Tuesday, 25 June 2013

Software Engineering and Project Management - 16



LIST OF ATTEMPTED QUESTIONS AND ANSWERS


True/False
Question Select command modify information in the database.
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question The Link which gives error to display page is called
Correct Answer Broken Link
Your Answer Error Link


Multiple Choice Single Answer
Question The short form of world wide web consortium is :
Correct Answer W3C
Your Answer WWWC


Multiple Choice Single Answer
Question The most common way of paying for an ecommerce transaction is with
Correct Answer Credit Card
Your Answer Credit Card


Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Useful for small payments , Economical , Good Security


Multiple Choice Multiple Answer
Question The critical issues for e-business are
Correct Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness
Your Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness


True/False
Question In a credit card, the customer receive a payment for returned goods.
Correct Answer True
Your Answer False


Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Transport


Multiple Choice Multiple Answer
Question Microsoft Merchant Solution is built on .
Correct Answer Windows NT , Internet Information Server
Your Answer Internet Information Server , Personal Web Server


Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking


Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Setting up the security system


True/False
Question Bilateral Transaction is not feasible because of potential for double spending.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Local Delivery


Select The Blank
Question ________ is a bits of information stored on a user's hard disk that identifies the user the next time he/she accesses the web site.
Correct Answer Cookies
Your Answer Cookies


Select The Blank
Question If the internet consumer is________, then the merchant can submit consumer's payment card immediately.
Correct Answer downloading digital files
Your Answer downloading digital files


True/False
Question To process payment card orders, a merchant must first set up a merchant account.
Correct Answer True
Your Answer True


Select The Blank
Question ________ are used to obtain data from the client for submission to server.
Correct Answer Form
Your Answer Form


Match The Following
Question Correct Answer Your Answer

SSL Address security concerns for inforamtion transfer Security scheme based on public key encryption

PCT Spawn secondary key for authentication Blocks pakcets from unknown user

S-HTTP Security scheme based on public key encryption Provide digital signature capability for financial transaction on web

SET Provide digital signature capability for financial transaction on web Spawn secondary key for authentication



True/False
Question The manner in which browser actually lays out the information is dependent on browser itself.
Correct Answer True
Your Answer False


Multiple Choice Multiple Answer
Question Select the two payment card companies using closed loop system
Correct Answer American Express , Discover
Your Answer Visa , Master card


Select The Blank
Question The model used for computer network is called as ________.
Correct Answer OSI
Your Answer OSI


Multiple Choice Multiple Answer
Question Microsoft wallet is currently working with
Correct Answer American express charge card , Master card
Your Answer Electronic cash system , American express charge card , Master card


True/False
Question Cybercash supports smart cards .
Correct Answer False
Your Answer True


Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spammig


Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit cardtransaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Card issuing company


Multiple Choice Multiple Answer
Question To evaulate a web site using the model the following statements should be accessed.
Correct Answer Aesthetic Effect , Product Information , Customer Information
Your Answer Aesthetic Effect , Product Information , Customer Information


True/False
Question The efficiency of user interface increases if error prevention is good
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Pure Cyberbanks provide following services
Correct Answer Personal Banking , Financial Services
Your Answer Personal Banking , Request a trade , Trade Mutual Funds


True/False
Question Microsoft wallet comes preinstalled in Internet Explorer and Netscape Navigator
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question Digital Signatures are used for
Correct Answer Sender Authentication
Your Answer Sender Authentication


Select The Blank
Question An ________ system is one that people can easily enhance without providing any earlier work on the system
Correct Answer extensible
Your Answer extensible


Multiple Choice Single Answer
Question The main security feature to prevent double spending is
Correct Answer Threat of prosecution
Your Answer Serial numbering of electronic cash


Select The Blank
Question File Transfer protocol transfers ________ data.
Correct Answer Binary
Your Answer Binary


Multiple Choice Multiple Answer
Question Typically what information a new business required to provide the merchant bank in opening an account
Correct Answer Business plan , details about existing bank accounts , credit history
Your Answer Business plan , details about existing bank accounts , credit history


True/False
Question SQL statements can be used with higher level languages like Java,C++
Correct Answer True
Your Answer True


True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer False


Select The Blank
Question ________ hubs have built in programmable features to handle packet switching ,routing traffic
Correct Answer Intelligent
Your Answer Intelligent


Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP


Match The Following
Question Correct Answer Your Answer

Marketing Notice New Products Information Latest Marketing Update

Logon Page Business partner's page Business partner's page

Home Page Latest Marketing Update New Products Information

Order Page Product summaries Summary Of Orders



Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Complex Cryptographic algorithm


Select The Blank
Question A list of company activities that make up the website is called ________.
Correct Answer Content Inventory
Your Answer Event List


Multiple Choice Single Answer
Question In Millicent system when a consumer locates a product on a merchan's web site that he or she would like to purchase ,the consumer converts the broker's strip into
Correct Answer Vendor specific scrip
Your Answer Merchan specific scrip


Select The Blank
Question In ________auction the seller puts up an item for sale at a high price.
Correct Answer Reverse
Your Answer Increasing


Multiple Choice Single Answer
Question An attack on the information and communication services by a third party that prevents legitimate users from using the infrastructure is
Correct Answer Denial of Service
Your Answer Spoofing


True/False
Question For Online Retailing to Succeed ,online technology must compliment management and opeational straegy.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question The server developed by cybercash handles
Correct Answer Consumer payment and purchase information , Quick and safe transaction completion
Your Answer Consumer payment and purchase information , Quick and safe transaction completion


Select The Blank
Question ECML stands for ________.
Correct Answer Electronic Commerce modeling language
Your Answer Electronic Commerce modeling language

No comments:

Post a Comment