Exam 2: The Personal and Social Impact of Computers
Exam 1: Introduction to Information Systems155 Questions
Exam 2: The Personal and Social Impact of Computers92 Questions
Exam 3: Hardware: Input, Processing, and Output Devices93 Questions
Exam 4: Software: Systems and Application Software93 Questions
Exam 5: Database Systems, Data Centres, and Business Intelligence97 Questions
Exam 6: Telecommunications and Networks93 Questions
Exam 7: The Internet, Web, Intranets, and Extranets95 Questions
Exam 8: Electronic and Mobile Commerce94 Questions
Exam 9: Enterprise Systems94 Questions
Exam 10: Information and Decision Support Systems95 Questions
Exam 11: Knowledge Management and Specialized Information Systems93 Questions
Exam 12: Systems Development: Investigation and Analysis95 Questions
Exam 13: Systems Development: Design, Implementation, Maintenance, and Review93 Questions
Select questions type
Most organizations implement internal ____________________ to measure actual results against established goals, such as the percentage of end-user reports produced on time.
Free
(Short Answer)
4.7/5
(41)
Correct Answer:
audits
In Canada, PIPEDA requires individual's consent to collect personal information and it can then be used for any purpose.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
What is the essence of the PIPEDA Act (The Personal Information Protection and Electronic Documents Act) in Canada?
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
C
Which of the following should organizations do to protect their corporate computers from criminal hackers?
(Multiple Choice)
4.8/5
(38)
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called ____________________.
(Short Answer)
4.8/5
(41)
People who enjoyed computer technology and spent time learning and using computer systems were originally referred to by what name?
(Multiple Choice)
4.9/5
(35)
Victor was working on his computer when suddenly someone took control and began installing and retrieving files.What is the term used to refer to this situation?
(Multiple Choice)
4.8/5
(27)
____________________ is involved in what is considered the largest copyright infringement case in history.
(Short Answer)
4.8/5
(43)
It has been clearly proven that increased use of cell phones can lead to an increased chance of brain cancer.
(True/False)
4.7/5
(34)
The hazardous activities associated with unfavourable working conditions are collectively referred to as ____________________.
(Short Answer)
4.8/5
(43)
Outline several useful policies to minimize computer-related waste and mistakes.
(Essay)
4.8/5
(30)
Which of the following is a useful policy for minimizing waste and mistake?
(Multiple Choice)
4.7/5
(30)
What type of malware is triggered by a set of preconditions?
(Multiple Choice)
4.8/5
(42)
Software is considered intellectual property and may be protected by copyright or ____________________ law.
(Short Answer)
4.8/5
(40)
What Canadian legislation protects businesses against anti-spam and malware law?
(Multiple Choice)
4.7/5
(34)
List at least three useful guidelines to protect computer users from criminal hackers.
(Essay)
4.8/5
(38)
The vast majority of computer-related crimes are reported to authorities.
(True/False)
4.8/5
(48)
Define the term "identity theft" and briefly describe how identity theft criminals use an individual's personal information.
(Essay)
4.7/5
(35)
What condition is an aggravation of the pathway for the nerves that travel through the wrist?
(Multiple Choice)
4.9/5
(40)
The Business Software Alliance (BSA) has become a prominent software antipiracy organization.It is estimated that in 2009 the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales.
(True/False)
4.8/5
(32)
Showing 1 - 20 of 92
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)