Skip to main content

ads1

Class 12 Chapter :- 5 Introduction to M-Commerce

Lesson -5 Introduction to M-Commerce
Choose the correct option from the following:

(1) Which of the following refers to buying and selling of goods or services through the use of Internet enabled wireless devices ?
(a) Internet
(b) M-commerce
(c) M-banking
(d) www

(2) Which of the following is the use of technologies which provide the location information for business purpose ?

(a) E-commerce
(b) M-commerce
(c) L-commerce
(d) Traditional commerce

(3) Which of the following stands for GPS ?

(a) Global Positioning System
(b) Global Postal System
(c) Grand Positioning System
(d) Google Positioning System

(4) Which of the following security aspect refers to the secrecy of the information so that unauthorized user cannot read it ?

(a) Confidentiality
(b) Integrity
(c) Non-repudiation
(d) Authorization

(5) Which of the following security aspect ensures that the information must not be accidentally or maliciously altered or tampered in transit ?

(a) Confidentiality
(b) Integrity
(c) Non-repudiation
(d) Authorization

(6) Which of the following security aspect ensures that only authentic users are allowed to use the system ?
(a) Authorization
(b) Confidentiality
(c) Non-repudiation
(d) Integrity

(7) Which of the following security aspect ensures that the sender of the message cannot deny that he/she has sent the message ?

(a) Authorization
(b) Confidentiality
(c) Non-repudiation
(d) Integrity
 
(8) Which of the following is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver ?
(a) Sniffer
(b) Denial of service attack
(c) Malicious code
(d) Spoofing

(9)Which of the following is an attack used to shut down a machine or network, making it inaccessible to its intended users ?
(a) Malicious code
(b) Denial-of-Service
(c) Spoofing
(d) Cyber vandalism

(10) Which of the following is known as electronic defacing of an existing website page ?

(a) Cyber vandalism
(b) Denial-of-Service
(c) Spoofing
(d) Malicious code

(11) Which of the following is pretending to be someone you are not, or representing a website as authentic when it is actually a fake ?

(a) Cyber vandalism
(b) Malicious code
(c) Denial-of-Service
(d) Spoofing

(12) Which of the following is a computer program that detects, prevents and takes action to remove the malicious codes like viruses, worms and trojan horses from the infected system?

(a) Antivirus software
(b) Digital certificate
(©) Firewall
(d) Cryptography

(13) Which of the following is the transformation of normal text known as "plain text" into unreadable or secret text known as "cipher text" using encryption algorithm ?

(a) Firewall
(b) Encryption
(c) Antivirus software
(d) Digital certificate

(14) Which of the following is the transformation of encrypted text back into normal text ?
(a) Firewall
(b) Digital certificate
(c) Decryption
(d) Virus

(15) Which of the following is a protocol used for securing web transactions on the Internet ?

(a) TCP/IP
(b) HTTP
(c) Bluetooth
(d) SSL

(16) Who developed SSL protocol ?

(a) Google
(b) Netscape
(c) Yahoo
(d) Firefox

(17) Which of the following starting address indicates that site is secured by SSL protocol?

(a) http://
(b) ss1:/
(c) https://
(d) http-ssl://

(18) Which of the following provides the author with a tool to protect his/her original work from being used or taken by others without permission ?

(a) Trademark
(b) Copyright
(c) Digital watermarking
(d) Steganography

(19) Which of the following is a specific logo, mark, word, symbol, design, phrase or image which is used by an individual or a company to distinguish a product or service from that of others in the market ?

(a) Trademark
(b) Copyright
(c) Digital watermarking
(d) Steganography

(20) Which of the following is the symbol for trademark ?
(a) TM, MT and ©
(b) TM, MS and ®
(c) TM, SM and ®
(d) TM, SM and

(21) Which of the following is the process of hiding information within other information ?
(a) Squatting
(b) Steganography
(c) Name changing
(d) Copyright

(22) Which of the following is a digital code inserted into a digital image, audio or video file which can identify the file's copyright information ?

(a) Image mark
(b) Digital mark
(c) Code mark
(d) Watermark

(23) Who issues the credit card and guarantees the payment to the merchant ?

(a) Merchant
(b) Issuing bank
(c) Acquiring bank
(d) Customer

(24) Which of the following payment card has a microchip embedded in its surface ?

(a) Smart card
(b) Debit card
(c) Credit card
(d) Charge card

 


For more MCQ Download through below link 



Download Chapter :- 5  Introduction to M-Commerce 



 

ads2

Popular posts from this blog

1. Given the school result data, analyses the performance of the students on #different parameters, e.g subject wise or class wise.

1. Given the school result data, analyses the performance of the students on #different parameters, e.g subject wise  or class wise. Solution :-   # x-axis is shows the subject and y -axis # shows the markers in each subject # import pandas and matplotlib  import pandas as pd  import matplotlib.pyplot as plt # Simple Line Chart with setting of Label of X and Y axis, # title for chart line and color of line  subject = ['Physic','Chemistry','Mathematics', 'Biology','Computer'] marks =[80,75,70,78,82] # To draw line in red colour plt.plot(subject,marks,'r',marker ='*')     # To Write Title of the Line Chart plt.title('Marks Scored') # To Put Label At Y Axis plt.xlabel('SUBJECT')           # To Put Label At X Axis plt.ylabel('MARKS')             plt.show() Output :- 

Class 10th Chapter 7 Functions in Calc

   Functions in Calc Calc provide built-in standard functions for mathematical, logical, statistical, date and time, financial and other calculations on numbers and text. The process of inserting a function is similar for all functions.That is, to use a function we need to enter a correct spelling of the function along with necessary arguments. This is known as syntax of the functions. t is possible to loose the grip on it and easy to introduce errors. To avoid this, you may take help of function wizard. The Calc support some more functions that support logical decision making. These functions are AND, OR, and NOT. (1) In which of the following ways we can enter a function in Calc ? (a) Directly typing function name in a cell nan (b) Function wizard or selecting from tool bar (c) A and B both (d) Depends on functions (2) A function can start with which of the following options ? (a) '='sign (b) Alphabets (c) Numbers (d) Any of these (3) Which of the following is not a logical...

11. Write a Java program to input basic salary of an employee and calculate its Gross salary according to following:

    11. Write a Java program to input basic salary of an employee and calculate its Gross salary according to following: Basic Salary <= 10000 : HRA = 20%, DA = 80% Basic Salary <= 20000 : HRA = 25%, DA = 90% Basic Salary > 20000 : HRA = 30%, DA = 95% Static Solution :-  class salary {     public static void main(String args[])     {     double basic=20000.50,gross,da,hra;     if(basic <=10000)     {         da = basic * 0.8;         hra = basic *0.2;     }              else if(basic <=20000)     {         da = basic * 0.9;         hra = basic *0.25;     }     else     {         da = basic * 0.95; ...