
Economic Informatics CH 1-4
Authored by Fatima Rustamova
Computers, Professional Development, Business
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is true?
Information can be an asset or a liability, depending on the adopted information strategy or external factors.
Information can be neither asset, nor liability.
Information can be an asset, but not liability.
Information can be liability, but not asset.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
Location-independent resource pooling
Ubiquitous network access
Rapid elasticity
On-demand self-service
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.
private cloud
public cloud
hybrid cloud
integrated cloud
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Privacy
Standards
Security
Transferrability
5.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.
6.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .
ransomware
social engineering
sniffer
keylogger
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
GIS Unit III
Quiz
•
University
17 questions
Cash and Cash Equivalents Activity
Quiz
•
University
20 questions
FSA Intro 1
Quiz
•
University
20 questions
MOCK FINAL EXAMINATION MGT1143 PART 1
Quiz
•
University
15 questions
Computer and Other Human Inventions
Quiz
•
University
15 questions
Robotics Prelim
Quiz
•
University
20 questions
Digital and Analog transmission
Quiz
•
University
20 questions
Module 6: Social Groups and Organization
Quiz
•
11th Grade - Professi...
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University