Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Utah State University ACCT 610 Chapter 12-Electronic Commerce Systems TRUE/FALSE 1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data

Utah State University ACCT 610 Chapter 12-Electronic Commerce Systems TRUE/FALSE 1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data

Communications

Utah State University

ACCT 610

Chapter 12-Electronic Commerce Systems

TRUE/FALSE

1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data.

 

 

 

  1. Electronic commerce refers only to direct consumer marketing on the Internet.

 

 

 

  1. Business to consumer is the largest segment of Internet commerce.

 

 

 

  1. The phrase “.com” has become an Internet buzz word. It refers to a top-level domain name for communications organizations.

 

 

 

  1. The standard format for an e-mail address is DOMAIN NAME@USER NAME.
  2. The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.

 

 

 

  1. Business risk is the possibility of loss or injury that can reduce or eliminate an organization’s ability to achieve its objectives.

 

 

 

  1. IP spoofing is a form of masquerading to gain unauthorized access to a Web server.

 

 

 

  1. The rules that make it possible for users of networks to communicate are called protocols.

 

 

 

  1. A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.

 

 

 

  1. Cookies are files created by user computers and stored on Web servers.

 

 

 

  1. Sniffing is the unauthorized transmitting of information across an Intranet.

 

 

 

APPENDIX QUESTION

 

  1. The client-server model can only be applied to ring and star topologies.

 

 

 

  1. The most popular topology for local area networks is the bus topology.

 

 

 

  1. A network topology is the physical arrangement of the components of the network.

 

 

 

  1. A bus topology is less costly to install than a ring topology.

 

 

 

  1. In a hierarchical topology, network nodes communicate with each other via a central host computer.

 

 

 

  1. Polling is one technique used to control data collisions.

 

 

 

  1. The most frequent use of EDI is in making vendor payments.

 

 

 

  1. EDI is the inter-company exchange of computer processible business information in standard format.

 

 

 

MULTIPLE CHOICE APPENDIX QUESTION

  1. The primary difference between a LAN and a WAN is

a.

the geographical area covered by the network

b.

the transmission technology used

c.

the type of workstation used

d.

the size of the company

 

 

  1. To physically connect a workstation to a LAN requires a

a.

file server

 

b.

network interface card

c.

multiplexer

d.

bridge

 

 

 

  1. One advantage of network technology is

a.

bridges and gateways connect one workstation with another workstation

b.

the network interface card permits different networks to share data

c.

file servers permit software and data to be shared with other network users

d.

a universal topology facilitates the transfer of data among networks

 

 

  1. Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes.

a.

star topology

b.

bus topology

c.

ring topology

d.

client/server topology

 

 

  1. In a star topology, when the central site fails

a.

individual workstations can communicate with each other

b.

individual workstations can function locally but cannot communicate with other

workstations

c.

individual workstations cannot function locally and cannot communicate with other

workstations

d.

the functions of the central site are taken over by a designated workstation

 

 

  1. Which of the following statements is correct? The client-server model

a.

is best suited to the token-ring topology because the random-access method used by this

model detects data collisions.

b.

distributes both data and processing tasks to the server’s node.

c.

is most effective used with a bus topology.

d.

is more efficient than the bus or ring topologies.

 

 

  1. What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

a.

LAN

b.

decentralized network

c.

multidrop network

d.

Intranet

 

 

  1. Sniffer software is

a.

software used by malicious Web sites to sniff data from cookies stored on the user’s hard

drive

b.

used by network administrators to analyze network traffic

 

c.

used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid

data collisions

d.

illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers

 

 

 

  1. In a ring topology

a.

all nodes are of equal status

b.

nodes manage private programs and databases locally

c.

shared resources are managed by a file server which is a node on the ring

d.

all of the above

 

 

  1. The client/server technology

a.

increases the amount of data that is transmitted between the central file and the network

node

b.

eliminates the need for nodes to communicate with each other

c.

reduces the number of records that must be locked by having the file server perform record searches

d.

functions only with a ring and bus topology

 

 

  1. A star topology is appropriate

a.

for a wide area network with a mainframe for a central computer

b.

for centralized databases only

c.

for environments where network nodes routinely communicate with each other

d.

when the central database does not have to be concurrent with the nodes

 

 

  1. In a ring topology

a.

the network consists of a central computer which manages all communications between

nodes

b.

has a host computer connected to several levels of subordinate computers

c.

all nodes are of equal status; responsibility for managing communications is distributed

among the nodes

d.

information processing units rarely communicate with each other

 

 

  1. Which method does not manage or control data collisions that might occur on a network?

a.

multiplexing

b.

polling

c.

carrier sensing

d.

token passing

 

 

  1. Network protocols fulfill all of the following objectives except

a.

facilitate physical connection between network devices

b.

provide a basis for error checking and measuring network performance

c.

promote compatibility among network devices

d.

result in inflexible standards

 

 

 

  1. All of the following are true about the Open System Interface (OSI) protocol except

a.

within one node different layers communicate with other layers at that node

b.

one protocol is developed and applied to all the OSI layers

c.

specific layers are dedicated to hardware tasks and other layers are dedicated to software

tasks

d.

layers at each node communicate logically with their counterpart layers across nodes

 

 

  1. Which of the following statements is correct? TCP/IP

a.

is the basic protocol that permits communication between Internet sites.

b.

controls Web browsers that access the WWW.

c.

is the file format used to produce Web pages.

d.

is a low-level encryption scheme used to secure transmissions in HTTP format.

