Tuesday, June 25, 2013

Software Engineering and Project Management - 10

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


Select The Blank
Question ________is the act of storing a document on local server,enabling it to be presented faster than if it is accessed from the document's original server.
Correct Answer Caching
Your Answer Caching


True/False
Question Watchers are not easily suited for online medium.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Ways of advertising a web presence and getting customers in through the door include
Correct Answer Site Name , Conventional Advertising , Search Engines
Your Answer Site Name , Conventional Advertising , Search Engines


Multiple Choice Multiple Answer
Question The delivery system of ecommerce purcahses has to depend on
Correct Answer Size of Product , Nature of Product , Urgency
Your Answer Size of Product , Nature of Product , Urgency


Match The Following
Question Correct Answer Your Answer

SSL Address security concerns for inforamtion transfer Address security concerns for inforamtion transfer

PCT Spawn secondary key for authentication Spawn secondary key for authentication

S-HTTP Security scheme based on public key encryption Security scheme based on public key encryption

SET Provide digital signature capability for financial transaction on web Provide digital signature capability for financial transaction on web



Multiple Choice Single Answer
Question Millicent developed by Digital, which is now part of Compaq.Millicent is an electronic strip that
Correct Answer Does not issue one standard currency
Your Answer Does not issue one standard currency


True/False
Question A single Mondex card can be used in both, the online world of internet as well as the offline world of ordinary merchant stores.
Correct Answer True
Your Answer False


Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Post


Multiple Choice Multiple Answer
Question A trusted operating system provides
Correct Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
Your Answer strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information


Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spoofing


Multiple Choice Single Answer
Question Using Agile wallet frame, the consumer completes a purchase transaction with
Correct Answer Single mouse click
Your Answer Single mouse click


Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Transport


Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP , Is a s/w


Select The Blank
Question An internet user using Mondex, transfering cash over the internet requires ________ to be attached to the personal computer
Correct Answer Mondex reader
Your Answer Mondex card


Select The Blank
Question SET provides________ by the use of message encryption.
Correct Answer Confidentiality
Your Answer Secuity


Select The Blank
Question The SET specification use public key cryptography and________ for validating both consumer and merchant
Correct Answer digital certificate
Your Answer digital certificate


True/False
Question In hardened firewall host FTP ,Gopher services are located on firewall systems rather than being maintained on many systems.
Correct Answer True
Your Answer True


True/False
Question In a credit card, the customer receive a payment for returned goods.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question List the three types of information a smart card may contain
Correct Answer Financial facts , Account information , Health information
Your Answer Financial facts , Account information , Health information


Multiple Choice Multiple Answer
Question Firewalls do which of the following things?
Correct Answer Default deny , Default Permit
Your Answer Default Permit , Default Delete , Default Update


True/False
Question Number of times dialogue /feedback is unnecessary indicate adequate system feedback
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question KDD communications (kCOM) is the internet subsidiary of
Correct Answer Kokusai Denshin Denwa
Your Answer Kokusai Denshin Denwa


Select The Blank
Question Whenever the transaction is processed by a third party , the system is called ________.
Correct Answer Open loop
Your Answer Nested loop


Multiple Choice Single Answer
Question The most good choice for online payment is
Correct Answer Credit Card
Your Answer Credit Card


Multiple Choice Multiple Answer
Question The advantages of Internet over conventional manuals are
Correct Answer Readily corrected material , Search Facilities , No Mailing Costs
Your Answer Readily corrected material , Search Facilities , No Mailing Costs


Multiple Choice Single Answer
Question Public key encryption is useful when the parties willing to communicate
Correct Answer can not rely on each other
Your Answer share a common key


Multiple Choice Multiple Answer
Question To evaulate a web site using the model the following statements should be accessed.
Correct Answer Aesthetic Effect , Product Information , Customer Information
Your Answer Aesthetic Effect , Product Information , Customer Information


Select The Blank
Question Embedded Style Definitions are defined in the ________ section of the HTML file.
Correct Answer HEAD
Your Answer TITLE


Select The Blank
Question ________ is implementing upgrades or changes that are designed to improve system's productivity.
Correct Answer Enchancement
Your Answer Maintainence


Multiple Choice Multiple Answer
Question Methods for ensuring inforamtion integrity include
Correct Answer Error detection codes , Checksums , Sequence Numbers
Your Answer Error detection codes , Checksums , Sequence Numbers


True/False
Question A credit card contains cash.
Correct Answer False
Your Answer False


Multiple Choice Multiple Answer
Question For managing customer feedback
Correct Answer Check the downloadable speed , Set up FAQs , Answer customer mail
Your Answer Set up FAQs , Answer customer mail , Check the downloadable speed


True/False
Question In credit cards the transactions are always single way that is customer's charges to be credited to vendor's account
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?
Correct Answer Ecoins
Your Answer Ecoins


Multiple Choice Single Answer
Question What is the mode of payment for the purchases of small value on the internet
Correct Answer Electronic cash
Your Answer Credit card


Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Customer's bank , Card issuing company


Multiple Choice Single Answer
Question A process of making information indeipherable except to those with a decoding key
Correct Answer Encryption
Your Answer Encryption


Match The Following
Question Correct Answer Your Answer

Secret data Existance is secret Existance is secret

Public data Protected from modification Protected from modification

Copyright data Content is not secret Content is not secret

Confidential data Content is secret Content is secret



True/False
Question The customer feedback got through the Web site should be the input for maintainance and enhancement of the site.
Correct Answer True
Your Answer True


Select The Blank
Question In public key encryption method one key is public and one key is ________.
Correct Answer Private
Your Answer Private


Multiple Choice Single Answer
Question The science of deciphering encrypted messages without knowing right key is known as
Correct Answer Cryptoanalysis
Your Answer Cryptography


Multiple Choice Multiple Answer
Question The Online equivalent of stored value card is
Correct Answer Ecash , Network Money
Your Answer Ecash , Network Money


True/False
Question A hardened firewall computer records not only the user logged in but also who has failed loging
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Off-the-shelf home finance software are
Correct Answer Microsoft Money , Intuit's Quicken
Your Answer Microsoft Money , Intuit's Quicken


Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Cheap , Useful for small payments


Multiple Choice Multiple Answer
Question The key elements of a brand at the advertising agency are
Correct Answer Differentiation , Relevance , Perceived Value
Your Answer Differentiation , Relevance , Perceived Value


Multiple Choice Single Answer
Question A set of rules for encoding and decoing message is called as
Correct Answer Cipher
Your Answer Public Key

No comments:

Post a Comment

Please, "Sign Up" Here and Get Free HRD Module