37.
which option in e-commerce, helps to keep selected products util
checkout/payment
a.Basket
b.Cart
c.try
d.COD.
44.which of the following authenticates and handles credit card
payment for E-commerce
a.payment gateway
b.E-commerce gateway
c.software gateway
d.E-wallets
46.which one is a online payment
a.Flipcart
b.Paytm
c.Gmail
d.Reliance jio
64 Which one is E - Commerce site
A Yahoo
B Bing
C Google
D Amazon
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
65 What is the full form of EDI
A Electronic Data Interchange
B Electronic Direct Interchange
C Electronic Data Information
D Electronic Data Interconnection
93 What is the purpose of OLX web site
A Uploading Files
B Buying and selling products
C Searching Documents
D Recovering files
94 Which card permits online payment using balance amount available
in bank account
A Credit card
B Paypal
C Debit card
D Wallet
48 The best products to sell in b2c e commece are
A Small products
B Digital products
C Specialty products
D Fresh products
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
5.which is the function of specifying access right to resources related to
information security
a. OTP
b. pin
c. authorization
d. passcode
1 When the Indian parliament passed the IT Act
A 1990
B 1992
C 2000
D2005
66 What is called the collective terms of malicious software, such as
viruses, worms and trojans
A Spam
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
B Phishing
C Malware
D Harm
91What is the full form of CIA under information security
A Confidentiality Integrity Availability
B Criminal Investigation Agency
C Cost Information Agency
D Credit Integrity Assement
92What is called protecting data from online attacks, deletions,
malwares
A Physical security
B Cyber security
C Cyber attack
D Virus
49 All of the following are examples of real security and privacy risks
EXCEPT :
A. Hackers
B. Spam
C. Viruses
D. Identify theft
96 Which malicious program cannot do anything until actions are taken
to activate the file attached by the malware.
A. Trojan Horse
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
B. Worm
C. Virus
D. Bots
97 What is an antivirus?
A. A bigger and more dangerous virus
B. Software used to duplicate viruses
C. Computer software used to prevent, detect and remove
malicious software
D. A biological agent that reproduces itself inside the cells of living
things
98 Which of the following is not a stand-alone program?
A. Trojan
B. Worm
C. Virus
D. Spyware
99 What are the types of malware?
A. Caterpillars
B. Worms
C. Lions
D. Horses
100 What are the examples of Malware Spreads?
A. Social network
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)
B. Pirated software
C. Removable media
D. All of the above
Print to PDF without this message by purchasing novaPDF (http://www.novapdf.com/)