The study of encryption is called ___________.
The study of encryption is called ___________.
__________ is backbone of all E‐payments in E‐commerce.
__________ is backbone of all E‐payments in E‐commerce.
Which one is an offline payment mode?
Which one is an offline payment mode?
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.
Smart card is better protected than other cards using.
Smart card is better protected than other cards using.
Goods directly involved in the production process are known as _________.
Goods directly involved in the production process are known as _________.
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________.
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________.
Which one is communication channel security protocol?
Which one is communication channel security protocol?
Which of the following records logons and deletions?
Which of the following records logons and deletions?
A _________ is a B2B trading network that links a particular seller with its own trading partners.
A _________ is a B2B trading network that links a particular seller with its own trading partners.
Which item can a password be used to protect?
Which item can a password be used to protect?
Which of the following applies to the implementation of an idea?
Which of the following applies to the implementation of an idea?
Which of the following are ways to prove access rights?
Which of the following are ways to prove access rights?
Unsolicited e‐mail is called what?
Unsolicited e‐mail is called what?
Which of the smart card uses a sim like structure for reading and writing data?
Which of the smart card uses a sim like structure for reading and writing data?
What is the most commonly offered interactive feature of newspaper Web sites?
What is the most commonly offered interactive feature of newspaper Web sites?
Which of the following can a virus do?
Which of the following can a virus do?
The online content revenue model in which free content drives offline revenues is called the _________.
The online content revenue model in which free content drives offline revenues is called the _________.
Which of the following is not one of the benefits of e-commerce to sellers?
Which of the following is not one of the benefits of e-commerce to sellers?
Which of the following is not a type of media convergence?
Which of the following is not a type of media convergence?
A website offering content created by third party transparently to customers is an example of ________.
A website offering content created by third party transparently to customers is an example of ________.
Auction sites like eBay tend to use _______ pricing.
Auction sites like eBay tend to use _______ pricing.
Which of the following an accurate statement about internet phone calls?
Which of the following an accurate statement about internet phone calls?
All of the following are objectives of private industrial networks except ________.
All of the following are objectives of private industrial networks except ________.
When you purchase copyrighted software, what actually are you paying for?
When you purchase copyrighted software, what actually are you paying for?
Which one is threat for E‐commerce?
Which one is threat for E‐commerce?
The basic elements of website is.
The basic elements of website is.
What are the most commonly used input devices today?
What are the most commonly used input devices today?
Which one is not an online payment mode?
Which one is not an online payment mode?
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.
Public key cryptography is also known as _________ cryptography.
Public key cryptography is also known as _________ cryptography.
The foundation for contemporary supply chain management systems includes all of the following except _________.
The foundation for contemporary supply chain management systems includes all of the following except _________.
Which of the following is not a primary function of a portal?
Which of the following is not a primary function of a portal?
which one is not an E‐payment method used in India?
which one is not an E‐payment method used in India?
During E‐commerce transaction we should ensure ___________.
During E‐commerce transaction we should ensure ___________.
Which is not a feature of eCommerce?
Which is not a feature of eCommerce?
Which one is a physical threat?
Which one is a physical threat?
E‐mail messages may be stored on which of the following computers?
E‐mail messages may be stored on which of the following computers?
Which one is also known as plastic money?
Which one is also known as plastic money?
Which of the following is an advantage of e-books?
Which of the following is an advantage of e-books?
Which of the following is not considered to be a drawback of Internet auctions?
Which of the following is not considered to be a drawback of Internet auctions?
Which one is a client level threat?
Which one is a client level threat?
What is an electronic representation of cash?
What is an electronic representation of cash?
Which of the following is not a dimension of privacy?
Which of the following is not a dimension of privacy?
The marketplace for auction sites is best described as __________.
The marketplace for auction sites is best described as __________.
Which of the following is not a reason why digital cash has turned out to be extremely difficult?
Which of the following is not a reason why digital cash has turned out to be extremely difficult?
PaisaPay is offered only by.
PaisaPay is offered only by.
A materials requirements planning (MRP) system is an example of ______.
A materials requirements planning (MRP) system is an example of ______.
All of the following are potential benefits of B2B e-commerce except_________.
All of the following are potential benefits of B2B e-commerce except_________.
Which of the following is not a common approach to phishing?
Which of the following is not a common approach to phishing?
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.
Secret key is used for.
Secret key is used for.
Which of the following is a characteristic of a firewall?
Which of the following is a characteristic of a firewall?
Which one is communication channel threat?
Which one is communication channel threat?
What is an arrangement made between e‐commerce sites that direct users from one site to the other?
What is an arrangement made between e‐commerce sites that direct users from one site to the other?
Which one is the component of cybercash payment system?
Which one is the component of cybercash payment system?
Which is used to identify mobile money?
Which is used to identify mobile money?
Which of the following is not an entertainment industry value chain model?
Which of the following is not an entertainment industry value chain model?
Trust card is introduced by.
Trust card is introduced by.
The most popular type of auction on eBay is the _________.
The most popular type of auction on eBay is the _________.
Which one is not a physical threat?
Which one is not a physical threat?
