All of the following techniques are used to validate electronic data interchange transactions except

A. value added networks can compare passwords to a valid customer file before message transmission
B. prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C. the recipient's application software can validate the password prior to processing
D. the recipient's application software can validate the password after the transaction has been processed


Answer: D

Computer Science & Information Technology

You might also like to view...

Critical Thinking QuestionsCase B-2Barris has been working on a poster for his band, We Hate Crust, and he's unhappy with the way it looks. For some reason, many of the images he has placed appear to be either pixilated or have rough edges, and he really wants everything to look crisp and clean. Barris knows that the ____ offers you a number of useful options for viewing and refining the edge of a selection.

A. Edge dialog box B. Refine Edge dialog box C. Edging Tools dialog box D. Refining Tools dialog box

Computer Science & Information Technology

The ________ attribute sets coordinates for clickable areas on an image map

Fill in the blank(s) with correct word

Computer Science & Information Technology

____________________ is sometimes called a programming language without any details.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ is a collection of drawings, photographs, sounds, videos, and other media files shared among Microsoft Office applications.

A. The Themes gallery B. The Microsoft Clip Organizer C. Windows Explorer D. Backstage view

Computer Science & Information Technology