Internet & Web Technology
Internet & Web Technology
6. A attaches itself to executable files and replicates, when the infected program is executed,
by finding other executable files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
7. A packef.filter firewall filters at the
A. application or transport
B. data link layer
C. physical
D. network or transport layer
12. Electronic Data Interchange, or EDI, uses which of the following to allow the computers of two
different companies to 'talk' to one another?
A. Application software
B. Interaction software
C. Translation software
D. None of the above
14. What is the name for direct computer-to-computer transfer of transaction information contained in
standard business documents?
A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
18. What is the name given to an interactive business providing a centralized market where many buyers
and suppliers can come together for e-commerce or commerce-related activities?
a. Direct marketplace
b. B2B
c. B2C
d. Electronic marketplace
Answer: D
21. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing
private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Answer: D
22. Which of the following is an Internet-based company that makes it easy for one person to pay
another over the Internet?
a. electronic check
b. electronic bill presentment and payment
c. conversion rates
d. financial cybermediary
23. The responsibility of a certification authority for digital signature is to authenticate the
a. hash function used
b. private keys of subscribers
c. public keys of subscribers
d. key used in DES
24. In electronic cheque payments developed, it is assumed that most of the transactions will be
a. customers to customers
b. customers to business
c. business to business
d. banks to banks
4. What is an internal organizational Internet that is guarded against outside access by a special security
feature called a firewall (which can be software, hardware, or a combination of the two)?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client
Answer: B
5. What is the use of physical characteristics such as your fingerprint, the blood vessels in the retina of
your eye, the sound of your voice, or perhaps even your breath to provide identification?
a. Backup
b. Anti-virus
c. Firewall
d. Biometrics
Answer: D
6. For carrying out B2B e-Commerce the following infrastructure is essential: (i) World Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
(v)Secure electronic communication link connecting businesses
a. i, ii, iii
b. ii, iii, iv
c. ii, iii, iv, v
d. i, ii, iii, iv, v
7. For carrying out B2C e-Commerce the following infrastructure is essential (i) World Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
(v) Secure electronic communication link connecting businesses
a. i, iv
b. i, iii, iv
c. ii, iii
d. i, ii, iii, iv
8. In B2B e-Commerce
(i) Co-operating Business should give an EDI standard to be used
(ii) Programs must be developed to translate EDI forms to a form accepted by application program
(iii) Method of transmitting/receiving data should be mutually agreed
(iv) It is essential to use internet
a. i, ii
b. i, ii, iii
c. i, ii, iii, iv
d. ii, iii, iv
14. A firewall is a
a. wall built to prevent fires from damaging a corporate intranet
b. security device deployed at the boundary of a company to prevent unauthorized physical access
c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized
access
d. device to prevent all accesses from the internet to the corporate intranet
15. In electronic cheque payments developed, it is assumed that most of the transactions will be
a. customers to customers
b. customers to business
c. business to business
d. banks to banks
TEN MARK QUESTIONS
1. Express how business transactions take part in EDI.