0

E-Commerce

Description: This test consists of questions related to E commerce concepts in computer science and information technology.
Number of Questions: 20
Created by:
Tags: Computer data analysis E-Commerce and Banking Electronic Payment System
Attempted 0/20 Correct 0 Score 0

What does non-repudiability refer in E-Commerce Security Systems?

  1. It refers that the information available should not be changed during or after the transaction.

  2. It refers that the information should be available whenever and wherever it isrequired.

  3. It ensures that the information should not be accessible by the unauthorised person.

  4. It ensures that the information should be protected against the denial of order or denial of payment for the sender and recipient.

  5. Both (3) and (4)


Correct Option: D
Explanation:

This is true about non-repudiability in E-Commerce Security Systems.

Which of the following is/are the drawback(s) of E-commerce?

  1. There are lot of choices for products.

  2. E-commerce ensures less paper work.

  3. There are issues of security.

  4. E-commerce is a speedy process.

  5. Both (2) and (3)


Correct Option: C
Explanation:

This is a drawback of E-commerce as there are many issues arises like privacy of information, whether or not payment details like credit card details can be misused.

Which of the following E-business commerces is responsible for buying and selling of those products, for which there is no established market available?

  1. B2B (Business to Business)

  2. C2C (Consumer to Consumer)

  3. B2C (Business to Consumer)

  4. C2B (Consumer to Business)

  5. None of the above


Correct Option: B
Explanation:

In C2C commerce, both the parties involved are customers for buying and selling products.

Application layer in WAP (Wireless Application Protocol) is responsible for which of the following?

  1. This layer is responsible for device specifications and the content development by using programming languages, such as WML script.

  2. This layer is responsible for connection and reconnection among the devices.

  3. This layer is responsible for data integrity and authentication services.

  4. This layer is responsible for the data transmission in consistent format.

  5. None of the above


Correct Option: A
Explanation:

This is called application layer.

eBay is an example which of the following?

  1. Business-to-Business (B2B)

  2. Consumer-to-Consumer (C2C)

  3. Business-to-consumer (B2C)

  4. Both (1) and (2)

  5. Both (2) and (3)


Correct Option: B
Explanation:

eBay is an example of a C2C E-commerce site, where the customers can buy and sell items directly to each other through the site.

Which of the following is true about WAP (Wireless Application Protocol)?

  1. It provides portability.

  2. WAP is fast and convenient.

  3. WAP is used in hand held devices.

  4. WAP can be used in mobile phones.

  5. All of the above


Correct Option: E
Explanation:

All of the above are the true statements.

Which of the following statements is/are true about EDI (Electronic data interchange )?

  1. EDI is a computer-to-computer exchange of business documents between companies.

  2. EDI message can be encrypted.

  3. EDIFACT is an EDI standard.

  4. All of the above

  5. Only (1) and (2)


Correct Option: D
Explanation:

All are the true statement about EDI.

Which of the following is/are the benefit(s) of smart card in E-commerce?

  1. Portability

  2. Increasing data storage capacity

  3. Reliability

  4. All of the above

  5. Only (1) and (3)


Correct Option: D
Explanation:

All are the benefits of a smart card.

Online shopping sites are the example of which of the following E-commerces?

  1. B2B (Business-to-Business)

  2. B2C (Business-to-Consumer)

  3. C2B (Consumer-to-Consumer)

  4. C2C (Consumer-to-Business)

  5. None of the above


Correct Option: C
Explanation:

In C2B business, a consumer creates value and demands for the products from the companies and the consumer has a bid to purchase these products. Online shopping sites are used for C2B business.

A payment gateway is responsible for which of the following?

  1. E-businesses transactions

  2. Online retailers

  3. Credit card payments

  4. All of the above

  5. Only (1) and (3)


Correct Option: D
Explanation:

All are the uses of electronic payments.

In C2C (Consumer-to-Consumer), the revenue is generated by

  1. membership or subscription fees

  2. sales commissions

  3. transaction fees

  4. all of the above

  5. only (1) and (2)


Correct Option: D
Explanation:

All are true.

Which of the following protocols has data integrity checks in WAP (Wireless Application Protocol)?

  1. Wireless Session Protocol (WSP)

  2. Wireless Transport Layer Security (WTLS)

  3. Wireless Datagram Protocol (WDP)

  4. Wireless Application Environment (WAE)

  5. Wireless Transaction Protocol (WTP)


Correct Option: B
Explanation:

This protocol is responsible for the data integrity check and authentication services.

Which of the following is a payment gateway?

  1. BluePay

  2. ChronoPay

  3. eWay

  4. iPay

  5. All of the above


Correct Option: E
Explanation:

All are the examples of payment gateway.

A smart card can be made by using which of the following?

  1. Polyvinyl chloride

  2. Polyethylene terephthalate

  3. Polyhydrate

  4. Both (2) and (3)

  5. Only (1) and (2)


Correct Option: E
Explanation:

These are true about smart card.

Which of the following algorithms is/are used by WTLS (Wireless Transport Layer Security ) protocol?

  1. Elliptic Curve Cryptography (ECC)

  2. DES

  3. IDEA

  4. Both (2) and (3)

  5. Both (1) and (2)


Correct Option: E
Explanation:

WTLS also uses both cryptographic algorithms.

Smart card does not provide

  1. authentication

  2. identification

  3. data storage

  4. application processing

  5. payment processing


Correct Option: E
Explanation:

This is not the task of smart card.

Which of the following is/are the limitation(s) of E-commerce?

  1. Security

  2. Uncertainty and lack of information

  3. Comparison shopping

  4. Both (2) and (3)

  5. Only (1) and (2)


Correct Option: E
Explanation:

Both are the limitations of the E-commerce.

Which of the following layers is not present in WAP (Wireless Application Protocol) model?

  1. Security layer

  2. Session layer

  3. Application layer

  4. Transaction layer

  5. Presentation layer


Correct Option: E
Explanation:

Presentation layer is not present in WAP model.

Which of the following protocols in WAP corresponds to the application layer of the OSI model?

  1. WTLS (Wireless Transport Layer Security)

  2. WSP (Wireless Session Protocol)

  3. WDP (Wireless Datagram Protocol)

  4. WCMP (Wireless Control Message Protocol)

  5. WAE (Wireless Application Environment)


Correct Option: E
Explanation:

WAE (Wireless Application Environment) corresponds to the application layer of the OSI model.

WTLS ( Wireless Transport Layer Security) provides which of the following services?

  1. Data integrity

  2. Confidentiality

  3. Content formats

  4. Both (2) and (3)

  5. Only (1) and (2)


Correct Option: E
Explanation:

Both are the services of the WTLS.

- Hide questions