You are on page 1of 42

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Your Answer portable , Contain encrypted information , Smart cards accepted every where

Multiple Choice Multiple Answer


Question A trusted operating system provides

Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized
tampering with private account information
Your Answer strong access controls , create virtual lockbox , to limit access to the system form
external networks

True/False
Question E-services give new dimension to original service

Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question A home banking service in combination with a PC and modem and bank become an
electronic gateway to customers and accounts is
Correct Answer Proprietary Bank dial up services

Your Answer Online Services based banking

Select The Blank


Question In working of digital signature private key is applied to a shorter form of data called
________.
Correct Answer Hash

Your Answer Abbreivation

Select The Blank


Question In ________ style sheets the style definitions are store in seprate file with extension
CSS.
Correct Answer External

Your Answer Linked

Select The Blank


Question In Netscape's security socket layer the test of GET command and the text of HTML
file are sent and received through connections called ________.
Correct Answer Sockets

Your Answer Sockets

Multiple Choice Single Answer


Question Which electronic tokens are issued by ecoin.net that can be used to pay for online
goods?
Correct Answer Ecoins
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Correct Answer Size of Product , Nature of Product , Urgency

Your Answer Size of Product , Nature of Product , Quantity

Multiple Choice Single Answer


Question There is no real safeguard for ensuring messages. Interent users send and
receive messages are not intercepted or even altered by some unknown
interloper.This threat is called
Correct Answer Packet Sniffing

Your Answer Packet Sniffing

True/False
Question Technical support can make or break a b-to-c interface for any e-business.

Correct Answer True

Your Answer True

Select The Blank


Question In ________ personalization the inputs of many users is compared before the
program comes up with a recommendation to the visitor.
Correct Answer Collabrative Filtering

Your Answer General

Select The Blank


Question An internet user using Mondex, transfering cash over the internet requires
________ to be attached to the personal computer
Correct Answer Mondex reader

Your Answer Mondex card

Select The Blank


Question ________ means keeping a system or a business in a up-to-date state based on
the initial design or plan.
Correct Answer maintainance

Your Answer maintainance

Multiple Choice Single Answer


Question Which one of the following is information selling on the web?

Correct Answer Online Publishing Site

Your Answer Online Publishing Site

Multiple Choice Single Answer


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question The example of E-service which enhances original service is

Correct Answer Eeducation

Your Answer Eeducation

Multiple Choice Single Answer


Question KDD communications (kCOM) is the internet subsidiary of

Correct Answer Kokusai Denshin Denwa

Your Answer kokee Denshiv Deva

True/False
Question The efficiency of user interface increases if error prevention is good

Correct Answer True

Your Answer False

Match The Following


Question Correct Answer Your Answer

Secret data Existance is secret Content is secret

Public data Protected from modification Content is not secret

Copyright data Content is not secret Protected from modification

Confidential data Content is secret Existance is secret

Multiple Choice Single Answer


Question The main security feature to prevent double spending is

Correct Answer Threat of prosecution

Your Answer Serial numbering of electronic cash

True/False
Question A credit card contains cash.

Correct Answer False

Your Answer True

True/False
Question There is no preset spending limit based on the user's credit limit in a credit card.
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer Site Index , Site Search Engine , Logical sequencing of facilities

Multiple Choice Single Answer


Question What identification is used by the consumers to withdraw electronic cash from a bank
account ?
Correct Answer Certificate issued by the certification authority

Your Answer Certificate issued by the certification authority

Multiple Choice Single Answer


Question Which one of the following is information selling on the web?

Correct Answer Online Publishing Site

Your Answer Online Publishing Site

Select The Blank


Question In a e-business, the goal of the ________ phase is to upgrade the web site and the b-to-c
connection to meet the latest standards and customer expectations.
Correct Answer enhancement

Your Answer enhancement

True/False
Question In credit cards the transactions are always single way that is customer's charges to be
credited to vendor's account
Correct Answer False

Your Answer True

Multiple Choice Single Answer


Question The main security feature to prevent double spending is

Correct Answer Threat of prosecution

Your Answer Serial numbering of electronic cash

Select The Blank


Question ________ means keeping a system or a business in a up-to-date state based on the initial
design or plan.
Correct Answer maintainance

Your Answer maintainance

Multiple Choice Multiple Answer


Question Select the three main advantages of smart card

Correct Answer portable , Contain encrypted information , Impossible for credit theft
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Question Which of the following is related with Estocktrading?

