Economic Informatics CH 1-4

Economic Informatics CH 1-4

University

20 Qs

quiz-placeholder

Similar activities

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

Unit1_MS

Unit1_MS

University - Professional Development

20 Qs

Chapter 2 Strategy and Human Resources Planning

Chapter 2 Strategy and Human Resources Planning

University

15 Qs

Quiz on List and Tuples

Quiz on List and Tuples

University

16 Qs

Midtest Financial and money market

Midtest Financial and money market

University

20 Qs

Sistem Informasi Manajemen

Sistem Informasi Manajemen

University

20 Qs

The AI Shield

The AI Shield

University

15 Qs

Economic Informatics CH 1-4

Economic Informatics CH 1-4

Assessment

Quiz

Computers, Professional Development, Business

University

Practice Problem

Easy

Created by

Fatima Rustamova

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is true?

Information can be an asset or a liability, depending on the adopted information strategy or external factors.

Information can be neither asset, nor liability.

Information can be an asset, but not liability.

Information can be liability, but not asset.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.

Location-independent resource pooling

Ubiquitous network access

Rapid elasticity

On-demand self-service

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.

private cloud

public cloud

hybrid cloud

integrated cloud

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Privacy

Standards

Security

Transferrability

5.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.

6.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .

ransomware

social engineering

sniffer

keylogger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?