STRAYER BUS475 QUIZ 7

Question # 00047550 Posted By: spqr Updated on: 02/09/2015 12:58 AM Due on: 03/21/2015
Subject Business Topic General Business Tutorials:
Question
Dot Image

Review Test Submission: Quiz 7

SKIP TO COURSE MENUSKIP TO TOP FRAME TABS

Instructions This quiz consist of 30 multiple choice questions. The first 15 questions cover the material in Chapter 12. The second 15 questions cover the material in Chapter 13. Be sure you are in the correct Chapter when you take the quiz.

• Question 1

3 out of 3 points

The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called:

• Question 2

3 out of 3 points

The use of publicly accessed servers to store users' text photos, videos and other data at remote sites, rather than on their own computers is called:

• Question 3

3 out of 3 points

A social network available only to IBM employees on the company's intranet is called:

• Question 4

3 out of 3 points

A hacking technique that redirects a user's computer from a legitimate Web site to another site by altering the user's computer or router is called:

• Question 5

3 out of 3 points

Laughpractice.blogspot.com is an example of a(n):

• Question 6

3 out of 3 points

A technological application that uses biological systems or living organisms to make or modify products or processes for specific use is called:

• Question 7

3 out of 3 points

Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones?

• Question 8

3 out of 3 points

The digital divide describes the gap between those:

• Question 9

0 out of 3 points

Which of the following is not true about the service phase of technology?

• Question 10

3 out of 3 points

A group of people who leap to the most dreadful conclusions while researching health matters online are called:

• Question 11

3 out of 3 points

Which of the following countries is not one of the top 15 Internet users?

• Question 12

3 out of 3 points

The buying and selling of goods and services electronically is called:

• Question 13

3 out of 3 points

A program designed to build, and market ultralightweight, durable netbook computers for children aged 6 through 12 throughout the world is called:

• Question 14

3 out of 3 points

The practice of duping computer users into revealing their passwords or other private data under false pretences is called:

• Question 15

3 out of 3 points

The phase of technology that focuses on building material goods and manual labor is:

• Question 16

3 out of 3 points

According to Bill Joy, Sun Microsystems' chief scientist, the 21st century technologies:

• Question 17

3 out of 3 points

By the end of 2008, the number of attacks on information security reached:

• Question 18

3 out of 3 points

In a 2008 survey from Columbia University, what percentage of American adults said they were uncomfortable when Web sites used personal information to tailor advertisements?

• Question 19

3 out of 3 points

Spraying random packets of data in huge streams over the Internet are:

• Question 20

3 out of 3 points

In 2005, the United Nations approved a declaration that:

• Question 21

3 out of 3 points

Which of the following is not commercial software to block pornography on the Internet?

• Question 22

3 out of 3 points

In response to employees' challenges that business practices were invasions of their privacy, many businesses:

• Question 23

0 out of 3 points

The global tone toward genetically modified food was one of:

• Question 24

3 out of 3 points

Two of the largest strongholds for software piracy are:

• Question 25

3 out of 3 points

Primarily, the CIO is expected to:

• Question 26

3 out of 3 points

The corporate nemesis responsible for creating and spreading computer attacks is called a:

• Question 27

3 out of 3 points

In 2002, this allowed Web sites to tell the user's Web browser about the site's data privacy policies:

• Question 28

3 out of 3 points

Honeypots are:

• Question 29

3 out of 3 points

In a 2007 survey of more than 800 North American privacy and security professionals, what percentage acknowledged having at least one reportable data breach of personally identifiable information with their organizations during the past 12 months?

• Question 30

3 out of 3 points

A CIO is the company's:

Dot Image
Tutorials for this Question
  1. Tutorial # 00045380 Posted By: spqr Posted on: 02/09/2015 12:59 AM
    Puchased By: 4
    Tutorial Preview
    The solution of STRAYER BUS475 QUIZ 7...
    Attachments
    STRAYER_BUS475_QUIZ_7.docx (55.01 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    Da...aby Rating Best quality content and efficient content 04/05/2015
    kf...43 Rating Delivery before the deadline 03/23/2015

Great! We have found the solution of this question!

Whatsapp Lisa