Accounting: Electronic Commerce Systems

Only available on StudyMode
  • Download(s) : 142
  • Published : January 28, 2013
Open Document
Text Preview
-------------------------------------------------
Chapter 12—Electronic Commerce Systems

TRUE/FALSE

1.Because of network protocols, users of networks built by different manufacturers are able to communicate and share data.

ANS:T

2.Electronic commerce refers only to direct consumer marketing on the Internet.

ANS:F

3.Business to consumer is the largest segment of Internet commerce.

ANS:F

4.The phrase “.com” has become an Internet buzz word. It refers to a top-level domain name for communications organizations.

ANS:F

5.The standard format for an e-mail address is DOMAIN NAME@USER NAME.

ANS:F

6.The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.

ANS:T

7.Business risk is the possibility of loss or injury that can reduce or eliminate an organization’s ability to achieve its objectives.

ANS:T

8.IP spoofing is a form of masquerading to gain unauthorized access to a Web server.

ANS:T

9.The rules that make it possible for users of networks to communicate are called protocols.

ANS:T

10.A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.

ANS:T

11.Cookies are files created by user computers and stored on Web servers.

ANS:F

12.Sniffing is the unauthorized transmitting of information across an Intranet.

ANS:F

APPENDIX QUESTION

13.The client-server model can only be applied to ring and star topologies.

ANS:F

14.The most popular topology for local area networks is the bus topology.

ANS:T

15.A network topology is the physical arrangement of the components of the network.

ANS:T

16.A bus topology is less costly to install than a ring topology.

ANS:T

17.In a hierarchical topology, network nodes communicate with each other via a central host computer.

ANS:T

18.Polling is one technique used to control data collisions.

ANS:T

19.The most frequent use of EDI is in making vendor payments.

ANS:F

20.EDI is the inter-company exchange of computer processible business information in standard format.

ANS:T

MULTIPLE CHOICE

APPENDIX QUESTION

1.The primary difference between a LAN and a WAN is
a.| the geographical area covered by the network|
b.| the transmission technology used|
c.| the type of workstation used|
d.| the size of the company|

ANS:A

2.To physically connect a workstation to a LAN requires a a.| file server|
b.| network interface card|
c.| multiplexer|
d.| bridge|

ANS:B

3.One advantage of network technology is
a.| bridges and gateways connect one workstation with another workstation| b.| the network interface card permits different networks to share data| c.| file servers permit software and data to be shared with other network users| d.| a universal topology facilitates the transfer of data among networks|

ANS:C

4.Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes. a.| star topology|

b.| bus topology|
c.| ring topology|
d.| client/server topology|

ANS:A

5.In a star topology, when the central site fails
a.| individual workstations can communicate with each other| b.| individual workstations can function locally but cannot communicate with other workstations| c.| individual workstations cannot function locally and cannot communicate with other workstations| d.| the...
tracking img