobile money a. MCID b. MMID c. RSID d. NONE OF THE ABOVE
Last Answer : b. MMID
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above
Description : What is software you don't want hidden inside software you do want? a. Adware b. Trojan‐horse software c. Spyware d. All of the above
Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware
Last Answer : a. Key logger software
Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy
Last Answer : b. Pirated software
Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software
Last Answer : d. Screen capture software
Description : When you purchase copyrighted software, what actually are you paying for? a. The cost of the CDs, manuals, and development of the software b. The cost of the CDs, manuals, and a share of the cost of the software development c. A share of the cost of software development d. All of the above
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : Why use facial recognition to unlock iPhone instead of digital code?
Last Answer : I was reluctant, but I did it with my new phone. It’s actually really nice to not have to key my passcode when I’m looking at the phone. If the phone can’t read your face it just asks for your passcode. I’m pretty sure you can cancel it if you wind up not wanting it after trying it.
Description : What did you hear/read about facial recognition technology in public toilets?
Last Answer : (Holding back the giggles, not very well.) This is the first I have heard of it. Geez, tp theft must be terrible there, to go to such measures. I am sure this would not happen in the U.S. People would protest the facial profiling to the death.
Description : Facial recognition on your smartphone - Have you ever gotten it to work consistently?
Last Answer : answer:Honestly, from what I've heard, I think Facial Recognition on the Android device is not that useful. So I wouldn't recommend using it. I haven't heard of anyone that has gotten it to work ... room, then you do the facial recognition in a dark room or place, it will most likely not work.
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above
Last Answer : c. People outside the organization can't access it
Description : Which, if any, of the following types of ads are people most willing to tolerate? a. pop‐under ad b. pop‐up ad c. banner ad d. none of the above
Last Answer : d. none of the above
Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above
Last Answer : b. Click‐through
Description : Which products are people most likely to be comfortable buying on the Internet? a. Books b. PCs c. CDs d. All of the above
Description : Which products are people most likely to be more uncomfortable buying on the Internet? a. Books b. Furniture c. Movies d. All of the above
Last Answer : b. Furniture
Description : A 73-year-old man presents with an abrupt onset of double vision and left leg weakness. Examination shows weakness of abduction of the right eye, right-sided facial weakness affecting upper and lower ... frontal lobe B. left lateral medulla C. right corpus striatum D. right midbrain E. right pons
Last Answer : Ans: E
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque