By open domain CASE tools we mean
1.tools available in open domain
2.software packages which can be downloaded form the internet
3.software packages to aid each phase of the systems analysis and design which can be downloaded free of cost from the internet
4.source codes of CASE tools
Posted Date:-2021-12-10 04:03:59
By symmetric key encryption we mean
1.one private key is used for both encryption and decryption
2.private and public key used are symmetric
3.only public keys are used for encryption
4.only symmetric key is used for encryption
Posted Date:-2021-12-10 03:25:45
Certification of Digital signature by an independent authority is needed because
1.it is safe
2.it gives confidence to a business
3.the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
4.private key claimed by a sender may not be actually his
Posted Date:-2021-12-10 03:47:51
EDI over internet uses
1.MIME to attach EDI forms to e-mail messages
2.FTP to send business forms
3.HTTP to send business forms
4.SGML to send business forms
Posted Date:-2021-12-10 03:22:30
EDI standard
1.is not easily available
2.defines several hundred transaction sets for various business forms
3.is not popular
4.defines only a transmission protocol
Posted Date:-2021-12-10 03:20:37
EDI standards are
1.not universally available
2.essential for B2B commerce
3.not required for B2B commerce
4.still being evolved
Posted Date:-2021-12-10 03:22:07
EDIFACT is a standard
1.for representing business forms used in e-Commerce
2.for e-mail transaction for e-Commerce
3.for ftp in e-Commerce
4.protocol used in e-Commerce
Posted Date:-2021-12-10 03:24:58
For secure EDI transmission on internet/p>
1.MIME is used
2.S/MIME is used
3.PGP is used
4.TCP/IP is used
Posted Date:-2021-12-10 03:25:21
In cheque payment protocol, the purchase order form is signed by purchaser using
1.his public key
2.his private key
3.is private key using his signature hardware
4.various public keys
Posted Date:-2021-12-10 03:23:45
In electronic cheque payments developed, it is assumed that most of the transactions will be
1.customers to customers
2.customers to business
3.business to business
4.banks to banks
Posted Date:-2021-12-10 03:21:42
In public key encryption system if A encrypts a message using his private key and sends it to B
1.if B knows it is from A he can decrypt it using A's public key
2.Even if B knows who sent the message it cannot be decrypted
3.It cannot be decrypted at all as no one knows A's private key
4.A should send his public key with the message
Posted Date:-2021-12-10 03:43:14
In SET protocol a customer encrypts credit card number using
1.his private key
2.bank's public key
3.bank's private key
4.merchant's public key
Posted Date:-2021-12-10 03:48:22
Main function of proxy application gateway firewall is
1.to allow corporate users to use efficiently all internet services
2.to allow intranet users to securely use specified internet services
3.to allow corporate users to use all internet services
4.to prevent corporate users from using internet services
Posted Date:-2021-12-10 03:22:53
Open domain CASE tools
1.are available for almost all phases of system analysis and design life cycle
2.are available only for drawing DFD's
3.are no available to document SRS
4.creating data dictionaries
Posted Date:-2021-12-10 04:02:51
Public key system is useful because
1.it uses two keys
2.there is no key distribution problem as public key can be kept in a commonly accessible database
3.private key can be kept secret
4.it is a symmetric key system
Posted Date:-2021-12-10 03:26:09
The acronym DES stands for
1.Digital Evaluation System
2.Digital Encryption Standard
3.Digital Encryption System
4.Double Encryption Standard
Posted Date:-2021-12-10 03:26:57
The expansion of CASE tools is:
1.Computer Assisted Self Evaluation
2.Computer Aided Software Engineering
3.Computer Aided Software Environment
4.Core Aids for Software Engineering
Posted Date:-2021-12-10 04:02:14
The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character ±3 (A → D, etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC
1.MAIGAIUESNZ
2.IAMAGENIUSZ
3.LDPDJHPLXVZ
4.IAMAGENIUSC
Posted Date:-2021-12-10 03:20:59
The responsibility of a certification authority for digital signature is to authenticate the
1.hash function used
2.private keys of subscribers
3.public keys of subscribers
4.key used in DES
Posted Date:-2021-12-10 03:26:32
Triple DES uses
1.168 bit keys on 64-bit blocks of plain text
2.Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
3.Works with 144 bit blocks of plain text and applies DES algorithm once.
4.Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.
Posted Date:-2021-12-10 03:21:21