Exam 21: Plug It in 6 Project Management
Exam 1: Introduction to Information Systems103 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems85 Questions
Exam 3: Data and Knowledge Management62 Questions
Exam 4: Telecommunications and Networking98 Questions
Exam 5: Business Analytics82 Questions
Exam 6: Ethics and Privacy54 Questions
Exam 7: Information Security87 Questions
Exam 8: Social Computing64 Questions
Exam 9: E-Business and E-Commerce85 Questions
Exam 10: Wireless, Mobile Computing, and Mobile Commerce79 Questions
Exam 11: Information Systems Within the Organization69 Questions
Exam 12: Customer Relationship Management62 Questions
Exam 13: Supply Chain Management42 Questions
Exam 14: Acquiring Information Systems and Applications88 Questions
Exam 15: Plug It in 7 Protecting Your Information Assets40 Questions
Exam 16: Plug It in 1 Business Processes and Business Process Management28 Questions
Exam 17: Plug It in 2 Hardware and Soft Ware14 Questions
Exam 18: Plug It in 3 Fundamentals of Relational Database Operations29 Questions
Exam 19: Plug It in 4 Cloud Computing18 Questions
Exam 20: Plug It in 5 Artificial Intelligence23 Questions
Exam 21: Plug It in 6 Project Management38 Questions
Select questions type
A(n)_____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.
(Multiple Choice)
4.8/5
(43)
You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.
(True/False)
4.8/5
(28)
If your identity is stolen, what is the first thing you should do?
(Multiple Choice)
4.8/5
(37)
Methods you should use to protect your portable devices and information include all of the following except:
(Multiple Choice)
4.8/5
(42)
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.
(Multiple Choice)
4.7/5
(37)
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.
(Multiple Choice)
4.9/5
(31)
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?
(Multiple Choice)
5.0/5
(36)
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.
(Multiple Choice)
4.7/5
(36)
You are going on a business trip. Which of the following would be the worst type of card to take?
(Multiple Choice)
4.8/5
(37)
A _____ offers you the option of shopping online with a disposable credit card number.
(Multiple Choice)
4.9/5
(35)
Content-filtering software performs all of the following functions except:
(Multiple Choice)
4.8/5
(26)
A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
(Multiple Choice)
4.8/5
(31)
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?
(Multiple Choice)
4.8/5
(39)
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
(True/False)
4.7/5
(32)
A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
(True/False)
4.8/5
(38)
When you use the private browsing mode on your computer, your search history is recorded and visible only to you.
(True/False)
4.8/5
(37)
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
(Multiple Choice)
4.9/5
(42)
Showing 21 - 38 of 38
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)