1.
U elektronskoj trgovini, pretplate i clanarine podrazumevaju:
Correct Answer
D. Sajtove na kojima se placa pretplata za pracenje informacija
Explanation
The correct answer is "Sajtove na kojima se placa pretplata za pracenje informacija" which translates to "Websites where a subscription is paid to follow information." This means that in e-commerce, subscriptions and memberships refer to websites where users pay a fee to access and receive information. This could include news websites, online magazines, or any other platform where users have to pay to stay updated with the provided content.
2.
SET je:
Correct Answer
C. Secure Electronic Transaction Protocol
Explanation
The correct answer is "Secure Electronic Transaction Protocol" because SET is a protocol that ensures the security of electronic transactions. It provides a secure method for transferring sensitive information such as credit card numbers over the internet. The protocol uses encryption and digital certificates to authenticate the parties involved in the transaction and protect the confidentiality and integrity of the data being transmitted. SET has been widely adopted by banks and financial institutions to facilitate secure online transactions.
3.
Sredstva i metodi razvoja online trgovine ukljucujuci drustvene medije podrazumevaju:
Correct Answer(s)
D. Preporuke na osnovu prethodnih kupovina, osecaj pripadnosti i rejting
E. Web zajednice unutar elektronske trgovine
Explanation
The correct answer includes the methods and tools for developing an online store, including social media. These methods include recommendations based on previous purchases, a sense of belonging and rating, and web communities within the electronic store.
4.
Sta sve zahteva sigurna elektronska trgovina:
Correct Answer(s)
B. Skup zakona
D. Skup procedura
E. Skup tehnoloskih mera
Explanation
Secure electronic commerce requires a set of laws to regulate and protect transactions, a set of procedures to ensure proper handling of sensitive information, and a set of technological measures to safeguard data and prevent unauthorized access.
5.
Zasto se ne preporucuje cesta upotreba udaljenog terminala:
Correct Answer
B. Administracija sistema sa udaljenog terminala nije bezbedna.
Explanation
The correct answer is "Administracija sistema sa udaljenog terminala nije bezbedna." This is because remote terminal administration is not secure. It poses a risk of unauthorized access and potential security breaches. It is recommended to use secure methods and protocols for system administration to ensure the safety and integrity of the system.
6.
Sta najvise zanima finansijske posrednike kod platnih sistema:
Correct Answer
A. Najvise su zainteresovani za sigurne platne sisteme koji prebacuju rizik transakcija i troskove na kupce i prodavce, uz maksimizaciju svojih marzi.
Explanation
Financial intermediaries are most interested in secure payment systems that transfer transaction risk and costs to customers and sellers, while maximizing their own margins.
7.
Sta su digitalni cekovi:
Correct Answer
A. Digitalni cekovi su sistemi koji stvaraju digitalne cekove za e-trgovinu i prosiruju funkcionalnost postojecih cekovnih sistema u bankama.
Explanation
Digitalni cekovi are systems that generate digital checks for e-commerce and expand the functionality of existing check systems in banks.
8.
Koja je uloga digitalnih kreditnih racuna:
Correct Answer
B. Digitalni kreditni racuni su sistemi koji prosiruju online funkcionalnost postojecih platnih sistema kreditnih kartica.
Explanation
Digitalni kreditni računi su sistemi koji proširuju online funkcionalnost postojećih platnih sistema kreditnih kartica. Ovo znači da omogućavaju korisnicima da vrše plaćanja i obavljaju transakcije putem interneta koristeći svoje kreditne kartice. Ova funkcionalnost olakšava i ubrzava proces plaćanja i omogućava korisnicima da obavljaju kupovine i plaćaju račune online.
9.
Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe internet tehnologije sa ekonomske tacke gledista:
Correct Answer
B. Gubljenje poslovnog ugleda i poverenja klijenata zbog loseg iskustva svojih klijenata.
Explanation
The correct answer states that the consequences of technological layoffs or misuse of internet technology from an economic point of view can result in losing business reputation and customer trust due to bad experiences with their own clients. This means that if the company's clients have negative experiences, it can lead to a loss of trust and reputation, which can ultimately affect the business negatively.
10.
