E-commerce 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Andjelarakic85
A
Andjelarakic85
Community Contributor
Quizzes Created: 4 | Total Attempts: 3,651
| Attempts: 610 | Questions: 131
Please wait...
Question 1 / 131
0 %
0/100
Score 0/100
1. Digitalni Cash naziva se jos:

Explanation

The correct answer is E-cash. Digitalni Cash is also known as E-cash.

Submit
Please wait...
About This Quiz
E-commerce 2 - Quiz

The 'E-commerce 2' quiz assesses knowledge of online commerce, focusing on subscription models, secure transaction protocols, and online trade development methods including social media. It evaluates understanding of... see moree-commerce security and financial intermediaries' interests in payment systems. see less

2. Sto se obrazovanja tice, ko predstavlja najmanji broj korisnika elektronske trgovine:

Explanation

The correct answer is "Nizi od srednje skole" because it means "Lower than high school" in English. This suggests that the smallest number of e-commerce users are those with an education level below high school.

Submit
3. Amazon.com, danas najpoznatija kompanija iz oblasti elektronske trgovine svoj posao zapocela je prodajom:

Explanation

Amazon.com, the most well-known company in the field of e-commerce, started its business by selling books. This is significant because it highlights the origins of Amazon as an online bookstore and how it has since expanded into various other product categories. Selling books was the foundation of Amazon's success and paved the way for its growth into the global retail giant it is today.

Submit
4. Elektronska trgovina podrazumeva:

Explanation

The correct answer is "Kupovinu ili prodaju proizvoda i usluga preko bilo kog elektronskog medijuma." This answer accurately defines elektronska trgovina as the buying or selling of products and services through any electronic medium. It encompasses the concept of conducting commercial transactions online, whether it be through websites, mobile apps, or other electronic platforms. This definition excludes the other options provided, such as B2E type internet portals, implemented BI solutions, and the existence of offline stores, as they are not directly related to the concept of elektronska trgovina.

Submit
5. Sta jos dodatno obezbedjuje servis autentikacije:

Explanation

The correct answer is "Obezbedjuje autentifikaciju putem digitalnog potpisa." This means that the authentication service provides authentication through a digital signature. A digital signature is a cryptographic mechanism that ensures the integrity and authenticity of digital documents or messages. It uses a private key to sign the document and a public key to verify the signature, providing a secure way to authenticate the sender and verify the integrity of the message.

Submit
6. Kupovina ili prodaja proizvoda i usluga preko bilo kog elektronskog medijuma predstavlja:

Explanation

The correct answer is "Elektronsku trgovinu" because buying or selling products and services through any electronic medium is commonly referred to as electronic commerce or e-commerce. This involves online transactions, such as purchasing goods from an online store or booking services through a website.

Submit
7. U kojoj vrsti trgovine je veci procenat transakcija u kojima je doslo do povrata novca:

Explanation

The correct answer is "U trgovini preko interneta." This is because in online commerce, customers often have the option to return or exchange products more easily compared to traditional brick-and-mortar stores. Online retailers usually have customer-friendly return policies, allowing customers to return items within a certain period for a refund or exchange. This convenience leads to a higher percentage of transactions involving money returns in online commerce compared to traditional retail stores.

Submit
8. Nakon kreiranja PayPal naloga popunjavanjem formulara sa podacima o kreditnoj kartici i racunu u banci, da li trgovac ima pristup svim podacima:

Explanation

The correct answer is "Samo PayPal ima pristup ovim informacijama, a ne i strana koja prima novac." This means that only PayPal has access to the information provided during the creation of the PayPal account, including the credit card and bank account details. The recipient of the money does not have access to this information.

Submit
9. Sta predstavlja Electronic Billing Presentation and Payment:

Explanation

The correct answer is "Novi nacin platnih sistema za mesecne racune." This suggests that Electronic Billing Presentation and Payment represents a new way of payment systems for monthly bills.

Submit
10. Sta treba da uradi korisnik ako je adresa koja se nalazi na sertifikatu razlicita od stvarne adrese URL i na to ga upozori pretrazivac (browser):

Explanation

If the address on the certificate is different from the actual URL and the browser warns the user, the user should abandon accessing such a website.

Submit
11. Sta je prisluskivanje u informacionim sistemima:

Explanation

Prisluskivanje u informacionim sistemima se odnosi na situaciju kada napadač može da pristupi poverljivim informacijama tako što jednostavno prisluškuje protok informacija u komunikacionoj vezi. Ovo znači da napadač može da pristupi informacijama koje se prenose između dve ili više strana u komunikaciji, bez da bude otkriven.

Submit
12. Sta je digitalna gotovina:

Explanation

Digitalna gotovina se odnosi na privatni oblik monete koji se može koristiti za plaćanje unutar sajtova e-trgovine. To znači da se digitalna gotovina koristi kao sredstvo plaćanja prilikom online kupovine i može se potrošiti na različite proizvode ili usluge koje su dostupne na internetu. Ova vrsta novca omogućava brzo i jednostavno plaćanje putem digitalnih uređaja, kao što su računari, pametni telefoni ili tableti.

Submit
13. Kako uticu na bezbednost greske u sistemskom softveru:

Explanation

The correct answer suggests that errors in system software can serve as entry points for malicious individuals to infiltrate the system. This means that if there are vulnerabilities or weaknesses in the system software, it can be exploited by someone with malicious intent to gain unauthorized access to the system.

Submit
14. Koje su aktuelne vece kategorije digitalnih novcanika:

Explanation

The correct answer is "Postoje dve kategorije digitalnih novcanika: bazirani na klijentu i bazirani na serveru." This answer accurately states that there are two categories of digital wallets: client-based and server-based. It provides a clear and concise explanation of the different categories without any additional unnecessary information.

Submit
15. U cemu se sastoji kontrola pristupa zasnovana na IP adresi:

Explanation

Kontrola pristupa zasnovana na IP adresi se sastoji od servera koji proverava adresu korisnika i omogućava ili ne pristup na osnovu te informacije. Ova kontrola se koristi za identifikaciju i autentifikaciju korisnika na osnovu njihove IP adrese, što omogućava serveru da odobri ili odbije pristup određenim resursima ili uslugama.

Submit
16. Sta je suplantacija u informacionim sistemima:

Explanation

Suplantacija u informacionim sistemima se obično dešava nakon uspešnog infiltriranja u sistem, gde napadač ostavlja program koji mu omogućava da olakša napade u budućnosti. Ova aktivnost omogućava napadaču da zadrži pristup sistemu i da izvršava dalje napade sa većom efikasnošću.

Submit
17. Sta su smart kartice:

Explanation

Smart kartice are a type of accumulated value system that takes the form of a plastic credit card with a chip containing personal data.

Submit
18. Sta je sifrovanje:

Explanation

Sifrovanje je proces koji se koristi za transformaciju originalne informacije (otvorenog teksta) u šifrovane podatke (šifrat). Ovaj proces se koristi kako bi se osigurala privatnost i bezbednost podataka. Šifrovanje se postiže primenom određenih algoritama ili matematičkih operacija koje menjaju originalni tekst na način koji ga čini nerazumljivim za neovlaštene osobe. Samo osoba koja je poslala originalni tekst i koja zna lozinku ili ključ može da dešifruje šifrovane podatke i dobije originalnu informaciju.

