Quiznetik

Essentials of Ecommerce | Set 2

1. Internet advertising is cost effective because it is/can be

Correct : D. All of the above

2. The form of internet marketing wherein the advertisers pay the search engine or the publisher of the ads whenever their ads are clicked is

Correct : A. Cost per Click

3. Internet advertising suffers from weaknesses like

Correct : C. Both of the above

4. Mobile commerce can categorized into

Correct : D. All of the above

5. Which of the following is the most common way for purchasing an online advertising?

Correct : C. Any of these

6. Which of the following is a software that scours the internet collecting data about every website and every webpage within it?

Correct : B. Search Engines

7. Search Engines databases are selected and built by computer robot programs called:

Correct : A. Spiders

8. A portal that helps to establish relations and to conduct transactions between various organizations is termed as:

Correct : A. B2B Portal

9. Which among the following is not an example for Search engine?

Correct : D. Internet Explorer

10. Web pages are prepared using their language as:

Correct : A. HTML

11. The user reaches this page when they specify the address of a website:

Correct : C. Home Page

12. Which of the following is a correct syntax of HTML?

Correct : A. <!doctype HTML>

13. Software which allows user to view the webpage is called as __________.

Correct : B. Internet browser

14. Which of the following website is used to search other website by typing a keyword ?

Correct : B. Search Engine

15. Which of the following is valid Website Address ?

Correct : B. www.helenlowry.com

16. Whenever user opens any website then main page is called as ____.

Correct : B. Home page

17. _________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business

Correct : C. phish site

18. HTML stands for?

Correct : A. Hyper Text Markup Language

19. HTML is a subset of

Correct : A. SGMT

20. A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers

Correct : B. E-payment.

21. E-cash was created by

Correct : A. David Chaum.

22. A plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments etc

Correct : B. Smart Card.

23. The first universal credit card, which could be used at a variety of establishments, was introduced by

Correct : C. Diners’ Club.

24. Example of Digital wallet

Correct : D. All of the above.

25. A type of fraud that involves diverting the client Internet connection to a counterfeit website.

Correct : B. Pharming.

26. _________identifies a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computer

Correct : C. Behavioral biometric authentication.

27. The grace period of a credit card normally runs from

Correct : D. The end of a billing cycle to the next payment due date.

28. …………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.

Correct : D. any of these

29. ………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit.

Correct : A. Credit card

30. A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.

Correct : A. smart Cards

31. ………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account

Correct : A. Debit Card

32. ………………type of payment system is highly useful to those customers who would like to control overspending,

Correct : B. Prepaid

33. .……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

Correct : C. Electronic purse

34. ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer

Correct : A. customer

35. In Biometrics, …………………………ID system is designed to prevent more than one person from using a single identity

Correct : A. Positive ID system

36. In Online Payment System one can transfer money through

Correct : C. Internet

37. One advantage of online payment system is

Correct : A. Overseas purchase

38. Which one of them is not an online payment method?

Correct : B. Demand Draft

39. When goods are purchased without debiting money from your account what type of purchase method are you using?

Correct : C. Credit card Purchase

40. When money is debited from your account when purchasing goods, you are using

Correct : A. Debit Card Purchase

41. Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called

Correct : D. Man-In-The-Middle

42. Encryption means

Correct : C. Password protection

43. Finger print recognition is a type of

Correct : B. Physiological Biometric

44. Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation?

Correct : C. Electronic Wallet / Electronic Purse

45. Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine?

Correct : B. SET

46. Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic?

Correct : A. Biometrics

47. Which among the following is not an example for computer virus?

Correct : D. Network Firewall

48. Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure?

Correct : A. Black Hat Hacker

49. SET means:

Correct : D. Secure Electronic Transaction

50. The verification of credit card is done by using:

Correct : C. All of the above

51. The reverse process of encryption, to make the information readable once again is:

Correct : B. Decryption

52. An Electronic Check is one form of what?

Correct : B. Online Banking

53. A combination of software and information designed to provide security and information for payment is called?

Correct : A. Digital wallet

54. A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

Correct : B. Digital certificates

55. ……………………….is a person who breaks in or trespasses a computer system

Correct : A. Hacker

56. E-mail which contain useless material is termed as……………

Correct : A. Spam

57. What is Biometrics ?

Correct : B. It recognizes individuals based on their inherent physical or behavioral characteristics.

58. SET means ………………

Correct : B. Standard Electronic Transfer

59. Patents protects

Correct : B. Inventions.

60. The minimum punishment for an infringement of copyright in India is

Correct : C. 6 months imprisonment and minimum of Rs 50,000 fine.

61. A________ is a right, granted by the government, to exclude others from making, using, or selling your invention

Correct : B. Patents.

62. TheTerm of every patent in India is

Correct : D. 20 years.

63. The Trademarks Act 1999 protects well-known trademarks from:

Correct : A. an action against the registration of similar marks.

64. The penalties for infringement of Trademarked content in India

Correct : D. Minimum 6 months imprisonment and fine of INR 50,0000.

65. When did IT Act 2000 came into effect

Correct : A. October 17, 2000.

66. How many schedules are there in IT Act 2000

Correct : B. 4.

67. Trade mark, copyright, patent law etc comes under the purview of……………………

Correct : C. Intellectual property laws

68. Which of the following is an example of Intellectual property ?

Correct : D. All of above

69. Copyright protection is available for

Correct : D. All the above

70. Plan of a building can be protected by

Correct : A. Copyright

71. Copyright protects

Correct : B. Expression

72. Patent of addition can be filed by

Correct : C. Both a) and b)

73. What is the updated version of the IT Act, 2000?

Correct : C. IT Act, 2008

74. _______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind.

Correct : C. Trademark

75. An unauthorised entry into other people’s electronic device is called

Correct : B. Hacking

76. Gaining control of client computer through network is called

Correct : A. Snooping

77. A copyright owner can give authority to anyone to

Correct : C. Copy intellectual property

78. Patent right gives the sole authority to produce for

Correct : D. Inventors

79. Trademark uniquely differentiate products from other

Correct : B. Products

80. Which one of this is not used for trademarking products

Correct : C. Feature

81. When some words, pictures or videos is banned from public notice it is called

Correct : B. Censorship

82. When unwanted or unexpected email or messages is sent to an electronic device it is known as

Correct : D. Spamming

83. The information Technology Act [IT ACT] came into effect on:

Correct : C. 17th October 2000

84. A person who breaks in or trespasses a computer system:

Correct : A. Hacker

85. E-mail which contain useless material is termed as:

Correct : C. Junk Mail

86. Which of the following crimes were not covered under IT (Amendment) Act, 2008?

Correct : D. None of these

87. Trade mark, copyright, patent law, etc. comes under the purview of:

Correct : C. Intellectual Property Laws

88. Which one of the following is not a principle of e-commerce?

Correct : D. None of these

89. Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?

Correct : C. Computer Virus

90. An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:

Correct : B. Digital Certificates

91. India has enacted the first IT Act in the year……

Correct : D. 2000

92. Trade mark, copyright, patent law etc comes under the purview of………

Correct : C. Intellectual property laws

93. All of the following are examples of real security and privacy risks EXCEPT:

Correct : B. spam.

94. Digital Cash has following characteristic

Correct : D. All of Above

95. Who breaks into other people’s computer system and steals and destroys information:

Correct : A. Hackers

96. Which process is used to re install data from a copy when the original data has been lost

Correct : B. Recovery

97. Which service encompasses all technologies used to transmit and process information on an across a network?

Correct : D. Web services

98. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

Correct : D. spoofing