Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
(Multiple Choice)
4.8/5
(36)
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?
(Multiple Choice)
4.8/5
(33)
Information governance is a method or system of government for information management or control.
(True/False)
4.8/5
(37)
Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?
(Multiple Choice)
4.9/5
(35)
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
(Multiple Choice)
4.8/5
(38)
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
(Multiple Choice)
4.8/5
(47)
Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?
(Multiple Choice)
4.8/5
(40)
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
(True/False)
4.9/5
(38)
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
(Multiple Choice)
4.8/5
(37)
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
(True/False)
4.8/5
(31)
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
(True/False)
4.9/5
(32)
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
(Multiple Choice)
5.0/5
(33)
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
(True/False)
5.0/5
(39)
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
(True/False)
4.9/5
(35)
Showing 81 - 100 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)