Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
_________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.
(Short Answer)
4.8/5
(32)
What is the policy that contains general principles to guide computer user behaviour?
(Multiple Choice)
4.8/5
(45)
How individuals behave toward each other,how they handle information,computer technologies,and information systems,are largely influenced by people's ethics.
(True/False)
5.0/5
(37)
Information privacy is about the prevention of collecting and sharing personal information.
(True/False)
4.9/5
(38)
___________ is a US federal law established in 1998 that applies to the collection of personal information from American children who are under 13 years of age.
(Short Answer)
5.0/5
(35)
Which of the following is a program or device that can monitor data traveling over a network?
(Multiple Choice)
4.8/5
(43)
Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a Web site with so many requests for service that it slows down or crashes.
(Short Answer)
4.9/5
(41)
A(n)____________ computer use policy contains general principles to guide computer user behaviour.
(Short Answer)
4.9/5
(32)
Which of the following authentication methods is 100 percent accurate?
(Multiple Choice)
5.0/5
(39)
Which of the following is not included in the four quadrants of ethical and legal behaviour?
(Multiple Choice)
4.7/5
(30)
Surprisingly,the biggest issue surrounding information security is not a people issue,but a technical issue.
(True/False)
5.0/5
(38)
Employee ________________ policies explicitly state how,when,and where the company monitors its employees.
(Short Answer)
4.8/5
(41)
A(n)information security ____________ details how an organization will implement the information security policies.
(Short Answer)
4.9/5
(31)
What identifies the rules required to maintain information security?
(Multiple Choice)
4.9/5
(35)
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?
(Multiple Choice)
4.7/5
(35)
What is a contractual stipulation that ensures that e-business participants do not deny their online actions?
(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)