Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Utah State University ACCT 610 Chapter 12-Electronic Commerce Systems TRUE/FALSE 1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data
Utah State University
ACCT 610
Chapter 12-Electronic Commerce Systems
TRUE/FALSE
1)Because of network protocols, users of networks built by different manufacturers are able to communicate and share data.
- Electronic commerce refers only to direct consumer marketing on the Internet.
- Business to consumer is the largest segment of Internet commerce.
- The phrase “.com” has become an Internet buzz word. It refers to a top-level domain name for communications organizations.
- The standard format for an e-mail address is DOMAIN NAME@USER NAME.
- The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
- Business risk is the possibility of loss or injury that can reduce or eliminate an organization’s ability to achieve its objectives.
- IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
- The rules that make it possible for users of networks to communicate are called protocols.
- A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
- Cookies are files created by user computers and stored on Web servers.
- Sniffing is the unauthorized transmitting of information across an Intranet.
APPENDIX QUESTION
- The client-server model can only be applied to ring and star topologies.
- The most popular topology for local area networks is the bus topology.
- A network topology is the physical arrangement of the components of the network.
- A bus topology is less costly to install than a ring topology.
- In a hierarchical topology, network nodes communicate with each other via a central host computer.
- Polling is one technique used to control data collisions.
- The most frequent use of EDI is in making vendor payments.
- EDI is the inter-company exchange of computer processible business information in standard format.
MULTIPLE CHOICE APPENDIX QUESTION
- The primary difference between a LAN and a WAN is
|
a. |
the geographical area covered by the network |
|
b. |
the transmission technology used |
|
c. |
the type of workstation used |
|
d. |
the size of the company |
- To physically connect a workstation to a LAN requires a
|
a. |
file server |
|
b. |
network interface card |
|
c. |
multiplexer |
|
d. |
bridge |
- One advantage of network technology is
|
a. |
bridges and gateways connect one workstation with another workstation |
|
b. |
the network interface card permits different networks to share data |
|
c. |
file servers permit software and data to be shared with other network users |
|
d. |
a universal topology facilitates the transfer of data among networks |
- Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes.
|
a. |
star topology |
|
b. |
bus topology |
|
c. |
ring topology |
|
d. |
client/server topology |
- In a star topology, when the central site fails
|
a. |
individual workstations can communicate with each other |
|
b. |
individual workstations can function locally but cannot communicate with other workstations |
|
c. |
individual workstations cannot function locally and cannot communicate with other workstations |
|
d. |
the functions of the central site are taken over by a designated workstation |
- Which of the following statements is correct? The client-server model
|
a. |
is best suited to the token-ring topology because the random-access method used by this model detects data collisions. |
|
b. |
distributes both data and processing tasks to the server’s node. |
|
c. |
is most effective used with a bus topology. |
|
d. |
is more efficient than the bus or ring topologies. |
- What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?
|
a. |
LAN |
|
b. |
decentralized network |
|
c. |
multidrop network |
|
d. |
Intranet |
- Sniffer software is
|
a. |
software used by malicious Web sites to sniff data from cookies stored on the user’s hard drive |
|
b. |
used by network administrators to analyze network traffic |
|
c. |
used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions |
|
d. |
illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers |
- In a ring topology
|
a. |
all nodes are of equal status |
|
b. |
nodes manage private programs and databases locally |
|
c. |
shared resources are managed by a file server which is a node on the ring |
|
d. |
all of the above |
- The client/server technology
|
a. |
increases the amount of data that is transmitted between the central file and the network node |
|
b. |
eliminates the need for nodes to communicate with each other |
|
c. |
reduces the number of records that must be locked by having the file server perform record searches |
|
d. |
functions only with a ring and bus topology |
- A star topology is appropriate
|
a. |
for a wide area network with a mainframe for a central computer |
|
b. |
for centralized databases only |
|
c. |
for environments where network nodes routinely communicate with each other |
|
d. |
when the central database does not have to be concurrent with the nodes |
- In a ring topology
|
a. |
the network consists of a central computer which manages all communications between nodes |
|
b. |
has a host computer connected to several levels of subordinate computers |
|
c. |
all nodes are of equal status; responsibility for managing communications is distributed among the nodes |
|
d. |
information processing units rarely communicate with each other |
- Which method does not manage or control data collisions that might occur on a network?
|
a. |
multiplexing |
|
b. |
polling |
|
c. |
carrier sensing |
|
d. |
token passing |
- Network protocols fulfill all of the following objectives except
|
a. |
facilitate physical connection between network devices |
|
b. |
provide a basis for error checking and measuring network performance |
|
c. |
promote compatibility among network devices |
|
d. |
result in inflexible standards |
- All of the following are true about the Open System Interface (OSI) protocol except
|
a. |
within one node different layers communicate with other layers at that node |
|
b. |
one protocol is developed and applied to all the OSI layers |
|
c. |
specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks |
|
d. |
layers at each node communicate logically with their counterpart layers across nodes |
- Which of the following statements is correct? TCP/IP
|
a. |
is the basic protocol that permits communication between Internet sites. |
|
b. |
controls Web browsers that access the WWW. |
|
c. |
is the file format used to produce Web pages. |
|
d. |
is a low-level encryption scheme used to secure transmissions in HTTP format. |
- XBRL
|
a. |
is the basic protocol that permits communication between Internet sites. |
|
b. |
controls Web browsers that access the Web. |
|
c. |
is the document format used to produce Web pages. |
|
d. |
was designed to provide the financial community with a standardized method for preparing |
|
e. |
is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format. |
- FTP
|
a. |
is the document format used to produce Web pages. |
|
b. |
controls Web browsers that access the Web. |
|
c. |
is used to connect to Usenet groups on the Internet |
|
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
|
e. |
is a low-level encryption scheme used to secure transmissions in higher-level () format. |
- HTML
|
a. |
is the document format used to produce Web pages. |
|
b. |
controls Web browsers that access the Web. |
|
c. |
is used to connect to Usenet groups on the Internet. |
|
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
|
e. |
is a low-level encryption scheme used to secure transmissions in higher-level () format. |
- Which one of the following statements is correct?
|
a. |
Cookies always contain encrypted data. |
|
b. |
Cookies are text files and never contain encrypted data. |
|
c. |
Cookies contain the URLs of sites visited by the user. |
|
d. |
Web browsers cannot function without cookies. |
- A message that is made to look as though it is coming from a trusted source but is not is called
|
a. |
a denial of service attack |
|
b. |
digital signature forging |
|
c. |
Internet protocol spoofing |
|
d. |
URL masquerading |
- A digital signature is
|
a. |
the encrypted mathematical value of the message sender’s name |
|
b. |
derived from the digest of a document that has been encrypted with the sender’s private key |
|
c. |
the computed digest of the sender’s digital certificate |
|
d. |
allows digital messages to be sent over analog telephone lines |
- HTTP
|
a. |
is the document format used to produce Web pages. |
|
b. |
controls Web browsers that access the Web. |
|
c. |
is used to connect to Usenet groups on the Internet |
|
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
|
e. |
is a low-level encryption scheme used to secure transmissions in higher-level () format. |
- Which of the following statements is correct?
|
a. |
Packet switching combines the messages of multiple users into a “packet” for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users. |
|
b. |
The decision to partition a database assumes that no identifiable primary user exists in the organization. |
|
c. |
Message switching is used to establish temporary connections between network devices for the duration of a communication session. |
|
d. |
A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users. |
- NNTP
|
a. |
is the document format used to produce Web pages. |
|
b. |
controls Web browsers that access the Web. |
|
c. |
is used to connect to Usenet groups on the Internet |
|
d. |
is used to transfer text files, programs, spreadsheets, and databases across the Internet. |
|
e. |
is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format. |
SHORT ANSWER
- What is packet switching?
- What is an extranet?
.
- What is a URL?
- What is an IP address?
- What is spoofing?
- Name the three types of addresses used on the Internet.
- What is XML?
- What is XBRL?
- What is XBRL Taxonomy?
- Explain the parts of an e-mail address and give an example (your own?).
- Explain a denial of service attack.
- What are cookies and why are they used?
- List at least five top-level domain names used in the United States.
APPENDIX QUESTION
- When are networks connected with a bridge and with a gateway?
- Describe an advantage to the client/server topology.
- Describe one primary advantage of polling as a network control method.
- Describe one disadvantage to carrier sensing as a network control method.
- Why is network control needed? What tasks are performed?
- Define WAN, LAN, and VAN.
- What are the five basic network architectures?
ESSAY
APPENDIX QUESTION
- Contrast a LAN and a WAN. Typically, who owns and maintains a WAN?
- Describe the basic differences between the star, ring, and bus topologies.
- What security questions must be considered with regard to Internet commerce?
- What is the World Wide Web?
- Discuss the three levels of Internet business models.
- Define risk in an electronic commerce setting.
- Discuss the four areas of concern as they are related to e-commerce: data security, business policy, privacy, and business process integrity.
- Define and contrast digital certificate and digital signature.
- Explain the function of the two parts of the TCP/IP protocol.
- What are network protocols? What functions do they perform?
- List and briefly define the privacy conditions inherent to the Safe Harbor agreement
- Discuss three audit implications of XBRL
- What is a Certification Authority and what are the implications for the accounting profession?
Expert Solution
PFA
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





