Which of the following is true?

Economic Informatics CH 1-4

Quiz
•
Computers, Professional Development, Business
•
University
•
Easy

Fatima Rustamova
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Information can be an asset or a liability, depending on the adopted information strategy or external factors.
Information can be neither asset, nor liability.
Information can be an asset, but not liability.
Information can be liability, but not asset.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
Location-independent resource pooling
Ubiquitous network access
Rapid elasticity
On-demand self-service
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.
private cloud
public cloud
hybrid cloud
integrated cloud
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Privacy
Standards
Security
Transferrability
5.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.
6.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .
ransomware
social engineering
sniffer
keylogger
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
CH01 INTRODUCTION TO IS

Quiz
•
University
15 questions
Post-test - Fundamental Accounting Concepts and Principles

Quiz
•
University
20 questions
CH02 IS of hardware

Quiz
•
University
15 questions
IMS606_Chapter 2

Quiz
•
University
20 questions
Chapter 5

Quiz
•
University
15 questions
Platform Technology Exam

Quiz
•
University
15 questions
GE 10 - MODULE 6: Internet of Things

Quiz
•
University
21 questions
BUSSHART - PRINCIPLES OF BUSINESS 6.00

Quiz
•
9th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade