Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C
Last Answer : a) Contact smart card
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only. a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C
Last Answer : c) Proximity smart card
Description : What is C stands in CIA of smart card? a. confidentiality b. conference c. congress d. None of the above
Last Answer : a. confidentiality
Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above
Last Answer : b. authenticity
Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above
Last Answer : b. Integrity
Description : The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. a. Memory b. Microchip c. E‐cash d. None of the above
Last Answer : b. Microchip
Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above
Last Answer : a. Encryption
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : With which card company has Axis bank launched its contactless debit cards? A) MasterCard B) RuPay C) EuroPay D) Visa E) None of these
Last Answer : D) Visa Explanation: Axis Bank, on Wednesday announced the launch of its Contactless Secure+ Debit Card for regular savings account customers, to provide access to a larger customer base with contactless ... (POS) terminals and also use the card as a normal debit card at any POS terminal.
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Last Answer : d. All the above
Description : Which one is also known as plastic money? a. Credit card b. Debit card c. Paper cash d. All of the above
Last Answer : a. Credit card
Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque
Last Answer : d. E‐cheque
Description : Trust card is introduced by a. BSNL and itzcash b. BSNL and oxicash c. BSNL only d. None
Last Answer : a. BSNL and itzcash
Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above
Last Answer : d. All of the above
Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above
Last Answer : a. electronic check
Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange
Last Answer : b. use secure electronic transactions
Description : What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? a. Performance b. Capacity planning c. Benchmarking d. Data cleansing
Last Answer : c. Benchmarking
Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : b. recovery
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks
Last Answer : b. financial electronic data interchange
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : How can intermodulation interference between two transmitters in close proximity reduced or eliminated? A. Through installing a band-pass filter in the antenna feed line B. Through installing terminated circulator ... high driving power D. By installing a low-pass filter in the antenna feed line
Last Answer : A. Through installing a band-pass filter in the antenna feed line
Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these
Last Answer : c. Both a and b
Description : E‐cheques are ………………… a.Prepaid b.Postpaid c. Both prepaid and postpaid
Last Answer : a.Prepaid
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy
Last Answer : b. Pirated software
Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above
Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : d. Biometrics
Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above
Last Answer : Answer: D
Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing
Last Answer : d. Virtual marketing
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password