Chapters
Chapter 2: An Introduction to Adobe Pagemaker
Chapter 3: Introduction to Database Management System
Chapter 4: Introduction to Hypertext Pre-Processor
Chapter 5: PHP Function and Array
Chapter 6: PHP Conditional Statements
Chapter 7: Looping Structure
Chapter 8: Forms and Files
Chapter 9: Connecting PHP and MYSQL
Chapter 10: Introduction to Computer Networks
Chapter 11: Network Examples and Protocols
Chapter 12: DNS (Domain Name System)
Chapter 13: Network Cabling
Chapter 14: Open Source Concepts
Chapter 15: E-Commerce
Chapter 16: Electronic Payment Systems
Chapter 17: E-Commerce Security Systems
Chapter 18: Electronic Data Interchange-EDI

Solutions for Chapter 17: E-Commerce Security Systems
Below listed, you can find solutions for Chapter 17 of Tamil Nadu Board of Secondary Education Tamil Nadu Board Samacheer Kalvi for Class 12th Computer Application Answers Guide.
Tamil Nadu Board Samacheer Kalvi solutions for Class 12th Computer Application Answers Guide Chapter 17 E-Commerce Security Systems Evaluation - PART – I [Pages 250 - 251]
Choose the correct answer
In E-Commerce, when a stolen credit card is used to make a purchase it is termed as ______.
Friendly fraud
Clean fraud
Triangulation fraud
Cyber squatting
Which of the following is not a security element involved in E-Commerce?
Authenticity
Confidentiality
Fishing
Privacy
Asymmetric encryption is also called as ______.
Secure Electronic Transaction
Certification Authority
RSA algorithm
Payment Information
The security authentication technology does not include ______.
- Digital Signatures
- Digital Time Stamps
- Digital Technology
- Digital Certificates
i, ii & iv
ii & iii
i, ii & iii
all the above
PGP stands for ______.
Pretty Good Privacy
Pretty Good Person
Private Good Privacy
Private Good Person
_____ protocol is used for securing credit cards transactions via the internet.
Secure Electronic Transaction (SET)
Credit Card Verification
Symmetric Key Encryption
Public Key Encryption
Secure Electronic Transaction (SET) was developed in ______.
1999
1996
1969
1997
The websites secured by Secure Socket Layer protocols can be identified using ______.
html://
http://
htmls://
https://
3-D Secure, a protocol was developed by ______.
Visa
Master
Rupay
PayTM
Which of the following is true about Ransomware?
Ransomware is not a subset of malware
Ransomware deletes the file instantly
Typopiracy is a form of ransomware
Hackers demand ransom from the victim
Tamil Nadu Board Samacheer Kalvi solutions for Class 12th Computer Application Answers Guide Chapter 17 E-Commerce Security Systems Evaluation - PART – II [Page 251]
Short Answers
Write about information leakage in E-Commerce.
Write a short note on typopiracy.
Define non-repudiation.
List the different types of security technologies in E-Commerce.
Write about digital signature.
Tamil Nadu Board Samacheer Kalvi solutions for Class 12th Computer Application Answers Guide Chapter 17 E-Commerce Security Systems Evaluation - PART – III [Page 251]
Explain in Brief Answer
Write a note on certification authorities (CA).
List some E-Commerce Security Threats?
Differentiate asymmetric and symmetric algorithms.
Write a note on PGP.
Explain 3D secure payment protocols.
Tamil Nadu Board Samacheer Kalvi solutions for Class 12th Computer Application Answers Guide Chapter 17 E-Commerce Security Systems Evaluation - PART – IV [Page 251]
Explain in detail.
Write about dimensions of E-Commerce Security.
Explain encryption technology.
Differenticate digital signatures and digital certificates.
Define Secure Electronic Transaction (SET).
Explain the features of Secure Electronic Transaction (SET).
Briefly explain SSL.
Solutions for Chapter 17: E-Commerce Security Systems

Tamil Nadu Board Samacheer Kalvi solutions for Class 12th Computer Application Answers Guide chapter 17 - E-Commerce Security Systems
Shaalaa.com has the Tamil Nadu Board of Secondary Education Mathematics Class 12th Computer Application Answers Guide Tamil Nadu Board of Secondary Education solutions in a manner that help students grasp basic concepts better and faster. The detailed, step-by-step solutions will help you understand the concepts better and clarify any confusion. Tamil Nadu Board Samacheer Kalvi solutions for Mathematics Class 12th Computer Application Answers Guide Tamil Nadu Board of Secondary Education 17 (E-Commerce Security Systems) include all questions with answers and detailed explanations. This will clear students' doubts about questions and improve their application skills while preparing for board exams.
Further, we at Shaalaa.com provide such solutions so students can prepare for written exams. Tamil Nadu Board Samacheer Kalvi textbook solutions can be a core help for self-study and provide excellent self-help guidance for students.
Concepts covered in Class 12th Computer Application Answers Guide chapter 17 E-Commerce Security Systems are E-commerce Security, Types of E-commerce Threats, Dimensions of E-commerce Security, Security Technologies in E-commerce Transaction.
Using Tamil Nadu Board Samacheer Kalvi Class 12th Computer Application Answers Guide solutions E-Commerce Security Systems exercise by students is an easy way to prepare for the exams, as they involve solutions arranged chapter-wise and also page-wise. The questions involved in Tamil Nadu Board Samacheer Kalvi Solutions are essential questions that can be asked in the final exam. Maximum Tamil Nadu Board of Secondary Education Class 12th Computer Application Answers Guide students prefer Tamil Nadu Board Samacheer Kalvi Textbook Solutions to score more in exams.
Get the free view of Chapter 17, E-Commerce Security Systems Class 12th Computer Application Answers Guide additional questions for Mathematics Class 12th Computer Application Answers Guide Tamil Nadu Board of Secondary Education, and you can use Shaalaa.com to keep it handy for your exam preparation.