Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
Describe the relationships and differences between hackers and viruses.
(Essay)
4.8/5
(38)
A __________ is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor
(Short Answer)
4.7/5
(32)
Information compliance is the act of conforming,acquiescing,or yielding information.
(True/False)
4.9/5
(30)
Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
(Short Answer)
4.7/5
(41)
Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.
(True/False)
4.9/5
(32)
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
(Short Answer)
4.7/5
(34)
_________ programs are viruses that open a way into the network for future attacks.
(Short Answer)
4.8/5
(27)
Which of the following means the right to be left alone when you want to be,to have control over your personal possessions,and not to be observed without your consent?
(Multiple Choice)
4.9/5
(30)
Which of the following definitions represents Internet censorship?
(Multiple Choice)
4.8/5
(26)
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
(Multiple Choice)
4.8/5
(44)
Who are experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge?
(Multiple Choice)
4.9/5
(33)
_____________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.
(Short Answer)
4.7/5
(39)
What are the first two lines of defense a company should take when addressing security risks?
(Multiple Choice)
4.9/5
(36)
Which of the following is a cost of downtime in addition to lost revenue?
(Multiple Choice)
4.9/5
(39)
What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?
(Multiple Choice)
5.0/5
(39)
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
(True/False)
4.9/5
(38)
What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was,what ads were viewed and what was purchased?
(Multiple Choice)
4.8/5
(36)
The unauthorized use,duplication,distribution,or sale of copyrighted software is called ____________ software.
(Short Answer)
4.9/5
(40)
The _________ act restricts what information the federal government can collect.
(Short Answer)
4.8/5
(29)
How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?
(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)