Deck 13: Electronic Commerce and Information Security

Full screen (f)
exit full mode
Question
The Data Encryption Standard is certified as an international standard by the International Standards Organization.
Use Space or
up arrow
down arrow
to flip the card.
Question
Using multiple tables in a single database increases the amount of redundant information that must be stored.
Question
Building massive integrated government databases raises fewer technical questions than legal, political, social, and ethical ones.
Question
One of the difficulties with an asymmetric encryption algorithm is how to securely transmit the secret key so that both the sender and receiver know what it is.
Question
LastName and FirstName can serve as primary keys.
Question
The TCP/IP connection between the browser and Web server is usually broken once a Web page has been sent back to the browser.
Question
One of the problems with the RSA algorithm is the computational overload for encryption/decryption.
Question
The first security technology used was a firewall.
Question
Middleware packages do such things as translate between incompatible data representations, file formats, and network protocols to allow otherwise incompatible systems to exchange information.
Question
The number one attraction that draws customers to online shopping is probably convenience.
Question
Database management systems usually require the use of specialized query languages to enable the user or another application program to query the database in order to retrieve information.
Question
Customers should always know where they are on your Web site.
Question
The most basic unit of data is a field.
Question
Symmetric encryption algorithms are also known as public key encryption algorithms.
Question
Performance issues do not affect the user's satisfaction with a database management system.
Question
Your Web pages should be designed knowing that they will be displayed on many different machines with different operating systems and browsers.
Question
A single byte is often used to represent a string of characters.
Question
One of the goals as an online vendor is to keep customers at your site.
Question
The operating system uses the log-on password as an authentication device.
Question
Without cookies, there would be no association between the customer visiting one page and the same customer visiting another page.
Question
The RSA algorithm is based on the results from a field of mathematics known as ____ theory.

A) geometric
B) calculus
C) number
D) encryption
Question
Web site ____ refers to how information will be classified and organized so customers can easily find what they want.

A) taxonomy
B) URL
C) SSL
D) middleware
Question
A(n) ____ manages the files in a database.

A) DBMS
B) tuple
C) entity
D) attribute
Question
Cookies are highly dangerous because they can execute on the client machine.
Question
A ____ is a graphical ad, often with animation, placed in a prominent position on a Web page.

A) portal
B) domain name
C) cookie
D) banner ad
Question
You want your ____ to relate so closely to your business name that potential customers can easily guess it even if they do not have it written down in front of them.

A) search engine
B) domain name
C) portal
D) SSL
Question
A good ____ will incorporate the services of a sophisticated file manager to organize the disk files in an optimal way in order to minimize access time to the records.

A) e-business
B) ASP
C) open source software
D) DBMS
Question
A(n) ____ contains personal information about the user, such as name, address, time of visit, and what was looked at and bought.

A) banner ad
B) SSL
C) URL
D) cookie
Question
A ____ is an entry point Web page with links to other pages on some topic.

A) portal
B) domain name
C) cookie
D) banner ad
Question
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) factor
C) divisor
D) dividend
Question
____ allow the physical data to reside at separate and independent locations that are electronically networked together.

A) E-businesses
B) Distributed databases
C) ASPs
D) URLs
Question
Which encryption standard was adopted by the U.S. government in 2001 to compensate for increasing computing power?

A) AES
B) DES
C) triple DES
D) public key encryption
Question
The term ____ refers to software that allows separate, existing programs to communicate and work together seamlessly.

A) URL
B) taxonomy
C) middleware
D) e-business
Question
The first major decision in the e-commerce arena is to choose between in-house development and outsourcing.
Question
A database management system is exactly the same thing as a file manager.
Question
A(n) ____ is an attribute or combination of attributes that uniquely identifies a tuple.

A) record
B) primary key
C) query language
D) entity
Question
____ is a nonprofit corporation that took over the task of domain name management from the U.S. government in 1998.

A) ICNN
B) ICAN
C) ICANN
D) CANN
Question
One way to let potential customers learn your URL is to pay for a sponsored link so that a search on appropriate keywords will bring up links to your Web site.
Question
Using an ASP allows you great control over hardware and software decisions.
Question
A ____ is a small text file that the Web server sends to the user's browser and that gets stored on the user's hard drive.

A) banner ad
B) cookie
C) portal
D) domain name
Question
In a ____ model, your company sells products or materials to other companies rather than to the general public.

A) B2C
B) B2B
C) e-commerce
D) G2B
Question
A(n) ____ can design and manage your Web site on an ongoing basis.

A) search engine
B) open source software
C) Internet corporation
D) ASP
Question
The phrase "don't let the bad guys get the stuff" represents the ____ technique of information security.

A) authentication
B) encryption
C) firewall
D) password verification
Question
In the ____ database model, the conceptual model of a file is a two-dimensional table.

A) table
B) relational
C) object-oriented
D) distributed
Question
The Caesar cipher is a ____ cipher, where a single letter of plaintext generates a single letter of ciphertext.

A) single
B) replacement
C) substitution
D) block
Question
A(n) ____ requires the use of a secret key known to both the sender and receiver.

A) symmetric encryption algorithm
B) asymmetric encryption algorithm
C) public key encryption algorithm
D) secret key encryption algorithm
Question
The ____ strategy addresses the issues of backing up critical data, and dealing with server failures.

A) quality assurance
B) employee training
C) database management
D) disaster recovery
Question
Which of the following companies is a well-known certificate authority?

A) Veritas
B) Verisign
C) Encryptor
D) Securefast
Question
In a ____ a group of plaintext letters gets encoded into ciphertext, but not by substituting one at a time for each character.

