Exam 3: Ebusiness and Ecommerce

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements best describes the business architecture's relation to other architectures?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

C

The enterprise architecture involves five enterprise architectural domains.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

False

The technique that permits a bank to issue digital cash so that it is unable to link the payer to the payee is called

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

________ drivers connect applications to databases.

(Multiple Choice)
4.7/5
(28)

Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms. Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once. ________ 1.OLAP ________ 2.IP ________ 3.FTP ________ 4.SQL ________ 5.POP ________ 6.Key ________ 7.Digital cash ________ 8.Hyperlink A.The most commonly used protocol for file servers B.A processing method for very large databases and complicated reporting C.Address for an individual computer on the Internet D.The most commonly used protocol for mail servers E.An electronic "promissory note" F.A "pointer" to another document on a Web server G.Used to define,access,and manipulate data in a relational database H.Needed to decode an encrypted message

(Short Answer)
4.9/5
(33)

________ systems integrate all the major accounting functions,as well as the Web store,into a single software system.

(Multiple Choice)
4.7/5
(42)

Software known as firewalls limits access to information on a company's servers from the rest of the world.

(True/False)
4.8/5
(39)

Human resources is part of the application architecture of a company.

(True/False)
4.7/5
(37)

The verification of a digital signature involves the use of a(n)________ algorithm.

(Short Answer)
4.8/5
(33)

"207.49.159.2" is an example of a(n)

(Multiple Choice)
4.9/5
(44)

Memory cards provide a high degree of security and can be used for complex financial transactions.

(True/False)
4.9/5
(34)

Which of the following is a standard communications protocol in SOA?

(Multiple Choice)
4.9/5
(34)

The label "www.google.com" is an example of a

(Multiple Choice)
4.7/5
(33)

A major issue in electronic transactions is privacy.

(True/False)
4.7/5
(33)

A sufficiently long key is a useful countermeasure against a(n)________ ________.

(Short Answer)
5.0/5
(30)

A guessed plaintext attack will succeed even though the sender adds a few random numbers at the end of a message.

(True/False)
4.8/5
(42)

The Electronic Bank of America might digitally sign a message that contains which of the following information?

(Multiple Choice)
4.9/5
(27)

The transactional interface is used for queries,analysis,and research whereas the decision support interface is used for access and manipulation of data in the operational database.

(True/False)
4.8/5
(33)

A domain name is

(Multiple Choice)
4.8/5
(35)

What is the difference between electronic business and electronic commerce?

(Essay)
4.8/5
(34)
Showing 1 - 20 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)