Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
(Short Answer)
4.8/5
(39)
_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
(Short Answer)
4.8/5
(40)
What is the unauthorized use,duplication,distribution,or sale of copyrighted software?
(Multiple Choice)
4.8/5
(39)
What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?
(Multiple Choice)
4.8/5
(40)
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
(True/False)
4.8/5
(36)
A(n)_______ is a program or device that can monitor data traveling over a network.
(Short Answer)
4.8/5
(36)
Which policy details the extent to which e-mail messages may be read by others?
(Multiple Choice)
4.8/5
(28)
Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.
(Short Answer)
4.7/5
(40)
What is the recommended way to implement information security lines of defence?
(Multiple Choice)
4.8/5
(42)
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?
(Multiple Choice)
4.8/5
(34)
To facilitate information privacy,many countries have abolished legislation to protect the collection and sharing of personal information.
(True/False)
4.8/5
(36)
Tokens are small electronic devices that change user passwordsally.
(True/False)
5.0/5
(35)
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)