Correct Answer Funds.online

Your Answer Funds.online

Multiple Choice Single Answer


Question Digital Signatures are used for

Correct Answer Sender Authentication

Your Answer Sender Authentication

Select The Blank


Question In relational database table can be linked up together using key fields in another table
known as ________.
Correct Answer Foreign Key

Your Answer Foreign Key

Multiple Choice Multiple Answer


Question List the three types of information a smart card may contain

Correct Answer Financial facts , Account information , Health information

Your Answer Account information , Health information , Weather information

Multiple Choice Single Answer


Question Which one of the following is information selling on the web?

Correct Answer Online Publishing Site

Your Answer Online Publishing Site

Multiple Choice Multiple Answer


Question The store administrator

Correct Answer Is a program , Decides how the store is opened/closed , Manages site appearance

Your Answer Decides how the store is opened/closed , Manages site appearance , Does not handle
shipping

Select The Blank


Question ________ is sending unwanted advertising to users.

Correct Answer Spamming

Your Answer Spamming

Select The Blank


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer portable , Contain encrypted information , Smart cards accepted every where

Multiple Choice Multiple Answer


Question A trusted operating system provides

Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering
with private account information
Your Answer strong access controls , create virtual lockbox , to limit access to the system form external
networks

True/False
Question E-services give new dimension to original service

Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question A home banking service in combination with a PC and modem and bank become an
electronic gateway to customers and accounts is
Correct Answer Proprietary Bank dial up services

Your Answer Online Services based banking

Select The Blank


Question In working of digital signature private key is applied to a shorter form of data called
________.
Correct Answer Hash

Your Answer Abbreivation

Select The Blank


Question In ________ style sheets the style definitions are store in seprate file with extension CSS.

Correct Answer External

Your Answer Linked

Select The Blank


Question In Netscape's security socket layer the test of GET command and the text of HTML file are
sent and received through connections called ________.
Correct Answer Sockets

Your Answer Sockets

Multiple Choice Single Answer


Question Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?

Correct Answer Ecoins


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question The short form of world wide web consortium is :

Correct Answer W3C

Your Answer W3C

Select The Blank


Question A list of company activities that make up the website is called ________.

Correct Answer Content Inventory

Your Answer Activity Log

Multiple Choice Single Answer


Question The ecoin structure makes

Correct Answer Consumer anonymous to merchants

Your Answer Consumer anonymous to merchants

Multiple Choice Multiple Answer


Question Broad Targeted Marketing include following ways

Correct Answer Chat Rooms , Thematic Web Sites , Portals

Your Answer Chat Rooms , Thematic Web Sites , Portals

True/False
Question A single Mondex card can be used in both, the online world of internet as well as the
offline world of ordinary merchant stores.
Correct Answer True

Your Answer False

Select The Blank


Question In a e-business, the goal of the ________ phase is to upgrade the web site and the
b-to-c connection to meet the latest standards and customer expectations.
Correct Answer enhancement

Your Answer enhancement

Multiple Choice Multiple Answer


Question A trusted operating system provides

Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized
tampering with private account information
Your Answer strong access controls , protect against unauthoprized tampering with private
account information , to limit access to the system form external networks
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer True

Select The Blank


Question The SET specification use public key cryptography and________ for validating both
consumer and merchant
Correct Answer digital certificate

Your Answer digital certificate

Multiple Choice Multiple Answer


Question The basic requirements for transaction security are

Correct Answer Privacy , Confidentiality , Integrity

Your Answer Privacy , Confidentiality , Integrity , Availability

Multiple Choice Single Answer


Question An attack on the information and communication services by a third party that prevents
legitimate users from using the infrastructure is
Correct Answer Denial of Service

Your Answer Denial of Service

Select The Blank


Question The physcial form of computer netwrok is called as ________.

Correct Answer Topology

Your Answer Topology

Multiple Choice Single Answer


Question The most common way of paying for an ecommerce transaction is with

Correct Answer Credit Card

Your Answer Credit Card

Multiple Choice Single Answer


Question Spending electronic Cash twice by submitting the same electronic currency to two
different vendors is also known as
Correct Answer Double Spending

Your Answer Electronic forging

Multiple Choice Multiple Answer


Question Open Universities have moved into providing internet based version of course.The reason
behind it is,
Correct Answer Clientbase outside their catchment is possible , Delivery of courses at reduced cost
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question What is the mode of payment for the purchases of small value on the internet

Correct Answer Electronic cash

Your Answer Credit card

Multiple Choice Multiple Answer


Question Select the agencies besides the customer and vendor in a credit card transaction

Correct Answer Vendor's bank , Customer's bank , Card issuing company

Your Answer Vendor's bank , Customer's bank , Card issuing company

Multiple Choice Single Answer


Question A process of making information indeipherable except to those with a decoding key

Correct Answer Encryption

Your Answer Encryption

Match The Following


Question Correct Answer Your Answer

Secret data Existance is secret Existance is secret

Public data Protected from modification Protected from modification

Copyright data Content is not secret Content is not secret

Confidential data Content is secret Content is secret

True/False
Question The customer feedback got through the Web site should be the input for maintainance
and enhancement of the site.
Correct Answer True

Your Answer True

Select The Blank


Question In public key encryption method one key is public and one key is ________.

Correct Answer Private

Your Answer Private

Multiple Choice Single Answer


Question The science of deciphering encrypted messages without knowing right key is known as

Correct Answer Cryptoanalysis


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer Site Index , Site Search Engine , Logical sequencing of facilities

Multiple Choice Single Answer


Question What identification is used by the consumers to withdraw electronic cash from a bank
account ?
Correct Answer Certificate issued by the certification authority

Your Answer Certificate issued by the certification authority

Multiple Choice Single Answer


Question Which one of the following is information selling on the web?

Correct Answer Online Publishing Site

Your Answer Online Publishing Site

Select The Blank


Question In a e-business, the goal of the ________ phase is to upgrade the web site and the b-to-c
connection to meet the latest standards and customer expectations.
Correct Answer enhancement

Your Answer enhancement

True/False
Question In credit cards the transactions are always single way that is customer's charges to be
credited to vendor's account
Correct Answer False

Your Answer True

Multiple Choice Single Answer


Question The main security feature to prevent double spending is

Correct Answer Threat of prosecution

Your Answer Serial numbering of electronic cash

Select The Blank


Question ________ means keeping a system or a business in a up-to-date state based on the
initial design or plan.
Correct Answer maintainance

Your Answer maintainance

Multiple Choice Multiple Answer


Question Select the three main advantages of smart card

Correct Answer portable , Contain encrypted information , Impossible for credit theft
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Question Which of the following is related with Estocktrading?

Correct Answer Funds.online

Your Answer Funds.online

Multiple Choice Single Answer


Question Digital Signatures are used for

Correct Answer Sender Authentication

Your Answer Sender Authentication

Select The Blank


Question In relational database table can be linked up together using key fields in another table
known as ________.
Correct Answer Foreign Key

Your Answer Foreign Key

Multiple Choice Multiple Answer


Question List the three types of information a smart card may contain

Correct Answer Financial facts , Account information , Health information

Your Answer Account information , Health information , Weather information

Multiple Choice Single Answer


Question Which one of the following is information selling on the web?

Correct Answer Online Publishing Site

Your Answer Online Publishing Site

Multiple Choice Multiple Answer


Question The store administrator

Correct Answer Is a program , Decides how the store is opened/closed , Manages site appearance

Your Answer Decides how the store is opened/closed , Manages site appearance , Does not handle
shipping

Select The Blank


Question ________ is sending unwanted advertising to users.