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
Social networking sites primarily earn their revenue through _________.
Social networking sites primarily earn their revenue through _________.
What is C stands in CIA of smart card?
What is C stands in CIA of smart card?
What is I stands in CIA of smart card?
What is I stands in CIA of smart card?
Which one is not a threat for E‐commerce?
Which one is not a threat for E‐commerce?
What checks out your computer or network for potential weaknesses?
What checks out your computer or network for potential weaknesses?
Secure communication means.
Secure communication means.
Companies can gather information about employees and potential employees from which of the following places?
Companies can gather information about employees and potential employees from which of the following places?
Which is the most important component of IT?
Which is the most important component of IT?
What is software you don't want hidden inside software you do want?
What is software you don't want hidden inside software you do want?
In simple terms, what does risk assessment ask?
In simple terms, what does risk assessment ask?
What might identity thieves do with your identity?
What might identity thieves do with your identity?
Which will harmomputer resources
Which will harmomputer resources
Which one is not a encryption technique?
Which one is not a encryption technique?
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.
Which one is not layer of E‐commerce infrastructure?
Which one is not layer of E‐commerce infrastructure?
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?
Which e‐government arena is being used when governmental agencies send out and accept bids for work?
Which e‐government arena is being used when governmental agencies send out and accept bids for work?
The most common and easily understood type of Net marketplace is ______.
The most common and easily understood type of Net marketplace is ______.
After television, the next largest major player in the commercial entertainment industry is _________.
After television, the next largest major player in the commercial entertainment industry is _________.
What is A stands in CIA of smart card?
What is A stands in CIA of smart card?
Which of the following can be used to help identify people in a crowd?
Which of the following can be used to help identify people in a crowd?
Digital signature is a.
Digital signature is a.
Which of the following best describes predicted growth in C2C and B2C auction spending?
Which of the following best describes predicted growth in C2C and B2C auction spending?
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.
What is a program, when installed on a computer, records every keystroke and mouse click?
What is a program, when installed on a computer, records every keystroke and mouse click?
The viruses spreads through __________.
The viruses spreads through __________.
‐‐‐‐‐‐‐‐‐ card is read only.
‐‐‐‐‐‐‐‐‐ card is read only.
Which of the following captures screen images?
Which of the following captures screen images?
An auction that has multiple winners that all pay the same price is an example of________.
An auction that has multiple winners that all pay the same price is an example of________.
The E‐payment mechanism widely used in B2B is.
The E‐payment mechanism widely used in B2B is.
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an _______.
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an _______.
Cookies are used to do which of the following?
Cookies are used to do which of the following?
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.
What looks for people on the network who shouldn't be there or who are acting suspiciously?
What looks for people on the network who shouldn't be there or who are acting suspiciously?
Which one is an encryption technique?
Which one is an encryption technique?
All of the following are characteristics of a social network except _______.
All of the following are characteristics of a social network except _______.
Which one is not a server level threat?
Which one is not a server level threat?
The virus that are commonly found in word documents are called __________.
The virus that are commonly found in word documents are called __________.
______________ marketing is the Internet version of word-of-mouth marketing.
______________ marketing is the Internet version of word-of-mouth marketing.
Which of the following to viruses harm?
Which of the following to viruses harm?
Which of the following portal revenue models involves charging for premium content?
Which of the following portal revenue models involves charging for premium content?
Why would a merchant want to customize products?
Why would a merchant want to customize products?
The virus that are attached with vb and java files are called.
The virus that are attached with vb and java files are called.
The protocol which allows the file transfer between computers is.
The protocol which allows the file transfer between computers is.
The smart card which use antenna for reading and writing data.
The smart card which use antenna for reading and writing data.
Which one is the third party payment providers who offer digital wallets for E‐merchants?
Which one is the third party payment providers who offer digital wallets for E‐merchants?
Which portal business model best describes Yahoo?
Which portal business model best describes Yahoo?
Technologies that help enhance resolution of e-book reader display screens are known as _________.
Technologies that help enhance resolution of e-book reader display screens are known as _________.
Which one is not used as a security mechanism?
Which one is not used as a security mechanism?
E‐Banking is also known as.
E‐Banking is also known as.
What is the name of the new anti‐Spam bill?
What is the name of the new anti‐Spam bill?
What is a technology‐enabled microchip implanted into the human body?
What is a technology‐enabled microchip implanted into the human body?
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.
OTP stands for.
OTP stands for.
The two main types of Internet-based B2B commerce are_________.
The two main types of Internet-based B2B commerce are_________.
Which one is not an offline payment mode?
Which one is not an offline payment mode?
E‐cheques are …………
E‐cheques are …………
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
Which of the following examines information passing through switches, hubs, or routers?
Which of the following examines information passing through switches, hubs, or routers?
Cyber slacking consists of what activities?
Cyber slacking consists of what activities?
What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?
What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?
Private Key cryptography is also known as __________ cryptography.
Private Key cryptography is also known as __________ cryptography.
Which type of technology will increase portability and mobility?
Which type of technology will increase portability and mobility?
Which one is not an encryption technique?
Which one is not an encryption technique?