0% found this document useful (0 votes)
7 views2 pages

CHAPTER 5 M-Comm Textual & Board Papers

The document provides a comprehensive overview of various concepts related to mobile commerce (M-commerce) and internet security, including definitions of terms like GPS, confidentiality, integrity, and encryption. It also discusses security measures such as antivirus software, firewalls, and the SSL protocol, as well as the role of payment gateways and processors in online transactions. Additionally, it highlights the limitations of M-commerce and examples of its applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

CHAPTER 5 M-Comm Textual & Board Papers

The document provides a comprehensive overview of various concepts related to mobile commerce (M-commerce) and internet security, including definitions of terms like GPS, confidentiality, integrity, and encryption. It also discusses security measures such as antivirus software, firewalls, and the SSL protocol, as well as the role of payment gateways and processors in online transactions. Additionally, it highlights the limitations of M-commerce and examples of its applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

TEXTUAL AND BOARD PAPERS MCQ

1. M commerce refers to buying and selling of good or services through the use of internet.
2. L commerce is the use of technology which provide the location information for business purpose.
3. GPS standard for Global positioning system is the most accurate in determining a mobile device position.
4. Confidentiality is the security expected referred to the secrecy of the information so that an authorised user cannot
read it.
5. Integrity is the security aspect ensured that the information must not be accidentally or maliciously altered or
tempered in transist.
6. Authorisation is the security expect ensure that the only authentic user are allowed to use the system.
7. Non repudiation is the security expect ensured that the centre of the message cannot deny that he or she has sent
the message.
8. Sniffer is a program that uses internet to record information that passes through a computer or router in transition
from sender to receiver.
9. Denial of service is an attack used to shutdown a machine or network making it in accessible to its intended user
10. Cyber vandalism is known as electronic defacing of an existing website page.
11. Spoofing is pretending to be someone you are not or presenting a website as authentic when it is actually a fake.
12. Antivirus software is a software program that detect prevent and take action to remove cold course write like
virus from the system.
13. Encryption is the transformation of normal text into secret text known as ciphertext
14. Decryption is the transformation of encrypted text back into normal text
15. SSL ( Secure Socket Layer ) is a protocol used for securing web transaction on the internet
16. Netscape developed SSL protocol
17. https:// is the starting address indicates that site is secured by SSL protocol
18. Copyright provide the author with the tool to protect his or her original work from being used or taken by others
permission
19. Trademark is a specific logo, mark, word which is used by the individual or a company to distinguish a product
or service from that of the others in the market
20. TM , SM and R is the symbol for trademark
21. Steganography is the process of hiding information with other information
22. Watermark is a digital code inserted into a digital image audio or video file which can identify the file copyright
information
23. Issuing Bank is the bank which issued the credit card and guarantees the payment to the merchant
24. Smart card is a payment card which has a microchip embedded in its surface
25. Which service is included in mobile information service : News service, financial record, stock market data
26. Navigation is the location based application is used for plotting root from one place to another
27. There are four important aspect for the E-commerce or M-commerce security (Confidentiality, Integrity,
Authorisation and Non repudiation )
28. Antivirus software, firewall, cryptography are the security measures on internet
29. Payment gateway and payment processor are the entity pay role in online payment
30. While making the payment through E wallet , the customer is not required to provide the credit debit Card number
31. NPCI (National Payments Corporation of India) has launched a new card payment mechanism called RuPay
32. Limitations of m-commerce are: Refer page no. 91
33. The online payment through credit card on internet is divided into two parts: Authorisation and settlement.
34. Firewall is called the most commonly used network protection barrier between the company’s network and the
outside world.
35. Examples of M-commerce applications: mobile marketing and advertising, mobile ticketing, mobile
entertainment etc.
36. Mobile brokerage refers to the stock market service offered by a mobile device
37. Credit card, debit card and smart card are the payments cards.
38. Netscape has developed SSL protocol which is used to securing web transaction on the internet
39. Electronic fund transfer means transferring money from one bank account to another.
40. By using Rupay all the transaction will be processed within India so the cost will be reduced
41. Firewall is the security measure which ensure that the company is not accepted by the intruders
42. Processor are the data centres which perform the credit card transactions and managed funds for the merchants
43. Targeted ads, promotional messages, customer identification are the stored etc. are applications of advertising
promotion location based service
44. Spoofing is a technique in which the attackers tries to assume that identity of another person or system for
transacting with victim site
45. Confidentiality is the security aspect of M-commerce protect the data from private attacks.

Symbol of Trademark is designed by: TM and SM and R

You might also like