You are on page 1of 5

1.

The process of distributing, buying, selling, marketing, and servicing products and

services over computer networks such as the internet

a. Electronic commerce***

b. Packet Switching

c. Protocol

d. Extranet

2. It permits communication between internet sites. Controls how individual packets

of data are formatted, transmitted and received.

a) File transfer protocol (FTP)

b) Hyper-text markup language (HTML)

c) Transfer control protocol/Internet protocol (TCP/IP)***

d) File transfer protocol (FTP)

3. An Intranet would be used in a company for security purposes, so that others

outside that network would not be able to view company records.

a) True***

b) False

4. FTP stands for File Transfer Protocol and describes the transferring of a file from one

computer to another.

a) True***

b) False

5. Selling frozen foods online would be an excellent example of a successful e-Commerce

business.

a) True

b) False***

6. A transaction that occurs when one business transmits computer-readable data in an


agreed-upon format to another business.

a) Value Added Network (VAN)

b) EDI***

c) Internet Service Provider (ISP)

d) Transaction processing

7. An assault on a web server to prevent it from servicing users

a) SYN flood attack

b) Smurf attack

c) Digital signature

d) Denial of service (DoS) attack***

8. processes that gather data on you and your behavior to provide personalized

service; this may raise ethical issues

a) Profiling and Personalizing***

b) Access Control and Security

c) e-Commerce Technologies

d) certification authority

9. a variety of information technologies to capture and process money/credit

transfers between banks, businesses, and customers

a) Secure Electronic Payments

b) Web Payment Processes

c) Electronic Funds Transfer (EFT)***

d) Internet Service Provider (ISP)

10. An electronic authentication technique that ensures transmitted messages

originated with authorized sender was not tampered with after signature applies.

a) certification authority
b) Digital certificate

c) Digital signature***

d) Recognition certificate

11. This benefit of EDI reduces the lag time that promotes inventory accumulation.

a. Data keying

b. Inventory Reduction 🥀

c. Postage

12. This Benefit of EDI which mailed documents are replace with much cheaper data transmissions

a. Postage 🥀

b. Inventory Reduction

c. Automated Procedures

13. This benefit of EDI which firms using EDI see reductions in data keying errors, human interpretation
and classification errors, and lost documents.

a. Postage

b. Data Keying

c. Error reduction 🥀

14. Refers to a EDI Automates manual activities associated with purchasing, sales order processing , cash
disbursement and cash receipts.

a. Procedures

b. Reductions of papers

c. Automated Procedures 🥀
15 This refers to reduces drastically the forms in the system like the use of electronic envelopes and
documents.

a. Reduction of papers 🥀

b. Overload papers

c. Error reduction

16. Password controlled network for private users includes those outside your own network

a. Internet

b. Extranet 🥀

c. Website

17. Text document created with embedded HTML codes that provide formatting for the page and
hypertext links to other pages

HTML - Hypertext Markup Language

a. webpage 🥀

b. web browser

c. extranet

18. Web pages maintained at websites which are computer servers that support HTTP (Hypertext
Transfer Protocol)

a. webpage

b. website 🥀

c. Protocols

19. Use to access a website using a URL (Uniform Resource Locator)

The website address

a. website
b. file transfer protocol

c. webrowser 🥀

20. Rules and standards governing the design of hardware and software that permit users of the
networks to communicate and share data

a. Automated process

b. Protocol 🥀

c. File transfer protocol

You might also like