A) stream cipher
B) Caesar cipher
C) shift cipher
D) block cipher
Question
____ is the practice of impersonating a legitimate site for the purposes of stealing money or stealing identity by collecting confidential information.

A) Spoofing
B) Internet theft
C) Money laundering
D) Embezzlement
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Electronic Commerce and Information Security
1
The Data Encryption Standard is certified as an international standard by the International Standards Organization.
True
2
Using multiple tables in a single database increases the amount of redundant information that must be stored.
False
3
Building massive integrated government databases raises fewer technical questions than legal, political, social, and ethical ones.
True
4
One of the difficulties with an asymmetric encryption algorithm is how to securely transmit the secret key so that both the sender and receiver know what it is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
LastName and FirstName can serve as primary keys.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The TCP/IP connection between the browser and Web server is usually broken once a Web page has been sent back to the browser.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
One of the problems with the RSA algorithm is the computational overload for encryption/decryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The first security technology used was a firewall.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Middleware packages do such things as translate between incompatible data representations, file formats, and network protocols to allow otherwise incompatible systems to exchange information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The number one attraction that draws customers to online shopping is probably convenience.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Database management systems usually require the use of specialized query languages to enable the user or another application program to query the database in order to retrieve information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Customers should always know where they are on your Web site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The most basic unit of data is a field.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Symmetric encryption algorithms are also known as public key encryption algorithms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Performance issues do not affect the user's satisfaction with a database management system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Your Web pages should be designed knowing that they will be displayed on many different machines with different operating systems and browsers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A single byte is often used to represent a string of characters.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
One of the goals as an online vendor is to keep customers at your site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The operating system uses the log-on password as an authentication device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Without cookies, there would be no association between the customer visiting one page and the same customer visiting another page.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The RSA algorithm is based on the results from a field of mathematics known as ____ theory.

A) geometric
B) calculus
C) number
D) encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Web site ____ refers to how information will be classified and organized so customers can easily find what they want.

A) taxonomy
B) URL
C) SSL
D) middleware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____ manages the files in a database.

A) DBMS
B) tuple
C) entity
D) attribute
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Cookies are highly dangerous because they can execute on the client machine.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A ____ is a graphical ad, often with animation, placed in a prominent position on a Web page.

A) portal
B) domain name
C) cookie
D) banner ad
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
You want your ____ to relate so closely to your business name that potential customers can easily guess it even if they do not have it written down in front of them.

A) search engine
B) domain name
C) portal
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A good ____ will incorporate the services of a sophisticated file manager to organize the disk files in an optimal way in order to minimize access time to the records.

A) e-business
B) ASP
C) open source software
D) DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ____ contains personal information about the user, such as name, address, time of visit, and what was looked at and bought.

A) banner ad
B) SSL
C) URL
D) cookie
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A ____ is an entry point Web page with links to other pages on some topic.

A) portal
B) domain name
C) cookie
D) banner ad
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) factor
C) divisor
D) dividend
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ allow the physical data to reside at separate and independent locations that are electronically networked together.

A) E-businesses
B) Distributed databases
C) ASPs
D) URLs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which encryption standard was adopted by the U.S. government in 2001 to compensate for increasing computing power?

A) AES
B) DES
C) triple DES
D) public key encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The term ____ refers to software that allows separate, existing programs to communicate and work together seamlessly.

A) URL
B) taxonomy
C) middleware
D) e-business
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The first major decision in the e-commerce arena is to choose between in-house development and outsourcing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A database management system is exactly the same thing as a file manager.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____ is an attribute or combination of attributes that uniquely identifies a tuple.

A) record
B) primary key
C) query language
D) entity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____ is a nonprofit corporation that took over the task of domain name management from the U.S. government in 1998.

A) ICNN
B) ICAN
C) ICANN
D) CANN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
One way to let potential customers learn your URL is to pay for a sponsored link so that a search on appropriate keywords will bring up links to your Web site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Using an ASP allows you great control over hardware and software decisions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ is a small text file that the Web server sends to the user's browser and that gets stored on the user's hard drive.

A) banner ad
B) cookie
C) portal
D) domain name
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
In a ____ model, your company sells products or materials to other companies rather than to the general public.

A) B2C
B) B2B
C) e-commerce
D) G2B
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A(n) ____ can design and manage your Web site on an ongoing basis.

A) search engine
B) open source software
C) Internet corporation
D) ASP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
The phrase "don't let the bad guys get the stuff" represents the ____ technique of information security.

A) authentication
B) encryption
C) firewall
D) password verification
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
In the ____ database model, the conceptual model of a file is a two-dimensional table.

A) table
B) relational
C) object-oriented
D) distributed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
The Caesar cipher is a ____ cipher, where a single letter of plaintext generates a single letter of ciphertext.

A) single
B) replacement
C) substitution
D) block
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ____ requires the use of a secret key known to both the sender and receiver.

A) symmetric encryption algorithm
B) asymmetric encryption algorithm
C) public key encryption algorithm
D) secret key encryption algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
The ____ strategy addresses the issues of backing up critical data, and dealing with server failures.

A) quality assurance
B) employee training
C) database management
D) disaster recovery
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following companies is a well-known certificate authority?

A) Veritas
B) Verisign
C) Encryptor
D) Securefast
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
In a ____ a group of plaintext letters gets encoded into ciphertext, but not by substituting one at a time for each character.

A) stream cipher
B) Caesar cipher
C) shift cipher
D) block cipher
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
____ is the practice of impersonating a legitimate site for the purposes of stealing money or stealing identity by collecting confidential information.

A) Spoofing
B) Internet theft
C) Money laundering
D) Embezzlement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.