
Economic Informatics CH 1-4
Quiz
•
Computers, Professional Development, Business
•
University
•
Practice Problem
•
Easy

Fatima Rustamova
Used 3+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is true?
Information can be an asset or a liability, depending on the adopted information strategy or external factors.
Information can be neither asset, nor liability.
Information can be an asset, but not liability.
Information can be liability, but not asset.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
Location-independent resource pooling
Ubiquitous network access
Rapid elasticity
On-demand self-service
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.
private cloud
public cloud
hybrid cloud
integrated cloud
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Privacy
Standards
Security
Transferrability
5.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.
6.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .
ransomware
social engineering
sniffer
keylogger
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Computer Applications in Banking and Finance Quiz
Quiz
•
University
20 questions
MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND
Quiz
•
University
15 questions
Pronouns Quiz
Quiz
•
University
20 questions
IAE ORG THR S1 Classical Theories: Taylor's Scientific Org
Quiz
•
University
20 questions
Corporate Governance in India
Quiz
•
University
20 questions
ประกอบคอมพิวเตอร์
Quiz
•
University
20 questions
Review Quiz (Chapter 3&4)
Quiz
•
University
20 questions
C Programming Unit-1 Test-2
Quiz
•
University
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
Discover more resources for Computers
10 questions
Identifying equations
Quiz
•
KG - University
7 questions
Different Types of Energy
Interactive video
•
4th Grade - University
20 questions
HS2C2 AB QUIZIZZ
Quiz
•
1st Grade - Professio...
14 questions
Homonyms Quiz
Quiz
•
KG - University
16 questions
Parts of a Parabola
Quiz
•
8th Grade - University
10 questions
A Brief History of Geologic Time
Interactive video
•
11th Grade - University
15 questions
Black Friday/Cyber Monday
Quiz
•
9th Grade - University
7 questions
Biomolecules (Updated)
Interactive video
•
11th Grade - University
