On This Page

This set of E-Commerce Management Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Management Set 5

Q1 | Which is used for transferring money from one bank account to another directlywithout involving cash
  • eft
  • e-cash
  • micropayment
  • none
Q2 | Which system provides a service that is paid for prior to usage
  • post paid payment system
  • prepaid payment system
  • spot cash system
  • none
Q3 | Which is an electronic medium for making payment
  • smart card
  • debit card
  • e- cash
  • all of the above
Q4 | All credit cards are
  • smart cash
  • post paid cards
  • e cash
  • none
Q5 | A popular example of E wallet is
  • micro soft wallet
  • mega soft wallet
  • penta soft wallet
  • none
Q6 | Which are made for small payment on the web
  • mega payments
  • micro payments
  • spot payment
  • all the above
Q7 | Which are used for signing and endorsing electronic changes
  • manual signature
  • thump impression
  • digital signature
  • spot signature
Q8 | The two types of credit cards today namely credit cards issued by credit cardcompanies
  • master card , visa
  • smart card credit card
  • debit card, e cash
  • none
Q9 | ……………………is a card with a microchip that can be used instead of cashand coins for every thing.
  • electronics cash
  • fast cash
  • electronic purse
  • none
Q10 | Prepaid or real-time tokens are exchanged between
  • banker and applicant
  • payer and drawer
  • buyer and seller
  • none
Q11 | …………. Is a digital analogue of various forms of payment backed by a bank
  • electronics cash
  • electronic purse
  • electronic tokens
  • non e
Q12 | There are two main concerns for using digital coins: anonymity of theconsumer and :-
  • prepaid system
  • post paid system
  • electronic tokens
  • online verification
Q13 | SSL is the most widely deployed
  • security protocol
  • data encryption
  • cryptography
  • none
Q14 | …………………. Encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.
  • ssl
  • set
  • secret key
  • none
Q15 | …………………. Is the process of coding and scrambling of messages toprevent un authorized access to under standing of data being transmitted
  • cryptography
  • encryption
  • security key
  • none
Q16 | ………………. Is used to keep transmissions privacy through the use ofdata encryption techniques.
  • data encryption
  • crytography
  • security key
  • non e
Q17 | Which refers to the automatic identification (or) identity verification of livingpersons using their enduring physical or behavioral characteristics
  • biometrics
  • cryptography
  • encryption
  • none
Q18 | ……………… involves checking to see if the signal is good quality
  • transmission
  • quality control
  • decision
  • none
Q19 | The process of encrypted data readable once again is called,
  • encryption
  • decryption
  • uncryption
  • none
Q20 | This the process of making information un intelligible to the unauthorized reader
  • encryption
  • decryption
  • uncryption
  • none
Q21 | The attacker monitors the data between the shoppers computer and the server
  • spoofing
  • snoofing
  • sniffing
  • none
Q22 | The private content of transaction, if unprotected can be intercepted when it gothrough the route over the internet called.
  • spoofing
  • snooping
  • sniffing
  • eavesdropping
Q23 | Gain entry into the user’s system and scan your file system for personalinformation is known as
  • spoofing
  • snooping
  • sniffing
  • none
Q24 | Creating illegitimate site that appear to published by established organizationsare by this name
  • spoofing
  • snooping
  • sniffing
  • none
Q25 | The IT act came into effect on
  • 17 may 2000
  • 17th december 2000
  • 17 oct 2000
  • 17 june 2000