On This Page

This set of Digital Business Multiple Choice Questions & Answers (MCQs) focuses on Digital Business Set 4

Q1 | is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device.
  • Mobile Commerce
  • e-commerce
  • both of these
  • none of these
Q2 | provide security and privacy for the use of the web page content
  • HTTP
  • html
  • FTP
  • none of these
Q3 | website is one that changes or customizes itself frequently and automatically based on certain criteria
  • Dynamic website
  • (Static Website
  • phish site
  • none of these
Q4 | ………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.
  • Dynamic website
  • (Static Website
  • phish site
  • none of these
Q5 | ……………….in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer
  • customer
  • issuer
  • Merchant
  • Acquirer
Q6 | ……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments
  • customer
  • issuer
  • Merchant
  • Acquirer
Q7 | In …………………..type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
  • Prepaid
  • Post paid
  • both of these
  • none of these
Q8 | ………………type of payment system is highly useful to those customers who would like tocontrol overspending,
  • Prepaid
  • Post paid
  • both of these
  • none of these
Q9 | credit card gives all the advantages of a normal credit card without worryingabout the interest charges
  • Prepaid
  • Post paid
  • both of these
  • none of these
Q10 | facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.
  • Cash advance
  • Revolver
  • Tele draft
  • None of these
Q11 | is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.
  • E-cash
  • Digicash
  • Cyber cash
  • any of these
Q12 | is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.
  • Credit card
  • E-Cheques
  • E-cash
  • none of these
Q13 | To accept a credit card for payment, we have to open a account with our bank
  • Savings Bank
  • Current account
  • Merchant account
  • any of these
Q14 | A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.
  • smart Card
  • E-Cheques
  • E-cash
  • none of these
Q15 | is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account
  • Debit Card
  • Electronic purse
  • credit card
  • any of these
Q16 | ……………..is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation.
  • Debit Card
  • Electronic purse
  • credit card
  • any of these
Q17 | is basically a secure gate between our organization data and internet.
  • Network firewall
  • Antivirus
  • both of these
  • none of these
Q18 | encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
  • SSL
  • SET
  • both of these
  • none of these
Q19 | is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
  • Biometric
  • PIN
  • both of these
  • none of these
Q20 | In Biometrics,… ID system is designed to prevent more than one person fromusing a single identity
  • Positive ID system
  • Negative ID system
  • both of these
  • none of these
Q21 | In Biometrics,… ID system is designed to prevent one person from usingmore than one identity
  • Positive ID system
  • Negative ID system
  • both of these
  • none of these
Q22 | are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
  • Network firewall
  • computer virus
  • both of these
  • none of these
Q23 | Which among the following is not an example for computer virus ?
  • Chernobyl
  • Melissa
  • I Love You
  • None of these
Q24 | are special type of software meant for limiting the risks of being hit bycomputer viruses
  • Network firewall
  • Antivirus
  • both of these
  • none of these
Q25 | A is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
  • Hacker
  • spoofer
  • operator
  • none of these