Deck 12: Electronic Commerce Systems

Full screen (f)
exit full mode
Question
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
Use Space or
up arrow
down arrow
to flip the card.
Question
Electronic commerce refers only to direct consumer marketing on the Internet.
Question
Sniffing is the unauthorized transmitting of information across an Intranet.
Question
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
Question
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Question
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
Question
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
Question
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
Question
Cookies are files created by user computers and stored on Web servers.
Question
The client-server model can only be applied to ring and star topologies.
Question
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Question
A network topology is the physical arrangement of the components of the network.
Question
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
Question
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Question
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Question
The rules that make it possible for users of networks to communicate are called protocols.
Question
Business to consumer is the largest segment of Internet commerce.
Question
The bus topology connects the nodes in parallel.
Question
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Question
A bus topology is less costly to install than a ring topology.
Question
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Question
Polling is one technique used to control data collisions.
Question
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
Question
Cloud computing is the technology that has unleashed virtualization.
Question
A virtual private network:

A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
Question
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
The most frequent use of EDI is in making vendor payments.
Question
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Question
EDI is the inter-company exchange of computer processible business information in standard format.
Question
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
Question
The intermediary in a smurf attack is also a victim.
Question
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Question
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
A ping signal is used to initiate

A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
Question
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Question
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A) star topology
B) bus topology
C) ring topology
D) client/server topology
Question
Packet switching

A) combines the messages of multiple users into one packet for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
Question
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
Question
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
Question
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
Question
An IP Address:

A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
Question
NNTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level (HTTP)format.
Question
All of the following are true about the Open System Interface (OSI)protocol except

A) within one node different layers communicate with other layers at that node
B) one protocol is developed and applied to all the OSI layers
C) specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D) layers at each node communicate logically with their counterpart layers across nodes
Question
Which method does not manage or control data collisions that might occur on a network?

A) multiplexing
B) polling
C) carrier sensing
D) token passing
Question
IP spoofing

A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
Question
A message that is made to look as though it is coming from a trusted source but is not is called

A) a denial of service attack
B) digital signature forging
C) Internet protocol spoofing
D) URL masquerading
Question
The client/server technology

A) increases the amount of data that is transmitted between the central file and the network node
B) eliminates the need for nodes to communicate with each other
C) reduces the number of records that must be locked by having the file server perform record searches
D) functions only with a ring and bus topology
Question
Which one of the following statements is correct?

A) Cookies always contain encrypted data.
B) Cookies are text files and never contain encrypted data.
C) Cookies contain the URLs of sites visited by the user.
D) Web browsers cannot function without cookies.
Question
Sniffer software is

A) software used by malicious Web sites to sniff data from cookies stored on the user's hard drive
B) used by network administrators to analyze network traffic
C) used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
D) illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
Question
A digital signature is

A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines
Question
In a ring topology

A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
Question
In a ring topology

A) all nodes are of equal status
B) nodes manage private programs and databases locally
C) shared resources are managed by a file server which is a node on the ring
D) all of the above
Question
A distributed denial of service (DDoS)attack

A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously,which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct
Question
Which of the following statements is correct? The client-server model

A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.
Question
FTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
Question
The primary difference between a LAN and a WAN is

A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
Question
A star topology is appropriate

A) for a wide area network with a mainframe for a central computer
B) for centralized databases only
C) for environments where network nodes routinely communicate with each other
D) when the central database does not have to be concurrent with the nodes
Question
Which of the following statements is correct? TCP/IP

A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
Question
HTML

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
Question
In a star topology,when the central site fails

A) individual workstations can communicate with each other
B) individual workstations can function locally but cannot communicate with other workstations
C) individual workstations cannot function locally and cannot communicate with other workstations
D) the functions of the central site are taken over by a designated workstation
Question
Describe an advantage to the client/server topology.
Question
What is an extranet?
Question
When are a bridge and with a gateway used to connect networks?
Question
What is a URL?
Question
The provision of computing power and disk space to client firms who access it from desktop PCs is known as

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
Question
What is spoofing?
Question
Describe one primary advantage of polling as a network control method.
Question
What is a ping?
Question
List at least five top-level domain names used in the United States.
Question
What are cookies and why are they used?
Question
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor.

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
Question
Which of the following statements is correct?

A) Packet switching combines the messages of multiple users into a "packet" for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) The decision to partition a database assumes that no identifiable primary user exists in the organization.
C) Packet switching is used to establish temporary connections between network devices for the duration of a communication session.
D) A deadlock is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.
Question
HTTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
Question
Which of the following is not a key feature of cloud computing?

A) Acquisition of resources is rapid and infinitely scalable.
B) Client firms can acquire IT resources from vendors on demand and as needed.
C) Computing resources are pooled to meet the needs of multiple client firms.
D) Individual clients have control over the physical location of the service being provided.
Question
Explain the parts of an e-mail address and give an example (your own?).
Question
What is an IRC?
Question
What is packet switching?
Question
Name the three parties involved in a smurf attack.
Question
What is an IP address?
Question
Name the three types of addresses used on the Internet.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/111
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Electronic Commerce Systems
1
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
True
2
Electronic commerce refers only to direct consumer marketing on the Internet.
False
3
Sniffing is the unauthorized transmitting of information across an Intranet.
False
4
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
5
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
6
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
7
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
8
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
9
Cookies are files created by user computers and stored on Web servers.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
10
The client-server model can only be applied to ring and star topologies.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
11
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
12
A network topology is the physical arrangement of the components of the network.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
13
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
14
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
15
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
16
The rules that make it possible for users of networks to communicate are called protocols.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
17
Business to consumer is the largest segment of Internet commerce.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
18
The bus topology connects the nodes in parallel.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
19
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
20
A bus topology is less costly to install than a ring topology.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
21
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
22
Polling is one technique used to control data collisions.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
23
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
24
Cloud computing is the technology that has unleashed virtualization.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
25
A virtual private network:

A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
26
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
27
The most frequent use of EDI is in making vendor payments.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
28
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
29
EDI is the inter-company exchange of computer processible business information in standard format.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
30
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
31
The intermediary in a smurf attack is also a victim.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
32
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
33
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
34
A ping signal is used to initiate

A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
35
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
36
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A) star topology
B) bus topology
C) ring topology
D) client/server topology
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
37
Packet switching

A) combines the messages of multiple users into one packet for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
38
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
39
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
40
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
41
An IP Address:

A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
42
NNTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level (HTTP)format.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
43
All of the following are true about the Open System Interface (OSI)protocol except

A) within one node different layers communicate with other layers at that node
B) one protocol is developed and applied to all the OSI layers
C) specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D) layers at each node communicate logically with their counterpart layers across nodes
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
44
Which method does not manage or control data collisions that might occur on a network?

A) multiplexing
B) polling
C) carrier sensing
D) token passing
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
45
IP spoofing

A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
46
A message that is made to look as though it is coming from a trusted source but is not is called

A) a denial of service attack
B) digital signature forging
C) Internet protocol spoofing
D) URL masquerading
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
47
The client/server technology

A) increases the amount of data that is transmitted between the central file and the network node
B) eliminates the need for nodes to communicate with each other
C) reduces the number of records that must be locked by having the file server perform record searches
D) functions only with a ring and bus topology
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
48
Which one of the following statements is correct?

A) Cookies always contain encrypted data.
B) Cookies are text files and never contain encrypted data.
C) Cookies contain the URLs of sites visited by the user.
D) Web browsers cannot function without cookies.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
49
Sniffer software is

A) software used by malicious Web sites to sniff data from cookies stored on the user's hard drive
B) used by network administrators to analyze network traffic
C) used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
D) illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
50
A digital signature is

A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
51
In a ring topology

A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
52
In a ring topology

A) all nodes are of equal status
B) nodes manage private programs and databases locally
C) shared resources are managed by a file server which is a node on the ring
D) all of the above
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
53
A distributed denial of service (DDoS)attack

A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously,which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following statements is correct? The client-server model

A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
55
FTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
56
The primary difference between a LAN and a WAN is

A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
57
A star topology is appropriate

A) for a wide area network with a mainframe for a central computer
B) for centralized databases only
C) for environments where network nodes routinely communicate with each other
D) when the central database does not have to be concurrent with the nodes
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following statements is correct? TCP/IP

A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
59
HTML

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
60
In a star topology,when the central site fails

A) individual workstations can communicate with each other
B) individual workstations can function locally but cannot communicate with other workstations
C) individual workstations cannot function locally and cannot communicate with other workstations
D) the functions of the central site are taken over by a designated workstation
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
61
Describe an advantage to the client/server topology.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
62
What is an extranet?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
63
When are a bridge and with a gateway used to connect networks?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
64
What is a URL?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
65
The provision of computing power and disk space to client firms who access it from desktop PCs is known as

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
66
What is spoofing?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
67
Describe one primary advantage of polling as a network control method.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
68
What is a ping?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
69
List at least five top-level domain names used in the United States.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
70
What are cookies and why are they used?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
71
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor.

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following statements is correct?

A) Packet switching combines the messages of multiple users into a "packet" for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) The decision to partition a database assumes that no identifiable primary user exists in the organization.
C) Packet switching is used to establish temporary connections between network devices for the duration of a communication session.
D) A deadlock is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
73
HTTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is not a key feature of cloud computing?

A) Acquisition of resources is rapid and infinitely scalable.
B) Client firms can acquire IT resources from vendors on demand and as needed.
C) Computing resources are pooled to meet the needs of multiple client firms.
D) Individual clients have control over the physical location of the service being provided.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
75
Explain the parts of an e-mail address and give an example (your own?).
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
76
What is an IRC?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
77
What is packet switching?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
78
Name the three parties involved in a smurf attack.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
79
What is an IP address?
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
80
Name the three types of addresses used on the Internet.
Unlock Deck
Unlock for access to all 111 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 111 flashcards in this deck.