Top 150+ Solved Essentials of Ecommerce MCQ Questions Answer

From 166 to 180 of 180

Q. A person who breaks in or trespasses a computer system:

a. Hacker

b. Snooper

c. Operator

d. Spoofer

  • a. Hacker

Q. E-mail which contain useless material is termed as:

a. Spam Mail

b. Trunk Mail

c. Junk Mail

d. Inbox Mail

  • c. Junk Mail

Q. Which of the following crimes were not covered under IT (Amendment) Act, 2008?

a. Cyber Terrorism

b. Child Pornography

c. Video voyeurism

d. None of these

  • d. None of these

Q. Trade mark, copyright, patent law, etc. comes under the purview of:

a. Data Protection

b. Telecommunication Laws

c. Intellectual Property Laws

d. All of the above

  • c. Intellectual Property Laws

Q. Which one of the following is not a principle of e-commerce?

a. Privacy

b. Integrity

c. Authentication

d. None of these

  • d. None of these

Q. Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?

a. Hacker

b. Software

c. Computer Virus

d. Computer Anti-virus

  • c. Computer Virus

Q. An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:

a. Digital Signature

b. Digital Certificates

c. SSL

d. None of these

  • b. Digital Certificates

Q. India has enacted the first IT Act in the year……

a. 2001

b. 2002

c. 2009

d. 2000

  • d. 2000

Q. Trade mark, copyright, patent law etc comes under the purview of………

a. Data protection

b. Telecommunication laws

c. Intellectual property laws

d. None

  • c. Intellectual property laws

Q. All of the following are examples of real security and privacy risks EXCEPT:

a. hackers.

b. spam.

c. viruses.

d. identity theft

  • b. spam.

Q. Digital Cash has following characteristic

a. Anonymity

b. Security

c. Confidentiality

d. All of Above

  • d. All of Above

Q. Who breaks into other people’s computer system and steals and destroys information:

a. Hackers

b. Software

c. Hacktivists

d. Script Kiddies

  • a. Hackers

Q. Which process is used to re install data from a copy when the original data has been lost

a. Backup

b. Recovery

c. Bench marking

d. Data cleansing

  • b. Recovery

Q. Which service encompasses all technologies used to transmit and process information on an across a network?

a. Interoperability

b. Scalability

c. Benchmarking

d. Web services

  • d. Web services
Subscribe Now

Get All Updates & News