Information Security & E-commerce

Information Security & E-commerce

University

10 Qs

quiz-placeholder

Similar activities

Tipos Ecommerce

Tipos Ecommerce

University

10 Qs

The Internet, The Web and E-Commerce

The Internet, The Web and E-Commerce

University

10 Qs

Chapter 8: E-commerce

Chapter 8: E-commerce

University

10 Qs

E-Commerce M1

E-Commerce M1

University

15 Qs

Chapter 8: Network Security

Chapter 8: Network Security

University

10 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

knowledge Test

knowledge Test

University

10 Qs

Information Security & E-commerce

Information Security & E-commerce

Assessment

Quiz

Computers

University

Medium

Created by

junias kennedy

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which of the following describes ecommerce

doing business electronically

doing business

sale of goods

all the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most individuals are familiar with which form of e‐commerce?

B2B

B2C

C2C

C2B

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which segment do e-bay and amazon.com belong?

B2B

B2C

C2C

C2B

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital products are best suited for B2C ecommerce because they____

are commodity like products

can be mass-customized and personalized

can be delivered at the time of purchase

all the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

EDI use

a. requires an extranet

a. requires value added network

a. can be done on internet

a. requires a corporate intranet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

EDI standard

is not easily available

defines several hundred transaction sets for various business forms

is not popular

defines only a transmission protocol

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

By security in e-Commerce we mean

i. Protecting an organization’s data resource from unauthorized access

ii. Preventing disasters from happening

iii. Authenticating messages received by an organization

iv. Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

i,ii

ii, iii

iii,iv

i, iii, iv

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?