CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B

Refer to CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B provided below available for download in Pdf. The MCQ Questions for Class 12 Computer Science with answers are aligned as per the latest syllabus and exam pattern suggested by CBSE, NCERT and KVS. Multiple Choice Questions for Introduction To M Commerce are an important part of exams for Class 12 Computer Science and if practiced properly can help you to improve your understanding and get higher marks. Refer to more Chapter-wise MCQs for CBSE Class 12 Computer Science and also download more latest study material for all subjects

MCQ for Class 12 Computer Science Introduction To M Commerce

Class 12 Computer Science students should refer to the following multiple-choice questions with answers for Introduction To M Commerce in Class 12.

Introduction To M Commerce MCQ Questions Class 12 Computer Science with Answers

 

Question: The transmissions in the process of online purchase occur on the public network, called the_____

a) Server

b) Internet

c) Website

d) Desktop PC

Answer: Internet

 

Question: A______can steal or tamper information anywhere in the world via his computer.

a) Friend

b) Acquaintance

c) Server

d) Intruder

Answer: Intruder

 

Question: Anybody can create new programs and run them on remote computers causing it to_____

a) Improve

b) Malfunction

c) Break down

d) Recover

Answer: Malfunction

 

Question: All the E-commerce / M-commerce websites have to keep their customer's personal data very_____

a) Safe

b) Unsafe

c) Insecurely

d) Risky

Answer: Safe

 

Question: All the E-commerce / M-commerce websites have a lot of_____issues.

a) Defense

b) Safety

c) Security

d) Attack

Answer: Security

 

Question: Which of the following does E-commerce deals with ?

a) Online Banking

b) Electronic transactions

c) Using debit / credit cards

d) All of these

Answer: All of these

 

Question: The E-commerce / M-commerce websites have more risk of being targeted by____than the normal websites.

a) Friends

b) Acquaintances

c) Servers

d) Intruders

Answer: Acquaintances

 

Question: The E-commerce / M-commerce security must meet_____important aspects.

a) Two

b) Four

c) Six

d) Eight

Answer: Two

 

Question: ______refers to the secrecy of the information so that unauthorized user cannot read the personal information.

a) Confidentiality

b) Secrecy

c) Unauthorized user

d) Intruders

Answer: Confidentiality

 

Question: _______protects the data from private attacks and ensures that the message is not revealed or leaked.

a) Decrypting

b) Cryptography

c) Encryption

d) All of these

Answer: Cryptography

 

Question: helps in protecting the confidential data like credit card number.

a) Decrypting

b) Cryptography

c) Encryption

d) All of these

Answer: Cryptography

 

Question: Confidentiality is achieved by using_____in which all messages transmitted are encrypted.

a) Decrypting

b) Coding

c) Cryptography

d) Encryption

Answer: Cryptography

 

Question: _____ensures that the information must not accidentally or maliciously altered or tampered in transit.

a) Confidentiality

b) Authorization

c) Non-repudiation

d) Integrity

Answer: Integrity

 

Question: ______ensures that only authentic users are allowed to use the system.

a) Confidentiality

b) Authorization

c) Non-repudiation

d) Integrity

Answer: Integrity

 

Question: ______ensures that the sender of the message cannot deny that he/she has sent the message.

a) Confidentiality

b) Authorization

c) Non-repudiation

d) Integrity

Answer: Non-repudiation

 

Question: Non-repudiation is usually accomplished via digital____

a) Signatures

b) Partners

c) Messages

d) Security

Answer: Signatures

 

Question: Full form of TTP is____

a) Trusted Third Party

b) Trustworthy Third Person

c) Trustful Third Party

d) Trustees Third Party

Answer: Trusted Third Party

 

Question: ______code is one that causes damage to a computer or system.

a) Programming

b) Unwanted

c) Malicious

d) Cruel

Answer: Malicious

 

Question: ______is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver.

a) Tapper

b) Sniffer

c) Recorder

d) Router

Answer: Sniffer

 

Question: ______programs can read e-mail messages, user login, password and credit card numbers.

a) Tapper

b) Sniffer

c) Recorder

d) Router

Answer: Sniffer

 

Question: ______attack is an attack used to shut down a machine or network, making it inaccessible to its intended users.

a) Denial-of-Service

b) Targeting

c) Connection

d) Vandalism

Answer: Denial-of-Service

 

Question: _____is the electronic defacing of an existing website page.

a) Denial-of-Service

b) Sniffing

c) Cyber Vandalism

d) Spoofing

Answer: Cyber Vandalism

 

