1.____ refers to preventing data delays or denials.
- Integrity
- Secrecy
- Necessity
- Readiness
Question 2____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
- Necessity
- Secrecy
- Integrity
- Encryption
Question 3A(n) ____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
- objective
- Java++
- ActiveX control
- plug-in
Question 4____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
- Action page
- Active content
- Dynamic content
- Activity control
Question 5Java is a programming language developed by ____.
- Microsoft
- IBM
- Oracle
- Sun Microsystems
Question 6ActiveX controls run only on computers with ____ operating systems.
Question 7A(n) ____ is a person or device that is able to listen in on and copy Internet transmissions.
- eavesdropper
- surveillor
- dropper
- listener
Question 8____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
- Hash coding
- Symmetric
- Asymmetric
- Transformative
Question 9Any act or object that poses a danger to computer assets is known as a ____.
- problem
- concern
- threat
- risk
Question 10The purpose of a(n) ____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
- ACL
- digital ID
- Web bug
- gateway server
Question 11Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded ____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
- ID tags
- serial numbers
- reference numbers
- origination numbers
Question 12Internet payments for items costing from a few cents to approximately a dollar are called ____.
- minipayments
- micropayments
- minitransactions
- microtransactions
Question 13Some companies have begun to offer small payment and micropayment services through ____ telephone carriers.
- Internet-based
- specialized
- land-line
- mobile
Question 14____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
- Double spending
- Fraudulent spending
- Double shopping
- Illegal shopping
Question 15.One way to be able to trace electronic cash is to attach a ____ to each electronic cash transaction.
- name
- digital certificate
- serial number
- watermark
Question 16 ____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
- Pharming
- Identity theft
- Due diligence
- Money laundering
Question 17What payment method dominates online transactions today?
- scrip
- credit and debit cards
- gift cards and certificates
- electronic transfers
Question 18The free payment clearing service that PayPal provides to individuals is called a ____ payment system.
- peer-to-peer
- virtual
- B2C
- B2B
Question 19A disadvantage of ____ wallets is that they are not portable.
- server-side
- client-side
- Paypal
- virtual
Question 20A ____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
- credit card
- charge card
- debit card
- smart card