ch 5
ch 5
1) ________refers to buying and selling of goods or services through the use of Internet
enabled wireless devices.
2) Banks allow their customers to access account balance, stock quotes, make transactions
via mobile phones. This service is known as ______________
3) The stock market services offered via mobile devices is known as _______________.
4) The full form of IRCTC is ______________________________________________.
5) The customer can download the application _________from the android mobile as mobile
services which provided by Union Bank.
6) ___________________wireless handheld devices are significant opportunities for the
growth of M-commerce.
7) The full form of GPS is _________________________________________________.
8) The E-commerce / M-commerce security must has ____________important aspects.
9) ___________helps in protecting the confidential data like credit card number.
10) __________ensures that the information must not be accidentally or maliciously altered or
tampered in transit.
11) __________ensure that only authentic users are allowed to use the system like login and
password.
12) The full form of TTP is _________________________________________________
13) ______________can either activate itself or be like a virus requiring a user to perform an
action, such as like clicking on something or opening an email attachment.
14) ________program can read e-mail messages, user login, password and credit card number.
15) _______attack is an attack used to shut down a machine or network.
16) _______is the electronic defacing of an existing website page.
17) The most commonly used network protection barrier between the company’s network and
the outside world is a _______________
18) The third party who issues certificates is known as a ______________
19) The full form of ATM is ____________________________________
20) The full form of SSL is _____________________________________
21) ___________provides the author with a tool to protect his/her original work from being
used or taken by others without permission.
22) __________term bullying is a form of virtual harassment.
23) ____________refers to “malicious software”, that includes virus, worms, Trojan horses
and spyware.
24) The term ____________usually refers to the sending of unwanted commercial e-mail
messages in large numbers to random people.
25) ____________is a common social engineering attack.