Refer to CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B provided below available for download in Pdf. The MCQ Questions for Class 12 Computer Science with answers are aligned as per the latest syllabus and exam pattern suggested by CBSE, NCERT and KVS. Multiple Choice Questions for Introduction To M Commerce are an important part of exams for Class 12 Computer Science and if practiced properly can help you to improve your understanding and get higher marks. Refer to more Chapter-wise MCQs for CBSE Class 12 Computer Science and also download more latest study material for all subjects
MCQ for Class 12 Computer Science Introduction To M Commerce
Class 12 Computer Science students should refer to the following multiple-choice questions with answers for Introduction To M Commerce in Class 12.
Introduction To M Commerce MCQ Questions Class 12 Computer Science with Answers
Question: The transmissions in the process of online purchase occur on the public network, called the_____
a) Server
b) Internet
c) Website
d) Desktop PC
Answer: Internet
Question: A______can steal or tamper information anywhere in the world via his computer.
a) Friend
b) Acquaintance
c) Server
d) Intruder
Answer: Intruder
Question: Anybody can create new programs and run them on remote computers causing it to_____
a) Improve
b) Malfunction
c) Break down
d) Recover
Answer: Malfunction
Question: All the E-commerce / M-commerce websites have to keep their customer's personal data very_____
a) Safe
b) Unsafe
c) Insecurely
d) Risky
Answer: Safe
Question: All the E-commerce / M-commerce websites have a lot of_____issues.
a) Defense
b) Safety
c) Security
d) Attack
Answer: Security
Question: Which of the following does E-commerce deals with ?
a) Online Banking
b) Electronic transactions
c) Using debit / credit cards
d) All of these
Answer: All of these
Question: The E-commerce / M-commerce websites have more risk of being targeted by____than the normal websites.
a) Friends
b) Acquaintances
c) Servers
d) Intruders
Answer: Acquaintances
Question: The E-commerce / M-commerce security must meet_____important aspects.
a) Two
b) Four
c) Six
d) Eight
Answer: Two
Question: ______refers to the secrecy of the information so that unauthorized user cannot read the personal information.
a) Confidentiality
b) Secrecy
c) Unauthorized user
d) Intruders
Answer: Confidentiality
Question: _______protects the data from private attacks and ensures that the message is not revealed or leaked.
a) Decrypting
b) Cryptography
c) Encryption
d) All of these
Answer: Cryptography
Question: helps in protecting the confidential data like credit card number.
a) Decrypting
b) Cryptography
c) Encryption
d) All of these
Answer: Cryptography
Question: Confidentiality is achieved by using_____in which all messages transmitted are encrypted.
a) Decrypting
b) Coding
c) Cryptography
d) Encryption
Answer: Cryptography
Question: _____ensures that the information must not accidentally or maliciously altered or tampered in transit.
a) Confidentiality
b) Authorization
c) Non-repudiation
d) Integrity
Answer: Integrity
Question: ______ensures that only authentic users are allowed to use the system.
a) Confidentiality
b) Authorization
c) Non-repudiation
d) Integrity
Answer: Integrity
Question: ______ensures that the sender of the message cannot deny that he/she has sent the message.
a) Confidentiality
b) Authorization
c) Non-repudiation
d) Integrity
Answer: Non-repudiation
Question: Non-repudiation is usually accomplished via digital____
a) Signatures
b) Partners
c) Messages
d) Security
Answer: Signatures
Question: Full form of TTP is____
a) Trusted Third Party
b) Trustworthy Third Person
c) Trustful Third Party
d) Trustees Third Party
Answer: Trusted Third Party
Question: ______code is one that causes damage to a computer or system.
a) Programming
b) Unwanted
c) Malicious
d) Cruel
Answer: Malicious
Question: ______is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver.
a) Tapper
b) Sniffer
c) Recorder
d) Router
Answer: Sniffer
Question: ______programs can read e-mail messages, user login, password and credit card numbers.
a) Tapper
b) Sniffer
c) Recorder
d) Router
Answer: Sniffer
Question: ______attack is an attack used to shut down a machine or network, making it inaccessible to its intended users.
a) Denial-of-Service
b) Targeting
c) Connection
d) Vandalism
Answer: Denial-of-Service
Question: _____is the electronic defacing of an existing website page.
a) Denial-of-Service
b) Sniffing
c) Cyber Vandalism
d) Spoofing
Answer: Cyber Vandalism
Question: ______is pretending to be someone you are not, or representing a website as authentic when it is actually a fake.
a) Denial-of-Service
b) Sniffing
c) Cyber Vandalism
d) Spoofing
Answer: Spoofing
Question: A website attacker can create a fake website and substitute his______address for the real website address.
a) IP
b) DOS
c) TCP
d) TTP
Answer: IP
Question: ________software is a computer program that detects, prevents and takes action to remove the malicious codes from the infected system.
a) Trojan
b) Worms
c) Antivirus
d) Virus
Answer: Antivirus
Question: _____is a type of virus.
a) Trojan
b) Trojan horses
c) Virus
d) Cyber crime
Answer: Trojan horses
Question: _____can delete the files and slow down the computer system.
a) Software
b) Code
c) Antivirus
d) Virus
Answer: Virus
Question: Once a system is infected by_____it can spread by attaching to other programs and files within the system.
a) Software
b) Code
c) Antivirus
d) Virus
Answer: Virus
Question: Infections on a computer system can easily spread through Internet_____
a) Downloads
b) Code
c) Programs
d) Attachment
Answer: Downloads
Question: The_____software scans the downloaded files and the entire computer system in order to detect the presence of an infection.
a) Software
b) Code
c) Antivirus
d) Virus
Answer: Antivirus
Question: _______is a device placed between the network and the Internet to monitor and control the website traffic.
a) Firewall
b) Router
c) Bus Bar
d) Computer
Answer: Firewall
Question: The primary goal of a_____is to keep intruders away from the company's E-commerce infrastructure.
a) Firewall
b) Router
c) BusBar
d) Computer
Answer: Firewall
Question: ______ensures that the company's crucial data is kept safe and not accessed by the intruders.
a) Firewall
b) Router
c) BusBar
d) Computer
Answer: Computer
Question: Infected_____to the emails can be in the form of pictures, videos, sound clips or any other type of file.
a) Downloads
b) Attachments
c) Programs
d) Websites
Answer: Attachments
Question: Which of the following is protected by a firewall ?
a) Email services
b) Undesirable material
c) Unauthorized persons
d) All of these
Answer: All of these
Question: A firewall_____from any type of network attack.
a) Blocks
b) Unprotect
c) Protects
d) Saves
Answer: Protects
Question: Digital_____are used for proving our identity in electronic transactions.
a) Certificates
b) ID
c) Both (A) and (B)
d) Authority
Answer: Both (A) and (B)
Question: A____is issued by a trusted third party to establish the identity of the holder.
a) Digital Certificate
b) Digital Data
c) Digital Signature
d) Digital Service
Answer: Digital Certificate
Question: _______is the third party who issues the Digital Certificates.
a) Certification Authority
b) Certification Owner
c) Certification holder
d) Certification key
Answer: Certification Authority
Question: The most commonly used network protection barrier between company's network and the outside world is a______
a) Wall
b) Firewall
c) Antivirus
d) Soft wall
Answer: Firewall
Question: Which of the following is contained in the Digital Certificate ?
a) Holder's name
b) Serial number
c) Expiration date
d) All of these
Answer: All of these
Question: A_______also holds a copy of the certificate holder's public key.
a) Digital Certificate
b) Digital answer
c) Digital Sign
d) All of these
Answer: Digital Certificate
Question: The holder's public key is used for______messages and digital signatures.
a) Decrypting
b) Encrypting
c) Crypted
d) None of these
Answer: Encrypting
Question: _____is an art of protecting the information by transforming it into an unreadable form.
a) Decryption
b) Encryption
c) Cryptography
d) All of these
Answer: Cryptography
Question: ______is the transformation of normal text known as "plain text" into unreadable or secret text.
a) Decryption
b) Encryption
c) Cryptography
d) All of these
Answer: Encryption
Question: The secret text is called the_____text.
a) Hidden
b) Plain
c) Cipher
d) Coded
Answer: Cipher
Question: The secret text is converted into_______text using encryption algorithm.
a) Hidden
b) Plain
c) Cipher
d) Coded
Answer: Cipher
Question: A______key is used to encrypt and decrypt a message.
a) Secret
b) Plain
c) Cipher
d) Coded
Answer: Secret
Question: Messages are______just before they are sent on the internet or network.
a) Coded
b) Encrypted
c) Ciphered
d) None of these
Answer: Encrypted
Question: _____is the transformation of encrypted text back into normal text.
a) Decryption
b) Encryption
c) Cryption
d) All of these
Answer: Decryption
Question: ______is the transformation of encrypted text back into normal text.
a) Decryption
b) Encryption
c) Cryption
d) All of these
Answer: Decryption
Question: The key answer to the following encryption is : SCIENCE = TDJFODF
a) Shift by 4
b) Shift by 3
c) Shift by 2
d) Shift by 1
Answer: Shift by 1
Question: ________protocol is used for securing web transactions on the Internet.
a) SSI
b) SSL
c) SST
d) SSR
Answer: SSL
Question: Full form of SSL is_______
a) Security Safe Layer
b) Safe Secure Layer
c) Secure Socket Layer
d) Socket Safe Layer
Answer: Secure Socket Layer
Question: Protocol SSL was developed by______
a) Netscape
b) Microsoft
c) Oracle
d) Google
Answer: Netscape
Question: If a website is secured, then the security logo of_______is displayed on the login screen of the secured site.
a) Sign
b) VSign
c) VerySign
d) VeriSign
Answer: VeriSign
Question: An indication of a secure website is that its site address starts from______
a) Tcpip://
b) http://
c) https://
d) All of these
Answer: https://
Question: E-commerce and M-commerce provide opportunities to improve the_______processes.
a) Business
b) Wor
c) Employment
d) Vocation
Answer: Business
Question: Many countries have established______framework for the electronic commerce.
a) Official
b) Legal
c) Certified
d) Verified
Answer: Legal
Question: Indian government has also established the_____laws under the IT act.
a) Income tax
b) Information tax
c) Information technology
d) All of these
Answer: Information technology
Question: Enforcement of_______rules and regulations provides confidence to the customers that their personal information remains secret and will not be misused.
a) Official
b) Business
c) Companies
d) Legal
Answer: Legal
Question: Companies making online business are getting legal support in case of misuse of their logos or any_____materials.
a) Copyright
b) Printed
c) Fixed
d) Secret
Answer: Copyright
Question: The_______property includes books, software's, music, video, copyrights, trademarks and web pages.
a) Scholar
b) Intellectual
c) Thinker
d) Intelligent
Answer: Intellectual
Question: _______provides the author with a tool to protect his/her original work from being used or taken by others without permission.
a) Patent
b) Rights
c) Copyright
d) The law
Answer: Copyright
Question: _____is applicable to books, software programs and articles.
a) Patent
b) Rights
c) Copyright
d) The law
Answer: Copyright
Question: Copyright law protects intellectual______in its various forms and cannot be used freely.
a) Information
b) Data
c) Assets
d) Property
Answer: Property
Question: It is very difficult to protect_____property in E-commerce or M-commerce.
a) Scholarly
b) Intellectual
c) Thinker
d) Intelligent
Answer: Intellectual
Question: Almost all web pages are protected by______
a) Patent
b) Rights
c) Copyright
d) The law
Answer: Copyright
Question: Copying contents from the website also violets copyright______
a) Patent
b) Rights
c) Copyright
d) The law
Answer: The law
Question: A_______may be designated by the symbols TM or SM.
a) Trademark
b) Copyright
c) Symbol
d) Image
Answer: Trademark
Question: A specific logo, word, symbol, design, phrase or image can be used as a______
a) Trademark
b) Copyright
c) Symbol
d) Image
Answer: Trademark
Question: The competition over domain names is a______issue.
a) Illegal
b) Legal
c) Authorized
d) Authorized
Answer: Legal
Question: When, the Registered Domain names which are not in use are sold, it is known as______squatting.
a) Cyber
b) Online
c) Virtual
d) Domain
Answer: Cyber
Question: _______is the process of hiding information within other information.
a) Concealing
b) Hiding
c) Stegangraphy
d) Masking
Answer: Stegangraphy
Question: _______works by replacing unused data in computer files such as images, sound or text with invisible information.
a) Concealing
b) Hiding
c) Stegangraphy
d) Masking
Answer: Stegangraphy
Question: There are______versions of Stegangraphy, available on Internet, which can be easily downloaded.
a) Hidden
b) Invisible
c) Shareware
d) Freeware
Answer: Freeware
Question: The_______is a digital code inserted into a digital image, audio or video file which can identify the file's copyright information.
a) Transparent mark
b) Invisible mark
c) Translucent mark
d) Watermark
Answer: Watermark
Question: The_______allows hiding information in a totally invisible manner.
a) Transparent mark
b) Invisible mark
c) Translucent mark
d) Water mark
Answer: Water mark
Question: Currently, the_______distribution of digital audio over the Internet in the MP3 format is a big problem.
a) Unauthorized
b) Authorized
c) Legal
d) Illegal
Answer: Unauthorized
Question: _______watermarking can link information on the documents.
a) Hybrid
b) Digital
c) Analog
d) Internet
Answer: Digital
Question: A visible digital watermark can be added to any image using photo editor tools like_____
a) GMIP
b) GPIM
c) GIMP
d) GMIP
Answer: GIMP
Question: _______is one of the most important aspects of E-commerce and M-commerce.
a) Payment
b) Disbursement
c) Compensation
d) Expense
Answer: Expense
Question: _______payments involve cash, cheque or credit card.
a) Usual
b) Traditional
c) Customary
d) Established
Answer: Traditional
Question: Electronic payment systems have become more important to the______business processes.
a) Traditional
b) Shopping
c) Cards
d) Online
Answer: Online
Question: The different types of payment systems used are_____
a) Smart cards
b) Credit cards
c) Debit cards
d) All of these
Answer: All of these
Question: The payment cards can be classified into______types of cards
a) One
b) Two
c) Three
d) Four
Answer: Two
Question: ________card payment method is one of the most popular and widely accepted methods of payment on Internet.
a) Credit
b) Debit
c) Smart
d) Payment
Answer: Credit
Question: A credit card is issued to the customers by the banks known as______banks.
a) Issuing
b) Online
c) Card
d) Smart
Answer: Issuing
Question: ________card or Visa are established and reputed financial institutions in the services of credit card business.
a) Head
b) Principal
c) Smart
d) Master
Answer: Master
Question: In Credit Card transactions_____parties are involved.
a) One
b) Two
c) Three
d) Four
Answer: Four
Question: The______bank issues the credit card and guarantees the payment to the merchant.
a) Issuing
b) Online
c) Card
d) Smart
Answer: Issuing
Question: The_____bank establishes the account with the merchant and validates the credit card.
a) Issuing
b) Acquiring
c) Merchant's
d) Customer's
Answer: Acquiring
Question: The_______bank authorizes sale based on the customer's credit card limit.
a) Issuing
b) Acquiring
c) Merchant's
d) Customer's
Answer: Acquiring
Question: Payment______and processors are two more entities which play a role in online payment.
a) Doorways
b) Openings
c) Gateways
d) Windows
Answer: Gateways
Question: Payment gateway services provided by the third party like______which connects networks of all parties involved.