Correct Answer Spamming

Your Answer Spamming

Select The Blank


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer portable , Contain encrypted information , Smart cards accepted every where

Multiple Choice Multiple Answer


Question A trusted operating system provides

Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering
with private account information
Your Answer strong access controls , create virtual lockbox , to limit access to the system form external
networks

True/False
Question E-services give new dimension to original service

Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question A home banking service in combination with a PC and modem and bank become an
electronic gateway to customers and accounts is
Correct Answer Proprietary Bank dial up services

Your Answer Online Services based banking

Select The Blank


Question In working of digital signature private key is applied to a shorter form of data called
________.
Correct Answer Hash

Your Answer Abbreivation

Select The Blank


Question In ________ style sheets the style definitions are store in seprate file with extension CSS.

Correct Answer External

Your Answer Linked

Select The Blank


Question In Netscape's security socket layer the test of GET command and the text of HTML file are
sent and received through connections called ________.
Correct Answer Sockets

Your Answer Sockets

Multiple Choice Single Answer


Question Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?

Correct Answer Ecoins


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question The short form of world wide web consortium is :

Correct Answer W3C

Your Answer W3C

Select The Blank


Question A list of company activities that make up the website is called ________.

Correct Answer Content Inventory

Your Answer Activity Log

Multiple Choice Single Answer


Question The ecoin structure makes

Correct Answer Consumer anonymous to merchants

Your Answer Consumer anonymous to merchants

Multiple Choice Multiple Answer


Question Broad Targeted Marketing include following ways

Correct Answer Chat Rooms , Thematic Web Sites , Portals

Your Answer Chat Rooms , Thematic Web Sites , Portals

True/False
Question A single Mondex card can be used in both, the online world of internet as
well as the offline world of ordinary merchant stores.
Correct Answer True

Your Answer False

Select The Blank


Question In a e-business, the goal of the ________ phase is to upgrade the web
site and the b-to-c connection to meet the latest standards and customer
expectations.
Correct Answer enhancement

Your Answer enhancement

Multiple Choice Multiple Answer


Question A trusted operating system provides

Correct Answer strong access controls , create virtual lockbox , protect against
unauthoprized tampering with private account information
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer True

True/False
Question Customers must have an account with central online bank in most digital cash systems

Correct Answer True

Your Answer False

Select The Blank


Question ________ hubs have built in programmable features to handle packet switching ,routing
traffic
Correct Answer Intelligent

Your Answer Intelligent

Multiple Choice Multiple Answer


Question Hit counter

Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w

Your Answer Counts number of hits for a web site , Provided by ISP

Match The Following


Question Correct Answer Your Answer

Marketing Notice New Products Information Latest Marketing Update

Logon Page Business partner's page Business partner's page

Home Page Latest Marketing Update New Products Information

Order Page Product summaries Summary Of Orders

Multiple Choice Single Answer


Question To create temper proof electronic cash that can be traced back to its origin, what is used?

Correct Answer Complex Cryptographic algorithm

Your Answer Complex Cryptographic algorithm

Select The Blank


Question A list of company activities that make up the website is called ________.

Correct Answer Content Inventory

Your Answer Event List

Multiple Choice Single Answer


Question In Millicent system when a consumer locates a product on a merchan's web site that he or
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Your Answer True

True/False
Question Customers must have an account with central online bank in most digital cash systems

Correct Answer True

Your Answer False

Select The Blank


Question ________ hubs have built in programmable features to handle packet switching ,routing
traffic
Correct Answer Intelligent

Your Answer Intelligent

Multiple Choice Multiple Answer


Question Hit counter

Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w

Your Answer Counts number of hits for a web site , Provided by ISP

Match The Following


Question Correct Answer Your Answer

Marketing Notice New Products Information Latest Marketing Update

Logon Page Business partner's page Business partner's page

Home Page Latest Marketing Update New Products Information

Order Page Product summaries Summary Of Orders

Multiple Choice Single Answer


Question To create temper proof electronic cash that can be traced back to its origin, what is used?

Correct Answer Complex Cryptographic algorithm

Your Answer Complex Cryptographic algorithm

Select The Blank


Question A list of company activities that make up the website is called ________.

