Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
(Multiple Choice)
4.8/5
(33)
What is it called when you may use copyrighted material in certain situations-for example, in the creation of new work or, within certain limits, for teaching purposes?
(Multiple Choice)
4.7/5
(37)
_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
(Short Answer)
5.0/5
(36)
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
(True/False)
4.9/5
(42)
A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
(Short Answer)
4.8/5
(37)
Which of the following is not one of the five steps for creating an information security plan?
(Multiple Choice)
4.9/5
(41)
Organizations should not choose a backup and recovery strategy that is in line with its business goals
(True/False)
4.8/5
(33)
Ethical computer use policy contains general principles to guide computer user behaviour.
(True/False)
4.9/5
(36)
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
(Short Answer)
4.7/5
(33)
An organization should implement information security lines of defence through _____ first and technology second.
(Short Answer)
4.8/5
(32)
To facilitate information privacy, many countries have established __________________ to protect the collection and sharing of personal information.
(Short Answer)
4.8/5
(38)
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
(Short Answer)
4.9/5
(35)
Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.
(Short Answer)
4.8/5
(37)
What is intangible creative work that is embodied in physical form?
(Multiple Choice)
4.8/5
(37)
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
(Essay)
4.8/5
(34)
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
(True/False)
4.9/5
(34)
What are the principles and standards that guide our behaviour toward other people?
(Multiple Choice)
4.7/5
(47)
________ is a U.S. federal law established in 1998 that applies to collectingpersonal information from American children who are under 13 years of age.
(Multiple Choice)
4.9/5
(35)
Showing 121 - 140 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)