Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
Which of the following represents the classic example of unintentional information reuse?
(Multiple Choice)
4.7/5
(35)
What identifies the rules required to maintain information security?
(Multiple Choice)
4.9/5
(27)
Key logger or key trapper software is a(n) __________ that when installed on a computer, records every keystroke and mouse click.
(Short Answer)
4.7/5
(34)
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
(Multiple Choice)
4.8/5
(37)
_________ is a contractual stipulation to ensure that e-business participants do not deny their online actions.
(Short Answer)
4.8/5
(40)
Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.
(Short Answer)
4.9/5
(39)
The gist of the 10 Guiding Principles of PIPEDA for organizations can be remembered as the 3Cs: consent, choice, and __________.
(Short Answer)
4.8/5
(44)
Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
(Essay)
4.8/5
(37)
Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
(Short Answer)
4.8/5
(41)
What is a program, when installed on a computer, records every keystroke and mouse click?
(Multiple Choice)
4.9/5
(43)
_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
(Short Answer)
4.9/5
(35)
An organization should implement information security lines of defence through people first and technology second.
(True/False)
4.9/5
(40)
Which is a virus that opens a way into the network for future attacks?
(Multiple Choice)
4.8/5
(38)
__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
(Short Answer)
4.9/5
(42)
________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
(Short Answer)
4.9/5
(37)
What is the most common type of defence within detection and response technologies?
(Multiple Choice)
5.0/5
(37)
Denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.
(Short Answer)
4.8/5
(37)
Showing 141 - 160 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)