LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Multiple Choice Multiple Answer
  Question      Microsoft wallet is currently working with
  Correct Answer      Master card , American express charge card
  Your Answer      Electronic cash system , Internet bank accounts
 Select The Blank
  Question      The model used for computer network is called as ________.
  Correct Answer      OSI
  Your Answer      OSI
 Match The Following
Question    Correct Answer    Your Answer
Marketing Notice    New Products Information    New Products Information
Logon Page    Business partner's page    Business partner's page
Home Page    Latest Marketing Update    Latest Marketing Update
Order Page    Product summaries    Summary Of Orders
 Multiple Choice Multiple Answer
  Question      List the three types of information a smart card may contain
  Correct Answer      Financial facts , Account information , Health information
  Your Answer      Financial facts , Health information , Weather information
 Select The Blank
  Question      ________ is a software that locates web pages based on matching keywords.
  Correct Answer      Search engine
  Your Answer      Search engine
 Multiple Choice Multiple Answer
  Question      If the product picked by the customer is out of stock
  Correct Answer      The product has to be backordered , Give him options of other similar products , Order the product when the inventory reaches the minimum count
  Your Answer      The product has to be backordered , Order the product when the inventory reaches the minimum count
 Select The Blank
  Question      A list of company activities that make up the website is called ________.
  Correct Answer      Content Inventory
  Your Answer      Content Inventory
 True/False
  Question      Recovery from error is thought of in the planning phase.
  Correct Answer      False
  Your Answer      True
 Multiple Choice Single Answer
  Question      There is no real safeguard for ensuring messages. Interent users send and receive messages are not intercepted or even altered by some unknown interloper.This threat is called
  Correct Answer      Packet Sniffing
  Your Answer      Packet Sniffing
 Multiple Choice Multiple Answer
  Question      Select the agencies besides the customer and vendor in a credit card transaction
  Correct Answer      Vendor's bank , Customer's bank , Card issuing company
  Your Answer      Vendor's bank , Customer's bank , Card issuing company
 True/False
  Question      Technical support can make or break a b-to-c interface for any e-business.
  Correct Answer      True
  Your Answer      True
 Multiple Choice Multiple Answer
  Question      Typically what information a new business required to provide the merchant bank in opening an account
  Correct Answer      Business plan , details about existing bank accounts , credit history
  Your Answer      Business plan , details about existing bank accounts , Customer list
 True/False
  Question      Insert statement can populate a table with records from another table.
  Correct Answer      True
  Your Answer      True
 Select The Blank
  Question      The final phase of site building life cycle is ________.
  Correct Answer      Visual Design
  Your Answer      Page Layout
 Multiple Choice Single Answer
  Question      Planning for scalability means
  Correct Answer      Capacity planning
  Your Answer      Capacity planning
 Multiple Choice Multiple Answer
  Question      The delivery system of ecommerce purcahses has to depend on
  Correct Answer      Size of Product , Nature of Product , Urgency
  Your Answer      Size of Product , Nature of Product , Quantity
 True/False
  Question      SQL statements can be used with higher level languages like Java,C++
  Correct Answer      True
  Your Answer      False
 Multiple Choice Single Answer
  Question      The act of sending a message pretending to be authorized user is called as
  Correct Answer      Spoofing
  Your Answer      Swapping
 True/False
  Question      All eBay auctions have a minimum bid increment.
  Correct Answer      True
  Your Answer      False
 Multiple Choice Single Answer
  Question      Which one of the following is information selling on the web?
  Correct Answer      Online Publishing Site
  Your Answer      Online Publishing Site
 Multiple Choice Single Answer
  Question      In composite query the basic requirement is
  Correct Answer      Join between two tables
  Your Answer      Similar records
 Multiple Choice Multiple Answer
  Question      Broad Targeted Marketing include following ways
  Correct Answer      Chat Rooms , Thematic Web Sites , Portals
  Your Answer      Thematic Web Sites , Portals , Email
 Select The Blank
  Question      Embedded Style Definitions are defined in the ________ section of the HTML file.
