Digital business mcq set 3

81. ___ is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. Merchant
D. Acquirer

Answer

D. Acquirer

82. In ___ type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer

A. Prepaid

83. ___ type of payment system is highly useful to those customers who would like tocontrol overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer

A. Prepaid

84. credit card gives all the advantages of a normal credit card without worryingabout the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these

Answer

A. Prepaid

85. facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these

Answer

B. Revolver

86. is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.
A. E-cash
B. Digicash
C. Cyber cash
D. any of these

Answer

D. any of these

87. is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these

Answer

A. Credit card

88. To accept a credit card for payment, we have to open a account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these

Answer

C. Merchant account

89. A ___ is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.
A. smart Card
B. E-Cheques
C. E-cash
D. none of these

Answer

A. smart Card

90. is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these

Answer

A. Debit Card

91. ___ is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these

Answer

B. Electronic purse

92. is basically a secure gate between our organization data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer

A. Network firewall

93. encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these

Answer

B. SET

94. is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
A. Biometric
B. PIN
C. both of these
D. none of these

Answer

A. Biometric

95. In Biometrics, ___ ID system is designed to prevent more than one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

Answer

A. Positive ID system

96. In Biometrics, ___ ID system is designed to prevent one person from usingmore than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these

Answer

B. Negative ID system

97. are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these

Answer

B. computer virus

98. Which among the following is not an example for computer virus ?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these

Answer

D. None of these

99. are special type of software meant for limiting the risks of being hit bycomputer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer

B. Antivirus

100. A is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these

Answer

A. Hacker

101. acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer

A. Network firewall

102. Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these

Answer

A. Network firewall

103. SET means ___
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these

Answer

C. Secure Electronic Transaction

104. The verification of credit card is done by using ___ with a communications link to themerchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these

Answer

C. All of these

105. Creating illegitimate sites that appear to be published by established organizationsby unscrupulous artists is termed as ___
A. Spoofing
B. Snooping
C. Sniffing
D. None of these

Answer

A. Spoofing

106. Gain entry into the user’s system and scan your file system for personal informationis known as ___
A. Spoofing
B. Snooping
C. Sniffing
D. None of these

Answer

B. Snooping

107. attacks are difficult and are only successful if the attacker knows somethingabout the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords

Answer

D. Guessing passwords

108. is the process of making information unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography

Answer

D. Cryptography

109. is the reverse process of encryption, to make the information readable onceagain
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography

Answer

B. Decryption

110. A provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these

Answer

B. Digital signature

111. A is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these

Answer

B. Digital certificates

112. The information Technology Act [IT ACT] came into effect on
A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these

Answer

C. 17th October 2000

113. Information sent over the Internet commonly uses the set of rules called ___
A. TCP/IP
B. FTP
C. HTTP
D. gopher

Answer

A. TCP/IP

114. is a person who breaks in or trespasses a computer system
A. Hacker
B. Snooper
C. operator
D. spoofer

Answer

A. Hacker

115. E-mail which contain useless material is termed as ___
A. Spam
B. useless mail
C. trunk mail
D. Junk mail

Answer

D. Junk mail

116. India has enacted the first IT Act in the year ___
A. 2001
B. 2002
C. 2009
D. 2000

Answer

D. 2000

117. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these

Answer

D. None of these

118. Trade mark, copyright, patent law etc comes under the purview of ___
A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None

Answer

C. Intellectual property laws

119. is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these

Answer

C. Computer virus

120. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these

Answer

D. none of these

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.