Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 2MCQ
To determine
Identify the code which is described in the form of acronyms.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
A digital signaturea. is the encrypted mathematical value of the message sender’s name.b. is derived from the digest of a document that has been encrypted with the sender’s private key.c. is derived from the digest of a document that has been encrypted with the sender’s public key.d. is the computed digest of the sender’s digital certificate.e. allows digital messages to be sent over an analog telephone line.
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL masquerading.e. a SYN-ACK packet.
A ping signal is used to initiate a. URL masquerading. b. digital signature forging. c. Internet protocol spoofing. d. a smurf attack e. a SYN-ACK packet.
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 21RQCh. 12 - Prob. 22RQCh. 12 - Prob. 23RQCh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - What is a digital envelope?Ch. 12 - Prob. 13DQCh. 12 - Prob. 14DQCh. 12 - Prob. 15DQCh. 12 - Prob. 16DQCh. 12 - Prob. 17DQCh. 12 - Prob. 18DQCh. 12 - Prob. 19DQCh. 12 - Prob. 1MCQCh. 12 - Prob. 2MCQCh. 12 - Prob. 3MCQCh. 12 - Prob. 4MCQCh. 12 - Prob. 5MCQCh. 12 - Prob. 6MCQCh. 12 - Prob. 7MCQCh. 12 - A system of computers that connects the internal...Ch. 12 - Prob. 9MCQCh. 12 - Prob. 10MCQCh. 12 - Prob. 1PCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6PCh. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - Prob. 8P
Knowledge Booster
Similar questions
- A control designed to validate a transaction at the point of data entry is a. recalculation of a batch total. b. a record count. c. a check digit. d. checkpoints. e. recalculation of hash total.arrow_forwardInternal control is enhanced by separating the control of a transaction from the record-keeping function. True Falsearrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forward
- In a hashing structurea. two records can be stored at the same address.b. pointers are used to indicate the location of all records.c. pointers are used to indicate location of a record with the same address as another record.d. all locations on the disk are used for record storage.arrow_forwardWhich of the following statements is correct? a. TCP/IP is the basic protocol that permits communication between Internet sites. b. TCP/IP controls Web browsers that access the Web. c. TCP/IP is the document format used to produce Web pages. d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.arrow_forwardWhich of the following statements regarding authentication in conducting e-business is incorrect? Multiple Choice It is a process that establishes the origin of information or determines the identity of a user, process, or device We need to use asymmetric-key encryption to authenticate the sender of a document or data set Only one key is used for encryption and decryption purposes in the authentication process. Successful authentication can prevent repudiation in electronic transactions.arrow_forward
- Categorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forwardWhich ways do malicious parties use side-channel type attacks to trick users into believing a certificate is issued by a trusted CA, but isn’t?arrow_forwardWhat type of internal control is verifying source documents before recording transactions?arrow_forward
- What type of internal control is matching supporting documents before paying an invoice?arrow_forwardWhich of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forwardBriefly describe record counts, batch totals, and hash totals. What types of errors in input wouldeach of these controls likely identify?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub