Exam 2: The Personal and Social Impact of Computers
Exam 1: Introduction to Information Systems155 Questions
Exam 2: The Personal and Social Impact of Computers92 Questions
Exam 3: Hardware: Input, Processing, and Output Devices93 Questions
Exam 4: Software: Systems and Application Software93 Questions
Exam 5: Database Systems, Data Centres, and Business Intelligence97 Questions
Exam 6: Telecommunications and Networks93 Questions
Exam 7: The Internet, Web, Intranets, and Extranets95 Questions
Exam 8: Electronic and Mobile Commerce94 Questions
Exam 9: Enterprise Systems94 Questions
Exam 10: Information and Decision Support Systems95 Questions
Exam 11: Knowledge Management and Specialized Information Systems93 Questions
Exam 12: Systems Development: Investigation and Analysis95 Questions
Exam 13: Systems Development: Design, Implementation, Maintenance, and Review93 Questions
Select questions type
What set of programs enables its user to gain administrator-level access to a computer or network?
(Multiple Choice)
4.7/5
(46)
When working at a workstation, the ____________________ of the monitor should be at or just below eye level.
(Short Answer)
4.9/5
(40)
The European Union has a data-protection directive that requires firms to have certain privacy procedures in place if they do which of the following?
(Multiple Choice)
4.9/5
(37)
Which of the following is an example of a company policy regarding the acquisition of computer systems and equipment?"
(Multiple Choice)
4.7/5
(35)
Managed ____________________ providers monitor, manage, and maintain network security for their customers.
(Short Answer)
4.8/5
(38)
Because it is important to maintain accurate data and ensure that people understand their responsibilities, companies converting to ERP and e-commerce systems invest weeks of training for key users of the system's various modules.
(True/False)
4.8/5
(33)
While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data.
(True/False)
4.8/5
(42)
Role-based system access means that only people who fill or used to fill a certain role can access a specific system.
(True/False)
4.8/5
(28)
Smartphones, such as the iPhone and Google's Android phone, which can run applications, are impervious to malware.
(True/False)
4.9/5
(39)
Fingerprint authentication devices, used to provide security in the PC environment, are sometimes employed rather than passwords.
(True/False)
4.8/5
(28)
Jason has been fired by his company and he posted on his blog false rumours about his company.What term is used to refer to Jason's postings?
(Multiple Choice)
4.8/5
(26)
____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
(Short Answer)
4.8/5
(32)
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
(True/False)
4.9/5
(32)
What should computer users do if they work at their machines for several hours a day?
(Multiple Choice)
4.8/5
(33)
Few small- and medium-sized organizations are willing to outsource their network security operations.
(True/False)
4.8/5
(39)
Just because an act is defined as legal does not mean that it is ____________________.
(Short Answer)
4.8/5
(44)
Kelsey is a new immigrant to Canada and she has shared her personal information with many institutions and is concerned that they may share her personal information with unauthorized parties without her consent.What type of concern does she have?
(Multiple Choice)
4.9/5
(37)
Many organizations have established best practices to govern and guide employees' moral behaviour and establish a healthy workplace.Into what type of system would these guidelines fall?
(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 92
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)