Submit
19. Sta je promena podataka na komunikacionoj liniji u informacionim sistemima:

Explanation

The correct answer is that "Promena podataka na komunikacionoj liniji je kada napadac moze da promeni informacije koje se prenose kroz komunikacionu mrezu." This means that data on the communication line can be altered by an attacker, allowing them to modify the information being transmitted through the communication network.

Submit
20. Sta je neophodno da bi se sprovele u praksu mere osiguranja sigurne elektronske trgovine:

Explanation

To ensure secure electronic commerce, it is necessary to use cryptographic technologies such as digital signatures and public-key and private-key cipher systems. These technologies provide authentication, confidentiality, and integrity of electronic transactions, ensuring that the information exchanged between parties is secure and cannot be tampered with or accessed by unauthorized individuals. By using digital signatures, the authenticity and integrity of the messages can be verified, while the public-key and private-key cipher systems provide encryption and decryption capabilities to protect the confidentiality of sensitive data.

Submit
21. Po aktuelnim statistickim podacima medju zemlje koje najvise koriste elektronsku trgovinu spadaju:

Explanation

The correct answer includes three countries: Germany, Japan, and England. These countries are among the top users of electronic commerce according to current statistical data.

Submit
22. Sta je neophodno da bi se osigurala e-trgovina:

Explanation

The correct answer is that secure e-commerce requires a set of laws, procedures, and technological measures. This means that in order to ensure safe electronic commerce, there needs to be a legal framework in place to regulate and protect online transactions. Additionally, there must be established procedures and protocols to follow in order to maintain security. Technological measures, such as encryption, are also necessary to safeguard sensitive information and prevent unauthorized access.

Submit
23. EMV je:

Explanation

EMV stands for Europay MasterCard Visa. Europay, MasterCard, and Visa are three major companies that developed a global standard for credit and debit card payments. The EMV standard ensures that payment cards and terminals are compatible and secure, reducing the risk of fraud. This standard is widely used around the world, providing a secure and convenient way for consumers to make payments.

Submit
24. Da li je moguce postici apsolutnu zastitu e-trgovini:

Explanation

Achieving absolute protection in e-commerce is difficult and expensive because there is always a possibility that someone can find a way to compromise it.

Submit
25. Sta najvise zanima prodavce kod platnih sistema:

Explanation

Prodavcima kod platnih sistema najviše zanimaju niska stopa rizika, niski troškovi, sigurnost i pouzdanost platnog sistema.

Submit
26. Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe internet tehnologije sa ekonomske tacke gledista:

Explanation

The correct answer states that the consequences of technological layoffs or misuse of internet technology from an economic point of view can result in losing business reputation and customer trust due to bad experiences with their own clients. This means that if the company's clients have negative experiences, it can lead to a loss of trust and reputation, which can ultimately affect the business negatively.

Submit
27. Zasto se ne preporucuje cesta upotreba udaljenog terminala:

Explanation

The correct answer is "Administracija sistema sa udaljenog terminala nije bezbedna." This is because remote terminal administration is not secure. It poses a risk of unauthorized access and potential security breaches. It is recommended to use secure methods and protocols for system administration to ensure the safety and integrity of the system.

Submit
28. Na osnovu istrazivanja, online kupci odlucuju u kojoj online prodavnici kupuju proizvod:

Explanation

Based on research, online shoppers tend to decide where to buy a product based on the website they regularly make purchases from. This suggests that customers trust and have a familiarity with certain online retailers, making them more likely to choose those websites for future purchases. This could be due to factors such as previous positive experiences, good customer service, or a wide range of products available on the website.

Submit
29. Po aktuelnim statistickim podacima medju zemlje koje najmanje koriste elektronsku trgovinu spadaju:

Explanation

The countries that least use e-commerce according to current statistical data are Brazil, Mexico, and India. These countries have lower levels of adoption and utilization of electronic commerce compared to others like the United Kingdom, Japan, and Germany. This could be due to various factors such as limited internet access, lower levels of digital literacy, inadequate infrastructure, cultural preferences for traditional shopping methods, or lack of trust in online transactions.

Submit
30. Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe internet tehnologije sa ekonomske tacke gledista:

Explanation

The consequences of technological dismissal or misuse of internet technology from an economic perspective can include the loss of valuable and confidential information, specifically through unauthorized access to customer information. This can lead to potential breaches of privacy and security, as well as the misuse of customer data for fraudulent activities.

Submit
31. Ko sve ucestvuje u online kupovine kreditnom karticom:

Explanation

The correct answer is that the participants involved in online shopping with a credit card are the consumer, the merchant, the clearinghouse, the merchant's bank, and the bank that issued the card to the consumer.

Submit
32. Sta je digitalni kes:

Explanation

Digitalni kes je privatna forma novca koja može biti potrošena na sajtovima elektronske trgovine. Ova definicija ukazuje na to da digitalni kes nije javna forma novca i da se može koristiti samo za online kupovinu.

Submit
33. Sta je infiltracija u sistem u informacionim sistemima:

Explanation

Infiltracija u sistem se odnosi na proces kada neovlašćena osoba pristupa sistemu i ima mogućnost da modifikuje datoteke, otkrije poverljive informacije i koristi resurse sistema na nelegitiman način.

Submit
34. Zasto fizicka lica ili mala preduzeca koriste PayPal nalog za placanje:

Explanation

PayPal offers lower transaction fees compared to credit cards, making it a more cost-effective option for individuals and small businesses.

Submit
35. Zasto kreditne kartice koriste procesne centre:

Explanation

The correct answer is that processing centers for credit cards are used to verify accounts and balances. These centers are responsible for checking the validity of the credit card, ensuring that the account has sufficient funds, and verifying the transaction before it is approved. They play a crucial role in preventing fraudulent activities and ensuring the security of the payment process.

Submit
36. Sta predstavlja digitalni novac:

Explanation

Digitalni novac predstavlja kriptovalute, koje su novčani iznosi izraženi u digitalnom obliku i imaju vrednost. Ovo su virtualne valute koje se koriste za obavljanje digitalnih transakcija putem interneta. Kriptovalute se skladište u digitalnim novčanicima i koriste se za kupovinu dobara i usluga, kao i za investiranje i trgovanje na digitalnim berzama. Ova vrsta novca je decentralizovana i koristi se tehnologija blokčeina za osiguravanje sigurnosti i transparentnosti transakcija.

Submit
37. Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe internet tehnologije sa ekonomske tacke gledista:

Explanation

The given answer states that the consequences of technological termination or misuse of internet technology from an economic point of view are costs caused by external and internal attacks and errors, resulting in uncertain business conditions. This means that the company may incur additional expenses due to security breaches, cyberattacks, and internal mistakes, which can disrupt business operations and lead to financial losses.

Submit
38. Sta najvise zanima potrosace kod platnih sistema:

Explanation

Consumers are most interested in minimizing risk, low prices, reliability, and availability when it comes to payment systems.

Submit
39. Sta koristi SET za identifikaciju:

Explanation

SET (Secure Electronic Transaction) koristi digitalni sertifikat za identifikaciju. Digitalni sertifikat je elektronski dokument koji potvrđuje identitet osobe ili organizacije na internetu. SET protokol se koristi za sigurnu razmenu podataka prilikom elektronskih transakcija, kao što su online plaćanja. Korišćenjem digitalnih sertifikata, SET omogućava autentifikaciju i enkripciju podataka kako bi se osigurala sigurnost i privatnost korisnika prilikom obavljanja elektronskih transakcija.

Submit
40. Sta se dogadja sa stranom koja treba da primi novac:

Explanation

If the person has a PayPal account, the money is automatically transferred to their account. However, if the person does not have a PayPal account, they need to create one and then the money will be transferred to their account.

Submit
41. Pomocu debitnih kartica se:

Explanation

Debitne kartice omogućavaju korisnicima da odmah naplate dugovanja ili realizuju druge potražnje sa svojih depozitnih računa. To znači da se novčana sredstva sa računa korisnika automatski skidaju prilikom plaćanja ili obavljanja transakcija putem debitne kartice. Ova funkcionalnost omogućava trenutno i jednostavno upravljanje finansijama, bez potrebe za čekanjem ili odobravanjem transakcija.

Submit
42. Udruzenja za kreditne kartice su:

Explanation

The correct answer is "Neprofitabilne organizacije" which translates to "Non-profit organizations" in English. This means that credit card associations are not focused on making profits but rather on serving their members and promoting the use of credit cards. These associations typically set industry standards, provide support and resources to member banks, and facilitate collaboration among industry stakeholders. Their main goal is to ensure the smooth functioning and growth of the credit card industry rather than generating profits for themselves.

Submit
43. Sta je servis neporecivosti u bezbednosnim servisima sa aspekta e-trgovine:

Explanation

The correct answer is "Servis neporecivosti je servis za onemogucavanje poricanja transakcije koja se dogodila." This means that the service of non-repudiation prevents the denial of a transaction that has occurred. This service ensures that both parties involved in the transaction cannot deny their participation or the validity of the transaction, providing a reliable and trustworthy record of the transaction.

Submit
44. Sta rade virusi kao programi:

Explanation

Viruses as programs multiply and insert themselves into executable programs, files, or parts of memory, and then spread through the system via file exchange. This process allows the virus to replicate and spread to other computers, potentially causing harm by modifying programs and slowing down the computer's performance.

Submit
45. Sta su bezbednosni servisi u elektronskom poslovanju:

Explanation

The correct answer states that security services in electronic business are components of a system that carry out activities to counter security threats related to the system's security. This means that these services are responsible for implementing measures and protocols to protect the system from potential risks and ensure its security.

Submit
46. Sta su procesni centri:

Explanation

The correct answer is "Procesni centri se bave proverom racuna i bilansa." This statement accurately describes the role and function of procesni centri, which is to verify accounts and balances. The other options provided in the question do not accurately describe the purpose or function of procesni centri.

Submit
47. Sta su Makro virusi:

Explanation

Makro viruses are viruses that are written in the macro language of a word processor and reside within documents. They are not necessarily large in size, as mentioned in the incorrect options. These viruses exploit the functionality of macros to execute malicious actions and can spread through infected documents.

Submit
48. U kakvom obliku mora da bude ono sto je zabranjeno u sistemu i razliciti nivoi liste pravila:

Explanation

The correct answer is "Politika bezbednosti mora da bude u pisanom obliku." This answer is correct because it states that the security policy must be in written form. The other options suggest different forms such as oral or digital, which are not the required format for the security policy.

Submit
49. U cemu se sastoji kontrola pristupa zasnovana na mreznim bezbednosnim protokolima:

Explanation

The correct answer states that this type of access control is based on network security protocols and addresses the general problem of authentication and authorization within both LAN and WAN environments. This suggests that the access control mechanisms implemented in this type of system utilize security protocols to ensure that only authorized users are granted access to resources in both local and wide area networks.

Submit
50. Zasto racunar koji se koristi kao Web server ne bi smeo da se istovremeno koristi i kao racunar opste namene:

Explanation

The given answer suggests that a computer used as a web server should not be used for general purposes because the server hardware can be insecure. This implies that using the server for general purposes may compromise its security and make it vulnerable to potential attacks or unauthorized access. Therefore, it is recommended to separate the functions of a web server and a general-purpose computer to ensure the security and integrity of the server.

Submit
51. Koja je osnovna karakteristika online transakcija kreditnom karticom:

Explanation

The basic characteristic of online credit card transactions is that the online merchant never sees the card being used, it is not passed through a physical card reader, and the resulting report is not signed.

Submit
52. U elektronskoj trgovini, pretplate i clanarine podrazumevaju:

Explanation

The correct answer is "Sajtove na kojima se placa pretplata za pracenje informacija" which translates to "Websites where a subscription is paid to follow information." This means that in e-commerce, subscriptions and memberships refer to websites where users pay a fee to access and receive information. This could include news websites, online magazines, or any other platform where users have to pay to stay updated with the provided content.

Submit
53. Sta je desifrovanje:

Explanation

Desifrovanje je procedura koja rekonstruiše originalnu informaciju ili otvoreni tekst na osnovu sifrovanih podataka ili sifrata. To znači da se prilikom desifrovanja koristi odgovarajuća lozinka ili ključ kako bi se prevedeni podaci vratili u originalni oblik. Samo osoba koja zna lozinku može da pročita desifrovanu informaciju.

Submit
54. Sta su digitalni cekovi:

Explanation

Digitalni cekovi are systems that generate digital checks for e-commerce and expand the functionality of existing check systems in banks.

Submit
55. Sta je autorizacija:

Explanation

Autorizacija is a term used to define the process of granting access rights to system resources by authorized users. It involves determining what actions and resources a user is allowed to access, based on their privileges and permissions. This ensures that only authorized individuals can access and use the system resources, maintaining security and preventing unauthorized access.

Submit
56. Sta moze biti pravilo koje vazi za elektronsku trgovinu:

Explanation

The correct answer is "Lanac bezbednosti je jak koliko je jaka njegova najslabija karika." This statement means that the security of a system is only as strong as its weakest link. In the context of electronic commerce, this implies that the overall security of an online platform or transaction is determined by the strength of its weakest security measure or component. Therefore, it is crucial to identify and strengthen the vulnerabilities in order to ensure the overall security of the system.

Submit
57. Sta najvise zanima finansijske posrednike kod platnih sistema:

Explanation

Financial intermediaries are most interested in secure payment systems that transfer transaction risk and costs to customers and sellers, while maximizing their own margins.

Submit
58. Sta je bezbednost komunikacija u informacionim sistemima:

Explanation

The correct answer is "Bezbednost komunikacija oznacava zastitu informacija u toku prenosa iz jednog elektronskog sistema u drugi." This answer explains that communication security refers to the protection of information during transmission from one electronic system to another. It implies that the main focus is on safeguarding the data being transferred rather than preventing eavesdropping or encrypting voice information.

Submit
59. Sta je servis kontrole pristupa u bezbednosnim servisima sa aspekta e-trgovine:

Explanation

The correct answer is that the access control service protects the system from unauthorized access to its resources. This means that the access control service ensures that only authorized individuals or entities are granted access to specific resources within the IT system, preventing any unauthorized access that could potentially compromise the system's security.

