LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Multiple Choice Single Answer
  Question      The banking which allows banks to set up retail branches on subscriber based online services is
  Correct Answer      Online Services Based Banking
  Your Answer      Online Services Based Banking
 Multiple Choice Single Answer
  Question      To create temper proof electronic cash that can be traced back to its origin, what is used?
  Correct Answer      Complex Cryptographic algorithm
  Your Answer      Serial numbered electronic cash
 Multiple Choice Multiple Answer
  Question      Hit counter
  Correct Answer      Counts number of hits for a web site , Provided by ISP , Is a s/w
  Your Answer      Counts number of hits for a web site , Provided by ISP , Is a s/w
 Select The Blank
  Question      ________ auction sites involve a customer selling an item to another customer through auction site.
  Correct Answer      C2C
  Your Answer      C2C
 True/False
  Question      Secure Electronic Transactions is a s/w that handles credit card information of a customer.
  Correct Answer      True
  Your Answer      True
 Multiple Choice Single Answer
  Question      Agile wallet secure electronic server was developed by :
  Correct Answer      Cybercash
  Your Answer      Digicash
 Select The Blank
  Question      In ________ personalization the inputs of many users is compared before the program comes up with a recommendation to the visitor.
  Correct Answer      Collabrative Filtering
  Your Answer      Rule Based
 True/False
  Question      In Millicent system consumer has to deal with dozens of brokers to satisfy his or her scrip needs for many merchants.
  Correct Answer      False
  Your Answer      True
 Select The Blank
  Question      ________is the act of storing a document on local server,enabling it to be presented faster than if it is accessed from the document's original server.
  Correct Answer      Caching
  Your Answer      Caching
 Select The Blank
  Question      ________ command produces a query to the database tables according to condition specified by user.
  Correct Answer      Select
  Your Answer      Select
 True/False
  Question      Company Information lets the potential online shopper know the sort of outfit of the eshop.
  Correct Answer      True
  Your Answer      True
 True/False
  Question      Recovery from error is thought of in the planning phase.
  Correct Answer      False
  Your Answer      False
 Multiple Choice Multiple Answer
  Question      A trusted operating system provides
  Correct Answer      strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
  Your Answer      strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information , to limit access to the system form external networks
 Multiple Choice Multiple Answer
  Question      The basic requirements for transaction security are
  Correct Answer      Privacy , Confidentiality , Integrity
  Your Answer      Privacy , Confidentiality , Integrity
 Multiple Choice Single Answer
  Question      The planning process for e-business include
  Correct Answer      Deciding about the products and services you want to sell
  Your Answer      Deciding about the products and services you want to sell
 Multiple Choice Single Answer
  Question      The act of sending a message pretending to be authorized user is called as
  Correct Answer      Spoofing
  Your Answer      Spoofing
 Multiple Choice Multiple Answer
  Question      Off-the-shelf home finance software are
  Correct Answer      Microsoft Money , Intuit's Quicken
  Your Answer      Compuserve , Microsoft Money , Intuit's Quicken , Talley
 Multiple Choice Multiple Answer
  Question      Select the three options due to which credit theft is impossible with smart card
  Correct Answer      Key to unlock encrypted information required , There is no external account number on the card
  Your Answer      Key to unlock encrypted information required , No physical signature on the card , Smart cards can be used with only acquainted merchants
 Select The Blank
  Question      ________ is online shopping device that seals personal information in a free plugin that can be invoked when making a purchase.
  Correct Answer      Digital Wallet
  Your Answer      Digital Buyer
 Multiple Choice Multiple Answer
  Question      Select the three important factors required for gaining acceptance of smart cards
  Correct Answer      Availability of smart card readers , Compatibility between smart cards , Application
  Your Answer      Availability of smart card readers , Compatibility between smart cards , Security
 True/False
  Question      The downloading time for java applets is much higher than that of HTML
  Correct Answer      True
  Your Answer      True
 True/False
  Question      Banking on Internet is same as banking vai online services
  Correct Answer      False
  Your Answer      True
 Match The Following
Question    Correct Answer    Your Answer
TEXT    Default text color in webpage    Default text color in webpage
LINK    Unvisited Hyperlink's color    Unvisited Hyperlink's color
ALINK    Active Hyperlink's color    Active Hyperlink's color
VLINK    Visited Hyperlink's color    Visited Hyperlink's color
 Multiple Choice Multiple Answer
  Question      Methods for ensuring inforamtion integrity include
  Correct Answer      Error detection codes , Checksums , Sequence Numbers
  Your Answer      Checksums , Sequence Numbers
 Select The Blank
  Question      A ________ is digital cash minted by a small number of third party organizations
  Correct Answer      Scrip
  Your Answer      Smart card
 Multiple Choice Multiple Answer
  Question      The ecoin system uses a three link consistng of a
  Correct Answer      Consumer , Merchant , Server
  Your Answer      Consumer , Merchant , Server
 Multiple Choice Single Answer
  Question      Where does the error occur ? Does the system give prompts on how to proceed? Does the system let one know where one is? This indicates which factor of usability of computer software?
