πŸ“Š E-Commerce Management
Q. Information sent over the internet commonly uses the set of rules called
  • (A) ftp
  • (B) tcp/ip
  • (C) http
  • (D) gopher
πŸ’¬ Discuss
βœ… Correct Answer: (B) tcp/ip
πŸ“Š E-Commerce Management
Q. Customers are concerned about
  • (A) privacy and security of information
  • (B) how things are managed
  • (C) business practices
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (A) privacy and security of information
πŸ“Š E-Commerce Management
Q. SATAN is an example
  • (A) unauthorized disclosures
  • (B) unauthorized actions
  • (C) snooping
  • (D) spoofing
πŸ’¬ Discuss
βœ… Correct Answer: (C) snooping
πŸ“Š E-Commerce Management
Q. ………………… can catch the transmissions to obtain customers sensitive information
  • (A) fire wall
  • (B) anti virus
  • (C) hackers
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (C) hackers
πŸ“Š E-Commerce Management
Q. The organization has to ensure that the …………… are sent to the customers
  • (A) ordered goods
  • (B) unordered goods
  • (C) good quality goods
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (A) ordered goods
πŸ“Š E-Commerce Management
Q. ……………….. techniques make use of secret codes (or) keys to encrypt information
  • (A) cryptography
  • (B) encryption
  • (C) digital certificate
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (A) cryptography
πŸ“Š E-Commerce Management
Q. ………………… are electronic files that are used to uniquely identify people and resources over the internet
  • (A) digital signature
  • (B) digital certificate
  • (C) encryption recourse
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (B) digital certificate
πŸ“Š E-Commerce Management
Q. There are different types of risks connected with information protection such as disruption, disaster.
  • (A) unauthorized access
  • (B) publicity
  • (C) consumer
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (A) unauthorized access
πŸ“Š E-Commerce Management
Q. …………………….is designed to protect a persons personal information
  • (A) data integrity
  • (B) cyber law
  • (C) private legislation
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (C) private legislation
πŸ“Š E-Commerce Management
Q. Privacy laws of their host Coventry effect
  • (A) domestic companies
  • (B) overseas companies
  • (C) neighboring companies
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (B) overseas companies