Submit
60. Po aktuelnim istrazivanjima prednosti koje korisnici navode vezano za elektronsku trgovinu su:

Explanation

The given answer states that the advantages mentioned by users regarding electronic commerce are personalized offers, easy product comparison, and product availability. These factors contribute to a positive user experience and make online shopping more convenient and efficient. Personalized offers cater to individual preferences and needs, making shopping more tailored and enjoyable. Easy product comparison allows users to make informed decisions and find the best deals. Lastly, product availability ensures that users can find and purchase the desired items easily.

Submit
61. PayPal je:

Explanation

The correct answer is "Novac u e-mailu." PayPal is a digital payment platform that allows users to send and receive money securely through email. It enables individuals and businesses to make online transactions without the need to share financial information directly. With PayPal, users can link their bank accounts or credit cards to their PayPal account and transfer funds to other PayPal users by simply using their email addresses. This makes it convenient and safe to send money electronically.

Submit
62. Medju najcesce greske koje prave elektronske trgovine spadaju:

Explanation

The correct answer includes three common mistakes made by electronic commerce: adding additional costs that were not mentioned in the regular price (delivery, customs, taxes), requesting too much personal information on the website, and having a long and confusing ordering and payment process. These mistakes can lead to customer dissatisfaction and may discourage potential buyers from completing their purchases.

Submit
63. Sta znaci Dostupnost u osnovnim ciljevima mera bezbednosti u informacionim sistemima:

Explanation

The correct answer states that availability ensures that authorized users can always use services and access information. This means that the information systems are designed to be accessible and functional for those who have been granted permission to use them, allowing them to utilize the services and retrieve the necessary information whenever needed.

Submit
64. Kada sistemski softver nije dobro konfigurisan, kako to utice na bezbednost:

Explanation

When system software is not properly configured, it can allow unauthorized changes to the list of user permissions. This means that someone could gain access to certain privileges or permissions that they should not have, potentially compromising the security of the system. This could lead to unauthorized access to sensitive information or the ability to perform actions that should be restricted.

Submit
65. Koja je uloga digitalnih kreditnih racuna:

Explanation

Digitalni kreditni računi su sistemi koji proširuju online funkcionalnost postojećih platnih sistema kreditnih kartica. Ovo znači da omogućavaju korisnicima da vrše plaćanja i obavljaju transakcije putem interneta koristeći svoje kreditne kartice. Ova funkcionalnost olakšava i ubrzava proces plaćanja i omogućava korisnicima da obavljaju kupovine i plaćaju račune online.

Submit
66. Sta je poricanje transakcije u informacionim sistemima:

Explanation

The correct answer explains that denial of transaction in information systems refers to a situation where one party denies that a transaction has occurred even though it has. This event can occur due to an error, but it always results in conflicts that are difficult to resolve.

Submit
67. Koje vrste platnih sistema postoje:

Explanation

The correct answer is "Postoji: kes, cekovi, kreditne kartice, nagomilana vrednost i akumulirajuci bilans." This answer accurately lists the types of payment systems that exist, including cash (kes), checks (cekovi), credit cards (kreditne kartice), accumulated value (nagomilana vrednost), and an accumulating balance (akumulirajuci bilans).

Submit
68. Sta se definise autorizacijom posle procesa autentikacije korisnika u kome se odredjuje identitet lica koje pristupa serveru:

Explanation

After the process of user authentication, authorization defines the resources that the user can access. It determines the privileges and priorities for accessing the database and the order in which the resources are served in cloud architecture.

Submit
69. Kako se korisnici koji pristupaju zasticenoj Web stranici obavestavajuci o tome:

Explanation

The correct answer is "Adresa takvih zasticenih stranica je drugacija, posto sadrzi 's' na kraju dela http." This is because when a website is protected, it uses the HTTPS protocol instead of HTTP. The 's' at the end of HTTP stands for secure, indicating that the website has a valid SSL certificate and that the data exchanged between the user's browser and the website is encrypted. This provides a higher level of security for the user's information.

Submit
70. Pri definisanju prihoda elektronske trgovine razmatraju se sledeci faktori:

Explanation

The factors that are considered when defining the revenue of e-commerce are the total business costs, the demand for the product or service being sold, and the saturation of the market with the product or service being offered. These factors directly impact the profitability and success of an e-commerce business. By analyzing the total business costs, the company can determine its profit margin and pricing strategy. The demand for the product or service indicates the potential customer base and market size. Lastly, the saturation of the market helps assess the competition and potential barriers to entry.

Submit
71. Kako se PayPal stiti od prevara:

Explanation

PayPal trazi specijalnu dozvolu za iznose preko $200. This statement suggests that PayPal has a specific authorization process in place for transactions exceeding $200. This additional step helps to ensure the security and legitimacy of larger transactions, reducing the risk of fraud. By requiring special permission, PayPal adds an extra layer of protection for its users and their financial transactions.

Submit
72. Sta znaci Upotreba sistema iskljucivo od strane ovlascenih korisnika u osnovnim ciljevima mera bezbednosti u informacionim sistemima:

Explanation

The correct answer states that the use of the system exclusively by authorized users ensures that system resources cannot be used exclusively by unauthorized individuals or in an unauthorized manner. This means that only authorized users have access to the system resources and any unauthorized use or access is prevented.

Submit
73. Koja je uloga SET-a u online kupovini:

Explanation

In online shopping, SET (Secure Electronic Transaction) uses a digital certificate as an attached file to the message to verify the sender's identity. This digital certificate serves as a proof of authenticity and ensures that the transaction is secure. It helps establish trust between the buyer and the seller by verifying the identity of the sender and protecting sensitive information during the transaction process.

Submit
74. U cemu se sastoji potencijalna pretnja informacionom sistemu koja sadrzi podsistem za e-trgovinu usled odbijanja servisa:

Explanation

The potential threat to the information system that contains an e-commerce subsystem due to service denial is that the system services can become unavailable to authorized users. This is because frequent requests from unauthorized users can overwhelm the system, causing it to become unresponsive or unavailable to authorized users.

Submit
75. Za sta su pogodni osigurani cekovi:

Explanation

The correct answer states that insured checks are suitable because they reduce the security risk of personal checks and they are also cashable. This implies that insured checks provide a higher level of security compared to personal checks and can be easily converted into cash, making them a convenient option for financial transactions.

Submit
76. Sta je odbijanje servisa u informacionim sistemima:

Explanation

The correct answer states that service denial in information systems occurs due to frequent requests for complex tasks issued by unauthorized users, which can result in authorized users being unable to access the services.

Submit
77. Sta je servis poverljivosti u bezbednosnim servisima sa aspekta e-trgovine:

Explanation

The correct answer is that the service of confidentiality prevents the disclosure of information to any entity that is not authorized to access it. This means that the service ensures that only trusted individuals can exchange information and that unauthorized entities are unable to delete or discover the information.

