Select The Blank
Question ________ auction sites involve a customer selling an item to another customer through auction site.
Correct Answer C2C
Your Answer C2C
Multiple Choice Single Answer
Question Electronic cash has not succeeded in
Correct Answer United States
Your Answer Europe
Select The Blank
Question In Netscape's security socket layer the test of GET command and the text of HTML file are sent and received through connections called ________.
Correct Answer Sockets
Your Answer Channels
Multiple Choice Multiple Answer
Question The fulfillment phase of an e-business
Correct Answer Includes packing up the merchandise , Includes shipping the merchandise , Includes answering questions about the order
Your Answer Includes packing up the merchandise , Includes shipping the merchandise , Does not directly involve customer interaction.
Select The Blank
Question In relational database table can be linked up together using key fields in another table known as ________.
Correct Answer Foreign Key
True/False
Question Select command modify information in the database.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question The Link which gives error to display page is called
Correct Answer Broken Link
Your Answer Error Link
Multiple Choice Single Answer
Question The short form of world wide web consortium is :
Correct Answer W3C
Your Answer WWWC
Multiple Choice Single Answer
Question The most common way of paying for an ecommerce transaction is with
Correct Answer Credit Card
Your Answer Credit Card
Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Useful for small payments , Economical , Good Security
Multiple Choice Multiple Answer
Question The critical issues for e-business are
Correct Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness
Your Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness
True/False
Question In a credit card, the customer receive a payment for returned goods.
Correct Answer True
Your Answer False
Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Transport
Multiple Choice Multiple Answer
Question Microsoft Merchant Solution is built on .
Correct Answer Windows NT , Internet Information Server
Your Answer Internet Information Server , Personal Web Server
Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking
Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Setting up the security system
True/False
Question Bilateral Transaction is not feasible because of potential for double spending.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Local Delivery
Select The Blank
Question ________ is a bits of information stored on a user's hard disk that identifies the user the next time he/she accesses the web site.
Correct Answer Cookies
Your Answer Cookies
Select The Blank
Question If the internet consumer is________, then the merchant can submit consumer's payment card immediately.
Correct Answer downloading digital files
Your Answer downloading digital files
True/False
Question To process payment card orders, a merchant must first set up a merchant account.
Correct Answer True
Your Answer True
Select The Blank
Question ________ are used to obtain data from the client for submission to server.
Correct Answer Form
Your Answer Form
Match The Following
Question Correct Answer Your Answer
SSL Address security concerns for inforamtion transfer Security scheme based on public key encryption
PCT Spawn secondary key for authentication Blocks pakcets from unknown user
S-HTTP Security scheme based on public key encryption Provide digital signature capability for financial transaction on web
SET Provide digital signature capability for financial transaction on web Spawn secondary key for authentication
True/False
Question The manner in which browser actually lays out the information is dependent on browser itself.
Correct Answer True
Your Answer False
Multiple Choice Multiple Answer
Question Select the two payment card companies using closed loop system
Correct Answer American Express , Discover
Your Answer Visa , Master card
Select The Blank
Question The model used for computer network is called as ________.
Correct Answer OSI
Your Answer OSI
Multiple Choice Multiple Answer
Question Microsoft wallet is currently working with
Correct Answer American express charge card , Master card
Your Answer Electronic cash system , American express charge card , Master card
True/False
Question Cybercash supports smart cards .
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spammig
Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Card issuing company
Multiple Choice Multiple Answer
Question To evaulate a web site using the model the following statements should be accessed.
Correct Answer Aesthetic Effect , Product Information , Customer Information
Your Answer Aesthetic Effect , Product Information , Customer Information
True/False
Question The efficiency of user interface increases if error prevention is good
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Pure Cyberbanks provide following services
Correct Answer Personal Banking , Financial Services
Your Answer Personal Banking , Request a trade , Trade Mutual Funds
True/False
Question Microsoft wallet comes preinstalled in Internet Explorer and Netscape Navigator
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question Digital Signatures are used for
Correct Answer Sender Authentication
Your Answer Sender Authentication
Select The Blank
Question An ________ system is one that people can easily enhance without providing any earlier work on the system
Correct Answer extensible
Your Answer extensible
Multiple Choice Single Answer
Question The main security feature to prevent double spending is
Correct Answer Threat of prosecution
Your Answer Serial numbering of electronic cash
Select The Blank
Question File Transfer protocol transfers ________ data.
Correct Answer Binary
Your Answer Binary
Multiple Choice Multiple Answer
Question Typically what information a new business required to provide the merchant bank in opening an account
Correct Answer Business plan , details about existing bank accounts , credit history
Your Answer Business plan , details about existing bank accounts , credit history
True/False
Question SQL statements can be used with higher level languages like Java,C++
Correct Answer True
Your Answer True
True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer False
Select The Blank
Question ________ hubs have built in programmable features to handle packet switching ,routing traffic
Correct Answer Intelligent
Your Answer Intelligent
Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP
Match The Following
Question Correct Answer Your Answer
Marketing Notice New Products Information Latest Marketing Update
Logon Page Business partner's page Business partner's page
Home Page Latest Marketing Update New Products Information
Order Page Product summaries Summary Of Orders
Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Complex Cryptographic algorithm
Select The Blank
Question A list of company activities that make up the website is called ________.
Correct Answer Content Inventory
Your Answer Event List
Multiple Choice Single Answer
Question In Millicent system when a consumer locates a product on a merchan's web site that he or she would like to purchase ,the consumer converts the broker's strip into
Correct Answer Vendor specific scrip
Your Answer Merchan specific scrip
Select The Blank
Question In ________auction the seller puts up an item for sale at a high price.
Correct Answer Reverse
Your Answer Increasing
Multiple Choice Single Answer
Question An attack on the information and communication services by a third party that prevents legitimate users from using the infrastructure is
Correct Answer Denial of Service
Your Answer Spoofing
True/False
Question For Online Retailing to Succeed ,online technology must compliment management and opeational straegy.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question The server developed by cybercash handles
Correct Answer Consumer payment and purchase information , Quick and safe transaction completion
Your Answer Consumer payment and purchase information , Quick and safe transaction completion
Select The Blank
Question ECML stands for ________.
Correct Answer Electronic Commerce modeling language
Your Answer Electronic Commerce modeling language
Fun and Fun only Recent Posts: |
Wednesday, April 29, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment