1. Internet advertising is cost effective because it is/can be
Correct : D. All of the above
2. The form of internet marketing wherein the advertisers pay the search engine or the publisher of the ads whenever their ads are clicked is
Correct : A. Cost per Click
3. Internet advertising suffers from weaknesses like
Correct : C. Both of the above
4. Mobile commerce can categorized into
Correct : D. All of the above
5. Which of the following is the most common way for purchasing an online advertising?
Correct : C. Any of these
6. Which of the following is a software that scours the internet collecting data about every website and every webpage within it?
Correct : B. Search Engines
7. Search Engines databases are selected and built by computer robot programs called:
Correct : A. Spiders
8. A portal that helps to establish relations and to conduct transactions between various organizations is termed as:
Correct : A. B2B Portal
9. Which among the following is not an example for Search engine?
Correct : D. Internet Explorer
10. Web pages are prepared using their language as:
Correct : A. HTML
11. The user reaches this page when they specify the address of a website:
Correct : C. Home Page
12. Which of the following is a correct syntax of HTML?
Correct : A. <!doctype HTML>
13. Software which allows user to view the webpage is called as __________.
Correct : B. Internet browser
14. Which of the following website is used to search other website by typing a keyword ?
Correct : B. Search Engine
15. Which of the following is valid Website Address ?
Correct : B. www.helenlowry.com
16. Whenever user opens any website then main page is called as ____.
Correct : B. Home page
17. _________site is created to fraudulently acquire sensitive information such as pass words and
credit card details, by masquerading as a trustworthy person or business
Correct : C. phish site
18. HTML stands for?
Correct : A. Hyper Text Markup Language
19. HTML is a subset of
Correct : A. SGMT
20. A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers
Correct : B. E-payment.
21. E-cash was created by
Correct : A. David Chaum.
22. A plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments etc
Correct : B. Smart Card.
23. The first universal credit card, which could be used at a variety of establishments, was introduced by
Correct : C. Diners’ Club.
24. Example of Digital wallet
Correct : D. All of the above.
25. A type of fraud that involves diverting the client Internet connection to a counterfeit website.
Correct : B. Pharming.
26. _________identifies a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computer
Correct : C. Behavioral biometric authentication.
27. The grace period of a credit card normally runs from
Correct : D. The end of a billing cycle to the next payment due date.
28. …………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.
Correct : D. any of these
29. ………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.
Correct : A. Credit card
30. A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.
Correct : A. smart Cards
31. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account
Correct : A. Debit Card
32. ………………type of payment system is highly useful to those customers who would like to control overspending,
Correct : B. Prepaid
33. .……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.
Correct : C. Electronic purse
34. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer
Correct : A. customer
35. In Biometrics, …………………………ID system is designed to prevent more than one person from using a single identity
Correct : A. Positive ID system
36. In Online Payment System one can transfer money through
Correct : C. Internet
37. One advantage of online payment system is
Correct : A. Overseas purchase
38. Which one of them is not an online payment method?
Correct : B. Demand Draft
39. When goods are purchased without debiting money from your account what type of purchase method are you using?
Correct : C. Credit card Purchase
40. When money is debited from your account when purchasing goods, you are using
Correct : A. Debit Card Purchase
41. Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called
Correct : D. Man-In-The-Middle
42. Encryption means
Correct : C. Password protection
43. Finger print recognition is a type of
Correct : B. Physiological Biometric
44. Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation?
Correct : C. Electronic Wallet / Electronic Purse
45. Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine?
Correct : B. SET
46. Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic?
Correct : A. Biometrics
47. Which among the following is not an example for computer virus?
Correct : D. Network Firewall
48. Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure?
Correct : A. Black Hat Hacker
49. SET means:
Correct : D. Secure Electronic Transaction
50. The verification of credit card is done by using:
Correct : C. All of the above
51. The reverse process of encryption, to make the information readable once again is:
Correct : B. Decryption
52. An Electronic Check is one form of what?
Correct : B. Online Banking
53. A combination of software and information designed to provide security and information for payment is called?
Correct : A. Digital wallet
54. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications
Correct : B. Digital certificates
55. ……………………….is a person who breaks in or trespasses a computer system
Correct : A. Hacker
56. E-mail which contain useless material is termed as……………
Correct : A. Spam
57. What is Biometrics ?
Correct : B. It recognizes individuals based on their inherent physical or behavioral characteristics.
58. SET means ………………
Correct : B. Standard Electronic Transfer
59. Patents protects
Correct : B. Inventions.
60. The minimum punishment for an infringement of copyright in India is
Correct : C. 6 months imprisonment and minimum of Rs 50,000 fine.
61. A________ is a right, granted by the government, to exclude others from making, using, or selling
your invention
Correct : B. Patents.
62. TheTerm of every patent in India is
Correct : D. 20 years.
63. The Trademarks Act 1999 protects well-known trademarks from:
Correct : A. an action against the registration of similar marks.
64. The penalties for infringement of Trademarked content in India
Correct : D. Minimum 6 months imprisonment and fine of INR 50,0000.
65. When did IT Act 2000 came into effect
Correct : A. October 17, 2000.
66. How many schedules are there in IT Act 2000
Correct : B. 4.
67. Trade mark, copyright, patent law etc comes under the purview of……………………
Correct : C. Intellectual property laws
68. Which of the following is an example of Intellectual property ?
Correct : D. All of above
69. Copyright protection is available for
Correct : D. All the above
70. Plan of a building can be protected by
Correct : A. Copyright
71. Copyright protects
Correct : B. Expression
72. Patent of addition can be filed by
Correct : C. Both a) and b)
73. What is the updated version of the IT Act, 2000?
Correct : C. IT Act, 2008
74. _______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind.
Correct : C. Trademark
75. An unauthorised entry into other people’s electronic device is called
Correct : B. Hacking
76. Gaining control of client computer through network is called
Correct : A. Snooping
77. A copyright owner can give authority to anyone to
Correct : C. Copy intellectual property
78. Patent right gives the sole authority to produce for
Correct : D. Inventors
79. Trademark uniquely differentiate products from other
Correct : B. Products
80. Which one of this is not used for trademarking products
Correct : C. Feature
81. When some words, pictures or videos is banned from public notice it is called
Correct : B. Censorship
82. When unwanted or unexpected email or messages is sent to an electronic device it is known as
Correct : D. Spamming
83. The information Technology Act [IT ACT] came into effect on:
Correct : C. 17th October 2000
84. A person who breaks in or trespasses a computer system:
Correct : A. Hacker
85. E-mail which contain useless material is termed as:
Correct : C. Junk Mail
86. Which of the following crimes were not covered under IT (Amendment) Act, 2008?
Correct : D. None of these
87. Trade mark, copyright, patent law, etc. comes under the purview of:
Correct : C. Intellectual Property Laws
88. Which one of the following is not a principle of e-commerce?
Correct : D. None of these
89. Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?
Correct : C. Computer Virus
90. An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:
Correct : B. Digital Certificates
91. India has enacted the first IT Act in the year……
Correct : D. 2000
92. Trade mark, copyright, patent law etc comes under the purview of………
Correct : C. Intellectual property laws
93. All of the following are examples of real security and privacy risks EXCEPT:
Correct : B. spam.
94. Digital Cash has following characteristic
Correct : D. All of Above
95. Who breaks into other people’s computer system and steals and destroys information:
Correct : A. Hackers
96. Which process is used to re install data from a copy when the original data has been lost
Correct : B. Recovery
97. Which service encompasses all technologies used to transmit and process information on an across a network?
Correct : D. Web services
98. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?