Page 208 - CA_165_V2.0_Flipbook
P. 208

4.     What is e-Commerce? Explain the steps to achieve a secure data transmission in e-commerce.
                    Ans.   e-Commerce, also known as electronic commerce or Internet commerce, refers to the buying or selling of
                           goods or services over the Internet. Following are the essential requirements for secure data transmission:
                             Confidentiality: Information uploaded during e-Commerce transaction should not be accessible to
                              an unauthorized user. It should not be intercepted during the transmission of details.
                            Integrity: Information should not be altered during its transmission over the network.
                            Authenticity: There should be a mechanism to authenticate a user before giving him/her an access to
                              the required information.
                            Encryption: Information should be encrypted and decrypted only by an authorized user.
                            Auditability: Data should be recorded in such a way that it can be audited for integrity requirements.
                  C.  Application Based Question.

                      Raman is working on the Internet. Identify which of the following should be adopted as formal guidelines while
                      working on the Internet:
                      i.   Do not send insensible messages.
                      ii.   Do not be sensitive while communicating online.
                      iii.  Disclose all personal information.
                      iv.  Never rely the people you meet online, they may not be disclosing their complete identity.
                      v.   Always respect other people’s privacy.

                      vi.  Always share authentic information only.
                    Ans.    i., iv., v. and vi. should be adopted while working online.

                  Unsolved Exercise



                                                               SECTION A
                                                        (Objective Type Questions)

                  A.   Multiple choice questions.
                      1.   Which of the following techniques can be used for data security?             [CBSE SQP 2021]
                          i.  Authentication                                  ii.  Authorization
                          iii.  Encryption                                    iv.  All of these

                      2.   A Firewall is ............................ .
                          i.  Used to protect a computer room from flood and fire
                          ii.  A form of virus
                          iii.  A screen saver

                          iv.  None of these
                      3.   Insensible messages that are sent in a social group or during a chat are referred to as ............................ .
                          i.  Spamming                                        ii.  Fake messages
                          iii.  Flaming                                       iv.  Virus
                      4.   Digital property includes ............................ .

                          i.  Emails                                          ii.  Spreadsheets
                          iii.  Audio files                                   iv.  All of these



                   206   Touchpad Computer Applications-X
   203   204   205   206   207   208   209   210   211   212   213