Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
Which of the following is part of the acceptable use policy stipulations?
(Multiple Choice)
4.7/5
(36)
Managing ___________ access to information is a critical piece of the data architecture.
(Short Answer)
4.8/5
(48)
The purpose of PIPEDA is to provide Europeans with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.
(True/False)
4.9/5
(38)
Which of the following describes information technology monitoring?
(Multiple Choice)
4.8/5
(45)
___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
(Short Answer)
4.7/5
(37)
Who breaks into other people's computer systems and just looks around or steals and destroys information?
(Multiple Choice)
4.8/5
(29)
Information security policies detail how an organization will implement the information security plan.
(True/False)
4.8/5
(37)
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
(Multiple Choice)
4.9/5
(33)
What is the ideal type of decisions for people in an organization to make?
(Multiple Choice)
4.9/5
(36)
What is the policy that contains general principles to guide computer user behaviour?
(Multiple Choice)
4.7/5
(37)
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
(Short Answer)
4.9/5
(40)
A(n) information security ____________ details how an organization will implement the information security policies.
(Short Answer)
4.8/5
(34)
Define backup and recovery and explain the importance of the disaster recovery cost curve to an organization.
(Essay)
4.9/5
(35)
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
(True/False)
4.8/5
(37)
Smart card is a(n) _______ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
(Short Answer)
4.9/5
(41)
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
(Multiple Choice)
4.8/5
(39)
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)