Direktnu prodaju krase sledece osobine prodaje:
Correct Answer(s)
B. Video proizvoda
D. Informacije o proizvodu
E. Slike proizvoda
Explanation
The correct answer is Video proizvoda, Informacije o proizvodu, Slike proizvoda. These characteristics of sales are associated with direct selling. Video product demonstrations allow potential customers to see the product in action, providing a more immersive and persuasive experience. Providing information about the product helps customers make informed decisions, and displaying images of the product gives them a visual representation. These features enhance the effectiveness of direct sales by engaging customers and providing them with the necessary information to make a purchase.
11.
Osnovni bezbednosni servisi su:
Correct Answer(s)
A. Servis za onemogucavanje odbijanja usluga
B. Servis integriteta
H. Servis autentikacije
I. Servis kontrole pristupa
K. Servis neporecivosti
L. Servis poverljivosti
Explanation
The correct answer includes a list of basic security services. These services are: denial of service prevention, integrity service, authentication service, access control service, non-repudiation service, and confidentiality service. These services are essential for ensuring the security of a system or network by preventing unauthorized access, protecting data integrity, verifying the identity of users, controlling access to resources, ensuring the non-repudiation of transactions, and maintaining the confidentiality of sensitive information.
12.
Sta je servis autentikacije u bezbednosnim servisima sa aspekta e-trgovine:
Correct Answer
C. Servis autentikacije obezbedjuje garanciju identiteta i porekla podataka.
Explanation
The correct answer is "Servis autentikacije obezbedjuje garanciju identiteta i porekla podataka." This means that the authentication service ensures the guarantee of the identity and origin of the data. It verifies the identity of the user accessing the system and ensures that the data being transmitted or received is genuine and has not been tampered with. This helps to maintain the integrity and security of the e-commerce system, ensuring that only authorized users can access and manipulate the data.
13.
Koje su aktuelne vece kategorije digitalnih novcanika:
Correct Answer
A. Postoje dve kategorije digitalnih novcanika: bazirani na klijentu i bazirani na serveru.
Explanation
The correct answer is "Postoje dve kategorije digitalnih novcanika: bazirani na klijentu i bazirani na serveru." This answer accurately states that there are two categories of digital wallets: client-based and server-based. It provides a clear and concise explanation of the different categories without any additional unnecessary information.
14.
Kreditna kartica je:
Correct Answer
B. Racun pomocu kojeg potrosac placa na odlozeno.
Explanation
The correct answer is "Racun pomocu kojeg potrosac placa na odlozeno." This means that a credit card is an account through which a consumer can make payments on a deferred basis. Unlike a debit card, where the money is deducted immediately from the account, a credit card allows the consumer to make purchases and pay for them at a later date, usually with added interest.
15.
Zasto racunar koji se koristi kao Web server ne bi smeo da se istovremeno koristi i kao racunar opste namene:
Correct Answer
C. Hardver servera moze da bude nebezbedan.
Explanation
The given answer suggests that a computer used as a web server should not be used for general purposes because the server hardware can be insecure. This implies that using the server for general purposes may compromise its security and make it vulnerable to potential attacks or unauthorized access. Therefore, it is recommended to separate the functions of a web server and a general-purpose computer to ensure the security and integrity of the server.
16.
Sta je bezbednost komunikacija u informacionim sistemima:
Correct Answer
C. Bezbednost komunikacija oznacava zastitu informacija u toku prenosa iz jednog elektronskog sistema u drugi.
Explanation
The correct answer is "Bezbednost komunikacija oznacava zastitu informacija u toku prenosa iz jednog elektronskog sistema u drugi." This answer explains that communication security refers to the protection of information during transmission from one electronic system to another. It implies that the main focus is on safeguarding the data being transferred rather than preventing eavesdropping or encrypting voice information.
17.
Zasto se koriste depozitni racuni:
Correct Answer
A. Sa depozitnih racuna se mogu vrsiti placanja ili neki drugi transferi.
Explanation
Depozitni računi se koriste za vršenje plaćanja ili drugih transfera. To znači da korisnici mogu uplatiti novac na svoj depozitni račun i koristiti ga za plaćanje računa, kupovinu proizvoda ili usluga, ili za slanje novca drugim osobama. Ovi računi omogućavaju sigurno čuvanje novca i olakšavaju brze i jednostavne transakcije. Također, korisnici mogu koristiti depozitne račune za napredna depozitna plaćanja usluga, što može uključivati automatsko plaćanje računa ili periodično prebacivanje novca na druge račune. Kreditna odložena plaćanja također mogu biti moguća s depozitnih računa, što omogućava korisnicima da odgode plaćanje određenih troškova.
