E-Commerce Online Assignment Answer Set 8

QN01. ————– is an act that poses danger to computer assets.
a. Threat
b. Danger
c. Error
d. None of the above
Answer: A

QN02. Which one is not a encryption technique
a. RSA
b. DES
c. AES
d. NONE OF THE ABOVE
Answer: D

QN03. Which one is not used as a security mechanism?
a. Encryption
b. Cryptography
c. Wallets
d. Digital signature
Answer :C

QN04. Which e-government arena is being used when governmental agencies send out and accept bids for work?
a) G2G
b) G2B
c) G2C
d) G2G
Answer: B

QN05. Secret key is used for
a. Public key cryptography
b. Private key cryptography
c. Asymmetric key cryptography
d. None of these
Answer: B

QN06. Which one is  a communication channel threat?
a. Sniffer programs
b. Cyber vandalism
c. Integrity threats
d. All of the above
Answer: D

QN07. Which one is  a communication channel security protocol?
a. SSL
b. S-HTTP
c. SET
d. ALL OF THE ABOVE
Answer: D

QN08. The protocol which allows the file transfer between computers is
a. TCP/IP
b. FTP
c. HTTP
d. SOA
Answer: B

QN09. E-Banking is also known as
a. ATMs
b. Net banking
c. Traditional banking
d. None of these
Answer: B

QN10. ————– is backbone of all E-payments in E-commerce
a. EFT
b. EPS
c. PayPal
d. None of these
Answer: B

QN11. Which one is a client level threat?
a. Malicious code
b. Viruses
c. Active contents
d. All the above
Answer: D

QN12. Which one is not an encryption technique?
a. RSA
b. DES
c. AES
d. FTP
Answer: D

QN13. Which one is  an encryption technique?
a. RSA
b. DES
c. AES
d. All of the above
Answer: D

QN14. Which one is not a server level threat?
a. Malicious code
b. CGI threats
c. Database threats
d. Buffer overflows
Answer: A

QN15. Which one is not a physical threat?
a. Hacking
b. Storm
c. Phishing
d. None of the above
Answer: A

QN16. Which one is a physical threat?
a. Phishing
b. Storm
c. Earthquake
d. All the above
Answer: D

QN17. Which one is a logical threat?
a. Hacking
b. Storm
c. Phishing
d. None of the above
Answer: A

QN18. The basic elements of website is
a. Home page
b. Web pages
c. Links and banners
d. All the above
Answer: D

QN19. Which one is  a threat for E-commerce
a. Trojan horse
b. firewall
c. encryption
d. None
Answer: A

QN20. Secure communication means
a. Protect transmission of credit card number
b. Guarantee privacy of customer
c. Unauthorized access of payment details
d. All the above
Answer: D

QN21. Which one is not an offline payment mode?
a. Cash on delivery
b. Cash before delivery
c. Demand drafts
d. e-cheque
Answer: D

QN22. Which one is  an offline payment mode?
a. Cash on delivery
b. Cash before delivery
c. Credit card
d. Both a and b
Answer: D

QN23. Which one is not an online payment mode?
a. Cash on delivery
b. Debit card
c. Credit card
d. e-cheque
Answer: A

QN24. Which one is  an online payment mode?
a. Cash on delivery
b. Cash before delivery
c. Demand drafts
d. e-cheque
Answer: D

QN25. which one is not an E-payment method used in India
a. Debit card
b. Credit card
c. e-cheque
d. none
Answer: D

QN26. OTP stands for
a. On Time Password
b. On Time processing
c. One time processor
d. None
Answer: A

QN27. Which one is not a threat for E-commerce
a. Trojan horse
b. Viruses
c. Worm
d. None
Answer: D

QN28. Private Key cryptography is also known as —————cryptography.
a. Public key
b. Symmetric
c. Asymmetric
d. None
Answer: B

QN29. Public key cryptography is also known as —————cryptography.
a. Private key
b. Symmetric
c. Asymmetric
d. None
Answer: C

QN30. What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
a. Ethics
b. Intellectual property
c. Copyright
d. Fair Use Doctrine
Answer: C

