Search Header Logo

Economic Informatics CH 1-4

Authored by Fatima Rustamova

Computers, Professional Development, Business

University

Used 3+ times

Economic Informatics CH 1-4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is true?

Information can be an asset or a liability, depending on the adopted information strategy or external factors.

Information can be neither asset, nor liability.

Information can be an asset, but not liability.

Information can be liability, but not asset.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.

Location-independent resource pooling

Ubiquitous network access

Rapid elasticity

On-demand self-service

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.

private cloud

public cloud

hybrid cloud

integrated cloud

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Privacy

Standards

Security

Transferrability

5.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.

6.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .

ransomware

social engineering

sniffer

keylogger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?