πŸ“Š Essentials of Ecommerce
Q. Which process is used to re install data from a copy when the original data has been lost
  • (A) Backup
  • (B) Recovery
  • (C) Bench marking
  • (D) Data cleansing
πŸ’¬ Discuss
βœ… Correct Answer: (B) Recovery
πŸ“Š Essentials of Ecommerce
Q. Who breaks into other people’s computer system and steals and destroys information:
  • (A) Hackers
  • (B) Software
  • (C) Hacktivists
  • (D) Script Kiddies
πŸ’¬ Discuss
βœ… Correct Answer: (A) Hackers
πŸ“Š Essentials of Ecommerce
Q. Digital Cash has following characteristic
  • (A) Anonymity
  • (B) Security
  • (C) Confidentiality
  • (D) All of Above
πŸ’¬ Discuss
βœ… Correct Answer: (D) All of Above
πŸ“Š Essentials of Ecommerce
Q. All of the following are examples of real security and privacy risks EXCEPT:
  • (A) hackers.
  • (B) spam.
  • (C) viruses.
  • (D) identity theft
πŸ’¬ Discuss
βœ… Correct Answer: (B) spam.
πŸ“Š Essentials of Ecommerce
Q. Trade mark, copyright, patent law etc comes under the purview of………
  • (A) Data protection
  • (B) Telecommunication laws
  • (C) Intellectual property laws
  • (D) None
πŸ’¬ Discuss
βœ… Correct Answer: (C) Intellectual property laws
πŸ“Š Essentials of Ecommerce
Q. An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:
  • (A) Digital Signature
  • (B) Digital Certificates
  • (C) SSL
  • (D) None of these
πŸ’¬ Discuss
βœ… Correct Answer: (B) Digital Certificates
πŸ“Š Essentials of Ecommerce
Q. Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?
  • (A) Hacker
  • (B) Software
  • (C) Computer Virus
  • (D) Computer Anti-virus
πŸ’¬ Discuss
βœ… Correct Answer: (C) Computer Virus
πŸ“Š Essentials of Ecommerce
Q. Which one of the following is not a principle of e-commerce?
  • (A) Privacy
  • (B) Integrity
  • (C) Authentication
  • (D) None of these
πŸ’¬ Discuss
βœ… Correct Answer: (D) None of these
πŸ“Š Essentials of Ecommerce
Q. Trade mark, copyright, patent law, etc. comes under the purview of:
  • (A) Data Protection
  • (B) Telecommunication Laws
  • (C) Intellectual Property Laws
  • (D) All of the above
πŸ’¬ Discuss
βœ… Correct Answer: (C) Intellectual Property Laws