Top 150+ Solved E-Commerce Management MCQ Questions Answer
Q. Which are made for small payment on the web
a. mega payments
b. micro payments
c. spot payment
d. all the above
Q. Which are used for signing and endorsing electronic changes
a. manual signature
b. thump impression
c. digital signature
d. spot signature
Q. The two types of credit cards today namely credit cards issued by credit cardcompanies
a. master card , visa
b. smart card credit card
c. debit card, e cash
d. none
Q. ……………………is a card with a microchip that can be used instead of cashand coins for every thing.
a. electronics cash
b. fast cash
c. electronic purse
d. none
Q. Prepaid or real-time tokens are exchanged between
a. banker and applicant
b. payer and drawer
c. buyer and seller
d. none
Q. …………. Is a digital analogue of various forms of payment backed by a bank
a. electronics cash
b. electronic purse
c. electronic tokens
d. non e
Q. There are two main concerns for using digital coins: anonymity of theconsumer and :-
a. prepaid system
b. post paid system
c. electronic tokens
d. online verification
Q. …………………. Encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.
a. ssl
b. set
c. secret key
d. none
Q. …………………. Is the process of coding and scrambling of messages toprevent un authorized access to under standing of data being transmitted
a. cryptography
b. encryption
c. security key
d. none
Q. ………………. Is used to keep transmissions privacy through the use ofdata encryption techniques.
a. data encryption
b. crytography
c. security key
d. non e
Q. Which refers to the automatic identification (or) identity verification of livingpersons using their enduring physical or behavioral characteristics
a. biometrics
b. cryptography
c. encryption
d. none
Q. ……………… involves checking to see if the signal is good quality
a. transmission
b. quality control
c. decision
d. none
Q. The process of encrypted data readable once again is called,
a. encryption
b. decryption
c. uncryption
d. none
Q. This the process of making information un intelligible to the unauthorized reader
a. encryption
b. decryption
c. uncryption
d. none