Podcast
Questions and Answers
Which business application involves creating a database and spreadsheet for inventory and customer profiles using Local Area Network?
Which business application involves creating a database and spreadsheet for inventory and customer profiles using Local Area Network?
- Applying accounting systems (correct)
- Advertising through search engine marketing
- Testing plan
- Sharing documents and sending emails
In an e-distributor's revenue model, which element is included?
In an e-distributor's revenue model, which element is included?
- Personalization (correct)
- Broker
- Portal
- Testing plan
Which security tool involves the use of two mathematically related digital keys?
Which security tool involves the use of two mathematically related digital keys?
- Attacks target gullible cell phone users with verbal messages to call a certain number
- The transformation of data into cipher text readable only by sender and receiver (correct)
- Unauthorized use of another person's personal data for illegal financial benefit
- Sender and receiver use the same digital key to encrypt and decrypt a message
What type of attack targets cell phone users with verbal messages to call a certain number and donate money under false pretenses?
What type of attack targets cell phone users with verbal messages to call a certain number and donate money under false pretenses?
Which term describes the unauthorized use of personal data for illegal financial benefit, such as social security numbers and credit card details?
Which term describes the unauthorized use of personal data for illegal financial benefit, such as social security numbers and credit card details?
Which e-commerce site design element describes the flow of information, processing functions, and databases used?
Which e-commerce site design element describes the flow of information, processing functions, and databases used?
What is one of the elements involved in an e-distributor's revenue model?
What is one of the elements involved in an e-distributor's revenue model?
Which security tool involves the sender and receiver using the same digital key to encrypt and decrypt a message?
Which security tool involves the sender and receiver using the same digital key to encrypt and decrypt a message?
Which type of attack involves the transformation of data into ciphertext readable only by the sender and receiver?
Which type of attack involves the transformation of data into ciphertext readable only by the sender and receiver?