Refer to CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B provided below. CBSE Class 12 Computer Science MCQs with answers available in Pdf for free download. The MCQ Questions for Class 12 Computer Science with answers have been prepared as per the latest syllabus, CBSE books and examination pattern suggested in Class 12 by CBSE, NCERT and KVS. Multiple Choice Questions for Introduction To M Commerce are an important part of exams for Class 12 Computer Science and if practiced properly can help you to get higher marks. Refer to more Chapter-wise MCQs for CBSE Class 12 Computer Science and also download more latest study material for all subjects
MCQ for Class 12 Computer Science Introduction To M Commerce
Class 12 Computer Science students should refer to the following multiple-choice questions with answers for Introduction To M Commerce in Class 12. These MCQ questions with answers for Class 12 Computer Science will come in exams and help you to score good marks
Introduction To M Commerce MCQ Questions Class 12 Computer Science with Answers
Question: The transmissions in the process of online purchase occur on the public network, called the_____
a) Server
b) Internet
c) Website
d) Desktop PC
Answer: Internet
Question: A______can steal or tamper information anywhere in the world via his computer.
a) Friend
b) Acquaintance
c) Server
d) Intruder
Answer: Intruder
Question: Anybody can create new programs and run them on remote computers causing it to_____
a) Improve
b) Malfunction
c) Break down
d) Recover
Answer: Malfunction
Question: All the E-commerce / M-commerce websites have to keep their customer's personal data very_____
a) Safe
b) Unsafe
c) Insecurely
d) Risky
Answer: Safe
Question: All the E-commerce / M-commerce websites have a lot of_____issues.
a) Defense
b) Safety
c) Security
d) Attack
Answer: Security
Question: Which of the following does E-commerce deals with ?
a) Online Banking
b) Electronic transactions
c) Using debit / credit cards
d) All of these
Answer: All of these
Question: The E-commerce / M-commerce websites have more risk of being targeted by____than the normal websites.
a) Friends
b) Acquaintances
c) Servers
d) Intruders
Answer: Acquaintances
Question: The E-commerce / M-commerce security must meet_____important aspects.
a) Two
b) Four
c) Six
d) Eight
Answer: Two
Question: ______refers to the secrecy of the information so that unauthorized user cannot read the personal information.
a) Confidentiality
b) Secrecy
c) Unauthorized user
d) Intruders
Answer: Confidentiality
Question: _______protects the data from private attacks and ensures that the message is not revealed or leaked.
a) Decrypting
b) Cryptography
c) Encryption
d) All of these
Answer: Cryptography
Question: helps in protecting the confidential data like credit card number.
a) Decrypting
b) Cryptography
c) Encryption
d) All of these
Answer: Cryptography
Question: Confidentiality is achieved by using_____in which all messages transmitted are encrypted.
a) Decrypting
b) Coding
c) Cryptography
d) Encryption
Answer: Cryptography
Question: _____ensures that the information must not accidentally or maliciously altered or tampered in transit.
a) Confidentiality
b) Authorization
c) Non-repudiation
d) Integrity
Answer: Integrity
Question: ______ensures that only authentic users are allowed to use the system.
a) Confidentiality
b) Authorization
c) Non-repudiation
d) Integrity
Answer: Integrity
Question: ______ensures that the sender of the message cannot deny that he/she has sent the message.
a) Confidentiality
b) Authorization
c) Non-repudiation
d) Integrity
Answer: Non-repudiation
Question: Non-repudiation is usually accomplished via digital____
a) Signatures
b) Partners
c) Messages
d) Security
Answer: Signatures
Question: Full form of TTP is____
a) Trusted Third Party
b) Trustworthy Third Person
c) Trustful Third Party
d) Trustees Third Party
Answer: Trusted Third Party
Question: ______code is one that causes damage to a computer or system.
a) Programming
b) Unwanted
c) Malicious
d) Cruel
Answer: Malicious
Question: ______is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver.
a) Tapper
b) Sniffer
c) Recorder
d) Router
Answer: Sniffer
Question: ______programs can read e-mail messages, user login, password and credit card numbers.
a) Tapper
b) Sniffer
c) Recorder
d) Router
Answer: Sniffer
Question: ______attack is an attack used to shut down a machine or network, making it inaccessible to its intended users.
a) Denial-of-Service
b) Targeting
c) Connection
d) Vandalism
Answer: Denial-of-Service
Question: _____is the electronic defacing of an existing website page.
a) Denial-of-Service
b) Sniffing
c) Cyber Vandalism
d) Spoofing
Answer: Cyber Vandalism
Question: ______is pretending to be someone you are not, or representing a website as authentic when it is actually a fake.
a) Denial-of-Service
b) Sniffing
c) Cyber Vandalism
d) Spoofing
Answer: Spoofing
Question: A website attacker can create a fake website and substitute his______address for the real website address.
a) IP
b) DOS
c) TCP
d) TTP
Answer: IP
Question: ________software is a computer program that detects, prevents and takes action to remove the malicious codes from the infected system.
a) Trojan
b) Worms
c) Antivirus
d) Virus
Answer: Antivirus
Question: _____is a type of virus.
a) Trojan
b) Trojan horses
c) Virus
d) Cyber crime
Answer: Trojan horses
Question: _____can delete the files and slow down the computer system.
a) Software
b) Code
c) Antivirus
d) Virus
Answer: Virus
Question: Once a system is infected by_____it can spread by attaching to other programs and files within the system.
a) Software
b) Code
c) Antivirus
d) Virus
Answer: Virus
Question: Infections on a computer system can easily spread through Internet_____
a) Downloads
b) Code
c) Programs
d) Attachment
Answer: Downloads
Question: The_____software scans the downloaded files and the entire computer system in order to detect the presence of an infection.
a) Software
b) Code
c) Antivirus
d) Virus
Answer: Antivirus
Question: _______is a device placed between the network and the Internet to monitor and control the website traffic.
a) Firewall
b) Router
c) Bus Bar
d) Computer
Answer: Firewall
Question: The primary goal of a_____is to keep intruders away from the company's E-commerce infrastructure.
a) Firewall
b) Router
c) BusBar
d) Computer
Answer: Firewall
Question: ______ensures that the company's crucial data is kept safe and not accessed by the intruders.
a) Firewall
b) Router
c) BusBar
d) Computer
Answer: Computer
Question: Infected_____to the emails can be in the form of pictures, videos, sound clips or any other type of file.
a) Downloads
b) Attachments
c) Programs
d) Websites
Answer: Attachments
Question: Which of the following is protected by a firewall ?
a) Email services
b) Undesirable material
c) Unauthorized persons
d) All of these
Answer: All of these
Question: A firewall_____from any type of network attack.
a) Blocks
b) Unprotect
c) Protects
d) Saves
Answer: Protects
Question: Digital_____are used for proving our identity in electronic transactions.
a) Certificates
b) ID
c) Both (A) and (B)
d) Authority
Answer: Both (A) and (B)
Question: A____is issued by a trusted third party to establish the identity of the holder.
a) Digital Certificate
b) Digital Data
c) Digital Signature
d) Digital Service
Answer: Digital Certificate
Question: _______is the third party who issues the Digital Certificates.
a) Certification Authority
b) Certification Owner
c) Certification holder
d) Certification key
Answer: Certification Authority
Question: The most commonly used network protection barrier between company's network and the outside world is a______
a) Wall
b) Firewall
c) Antivirus
d) Soft wall
Answer: Firewall
Question: Which of the following is contained in the Digital Certificate ?
a) Holder's name
b) Serial number
c) Expiration date
d) All of these
Answer: All of these
Question: A_______also holds a copy of the certificate holder's public key.
a) Digital Certificate
b) Digital answer
c) Digital Sign
d) All of these
Answer: Digital Certificate
Question: The holder's public key is used for______messages and digital signatures.
a) Decrypting
b) Encrypting
c) Crypted
d) None of these
Answer: Encrypting
Question: _____is an art of protecting the information by transforming it into an unreadable form.
a) Decryption
b) Encryption
c) Cryptography
d) All of these
Answer: Cryptography
Question: ______is the transformation of normal text known as "plain text" into unreadable or secret text.
a) Decryption
b) Encryption
c) Cryptography
d) All of these
Answer: Encryption
Question: The secret text is called the_____text.
a) Hidden
b) Plain
c) Cipher
d) Coded
Answer: Cipher
Question: The secret text is converted into_______text using encryption algorithm.
a) Hidden
b) Plain
c) Cipher
d) Coded
Answer: Cipher
Question: A______key is used to encrypt and decrypt a message.
a) Secret
b) Plain
c) Cipher
d) Coded
Answer: Secret
Question: Messages are______just before they are sent on the internet or network.
a) Coded
b) Encrypted
c) Ciphered
d) None of these
Answer: Encrypted
Question: _____is the transformation of encrypted text back into normal text.
a) Decryption
b) Encryption
c) Cryption
d) All of these
Answer: Decryption
Question: ______is the transformation of encrypted text back into normal text.
a) Decryption
b) Encryption
c) Cryption
d) All of these
Answer: Decryption
Question: The key answer to the following encryption is : SCIENCE = TDJFODF
a) Shift by 4
b) Shift by 3
c) Shift by 2
d) Shift by 1
Answer: Shift by 1
Question: ________protocol is used for securing web transactions on the Internet.
a) SSI
b) SSL
c) SST
d) SSR
Answer: SSL
Question: Full form of SSL is_______
a) Security Safe Layer
b) Safe Secure Layer
c) Secure Socket Layer
d) Socket Safe Layer
Answer: Secure Socket Layer
Question: Protocol SSL was developed by______
a) Netscape
b) Microsoft
c) Oracle
d) Google
Answer: Netscape
Question: If a website is secured, then the security logo of_______is displayed on the login screen of the secured site.
a) Sign
b) VSign
c) VerySign
d) VeriSign
Answer: VeriSign
Question: An indication of a secure website is that its site address starts from______
a) Tcpip://
b) http://
c) https://
d) All of these
Answer: https://
Question: E-commerce and M-commerce provide opportunities to improve the_______processes.
a) Business
b) Wor
c) Employment
d) Vocation
Answer: Business
Question: Many countries have established______framework for the electronic commerce.
a) Official
b) Legal
c) Certified
d) Verified
Answer: Legal
Question: Indian government has also established the_____laws under the IT act.
a) Income tax
b) Information tax
c) Information technology
d) All of these
Answer: Information technology
Question: Enforcement of_______rules and regulations provides confidence to the customers that their personal information remains secret and will not be misused.
a) Official
b) Business
c) Companies
d) Legal
Answer: Legal
Question: Companies making online business are getting legal support in case of misuse of their logos or any_____materials.
a) Copyright
b) Printed
c) Fixed
d) Secret
Answer: Copyright
Question: The_______property includes books, software's, music, video, copyrights, trademarks and web pages.
a) Scholar
b) Intellectual
c) Thinker
d) Intelligent
Answer: Intellectual
Question: _______provides the author with a tool to protect his/her original work from being used or taken by others without permission.
a) Patent
b) Rights
c) Copyright
d) The law
Answer: Copyright
Question: _____is applicable to books, software programs and articles.
a) Patent
b) Rights
c) Copyright
d) The law
Answer: Copyright
Question: Copyright law protects intellectual______in its various forms and cannot be used freely.
a) Information
b) Data
c) Assets
d) Property
Answer: Property
Question: It is very difficult to protect_____property in E-commerce or M-commerce.
a) Scholarly
b) Intellectual
c) Thinker
d) Intelligent
Answer: Intellectual
Question: Almost all web pages are protected by______
a) Patent
b) Rights
c) Copyright
d) The law
Answer: Copyright
Question: Copying contents from the website also violets copyright______
a) Patent
b) Rights
c) Copyright
d) The law
Answer: The law
Question: A_______may be designated by the symbols TM or SM.
a) Trademark
b) Copyright
c) Symbol
d) Image
Answer: Trademark
Question: A specific logo, word, symbol, design, phrase or image can be used as a______
a) Trademark
b) Copyright
c) Symbol
d) Image
Answer: Trademark
Question: The competition over domain names is a______issue.
a) Illegal
b) Legal
c) Authorized
d) Authorized
Answer: Legal
Question: When, the Registered Domain names which are not in use are sold, it is known as______squatting.
a) Cyber
b) Online
c) Virtual
d) Domain
Answer: Cyber
Question: _______is the process of hiding information within other information.
a) Concealing
b) Hiding
c) Stegangraphy
d) Masking
Answer: Stegangraphy
Question: _______works by replacing unused data in computer files such as images, sound or text with invisible information.
a) Concealing
b) Hiding
c) Stegangraphy
d) Masking
Answer: Stegangraphy
Question: There are______versions of Stegangraphy, available on Internet, which can be easily downloaded.
a) Hidden
b) Invisible
c) Shareware
d) Freeware
Answer: Freeware
Question: The_______is a digital code inserted into a digital image, audio or video file which can identify the file's copyright information.
a) Transparent mark
b) Invisible mark
c) Translucent mark
d) Watermark
Answer: Watermark
Question: The_______allows hiding information in a totally invisible manner.
a) Transparent mark
b) Invisible mark
c) Translucent mark
d) Water mark
Answer: Water mark
Question: Currently, the_______distribution of digital audio over the Internet in the MP3 format is a big problem.
a) Unauthorized
b) Authorized
c) Legal
d) Illegal
Answer: Unauthorized
Question: _______watermarking can link information on the documents.
a) Hybrid
b) Digital
c) Analog
d) Internet
Answer: Digital
Question: A visible digital watermark can be added to any image using photo editor tools like_____
a) GMIP
b) GPIM
c) GIMP
d) GMIP
Answer: GIMP
Question: _______is one of the most important aspects of E-commerce and M-commerce.
a) Payment
b) Disbursement
c) Compensation
d) Expense
Answer: Expense
Question: _______payments involve cash, cheque or credit card.
a) Usual
b) Traditional
c) Customary
d) Established
Answer: Traditional
Question: Electronic payment systems have become more important to the______business processes.
a) Traditional
b) Shopping
c) Cards
d) Online
Answer: Online
Question: The different types of payment systems used are_____
a) Smart cards
b) Credit cards
c) Debit cards
d) All of these
Answer: All of these
Question: The payment cards can be classified into______types of cards
a) One
b) Two
c) Three
d) Four
Answer: Two
Question: ________card payment method is one of the most popular and widely accepted methods of payment on Internet.
a) Credit
b) Debit
c) Smart
d) Payment
Answer: Credit
Question: A credit card is issued to the customers by the banks known as______banks.
a) Issuing
b) Online
c) Card
d) Smart
Answer: Issuing
Question: ________card or Visa are established and reputed financial institutions in the services of credit card business.
a) Head
b) Principal
c) Smart
d) Master
Answer: Master
Question: In Credit Card transactions_____parties are involved.
a) One
b) Two
c) Three
d) Four
Answer: Four
Question: The______bank issues the credit card and guarantees the payment to the merchant.
a) Issuing
b) Online
c) Card
d) Smart
Answer: Issuing
Question: The_____bank establishes the account with the merchant and validates the credit card.
a) Issuing
b) Acquiring
c) Merchant's
d) Customer's
Answer: Acquiring
Question: The_______bank authorizes sale based on the customer's credit card limit.
a) Issuing
b) Acquiring
c) Merchant's
d) Customer's
Answer: Acquiring
Question: Payment______and processors are two more entities which play a role in online payment.
a) Doorways
b) Openings
c) Gateways
d) Windows
Answer: Gateways
Question: Payment gateway services provided by the third party like______which connects networks of all parties involved.
a) HDFC
b) SBI
c) AXIS
d) PayPal
Answer: PayPal
Question: _________are data centers which perform the credit card transactions and settle funds to the merchant.
a) Doorways
b) Openings
c) Processors
d) Windows
Answer: Processors
Question: Processors are connected to the E-commerce website of the merchant through the payment
a) Doorways
b) Openings
c) Gateways
d) Windows
Answer: Gateways
Question: The online payment through credit card on Internet is divided into_____parts.
a) One
b) Two
c) Three
d) Four
Answer: Two
Question: Major credit card companies use the_______security system to make online transactions secure.
a) SIGN
b) VERISIGN
c) SET
d) SECURE
Answer: SET
Question: Full form of SET is_____
a) Secure Electronic Transfer
b) Safe Electronic Transit
c) Safe Electric Transfer
d) Secure Electric Transit
Answer: Secure Electronic Transfer
Question: The advantage of using Credit card is_____
a) Gives flexibility to the customer.
b) Keeps record of the customer's purchase.
c) Allows customers to purchase goods even when they do not have cash in bank.
d) All of these
Answer: All of these
Question: The limitation of using credit card is_______
a) They are unsuitable for very small or very large payments.
b) Customers tend to overspend using credit cards
c) Problems arise in case lost or stolen credit cards.
d) All of these
Answer: All of these
Question: A________looks like credit card but works by transferring fund directly from the consumer's bank.
a) Credit Card
b) Smart Card
c) Debit Card
d) Payment Card
Answer: Debit Card
Question: The______can keep the consumer purchases under a limit and do not allow him to exceed beyond his/her budget.
a) Credit Card
b) Smart Card
c) Debit Card
d) Payment Card
Answer: Debit Card
Question: also looks like a credit card but have a microchip embedded in their surface.
a) Credit Card
b) Smart Card
c) Debit Card
d) Charge Card
Answer: Smart Card
Question: A______contains user's private information, such as account information, health information etc.
a) Credit Card
b) Smart Card
c) Debit Card
d) Payment Card
Answer: Smart Card
Question: ________are popular in countries like US, Europe, Japan and some parts of Asia.
a) Debit Card
b) Credit Card
c) Charge Card
d) Smart Card
Answer: Smart Card
Question: A_______is another form of payment mechanism wherein the customer can pay through the card and it does not have a credit limit.
a) Debit Card
b) Credit Card
c) Charge Card
d) Smart Card
Answer: Charge Card
Question: _______does not involve any type of card for online transaction.
a) Net-Banking
b) Credit-Card
c) Smart-Banking
d) All of these
Answer: Net-Banking
Question: means transferring money from one bank to another electronically.
a) Net-Banking
b) EFT
c) ATM
d) Net-Transaction
Answer: EFT
Question: Full form of EFT is______
a) Electronic Funds Transfer.
b) Electronic Finance Transfer
c) Electronic Funds Transaction.
d) None of these
Answer: Electronic Funds Transfer.
Question: is an electronic card for making secure online payments towards a merchant.
a) E-Wallet
b) M-Wallet
c) L-Wallet
d) Card-Wallet
Answer: E-Wallet
Question: The term______is coined from two terms Rupee and Payment.
a) RupeeP
b) RuPay
c) Rupees Payment
d) None of these
Answer: RuPay
Question: is a new card payment mechanism launched by NPCI.
a) RupeeP
b) RuPay
c) Rupees Payment
d) None of these
Answer: RuPay
Question: Full form of NPCI is_______
a) Nation's Payment Cost of India
b) National Payments Company of India.
c) National Payments Corporation of India.
d) Nationalized Payments Corporation of India.
Answer: National Payments Corporation of India.
Question: Anybody can create new programs and run them on remote computers causing it to_____
a) Improve
b) Malfunction
c) Break down
d) Recover
Answer: Malfunction
Question: A firewall______from any type of network attack.
a) Blocks
b) Unprotect
c) Protects
d) Saves
Answer: Protects
Question: Digital_____are used for proving our identity in electronic transactions.
a) Certificates
b) ID
c) Both (A) and (B)
d) Authority
Answer: Both (A) and (B)
Question: A_____is issued by a trusted third party to establish the identity of the holder.
a) Digital Certificate
b) Digital Data
c) Digital Signature
d) Digital Service
Answer: Digital Certificate
Question: _______is the third party who issues the Digital Certificates.
a) Certification Authority
b) Certification Owner
c) Certification holder
d) Certification key
Answer: Certification Authority
CBSE Class 12 Computer Science Cascading Style Sheets and JavaScript MCQs |
CBSE Class 12 Computer Science Classes and Objects In Java MCQs Set A |
CBSE Class 12 Computer Science Classes and Objects In Java MCQs Set B |
CBSE Class 12 Computer Science Creating HTML Forms Using KompoZer MCQs Set A |
CBSE Class 12 Computer Science Creating HTML Forms Using KompoZer MCQs Set B |
CBSE Class 12 Computer Science Designing Simple Website Using Kompozer MCQs |
CBSE Class 12 Computer Science Exception Handling In Java MCQs |
CBSE Class 12 Computer Science File Handling MCQs Set A |
CBSE Class 12 Computer Science File Handling MCQs Set B |
CBSE Class 12 Computer Science File System MCQs Set A |
CBSE Class 12 Computer Science File System MCQs Set B |
CBSE Class 12 Computer Science Introduction To E Commerce MCQs |
CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set A |
CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B |
CBSE Class 12 Computer Science Java Basics MCQs Set A |
CBSE Class 12 Computer Science Java Basics MCQs Set B |
CBSE Class 12 Computer Science Object Oriented Concepts MCQs |
More Study Material
CBSE Class 12 Computer Science Introduction To M Commerce MCQs
We hope students liked the above MCQs for Introduction To M Commerce designed as per the latest syllabus for Class 12 Computer Science released by CBSE. Students of Class 12 should download the Multiple Choice Questions and Answers in Pdf format and practice the questions and solutions given in above Class 12 Computer Science MCQs Questions on daily basis. All latest MCQs with answers have been developed for Computer Science by referring to the most important and regularly asked topics which the students should learn and practice to get better score in school tests and examinations. Studiestoday is the best portal for Class 12 students to get all latest study material free of cost.
MCQs for Computer Science CBSE Class 12 Introduction To M Commerce
Expert teachers of studiestoday have referred to NCERT book for Class 12 Computer Science to develop the Computer Science Class 12 MCQs. If you download MCQs with answers for the above chapter daily, you will get higher and better marks in Class 12 test and exams in the current year as you will be able to have stronger understanding of all concepts. Daily Multiple Choice Questions practice of Computer Science and its study material will help students to have stronger understanding of all concepts and also make them expert on all critical topics. You can easily download and save all MCQs for Class 12 Computer Science also from www.studiestoday.com without paying anything in Pdf format. After solving the questions given in the MCQs which have been developed as per latest course books also refer to the NCERT solutions for Class 12 Computer Science designed by our teachers
Introduction To M Commerce MCQs Computer Science CBSE Class 12
All MCQs given above for Class 12 Computer Science have been made as per the latest syllabus and books issued for the current academic year. The students of Class 12 can refer to the answers which have been also provided by our teachers for all MCQs of Computer Science so that you are able to solve the questions and then compare your answers with the solutions provided by us. We have also provided lot of MCQ questions for Class 12 Computer Science so that you can solve questions relating to all topics given in each chapter. All study material for Class 12 Computer Science students have been given on studiestoday.
Introduction To M Commerce CBSE Class 12 MCQs Computer Science
Regular MCQs practice helps to gain more practice in solving questions to obtain a more comprehensive understanding of Introduction To M Commerce concepts. MCQs play an important role in developing understanding of Introduction To M Commerce in CBSE Class 12. Students can download and save or print all the MCQs, printable assignments, practice sheets of the above chapter in Class 12 Computer Science in Pdf format from studiestoday. You can print or read them online on your computer or mobile or any other device. After solving these you should also refer to Class 12 Computer Science MCQ Test for the same chapter
CBSE MCQs Computer Science Class 12 Introduction To M Commerce
CBSE Class 12 Computer Science best textbooks have been used for writing the problems given in the above MCQs. If you have tests coming up then you should revise all concepts relating to Introduction To M Commerce and then take out print of the above MCQs and attempt all problems. We have also provided a lot of other MCQs for Class 12 Computer Science which you can use to further make yourself better in Computer Science
You can download the CBSE MCQs for Class 12 Computer Science Introduction To M Commerce for latest session from StudiesToday.com
Yes, you can click on the links above and download topic wise MCQs Questions PDFs for Introduction To M Commerce Class 12 for Computer Science
Yes, the MCQs issued by CBSE for Class 12 Computer Science Introduction To M Commerce have been made available here for latest academic session
You can easily access the links above and download the Introduction To M Commerce Class 12 MCQs Computer Science for each topic
There is no charge for the MCQs and their answers for Class 12 CBSE Computer Science Introduction To M Commerce you can download everything free
Regular revision of MCQs given on studiestoday for Class 12 subject Computer Science Introduction To M Commerce can help you to score better marks in exams
Multiple Choice Questions (MCQs) for Introduction To M Commerce Class 12 Computer Science are objective-based questions which provide multiple answer options, and students are required to choose the correct answer from the given choices.