Computer Objective Module 1-Unlocked
Computer Objective Module 1-Unlocked
Page 1
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
7. In________encryption, both the sender and the receiver uses the. same key.
(a) Secret key (b) Public key
(c) Symmetric key (d) both (a) and (c)
8. In online store value system, cared that have embedded chips that store
personal information is called________.
(a) Credit card (b) Stored card
(c) Chips card (d) Smart card
Page 2
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
10. ________ payment system allows users to make micro payment and
purchases on web from accumulated debit balance.
(a) Digit cash (b) Digital accumulating balance
(c) Stored value system (d) Smart card.
11. In ________encryption both the sender and receiver uses the same key.
(a) Symmetric key (b) Asymmetric key
(c) Public Key (d) both (A) and (C)
Page 3
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
24. The emerging market economy where consumer's producers and merchants interact
electronically is called________.
(a) E-Commerce . (b) E-Market
(c) Supermarket (d) EDI
26. Buying and selling goods and services over the Internet is called________.
(a) EDI (b) Internet Commerce
(c) E-Commerce (d) E-Market
27. The process of converting intelligible data into unintelligible data is called
(a) Encryption (b) Decryption
(c) EDI (d) E-Market
29. Which product people more likely to be comfortable buying on the Internet?
Page 4
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
33. ________; is a convention that all sites that use SSL connection while
making a secure connection use instead of HTTP.
(a) HTTPS (b) POP
(c) FTP (d) TCP/IP
Page 5
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
40. In E-Commerce the assurance that the message is not altered is known as
(a) Authentication (b) Confidentiality
(c) Integrity (d) Validation
41. A public key differs from the private key due to________.
(a) It being used only for encryption
(b) It being used only for decryption
(c) It being shorter in Length
(d) None of the above
45. There are many techniques used by B2C companies to attract customers
except________.
(a) Viral Marketing (b) Online Ads
(c) Registering with search engines (d) Discount Price
Page 6
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
Page 7
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
Page 8
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
Page 9
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
Page
10
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
91. In a credit card Transaction on the net, the buyers' credits card details are revealed
to the seller ...
92. One limitation of E-Commerce is lakh of PC penetration ...
93. In SSL and URL changes to HTTPS from HTTP ...
94. Non-repudiation refers to non-denial of E-commerce transaction ...
95. Authentication ensures that the message was not read by others ...
96. Symmetric key encryption requires that both parties share the same key ...
Page
11
DYNAMIC COMMERCE CLASSES COMPUTER OBJECTIVES TYBCOM – SEM 6
60. False, 61. True, 62. False, 63. True, 64. False, 65. False, 66. False, 67. True,
68. False, 69. False, 70. True, 71. False, 72. False, 73. True, 74. True, 75. False,
76. False, 77. False, 78. False, 79. True, 80. False, 81. False, 82. True, 83. True,
84. True, 85. True, 86. True, 87. True, 88. True, 89. False, 90. False, 91. True,
92. True, 93. True, 94. True, 95. False, 96. True.
Page
12