MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Commerce
ECommerce
Quiz 10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Q.1
Which of the following captures screen images?
Key logger
Packet sniffer
Log analysis tools
Screen capture software
Q.2
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.
general community
practice network
affinity community
interest-based social network
Q.3
When you purchase copyrighted software, what actually are you paying for?
The cost of the CDs, manuals, and development of the software
The cost of the CDs, manuals, and a share of the cost of the software development
A share of the cost of software development
All of the above
Q.4
Which of the following are ways to prove access rights?
What you know, like a password
What you have, like an ATM card
What you look like
All of the above
Q.5
What is an arrangement made between e‐commerce sites that direct users from one site to the other?
Spam
Viral marketing
Affiliate programs
None of the above
Q.6
Which one is not layer of E‐commerce infrastructure?
Physical layer
Product layer
Service layer
None
Q.7
Which of the following examines information passing through switches, hubs, or routers?
Key logger
Packet sniffer
Log analysis tools
Screen captures
Q.8
Which of the following is an advantage of e-books?
reduced transaction costs for the user
requirement of expensive devices to use
portability compared to print books
copyright management
Q.9
In simple terms, what does risk assessment ask?
What can go wrong?
How likely is it to go wrong?
What are the possible consequences if it does go wrong?
All of the above
Q.10
which one is not an E‐payment method used in India?
Debit card
Credit card
e‐cheque
none
Q.11
OTP stands for.
One Time Password
On Time processing
One time processor
None
Q.12
Auction sites like eBay tend to use _______ pricing.
dynamic
fixed
trigger
utilization
Q.13
Which one is threat for E‐commerce?
Trojan horse
firewall
encryption
None
Q.14
Secure communication means.
Protect transmission of credit card number
Guarantee privacy of customer
Unauthorized access of payment details
All the above
Q.15
Which one is not an offline payment mode?
Cash on delivery
Cash before delivery
Demand drafts
e‐cheque
Q.16
Technologies that help enhance resolution of e-book reader display screens are known as _________.
high-res pixel formatting
screen resolution technologies
sub-screen smoothing technologies
sub-pixel display technologies
Q.17
Which item can a password be used to protect?
Network
File
Folder
All of the above
Q.18
All of the following are characteristics of a social network except _______.
involves a group of people
features shared social interaction
always feature shared goals and purposes
common ties among members
Q.19
Which will harm computer resources
Worm
Virus
Trojan horse
All the above
Q.20
The study of encryption is called ___________.
Decryption
Cryptography
Firewall
All the above
Q.21
During E‐commerce transaction we should ensure ___________.
Integrity
Security
Confidentiality
All the above
Q.22
Which of the following is a characteristic of a firewall?
Examines each message as it seeks entrance to the network
Blocks messages without the correct markings from entering the network
Detects computers communicating with the Internet without approval
All of the above
Q.23
Which of the following is not an entertainment industry value chain model?
content owner direct model
user distribution model
aggregator model
Internet innovator model
Q.24
Which one is not a threat for E‐commerce?
Trojan horse
Viruses
Worm
None
Q.25
Private Key cryptography is also known as __________ cryptography.
Public key
Symmetric
Asymmetric
None
Q.26
Which one is an offline payment mode?
Cash on delivery
Cash before delivery
Credit card
Both a and b
Q.27
Which one is not an online payment mode?
Cash on delivery
Debit card
Credit card
e‐cheque
Q.28
The protocol which allows the file transfer between computers is.
TCP/IP
FTP
HTTP
SOA
Q.29
E‐Banking is also known as.
ATMs
Net banking
Traditional banking
None of these
Q.30
Which one is not used as a security mechanism?
Encryption
Cryptography
Wallets
Digital signature
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page