Beruflich Dokumente
Kultur Dokumente
a. 1994
b. 1996
c. 1992
d. 1990
a. Commerce
b. E-Commerce
c. E-Business
d. None of these
a. EDI
b. Protocols
c. TCP/IP
d. None of these
a. Books
b. Vegetables
c. All of these
d. None of these
a. EDI
b. Protocols
c. Standards
d. Business applications
e.
48. Electronic Exchange of business documents in a standard format is known as
………………
a. E-commerce
b. E-Business
c. EDI
d. None of these
a. E-commerce
b. EDI
c. Networking
d. SCM
50. _______ unauthorized use of services, fraud, harassment by email, and
pornography.
a. Trojan horse
b. Spoofing
c. Denial of service attack
d. Phishing
51. _____ security consists of various services like like privacy, authenticity and
message integrity.
a. Access
b. Transaction
c. Both (a) and (b)
d. Description
52. When a person knowingly destroys or alters any computer source code used
for a computer system it is called as _____.
a. Hacking
b. Tampering
c. Both (a) and (b)
d. Encryption
53. Electronic Payment systems offer advantages like.
a. Convenience
b. Reduced risk
c. Both (a) and (b)
d. Credit
54. _____ cards are also called as check cards .
a. Debit
b. Credit
c. Both (a) and (b)
d. None
55. _____ card was first produced by Motorola in 1977.
a. Debit
b. Credit
c. Smart
d. Debit Card
56. Contact card and contactless cards are a type of _____ card.
a. Debit
b. Credit
c. Smart
d. Credit Card
2.
3.
57. In a _____ payment gateway the customer is directed to the payment page
and not out of the website.
a. Shared
b. Hosted
c. Both (a) and (b)
d. Debit
58. World pay is a _____.
a. Debit Card
b. Credit Card
c. Payment Gateway
d. Transaction
59. Express warranty is a warranty in _____ form
a. Oral
b. Written
c. Both (a) and (b)
d. Description
60. _____ is the transformation of data in some unreadable form.
a. Encryption
b. Description
c. Both (a) and (b)
d. Debit Card
61. _______ is a social news website.
a. Reddit
b. Debit
c. Credit
d. Submit
62. Search Engine Marketing (SEM) is a ________term approach .
a. Short
b. Medium
c. Long
d. Small
63. Influencer marketing is that it is not as controllable as _______ marketing.
a. Modern
b. Traditional
c. Contemporary
d. Online
64. Spam is ________email.
a. Solicited
b. Inbox
c. Unsolicited
d. Draft
65. What is the name for direct computer‐to‐computer transfer of transaction
information contained in standard business documents?
a. internet commerce
b. e‐commerce
c. transaction information transfer
d. electronic data interchange
66. Which of the following is used in B2B to pay for purchases?
a. e‐commerce
b. financial electronic data interchange
c. electronic data exchange
d. Electronic checks
67. 67.Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used to decrypt data. The key used to encrypt data is called
the key.
a. decryption
b. private
c. encryption
d. public
68. Secure Sockets Layers does which of the following?
a. creates a secure, private connection to a webserver
b. Encrypts information
c. sends information over the internet
d. all of the above
69. The practice of forging a return address on an e‐mail so that the recipient is
fooled into revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
70. What is a model of a proposed product, service, or system?
a. Prototyping
b. Prototype
c. Proof‐of‐concept prototype
d. Selling prototype