Which of the following is true?

Economic Informatics CH 1-4

Quiz
•
Computers, Professional Development, Business
•
University
•
Easy

Fatima Rustamova
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Information can be an asset or a liability, depending on the adopted information strategy or external factors.
Information can be neither asset, nor liability.
Information can be an asset, but not liability.
Information can be liability, but not asset.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Thanks to _________ characteristic of cloud computing, computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
Location-independent resource pooling
Ubiquitous network access
Rapid elasticity
On-demand self-service
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A ________ is owned and maintained by a cloud service provider, such as Amazon Web Services, and made available to the general public or industry group.
private cloud
public cloud
hybrid cloud
integrated cloud
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
______ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Privacy
Standards
Security
Transferrability
5.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
Most recent attacks have come from ______ which are independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior to spread from computer to computer.
6.
FILL IN THE BLANK QUESTION
5 mins • 1 pt
_______ involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called ________ .
ransomware
social engineering
sniffer
keylogger
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Cybersecurity Essentials Chapter 6 Review

Quiz
•
9th Grade - University
20 questions
AIS160 Chapter 6: Cloud Computing in Accounting & FinTech

Quiz
•
University
21 questions
BUSSHART - PRINCIPLES OF BUSINESS 6.00

Quiz
•
9th Grade - University
20 questions
CH01 INTRODUCTION TO IS

Quiz
•
University
15 questions
Post-test - Fundamental Accounting Concepts and Principles

Quiz
•
University
15 questions
Platform Technology Exam

Quiz
•
University
15 questions
Management Information System (MIS)

Quiz
•
University
20 questions
ICT - History

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade