

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Commerce (B Com) .
101. |
Which is used for transferring money from one bank account to another directly without involving cash |
A. | eft |
B. | e-cash |
C. | micropayment |
D. | none |
Answer» A. eft |
102. |
Which system provides a service that is paid for prior to usage |
A. | post paid payment system |
B. | prepaid payment system |
C. | spot cash system |
D. | none |
Answer» B. prepaid payment system |
103. |
Which is an electronic medium for making payment |
A. | smart card |
B. | debit card |
C. | e- cash |
D. | all of the above |
Answer» D. all of the above |
104. |
All credit cards are |
A. | smart cash |
B. | post paid cards |
C. | e cash |
D. | none |
Answer» B. post paid cards |
105. |
A popular example of E wallet is |
A. | micro soft wallet |
B. | mega soft wallet |
C. | penta soft wallet |
D. | none |
Answer» A. micro soft wallet |
106. |
Which are made for small payment on the web |
A. | mega payments |
B. | micro payments |
C. | spot payment |
D. | all the above |
Answer» B. micro payments |
107. |
Which are used for signing and endorsing electronic changes |
A. | manual signature |
B. | thump impression |
C. | digital signature |
D. | spot signature |
Answer» C. digital signature |
108. |
The two types of credit cards today namely credit cards issued by credit card companies |
A. | master card , visa |
B. | smart card credit card |
C. | debit card, e cash |
D. | none |
Answer» A. master card , visa |
109. |
……………………is a card with a microchip that can be used instead of cash and coins for every thing. |
A. | electronics cash |
B. | fast cash |
C. | electronic purse |
D. | none |
Answer» C. electronic purse |
110. |
Prepaid or real-time tokens are exchanged between |
A. | banker and applicant |
B. | payer and drawer |
C. | buyer and seller |
D. | none |
Answer» C. buyer and seller |
111. |
…………. Is a digital analogue of various forms of payment backed by a bank |
A. | electronics cash |
B. | electronic purse |
C. | electronic tokens |
D. | non e |
Answer» C. electronic tokens |
112. |
There are two main concerns for using digital coins: anonymity of the consumer and :- |
A. | prepaid system |
B. | post paid system |
C. | electronic tokens |
D. | online verification |
Answer» D. online verification |
113. |
SSL is the most widely deployed |
A. | security protocol |
B. | data encryption |
C. | cryptography |
D. | none |
Answer» A. security protocol |
114. |
…………………. Encrypts payment card transaction data and verifies that both parties in the transaction are genuine. |
A. | ssl |
B. | set |
C. | secret key |
D. | none |
Answer» B. set |
115. |
…………………. Is the process of coding and scrambling of messages to prevent un authorized access to under standing of data being transmitted |
A. | cryptography |
B. | encryption |
C. | security key |
D. | none |
Answer» B. encryption |
116. |
………………. Is used to keep transmissions privacy through the use of data encryption techniques. |
A. | data encryption |
B. | crytography |
C. | security key |
D. | non e |
Answer» B. crytography |
117. |
Which refers to the automatic identification (or) identity verification of living persons using their enduring physical or behavioral characteristics |
A. | biometrics |
B. | cryptography |
C. | encryption |
D. | none |
Answer» A. biometrics |
118. |
……………… involves checking to see if the signal is good quality |
A. | transmission |
B. | quality control |
C. | decision |
D. | none |
Answer» B. quality control |
119. |
The process of encrypted data readable once again is called, |
A. | encryption |
B. | decryption |
C. | uncryption |
D. | none |
Answer» A. encryption |
120. |
This the process of making information un intelligible to the unauthorized reader |
A. | encryption |
B. | decryption |
C. | uncryption |
D. | none |
Answer» A. encryption |
121. |
The attacker monitors the data between the shoppers computer and the server |
A. | spoofing |
B. | snoofing |
C. | sniffing |
D. | none |
Answer» C. sniffing |
122. |
The private content of transaction, if unprotected can be intercepted when it go through the route over the internet called. |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | eavesdropping |
Answer» D. eavesdropping |
123. |
Gain entry into the user’s system and scan your file system for personal information is known as |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | none |
Answer» A. spoofing |
124. |
Creating illegitimate site that appear to published by established organizations are by this name |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | none |
Answer» A. spoofing |
125. |
The IT act came into effect on |
A. | 17 may 2000 |
B. | 17th december 2000 |
C. | 17 oct 2000 |
D. | 17 june 2000 |
Answer» C. 17 oct 2000 |
126. |
UNCITRAL model law on E commerce is |
A. | 1996 |
B. | 1994 |
C. | 1995 |
D. | 1997 |
Answer» A. 1996 |
127. |
E commerce consists of commerce activities |
A. | electrically |
B. | technically |
C. | electronically |
D. | none |
Answer» C. electronically |
128. |
…… provide security and privacy for the use of the web page content |
A. | http |
B. | html |
C. | ftp |
D. | none |
Answer» A. http |
129. |
A digital signature performs a similar functions to a |
A. | thump impression |
B. | written signature |
C. | scanning |
D. | none |
Answer» B. written signature |
130. |
Digital signature acts as a ……………….. for e commerce |
A. | risk |
B. | virus |
C. | security |
D. | boon |
Answer» C. security |
131. |
Privacy laws of their host Coventry effect |
A. | domestic companies |
B. | overseas companies |
C. | neighboring companies |
D. | none |
Answer» B. overseas companies |
132. |
…………………….is designed to protect a persons personal information |
A. | data integrity |
B. | cyber law |
C. | private legislation |
D. | none |
Answer» C. private legislation |
133. |
There are different types of risks connected with information protection such as disruption, disaster. |
A. | unauthorized access |
B. | publicity |
C. | consumer |
D. | none |
Answer» A. unauthorized access |
134. |
………………… are electronic files that are used to uniquely identify people and resources over the internet |
A. | digital signature |
B. | digital certificate |
C. | encryption recourse |
D. | none |
Answer» B. digital certificate |
135. |
……………….. techniques make use of secret codes (or) keys to encrypt information |
A. | cryptography |
B. | encryption |
C. | digital certificate |
D. | none |
Answer» A. cryptography |
136. |
The organization has to ensure that the …………… are sent to the customers |
A. | ordered goods |
B. | unordered goods |
C. | good quality goods |
D. | none |
Answer» A. ordered goods |
137. |
………………… can catch the transmissions to obtain customers sensitive information |
A. | fire wall |
B. | anti virus |
C. | hackers |
D. | none |
Answer» C. hackers |
138. |
SATAN is an example |
A. | unauthorized disclosures |
B. | unauthorized actions |
C. | snooping |
D. | spoofing |
Answer» C. snooping |
139. |
Customers are concerned about |
A. | privacy and security of information |
B. | how things are managed |
C. | business practices |
D. | none |
Answer» A. privacy and security of information |
140. |
Information sent over the internet commonly uses the set of rules called |
A. | ftp |
B. | tcp/ip |
C. | http |
D. | gopher |
Answer» B. tcp/ip |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.