The authenticity of the data source


1.____ refers to preventing data delays or denials.

  • Integrity
  • Secrecy
  • Necessity
  • Readiness

 

Question 2____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

  • Necessity
  • Secrecy
  • Integrity
  • Encryption

Question 3A(n) ____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

  • objective
  • Java++
  • ActiveX control
  • plug-in

Question 4____ refers to programs that are embedded transparently in Web pages and that cause action to occur.

  • Action page
  • Active content
  • Dynamic content
  • Activity control

Question 5Java is a programming language developed by ____.

  • Microsoft
  • IBM
  • Oracle
  • Sun Microsystems

Question 6ActiveX controls run only on computers with ____ operating systems.

  • Windows
  • Linux
  • UNIX
  • Mac

Question 7A(n) ____ is a person or device that is able to listen in on and copy Internet transmissions.

  • eavesdropper
  • surveillor
  • dropper
  • listener

Question 8____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.

  • Hash coding
  • Symmetric
  • Asymmetric
  • Transformative

Question 9Any act or object that poses a danger to computer assets is known as a ____.

  • problem
  • concern
  • threat
  • risk

Question 10The purpose of a(n) ____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

  • ACL
  • digital ID
  • Web bug
  • gateway server

Question 11Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded ____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.

  • ID tags
  • serial numbers
  • reference numbers
  • origination numbers

Question 12Internet payments for items costing from a few cents to approximately a dollar are called ____.

  • minipayments
  • micropayments
  • minitransactions
  • microtransactions

Question 13Some companies have begun to offer small payment and micropayment services through ____ telephone carriers.

  • Internet-based
  • specialized
  • land-line
  • mobile

Question 14____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.

  • Double spending
  • Fraudulent spending
  • Double shopping
  • Illegal shopping

Question 15.One way to be able to trace electronic cash is to attach a ____ to each electronic cash transaction.

  • name
  • digital certificate
  • serial number
  • watermark

Question 16 ____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

  • Pharming
  • Identity theft
  • Due diligence
  • Money laundering

Question 17What payment method dominates online transactions today?

  • scrip
  • credit and debit cards
  • gift cards and certificates
  • electronic transfers

Question 18The free payment clearing service that PayPal provides to individuals is called a ____ payment system.

  • peer-to-peer
  • virtual
  • B2C
  • B2B

Question 19A disadvantage of ____ wallets is that they are not portable.

  • server-side
  • client-side
  • Paypal
  • virtual

Question 20A ____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.

  • credit card
  • charge card
  • debit card
  • smart card

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: The authenticity of the data source
Reference No:- TGS0534242

Expected delivery within 24 Hours