1 ……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation.

(a) Debit Card 
(b) credit card
(c) Electronic purse   
(d) any of these



2 ………………is basically a secure gate between our organization data and internet.

(a) Network firewall 
(b) Antivirus 
(c) both of these 
(d) none of these



3 ……………………encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

(a) SSL 
(b) SET 
(c) both of these 
(d) none of these



4 ………………is automated methods of recognizing a person based on a physiological or behavioral characteristic.

(a) Biometrics 
(b) PIN 
(c) both of these 
(d) none of these



5. In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity

(a) Positive ID system 
(b) Negative ID system 
(c) both of these 
(d) none of these



6. In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity

(a) Positive ID system 
(b) Negative ID system
(c) both of these 
(d) none of these



7 …………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it.

(a) Network firewall 
(b) computer virus 
(c) both of these 
(d) none of these



8. Which among the following is not an example for computer virus ?

(a) Chernobyl 
(b) Melissa 
(c) I Love You 
(d) None of these



9 ……………………are special type of software meant for limiting the risks of being hit by computer viruses

(a) Network firewall 
(b) Antivirus 
(c) both of these 
(d) none of these



10. A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

(a) Hacker 
(b) spoofer 
(c) operator 
(d) none of these


More MCQs on E Commerce