Top 150+ Solved Essentials of Ecommerce MCQ Questions Answer
Q. A person who breaks in or trespasses a computer system:
a. Hacker
b. Snooper
c. Operator
d. Spoofer
Q. E-mail which contain useless material is termed as:
a. Spam Mail
b. Trunk Mail
c. Junk Mail
d. Inbox Mail
Q. Which of the following crimes were not covered under IT (Amendment) Act, 2008?
a. Cyber Terrorism
b. Child Pornography
c. Video voyeurism
d. None of these
Q. Trade mark, copyright, patent law, etc. comes under the purview of:
a. Data Protection
b. Telecommunication Laws
c. Intellectual Property Laws
d. All of the above
Q. Which one of the following is not a principle of e-commerce?
a. Privacy
b. Integrity
c. Authentication
d. None of these
Q. Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence?
a. Hacker
b. Software
c. Computer Virus
d. Computer Anti-virus
Q. An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are:
a. Digital Signature
b. Digital Certificates
c. SSL
d. None of these
Q. Trade mark, copyright, patent law etc comes under the purview of………
a. Data protection
b. Telecommunication laws
c. Intellectual property laws
d. None
Q. All of the following are examples of real security and privacy risks EXCEPT:
a. hackers.
b. spam.
c. viruses.
d. identity theft
Q. Digital Cash has following characteristic
a. Anonymity
b. Security
c. Confidentiality
d. All of Above
Q. Who breaks into other people’s computer system and steals and destroys information:
a. Hackers
b. Software
c. Hacktivists
d. Script Kiddies
Q. Which process is used to re install data from a copy when the original data has been lost
a. Backup
b. Recovery
c. Bench marking
d. Data cleansing
Q. Which service encompasses all technologies used to transmit and process information on an across a network?
a. Interoperability
b. Scalability
c. Benchmarking
d. Web services
Q. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing