
Economic Informatics CH 1-4

Quiz
•
Computers, Professional Development, Business
•
University
•
Easy

Fatima Rustamova
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is true?
Information can be an asset or a liability, depending on the adopted information strategy or external factors.
Information can be neither asset, nor liability.
Information can be an asset, but not liability.
Information can be liability, but not asset.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
Location-independent resource pooling
Ubiquitous network access
Rapid elasticity
On-demand self-service
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.
private cloud
public cloud
hybrid cloud
integrated cloud
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Privacy
Standards
Security
Transferrability
5.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.
6.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .
ransomware
social engineering
sniffer
keylogger
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Issues in Nursing Informatics

Quiz
•
University
15 questions
CNET151 - Chapt 15 -Cybersecurity Engineering

Quiz
•
University
19 questions
Security Attacks - Midterm

Quiz
•
University
15 questions
Living in the IT Era - Q1

Quiz
•
University
15 questions
Information Technology

Quiz
•
12th Grade - University
20 questions
CH01 INTRODUCTION TO IS

Quiz
•
University
19 questions
Area Of Computer Ethics

Quiz
•
University
18 questions
Managing Information System Development Project

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University