Which one is  an offline payment mode?
a. Cash on delivery
b. Cash before delivery
c. Credit card
d. Both a and b

1 Answer

Answer :

d. Both a and b

Related questions

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an offline payment mode? a) Cash on delivery b) Cash before delivery c) Demand draft d) E-cheque

Last Answer : b) Cash before delivery

Description : Which one is not online payment mode? a) Cash on delivery b) Debit card c) Credit card d) E-cheque

Last Answer : d) E-cheque

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque

Last Answer : d. E‐cheque

Description : Which one is also known as plastic money? a. Credit card b. Debit card c. Paper cash d. All of the above

Last Answer : a. Credit card

Description : The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. a. Memory b. Microchip c. E‐cash d. None of the above

Last Answer : b. Microchip

Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above

Last Answer : a. electronic check

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : A business competing in a commodity like environment must focus on which of the following? a. Price b. Ease / speed of delivery c. Ease of ordering d. all of the above

Last Answer : d. all of the above

Description : Which one is the third party payment providers who offer digital wallets for E‐ merchants a. Oxicash b. PayMate c. PayPass d. All the above

Last Answer : d. All the above

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : c. electronic bill presentment and payment

Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : Answer: D

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : a) Contact smart card

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only. a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : c) Proximity smart card

Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : d) Both B and C

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : What is an electronic representation of cash? a. Digital cash b. Electronic cash c. E‐cash d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : In which of the following mode, the BBPOU receives all the bill payment requests for that particular biller without any validation? A. Online Mode B. Offline Mode (A) C. Offline Mode (B) D. All of the Above E. None of the Above

Last Answer : C. Offline Mode (B) Explanation: In Offline Mode (B) receives all the bill payment requests for that particular biller without any validation.

Description : In which of the following mode, BBPOU will confirm the bill payment basis the bill information dump provided by the respective biller? A. Online Mode B. Offline Mode (A) C. Offline Mode (B) D. All of the Above E. None of the Above

Last Answer : B. Offline Mode (A). Explanation: In Offline Mode (A) BBPOU will confirm the bill payment basis the bill information dump provided by the respective biller.

Description : Shiva has placed two radio button on a payment form designed in NetBeans to accept mode of payment one out of cash or card. -Technology

Last Answer : Shiva has forgot to attach both the radio buttons to one button group to make them mutually exclusive.

Description : Shiva has placed two radio button on a payment form designed in NetBeans to accept mode of payment one out of cash or card. To his surprise, -Technology

Last Answer : Shiva has forgot to attach both the radio buttons to one button group to make them mutually exclusive.

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above

Last Answer : d. All of the above

Description : What is C stands in CIA of smart card? a. confidentiality b. conference c. congress d. None of the above

Last Answer : a. confidentiality

Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above

Last Answer : b. authenticity

Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above

Last Answer : b. Integrity

Description : Trust card is introduced by a. BSNL and itzcash b. BSNL and oxicash c. BSNL only d. None

Last Answer : a. BSNL and itzcash

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above

Last Answer : d. All of the above

Description : In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions 

Last Answer : b. a customer buys several electronic coins which are digitally signed by coin issuing bank 

Description : The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services 

Last Answer : a. credit card payment  

Description : Which of the following is the mode of settlement of securities wherein the transfer of securities and funds happen simultaneously? A. Delivery versus Payment (DvP) B. Duration C. Convexity D. All of the Above E. None of the Above

Last Answer : A. Delivery versus Payment (DvP) Explanation: Delivery versus Payment (DvP) is the mode of settlement of securities wherein the transfer of securities and funds happen simultaneously. ... securities are not delivered and vice versa. DvP settlement eliminates the settlement risk in transactions.

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : E‐cheques are ………………… a.Prepaid b.Postpaid c. Both prepaid and postpaid

Last Answer : a.Prepaid

Description : Do restaurants still receive payment if my card was charged by the delivery app?

Last Answer : Yes. I’m not sure of the mechanics but they do get paid.

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above