LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking
Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Serial numbered electronic cash
Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Select The Blank
Question ________ auction sites involve a customer selling an item to another customer through auction site.
Correct Answer C2C
Your Answer C2C
True/False
Question Secure Electronic Transactions is a s/w that handles credit card information of a customer.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Agile wallet secure electronic server was developed by :
Correct Answer Cybercash
Your Answer Digicash
Select The Blank
Question In ________ personalization the inputs of many users is compared before the program comes up with a recommendation to the visitor.
Correct Answer Collabrative Filtering
Your Answer Rule Based
True/False
Question In Millicent system consumer has to deal with dozens of brokers to satisfy his or her scrip needs for many merchants.
Correct Answer False
Your Answer True
Select The Blank
Question ________is the act of storing a document on local server,enabling it to be presented faster than if it is accessed from the document's original server.
Correct Answer Caching
Your Answer Caching
Select The Blank
Question ________ command produces a query to the database tables according to condition specified by user.
Correct Answer Select
Your Answer Select
True/False
Question Company Information lets the potential online shopper know the sort of outfit of the eshop.
Correct Answer True
Your Answer True
True/False
Question Recovery from error is thought of in the planning phase.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question A trusted operating system provides
Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
Your Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information , to limit access to the system form external networks
Multiple Choice Multiple Answer
Question The basic requirements for transaction security are
Correct Answer Privacy , Confidentiality , Integrity
Your Answer Privacy , Confidentiality , Integrity
Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Deciding about the products and services you want to sell
Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spoofing
Multiple Choice Multiple Answer
Question Off-the-shelf home finance software are
Correct Answer Microsoft Money , Intuit's Quicken
Your Answer Compuserve , Microsoft Money , Intuit's Quicken , Talley
Multiple Choice Multiple Answer
Question Select the three options due to which credit theft is impossible with smart card
Correct Answer Key to unlock encrypted information required , There is no external account number on the card
Your Answer Key to unlock encrypted information required , No physical signature on the card , Smart cards can be used with only acquainted merchants
Select The Blank
Question ________ is online shopping device that seals personal information in a free plugin that can be invoked when making a purchase.
Correct Answer Digital Wallet
Your Answer Digital Buyer
Multiple Choice Multiple Answer
Question Select the three important factors required for gaining acceptance of smart cards
Correct Answer Availability of smart card readers , Compatibility between smart cards , Application
Your Answer Availability of smart card readers , Compatibility between smart cards , Security
True/False
Question The downloading time for java applets is much higher than that of HTML
Correct Answer True
Your Answer True
True/False
Question Banking on Internet is same as banking vai online services
Correct Answer False
Your Answer True
Match The Following
Question Correct Answer Your Answer
TEXT Default text color in webpage Default text color in webpage
LINK Unvisited Hyperlink's color Unvisited Hyperlink's color
ALINK Active Hyperlink's color Active Hyperlink's color
VLINK Visited Hyperlink's color Visited Hyperlink's color
Multiple Choice Multiple Answer
Question Methods for ensuring inforamtion integrity include
Correct Answer Error detection codes , Checksums , Sequence Numbers
Your Answer Checksums , Sequence Numbers
Select The Blank
Question A ________ is digital cash minted by a small number of third party organizations
Correct Answer Scrip
Your Answer Smart card
Multiple Choice Multiple Answer
Question The ecoin system uses a three link consistng of a
Correct Answer Consumer , Merchant , Server
Your Answer Consumer , Merchant , Server
Multiple Choice Single Answer
Question Where does the error occur ? Does the system give prompts on how to proceed? Does the system let one know where one is? This indicates which factor of usability of computer software?
Correct Answer System Feecback
Your Answer Error Detection
Multiple Choice Multiple Answer
Question Which of the following tags are related to formatting of text?
Correct Answer , ,
Your Answer ,
Multiple Choice Single Answer
Question While delivering educational materail on internet in Eeducation, which issue is most important?