 

 

  1. XBRL

a.

is the basic protocol that permits communication between Internet sites.

b.

controls Web browsers that access the Web.

c.

is the document format used to produce Web pages.

d.

was designed to provide the financial community with a standardized method for preparing

e.

is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.

 

 

  1. FTP

a.

is the document format used to produce Web pages.

b.

controls Web browsers that access the Web.

c.

is used to connect to Usenet groups on the Internet

d.

is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.

is a low-level encryption scheme used to secure transmissions in higher-level () format.

 

 

  1. HTML

a.

is the document format used to produce Web pages.

b.

controls Web browsers that access the Web.

c.

is used to connect to Usenet groups on the Internet.

d.

is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.

is a low-level encryption scheme used to secure transmissions in higher-level () format.

 

 

  1. Which one of the following statements is correct?

a.

Cookies always contain encrypted data.

b.

Cookies are text files and never contain encrypted data.

c.

Cookies contain the URLs of sites visited by the user.

d.

Web browsers cannot function without cookies.

 

 

  1. A message that is made to look as though it is coming from a trusted source but is not is called

a.

a denial of service attack

b.

digital signature forging

c.

Internet protocol spoofing

d.

URL masquerading

 

 

  1. A digital signature is

a.

the encrypted mathematical value of the message sender’s name

b.

derived from the digest of a document that has been encrypted with the sender’s private

key

c.

the computed digest of the sender’s digital certificate

d.

allows digital messages to be sent over analog telephone lines

 

 

  1. HTTP

a.

is the document format used to produce Web pages.

b.

controls Web browsers that access the Web.

c.

is used to connect to Usenet groups on the Internet

d.

is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.

is a low-level encryption scheme used to secure transmissions in higher-level () format.

 

 

  1. Which of the following statements is correct?

a.

Packet switching combines the messages of multiple users into a “packet” for

transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.

b.

The decision to partition a database assumes that no identifiable primary user exists in the

organization.

c.

Message switching is used to establish temporary connections between network devices

for the duration of a communication session.

d.

A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve

itself when the primary computer completes processing its transaction and releases the data needed by other users.

 

 

  1. NNTP

a.

is the document format used to produce Web pages.

b.

controls Web browsers that access the Web.

c.

is used to connect to Usenet groups on the Internet

d.

is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.

is a low-level encryption scheme used to secure transmissions in higher-level (HTTP)

format.

 

 

SHORT ANSWER

 

  1. What is packet switching?

 

 

  1. What is an extranet?

 

.

 

  1. What is a URL?

 

  1. What is an IP address?

 

 

  1. What is spoofing?

 

 

  1. Name the three types of addresses used on the Internet.

 

 

  1. What is XML?

 

 

  1. What is XBRL?

 

 

  1. What is XBRL Taxonomy?

 

 

  1. Explain the parts of an e-mail address and give an example (your own?).

 

  1. Explain a denial of service attack.

 

 

  1. What are cookies and why are they used?

 

 

  1. List at least five top-level domain names used in the United States.

 

 

APPENDIX QUESTION

 

  1. When are networks connected with a bridge and with a gateway?

 

 

  1. Describe an advantage to the client/server topology.

 

 

 

  1. Describe one primary advantage of polling as a network control method.

 

 

  1. Describe one disadvantage to carrier sensing as a network control method.

 

 

 

  1. Why is network control needed? What tasks are performed?

 

  1. Define WAN, LAN, and VAN.

 

  1. What are the five basic network architectures?

 

 

ESSAY

 

APPENDIX QUESTION

 

  1. Contrast a LAN and a WAN. Typically, who owns and maintains a WAN?

 

 

  1. Describe the basic differences between the star, ring, and bus topologies.

 

 

 

 

  1. What security questions must be considered with regard to Internet commerce?

 

 

  1. What is the World Wide Web?

 

 

 

  1. Discuss the three levels of Internet business models.

 

 

  1. Define risk in an electronic commerce setting.

 

 

  1. Discuss the four areas of concern as they are related to e-commerce: data security, business policy, privacy, and business process integrity.

 

 

  1. Define and contrast digital certificate and digital signature.

 

 

 

  1. Explain the function of the two parts of the TCP/IP protocol.

 

 

  1. What are network protocols? What functions do they perform?

 

  1. List and briefly define the privacy conditions inherent to the Safe Harbor agreement
  2. Discuss three audit implications of XBRL

 

  1. What is a Certification Authority and what are the implications for the accounting profession?

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

15.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE