Exam 2: The Personal and Social Impact of Computers
Exam 1: Introduction to Information Systems155 Questions
Exam 2: The Personal and Social Impact of Computers92 Questions
Exam 3: Hardware: Input, Processing, and Output Devices93 Questions
Exam 4: Software: Systems and Application Software93 Questions
Exam 5: Database Systems, Data Centres, and Business Intelligence97 Questions
Exam 6: Telecommunications and Networks93 Questions
Exam 7: The Internet, Web, Intranets, and Extranets95 Questions
Exam 8: Electronic and Mobile Commerce94 Questions
Exam 9: Enterprise Systems94 Questions
Exam 10: Information and Decision Support Systems95 Questions
Exam 11: Knowledge Management and Specialized Information Systems93 Questions
Exam 12: Systems Development: Investigation and Analysis95 Questions
Exam 13: Systems Development: Design, Implementation, Maintenance, and Review93 Questions
Select questions type
Briefly discuss some of the health-related issues associated with heavy computer use.
(Essay)
4.8/5
(44)
A rejected e-mail automatically goes to the junk e-mail folder provided by your e-mail service.
(True/False)
4.8/5
(47)
The CAN-SPAM Act allows most e-mail spam to be sent as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail.
(True/False)
4.9/5
(32)
The use of e-mail among public officials might violate transborder data flow laws.
(True/False)
5.0/5
(35)
A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer-based attacks.
(Short Answer)
5.0/5
(36)
The ____________________ is the oldest computing society and boasts more than 80,000 members in more than 100 countries.
(Short Answer)
4.8/5
(35)
Define the term "spyware" and briefly describe three types of this malware.
(Essay)
4.9/5
(31)
What variable value is applied, using an algorithm, to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text?
(Multiple Choice)
4.8/5
(29)
Arash realized recently that someone has been withdrawing money from his account and is making purchases using his credit card.What type of computer crime is this?
(Multiple Choice)
4.9/5
(40)
The ____________________ Card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller.
(Short Answer)
4.8/5
(42)
If a court determines that a patent infringement is intentional and the patent holder claims $5 million in damages, up to what amount can the patent holder be awarded?
(Multiple Choice)
4.8/5
(42)
Unfortunately, many intrusion detection systems frequently provide false alarms that result in wasted effort.
(True/False)
4.9/5
(43)
A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
(Short Answer)
4.8/5
(34)
Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defences.
(Short Answer)
4.8/5
(35)
What condition can result from a job that involves sitting at a desk and using a computer all day?
(Multiple Choice)
4.9/5
(35)
Often, computer criminals manipulate people and get them to reveal their confidential information.This practice is called _______________.
(Short Answer)
4.7/5
(37)
Which of the following is FALSE about the Electronic Commerce Protection Act (ECPA)?
(Multiple Choice)
4.7/5
(40)
The Canadian government has established the Canadian Cyber Incident Response Centre to combat cyber attacks.
(True/False)
4.8/5
(37)
Software piracy is the act of authorized copying or distribution of copyrighted software.
(True/False)
4.7/5
(37)
Showing 41 - 60 of 92
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)