Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following refers to a period of time when a system is unavailable?

(Multiple Choice)
4.9/5
(38)

What is digital rights management?

(Multiple Choice)
4.8/5
(33)

Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

(True/False)
4.9/5
(26)

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

(Multiple Choice)
4.9/5
(29)

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

(Multiple Choice)
4.7/5
(48)

Backdoor programs change their form as they propagate.

(True/False)
5.0/5
(32)

Which of the following key terms represents the principles and standards that guide our behavior toward other people?

(Multiple Choice)
4.8/5
(30)

What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?

(Multiple Choice)
4.9/5
(44)

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

(Multiple Choice)
4.9/5
(37)

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

(Multiple Choice)
4.7/5
(40)

Which of the below represents the definition of information management?

(Multiple Choice)
4.9/5
(42)

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

(True/False)
4.8/5
(36)

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

(Multiple Choice)
4.7/5
(33)

Information compliance is the act of conforming, acquiescing, or yielding information.

(True/False)
4.9/5
(36)

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

(True/False)
4.7/5
(30)

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively.What is Kristin overseeing for the company?

(Multiple Choice)
4.7/5
(28)

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

(Multiple Choice)
4.8/5
(39)

What is information security?

(Multiple Choice)
4.9/5
(37)

What is the difference between pirated and counterfeit software?

(Multiple Choice)
4.9/5
(34)

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

(True/False)
4.7/5
(26)
Showing 101 - 120 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)