Question: ______is pretending to be someone you are not, or representing a website as authentic when it is actually a fake.

a) Denial-of-Service

b) Sniffing

c) Cyber Vandalism

d) Spoofing

Answer: Spoofing

 

Question: A website attacker can create a fake website and substitute his______address for the real website address.

a) IP

b) DOS

c) TCP

d) TTP

Answer: IP

 

Question: ________software is a computer program that detects, prevents and takes action to remove the malicious codes from the infected system.

a) Trojan

b) Worms

c) Antivirus

d) Virus

Answer: Antivirus

 

Question: _____is a type of virus.

a) Trojan

b) Trojan horses

c) Virus

d) Cyber crime

Answer: Trojan horses

 

Question: _____can delete the files and slow down the computer system.

a) Software

b) Code

c) Antivirus

d) Virus

Answer: Virus

 

Question: Once a system is infected by_____it can spread by attaching to other programs and files within the system.

a) Software

b) Code

c) Antivirus

d) Virus

Answer: Virus

 

Question: Infections on a computer system can easily spread through Internet_____

a) Downloads

b) Code

c) Programs

d) Attachment

Answer: Downloads

 

Question: The_____software scans the downloaded files and the entire computer system in order to detect the presence of an infection.

a) Software

b) Code

c) Antivirus

d) Virus

Answer: Antivirus

 

Question: _______is a device placed between the network and the Internet to monitor and control the website traffic.

a) Firewall

b) Router

c) Bus Bar

d) Computer

Answer: Firewall

 

Question: The primary goal of a_____is to keep intruders away from the company's E-commerce infrastructure.

a) Firewall

b) Router

c) BusBar

d) Computer

Answer: Firewall

 

Question: ______ensures that the company's crucial data is kept safe and not accessed by the intruders.

a) Firewall

b) Router

c) BusBar

d) Computer

Answer: Computer

 

Question: Infected_____to the emails can be in the form of pictures, videos, sound clips or any other type of file.

a) Downloads

b) Attachments

c) Programs

d) Websites

Answer: Attachments

 

Question: Which of the following is protected by a firewall ?

a) Email services

b) Undesirable material

c) Unauthorized persons

d) All of these

Answer: All of these

 

Question: A firewall_____from any type of network attack.

a) Blocks

b) Unprotect

c) Protects

d) Saves

Answer: Protects

 

Question: Digital_____are used for proving our identity in electronic transactions.

a) Certificates

b) ID

c) Both (A) and (B)

d) Authority

Answer: Both (A) and (B)

 

Question: A____is issued by a trusted third party to establish the identity of the holder.

a) Digital Certificate

b) Digital Data

c) Digital Signature

d) Digital Service

Answer: Digital Certificate

 

Question: _______is the third party who issues the Digital Certificates.

a) Certification Authority

b) Certification Owner

c) Certification holder

d) Certification key

Answer: Certification Authority

 

Question: The most commonly used network protection barrier between company's network and the outside world is a______

a) Wall

b) Firewall

c) Antivirus

d) Soft wall

Answer: Firewall

 

Question: Which of the following is contained in the Digital Certificate ?

a) Holder's name

b) Serial number

c) Expiration date

d) All of these

Answer: All of these

 

Question: A_______also holds a copy of the certificate holder's public key.

a) Digital Certificate

b) Digital answer

c) Digital Sign

d) All of these

Answer: Digital Certificate

 

Question: The holder's public key is used for______messages and digital signatures.

a) Decrypting

b) Encrypting

c) Crypted

d) None of these

Answer: Encrypting

 

Question: _____is an art of protecting the information by transforming it into an unreadable form.

a) Decryption

b) Encryption

c) Cryptography

d) All of these

Answer: Cryptography

 

Question: ______is the transformation of normal text known as "plain text" into unreadable or secret text.

a) Decryption

b) Encryption

c) Cryptography

d) All of these

Answer: Encryption

 

Question: The secret text is called the_____text.

a) Hidden

b) Plain

c) Cipher

d) Coded

Answer: Cipher

 

Question: The secret text is converted into_______text using encryption algorithm.

a) Hidden

b) Plain

c) Cipher

d) Coded

Answer: Cipher

 

Question: A______key is used to encrypt and decrypt a message.

a) Secret

b) Plain

c) Cipher

d) Coded

Answer: Secret

 

Question: Messages are______just before they are sent on the internet or network.

a) Coded

b) Encrypted

c) Ciphered

d) None of these

Answer: Encrypted

 

Question: _____is the transformation of encrypted text back into normal text.

a) Decryption

b) Encryption

c) Cryption

d) All of these

Answer: Decryption

 

Question: ______is the transformation of encrypted text back into normal text.

a) Decryption

b) Encryption

c) Cryption

d) All of these

Answer: Decryption

 

Question: The key answer to the following encryption is : SCIENCE = TDJFODF

a) Shift by 4

b) Shift by 3

c) Shift by 2

d) Shift by 1

Answer: Shift by 1

 

Question: ________protocol is used for securing web transactions on the Internet.

a) SSI

b) SSL

c) SST

d) SSR

Answer: SSL

 

Question: Full form of SSL is_______

a) Security Safe Layer

b) Safe Secure Layer

c) Secure Socket Layer

d) Socket Safe Layer

Answer: Secure Socket Layer

 

Question: Protocol SSL was developed by______

a) Netscape

b) Microsoft

c) Oracle

d) Google

Answer: Netscape

 

Question: If a website is secured, then the security logo of_______is displayed on the login screen of the secured site.

a) Sign

b) VSign

c) VerySign

d) VeriSign

Answer: VeriSign

 

Question: An indication of a secure website is that its site address starts from______

a) Tcpip://

b) http://

c) https://

d) All of these

Answer: https://

 

Question: E-commerce and M-commerce provide opportunities to improve the_______processes.

a) Business

b) Wor

c) Employment

d) Vocation

Answer: Business

 

Question: Many countries have established______framework for the electronic commerce.

a) Official

b) Legal

c) Certified

d) Verified

Answer: Legal

 

Question: Indian government has also established the_____laws under the IT act.

a) Income tax

b) Information tax

c) Information technology

d) All of these

Answer: Information technology

 

Question: Enforcement of_______rules and regulations provides confidence to the customers that their personal information remains secret and will not be misused.

a) Official

b) Business

c) Companies

d) Legal

Answer: Legal

 

Question: Companies making online business are getting legal support in case of misuse of their logos or any_____materials.

a) Copyright

b) Printed

c) Fixed

d) Secret

Answer: Copyright

 

Question: The_______property includes books, software's, music, video, copyrights, trademarks and web pages.

a) Scholar

b) Intellectual

c) Thinker

d) Intelligent

Answer: Intellectual

 

Question: _______provides the author with a tool to protect his/her original work from being used or taken by others without permission.

a) Patent

b) Rights

c) Copyright

d) The law

Answer: Copyright

 

Question: _____is applicable to books, software programs and articles.

a) Patent

b) Rights

c) Copyright

d) The law

Answer: Copyright

 

Question: Copyright law protects intellectual______in its various forms and cannot be used freely.

a) Information

b) Data

c) Assets

d) Property

Answer: Property

 

Question: It is very difficult to protect_____property in E-commerce or M-commerce.

a) Scholarly

b) Intellectual

c) Thinker

d) Intelligent

Answer: Intellectual

 

Question: Almost all web pages are protected by______

a) Patent

b) Rights

c) Copyright

d) The law

Answer: Copyright

 

Question: Copying contents from the website also violets copyright______

a) Patent

b) Rights

c) Copyright

d) The law

Answer: The law

 

Question: A_______may be designated by the symbols TM or SM.

a) Trademark

b) Copyright

c) Symbol

d) Image

Answer: Trademark

 

Question: A specific logo, word, symbol, design, phrase or image can be used as a______

a) Trademark

b) Copyright

c) Symbol

d) Image

Answer: Trademark

 

Question: The competition over domain names is a______issue.

a) Illegal

b) Legal

c) Authorized

d) Authorized

Answer: Legal

 

Question: When, the Registered Domain names which are not in use are sold, it is known as______squatting.

a) Cyber

b) Online

c) Virtual

d) Domain

Answer: Cyber

 

Question: _______is the process of hiding information within other information.

a) Concealing

b) Hiding

c) Stegangraphy

d) Masking

Answer: Stegangraphy

 

Question: _______works by replacing unused data in computer files such as images, sound or text with invisible information.

a) Concealing

b) Hiding

c) Stegangraphy

d) Masking

Answer: Stegangraphy

 

Question: There are______versions of Stegangraphy, available on Internet, which can be easily downloaded.

a) Hidden

b) Invisible

c) Shareware

d) Freeware

Answer: Freeware

 

Question: The_______is a digital code inserted into a digital image, audio or video file which can identify the file's copyright information.

a) Transparent mark

b) Invisible mark

c) Translucent mark

d) Watermark

Answer: Watermark

 

Question: The_______allows hiding information in a totally invisible manner.

a) Transparent mark

b) Invisible mark

c) Translucent mark

d) Water mark

Answer: Water mark

 