Submit
78. Koji su najozbiljniji gubici u elektronskoj trgovini:

Explanation

The most serious losses in e-commerce are due to theft of personal information and financial fraud. This can include incidents such as identity theft, where someone gains unauthorized access to personal data and uses it for fraudulent purposes, as well as instances of financial fraud where individuals or organizations deceive customers into making payments or providing sensitive financial information. These types of losses can have severe consequences for both businesses and individuals, leading to financial loss, reputational damage, and potential legal repercussions. It is crucial for e-commerce platforms to implement robust security measures to protect against these types of threats.

Submit
79. U cemu se sastoji kontrola pristupa zasnovana na imenu domena:

Explanation

The given correct answer explains that kontrola pristupa zasnovana na imenu domena (access control based on domain name) involves checking the domain name. This means that access to a resource or system is granted or denied based on the domain name provided. It does not involve checking the IP address or the name of the web server.

Submit
80. Sta je bezbednost u racunarima u informacionim sistemima:

Explanation

The correct answer states that computer security refers to the protection of information within a computer system, including the operating system, application software, and software for manipulating databases. This aligns with the commonly understood definition of computer security, which involves safeguarding data and ensuring the integrity, confidentiality, and availability of information within a computer system. The other options mentioned in the question, such as the protection of computer systems using specialized security systems for monitoring or the hardware protection of computer systems, do not fully encompass the concept of computer security as defined in the correct answer.

Submit
81. Sta je online sistem akumuliranih vrednosti:

Explanation

The correct answer is "Online sistem akumuliranih vrednosti predstavlja sistem koji se oslanja na pretplatu, debitne kartice ili cekovne racune kako bi se stvorila monetarna vrednost koja se moze koristiti pri kupovini u e-trgovini." This explanation states that an online system of accumulated values relies on subscriptions, debit cards, or checking accounts to create monetary value that can be used for purchasing in e-commerce.

Submit
82. Medju korisnike elektronske trgovine spadaju:

Explanation

The correct answer is "Podjednako muskarci i zene, Korisnici starosti od 30-50 godina, a cija grupa cini najveci procenat online transakcija." This answer suggests that both men and women are users of electronic commerce, and the age group of 30-50 years old represents the highest percentage of online transactions.

Submit
83. Kako se prenosi novac preko PayPala:

Explanation

The correct answer states that money is transferred from the buyer's credit card or bank account to a private financial intermediary who is responsible for tracking and transferring money between financial situations.

Submit
84. Sta je danas digitalna trgovina:

Explanation

Digitalna trgovina refers to a type of collecting and exchanging values that have limited convertibility, which is converted into other values through an intermediary. This means that digital commerce involves the transfer of value through intermediaries, such as online platforms or payment gateways, where different forms of digital currency or payment methods are used to facilitate transactions.

Submit
85. Koje su najvaznije karakteristike digitalnog novcanika:

Explanation

The correct answer states that the most important characteristics of a digital wallet are customer authentication, accumulation and transfer of value, and ensuring the payment process. This means that the digital wallet should have a secure way to authenticate the user, allow the accumulation and transfer of funds or value, and provide a secure process for making payments.

Submit
86. Sta su programi Crvi:

Explanation

The correct answer is "To su programi koji prave veliki broj svojih kopija i prenose se sa jednog računara na drugi." This answer accurately describes what worm programs are - they are programs that create numerous copies of themselves and spread from one computer to another.

Submit
87. Sta je servis za onemogucavanje odbijanja usluge u bezbednosnim servisima sa aspekta e-trgovine:

Explanation

The correct answer states that a denial of service prevention service is a type of attack where a malicious person submits a series of consecutive requests to a server that prevents their execution. This means that the attacker intentionally overloads the server with requests, causing it to become unresponsive or crash, thus denying service to legitimate users.

Submit
88. SET je:

Explanation

The correct answer is "Secure Electronic Transaction Protocol" because SET is a protocol that ensures the security of electronic transactions. It provides a secure method for transferring sensitive information such as credit card numbers over the internet. The protocol uses encryption and digital certificates to authenticate the parties involved in the transaction and protect the confidentiality and integrity of the data being transmitted. SET has been widely adopted by banks and financial institutions to facilitate secure online transactions.

Submit
89. Zasto je pogodna gotovina u sistemu placanja:

Explanation

The use of cash as a payment method is suitable because it provides anonymity and makes it nearly impossible to trace transactions. Cash transactions do not leave a digital trail, making it difficult for authorities or individuals to track the flow of money. Additionally, cash prevents fraud through counterfeiting, as it is harder to forge physical currency compared to digital transactions. Lastly, cash payments can be recorded by keeping track of the serial numbers of the banknotes, allowing for some level of record-keeping.

Submit
90. Sta je to klirinska kuca u kupovini kreditnom karticom:

Explanation

A clearinghouse in credit card purchases is a financial intermediary that identifies the credit card and verifies the balance in the account. It also ensures the entire process of sending credit card information to the merchant and protects the data from internet breaches.

Submit
91. Direktnu prodaju krase sledece osobine prodaje:

Explanation

The correct answer is Video proizvoda, Informacije o proizvodu, Slike proizvoda. These characteristics of sales are associated with direct selling. Video product demonstrations allow potential customers to see the product in action, providing a more immersive and persuasive experience. Providing information about the product helps customers make informed decisions, and displaying images of the product gives them a visual representation. These features enhance the effectiveness of direct sales by engaging customers and providing them with the necessary information to make a purchase.

Submit
92. Sta je Prekoracenje ovlascenja u informacionim sistemima:

Explanation

Prekoracenje ovlascenja u informacionim sistemima se desava kada lice koje ima odobrenje za koriscenje sistema koristi sistem na neovlasceni nacin. To znaci da osoba prelazi granice svojih ovlastenja i koristi sistem na nacin koji nije dozvoljen ili predvidjen njenim ovlastenjima. Ovo moze ukljucivati pristupanje podacima ili funkcionalnostima sistema za koje osoba nije ovlastena, ili izvrsavanje radnji koje su izvan njenih ovlastenja.

Submit
93. Sta je politika bezbednosti u sistemima sa aspekta elektronske trgovine:

Explanation

The correct answer is "Skup pravila koja se odnose na sve aktivnosti u vezi sa bezbednoscu komunikacione mreze i racunara" which translates to "A set of rules that relate to all activities related to the security of communication networks and computers." This answer states that security policies in e-commerce systems encompass all activities related to the security of communication networks and computers.

Submit
94. Sta moze uraditi primalac novca kada novac stigne na PayPal:

Explanation

The recipient of the money can transfer the funds electronically to their bank account, request a check, or use PayPal to send the money to someone else.

Submit
95. Sta rade Trojanci (Trojanski konji):

Explanation

The correct answer explains that Trojans are programs that are executed by users, who believe that they are useful. However, during execution, the program copies data into a part of the memory or damages the system. This answer accurately describes the nature and behavior of Trojans, emphasizing their deceptive nature and ability to harm the system.

Submit
96. Sta je Integritet u osnovnim ciljevima mera bezbednosti u informacionim sistemima:

Explanation

The correct answer explains that integrity ensures the consistency of data and prevents its alteration and destruction. This means that the data remains accurate, reliable, and unchanged throughout its lifecycle, maintaining its integrity.

