Exam 3: Ebusiness and Ecommerce
Exam 1: Accounting Information Systems: An Overview163 Questions
Exam 2: Systems Techniques and Documentation136 Questions
Exam 3: Ebusiness and Ecommerce121 Questions
Exam 4: Transaction Processing and the Internal Control Process138 Questions
Exam 5: Fraud Examination and Fraud Management134 Questions
Exam 6: Information Systems Security172 Questions
Exam 7: Electronic Data Processing Systems128 Questions
Exam 8: Revenue Cycle Processes128 Questions
Exam 9: Procurement and Human Resources Business Processes121 Questions
Exam 10: The Production Business Process130 Questions
Exam 11: Systems Planning, analysis, and Design163 Questions
Exam 12: Systems Project Management, implementation, operation, control135 Questions
Exam 13: Data Management Concepts147 Questions
Exam 14: Auditing Information Technology126 Questions
Select questions type
Which of the following statements best describes the business architecture's relation to other architectures?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
The enterprise architecture involves five enterprise architectural domains.
Free
(True/False)
4.8/5
(40)
Correct Answer:
False
The technique that permits a bank to issue digital cash so that it is unable to link the payer to the payee is called
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms.
Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once.
________ 1.OLAP
________ 2.IP
________ 3.FTP
________ 4.SQL
________ 5.POP
________ 6.Key
________ 7.Digital cash
________ 8.Hyperlink
A.The most commonly used protocol for file servers
B.A processing method for very large databases and complicated reporting
C.Address for an individual computer on the Internet
D.The most commonly used protocol for mail servers
E.An electronic "promissory note"
F.A "pointer" to another document on a Web server
G.Used to define,access,and manipulate data in a relational database
H.Needed to decode an encrypted message
(Short Answer)
4.9/5
(33)
________ systems integrate all the major accounting functions,as well as the Web store,into a single software system.
(Multiple Choice)
4.7/5
(42)
Software known as firewalls limits access to information on a company's servers from the rest of the world.
(True/False)
4.8/5
(39)
Human resources is part of the application architecture of a company.
(True/False)
4.7/5
(37)
The verification of a digital signature involves the use of a(n)________ algorithm.
(Short Answer)
4.8/5
(33)
Memory cards provide a high degree of security and can be used for complex financial transactions.
(True/False)
4.9/5
(34)
Which of the following is a standard communications protocol in SOA?
(Multiple Choice)
4.9/5
(34)
A sufficiently long key is a useful countermeasure against a(n)________ ________.
(Short Answer)
5.0/5
(30)
A guessed plaintext attack will succeed even though the sender adds a few random numbers at the end of a message.
(True/False)
4.8/5
(42)
The Electronic Bank of America might digitally sign a message that contains which of the following information?
(Multiple Choice)
4.9/5
(27)
The transactional interface is used for queries,analysis,and research whereas the decision support interface is used for access and manipulation of data in the operational database.
(True/False)
4.8/5
(33)
What is the difference between electronic business and electronic commerce?
(Essay)
4.8/5
(34)
Showing 1 - 20 of 121
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)