12th Computer Applications - Book Back Answers - Chapter 17 - English Medium Guides

 




 


    Plus Two / 12th Computer Applications - Book Back Answers - Chapter 17 - English Medium

    Tamil Nadu Board 12th Standard Computer Applications - Chapter 17: Book Back Answers and Solutions

        This post covers the book back answers and solutions for Chapter 17 from the Tamil Nadu State Board 12th Standard Computer Applications textbook. These detailed answers have been carefully prepared by our expert teachers at KalviTips.com.

        We have explained each answer in a simple, easy-to-understand format, highlighting important points step by step under the relevant subtopics. Students are advised to read and memorize these subtopics thoroughly. Once you understand the main concepts, you’ll be able to connect other related points with real-life examples and confidently present them in your tests and exams.

        By going through this material, you’ll gain a strong understanding of Chapter 17 along with the corresponding book back questions and answers (PDF format).

    Question Types Covered:

    • 1 Mark Questions: Choose the correct answer, Fill in the blanks, Identify the correct statement, Match the following 
    • 2 Mark Questions: Answer briefly 
    • 3, 4, and 5 Mark Questions: Answer in detail
    All answers are presented in a clear and student-friendly manner, focusing on key points to help you score full marks.
    All the best, Class 12 students! Prepare well and aim for top scores. Thank you!

    Chapter 17: E-Commerce Security Systems

    I. Choose the correct answer.

    1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
    a) Friendly fraud
    b) Clean fraud
    c) Triangulation fraud
    d) Cyber squatting
    Answer Key:
    b) Clean fraud

    2. Which of the following is not a security element involved in E-Commerce?
    a) Authenticity
    b) Confidentiality
    c) Fishing
    d) Privacy
    Answer Key:
    c) Fishing

    3. Asymmetric encryption use ___________ keys for encryption and decryption
    a) Same
    b) Different
    c) Positive
    d) Negative
    Answer Key:
    b) Different

    4. The security authentication technology includeS
    i) Digital Signatures
    ii) Digital Currency
    iii) Digital Image
    iv) Digital Certificates

    a) i & iv
    b) ii & iii
    c) i, ii & iii
    d) all the above
    Answer Key:
    a) i & iv

    5. PGP stands for
    a) Pretty Good Privacy
    b) Pretty Good Person
    c) Private Good Privacy
    d) Private Good Person
    Answer Key:
    a) Pretty Good Privacy

    6. _____ protocol is used for securing credit cards transactions via the Internet
    a) Secure Electronic Transaction (SET)
    b) Credit Card Verification
    c) Symmetric Key Encryption
    d) Public Key Encryption
    Answer Key:
    a) Secure Electronic Transaction (SET)

    7. Secure Electronic Transaction (SET) was developed in
    a) 1999
    b) 1996
    c) 1969
    d) 1997
    Answer Key:
    b) 1996

    8. The websites secured by Secure Socket Layer protocols can be identified using
    a) html://
    b) http://
    c) htmls://
    d) https://
    Answer Key:
    d) https://

    9. ______ is the process of converting plain text into meaningless cipher text
    a) Encryption
    b) Decryption
    c) Digital certificate
    d) Digital signature
    Answer Key:
    a) Encryption

    10. Which of the following is true about Ransomware
    a) Ransomware is not a subset of malware
    b) Ransomware deletes the file instantly
    c) Typopiracy is a form of ransomware
    d) Hackers demand ransom from the victim
    Answer Key:
    d) Hackers demand ransom from the victim

    II.Answer the following questions.

    12th Computer Application (soon)

    III. Answer the following questions.

    12th Computer Application (Soon)

    IV. Answer the following questions.

    12th Computer Application (Soon)


     


     

     

     

     






    0 Comments:

    Post a Comment

    Recent Posts

    Total Pageviews

    Code

    Blog Archive