Submit
97. Pre definisanja prihoda elektronske trgovine razmatraju se sledeci faktori:

Explanation

The factors that are considered when defining the revenue of an e-commerce business are the demand for the product or service being sold, the total operating costs, the price of competing products, and the market saturation of the product or service being offered.

Submit
98. Kako se zove protokol koji znacajno smanjuje rizik upotrebe interneta, stiteci podatke koji se prenose izmedju pretrazivaca i korisnika identifikujuci svakog ucesnika u vezi:

Explanation

SSL stands for Secure Sockets Layer. It is a protocol that significantly reduces the risk of using the internet by protecting data transmitted between web browsers and users. SSL achieves this by encrypting the data and authenticating the identity of each participant in the connection. This ensures that the information remains confidential and secure during transmission, making it difficult for unauthorized individuals to intercept or tamper with the data. SSL is commonly used to secure online transactions, such as credit card payments, login credentials, and sensitive personal information.

Submit
99. Sta obezbedjuje SSL u online trgovini:

Explanation

SSL obezbeđuje celokupan proces tokom kojeg se podaci o kreditnoj kartici šalju prodavcu i štiti te podatke od upada sa interneta. SSL (Secure Sockets Layer) je protokol za bezbednu transakciju koji obezbeđuje enkripciju podataka kako bi se osigurala privatnost i integritet informacija prilikom prenosa. Takođe, SSL omogućava autentifikaciju servera i verifikaciju identiteta, što pomaže u sprečavanju prevara i lažnih transakcija.

Submit
100. Po aktuelnim istrazivanjima, mane koje korisnici navode vezano za elektronsku trgovinu:

Explanation

The given answer correctly identifies the three main drawbacks that users often mention in relation to electronic commerce. These drawbacks include a lack of trust in the online platform, long waiting times for delivery, and the inability to physically experience the product before making a purchase. These factors can significantly impact a user's decision to engage in online shopping and can affect their overall satisfaction with the e-commerce experience.

Submit
101. Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe internet tehnologije sa ekonomske tacke gledista:

Explanation

The consequences of technological dismissal or misuse of internet technology from an economic point of view can include unauthorized use of resources for personal gain. This refers to the unauthorized use of resources to obtain financial benefits.

Submit
102. Da li se problemi sa apsolutnom zastitom u e-trgovini mogu resiti samo primenom tehnologije:

Explanation

The correct answer suggests that the problems with absolute protection in e-commerce can be solved by using technology, but it is not implemented in practice due to its high cost. This implies that while technology can provide a solution, the practicality of implementing it is hindered by its expensive nature. Therefore, the answer emphasizes the importance of considering cost-effectiveness when addressing security issues in e-commerce.

Submit
103. Kreditna kartica je:

Explanation

The correct answer is "Racun pomocu kojeg potrosac placa na odlozeno." This means that a credit card is an account through which a consumer can make payments on a deferred basis. Unlike a debit card, where the money is deducted immediately from the account, a credit card allows the consumer to make purchases and pay for them at a later date, usually with added interest.

Submit
104. Sta je digitalni novcanik:

Explanation

A digital wallet is a software application that identifies the consumer through a digital certificate or other encryption methods, stores and transfers values, and ensures the payment process from consumers to merchants.

Submit
105. Sta predstavlja raspolozivost iz ugla prodavca:

Explanation

The correct answer states that "Raspolozivost iz ugla prodavca predstavlja to da je prodavnica operativna unutar segmenta," which translates to "Availability from the seller's perspective means that the store is operational within the segment." This explanation suggests that the availability of the seller refers to the operational status of the store within a specific segment.

Submit
106. Zasto se koriste depozitni racuni:

Explanation

Depozitni računi se koriste za vršenje plaćanja ili drugih transfera. To znači da korisnici mogu uplatiti novac na svoj depozitni račun i koristiti ga za plaćanje računa, kupovinu proizvoda ili usluga, ili za slanje novca drugim osobama. Ovi računi omogućavaju sigurno čuvanje novca i olakšavaju brze i jednostavne transakcije. Također, korisnici mogu koristiti depozitne račune za napredna depozitna plaćanja usluga, što može uključivati automatsko plaćanje računa ili periodično prebacivanje novca na druge račune. Kreditna odložena plaćanja također mogu biti moguća s depozitnih računa, što omogućava korisnicima da odgode plaćanje određenih troškova.

Submit
107. U cemu se sastoji kontrola pristupa zasnovana na korisnickom imenu i lozinci:

Explanation

The correct answer is "Kod ovog tipa svaki korisnik dobija jedinstveno korisnicko ime i sam bira svoju lozinku." This is because in this type of access control, each user is assigned a unique username and they are responsible for choosing their own password.

Submit
108. Zasto su pogodni cekovni transferi u sistemu placanja:

Explanation

Cekovni transferi su pogodni za male i velike transakcije, ali ne za mikroplacanja.

Submit
109. Sta predstavlja raspolozivost iz ugla kupca:

Explanation

The correct answer is "Raspolozivost iz ugla kupca jeste situacija kada kupac ima pristup e-prodavnici." This is because availability from the customer's perspective refers to the situation when the customer has access to an e-commerce store.

Submit
110. Kako se bira nivo zastite u elektronskoj trgovini:

Explanation

The correct answer explains that the chosen level of protection in electronic commerce should be balanced between actual needs and costs. This means that the level of security should be adequate to protect against potential threats and risks, while also being financially feasible and sustainable. It emphasizes the importance of finding a compromise between the necessary level of protection and the associated costs.

Submit
111. Sta se desava kada istekne sertifikat veb servera:

Explanation

When a web server certificate expires, web browsers do not verify the validity of the certificate.

Submit
112. Kako PayPal dodatno zaradjuje:

Explanation

PayPal earns additional revenue by earning interest on funds that have not yet been transferred from the PayPal system.

Submit
113. Kada moze doci do napada sa odbijanjem:

Explanation

When a software is sensitive to tasks that are not pre-defined, it can be vulnerable to denial-of-service attacks. In such attacks, the attacker overwhelms the software with unexpected or excessive requests, causing it to become unresponsive or crash. This vulnerability can occur regardless of whether the software is a client-server architecture or if the client and server are on different operating systems.

Submit
114. Pri definisanju prihoda elektronske trgovine razmatraju se sledeci faktori:

Explanation

The factors considered in defining e-commerce revenue include the total operating costs, the price of competitive products, the demand for the product or service being sold, and the market saturation of the product or service being offered. These factors directly impact the profitability and success of an e-commerce business. By analyzing the total operating costs, a business can determine its profit margins. Evaluating the price of competitive products helps in setting competitive prices. Understanding the demand for the product or service enables businesses to target their marketing efforts effectively. Lastly, assessing the market saturation helps in identifying potential opportunities and challenges in the market.

Submit
115. Zasto su pogodni osigurani cekovni transferi u sistemu placanja:

Explanation

The given answer states that payment orders, checks, and traveler's checks are insured checks that reduce the risk of personal check security. This explanation aligns with the information provided in the question, which states that these types of checks are insured against loss or theft. Therefore, the answer accurately reflects the benefits of using insured check transfers in the payment system.