Correct Answer Content Inventory

Your Answer Event List

Multiple Choice Single Answer


Question In Millicent system when a consumer locates a product on a merchan's web site that he or
LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Select The Blank


Question ________ is a software that locates web pages based on matching
keywords.
Correct Answer Search engine
Your Answer Search engine

Multiple Choice Multiple Answer


Question List the three types of information a smart card may contain
Correct Answer Financial facts , Account information , Health information
Your Answer Account information , Health information , Financial facts

Multiple Choice Multiple Answer


Question A storefront should have the following attributes:
Correct Answer Customers should be able to find the product quickly , The site
should be able to generate and print the order summary/receipt. , Should be able to send
e-mails to customers
Your Answer Customers should be able to find the product quickly , The site
should be able to generate and print the order summary/receipt. , Should be able to send
e-mails to customers

Multiple Choice Multiple Answer


Question Webpage has three main components as follows
Correct Answer Presentation Structure , Style , Content
Your Answer Presentation Structure , Style , Content

True/False
Question The usability of client interface is to be kept at a very standard
Correct Answer True
Your Answer True

True/False
Question In credit cards the transactions are always single way that is customer's
charges to be credited to vendor's account
Correct Answer False
Your Answer True

Multiple Choice Single Answer


Question If a site is an auction / exchange / advertisement site, then the type of
commerce is
Correct Answer Consumer-to-consumer
Your Answer Consumer-to-consumer

True/False
Question For Online Retailing to Succeed ,online technology must compliment
management and opeational straegy.
Correct Answer True
Your Answer True

True/False
Question Watchers are not easily suited for online medium.
Correct Answer True
Your Answer True

True/False
Question EBT systems are designed to provide no cost or low cost access methods.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer


Question Select the two payment card companies using open loop system.
Correct Answer Visa , Master card
Your Answer Visa , Master card

True/False
Question The manner in which browser actually lays out the information is
dependent on browser itself.
Correct Answer True
Your Answer False

Multiple Choice Multiple Answer


Question The ecoin system uses a three link consistng of a
Correct Answer Consumer , Merchant , Server
Your Answer Consumer , Merchant , Broker

True/False
Question A hardened firewall computer records not only the user logged in but also
who has failed loging
Correct Answer True
Your Answer True

Select The Blank


Question The oucome of ________phase is a balance between designers' innovation
and user's expectations
Correct Answer Design
Your Answer Design

Select The Blank


Question ________ hubs have built in programmable features to handle packet
switching ,routing traffic
Correct Answer Intelligent
Your Answer Intelligent

Match The Following


Question Correct Answer Your Answer
Marketing Notice New Products Information Latest Marketing Update
Logon Page Business partner's page New Products Information
Home Page Latest Marketing Update Product summaries
Order Page Product summaries Summary Of Orders

Multiple Choice Single Answer


Question Which one of the following is information selling on the web?
Correct Answer Online Publishing Site
Your Answer Travel Agent's Site

Select The Blank


Question The purpose of SET is to provide ________ for card payments.
Correct Answer Security
Your Answer Security

Multiple Choice Single Answer


Question A process of making information indeipherable except to those with a
decoding key
Correct Answer Encryption
Your Answer Encryption

True/False
Question Bilateral Transaction is not feasible because of potential for double
spending.
Correct Answer True
Your Answer False

True/False
Question Encryption provides transaction secuity but does not do much to prevent
unauthorized access to computers,inofrmation and databases.
Correct Answer True
Your Answer True

Multiple Choice Single Answer


Question Where does the error occur ? Does the system give prompts on how to
proceed? Does the system let one know where one is? This indicates which factor of
usability of computer software?
Correct Answer System Feecback
Your Answer Error recovery

Multiple Choice Single Answer


Question Spending electronic Cash twice by submitting the same electronic
currency to two different vendors is also known as
Correct Answer Double Spending
Your Answer Double Spending

True/False
Question Company Information lets the potential online shopper know the sort of
outfit of the eshop.
Correct Answer True
Your Answer True

True/False
Question Prior Registration of customers can allow the site to be customised ot that
user's needs and facilitates the building of marketing database e-vendor.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer


Question An Interent Mall provides following services
Correct Answer Ecash , Shared Advertising , Security and Credit Card Processing
Your Answer Ecash , Shared Advertising , Security and Credit Card Processing

Multiple Choice Multiple Answer


Question For managing customer feedback
Correct Answer Set up FAQs , Answer customer mail , Check the downloadable
speed
Your Answer Set up FAQs , Answer customer mail

Multiple Choice Single Answer


Question In composite query the basic requirement is
Correct Answer Join between two tables
Your Answer Indexing of two tables
Select The Blank
Question The SET specification use public key cryptography and________ for
validating both consumer and merchant
Correct Answer digital certificate
Your Answer digital certificate

Multiple Choice Single Answer


Question The Link which gives error to display page is called
Correct Answer Broken Link
Your Answer Invalid Link

True/False
Question Secure Electronic Transactions is a s/w that handles credit card
information of a customer.
Correct Answer True
Your Answer True

Multiple Choice Single Answer


Question To create temper proof electronic cash that can be traced back to its origin,
what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Complex Cryptographic algorithm

Multiple Choice Single Answer


Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spoofing

True/False
Question Customers must have an account with central online bank in most digital
cash systems
Correct Answer True
Your Answer True

True/False
Question In Millicent system consumer has to deal with dozens of brokers to satisfy
his or her scrip needs for many merchants.
Correct Answer False
Your Answer True

Multiple Choice Multiple Answer


Question The Online equivalent of stored value card is
Correct Answer Ecash , Network Money
Your Answer Ecash , Network Money , Epayment

True/False
Question If you have limited hardware and networking technology then your ISP
can load your Web site on its server and manage it.
Correct Answer True
Your Answer True

Multiple Choice Single Answer


Question Agile wallet secure electronic server was developed by :
Correct Answer Cybercash
Your Answer Cybercash

Multiple Choice Multiple Answer


Question Select the agencies besides the customer and vendor in a credit card
transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Customer's bank , Card issuing company

Match The Following


Question Correct Answer Your Answer
TEXT Default text color in webpage Default text color in webpage
LINK Unvisited Hyperlink's color Unvisited Hyperlink's color
ALINK Active Hyperlink's color Active Hyperlink's color
VLINK Visited Hyperlink's color Visited Hyperlink's color

Select The Blank


Question ________is the act of storing a document on local server,enabling it to be
presented faster than if it is accessed from the document's original server.
Correct Answer Caching
Your Answer Caching

Select The Blank


Question ________ auction sites involve a customer selling an item to another
customer through auction site.
Correct Answer C2C
Your Answer C2C

Multiple Choice Single Answer


Question Electronic cash has not succeeded in
Correct Answer United States
Your Answer Europe

Select The Blank


Question In Netscape's security socket layer the test of GET command and the text
of HTML file are sent and received through connections called ________.
Correct Answer Sockets
Your Answer Channels
Multiple Choice Multiple Answer
Question The fulfillment phase of an e-business
Correct Answer Includes packing up the merchandise , Includes shipping the
merchandise , Includes answering questions about the order
Your Answer Includes packing up the merchandise , Includes shipping the
merchandise , Does not directly involve customer interaction.

Select The Blank


Question In relational database table can be linked up together using key fields in
another table known as ________.
Correct Answer Foreign Key

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


Multiple Choice Single Answer
Question Internet payments for items costing $1 or less than the lower threshold of credit
card payments
Correct Answer Micropayments

Your Answer Micropayments

True/False
Question An application level proxy makes a firewall safely permeable for users in an
organization without creating potential security hole.
Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question A storefront should have the following attributes:

Correct Answer Customers should be able to find the product quickly , The site should be able to
generate and print the order summary/receipt. , Should be able to send e-mails
to customers
Your Answer Customers should be able to find the product quickly , The site should be able to
generate and print the order summary/receipt. , Should be able to send e-mails
to customers

Multiple Choice Single Answer


Question The banking which allows banks to set up retail branches on subscriber based
online services is
Correct Answer Online Services Based Banking

Your Answer Online Services Based Banking

Match The Following


Question Correct Answer Your Answer

Marketing Notice New Products Information New Products Information

Logon Page Business partner's page Business partner's page

Home Page Latest Marketing Update Latest Marketing Update

Order Page Product summaries Product summaries

Multiple Choice Multiple Answer


Question Webpage has three main components as follows

Correct Answer Presentation Structure , Style , Content

Your Answer Presentation Structure , Style , Content

You might also like