18.
Kakve mogu biti posledice otkaza tehnoloske prirode ili zloupotrebe internet tehnologije sa ekonomske tacke gledista:
Correct Answer
C. Gubljenje vrednih i poverljivih informacija, nelegalan pristup informacijama o kupcima.
Explanation
The consequences of technological dismissal or misuse of internet technology from an economic perspective can include the loss of valuable and confidential information, specifically through unauthorized access to customer information. This can lead to potential breaches of privacy and security, as well as the misuse of customer data for fraudulent activities.
19.
U osnovnim ciljevima mera bezbednosti u informacionim sistemima, mere koje obezbedjuju nedostupnost informacija neovlascenim licima, konzistentnost podataka, sprecavanje neovlascenog generisanje, promene i unistenje podataka su:
Correct Answer(s)
B. Poverljivost
C. Integritet
F. Dostupnost
Explanation
The correct answer is a combination of three measures: poverljivost (confidentiality), integritet (integrity), and dostupnost (availability). Poverljivost ensures that information is only accessible to authorized individuals, preventing unauthorized access. Integritet ensures that data remains accurate and unaltered, preventing unauthorized changes or destruction. Dostupnost ensures that information is readily available to authorized users when needed, preventing any disruptions or unavailability. These three measures work together to protect information from unauthorized access, maintain its accuracy and consistency, and ensure it is accessible to authorized users.
20.
Sta su Makro virusi:
Correct Answer
B. To su virusi napisani u makro jeziku nekog tekst procesora i rezidentni su unutar dokumenata.
Explanation
Makro viruses are viruses that are written in the macro language of a word processor and reside within documents. They are not necessarily large in size, as mentioned in the incorrect options. These viruses exploit the functionality of macros to execute malicious actions and can spread through infected documents.
21.
Da li se problemi sa apsolutnom zastitom u e-trgovini mogu resiti samo primenom tehnologije:
Correct Answer
A. Da, ali se ne koristi u praksi jer je preskupo resenje.
Explanation
The correct answer suggests that the problems with absolute protection in e-commerce can be solved by using technology, but it is not implemented in practice due to its high cost. This implies that while technology can provide a solution, the practicality of implementing it is hindered by its expensive nature. Therefore, the answer emphasizes the importance of considering cost-effectiveness when addressing security issues in e-commerce.
22.
Medju najcesce greske koje prave elektronske trgovine spadaju:
Correct Answer(s)
B. Previse dodataka koji nisu bili navedeni u regularnoj ceni (isporuka, carina, porezi)
C. Sajt trazi previse licnih podataka
E. Proces narucivanja, placanja koji je previse dugacak, zbunjujuci
Explanation
The correct answer includes three common mistakes made by electronic commerce: adding additional costs that were not mentioned in the regular price (delivery, customs, taxes), requesting too much personal information on the website, and having a long and confusing ordering and payment process. These mistakes can lead to customer dissatisfaction and may discourage potential buyers from completing their purchases.
23.
Sta je platni sistem digitalnih akumuliranih bilansa:
Correct Answer
C. Platni sistem digitalnih akumuliranih bilansa akumuliraju male naplate i pogodni su za mikroplacanja.
Explanation
The correct answer is "Platni sistem digitalnih akumuliranih bilansa akumuliraju male naplate i pogodni su za mikroplacanja." This is because the sentence states that the system accumulates small payments and is suitable for micro-payments.
24.
Sta su programi Crvi:
Correct Answer
A. To su programi koji prave veliki broj svojih kopija i prenose se sa jednog racunara na drugi.
Explanation
The correct answer is "To su programi koji prave veliki broj svojih kopija i prenose se sa jednog računara na drugi." This answer accurately describes what worm programs are - they are programs that create numerous copies of themselves and spread from one computer to another.
25.
Kako se PayPal stiti od prevara:
Correct Answer
A. PayPal trazi specijalnu dozvolu za iznose preko $200.
Explanation
PayPal trazi specijalnu dozvolu za iznose preko $200. This statement suggests that PayPal has a specific authorization process in place for transactions exceeding $200. This additional step helps to ensure the security and legitimacy of larger transactions, reducing the risk of fraud. By requiring special permission, PayPal adds an extra layer of protection for its users and their financial transactions.
26.
Zasto su pogodni cekovni transferi u sistemu placanja:
Correct Answer
C. Mogu se koristiti i za male i za velike transakcije, izuzimajuci jedino mikroplacanja.
Explanation
Cekovni transferi su pogodni za male i velike transakcije, ali ne za mikroplacanja.
27.
Po aktuelnim statistickim podacima medju zemlje koje najvise koriste elektronsku trgovinu spadaju:
Correct Answer(s)
B. Nemacka
E. Japan
F. Engleska
Explanation
The correct answer includes three countries: Germany, Japan, and England. These countries are among the top users of electronic commerce according to current statistical data.
28.
Po aktuelnim statistickim podacima medju zemlje koje najmanje koriste elektronsku trgovinu spadaju:
Correct Answer(s)
B. Brazil
D. Meksiko
F. Indija
Explanation
The countries that least use e-commerce according to current statistical data are Brazil, Mexico, and India. These countries have lower levels of adoption and utilization of electronic commerce compared to others like the United Kingdom, Japan, and Germany. This could be due to various factors such as limited internet access, lower levels of digital literacy, inadequate infrastructure, cultural preferences for traditional shopping methods, or lack of trust in online transactions.
29.
Elektronska trgovina podrazumeva:
Correct Answer
A. Kupovinu ili prodaju proizvoda i usluga preko bilo kog elektronskog medijuma.
Explanation
The correct answer is "Kupovinu ili prodaju proizvoda i usluga preko bilo kog elektronskog medijuma." This answer accurately defines elektronska trgovina as the buying or selling of products and services through any electronic medium. It encompasses the concept of conducting commercial transactions online, whether it be through websites, mobile apps, or other electronic platforms. This definition excludes the other options provided, such as B2E type internet portals, implemented BI solutions, and the existence of offline stores, as they are not directly related to the concept of elektronska trgovina.
30.
Koji su najozbiljniji gubici u elektronskoj trgovini:
Correct Answer
A. Najozbiljniji gubici su usled kradje vlasnickih informacija i novcane prevare.
Explanation
The most serious losses in e-commerce are due to theft of personal information and financial fraud. This can include incidents such as identity theft, where someone gains unauthorized access to personal data and uses it for fraudulent purposes, as well as instances of financial fraud where individuals or organizations deceive customers into making payments or providing sensitive financial information. These types of losses can have severe consequences for both businesses and individuals, leading to financial loss, reputational damage, and potential legal repercussions. It is crucial for e-commerce platforms to implement robust security measures to protect against these types of threats.
31.
Pomocu debitnih kartica se:
Correct Answer
A. Odmah naplacuju dugovanja ili se realizuju druge potraznje sa depozitnih racuna.
Explanation
Debitne kartice omogućavaju korisnicima da odmah naplate dugovanja ili realizuju druge potražnje sa svojih depozitnih računa. To znači da se novčana sredstva sa računa korisnika automatski skidaju prilikom plaćanja ili obavljanja transakcija putem debitne kartice. Ova funkcionalnost omogućava trenutno i jednostavno upravljanje finansijama, bez potrebe za čekanjem ili odobravanjem transakcija.
32.
Zasto je pogodna gotovina u sistemu placanja:
Correct Answer
A. Gotovina je anonimna i skoro je nemoguce uci u trag transakcijama.
Explanation
The use of cash as a payment method is suitable because it provides anonymity and makes it nearly impossible to trace transactions. Cash transactions do not leave a digital trail, making it difficult for authorities or individuals to track the flow of money. Additionally, cash prevents fraud through counterfeiting, as it is harder to forge physical currency compared to digital transactions. Lastly, cash payments can be recorded by keeping track of the serial numbers of the banknotes, allowing for some level of record-keeping.
33.
Sta je neophodno da bi se sprovele u praksu mere osiguranja sigurne elektronske trgovine:
Correct Answer
A. NeopHodna je upotreba kriptoloskih tehnologija, kao sto su digitalni potpis i sifarski sistemi sa javnim i tajnim kljucem.
