Which of the following can be used to help identify people in a crowd?
Which of the following can be used to help identify people in a crowd?
All of the following are objectives of private industrial networks except ________.
All of the following are objectives of private industrial networks except ________.
Which of the following is not one of the benefits of e-commerce to sellers?
Which of the following is not one of the benefits of e-commerce to sellers?
Which of the following is not a reason why digital cash has turned out to be extremely difficult?
Which of the following is not a reason why digital cash has turned out to be extremely difficult?
Goods directly involved in the production process are known as _________.
Goods directly involved in the production process are known as _________.
Cookies are used to do which of the following?
Cookies are used to do which of the following?
Cyber slacking consists of what activities?
Cyber slacking consists of what activities?
The smart card which use antenna for reading and writing data.
The smart card which use antenna for reading and writing data.
The E‐payment mechanism widely used in B2B is.
The E‐payment mechanism widely used in B2B is.
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
The virus that are commonly found in word documents are called __________.
The virus that are commonly found in word documents are called __________.
What checks out your computer or network for potential weaknesses?
What checks out your computer or network for potential weaknesses?
An auction that has multiple winners that all pay the same price is an example of________.
An auction that has multiple winners that all pay the same price is an example of________.
Which one is not a server level threat?
Which one is not a server level threat?
Which one is a client level threat?
Which one is a client level threat?
What are the most commonly used input devices today?
What are the most commonly used input devices today?
‐‐‐‐‐‐‐‐‐ card is read only.
‐‐‐‐‐‐‐‐‐ card is read only.
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.
What is a program, when installed on a computer, records every keystroke and mouse click?
What is a program, when installed on a computer, records every keystroke and mouse click?
Which is used to identify mobile money?
Which is used to identify mobile money?
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
A _________ is a B2B trading network that links a particular seller with its own trading partners.
A _________ is a B2B trading network that links a particular seller with its own trading partners.
The marketplace for auction sites is best described as __________.
The marketplace for auction sites is best described as __________.
OTP stands for.
OTP stands for.
Social networking sites primarily earn their revenue through _________.
Social networking sites primarily earn their revenue through _________.
Which one is not a physical threat?
Which one is not a physical threat?
After television, the next largest major player in the commercial entertainment industry is _________.
After television, the next largest major player in the commercial entertainment industry is _________.
Which one is not an offline payment mode?
Which one is not an offline payment mode?
Which item can a password be used to protect?
Which item can a password be used to protect?
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.
Which of the following an accurate statement about internet phone calls?
Which of the following an accurate statement about internet phone calls?
Which one is not a encryption technique?
Which one is not a encryption technique?
Which one is an offline payment mode?
Which one is an offline payment mode?
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.
Which one is not a threat for E‐commerce?
Which one is not a threat for E‐commerce?
Which will harmomputer resources
Which will harmomputer resources
Which one is not layer of E‐commerce infrastructure?
Which one is not layer of E‐commerce infrastructure?
__________ is backbone of all E‐payments in E‐commerce.
__________ is backbone of all E‐payments in E‐commerce.
The two main types of Internet-based B2B commerce are_________.
The two main types of Internet-based B2B commerce are_________.
The basic elements of website is.
The basic elements of website is.
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________.
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________.
What might identity thieves do with your identity?
What might identity thieves do with your identity?
A materials requirements planning (MRP) system is an example of ______.
A materials requirements planning (MRP) system is an example of ______.
What is I stands in CIA of smart card?
What is I stands in CIA of smart card?
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.
Which e‐government arena is being used when governmental agencies send out and accept bids for work?
Which e‐government arena is being used when governmental agencies send out and accept bids for work?
A website offering content created by third party transparently to customers is an example of ________.
A website offering content created by third party transparently to customers is an example of ________.
The viruses spreads through __________.
The viruses spreads through __________.
Which of the following is a characteristic of a firewall?
Which of the following is a characteristic of a firewall?
Technologies that help enhance resolution of e-book reader display screens are known as _________.
Technologies that help enhance resolution of e-book reader display screens are known as _________.
Which is not a feature of eCommerce?
Which is not a feature of eCommerce?
Secret key is used for.
Secret key is used for.
What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?
What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?
PaisaPay is offered only by.
PaisaPay is offered only by.
Which of the following is not an entertainment industry value chain model?
Which of the following is not an entertainment industry value chain model?
What is software you don't want hidden inside software you do want?
What is software you don't want hidden inside software you do want?
Unsolicited e‐mail is called what?
Unsolicited e‐mail is called what?
Public key cryptography is also known as _________ cryptography.
Public key cryptography is also known as _________ cryptography.
Which of the following records logons and deletions?
Which of the following records logons and deletions?
Which of the following is not a common approach to phishing?
Which of the following is not a common approach to phishing?
Which one is an encryption technique?
Which one is an encryption technique?
The foundation for contemporary supply chain management systems includes all of the following except _________.
The foundation for contemporary supply chain management systems includes all of the following except _________.
Which of the following can a virus do?
Which of the following can a virus do?
Which of the following best describes predicted growth in C2C and B2C auction spending?
Which of the following best describes predicted growth in C2C and B2C auction spending?
In simple terms, what does risk assessment ask?
In simple terms, what does risk assessment ask?
Companies can gather information about employees and potential employees from which of the following places?
Companies can gather information about employees and potential employees from which of the following places?
Which one is the third party payment providers who offer digital wallets for E‐merchants?
Which one is the third party payment providers who offer digital wallets for E‐merchants?
Which one is communication channel security protocol?
Which one is communication channel security protocol?
Which of the following is not considered to be a drawback of Internet auctions?
Which of the following is not considered to be a drawback of Internet auctions?
Which of the smart card uses a sim like structure for reading and writing data?
Which of the smart card uses a sim like structure for reading and writing data?
The study of encryption is called ___________.
The study of encryption is called ___________.
When you purchase copyrighted software, what actually are you paying for?
When you purchase copyrighted software, what actually are you paying for?
Which one is also known as plastic money?
Which one is also known as plastic money?
Which one is a physical threat?
Which one is a physical threat?
What is A stands in CIA of smart card?
What is A stands in CIA of smart card?
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
Secure communication means.
Secure communication means.
Which one is the component of cybercash payment system?
Which one is the component of cybercash payment system?
What is the most commonly offered interactive feature of newspaper Web sites?
What is the most commonly offered interactive feature of newspaper Web sites?
The online content revenue model in which free content drives offline revenues is called the _________.
The online content revenue model in which free content drives offline revenues is called the _________.
The most popular type of auction on eBay is the _________.
The most popular type of auction on eBay is the _________.
Which of the following applies to the implementation of an idea?
Which of the following applies to the implementation of an idea?
Why would a merchant want to customize products?
Why would a merchant want to customize products?
Which type of technology will increase portability and mobility?
Which type of technology will increase portability and mobility?
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.
All of the following are potential benefits of B2B e-commerce except_________.
All of the following are potential benefits of B2B e-commerce except_________.
Auction sites like eBay tend to use _______ pricing.
Auction sites like eBay tend to use _______ pricing.
What is an arrangement made between e‐commerce sites that direct users from one site to the other?
What is an arrangement made between e‐commerce sites that direct users from one site to the other?
Which one is not an online payment mode?
Which one is not an online payment mode?
Smart card is better protected than other cards using.
Smart card is better protected than other cards using.
Which of the following is not a type of media convergence?
Which of the following is not a type of media convergence?
The virus that are attached with vb and java files are called.
The virus that are attached with vb and java files are called.
Which is the most important component of IT?
Which is the most important component of IT?
Which of the following portal revenue models involves charging for premium content?
Which of the following portal revenue models involves charging for premium content?
E‐mail messages may be stored on which of the following computers?
E‐mail messages may be stored on which of the following computers?
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an _______.
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an _______.
Which one is not an encryption technique?
Which one is not an encryption technique?
E‐Banking is also known as.
E‐Banking is also known as.
Which of the following is an advantage of e-books?
Which of the following is an advantage of e-books?
Which one is not used as a security mechanism?
Which one is not used as a security mechanism?
Which of the following to viruses harm?
Which of the following to viruses harm?
______________ marketing is the Internet version of word-of-mouth marketing.
______________ marketing is the Internet version of word-of-mouth marketing.
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.
The most common and easily understood type of Net marketplace is ______.
The most common and easily understood type of Net marketplace is ______.
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.
Private Key cryptography is also known as __________ cryptography.
Private Key cryptography is also known as __________ cryptography.
What is C stands in CIA of smart card?
What is C stands in CIA of smart card?
Digital signature is a.
Digital signature is a.
which one is not an E‐payment method used in India?
which one is not an E‐payment method used in India?
All of the following are characteristics of a social network except _______.
All of the following are characteristics of a social network except _______.
What is a technology‐enabled microchip implanted into the human body?
What is a technology‐enabled microchip implanted into the human body?
The protocol which allows the file transfer between computers is.
The protocol which allows the file transfer between computers is.
What is the name of the new anti‐Spam bill?
What is the name of the new anti‐Spam bill?
Trust card is introduced by.
Trust card is introduced by.
Which portal business model best describes Yahoo?
Which portal business model best describes Yahoo?
What is an electronic representation of cash?
What is an electronic representation of cash?
Which one is threat for E‐commerce?
Which one is threat for E‐commerce?
E‐cheques are …………
E‐cheques are …………
Which of the following is not a primary function of a portal?
Which of the following is not a primary function of a portal?
Which of the following are ways to prove access rights?
Which of the following are ways to prove access rights?
Which of the following is not a dimension of privacy?
Which of the following is not a dimension of privacy?
Which of the following examines information passing through switches, hubs, or routers?
Which of the following examines information passing through switches, hubs, or routers?
Which one is communication channel threat?
Which one is communication channel threat?
During E‐commerce transaction we should ensure ___________.
During E‐commerce transaction we should ensure ___________.
What looks for people on the network who shouldn't be there or who are acting suspiciously?
What looks for people on the network who shouldn't be there or who are acting suspiciously?
Which of the following captures screen images?
Which of the following captures screen images?