  Correct Answer      System Feecback
  Your Answer      Error Detection
 Multiple Choice Multiple Answer
  Question      Which of the following tags are related to formatting of text?
  Correct Answer      , ,
  Your Answer      ,
 Multiple Choice Single Answer
  Question      While delivering educational materail on internet in Eeducation, which issue is most important?
  Correct Answer      Model:Push/Pull
  Your Answer      Information
 Multiple Choice Multiple Answer
  Question      Site navigation is aided by
  Correct Answer      Site Index , Site Search Engine , Logical sequencing of facilities
  Your Answer      Site Index , Site Search Engine , Logical sequencing of facilities , Type of browser
 Multiple Choice Multiple Answer
  Question      E-business can spread because of
  Correct Answer      Word-of-mouth , An integrated supply-chain , Best shipping and after sales service
  Your Answer      An integrated supply-chain
 Multiple Choice Single Answer
  Question      In creating anonymous electronic cash what is bank required to do
  Correct Answer      Digitally sign the electronic cash
  Your Answer      Associate the electronic cash with a particular consumer
 Multiple Choice Multiple Answer
  Question      Secureware has designed a secure web platform utilizing three tiered architecture ,the three tiers are
  Correct Answer      Encryption technologies , Trusted Operating System , Firewalls
  Your Answer      Encryption technologies , Decryption Technologies , Firewalls
 Select The Blank
  Question      ________ is a software that locates web pages based on matching keywords.
  Correct Answer      Search engine
  Your Answer      Search engine
 Multiple Choice Single Answer
  Question      The example of E-service which enhances original service is
  Correct Answer      Eeducation
  Your Answer      Eeducation
 Multiple Choice Single Answer
  Question      KDD communications (kCOM) is the internet subsidiary of
  Correct Answer      Kokusai Denshin Denwa
  Your Answer      kokee Denshiv Deva
 True/False
  Question      The efficiency of user interface increases if error prevention is good
  Correct Answer      True
  Your Answer      False
 Match The Following
Question    Correct Answer    Your Answer
Secret data    Existance is secret    Content is secret
Public data    Protected from modification    Content is not secret
Copyright data    Content is not secret    Protected from modification
Confidential data    Content is secret    Existance is secret
 Multiple Choice Single Answer
  Question      The main security feature to prevent double spending is
  Correct Answer      Threat of prosecution
  Your Answer      Serial numbering of electronic cash
 True/False
  Question      A credit card contains cash.
  Correct Answer      False
  Your Answer      True
 True/False
  Question      There is no preset spending limit based on the user's credit limit in a credit card.
  Correct Answer      False
  Your Answer      False
 Multiple Choice Single Answer
  Question      The cheap delivery system for Ecommerce purchases is
  Correct Answer      Post
  Your Answer      Electronic Delivery
 Select The Blank
  Question      The SSl protocol operates at ________layer
  Correct Answer      Transport
  Your Answer      Presentation
 Select The Blank
  Question      An ________ system is one that people can easily enhance without providing any earlier work on the system
  Correct Answer      extensible
  Your Answer      expanded
 Select The Blank
  Question      In ________ style sheets the style definitions are store in seprate file with extension CSS.
  Correct Answer      External
  Your Answer      Inline
 True/False
  Question      Customers must have an account with central online bank in most digital cash systems
  Correct Answer      True
  Your Answer      True
 Select The Blank
  Question      The Packet Filtering Router operates at the ________ layer.
  Correct Answer      Network
  Your Answer      Network
No comments:
Post a Comment