QN31. Cyber slacking consists of what activities?
a. Visiting “inappropriate” web sites
b. Visiting news sites
c. Chatting online with others about non-work topics
d. All of the above
Answer: D

QN32. What is an arrangement made between e-commerce sites that direct users from one site to the other?
a. Spam
b. Viral marketing
c. Affiliate programs
d. None of the above
Answer: C

QN33. Which type deals with auction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: D

QN34. Which one is not  a layer of E-commerce infrastructure
a. Physical layer
b. Product layer
c. Service layer
d. None
   Answer: D

QN35. Which will harm  computer resources
a. Worm
b. Virus
c. Trojan horse
d. All the above
   Answer: D

QN36. The study of encryption is called—————
a. Decryption
b. Cryptography
c. Firewall
d. All the above
Answer: B

QN37. During E-commerce transaction we should ensure————-
a. Integrity
b. Security
c. Confidentiality
d. All the above
Answer: D

QN38. The virus that are commonly found in word documents are called————–
a. Macro
b. Trojan horse
c. Script virus
d. None of the above
  Answer: A

QN39. The virus that are attached with vb and java files are called
a. Macro
b. Trojan horse
c. Script virus
d. None of the above
   Answer: C

QN40. The viruses spreads through————-
a. Mails
b. Pen drives and cds
c. Websites
d. All the above
Answer: D

QN41. An information system always:
a. Transforms inputs to information.
b. Requires hardware even if only a pencil.
c. Is computer-based.
d. None of the above
Answer: b. Requires hardware even if only a pencil.

QN42. B2B stands for:
a. Business to Government.
b. Business to Consumer.
c. Business to Business.
d. All of the above
Answer: c. Business to Business.

QN43. E-commerce is often seen as simply buying and selling using the internet but do the following perspectives also apply to e-commerce?
a. An online perspective
b. A service perspective
c. A business process perspective
d. A communications perspective
e. All of the above
Answer: e. All of the above

QN44. E-businees is a term used to describe
a. An organization using electronic media to purchase from to its suppliers
b. An organization using electronic media to sell direct to its suppliers
c. The use of electronic communications for all business processes.
d. Any electronically mediated communication between an organization and its stakeholder.
e. None of the above
Answer: c. The use of electronic communications for all business processes.

QN45. Disintermediation refers to
a New opportunities for middlemen to aggregate content, products and services.
b The disappearance of market middlemen and the destruction of traditional distribution channels.
c Hyper competition
d The fact that when everyone uses the same tool or product, all participants receive more value.
Answer: b The disappearance of market middlemen and the destruction of traditional distribution channels.

QN46. Amazon.com comes under the model
a B2B
b B2C
c C2C
d C2B
Answer: b B2C

QN47. A __ is a software application that acts as a filter between a company’s closed group network and the internet.
a Firewall
b virtual private network
c proxy server
d router
Answer: a Firewall

QN48. The addresses used by browsers to identify the location of content on the web are called
a domain names
b uniform resource locaters
c IP addresses
d hypertext transfer protocol
Answer: a domain names

QN49. Microsoft’s Passport is an example of
a client based digital wallet
b server based digital wallet
c digital credit card
d smart card
Answer: a client based digital wallet

QN50. Digital signature provides
a security
b privacy
c authentication
d all of these
Answer: d all of these

QN50 All of the following are technologies used to gather information about you online except __.
a. spy ware.
b. cookies.
c. Gmail.
d. anonymizers.
Answer: d. anonymizers

QN50. The _ business model involves an independently owned vertical digital marketplace for direct inputs.
a. e-distributor.
b. exchange.
c. e-procurement.
d. private industrial network.
Answer: b. exchange.

QN50. E-business software is best defined as to manage:
a. sell-side e-commerce applications.
b. internal administrative applications.
c. buy-side applications.
d. None
Answer: a. sell-side e-commerce applications.

QN50. When crafting e-business direction, management must pay careful attention to three interlocking layers:
a. E-business design
b. E-business application Infrastructure
c. E-business Infrastructure
d. All of the above
Answer: d. All of the above

QN50. A well built e-business infrastructure is a combination of.
a. Structure and Stability
b. Safeguards information
c. Understands costumer priorities
d. All of the above
Answer: d. All of the above

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.