Fill This Form To Receive Instant Help
Homework answers / question archive / Utah State University ACCT 610 Chapter 12-Electronic Commerce Systems TRUE/FALSE 1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data
Utah State University
ACCT 610
Chapter 12-Electronic Commerce Systems
TRUE/FALSE
1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data.
a. |
the geographical area covered by the network |
b. |
the transmission technology used |
c. |
the type of workstation used |
d. |
the size of the company |
a. |
file server |
b. |
network interface card |
c. |
multiplexer |
d. |
bridge |
a. |
bridges and gateways connect one workstation with another workstation |
b. |
the network interface card permits different networks to share data |
c. |
file servers permit software and data to be shared with other network users |
d. |
a universal topology facilitates the transfer of data among networks |
a. |
star topology |
b. |
bus topology |
c. |
ring topology |
d. |
client/server topology |
a. |
individual workstations can communicate with each other |
b. |
individual workstations can function locally but cannot communicate with other workstations |
c. |
individual workstations cannot function locally and cannot communicate with other workstations |
d. |
the functions of the central site are taken over by a designated workstation |
a. |
is best suited to the token-ring topology because the random-access method used by this model detects data collisions. |
b. |
distributes both data and processing tasks to the server’s node. |
c. |
is most effective used with a bus topology. |
d. |
is more efficient than the bus or ring topologies. |
a. |
LAN |
b. |
decentralized network |
c. |
multidrop network |
d. |
Intranet |
a. |
software used by malicious Web sites to sniff data from cookies stored on the user’s hard drive |
b. |
used by network administrators to analyze network traffic |
c. |
used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions |
d. |
illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers |
a. |
all nodes are of equal status |
b. |
nodes manage private programs and databases locally |
c. |
shared resources are managed by a file server which is a node on the ring |
d. |
all of the above |
a. |
increases the amount of data that is transmitted between the central file and the network node |
b. |
eliminates the need for nodes to communicate with each other |
c. |
reduces the number of records that must be locked by having the file server perform record searches |
d. |
functions only with a ring and bus topology |
a. |
for a wide area network with a mainframe for a central computer |
b. |
for centralized databases only |
c. |
for environments where network nodes routinely communicate with each other |
d. |
when the central database does not have to be concurrent with the nodes |
a. |
the network consists of a central computer which manages all communications between nodes |
b. |
has a host computer connected to several levels of subordinate computers |
c. |
all nodes are of equal status; responsibility for managing communications is distributed among the nodes |
d. |
information processing units rarely communicate with each other |
a. |
multiplexing |
b. |
polling |
c. |
carrier sensing |
d. |
token passing |
a. |
facilitate physical connection between network devices |
b. |
provide a basis for error checking and measuring network performance |
c. |
promote compatibility among network devices |
d. |
result in inflexible standards |
a. |
within one node different layers communicate with other layers at that node |
b. |
one protocol is developed and applied to all the OSI layers |
c. |
specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks |
d. |
layers at each node communicate logically with their counterpart layers across nodes |
a. |
is the basic protocol that permits communication between Internet sites. |
b. |
controls Web browsers that access the WWW. |
c. |
is the file format used to produce Web pages. |
d. |
is a low-level encryption scheme used to secure transmissions in HTTP format. |
a. |
is the basic protocol that permits communication between Internet sites. |
b. |
controls Web browsers that access the Web. |
c. |
is the document format used to produce Web pages. |
d. |
was designed to provide the financial community with a standardized method for preparing |
e. |
is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format. |
a. |
is the document format used to produce Web pages. |
b. |
controls Web browsers that access the Web. |
c. |
is used to connect to Usenet groups on the Internet |
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used to secure transmissions in higher-level () format. |
a. |
is the document format used to produce Web pages. |
b. |
controls Web browsers that access the Web. |
c. |
is used to connect to Usenet groups on the Internet. |
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used to secure transmissions in higher-level () format. |
a. |
Cookies always contain encrypted data. |
b. |
Cookies are text files and never contain encrypted data. |
c. |
Cookies contain the URLs of sites visited by the user. |
d. |
Web browsers cannot function without cookies. |
a. |
a denial of service attack |
b. |
digital signature forging |
c. |
Internet protocol spoofing |
d. |
URL masquerading |
a. |
the encrypted mathematical value of the message sender’s name |
b. |
derived from the digest of a document that has been encrypted with the sender’s private key |
c. |
the computed digest of the sender’s digital certificate |
d. |
allows digital messages to be sent over analog telephone lines |
a. |
is the document format used to produce Web pages. |
b. |
controls Web browsers that access the Web. |
c. |
is used to connect to Usenet groups on the Internet |
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used to secure transmissions in higher-level () format. |
a. |
Packet switching combines the messages of multiple users into a “packet” for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users. |
b. |
The decision to partition a database assumes that no identifiable primary user exists in the organization. |
c. |
Message switching is used to establish temporary connections between network devices for the duration of a communication session. |
d. |
A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users. |
a. |
is the document format used to produce Web pages. |
b. |
controls Web browsers that access the Web. |
c. |
is used to connect to Usenet groups on the Internet |
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
e. |
is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format. |
.
APPENDIX QUESTION