Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 19
Quiz 12: Electronic Commerce Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
Question 22
Multiple Choice
A virtual private network:
Question 23
True/False
The intermediary in a smurf attack is also a victim.
Question 24
True/False
The most frequent use of EDI is in making vendor payments.
Question 25
True/False
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question 26
True/False
In a hierarchical topology, network nodes communicate with each other via a central host computer.
Question 27
True/False
Cloud computing is the technology that has unleashed virtualization.
Question 28
Multiple Choice
To physically connect a workstation to a LAN requires a
Question 29
True/False
HTML controls web browsers that access the web.
Question 30
Multiple Choice
Network protocols fulfill all of the following objectives except
Question 31
True/False
EDI is the inter-company exchange of computer processible business information in standard format.
Question 32
True/False
Polling is one technique used to control data collisions.
Question 33
Multiple Choice
Packet switching
Question 34
True/False
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Question 35
True/False
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is s and available on the network.
Question 36
Multiple Choice
Protocols
Question 37
True/False
The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder. To overcome this problem, private key encryption was devised.
Question 38
Multiple Choice
A ping signal is used to initiate
Question 39
Multiple Choice
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes.