System Analysis and Design
561. In the NetBill's protocol for small payments for services available in the internet.
- the customer is charged only when the information is delivered
- the vendor is guaranteed payment when information is delivered
- the customer must have a certified credit card
- the customer must have a valid public key
- i, ii
- i, ii, iii
- i, ii, iii, iv
- i, ii, iv
Correct answer: (D)
i, ii, iv
562. Advantages of B2C commerce are
- Business gets a wide reach to customers
- Payment for services easy
- Shop can be open 24 hours a day seven days a week
- Privacy of transaction always maintained
- i and ii
- ii and iii
- i and iii
- iii and iv
Correct answer: (C)
i and iii
563. ANSI X.12 is a standard developed by
- American National Standard Institute
- International Standard Institute
- European Common Market
- United Nations Economic Commission for Europe
Correct answer: (A)
American National Standard Institute
564. Firewall as part of a router program
- filters only packets coming from internet
- filters only packets going to internet
- filters packets travelling from and to the intranet from the internet
- ensures rapid traffic of packets for speedy e-Commerce
Correct answer: (C)
filters packets travelling from and to the intranet from the internet
565. Encryption is required to
- protect business information from eavesdropping when it is transmitted on internet
- efficiently use the bandwidth available in PSTN
- to protect information stored in companies' databases from retrieval
- to preserve secrecy of information stored in databases if an unauthorized person retrieves it
- i and ii
- ii and iii
- iii and iv
- i and iv
Correct answer: (D)
i and iv
566. DES using 56 bit keys
- Cannot be broken in reasonable time using presently available computers
- Can be broken only if the algorithm is known using even slow computers.
- Can be broken with presently available high performance computers.
- It is impossible to break ever.
Correct answer: (C)
Can be broken with presently available high performance computers.
567. In public key encryption if A wants to send an encrypted message to B
- A encrypts message using his private key
- A encrypts message using B's private key
- A encrypts message using B's public key
- A encrypts message using his public key
Correct answer: (C)
A encrypts message using B's public key
568. A hashing function for digital signature
- must give a hashed message which is shorter than the original message
- must be hardware implementable
- two different messages should not give the same hashed message
- is not essential for implementing digital signature
- i and ii
- ii and iii
- i and iii
- iii and iv
Correct answer: (C)
i and iii
569. The bank has to have the public keys of all customers in SET protocol as it has to
- check the digital signature of customers
- communicate with merchants
- communicate with merchants credit card company
- certify their keys
Correct answer: (A)
check the digital signature of customers
570. B2C commerce
- includes services such as legal advice
- means only shopping for physical goods
- means only customers should approach customers to sell
- means only customers should approach business to buy
Correct answer: (A)
includes services such as legal advice