E-business related mcqs | Information Systems homework help

____ refers to preventing data delays or denials.
Answer
Integrity
Secrecy
Necessity
Readiness
5 points
Question 2

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
Answer
Necessity
Secrecy
Integrity
Encryption
5 points
Question 3

A(n) ____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
Answer
objective
Java++
ActiveX control
plug-in
5 points
Question 4

____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
Answer
Action page
Active content
Dynamic content
Activity control
5 points
Question 5

Java is a programming language developed by ____.
Answer
Microsoft
IBM
Oracle
Sun Microsystems
5 points
Question 6

ActiveX controls run only on computers with ____ operating systems.
Answer
Windows
Linux
UNIX
Mac
5 points
Question 7

A(n) ____ is a person or device that is able to listen in on and copy Internet transmissions.
Answer
eavesdropper
surveillor
dropper
listener
5 points
Question 8

____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
Answer
Hash coding
Symmetric
Asymmetric
Transformative
5 points
Question 9

Any act or object that poses a danger to computer assets is known as a ____.
Answer
problem
concern
threat
risk
5 points
Question 10

The purpose of a(n) ____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor’s computer.
Answer
ACL
digital ID
Web bug
gateway server
5 points
Question 11

Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded ____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
Answer
ID tags
serial numbers
reference numbers
origination numbers
5 points
Question 12

Internet payments for items costing from a few cents to approximately a dollar are called ____.
Answer
minipayments
micropayments
minitransactions
microtransactions
5 points
Question 13

Some companies have begun to offer small payment and micropayment services through ____ telephone carriers.
Answer
Internet-based
specialized
land-line
mobile
5 points
Question 14

____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
Answer
Double spending
Fraudulent spending
Double shopping
Illegal shopping
5 points
Question 15

One way to be able to trace electronic cash is to attach a ____ to each electronic cash transaction.
Answer
name
digital certificate
serial number
watermark
5 points
Question 16

____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
Answer
Pharming
Identity theft
Due diligence
Money laundering
5 points
Question 17

What payment method dominates online transactions today?
Answer
scrip
credit and debit cards
gift cards and certificates
electronic transfers
5 points
Question 18

The free payment clearing service that PayPal provides to individuals is called a ____ payment system.
Answer
peer-to-peer
virtual
B2C
B2B
5 points
Question 19

A disadvantage of ____ wallets is that they are not portable.
Answer
server-side
client-side
Paypal
virtual
5 points
Question 20

A ____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
Answer
credit card
charge card
debit card
smart card

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer