Deck 12: Electronic Commerce Systems

Full screen (f)
exit full mode
Question
Business-to-consumer is the largest segment of Internet commerce.
Use Space or
up arrow
down arrow
to flip the card.
Question
IP spoofing is a form of masquerading to gain unauthorized access to a web server.
Question
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
Question
A network topology is the physical arrangement of the components of the network.
Question
Cookies are files created by user computers and stored on web servers.
Question
Electronic commerce refers only to direct consumer marketing on the Internet.
Question
A bus topology is less costly to install than a ring topology.
Question
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Question
Sniffing is the unauthorized transmitting of information across an intranet.
Question
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Question
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Question
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
Question
The rules that make it possible for users of networks to communicate are called protocols.
Question
The network paradox is that networks exist to provide user access to shared resources while one of their most important objectives is to control access.
Question
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
Question
The client-server model can only be applied to ring and star topologies.
Question
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
Question
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Question
The bus topology connects the nodes in parallel.
Question
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Question
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Question
The intermediary in a smurf attack is also a victim.
Question
The most frequent use of EDI is in making vendor payments.
Question
Cookies are created by the web server of a visited site and are stored on the hard drive of the visitor's computer.
Question
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A)LAN
B)decentralized network
C)multidrop network
D)intranet
Question
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
Question
Protocols

A)facilitate the physical connection between the network devices
B)synchronize the transfer of data between physical devices
C)provide a basis for error checking and measuring network performance
D)all of the above
Question
A virtual private network

A)is a password-controlled network for private users rather than the general public
B)is a private network within a public network
C)is an Internet facility that links user sites locally and around the world
D)defines the path to a facility or file on the web
Question
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Question
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A)star topology
B)bus topology
C)ring topology
D)client/server topology
Question
A ping signal is used to initiate

A)URL masquerading
B)digital signature forging
C)Internet protocol spoofing
D)a smurf attack
Question
To physically connect a workstation to a LAN requires a

A)file server
B)network interface card
C)multiplexer
D)bridge
Question
HTML controls web browsers that access the web.
Question
Polling is one technique used to control data collisions.
Question
Cloud computing is the technology that has unleashed virtualization.
Question
Network protocols fulfill all of the following objectives except

A)facilitate physical connection between network devices
B)provide a basis for error checking and measuring network performance
C)promote compatibility among network devices
D)creation of inflexible standards
Question
EDI is the intercompany exchange of computer processible business information in standard format.
Question
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
Question
Packet switching

A)combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B)is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C)is used to establish temporary connections between network devices for the duration of a communication session.
D)is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a garbled message.
Question
In a ring topology

A)the network consists of a central computer which manages all communications between nodes
B)a host is computer connected to several levels of subordinate computers
C)all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D)information processing units rarely communicate with each other
Question
HTML

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Question
The primary difference between a LAN and a WAN is

A)the geographical area covered by the network
B)the transmission technology used
C)the type of workstation used
D)the size of the company
Question
A message that is made to look as though it is coming from a trusted source but is not is called

A)a denial of service attack
B)digital signature forging
C)Internet protocol spoofing
D)URL masquerading
Question
A digital signature is

A)the encrypted mathematical value of the message sender's name
B)derived from the digest of a document that has been encrypted with the sender's private key
C)the computed digest of the sender's digital certificate
D)a tool that allows digital messages to be sent over analog telephone lines
Question
FTP

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Question
Which one of the following statements is correct?

A)Cookies always contain encrypted data.
B)Cookies are text files and never contain encrypted data.
C)Cookies contain the URLs of sites visited by the user.
D)Web browsers cannot function without cookies.
Question
Which of the following statements is correct? The client-server model

A)is best suited to the token-ring topology because the random-access method used by this model detects data collisions
B)distributes both data and processing tasks to the server's node
C)is most effective used with a bus topology
D)is more efficient than the bus or ring topologies
Question
In a star topology,when the central site fails

A)individual workstations can communicate with each other
B)individual workstations can function locally but cannot communicate with other workstations
C)individual workstations cannot function locally and cannot communicate with other workstations
D)the functions of the central site are taken over by a designated workstation
Question
Which method does not manage or control data collisions that might occur on a network?

A)multiplexing
B)polling
C)carrier sensing
D)token passing
Question
An IP address

A)defines the path to a facility or file on the web
B)is the unique address that every computer node and host attached to the Internet must have
C)is represented by a 64-bit data packet
D)is the address of the protocol rules and standards that govern the design of Internet hardware and software
Question
NNTP

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Question
Which of the following statements is correct about TCP/IP?

A)It is the basic protocol that permits communication between Internet sites.
B)It controls web browsers that access the Internet.
C)It is the file format used to produce web pages.
D)It is a low-level encryption scheme used to secure transmissions in HTTP format.
Question
All of the following are true about the Open System Interface (OSI)protocol except

A)within one node different layers communicate with other layers at that node
B)one protocol is developed and applied to all the OSI layers
C)specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D)layers at each node communicate logically with their counterpart layers across nodes
Question
A star topology is appropriate

A)for a wide area network with a mainframe for a central computer
B)for centralized databases only
C)for environments where network nodes routinely communicate with each other
D)when the central database does not have to be concurrent with the nodes
Question
In a ring topology,all of the following are true except

A)all nodes are of equal status
B)nodes manage private programs and databases locally
C)shared resources are managed by a file server which is a node on the ring
D)a central computer is designated to control traffic between the peers
Question
IP spoofing

A)combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributed randomly among the targeted users
B)is a form of masquerading to gain unauthorized access to a web server
C)is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session
D)is a temporary phenomenon that disrupts transaction processing and resolves itself when the primary computer completes processing its transaction and releases the IP address needed by other users
Question
A distributed denial of service (DDoS)attack

A)is more intensive that a DoS attack because it emanates from single source
B)may take the form of either a SYN flood or smurf attack
C)is so named because it effects many victims simultaneously, which are distributed across the Internet
D)turns the target victims' computers into zombies that are unable to access the Internet
Question
The client-server topology

A)increases the amount of data that is transmitted between the central file and the network node
B)eliminates the need for nodes to communicate with each other
C)reduces the number of records that must be locked by having the file server perform record searches
D)functions only with a ring and bus topology
Question
Sniffer software is

A)software used by malicious websites to sniff data from cookies stored on the user's hard drive
B)used by network administrators to analyze network traffic
C)used by bus topology intranets to sniff for a carrier before transmitting a message to avoid data collisions
D)an illegal program downloaded from the Internet to sniff passwords from the encrypted data of Internet customers
Question
What is spoofing?
Question
What is a URL?
Question
List at least five top-level domain names used in the United States and what they indicate.
Question
What are cookies and why are they used?
Question
When are a bridge and a gateway used to connect networks?
Question
Why is network control needed? What tasks are performed?
Question
What is a ping?
Question
Describe one disadvantage to carrier sensing as a network control method.
Question
What is an extranet?
Question
Describe an advantage to the client-server topology.
Question
Explain the parts of an e-mail address and give an example (your own?).
Question
Describe one primary advantage of polling as a network control method.
Question
Name the three types of addresses used on the Internet.
Question
What is an IRC?
Question
What is packet switching?
Question
Name the three parties involved in a smurf attack.
Question
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor.

A)computing-as-a-service
B)infrastructure-as-a-service
C)platform-as-a-service
D)software-as-a-service
Question
The provision of computing power and disk space to client firms who access it from desktop PCs is known as

A)computing-as-a-service
B)infrastructure-as-a-service
C)platform-as-a-service
D)software-as-a-service
Question
What is an IP address?
Question
HTTP

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/109
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Electronic Commerce Systems
1
Business-to-consumer is the largest segment of Internet commerce.
False
2
IP spoofing is a form of masquerading to gain unauthorized access to a web server.
True
3
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
True
4
A network topology is the physical arrangement of the components of the network.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
5
Cookies are files created by user computers and stored on web servers.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
6
Electronic commerce refers only to direct consumer marketing on the Internet.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
7
A bus topology is less costly to install than a ring topology.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
8
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
9
Sniffing is the unauthorized transmitting of information across an intranet.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
10
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
11
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
12
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
13
The rules that make it possible for users of networks to communicate are called protocols.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
14
The network paradox is that networks exist to provide user access to shared resources while one of their most important objectives is to control access.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
15
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
16
The client-server model can only be applied to ring and star topologies.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
17
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
18
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
19
The bus topology connects the nodes in parallel.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
20
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
21
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
22
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
23
The intermediary in a smurf attack is also a victim.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
24
The most frequent use of EDI is in making vendor payments.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
25
Cookies are created by the web server of a visited site and are stored on the hard drive of the visitor's computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
26
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A)LAN
B)decentralized network
C)multidrop network
D)intranet
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
27
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
28
Protocols

A)facilitate the physical connection between the network devices
B)synchronize the transfer of data between physical devices
C)provide a basis for error checking and measuring network performance
D)all of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
29
A virtual private network

A)is a password-controlled network for private users rather than the general public
B)is a private network within a public network
C)is an Internet facility that links user sites locally and around the world
D)defines the path to a facility or file on the web
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
30
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
31
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A)star topology
B)bus topology
C)ring topology
D)client/server topology
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
32
A ping signal is used to initiate

A)URL masquerading
B)digital signature forging
C)Internet protocol spoofing
D)a smurf attack
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
33
To physically connect a workstation to a LAN requires a

A)file server
B)network interface card
C)multiplexer
D)bridge
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
34
HTML controls web browsers that access the web.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
35
Polling is one technique used to control data collisions.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
36
Cloud computing is the technology that has unleashed virtualization.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
37
Network protocols fulfill all of the following objectives except

A)facilitate physical connection between network devices
B)provide a basis for error checking and measuring network performance
C)promote compatibility among network devices
D)creation of inflexible standards
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
38
EDI is the intercompany exchange of computer processible business information in standard format.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
39
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
40
Packet switching

A)combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B)is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C)is used to establish temporary connections between network devices for the duration of a communication session.
D)is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a garbled message.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
41
In a ring topology

A)the network consists of a central computer which manages all communications between nodes
B)a host is computer connected to several levels of subordinate computers
C)all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D)information processing units rarely communicate with each other
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
42
HTML

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
43
The primary difference between a LAN and a WAN is

A)the geographical area covered by the network
B)the transmission technology used
C)the type of workstation used
D)the size of the company
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
44
A message that is made to look as though it is coming from a trusted source but is not is called

A)a denial of service attack
B)digital signature forging
C)Internet protocol spoofing
D)URL masquerading
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
45
A digital signature is

A)the encrypted mathematical value of the message sender's name
B)derived from the digest of a document that has been encrypted with the sender's private key
C)the computed digest of the sender's digital certificate
D)a tool that allows digital messages to be sent over analog telephone lines
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
46
FTP

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
47
Which one of the following statements is correct?

A)Cookies always contain encrypted data.
B)Cookies are text files and never contain encrypted data.
C)Cookies contain the URLs of sites visited by the user.
D)Web browsers cannot function without cookies.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following statements is correct? The client-server model

A)is best suited to the token-ring topology because the random-access method used by this model detects data collisions
B)distributes both data and processing tasks to the server's node
C)is most effective used with a bus topology
D)is more efficient than the bus or ring topologies
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
49
In a star topology,when the central site fails

A)individual workstations can communicate with each other
B)individual workstations can function locally but cannot communicate with other workstations
C)individual workstations cannot function locally and cannot communicate with other workstations
D)the functions of the central site are taken over by a designated workstation
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
50
Which method does not manage or control data collisions that might occur on a network?

A)multiplexing
B)polling
C)carrier sensing
D)token passing
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
51
An IP address

A)defines the path to a facility or file on the web
B)is the unique address that every computer node and host attached to the Internet must have
C)is represented by a 64-bit data packet
D)is the address of the protocol rules and standards that govern the design of Internet hardware and software
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
52
NNTP

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following statements is correct about TCP/IP?

A)It is the basic protocol that permits communication between Internet sites.
B)It controls web browsers that access the Internet.
C)It is the file format used to produce web pages.
D)It is a low-level encryption scheme used to secure transmissions in HTTP format.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
54
All of the following are true about the Open System Interface (OSI)protocol except

A)within one node different layers communicate with other layers at that node
B)one protocol is developed and applied to all the OSI layers
C)specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D)layers at each node communicate logically with their counterpart layers across nodes
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
55
A star topology is appropriate

A)for a wide area network with a mainframe for a central computer
B)for centralized databases only
C)for environments where network nodes routinely communicate with each other
D)when the central database does not have to be concurrent with the nodes
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
56
In a ring topology,all of the following are true except

A)all nodes are of equal status
B)nodes manage private programs and databases locally
C)shared resources are managed by a file server which is a node on the ring
D)a central computer is designated to control traffic between the peers
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
57
IP spoofing

A)combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributed randomly among the targeted users
B)is a form of masquerading to gain unauthorized access to a web server
C)is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session
D)is a temporary phenomenon that disrupts transaction processing and resolves itself when the primary computer completes processing its transaction and releases the IP address needed by other users
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
58
A distributed denial of service (DDoS)attack

A)is more intensive that a DoS attack because it emanates from single source
B)may take the form of either a SYN flood or smurf attack
C)is so named because it effects many victims simultaneously, which are distributed across the Internet
D)turns the target victims' computers into zombies that are unable to access the Internet
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
59
The client-server topology

A)increases the amount of data that is transmitted between the central file and the network node
B)eliminates the need for nodes to communicate with each other
C)reduces the number of records that must be locked by having the file server perform record searches
D)functions only with a ring and bus topology
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
60
Sniffer software is

A)software used by malicious websites to sniff data from cookies stored on the user's hard drive
B)used by network administrators to analyze network traffic
C)used by bus topology intranets to sniff for a carrier before transmitting a message to avoid data collisions
D)an illegal program downloaded from the Internet to sniff passwords from the encrypted data of Internet customers
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
61
What is spoofing?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
62
What is a URL?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
63
List at least five top-level domain names used in the United States and what they indicate.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
64
What are cookies and why are they used?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
65
When are a bridge and a gateway used to connect networks?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
66
Why is network control needed? What tasks are performed?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
67
What is a ping?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
68
Describe one disadvantage to carrier sensing as a network control method.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
69
What is an extranet?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
70
Describe an advantage to the client-server topology.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
71
Explain the parts of an e-mail address and give an example (your own?).
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
72
Describe one primary advantage of polling as a network control method.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
73
Name the three types of addresses used on the Internet.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
74
What is an IRC?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
75
What is packet switching?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
76
Name the three parties involved in a smurf attack.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
77
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor.

A)computing-as-a-service
B)infrastructure-as-a-service
C)platform-as-a-service
D)software-as-a-service
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
78
The provision of computing power and disk space to client firms who access it from desktop PCs is known as

A)computing-as-a-service
B)infrastructure-as-a-service
C)platform-as-a-service
D)software-as-a-service
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
79
What is an IP address?
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
80
HTTP

A)is the document format used to produce web pages
B)controls web browsers that access the web
C)is used to connect to Usenet groups on the Internet
D)is used to transfer text files, programs, spreadsheets, and databases across the Internet
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 109 flashcards in this deck.