πŸ“Š E-Commerce Management
Q. The participants in an online electronic payment transaction include
  • (A) the customer
  • (B) the issuer
  • (C) the merchant
  • (D) all above
πŸ’¬ Discuss
βœ… Correct Answer: (D) all above
πŸ“Š E-Commerce Management
Q. Which is defined as a financial exchange that takes place on line between buyers and sellers
  • (A) e payment
  • (B) prepaid payment
  • (C) post paid payment
  • (D) non e
πŸ’¬ Discuss
βœ… Correct Answer: (A) e payment
πŸ“Š E-Commerce Management
Q. SET Means
  • (A) standard electronic technology
  • (B) standard electronic transfer
  • (C) secure electronic transaction
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (C) secure electronic transaction
πŸ“Š E-Commerce Management
Q. This is a financial instrument which can be used more than once to borrow money or products or credit
  • (A) credit card
  • (B) debit card
  • (C) e- cash
  • (D) non e
πŸ’¬ Discuss
βœ… Correct Answer: (A) credit card
πŸ“Š E-Commerce Management
Q. This type of card includes an embedded ICC
  • (A) credit card
  • (B) debit card
  • (C) e cash
  • (D) smart card
πŸ’¬ Discuss
βœ… Correct Answer: (D) smart card
πŸ“Š E-Commerce Management
Q. This type of electronic payment systems is highly useful to those customers who would like to control over spending
  • (A) post paid payment system
  • (B) pre paid payment system
  • (C) spot payment system
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (B) pre paid payment system
πŸ“Š E-Commerce Management
Q. This acts like a gate keeper that examines each users identification before allowing them to enter to the organization internal networks
  • (A) antivirus program
  • (B) biometrics
  • (C) fire wall
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (B) biometrics
πŸ“Š E-Commerce Management
Q. Secret key is used in
  • (A) public key cryptography
  • (B) symmetric cryptography
  • (C) asymmetric cryptography
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (B) symmetric cryptography
πŸ“Š E-Commerce Management
Q. The cyber crime related to monitoring data flow between shoppers computer and e commerce website
  • (A) spoofing
  • (B) hacking
  • (C) sniffing
  • (D) phishing
πŸ’¬ Discuss
βœ… Correct Answer: (B) hacking