Essentials of Ecommerce
M
Q 1. Which process is used to re install data from a copy when the original data has been lost
M
Q 2. Who breaks into other people’s computer system and steals and destroys information:
M
Q 3. Digital Cash has following characteristic
M
Q 4. All of the following are examples of real security and privacy risks EXCEPT:
M
Q 5. Trade mark, copyright, patent law etc comes under the purview of………
M
Q 6. India has enacted the first IT Act in the year……
M
Q 7. An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:
M
Q 8. Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?
M
Q 9. Which one of the following is not a principle of e-commerce?
M