Explanation
To ensure secure electronic commerce, it is necessary to use cryptographic technologies such as digital signatures and public-key and private-key cipher systems. These technologies provide authentication, confidentiality, and integrity of electronic transactions, ensuring that the information exchanged between parties is secure and cannot be tampered with or accessed by unauthorized individuals. By using digital signatures, the authenticity and integrity of the messages can be verified, while the public-key and private-key cipher systems provide encryption and decryption capabilities to protect the confidentiality of sensitive data.
34.
Medju korisnike elektronske trgovine spadaju:
Correct Answer(s)
D. Podjednako muskarci i zene
E. Korisnici starosti od 30-50 godina, a cija grupa cini najveci procenat online transakcija
Explanation
The correct answer is "Podjednako muskarci i zene, Korisnici starosti od 30-50 godina, a cija grupa cini najveci procenat online transakcija." This answer suggests that both men and women are users of electronic commerce, and the age group of 30-50 years old represents the highest percentage of online transactions.
35.
Koje vrste platnih sistema postoje:
Correct Answer
C. Postoji: kes, cekovi, kreditne kartice, nagomilana vrednost i akumulirajuci bilans.
Explanation
The correct answer is "Postoji: kes, cekovi, kreditne kartice, nagomilana vrednost i akumulirajuci bilans." This answer accurately lists the types of payment systems that exist, including cash (kes), checks (cekovi), credit cards (kreditne kartice), accumulated value (nagomilana vrednost), and an accumulating balance (akumulirajuci bilans).
36.
Kupovina ili prodaja proizvoda i usluga preko bilo kog elektronskog medijuma predstavlja:
Correct Answer
B. Elektronsku trgovinu
Explanation
The correct answer is "Elektronsku trgovinu" because buying or selling products and services through any electronic medium is commonly referred to as electronic commerce or e-commerce. This involves online transactions, such as purchasing goods from an online store or booking services through a website.
37.
Amazon.com, danas najpoznatija kompanija iz oblasti elektronske trgovine svoj posao zapocela je prodajom:
Correct Answer
D. Knjiga
Explanation
Amazon.com, the most well-known company in the field of e-commerce, started its business by selling books. This is significant because it highlights the origins of Amazon as an online bookstore and how it has since expanded into various other product categories. Selling books was the foundation of Amazon's success and paved the way for its growth into the global retail giant it is today.
38.
Sta treba da uradi korisnik ako je adresa koja se nalazi na sertifikatu razlicita od stvarne adrese URL i na to ga upozori pretrazivac (browser):
Correct Answer
C. Korisnik bi trebao da odustane od pristupa takvoj Web stranici.
Explanation
If the address on the certificate is different from the actual URL and the browser warns the user, the user should abandon accessing such a website.
39.
Sta znaci Poverljivost u osnovnim ciljevima mera bezbednosti u informacionim sistemima:
Correct Answer
C. Poverljivost obezbedjuje nedostupnost informacija neovlascenim licima.
Explanation
The correct answer is "Poverljivost obezbedjuje nedostupnost informacija neovlascenim licima." This means that confidentiality ensures that information is not accessible to unauthorized individuals.
40.
Sta su bezbednosni servisi u elektronskom poslovanju:
Correct Answer
C. Bezbednosni servisi su delovi sistema koji realizuju aktivnosti koje pariraju pretnjama vezanim za bezbednost sistema.
Explanation
The correct answer states that security services in electronic business are components of a system that carry out activities to counter security threats related to the system's security. This means that these services are responsible for implementing measures and protocols to protect the system from potential risks and ensure its security.
41.
Sta je Prekoracenje ovlascenja u informacionim sistemima:
Correct Answer
A. Prekoracenje ovlascenja se desava kada lice ovlasceno za koriscenje sistema koristi sistem na neovlasceni nacin.
Explanation
Prekoracenje ovlascenja u informacionim sistemima se desava kada lice koje ima odobrenje za koriscenje sistema koristi sistem na neovlasceni nacin. To znaci da osoba prelazi granice svojih ovlastenja i koristi sistem na nacin koji nije dozvoljen ili predvidjen njenim ovlastenjima. Ovo moze ukljucivati pristupanje podacima ili funkcionalnostima sistema za koje osoba nije ovlastena, ili izvrsavanje radnji koje su izvan njenih ovlastenja.
