GATE Computer Science: Questions 381 - 386 of 913
Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 913 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.
Rs. 450.00 or
Question number: 381
Question number: 382
advertisements that pop up unannounced on a computer system.
Destructive programs embedded in e-mail attachments or downloaded programs.
programs that monitor the trail of Web sites visited by a consumer.
Small files recording personal information about a consumer’s browsing habits.
Question number: 383
Question number: 384
Question number: 385
The Secure Electronic Transaction (SET) specification:
uses a public key encryption to secure credit-card transaction systems
provides private key encryption of all data that passes between a client and a server
is a notice, issued and verified by a certificate authority, that guarantees a user or Website is legitimate < /VALUE
allows users to choose an encryption scheme for the data that passes between a client and a server