Submit
116. Kako sajtovi e-trgovine generisu prihode:

Explanation

E-commerce websites generate revenue through direct sales, indirect sales, subscriptions or memberships, and advertising space. Direct sales refer to the revenue generated by selling products or services directly to customers. Indirect sales involve earning commissions or fees from third-party sellers or affiliates. Subscriptions or memberships provide recurring revenue by offering exclusive content or benefits to subscribers. Advertising space allows businesses to display ads on the website for a fee.

Submit
117. Sta je bezbednosna elektronska trgovina:

Explanation

Bezbednosna elektronska trgovina refers to electronic commerce that uses security procedures in accordance with assessed risks. This means that the online transactions and data exchanges in this type of e-commerce are protected by security measures that are tailored to the potential risks involved.

Submit
118. U cemu se sastoji kontrola pristupa zasnovana na sertifikatima klijenata:

Explanation

In this type of access control based on client certificates, each user is provided with their own cryptographic certificate which is used as a digital signature.

Submit
119. Kako se koristi kontrola pristupa zasnovana na mreznim bezbednosnim protokolima:

Explanation

The correct answer states that only specially configured browsers can use network security protocol-based access control. This means that regular browsers or browsers without the necessary configuration will not be able to access or use the network security protocols.

Submit
120. Sta znaci Poverljivost u osnovnim ciljevima mera bezbednosti u informacionim sistemima:

Explanation

The correct answer is "Poverljivost obezbedjuje nedostupnost informacija neovlascenim licima." This means that confidentiality ensures that information is not accessible to unauthorized individuals.

Submit
121. Sta je servis integriteta u bezbednosnim servisima sa aspekta e-trgovine:

Explanation

The service of integrity in security services from the perspective of e-commerce ensures that only authorized individuals have the ability to insert, delete, substitute, or rearrange data. It protects information from any changes that are not permitted by the security policy, even from authorized users.

Submit
122. Sta je platni sistem digitalnih akumuliranih bilansa:

Explanation

The correct answer is "Platni sistem digitalnih akumuliranih bilansa akumuliraju male naplate i pogodni su za mikroplacanja." This is because the sentence states that the system accumulates small payments and is suitable for micro-payments.

Submit
123. Odredjeni tipovi sajtova e-trgovine svoj prihod generisu i na osnovu oglasnog prostora tada oglasivacima nude:

Explanation

This specific type of e-commerce website generates revenue through advertising space and offers advertisers pop-up ads, banners, and text ads. Additionally, they provide an attractive position and privileged position in search results. The website does not offer insight into the statistics of competitor ads or information relevant to generating new entertainment websites. There is also no mention of a connection with a Supply Chain Management (SCM) solution implemented in the organization.

Submit
124. Sta je servis autentikacije u bezbednosnim servisima sa aspekta e-trgovine:

Explanation

The correct answer is "Servis autentikacije obezbedjuje garanciju identiteta i porekla podataka." This means that the authentication service ensures the guarantee of the identity and origin of the data. It verifies the identity of the user accessing the system and ensures that the data being transmitted or received is genuine and has not been tampered with. This helps to maintain the integrity and security of the e-commerce system, ensuring that only authorized users can access and manipulate the data.

Submit
125. Elektronske trgovine indirektnu prodaju ostvaruju tako sto:

Explanation

Online prodavnice često postoje i kao offline prodavnice, što znači da ista kompanija može imati i fizičku prodavnicu i online platformu za prodaju. Ovo omogućava kupcima da biraju između kupovine proizvoda putem interneta ili odlaska u prodavnicu. Takođe, korisnici interneta često koriste online prodavnice kako bi pronašli i stekli informacije o novim proizvodima, jer online platforme pružaju detaljne opise proizvoda, recenzije korisnika i druge informacije koje mogu pomoći pri donošenju odluke o kupovini.

Submit
126. Sta sve zahteva sigurna elektronska trgovina:

Explanation

Secure electronic commerce requires a set of laws to regulate and protect transactions, a set of procedures to ensure proper handling of sensitive information, and a set of technological measures to safeguard data and prevent unauthorized access.

Submit
127. Sredstva i metodi razvoja online trgovine ukljucujuci drustvene medije podrazumevaju:

Explanation

The correct answer includes the methods and tools for developing an online store, including social media. These methods include recommendations based on previous purchases, a sense of belonging and rating, and web communities within the electronic store.

Submit
128. Odredjeni tipovi sajtova e-trgovine generisu prihod na osnovu oglasnog prostora, tada oglasivacima nude:

Explanation

Certain types of e-commerce websites generate revenue based on advertising space, so they offer advertisers attractive positions and privileged positions in search results. These websites often do not rely on advertising as their main source of income. They also display advertisements such as pop-ups, banners, and text ads. Additionally, they provide recommendations for similar products to increase sales.

Submit
129. Osnovni bezbednosni servisi su:

Explanation

The correct answer includes a list of basic security services. These services are: denial of service prevention, integrity service, authentication service, access control service, non-repudiation service, and confidentiality service. These services are essential for ensuring the security of a system or network by preventing unauthorized access, protecting data integrity, verifying the identity of users, controlling access to resources, ensuring the non-repudiation of transactions, and maintaining the confidentiality of sensitive information.

Submit
130. Sta predstavlja potencijalne pretnje jednom informacionom sistemu koji sadrzi podsistem za elektronsku trgovinu:

Explanation

The potential threats to an information system that contains an e-commerce subsystem include infiltration into the system, exceeding authorized access, substitution, eavesdropping, alteration of data on the communication line, denial of service, denial of transaction, interception, acceptance of service, and approval of transaction. These threats pose risks to the security and integrity of the system, potentially allowing unauthorized access, manipulation of data, or disruption of services.

Submit
131. U osnovnim ciljevima mera bezbednosti u informacionim sistemima, mere koje obezbedjuju nedostupnost informacija neovlascenim licima, konzistentnost podataka, sprecavanje neovlascenog generisanje, promene i unistenje podataka su:

Explanation

The correct answer is a combination of three measures: poverljivost (confidentiality), integritet (integrity), and dostupnost (availability). Poverljivost ensures that information is only accessible to authorized individuals, preventing unauthorized access. Integritet ensures that data remains accurate and unaltered, preventing unauthorized changes or destruction. Dostupnost ensures that information is readily available to authorized users when needed, preventing any disruptions or unavailability. These three measures work together to protect information from unauthorized access, maintain its accuracy and consistency, and ensure it is accessible to authorized users.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 30, 2020
    Quiz Created by
    Andjelarakic85
Cancel
  • All
    All (131)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Digitalni Cash naziva se jos:
Sto se obrazovanja tice, ko predstavlja najmanji broj korisnika...
Amazon.com, danas najpoznatija kompanija iz oblasti elektronske...
Elektronska trgovina podrazumeva:
Sta jos dodatno obezbedjuje servis autentikacije:
Kupovina ili prodaja proizvoda i usluga preko bilo kog elektronskog...
U kojoj vrsti trgovine je veci procenat transakcija u kojima je doslo...
Nakon kreiranja PayPal naloga popunjavanjem formulara sa podacima o...
Sta predstavlja Electronic Billing Presentation and Payment:
Sta treba da uradi korisnik ako je adresa koja se nalazi na...
Sta je prisluskivanje u informacionim sistemima:
Sta je digitalna gotovina:
Kako uticu na bezbednost greske u sistemskom softveru:
Koje su aktuelne vece kategorije digitalnih novcanika:
U cemu se sastoji kontrola pristupa zasnovana na IP adresi:
Sta je suplantacija u informacionim sistemima:
Sta su smart kartice:
Sta je sifrovanje:
Sta je promena podataka na komunikacionoj liniji u informacionim...
Sta je neophodno da bi se sprovele u praksu mere osiguranja sigurne...
Po aktuelnim statistickim podacima medju zemlje koje najvise koriste...
Sta je neophodno da bi se osigurala e-trgovina:
EMV je:
Da li je moguce postici apsolutnu zastitu e-trgovini:
Sta najvise zanima prodavce kod platnih sistema:
Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe...
Zasto se ne preporucuje cesta upotreba udaljenog terminala:
Na osnovu istrazivanja, online kupci odlucuju u kojoj online...
Po aktuelnim statistickim podacima medju zemlje koje najmanje koriste...
Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe...
Ko sve ucestvuje u online kupovine kreditnom karticom:
Sta je digitalni kes:
Sta je infiltracija u sistem u informacionim sistemima:
Zasto fizicka lica ili mala preduzeca koriste PayPal nalog za...
Zasto kreditne kartice koriste procesne centre:
Sta predstavlja digitalni novac:
Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe...
Sta najvise zanima potrosace kod platnih sistema:
Sta koristi SET za identifikaciju:
Sta se dogadja sa stranom koja treba da primi novac:
Pomocu debitnih kartica se:
Udruzenja za kreditne kartice su:
Sta je servis neporecivosti u bezbednosnim servisima sa aspekta...
Sta rade virusi kao programi:
Sta su bezbednosni servisi u elektronskom poslovanju:
Sta su procesni centri:
Sta su Makro virusi:
U kakvom obliku mora da bude ono sto je zabranjeno u sistemu i...
U cemu se sastoji kontrola pristupa zasnovana na mreznim bezbednosnim...
Zasto racunar koji se koristi kao Web server ne bi smeo da se...
Koja je osnovna karakteristika online transakcija kreditnom karticom:
U elektronskoj trgovini, pretplate i clanarine podrazumevaju:
Sta je desifrovanje:
Sta su digitalni cekovi:
Sta je autorizacija:
Sta moze biti pravilo koje vazi za elektronsku trgovinu:
Sta najvise zanima finansijske posrednike kod platnih sistema:
Sta je bezbednost komunikacija u informacionim sistemima:
Sta je servis kontrole pristupa u bezbednosnim servisima sa aspekta...
Po aktuelnim istrazivanjima prednosti koje korisnici navode vezano za...
PayPal je:
Medju najcesce greske koje prave elektronske trgovine spadaju:
Sta znaci Dostupnost u osnovnim ciljevima mera bezbednosti u...
Kada sistemski softver nije dobro konfigurisan, kako to utice na...
Koja je uloga digitalnih kreditnih racuna:
Sta je poricanje transakcije u informacionim sistemima:
Koje vrste platnih sistema postoje:
Sta se definise autorizacijom posle procesa autentikacije korisnika u...
Kako se korisnici koji pristupaju zasticenoj Web stranici...
Pri definisanju prihoda elektronske trgovine razmatraju se sledeci...
Kako se PayPal stiti od prevara:
Sta znaci Upotreba sistema iskljucivo od strane ovlascenih korisnika u...
Koja je uloga SET-a u online kupovini:
U cemu se sastoji potencijalna pretnja informacionom sistemu koja...
Za sta su pogodni osigurani cekovi:
Sta je odbijanje servisa u informacionim sistemima:
Sta je servis poverljivosti u bezbednosnim servisima sa aspekta...
Koji su najozbiljniji gubici u elektronskoj trgovini:
U cemu se sastoji kontrola pristupa zasnovana na imenu domena:
Sta je bezbednost u racunarima u informacionim sistemima:
Sta je online sistem akumuliranih vrednosti:
Medju korisnike elektronske trgovine spadaju:
Kako se prenosi novac preko PayPala:
Sta je danas digitalna trgovina:
Koje su najvaznije karakteristike digitalnog novcanika:
Sta su programi Crvi:
Sta je servis za onemogucavanje odbijanja usluge u bezbednosnim...
SET je:
Zasto je pogodna gotovina u sistemu placanja:
Sta je to klirinska kuca u kupovini kreditnom karticom:
Direktnu prodaju krase sledece osobine prodaje:
Sta je Prekoracenje ovlascenja u informacionim sistemima:
Sta je politika bezbednosti u sistemima sa aspekta elektronske...
Sta moze uraditi primalac novca kada novac stigne na PayPal:
Sta rade Trojanci (Trojanski konji):
Sta je Integritet u osnovnim ciljevima mera bezbednosti u...
Pre definisanja prihoda elektronske trgovine razmatraju se sledeci...
Kako se zove protokol koji znacajno smanjuje rizik upotrebe interneta,...
Sta obezbedjuje SSL u online trgovini:
Po aktuelnim istrazivanjima, mane koje korisnici navode vezano za...
Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe...
Da li se problemi sa apsolutnom zastitom u e-trgovini mogu resiti samo...
Kreditna kartica je:
Sta je digitalni novcanik:
Sta predstavlja raspolozivost iz ugla prodavca:
Zasto se koriste depozitni racuni:
U cemu se sastoji kontrola pristupa zasnovana na korisnickom imenu i...
Zasto su pogodni cekovni transferi u sistemu placanja:
Sta predstavlja raspolozivost iz ugla kupca:
Kako se bira nivo zastite u elektronskoj trgovini:
Sta se desava kada istekne sertifikat veb servera:
Kako PayPal dodatno zaradjuje:
Kada moze doci do napada sa odbijanjem:
Pri definisanju prihoda elektronske trgovine razmatraju se sledeci...
Zasto su pogodni osigurani cekovni transferi u sistemu placanja:
Kako sajtovi e-trgovine generisu prihode:
Sta je bezbednosna elektronska trgovina:
U cemu se sastoji kontrola pristupa zasnovana na sertifikatima...
Kako se koristi kontrola pristupa zasnovana na mreznim bezbednosnim...
Sta znaci Poverljivost u osnovnim ciljevima mera bezbednosti u...
Sta je servis integriteta u bezbednosnim servisima sa aspekta...
Sta je platni sistem digitalnih akumuliranih bilansa:
Odredjeni tipovi sajtova e-trgovine svoj prihod generisu i na osnovu...
Sta je servis autentikacije u bezbednosnim servisima sa aspekta...
Elektronske trgovine indirektnu prodaju ostvaruju tako sto:
Sta sve zahteva sigurna elektronska trgovina:
Sredstva i metodi razvoja online trgovine ukljucujuci drustvene medije...
Odredjeni tipovi sajtova e-trgovine generisu prihod na osnovu oglasnog...
Osnovni bezbednosni servisi su:
Sta predstavlja potencijalne pretnje jednom informacionom sistemu koji...
U osnovnim ciljevima mera bezbednosti u informacionim sistemima, mere...
Alert!

Advertisement