Economic Informatics CH 1-4

Economic Informatics CH 1-4

University

20 Qs

quiz-placeholder

Similar activities

Unit 2 IT LO3

Unit 2 IT LO3

KG - Professional Development

15 Qs

INFO MNGT MIDTERM EXAM P4

INFO MNGT MIDTERM EXAM P4

University

20 Qs

Systems Analysis & Design (Midterm Exam Part2)

Systems Analysis & Design (Midterm Exam Part2)

University

20 Qs

Introduction to computer

Introduction to computer

University

20 Qs

Introduction to ICT

Introduction to ICT

University

15 Qs

Check Your Concepts: Q_1

Check Your Concepts: Q_1

University

20 Qs

System Analysis and Design

System Analysis and Design

University

15 Qs

Chap. 11 Enterprise Resource Planning

Chap. 11 Enterprise Resource Planning

University

20 Qs

Economic Informatics CH 1-4

Economic Informatics CH 1-4

Assessment

Quiz

Computers, Professional Development, Business

University

Easy

Created by

Fatima Rustamova

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is true?

Information can be an asset or a liability, depending on the adopted information strategy or external factors.

Information can be neither asset, nor liability.

Information can be an asset, but not liability.

Information can be liability, but not asset.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.

Location-independent resource pooling

Ubiquitous network access

Rapid elasticity

On-demand self-service

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.

private cloud

public cloud

hybrid cloud

integrated cloud

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Privacy

Standards

Security

Transferrability

5.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.

6.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .

ransomware

social engineering

sniffer

keylogger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?