a) HDFC
b) SBI
c) AXIS
d) PayPal
Answer: PayPal
Question: _________are data centers which perform the credit card transactions and settle funds to the merchant.
a) Doorways
b) Openings
c) Processors
d) Windows
Answer: Processors
Question: Processors are connected to the E-commerce website of the merchant through the payment
a) Doorways
b) Openings
c) Gateways
d) Windows
Answer: Gateways
Question: The online payment through credit card on Internet is divided into_____parts.
a) One
b) Two
c) Three
d) Four
Answer: Two
Question: Major credit card companies use the_______security system to make online transactions secure.
a) SIGN
b) VERISIGN
c) SET
d) SECURE
Answer: SET
Question: Full form of SET is_____
a) Secure Electronic Transfer
b) Safe Electronic Transit
c) Safe Electric Transfer
d) Secure Electric Transit
Answer: Secure Electronic Transfer
Question: The advantage of using Credit card is_____
a) Gives flexibility to the customer.
b) Keeps record of the customer's purchase.
c) Allows customers to purchase goods even when they do not have cash in bank.
d) All of these
Answer: All of these
Question: The limitation of using credit card is_______
a) They are unsuitable for very small or very large payments.
b) Customers tend to overspend using credit cards
c) Problems arise in case lost or stolen credit cards.
d) All of these
Answer: All of these
Question: A________looks like credit card but works by transferring fund directly from the consumer's bank.
a) Credit Card
b) Smart Card
c) Debit Card
d) Payment Card
Answer: Debit Card
Question: The______can keep the consumer purchases under a limit and do not allow him to exceed beyond his/her budget.
a) Credit Card
b) Smart Card
c) Debit Card
d) Payment Card
Answer: Debit Card
Question: also looks like a credit card but have a microchip embedded in their surface.
a) Credit Card
b) Smart Card
c) Debit Card
d) Charge Card
Answer: Smart Card
Question: A______contains user's private information, such as account information, health information etc.
a) Credit Card
b) Smart Card
c) Debit Card
d) Payment Card
Answer: Smart Card
Question: ________are popular in countries like US, Europe, Japan and some parts of Asia.
a) Debit Card
b) Credit Card
c) Charge Card
d) Smart Card
Answer: Smart Card
Question: A_______is another form of payment mechanism wherein the customer can pay through the card and it does not have a credit limit.
a) Debit Card
b) Credit Card
c) Charge Card
d) Smart Card
Answer: Charge Card
Question: _______does not involve any type of card for online transaction.
a) Net-Banking
b) Credit-Card
c) Smart-Banking
d) All of these
Answer: Net-Banking
Question: means transferring money from one bank to another electronically.
a) Net-Banking
b) EFT
c) ATM
d) Net-Transaction
Answer: EFT
Question: Full form of EFT is______
a) Electronic Funds Transfer.
b) Electronic Finance Transfer
c) Electronic Funds Transaction.
d) None of these
Answer: Electronic Funds Transfer.
Question: is an electronic card for making secure online payments towards a merchant.
a) E-Wallet
b) M-Wallet
c) L-Wallet
d) Card-Wallet
Answer: E-Wallet
Question: The term______is coined from two terms Rupee and Payment.
a) RupeeP
b) RuPay
c) Rupees Payment
d) None of these
Answer: RuPay
Question: is a new card payment mechanism launched by NPCI.
a) RupeeP
b) RuPay
c) Rupees Payment
d) None of these
Answer: RuPay
Question: Full form of NPCI is_______
a) Nation's Payment Cost of India
b) National Payments Company of India.
c) National Payments Corporation of India.
d) Nationalized Payments Corporation of India.
Answer: National Payments Corporation of India.
