This is a computer-to-computer exchange of business documents in a standard electronic format between business partners ANSWER: EDI When sending data from the source to destination, the message is ____________ ANSWER: Broken up into packet In a ______________ Key Encryption transmission of key without compromising is not easy ANSWER: Private This is a potential threat wherein an interruption in an authorized user's access to a computer network ANSWER: Denial of Service This is processing control that is use to check intermediate results in long and complex calculations ANSWER: Check points Aldrin is the web developer of TRA Corporation. He is created a website a university. He store the html files under the folder name students including the home page html file. Which of the following address will be the valid home page of the university? ANSWER: http://myuniversity.edu/students/home.html EDIFACT standard was developed by ANSWER: United Nations Economic Commission for Europe Page footing is ANSWER: The labels printed at the end of each page This acts on behalf of all users of an organization wanting to use the internet ANSWER: Proxy application gateway A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected during operation ANSWER: System Testing Which of the following is a control technique during input preparation? ANSWER: Data entry validation A __________ Key Encryption eliminates the key distribution problem ANSWER: Public Which of the following is used to secure an E Commerce ANSWER: All of the choices Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative website. He wants to use user defined tags. What markup language he will use? ANSWER: XML In E-commerce, the pair of keys for each organization is a ____________ Key and its _________ Key ANSWER: Public, Private Information System is being tested as a whole system. What kind of testing is being conducted? ANSWER: System Testing IP addresses are converted to ANSWER: hierarchy of domain names Which of the following tell about Triple DES? ANSWER: 1, 2 & 4 In the E commerce, a customer sends an order over the internet ANSWER: Order need to be encrypted The process of unscrambling the message is called ANSWER: Decryption Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo and in Davao. As a network engineer, he need to connect the LAN of different offices to the main office in Makati City. What computer hardware network equipment he need to use to connect these offices ANSWER: Router When sending data from the source to destination, the message is ____________. ANSWER: broken up into packet Which of the following does NOT considered as potential threats to security of the Information System? ANSWER: Hacking Ronnie want to protect his data when sending from the main office to the branch office. Which of the following information security he will apply? ANSWER: Encryption This is a security device deployed at the boundary of an organization' s network to protect it from unauthorized external access ANSWER: Firewall HTTP is a language used to create web pages ANSWER: FALSE It is a communication protocol used to retrieved web pages ANSWER: HTTP Which of the following protocol is used to transfer file from one LAN to another ANSWER: None of the choices By Electronic Commerce we mean: ANSWER: Commerce which is based on transactions using computers connected by telecommunication network Which of the following is the correct hierarchy of tags in a HTML? ANSWER: <html><head></head><body></body></html> This is the address of the web page on the internet ANSWER: URL