Correct Answer Model:Push/Pull
Your Answer Information
Multiple Choice Multiple Answer
Question Site navigation is aided by
Correct Answer Site Index , Site Search Engine , Logical sequencing of facilities
Your Answer Site Index , Site Search Engine , Logical sequencing of facilities , Type of browser
Multiple Choice Multiple Answer
Question E-business can spread because of
Correct Answer Word-of-mouth , An integrated supply-chain , Best shipping and after sales service
Your Answer An integrated supply-chain
Multiple Choice Single Answer
Question In creating anonymous electronic cash what is bank required to do
Correct Answer Digitally sign the electronic cash
Your Answer Associate the electronic cash with a particular consumer
Multiple Choice Multiple Answer
Question Secureware has designed a secure web platform utilizing three tiered architecture ,the three tiers are
Correct Answer Encryption technologies , Trusted Operating System , Firewalls
Your Answer Encryption technologies , Decryption Technologies , Firewalls
Select The Blank
Question ________ is a software that locates web pages based on matching keywords.
Correct Answer Search engine
Your Answer Search engine
Multiple Choice Single Answer
Question The example of E-service which enhances original service is
Correct Answer Eeducation
Your Answer Eeducation
Multiple Choice Single Answer
Question KDD communications (kCOM) is the internet subsidiary of
Correct Answer Kokusai Denshin Denwa
Your Answer kokee Denshiv Deva
True/False
Question The efficiency of user interface increases if error prevention is good
Correct Answer True
Your Answer False
Match The Following
Question Correct Answer Your Answer
Secret data Existance is secret Content is secret
Public data Protected from modification Content is not secret
Copyright data Content is not secret Protected from modification
Confidential data Content is secret Existance is secret
Multiple Choice Single Answer
Question The main security feature to prevent double spending is
Correct Answer Threat of prosecution
Your Answer Serial numbering of electronic cash
True/False
Question A credit card contains cash.
Correct Answer False
Your Answer True
True/False
Question There is no preset spending limit based on the user's credit limit in a credit card.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Electronic Delivery
Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Presentation
Select The Blank
Question An ________ system is one that people can easily enhance without providing any earlier work on the system
Correct Answer extensible
Your Answer expanded
Select The Blank
Question In ________ style sheets the style definitions are store in seprate file with extension CSS.
Correct Answer External
Your Answer Inline
True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer True
Select The Blank
Question The Packet Filtering Router operates at the ________ layer.
Correct Answer Network
Your Answer Network
Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking
Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Serial numbered electronic cash
Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Select The Blank
Question ________ auction sites involve a customer selling an item to another customer through auction site.
Correct Answer C2C
Your Answer C2C
True/False
Question Secure Electronic Transactions is a s/w that handles credit card information of a customer.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Agile wallet secure electronic server was developed by :
Correct Answer Cybercash
Your Answer Digicash
Select The Blank
Question In ________ personalization the inputs of many users is compared before the program comes up with a recommendation to the visitor.
Correct Answer Collabrative Filtering
Your Answer Rule Based
True/False
Question In Millicent system consumer has to deal with dozens of brokers to satisfy his or her scrip needs for many merchants.
Correct Answer False
Your Answer True
Select The Blank
Question ________is the act of storing a document on local server,enabling it to be presented faster than if it is accessed from the document's original server.
Correct Answer Caching
Your Answer Caching
Select The Blank
Question ________ command produces a query to the database tables according to condition specified by user.
Correct Answer Select
Your Answer Select
True/False
Question Company Information lets the potential online shopper know the sort of outfit of the eshop.
Correct Answer True
Your Answer True
True/False
Question Recovery from error is thought of in the planning phase.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question A trusted operating system provides
Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
Your Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information , to limit access to the system form external networks
Multiple Choice Multiple Answer
Question The basic requirements for transaction security are
Correct Answer Privacy , Confidentiality , Integrity
Your Answer Privacy , Confidentiality , Integrity
Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Deciding about the products and services you want to sell
Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spoofing
Multiple Choice Multiple Answer
Question Off-the-shelf home finance software are
Correct Answer Microsoft Money , Intuit's Quicken
Your Answer Compuserve , Microsoft Money , Intuit's Quicken , Talley
Multiple Choice Multiple Answer
Question Select the three options due to which credit theft is impossible with smart card
Correct Answer Key to unlock encrypted information required , There is no external account number on the card
Your Answer Key to unlock encrypted information required , No physical signature on the card , Smart cards can be used with only acquainted merchants
Select The Blank
Question ________ is online shopping device that seals personal information in a free plugin that can be invoked when making a purchase.
Correct Answer Digital Wallet
Your Answer Digital Buyer
Multiple Choice Multiple Answer
Question Select the three important factors required for gaining acceptance of smart cards
Correct Answer Availability of smart card readers , Compatibility between smart cards , Application
Your Answer Availability of smart card readers , Compatibility between smart cards , Security
True/False
Question The downloading time for java applets is much higher than that of HTML
Correct Answer True
Your Answer True
True/False
Question Banking on Internet is same as banking vai online services
Correct Answer False
Your Answer True
Match The Following
Question Correct Answer Your Answer
TEXT Default text color in webpage Default text color in webpage
LINK Unvisited Hyperlink's color Unvisited Hyperlink's color
ALINK Active Hyperlink's color Active Hyperlink's color
VLINK Visited Hyperlink's color Visited Hyperlink's color
Multiple Choice Multiple Answer
Question Methods for ensuring inforamtion integrity include
Correct Answer Error detection codes , Checksums , Sequence Numbers
Your Answer Checksums , Sequence Numbers
Select The Blank
Question A ________ is digital cash minted by a small number of third party organizations
Correct Answer Scrip
Your Answer Smart card
Multiple Choice Multiple Answer
Question The ecoin system uses a three link consistng of a
Correct Answer Consumer , Merchant , Server
Your Answer Consumer , Merchant , Server
Multiple Choice Single Answer
Question Where does the error occur ? Does the system give prompts on how to proceed? Does the system let one know where one is? This indicates which factor of usability of computer software?
Correct Answer System Feecback
Your Answer Error Detection
Multiple Choice Multiple Answer
Question Which of the following tags are related to formatting of text?
Correct Answer , ,
Your Answer ,
Multiple Choice Single Answer
Question While delivering educational materail on internet in Eeducation, which issue is most important?
Correct Answer Model:Push/Pull
Your Answer Information
Multiple Choice Multiple Answer
Question Site navigation is aided by
Correct Answer Site Index , Site Search Engine , Logical sequencing of facilities
Your Answer Site Index , Site Search Engine , Logical sequencing of facilities , Type of browser
Multiple Choice Multiple Answer
Question E-business can spread because of
Correct Answer Word-of-mouth , An integrated supply-chain , Best shipping and after sales service
Your Answer An integrated supply-chain
Multiple Choice Single Answer
Question In creating anonymous electronic cash what is bank required to do
Correct Answer Digitally sign the electronic cash
Your Answer Associate the electronic cash with a particular consumer
Multiple Choice Multiple Answer
Question Secureware has designed a secure web platform utilizing three tiered architecture ,the three tiers are
Correct Answer Encryption technologies , Trusted Operating System , Firewalls
Your Answer Encryption technologies , Decryption Technologies , Firewalls
Select The Blank
Question ________ is a software that locates web pages based on matching keywords.
Correct Answer Search engine
Your Answer Search engine
Multiple Choice Single Answer
Question The example of E-service which enhances original service is
Correct Answer Eeducation
Your Answer Eeducation
Multiple Choice Single Answer
Question KDD communications (kCOM) is the internet subsidiary of
Correct Answer Kokusai Denshin Denwa
Your Answer kokee Denshiv Deva
True/False
Question The efficiency of user interface increases if error prevention is good
Correct Answer True
Your Answer False
Match The Following
Question Correct Answer Your Answer
Secret data Existance is secret Content is secret
Public data Protected from modification Content is not secret
Copyright data Content is not secret Protected from modification
Confidential data Content is secret Existance is secret
Multiple Choice Single Answer
Question The main security feature to prevent double spending is
Correct Answer Threat of prosecution
Your Answer Serial numbering of electronic cash
True/False
Question A credit card contains cash.
Correct Answer False
Your Answer True
True/False
Question There is no preset spending limit based on the user's credit limit in a credit card.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Electronic Delivery
Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Presentation
Select The Blank
Question An ________ system is one that people can easily enhance without providing any earlier work on the system
Correct Answer extensible
Your Answer expanded
Select The Blank
Question In ________ style sheets the style definitions are store in seprate file with extension CSS.
Correct Answer External
Your Answer Inline
True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer True
Select The Blank
Question The Packet Filtering Router operates at the ________ layer.
Correct Answer Network
Your Answer Network
No comments:
Post a Comment