CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B

CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set E with answers available in Pdf for free download. The MCQ Questions for Class 12 Computer Science with answers have been prepared as per the latest syllabus, NCERT books and examination pattern suggested in Standard 12 by CBSE, NCERT and KVS. Multiple Choice Questions are an important part of exams for Grade 12 Computer Science and if practiced properly can help you to get higher marks. Refer to more Chapter-wise MCQs for NCERT Class 12 Computer Science and also download more latest study material for all subjects

Introduction To M Commerce Class 12 Computer Science MCQ

Class 12 Computer Science students should refer to the following multiple-choice questions with answers for Introduction To M Commerce in standard 12. These MCQ questions with answers for Grade 12 Computer Science will come in exams and help you to score good marks

Introduction To M Commerce MCQ Questions with Answers

Question: The transmissions in the process of online purchase occur on the public network, called the_____

  • a) Server
  • b) Internet
  • c) Website
  • d) Desktop PC

Answer: Internet


Question: A______can steal or tamper information anywhere in the world via his computer.

  • a) Friend
  • b) Acquaintance
  • c) Server
  • d) Intruder

Answer: Intruder


Question: Anybody can create new programs and run them on remote computers causing it to_____

  • a) Improve
  • b) Malfunction
  • c) Break down
  • d) Recover

Answer: Malfunction


Question: All the E-commerce / M-commerce websites have to keep their customer's personal data very_____

  • a) Safe
  • b) Unsafe
  • c) Insecurely
  • d) Risky

Answer: Safe


Question: All the E-commerce / M-commerce websites have a lot of_____issues.

  • a) Defense
  • b) Safety
  • c) Security
  • d) Attack

Answer: Security


Question: Which of the following does E-commerce deals with ?

  • a) Online Banking
  • b) Electronic transactions
  • c) Using debit / credit cards
  • d) All of these

Answer: All of these


Question: The E-commerce / M-commerce websites have more risk of being targeted by____than the normal websites.

  • a) Friends
  • b) Acquaintances
  • c) Servers
  • d) Intruders

Answer: Acquaintances


Question: The E-commerce / M-commerce security must meet_____important aspects.

  • a) Two
  • b) Four
  • c) Six
  • d) Eight

Answer: Two


Question: ______refers to the secrecy of the information so that unauthorized user cannot read the personal information.

  • a) Confidentiality
  • b) Secrecy
  • c) Unauthorized user
  • d) Intruders

Answer: Confidentiality


Question: _______protects the data from private attacks and ensures that the message is not revealed or leaked.

  • a) Decrypting
  • b) Cryptography
  • c) Encryption
  • d) All of these

Answer: Cryptography

 

Question: helps in protecting the confidential data like credit card number.

  • a) Decrypting
  • b) Cryptography
  • c) Encryption
  • d) All of these

Answer: Cryptography


Question: Confidentiality is achieved by using_____in which all messages transmitted are encrypted.

  • a) Decrypting
  • b) Coding
  • c) Cryptography
  • d) Encryption

Answer: Cryptography


Question: _____ensures that the information must not accidentally or maliciously altered or tampered in transit.

  • a) Confidentiality
  • b) Authorization
  • c) Non-repudiation
  • d) Integrity

Answer: Integrity


Question: ______ensures that only authentic users are allowed to use the system.

  • a) Confidentiality
  • b) Authorization
  • c) Non-repudiation
  • d) Integrity

Answer: Integrity


Question: ______ensures that the sender of the message cannot deny that he/she has sent the message.

  • a) Confidentiality
  • b) Authorization
  • c) Non-repudiation
  • d) Integrity

Answer: Non-repudiation


Question: Non-repudiation is usually accomplished via digital____

  • a) Signatures
  • b) Partners
  • c) Messages
  • d) Security

Answer: Signatures


Question: Full form of TTP is____

  • a) Trusted Third Party
  • b) Trustworthy Third Person
  • c) Trustful Third Party
  • d) Trustees Third Party

Answer: Trusted Third Party


Question: ______code is one that causes damage to a computer or system.

  • a) Programming
  • b) Unwanted
  • c) Malicious
  • d) Cruel

Answer: Malicious


Question: ______is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver.

  • a) Tapper
  • b) Sniffer
  • c) Recorder
  • d) Router

Answer: Sniffer


Question: ______programs can read e-mail messages, user login, password and credit card numbers.

  • a) Tapper
  • b) Sniffer
  • c) Recorder
  • d) Router

Answer: Sniffer


Question: ______attack is an attack used to shut down a machine or network, making it inaccessible to its intended users.

  • a) Denial-of-Service
  • b) Targeting
  • c) Connection
  • d) Vandalism

Answer: Denial-of-Service


Question: _____is the electronic defacing of an existing website page.

  • a) Denial-of-Service
  • b) Sniffing
  • c) Cyber Vandalism
  • d) Spoofing

Answer: Cyber Vandalism


Question: ______is pretending to be someone you are not, or representing a website as authentic when it is actually a fake.

  • a) Denial-of-Service
  • b) Sniffing
  • c) Cyber Vandalism
  • d) Spoofing

Answer: Spoofing


Question: A website attacker can create a fake website and substitute his______address for the real website address.

  • a) IP
  • b) DOS
  • c) TCP
  • d) TTP

Answer: IP


Question: ________software is a computer program that detects, prevents and takes action to remove the malicious codes from the infected system.

  • a) Trojan
  • b) Worms
  • c) Antivirus
  • d) Virus

Answer: Antivirus


Question: _____is a type of virus.

  • a) Trojan
  • b) Trojan horses
  • c) Virus
  • d) Cyber crime

Answer: Trojan horses


Question: _____can delete the files and slow down the computer system.

  • a) Software
  • b) Code
  • c) Antivirus
  • d) Virus

Answer: Virus


Question: Once a system is infected by_____it can spread by attaching to other programs and files within the system.

  • a) Software
  • b) Code
  • c) Antivirus
  • d) Virus

Answer: Virus


Question: Infections on a computer system can easily spread through Internet_____

  • a) Downloads
  • b) Code
  • c) Programs
  • d) Attachment

Answer: Downloads


Question: The_____software scans the downloaded files and the entire computer system in order to detect the presence of an infection.

  • a) Software
  • b) Code
  • c) Antivirus
  • d) Virus

Answer: Antivirus

 

Question: _______is a device placed between the network and the Internet to monitor and control the website traffic.

  • a) Firewall
  • b) Router
  • c) Bus Bar
  • d) Computer

Answer: Firewall


Question: The primary goal of a_____is to keep intruders away from the company's E-commerce infrastructure.

  • a) Firewall
  • b) Router
  • c) BusBar
  • d) Computer

Answer: Firewall


Question: ______ensures that the company's crucial data is kept safe and not accessed by the intruders.

  • a) Firewall
  • b) Router
  • c) BusBar
  • d) Computer

Answer: Computer


Question: Infected_____to the emails can be in the form of pictures, videos, sound clips or any other type of file.

  • a) Downloads
  • b) Attachments
  • c) Programs
  • d) Websites

Answer: Attachments


Question: Which of the following is protected by a firewall ?

  • a) Email services
  • b) Undesirable material
  • c) Unauthorized persons
  • d) All of these

Answer: All of these


Question: A firewall_____from any type of network attack.

  • a) Blocks
  • b) Unprotect
  • c) Protects
  • d) Saves

Answer: Protects


Question: Digital_____are used for proving our identity in electronic transactions.

  • a) Certificates
  • b) ID
  • c) Both (A) and (B)
  • d) Authority

Answer: Both (A) and (B)


Question: A____is issued by a trusted third party to establish the identity of the holder.

  • a) Digital Certificate
  • b) Digital Data
  • c) Digital Signature
  • d) Digital Service

Answer: Digital Certificate


Question: _______is the third party who issues the Digital Certificates.

  • a) Certification Authority
  • b) Certification Owner
  • c) Certification holder
  • d) Certification key

Answer: Certification Authority


Question: The most commonly used network protection barrier between company's network and the outside world is a______

  • a) Wall
  • b) Firewall
  • c) Antivirus
  • d) Soft wall

Answer: Firewall

 

Question: Which of the following is contained in the Digital Certificate ?

  • a) Holder's name
  • b) Serial number
  • c) Expiration date
  • d) All of these

Answer: All of these


Question: A_______also holds a copy of the certificate holder's public key.

  • a) Digital Certificate
  • b) Digital answer
  • c) Digital Sign
  • d) All of these

Answer: Digital Certificate


Question: The holder's public key is used for______messages and digital signatures.

  • a) Decrypting
  • b) Encrypting
  • c) Crypted
  • d) None of these

Answer: Encrypting


Question: _____is an art of protecting the information by transforming it into an unreadable form.

  • a) Decryption
  • b) Encryption
  • c) Cryptography
  • d) All of these

Answer: Cryptography


Question: ______is the transformation of normal text known as "plain text" into unreadable or secret text.

  • a) Decryption
  • b) Encryption
  • c) Cryptography
  • d) All of these

Answer: Encryption


Question: The secret text is called the_____text.

  • a) Hidden
  • b) Plain
  • c) Cipher
  • d) Coded

Answer: Cipher


Question: The secret text is converted into_______text using encryption algorithm.

  • a) Hidden
  • b) Plain
  • c) Cipher
  • d) Coded

Answer: Cipher


Question: A______key is used to encrypt and decrypt a message.

  • a) Secret
  • b) Plain
  • c) Cipher
  • d) Coded

Answer: Secret


Question: Messages are______just before they are sent on the internet or network.

  • a) Coded
  • b) Encrypted
  • c) Ciphered
  • d) None of these

Answer: Encrypted


Question: _____is the transformation of encrypted text back into normal text.

  • a) Decryption
  • b) Encryption
  • c) Cryption
  • d) All of these

Answer: Decryption


Question: ______is the transformation of encrypted text back into normal text.

  • a) Decryption
  • b) Encryption
  • c) Cryption
  • d) All of these

Answer: Decryption


Question: The key answer to the following encryption is : SCIENCE = TDJFODF

  • a) Shift by 4
  • b) Shift by 3
  • c) Shift by 2
  • d) Shift by 1

Answer: Shift by 1


Question: ________protocol is used for securing web transactions on the Internet.

  • a) SSI
  • b) SSL
  • c) SST
  • d) SSR

Answer: SSL


Question: Full form of SSL is_______

  • a) Security Safe Layer
  • b) Safe Secure Layer
  • c) Secure Socket Layer
  • d) Socket Safe Layer

Answer: Secure Socket Layer


Question: Protocol SSL was developed by______

  • a) Netscape
  • b) Microsoft
  • c) Oracle
  • d) Google

Answer: Netscape


Question: If a website is secured, then the security logo of_______is displayed on the login screen of the secured site.

  • a) Sign
  • b) VSign
  • c) VerySign
  • d) VeriSign

Answer: VeriSign


Question: An indication of a secure website is that its site address starts from______

  • a) Tcpip://
  • b) http://
  • c) https://
  • d) All of these

Answer: https://


Question: E-commerce and M-commerce provide opportunities to improve the_______processes.

  • a) Business
  • b) Wor
  • c) Employment
  • d) Vocation

Answer: Business


Question: Many countries have established______framework for the electronic commerce.

  • a) Official
  • b) Legal
  • c) Certified
  • d) Verified

Answer: Legal


Question: Indian government has also established the_____laws under the IT act.

  • a) Income tax
  • b) Information tax
  • c) Information technology
  • d) All of these

Answer: Information technology


Question: Enforcement of_______rules and regulations provides confidence to the customers that their personal information remains secret and will not be misused.

  • a) Official
  • b) Business
  • c) Companies
  • d) Legal

Answer: Legal


Question: Companies making online business are getting legal support in case of misuse of their logos or any_____materials.

  • a) Copyright
  • b) Printed
  • c) Fixed
  • d) Secret

Answer: Copyright


Question: The_______property includes books, software's, music, video, copyrights, trademarks and web pages.

  • a) Scholar
  • b) Intellectual
  • c) Thinker
  • d) Intelligent

Answer: Intellectual


Question: _______provides the author with a tool to protect his/her original work from being used or taken by others without permission.

  • a) Patent
  • b) Rights
  • c) Copyright
  • d) The law

Answer: Copyright


Question: _____is applicable to books, software programs and articles.

  • a) Patent
  • b) Rights
  • c) Copyright
  • d) The law

Answer: Copyright


Question: Copyright law protects intellectual______in its various forms and cannot be used freely.

  • a) Information
  • b) Data
  • c) Assets
  • d) Property

Answer: Property


Question: It is very difficult to protect_____property in E-commerce or M-commerce.

  • a) Scholarly
  • b) Intellectual
  • c) Thinker
  • d) Intelligent

Answer: Intellectual


Question: Almost all web pages are protected by______

  • a) Patent
  • b) Rights
  • c) Copyright
  • d) The law

Answer: Copyright


Question: Copying contents from the website also violets copyright______

  • a) Patent
  • b) Rights
  • c) Copyright
  • d) The law

Answer: The law


Question: A_______may be designated by the symbols TM or SM.

  • a) Trademark
  • b) Copyright
  • c) Symbol
  • d) Image

Answer: Trademark

 

Question: A specific logo, word, symbol, design, phrase or image can be used as a______

  • a) Trademark
  • b) Copyright
  • c) Symbol
  • d) Image

Answer: Trademark


Question: The competition over domain names is a______issue.

  • a) Illegal
  • b) Legal
  • c) Authorized
  • d) Authorized

Answer: Legal


Question: When, the Registered Domain names which are not in use are sold, it is known as______squatting.

  • a) Cyber
  • b) Online
  • c) Virtual
  • d) Domain

Answer: Cyber


Question: _______is the process of hiding information within other information.

  • a) Concealing
  • b) Hiding
  • c) Stegangraphy
  • d) Masking

Answer: Stegangraphy


Question: _______works by replacing unused data in computer files such as images, sound or text with invisible information.

  • a) Concealing
  • b) Hiding
  • c) Stegangraphy
  • d) Masking

Answer: Stegangraphy


Question: There are______versions of Stegangraphy, available on Internet, which can be easily downloaded.

  • a) Hidden
  • b) Invisible
  • c) Shareware
  • d) Freeware

Answer: Freeware


Question: The_______is a digital code inserted into a digital image, audio or video file which can identify the file's copyright information.

  • a) Transparent mark
  • b) Invisible mark
  • c) Translucent mark
  • d) Watermark

Answer: Watermark


Question: The_______allows hiding information in a totally invisible manner.

  • a) Transparent mark
  • b) Invisible mark
  • c) Translucent mark
  • d) Water mark

Answer: Water mark


Question: Currently, the_______distribution of digital audio over the Internet in the MP3 format is a big problem.

  • a) Unauthorized
  • b) Authorized
  • c) Legal
  • d) Illegal

Answer: Unauthorized


Question: _______watermarking can link information on the documents.

  • a) Hybrid
  • b) Digital
  • c) Analog
  • d) Internet

Answer: Digital


Question: A visible digital watermark can be added to any image using photo editor tools like_____

  • a) GMIP
  • b) GPIM
  • c) GIMP
  • d) GMIP

Answer: GIMP


Question: _______is one of the most important aspects of E-commerce and M-commerce.

  • a) Payment
  • b) Disbursement
  • c) Compensation
  • d) Expense

Answer: Expense


Question: _______payments involve cash, cheque or credit card.

  • a) Usual
  • b) Traditional
  • c) Customary
  • d) Established

Answer: Traditional


Question: Electronic payment systems have become more important to the______business processes.

  • a) Traditional
  • b) Shopping
  • c) Cards
  • d) Online

Answer: Online


Question: The different types of payment systems used are_____

  • a) Smart cards
  • b) Credit cards
  • c) Debit cards
  • d) All of these

Answer: All of these


Question: The payment cards can be classified into______types of cards

  • a) One
  • b) Two
  • c) Three
  • d) Four

Answer: Two


Question: ________card payment method is one of the most popular and widely accepted methods of payment on Internet.

  • a) Credit
  • b) Debit
  • c) Smart
  • d) Payment

Answer: Credit


Question: A credit card is issued to the customers by the banks known as______banks.

  • a) Issuing
  • b) Online
  • c) Card
  • d) Smart

Answer: Issuing


Question: ________card or Visa are established and reputed financial institutions in the services of credit card business.

  • a) Head
  • b) Principal
  • c) Smart
  • d) Master

Answer: Master


Question: In Credit Card transactions_____parties are involved.

  • a) One
  • b) Two
  • c) Three
  • d) Four

Answer: Four


Question: The______bank issues the credit card and guarantees the payment to the merchant.

  • a) Issuing
  • b) Online
  • c) Card
  • d) Smart

Answer: Issuing


Question: The_____bank establishes the account with the merchant and validates the credit card.

  • a) Issuing
  • b) Acquiring
  • c) Merchant's
  • d) Customer's

Answer: Acquiring


Question: The_______bank authorizes sale based on the customer's credit card limit.

  • a) Issuing
  • b) Acquiring
  • c) Merchant's
  • d) Customer's

Answer: Acquiring


Question: Payment______and processors are two more entities which play a role in online payment.

  • a) Doorways
  • b) Openings
  • c) Gateways
  • d) Windows

Answer: Gateways


Question: Payment gateway services provided by the third party like______which connects networks of all parties involved.

  • a) HDFC
  • b) SBI
  • c) AXIS
  • d) PayPal

Answer: PayPal


Question: _________are data centers which perform the credit card transactions and settle funds to the merchant.

  • a) Doorways
  • b) Openings
  • c) Processors
  • d) Windows

Answer: Processors


Question: Processors are connected to the E-commerce website of the merchant through the payment

  • a) Doorways
  • b) Openings
  • c) Gateways
  • d) Windows

Answer: Gateways


Question: The online payment through credit card on Internet is divided into_____parts.

  • a) One
  • b) Two
  • c) Three
  • d) Four

Answer: Two


Question: Major credit card companies use the_______security system to make online transactions secure.

  • a) SIGN
  • b) VERISIGN
  • c) SET
  • d) SECURE

Answer: SET


Question: Full form of SET is_____

  • a) Secure Electronic Transfer
  • b) Safe Electronic Transit
  • c) Safe Electric Transfer
  • d) Secure Electric Transit

Answer: Secure Electronic Transfer

 

Question: The advantage of using Credit card is_____

  • a) Gives flexibility to the customer.
  • b) Keeps record of the customer's purchase.
  • c) Allows customers to purchase goods even when they do not have cash in bank.
  • d) All of these

Answer: All of these


Question: The limitation of using credit card is_______

  • a) They are unsuitable for very small or very large payments.
  • b) Customers tend to overspend using credit cards
  • c) Problems arise in case lost or stolen credit cards.
  • d) All of these

Answer: All of these


Question: A________looks like credit card but works by transferring fund directly from the consumer's bank.

  • a) Credit Card
  • b) Smart Card
  • c) Debit Card
  • d) Payment Card

Answer: Debit Card


Question: The______can keep the consumer purchases under a limit and do not allow him to exceed beyond his/her budget.

  • a) Credit Card
  • b) Smart Card
  • c) Debit Card
  • d) Payment Card

Answer: Debit Card


Question: also looks like a credit card but have a microchip embedded in their surface.

  • a) Credit Card
  • b) Smart Card
  • c) Debit Card
  • d) Charge Card

Answer: Smart Card


Question: A______contains user's private information, such as account information, health information etc.

  • a) Credit Card
  • b) Smart Card
  • c) Debit Card
  • d) Payment Card

Answer: Smart Card


Question: ________are popular in countries like US, Europe, Japan and some parts of Asia.

  • a) Debit Card
  • b) Credit Card
  • c) Charge Card
  • d) Smart Card

Answer: Smart Card


Question: A_______is another form of payment mechanism wherein the customer can pay through the card and it does not have a credit limit.

  • a) Debit Card
  • b) Credit Card
  • c) Charge Card
  • d) Smart Card

Answer: Charge Card


Question: _______does not involve any type of card for online transaction.

  • a) Net-Banking
  • b) Credit-Card
  • c) Smart-Banking
  • d) All of these

Answer: Net-Banking


Question: means transferring money from one bank to another electronically.

  • a) Net-Banking
  • b) EFT
  • c) ATM
  • d) Net-Transaction

Answer: EFT


Question: Full form of EFT is______

  • a) Electronic Funds Transfer.
  • b) Electronic Finance Transfer
  • c) Electronic Funds Transaction.
  • d) None of these

Answer: Electronic Funds Transfer.


Question: is an electronic card for making secure online payments towards a merchant.

  • a) E-Wallet
  • b) M-Wallet
  • c) L-Wallet
  • d) Card-Wallet

Answer: E-Wallet


Question: The term______is coined from two terms Rupee and Payment.

  • a) RupeeP
  • b) RuPay
  • c) Rupees Payment
  • d) None of these

Answer: RuPay


Question: is a new card payment mechanism launched by NPCI.

  • a) RupeeP
  • b) RuPay
  • c) Rupees Payment
  • d) None of these

Answer: RuPay


Question: Full form of NPCI is_______

  • a) Nation's Payment Cost of India
  • b) National Payments Company of India.
  • c) National Payments Corporation of India.
  • d) Nationalized Payments Corporation of India.

Answer: National Payments Corporation of India.


Question: Anybody can create new programs and run them on remote computers causing it to_____

  • a) Improve
  • b) Malfunction
  • c) Break down
  • d) Recover

Answer: Malfunction


Question: A firewall______from any type of network attack.

  • a) Blocks
  • b) Unprotect
  • c) Protects
  • d) Saves

Answer: Protects


Question: Digital_____are used for proving our identity in electronic transactions.

  • a) Certificates
  • b) ID
  • c) Both (A) and (B)
  • d) Authority

Answer: Both (A) and (B)


Question: A_____is issued by a trusted third party to establish the identity of the holder.

  • a) Digital Certificate
  • b) Digital Data
  • c) Digital Signature
  • d) Digital Service

Answer: Digital Certificate


Question: _______is the third party who issues the Digital Certificates.

  • a) Certification Authority
  • b) Certification Owner
  • c) Certification holder
  • d) Certification key

Answer: Certification Authority

Tags: 

 


Click for more Computer Science Study Material
Cascading Style Sheets and JavaScript
CBSE Class 12 Computer Science Cascading Style Sheets and JavaScript MCQs
Classes and Objects In Java
CBSE Class 12 Computer Science Classes and Objects In Java MCQs Set A
CBSE Class 12 Computer Science Classes and Objects In Java MCQs Set B
Creating HTML Forms Using KompoZer
CBSE Class 12 Computer Science Creating HTML Forms Using KompoZer MCQs Set A
CBSE Class 12 Computer Science Creating HTML Forms Using KompoZer MCQs Set B
Designing Simple Website Using Kompozer
CBSE Class 12 Computer Science Designing Simple Website Using Kompozer MCQs
Exception Handling In Java
CBSE Class 12 Computer Science Exception Handling In Java MCQs
File Handling
CBSE Class 12 Computer Science File Handling MCQs Set A
CBSE Class 12 Computer Science File Handling MCQs Set B
File System
CBSE Class 12 Computer Science File System MCQs Set A
CBSE Class 12 Computer Science File System MCQs Set B
Introduction To E Commerce
CBSE Class 12 Computer Science Introduction To E Commerce MCQs
Introduction To M Commerce
CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set A
CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B
Java Basics
CBSE Class 12 Computer Science Java Basics MCQs Set A
CBSE Class 12 Computer Science Java Basics MCQs Set B
Object Oriented Concepts
CBSE Class 12 Computer Science Object Oriented Concepts MCQs
Publishing Documents Using Latex
CBSE Class 12 Computer Science Publishing Documents Using Latex MCQs Set A
CBSE Class 12 Computer Science Publishing Documents Using Latex MCQs Set B

Latest NCERT & CBSE News

Read the latest news and announcements from NCERT and CBSE below. Important updates relating to your studies which will help you to keep yourself updated with latest happenings in school level education. Keep yourself updated with all latest news and also read articles from teachers which will help you to improve your studies, increase motivation level and promote faster learning

CBSE Reading Challenge

The acquisition of 21st century competencies of communication, critical and creative thinking and the ability to locate, understand and reflect on various kinds of information has become more crucial for our learners. It is well accepted that Reading Literacy is not...

CBSE OMR Sheet Guidelines for Term 1

You are aware that the CBSE will be using OMR for the first time for assessment of both the Classes-X and XII in Term-I examinations. Hence, there is a need that all the students appearing in the Term-l examinations and the schools sponsoring these students should have...

CBSE Class 10 Revised Syllabus

Last year CBSE had to reduce the syllabus because of the pandemic situation but it was not very effective because there were no examinations. This year to avoid any confusion and conflict, CBSE has decided to reduce the syllabus into term 1 and term 2. 50 percent of...

×
Studies Today