  Correct Answer      HEAD
  Your Answer      HEAD
 Multiple Choice Multiple Answer
  Question      Secureware has designed a secure web platform utilizing three tiered architecture ,the three tiers are
  Correct Answer      Encryption technologies , Trusted Operating System , Firewalls
  Your Answer      Encryption technologies , Decryption Technologies , Firewalls
 Match The Following
Question    Correct Answer    Your Answer
Secret data    Existance is secret    Blaocked data
Public data    Protected from modification    Restored data
Copyright data    Content is not secret    Protected from modification
Confidential data    Content is secret    Content is secret
 True/False
  Question      EBT systems are designed to provide no cost or low cost access methods.
  Correct Answer      True
  Your Answer      True
 True/False
  Question      Customers must have an account with central online bank in most digital cash systems
  Correct Answer      True
  Your Answer      True
 Multiple Choice Single Answer
  Question      The banking which allows banks to set up retail branches on subscriber based online services is
  Correct Answer      Online Services Based Banking
  Your Answer      Online Services Based Banking
 True/False
  Question      Company Information lets the potential online shopper know the sort of outfit of the eshop.
  Correct Answer      True
  Your Answer      True
 True/False
  Question      Two mondex card holders can transfer cash between their cards over a telephone line.
  Correct Answer      True
  Your Answer      True
 Multiple Choice Single Answer
  Question      Internet payments for items costing $1 or less than the lower threshold of credit card payments
  Correct Answer      Micropayments
  Your Answer      Micropayments
 Multiple Choice Single Answer
  Question      A process of making information indeipherable except to those with a decoding key
  Correct Answer      Encryption
  Your Answer      Encryption
 Select The Blank
  Question      ________ is a bits of information stored on a user's hard disk that identifies the user the next time he/she accesses the web site.
  Correct Answer      Cookies
  Your Answer      Cookies
 Multiple Choice Multiple Answer
  Question      Select the three main advantages of smart card
  Correct Answer      portable , Contain encrypted information , Impossible for credit theft
  Your Answer      portable , Contain encrypted information , Smart cards accepted every where
 Multiple Choice Multiple Answer
  Question      A trusted operating system provides
  Correct Answer      strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
  Your Answer      strong access controls , create virtual lockbox , to limit access to the system form external networks
 True/False
  Question      E-services give new dimension to original service
  Correct Answer      True
  Your Answer      True
 Multiple Choice Single Answer
  Question      A home banking service in combination with a PC and modem and bank become an electronic gateway to customers and accounts is
  Correct Answer      Proprietary Bank dial up services
  Your Answer      Online Services based banking
 Select The Blank
  Question      In working of digital signature private key is applied to a shorter form of data called ________.
  Correct Answer      Hash
  Your Answer      Abbreivation
 Select The Blank
  Question      In ________ style sheets the style definitions are store in seprate file with extension CSS.
  Correct Answer      External
  Your Answer      Linked
 Select The Blank
  Question      In Netscape's security socket layer the test of GET command and the text of HTML file are sent and received through connections called ________.
  Correct Answer      Sockets
  Your Answer      Sockets
 Multiple Choice Single Answer
  Question      Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?
  Correct Answer      Ecoins
  Your Answer      Ecoins
 Multiple Choice Single Answer
  Question      The planning process for e-business include
  Correct Answer      Deciding about the products and services you want to sell
  Your Answer      Deciding about the products and services you want to sell
 Multiple Choice Multiple Answer
  Question      Open Universities have moved into providing internet based version of course.The reason behind it is,
  Correct Answer      Clientbase outside their catchment is possible , Delivery of courses at reduced cost
  Your Answer      Clientbase outside their catchment is possible , Delivery of courses at reduced cost , Setup cost is reduced
 Select The Blank
  Question      ________ means keeping a system or a business in a up-to-date state based on the initial design or plan.
  Correct Answer      maintainance
  Your Answer      Development
 Select The Blank
  Question      ________ auction sites involve a customer selling an item to another customer through auction site.
  Correct Answer      C2C
  Your Answer      C2C
 Multiple Choice Single Answer
  Question      Agile wallet secure electronic server was developed by :
  Correct Answer      Cybercash
  Your Answer      Cybercash
 True/False
  Question      In hardened firewall host FTP ,Gopher services are located on firewall systems rather than being maintained on many systems.
  Correct Answer      True
  Your Answer      True
No comments:
Post a Comment