Information Security & E-commerce

Information Security & E-commerce

University

10 Qs

quiz-placeholder

Similar activities

RED DE DATOS

RED DE DATOS

University

10 Qs

Understanding Internet and Web Technologies

Understanding Internet and Web Technologies

12th Grade - University

10 Qs

B1-Base_réseau

B1-Base_réseau

University

10 Qs

e-commerce

e-commerce

University

6 Qs

MIS Chapter 2

MIS Chapter 2

University

15 Qs

e-commerce security FILL Quiz

e-commerce security FILL Quiz

University

15 Qs

connecting learners at a distance

connecting learners at a distance

University

9 Qs

Mesa de Ayuda - AA

Mesa de Ayuda - AA

University

10 Qs

Information Security & E-commerce

Information Security & E-commerce

Assessment

Quiz

Computers

University

Medium

Created by

junias kennedy

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which of the following describes ecommerce

doing business electronically

doing business

sale of goods

all the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most individuals are familiar with which form of e‐commerce?

B2B

B2C

C2C

C2B

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which segment do e-bay and amazon.com belong?

B2B

B2C

C2C

C2B

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital products are best suited for B2C ecommerce because they____

are commodity like products

can be mass-customized and personalized

can be delivered at the time of purchase

all the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

EDI use

a. requires an extranet

a. requires value added network

a. can be done on internet

a. requires a corporate intranet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

EDI standard

is not easily available

defines several hundred transaction sets for various business forms

is not popular

defines only a transmission protocol

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

By security in e-Commerce we mean

i. Protecting an organization’s data resource from unauthorized access

ii. Preventing disasters from happening

iii. Authenticating messages received by an organization

iv. Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

i,ii

ii, iii

iii,iv

i, iii, iv

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?