System Analysis and Design

571. EDI requires

  1. representation of common business documents in computer readable form
  2. data entry operators by receivers
  3. special value added networks
  4. special hardware at co-operating Business premises
Correct answer: (A)
representation of common business documents in computer readable form

572. EDI standard

  1. is not easily available
  2. defines several hundred transaction sets for various business forms
  3. is not popular
  4. defines only a transmission protocol
Correct answer: (B)
defines several hundred transaction sets for various business forms

573. Proxy application gateway

  1. acts on behalf of all intranet users wanting to access internet securely
  2. monitors all accesses to internet and allows access to only specified IP'addresses
  3. disallows use of certain protocols with security problems
  4. disallows all internet users from accessing intranet
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Correct answer: (B)
i, ii, iii

574. The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character ±3 (A → D, etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC

  1. MAIGAIUESNZ
  2. IAMAGENIUSZ
  3. LDPDJHPLXVZ
  4. IAMAGENIUSC
Correct answer: (B)
IAMAGENIUSZ

575. Triple DES uses

  1. 168 bit keys on 64-bit blocks of plain text
  2. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
  3. Works with 144 bit blocks of plain text and applies DES algorithm once.
  4. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.
Correct answer: (B)
Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.

576. A digital signature is required

  1. to tie an electronic message to the sender's identity
  2. for non repudiation of communication by a sender
  3. to prove that a message was sent by the sender in a court of law
  4. in all e-mail transactions
  1. i and ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Correct answer: (B)
i, ii, iii

577. In electronic cheque payments developed, it is assumed that most of the transactions will be

  1. customers to customers
  2. customers to business
  3. business to business
  4. banks to banks
Correct answer: (C)
business to business

578. EDI standards are

  1. not universally available
  2. essential for B2B commerce
  3. not required for B2B commerce
  4. still being evolved
Correct answer: (B)
essential for B2B commerce

579. EDI over internet uses

  1. MIME to attach EDI forms to e-mail messages
  2. FTP to send business forms
  3. HTTP to send business forms
  4. SGML to send business forms
Correct answer: (A)
MIME to attach EDI forms to e-mail messages

580. Main function of proxy application gateway firewall is

  1. to allow corporate users to use efficiently all internet services
  2. to allow intranet users to securely use specified internet services
  3. to allow corporate users to use all internet services
  4. to prevent corporate users from using internet services
Correct answer: (B)
to allow intranet users to securely use specified internet services
Page 58 of 61