Question: Currently, the_______distribution of digital audio over the Internet in the MP3 format is a big problem.

a) Unauthorized

b) Authorized

c) Legal

d) Illegal

Answer: Unauthorized

 

Question: _______watermarking can link information on the documents.

a) Hybrid

b) Digital

c) Analog

d) Internet

Answer: Digital

 

Question: A visible digital watermark can be added to any image using photo editor tools like_____

a) GMIP

b) GPIM

c) GIMP

d) GMIP

Answer: GIMP

 

Question: _______is one of the most important aspects of E-commerce and M-commerce.

a) Payment

b) Disbursement

c) Compensation

d) Expense

Answer: Expense

 

Question: _______payments involve cash, cheque or credit card.

a) Usual

b) Traditional

c) Customary

d) Established

Answer: Traditional

 

Question: Electronic payment systems have become more important to the______business processes.

a) Traditional

b) Shopping

c) Cards

d) Online

Answer: Online

 

Question: The different types of payment systems used are_____

a) Smart cards

b) Credit cards

c) Debit cards

d) All of these

Answer: All of these

 

Question: The payment cards can be classified into______types of cards

a) One

b) Two

c) Three

d) Four

Answer: Two

 

Question: ________card payment method is one of the most popular and widely accepted methods of payment on Internet.

a) Credit

b) Debit

c) Smart

d) Payment

Answer: Credit

 

Question: A credit card is issued to the customers by the banks known as______banks.

a) Issuing

b) Online

c) Card

d) Smart

Answer: Issuing

 

Question: ________card or Visa are established and reputed financial institutions in the services of credit card business.

a) Head

b) Principal

c) Smart

d) Master

Answer: Master

 

Question: In Credit Card transactions_____parties are involved.

a) One

b) Two

c) Three

d) Four

Answer: Four

 

Question: The______bank issues the credit card and guarantees the payment to the merchant.

a) Issuing

b) Online

c) Card

d) Smart

Answer: Issuing

 

Question: The_____bank establishes the account with the merchant and validates the credit card.

a) Issuing

b) Acquiring

c) Merchant's

d) Customer's

Answer: Acquiring

 

Question: The_______bank authorizes sale based on the customer's credit card limit.

a) Issuing

b) Acquiring

c) Merchant's

d) Customer's

Answer: Acquiring

 

Question: Payment______and processors are two more entities which play a role in online payment.

a) Doorways

b) Openings

c) Gateways

d) Windows

Answer: Gateways

 

Question: Payment gateway services provided by the third party like______which connects networks of all parties involved.

a) HDFC

b) SBI

c) AXIS

d) PayPal

Answer: PayPal

 

Question: _________are data centers which perform the credit card transactions and settle funds to the merchant.

a) Doorways

b) Openings

c) Processors

d) Windows

Answer: Processors

 

Question: Processors are connected to the E-commerce website of the merchant through the payment

a) Doorways

b) Openings

c) Gateways

d) Windows

Answer: Gateways

 

Question: The online payment through credit card on Internet is divided into_____parts.

a) One

b) Two

c) Three

d) Four

Answer: Two

 

Question: Major credit card companies use the_______security system to make online transactions secure.

a) SIGN

b) VERISIGN

c) SET

d) SECURE

Answer: SET

 

Question: Full form of SET is_____

a) Secure Electronic Transfer

b) Safe Electronic Transit

c) Safe Electric Transfer

d) Secure Electric Transit

Answer: Secure Electronic Transfer

 

Question: The advantage of using Credit card is_____

a) Gives flexibility to the customer.

b) Keeps record of the customer's purchase.

c) Allows customers to purchase goods even when they do not have cash in bank.

d) All of these

Answer: All of these

 

Question: The limitation of using credit card is_______

a) They are unsuitable for very small or very large payments.

b) Customers tend to overspend using credit cards

c) Problems arise in case lost or stolen credit cards.

d) All of these

Answer: All of these

 

Question: A________looks like credit card but works by transferring fund directly from the consumer's bank.

a) Credit Card

b) Smart Card

c) Debit Card

d) Payment Card

Answer: Debit Card

 

Question: The______can keep the consumer purchases under a limit and do not allow him to exceed beyond his/her budget.

a) Credit Card

b) Smart Card

c) Debit Card

d) Payment Card

Answer: Debit Card

 

Question: also looks like a credit card but have a microchip embedded in their surface.

a) Credit Card

b) Smart Card

c) Debit Card

d) Charge Card

Answer: Smart Card

 

Question: A______contains user's private information, such as account information, health information etc.

a) Credit Card

b) Smart Card

c) Debit Card

d) Payment Card

Answer: Smart Card

 

Question: ________are popular in countries like US, Europe, Japan and some parts of Asia.

a) Debit Card

b) Credit Card

c) Charge Card

d) Smart Card

Answer: Smart Card

 

Question: A_______is another form of payment mechanism wherein the customer can pay through the card and it does not have a credit limit.

a) Debit Card

b) Credit Card

c) Charge Card

d) Smart Card

Answer: Charge Card

 

Question: _______does not involve any type of card for online transaction.

a) Net-Banking

b) Credit-Card

c) Smart-Banking

d) All of these

Answer: Net-Banking

 

Question: means transferring money from one bank to another electronically.

a) Net-Banking

b) EFT

c) ATM

d) Net-Transaction

Answer: EFT

 

Question: Full form of EFT is______

a) Electronic Funds Transfer.

b) Electronic Finance Transfer

c) Electronic Funds Transaction.

d) None of these

Answer: Electronic Funds Transfer.

 

Question: is an electronic card for making secure online payments towards a merchant.

a) E-Wallet

b) M-Wallet

c) L-Wallet

d) Card-Wallet

Answer: E-Wallet

 

Question: The term______is coined from two terms Rupee and Payment.

a) RupeeP

b) RuPay

c) Rupees Payment

d) None of these

Answer: RuPay

 

Question: is a new card payment mechanism launched by NPCI.

a) RupeeP

b) RuPay

c) Rupees Payment

d) None of these

Answer: RuPay

 

Question: Full form of NPCI is_______

a) Nation's Payment Cost of India

b) National Payments Company of India.

c) National Payments Corporation of India.

d) Nationalized Payments Corporation of India.

Answer: National Payments Corporation of India.

 

Question: Anybody can create new programs and run them on remote computers causing it to_____

a) Improve

b) Malfunction

c) Break down

d) Recover

Answer: Malfunction

 

Question: A firewall______from any type of network attack.

a) Blocks

b) Unprotect

c) Protects

d) Saves

Answer: Protects

 

Question: Digital_____are used for proving our identity in electronic transactions.

a) Certificates

b) ID

c) Both (A) and (B)

d) Authority

Answer: Both (A) and (B)

 

Question: A_____is issued by a trusted third party to establish the identity of the holder.

a) Digital Certificate

b) Digital Data

c) Digital Signature

d) Digital Service

Answer: Digital Certificate

 

Question: _______is the third party who issues the Digital Certificates.

a) Certification Authority

b) Certification Owner

c) Certification holder

d) Certification key

Answer: Certification Authority

MCQs for Introduction To M Commerce Computer Science Class 12

Expert teachers of studiestoday have referred to NCERT book for Class 12 Computer Science to develop the Computer Science Class 12 MCQs. If you download MCQs with answers for the above chapter you will get higher and better marks in Class 12 test and exams in the current year as you will be able to have stronger understanding of all concepts. Daily Multiple Choice Questions practice of Computer Science will help students to have stronger understanding of all concepts and also make them expert on all critical topics. After solving the questions given in the MCQs which have been developed as per latest books also refer to the NCERT solutions for Class 12 Computer Science. We have also provided lot of MCQ questions for Class 12 Computer Science so that you can solve questions relating to all topics given in each chapter. After solving these you should also refer to Class 12 Computer Science MCQ Test for the same chapter.

Where can I download latest CBSE MCQs for Class 12 Computer Science Introduction To M Commerce

You can download the CBSE MCQs for Class 12 Computer Science Introduction To M Commerce for latest session from StudiesToday.com

Are the Class 12 Computer Science Introduction To M Commerce MCQs available for the latest session

Yes, the MCQs issued by CBSE for Class 12 Computer Science Introduction To M Commerce have been made available here for latest academic session

Where can I find CBSE Class 12 Computer Science Introduction To M Commerce MCQs online?

You can find CBSE Class 12 Computer Science Introduction To M Commerce MCQs on educational websites like studiestoday.com, online tutoring platforms, and in sample question papers provided on this website.

How can I prepare for Introduction To M Commerce Class 12 MCQs?

To prepare for Introduction To M Commerce MCQs, refer to the concepts links provided by our teachers and download sample papers for free.

Are there any online resources for CBSE Class 12 Computer Science Introduction To M Commerce?

Yes, there are many online resources that we have provided on studiestoday.com available such as practice worksheets, question papers, and online tests for learning MCQs for Class 12 Computer Science Introduction To M Commerce