Economic Informatics CH 1-4

Economic Informatics CH 1-4

University

20 Qs

quiz-placeholder

Similar activities

ICT - History

ICT - History

University

20 Qs

AIS160 Chapter 6: Cloud Computing in Accounting & FinTech

AIS160 Chapter 6: Cloud Computing in Accounting & FinTech

University

20 Qs

MIS Chapter 2

MIS Chapter 2

University

15 Qs

Industrial Internet of Things

Industrial Internet of Things

University

16 Qs

SAN Module 4 Quiz

SAN Module 4 Quiz

University

15 Qs

Basic of Cloud Computing

Basic of Cloud Computing

University

15 Qs

CH 11

CH 11

University

20 Qs

Management Information Systems Quiz

Management Information Systems Quiz

2nd Grade - University

20 Qs

Economic Informatics CH 1-4

Economic Informatics CH 1-4

Assessment

Quiz

Computers, Professional Development, Business

University

Easy

Created by

Fatima Rustamova

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is true?

Information can be an asset or a liability, depending on the adopted information strategy or external factors.

Information can be neither asset, nor liability.

Information can be an asset, but not liability.

Information can be liability, but not asset.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.

Location-independent resource pooling

Ubiquitous network access

Rapid elasticity

On-demand self-service

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.

private cloud

public cloud

hybrid cloud

integrated cloud

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Privacy

Standards

Security

Transferrability

5.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.

6.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .

ransomware

social engineering

sniffer

keylogger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?