MGMT 2080 - Exam 2

MGMT 2080 - Exam 2

University

43 Qs

quiz-placeholder

Similar activities

ST#2 (ONSITE)

ST#2 (ONSITE)

12th Grade - University

45 Qs

TOPIC 1: COMPUTER HARDWARE

TOPIC 1: COMPUTER HARDWARE

University

40 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

45 Qs

Explore IoT and Storage Devices

Explore IoT and Storage Devices

5th Grade - University

40 Qs

DigBi 4KL Hardware

DigBi 4KL Hardware

4th Grade - University

48 Qs

SUMATIF TENGAH SEMESTER  INFORMATIKA KELAS VIII

SUMATIF TENGAH SEMESTER INFORMATIKA KELAS VIII

8th Grade - University

40 Qs

EDP FINAL EXAM PART I MULTI

EDP FINAL EXAM PART I MULTI

University

40 Qs

Information

Information

8th Grade - University

40 Qs

MGMT 2080 - Exam 2

MGMT 2080 - Exam 2

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Kayla Ruge

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true of systems development?

  • It has a lesser scope than computer program development

It has little need for human relations skills as tasks are performed by individuals, not groups

It requires business knowledge and an understanding of  group dynamics

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. ________ are formally defined, standardized procedures that involve day-to-day operations.

Structured

Dynamic

Businesses

Support

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) ________ exists when data are isolated in separated information systems

Walled garden

Information Silos

Viral Hooks

Mashup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _________ is a measure that individuals or organizations take to block a threat from obtaining an asset

denial of dervice

information silos

safeguard

third-party cookie

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ______.

pretexting

spoofing

hacking

phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jack installed the incorrect security patch on the server. This is an example of what type of security problem?

denial of service

faulty service

hacking

malicious third-party service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technical safeguard against security threats?

password

accountability

compliance

firewall

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?