Exam 3: Financial Transactions, Security Measures, and IT Infrastructure
Exam 1: E-Commerce21 Questions
Exam 2: E-Commerce and Marketing24 Questions
Exam 3: Financial Transactions, Security Measures, and IT Infrastructure17 Questions
Exam 4: IT and Computer Systems17 Questions
Select questions type
Which factor determines who has the right to access different types of IT systems and information?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
B
Public key encryption uses multiple keys. One key is used to encrypt data, while another is usedto decrypt data. The key used to encrypt data is called the _____ key, while the key used todecrypt data is called the _____ key.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
Which factor represents a system's ability to change quickly?
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?
(Multiple Choice)
4.9/5
(30)
Which of the following is a method of transferring money from one person's account to another?
(Multiple Choice)
4.9/5
(38)
What is an internal organizational Internet that is guarded against outside access by a specialsecurity feature called a firewall (which can be software, hardware, or a combination of thetwo)?
(Multiple Choice)
4.8/5
(36)
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?
(Multiple Choice)
4.9/5
(34)
Which of the following is used in B2B to pay for purchases?
(Multiple Choice)
4.9/5
(36)
When a transaction is processed online, how can the merchant verify the customer's identity?
(Multiple Choice)
4.9/5
(36)
If you need to transfer money to another person via the internet, which of the following methods could you use?
(Multiple Choice)
4.9/5
(29)
What is a set of conditions used to measure how well a product or system functions?
(Multiple Choice)
4.8/5
(41)
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
(Multiple Choice)
4.7/5
(35)
A combination of software and information designed to provide security and information for payment is called a what?
(Multiple Choice)
4.9/5
(42)
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?
(Multiple Choice)
4.8/5
(44)
Which factor determines when your IT system will be available for knowledge workers to access?
(Multiple Choice)
4.8/5
(36)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)