Tag: emerging modes of services

Questions Related to emerging modes of services

HTML means ______.

  1. High Text Markup Language

  2. Hyper Telegraph Markup Language

  3. Hyper Text Markup Language

  4. Hyper Text Marker LAnguage


Correct Option: C
Explanation:

HTML stand for Hypertext markup language. HTML is the standard markup language for creating web pages and web applications. HTML is the fundamental technology used to define the structure of a web page. It forms triad of cornerstone technologies for the World wide web.

_____ is the most commonly used protocol in encryption used across the industry.

  1. HTP

  2. FTP

  3. Secure Sockets Layer (SSL)

  4. Cryptography


Correct Option: C
Explanation:

Secure sockets layer (SSL) is the most commonly known protocol that is used in encrypting the confidential information shared between different business units whole across the industry.

_______ refers to the probability of any mis-happening that can result into financial, reputational or psychological losses to the parties involved in a transaction.

  1. Loss

  2. Distress

  3. Virus

  4. Risk


Correct Option: D
Explanation:

Risk refers to the chances or probability of any mis-happening to certain activities of the business that can destroy the image of the parties involved in the business transaction by hampering the financial, reputational and psychological factors of the business.

Which is the Level 4 virus that affects the computer?

  1. Disruption of functioning

  2. Damage to target data files

  3. Complete destruction of the system

  4. Annoyance in terms of some on-screen display


Correct Option: C
Explanation:
Complete destruction of the system is a well known computer virus which is often regarded as a Level $ Virus that destroys all the transmitted information and data which are transmitted electronically that disrupts the functioning of the computer and causes destruction to the whole system. 

Essential requirement(s) of e-commerce transactions is/are ________.

  1. confidentiality

  2. integrity

  3. encryption

  4. all of the above


Correct Option: D
Explanation:

E-commerce stands for electronic commerce where the information or trade between two parties are done through electronic transmission of data which includes text, images etc. 

The biggest disadvantage of e-commerce is lack of confidentiality of the information shared between different business units. Therefore, the essential requirements of e-commerce are confidentiality, integrity and encryption of private information. 

Data furnished in the course of online transactions may be supplied to others who may start dumping a host of advertising and promotional literature into your e-mail box.

  1. True

  2. False


Correct Option: A
Explanation:

In the course of online transactions, data furnished can be supplied to others users who may have started using host websites for dumping their advertisement and promotional literature into their mail box. 

______ refers to the art of protecting information by transforming it (encrypting it) into an unreadable format.

  1. Cryptography

  2. Autography

  3. Encryption

  4. Transformation


Correct Option: A
Explanation:

Cryptography refers to the art of protecting all the confidential information from the competitors by transforming such information into some unreadable form through the way of encrypting them into certain languages.

Cookies are very similar to the caller ID in telephones that provide telemarketers with such relevant information about customers.

  1. True

  2. False


Correct Option: A
Explanation:

True. 

Cookies are basic software system that is similar to the caller ID in telephones as it provides information of all the customers who have visited a certain website to the telemarketers and advertisers of that website.

Seller denies that the customer ever placed the order. This is referred to as _____.

  1. default on order taking

  2. default on order giving

  3. default in general

  4. none of the above


Correct Option: A
Explanation:

When the seller denies that the customer ever placed an order in online shopping. It is a case of default on order making from the side of the customer. 

A series of commands which replicates itself on the other computer systems. Identify the answer.

  1. Virus

  2. Risk

  3. Antivirus

  4. None of the above


Correct Option: A
Explanation:

Virus refers to a series of commands that replicates itself on the other computer systems and hacks all the person information of the system which is transmitted to the user of that virus.