Question: Anybody can create new programs and run them on remote computers causing it to_____
a) Improve
b) Malfunction
c) Break down
d) Recover
Answer: Malfunction
Question: A firewall______from any type of network attack.
a) Blocks
b) Unprotect
c) Protects
d) Saves
Answer: Protects
Question: Digital_____are used for proving our identity in electronic transactions.
a) Certificates
b) ID
c) Both (A) and (B)
d) Authority
Answer: Both (A) and (B)
Question: A_____is issued by a trusted third party to establish the identity of the holder.
a) Digital Certificate
b) Digital Data
c) Digital Signature
d) Digital Service
Answer: Digital Certificate
Question: _______is the third party who issues the Digital Certificates.
a) Certification Authority
b) Certification Owner
c) Certification holder
d) Certification key
Answer: Certification Authority
CBSE Class 12 Computer Science Cascading Style Sheets and JavaScript MCQs |
CBSE Class 12 Computer Science Classes and Objects In Java MCQs Set A |
CBSE Class 12 Computer Science Classes and Objects In Java MCQs Set B |
CBSE Class 12 Computer Science Computer Hardware MCQs |
CBSE Class 12 Computer Science Creating HTML Forms Using KompoZer MCQs Set A |
CBSE Class 12 Computer Science Creating HTML Forms Using KompoZer MCQs Set B |
CBSE Class 12 Computer Science Data Structure MCQs |
CBSE Class 12 Computer Science Database Management System MCQs |
CBSE Class 12 Computer Science Designing Simple Website Using Kompozer MCQs |
CBSE Class 12 Computer Science Exception Handling In Java MCQs |
CBSE Class 12 Computer Science File Handling MCQs Set A |
CBSE Class 12 Computer Science File Handling MCQs Set B |
CBSE Class 12 Computer Science File System MCQs Set A |
CBSE Class 12 Computer Science File System MCQs Set B |
CBSE Class 12 Computer Science Flow of control conditional statements MCQs |
CBSE Class 12 Computer Science For Loop in Python MCQs |
CBSE Class 12 Computer Science Fundamentals of Computer MCQs |
CBSE Class 12 Computer Science Introduction To E Commerce MCQs |
CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set A |
CBSE Class 12 Computer Science Introduction To M Commerce MCQs Set B |
CBSE Class 12 Computer Science Java Basics MCQs Set A |
CBSE Class 12 Computer Science Java Basics MCQs Set B |
CBSE Class 12 Computer Science Object Oriented Concepts MCQs |
CBSE Class 12 Computer Science Publishing Documents Using Latex MCQs Set A |
CBSE Class 12 Computer Science Publishing Documents Using Latex MCQs Set B |
CBSE Class 12 Computer Science Working with Function in Python MCQs |
MCQs for Introduction To M Commerce Computer Science Class 12
Expert teachers of studiestoday have referred to NCERT book for Class 12 Computer Science to develop the Computer Science Class 12 MCQs. If you download MCQs with answers for the above chapter you will get higher and better marks in Class 12 test and exams in the current year as you will be able to have stronger understanding of all concepts. Daily Multiple Choice Questions practice of Computer Science will help students to have stronger understanding of all concepts and also make them expert on all critical topics. After solving the questions given in the MCQs which have been developed as per latest books also refer to the NCERT solutions for Class 12 Computer Science. We have also provided lot of MCQ questions for Class 12 Computer Science so that you can solve questions relating to all topics given in each chapter. After solving these you should also refer to Class 12 Computer Science MCQ Test for the same chapter.
You can download the CBSE MCQs for Class 12 Computer Science Introduction To M Commerce for latest session from StudiesToday.com
Yes, the MCQs issued by CBSE for Class 12 Computer Science Introduction To M Commerce have been made available here for latest academic session
You can find CBSE Class 12 Computer Science Introduction To M Commerce MCQs on educational websites like studiestoday.com, online tutoring platforms, and in sample question papers provided on this website.
To prepare for Introduction To M Commerce MCQs, refer to the concepts links provided by our teachers and download sample papers for free.
Yes, there are many online resources that we have provided on studiestoday.com available such as practice worksheets, question papers, and online tests for learning MCQs for Class 12 Computer Science Introduction To M Commerce