Uploaded by NathanielVince Ong

S.A.D.D FINAL QUIZ 2 SOURCEE

advertisement
This is a computer-to-computer exchange of business documents in a standard electronic
format between business partners
ANSWER:
EDI
When sending data from the source to destination, the message is ____________
ANSWER:
Broken up into packet
In a ______________ Key Encryption transmission of key without compromising is not easy
ANSWER:
Private
This is a potential threat wherein an interruption in an authorized user's access to a
computer network
ANSWER:
Denial of Service
This is processing control that is use to check intermediate results in long and complex
calculations
ANSWER:
Check points
Aldrin is the web developer of TRA Corporation. He is created a website a university. He
store the html files under the folder name students including the home page html file.
Which of the following address will be the valid home page of the university?
ANSWER:
http://myuniversity.edu/students/home.html
EDIFACT standard was developed by
ANSWER:
United Nations Economic Commission for Europe
Page footing is
ANSWER:
The labels printed at the end of each page
This acts on behalf of all users of an organization wanting to use the internet
ANSWER:
Proxy application gateway
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be
detected during operation
ANSWER:
System Testing
Which of the following is a control technique during input preparation?
ANSWER:
Data entry validation
A __________ Key Encryption eliminates the key distribution problem
ANSWER:
Public
Which of the following is used to secure an E Commerce
ANSWER:
All of the choices
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an
informative website. He wants to use user defined tags.
What markup language he will use?
ANSWER:
XML
In E-commerce, the pair of keys for each organization is a ____________ Key and its _________
Key
ANSWER:
Public, Private
Information System is being tested as a whole system. What kind of testing is being
conducted?
ANSWER:
System Testing
IP addresses are converted to
ANSWER:
hierarchy of domain names
Which of the following tell about Triple DES?
ANSWER:
1, 2 & 4
In the E commerce, a customer sends an order over the internet
ANSWER:
Order need to be encrypted
The process of unscrambling the message is called
ANSWER:
Decryption
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu,
Iloilo and in Davao. As a network engineer, he need to connect the LAN of different offices
to the main office in Makati City.
What computer hardware network equipment he need to use to connect these offices
ANSWER:
Router
When sending data from the source to destination, the message is ____________.
ANSWER:
broken up into packet
Which of the following does NOT considered as potential threats to security of the
Information System?
ANSWER:
Hacking
Ronnie want to protect his data when sending from the main office to the branch office.
Which of the following information security he will apply?
ANSWER:
Encryption
This is a security device deployed at the boundary of an organization' s network to protect it
from unauthorized external access
ANSWER:
Firewall
HTTP is a language used to create web pages
ANSWER:
FALSE
It is a communication protocol used to retrieved web pages
ANSWER:
HTTP
Which of the following protocol is used to transfer file from one LAN to another
ANSWER:
None of the choices
By Electronic Commerce we mean:
ANSWER:
Commerce which is based on transactions using computers connected by
telecommunication network
Which of the following is the correct hierarchy of tags in a HTML?
ANSWER:
<html><head></head><body></body></html>
This is the address of the web page on the internet
ANSWER:
URL
Download