42.
Sta rade virusi kao programi:
Correct Answer
C. Multiplikuju se i ubacuju u izvrsne programe, datoteke ili delove memorije, a zatim se prenose kroz sistem putem razmene datoteka.
Explanation
Viruses as programs multiply and insert themselves into executable programs, files, or parts of memory, and then spread through the system via file exchange. This process allows the virus to replicate and spread to other computers, potentially causing harm by modifying programs and slowing down the computer's performance.
43.
EMV je:
Correct Answer
B. Europay MasterCard Visa
Explanation
EMV stands for Europay MasterCard Visa. Europay, MasterCard, and Visa are three major companies that developed a global standard for credit and debit card payments. The EMV standard ensures that payment cards and terminals are compatible and secure, reducing the risk of fraud. This standard is widely used around the world, providing a secure and convenient way for consumers to make payments.
44.
Nakon kreiranja PayPal naloga popunjavanjem formulara sa podacima o kreditnoj kartici i racunu u banci, da li trgovac ima pristup svim podacima:
Correct Answer
B. Samo PayPal ima pristup ovim informacijama, a ne i strana koja prima novac.
Explanation
The correct answer is "Samo PayPal ima pristup ovim informacijama, a ne i strana koja prima novac." This means that only PayPal has access to the information provided during the creation of the PayPal account, including the credit card and bank account details. The recipient of the money does not have access to this information.
45.
Sta je digitalna gotovina:
Correct Answer
B. Digitalna gotovina je privatni oblik monete koja moze biti potrosena u okviru sajtova e-trgovine.
Explanation
Digitalna gotovina se odnosi na privatni oblik monete koji se može koristiti za plaćanje unutar sajtova e-trgovine. To znači da se digitalna gotovina koristi kao sredstvo plaćanja prilikom online kupovine i može se potrošiti na različite proizvode ili usluge koje su dostupne na internetu. Ova vrsta novca omogućava brzo i jednostavno plaćanje putem digitalnih uređaja, kao što su računari, pametni telefoni ili tableti.
46.
Sta je Integritet u osnovnim ciljevima mera bezbednosti u informacionim sistemima:
Correct Answer
B. Integritet obezbedjuje konzistentnost podataka, sprecavajuci promenu i unistenje podataka.
Explanation
The correct answer explains that integrity ensures the consistency of data and prevents its alteration and destruction. This means that the data remains accurate, reliable, and unchanged throughout its lifecycle, maintaining its integrity.
47.
Koje su najvaznije karakteristike digitalnog novcanika:
Correct Answer
C. To su: Autentifikacija kupca, nagomilavanje i transfer vrednosti i obezbedjenje procesa placanja
Explanation
The correct answer states that the most important characteristics of a digital wallet are customer authentication, accumulation and transfer of value, and ensuring the payment process. This means that the digital wallet should have a secure way to authenticate the user, allow the accumulation and transfer of funds or value, and provide a secure process for making payments.
48.
Sta je servis kontrole pristupa u bezbednosnim servisima sa aspekta e-trgovine:
Correct Answer
C. Servis kontrole pristupa stiti sistem od neovlascenog pristupa pojedinim njegovim resursima.
Explanation
The correct answer is that the access control service protects the system from unauthorized access to its resources. This means that the access control service ensures that only authorized individuals or entities are granted access to specific resources within the IT system, preventing any unauthorized access that could potentially compromise the system's security.
49.
Ko sve ucestvuje u online kupovine kreditnom karticom:
Correct Answer
C. Ukljuceni su potrosac, prodavac, klirinska kuca, banka prodavca i banka koja je izdala karticu potrosacu
Explanation
The correct answer is that the participants involved in online shopping with a credit card are the consumer, the merchant, the clearinghouse, the merchant's bank, and the bank that issued the card to the consumer.
50.
Kada moze doci do napada sa odbijanjem:
Correct Answer
C. Kada je softver osetljiv na zadatke koji nisu unapred predvidjeni
Explanation
When a software is sensitive to tasks that are not pre-defined, it can be vulnerable to denial-of-service attacks. In such attacks, the attacker overwhelms the software with unexpected or excessive requests, causing it to become unresponsive or crash. This vulnerability can occur regardless of whether the software is a client-server architecture or if the client and server are on different operating systems.