CIS 207T Week 5 WileyPLUS Weekly Exam

CIS 207T Week 5 WileyPLUS Weekly Exam

This Tutorial was purchased 2 times & rated No rating by students like you.

  |  Write a review  |   Reviews (0)   |  
Price: $7.99
     
 

Attachments: No Attachments

CIS 207T Week 5 WileyPLUS Weekly Exam

 

For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.

 

Complete this graded exam by doing the following:

 

1. Click the link to begin the graded exam.

 

2. Read the exam policies carefully.

 

3. Click the Next button to begin the exam.

 

4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.

 

Question 1

 

The law basically does not support an employer’s right to read electronic mail and other electronic documents.

 

True

 

False

 

Question 2

 

Privacy regulations are basically the same from country to country around the world.

 

True

 

False

 

Question 3

 

______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

 

Profiling

 

Information privacy

 

A digital dossier

 

Privacy

 

Question 4

 

______________ is an electronic profile of you and your habits.

 

Privacy

 

Information privacy

 

Profiling

 

A digital dossier

 

Question 5

 

______________ is the process of forming a digital dossier.

 

Privacy

 

Profiling

 

Dossiering

 

Information privacy

 

Question 6

 

Which of the following is NOT an example of a profiler?

 

Amazon

 

ChoicePoint

 

LexisNexis

 

Acxiom

 

Question 7

 

The right of privacy ___________ absolute.

 

cannot be

 

can be

 

is not

 

is

 

Question 8

 

Risk management identifies, controls, and minimizes the impact of threats to the organization’s information security.

 

True

 

False

 

Question 9

 

Which if the following is not a common risk mitigation strategy?

 

Risk analysis.

 

Risk limitation.

 

Risk acceptance.

 

Risk transference.

 

Question 10

 

Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?

 

It is difficult, if not impossible, for organization to provide perfect security for their data.

 

China is the leading hacking group that encourages similar behavior from other countries.

 

It appears that it is impossible to secure the Internet.

 

There is a growing danger that countries are engaging in economic cyberwarfare among themselves.

 

Question 11

 

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

 

Espionage

 

Information extortion

 

Competitive intelligence

 

Intellectual property

 

Question 12

 

Phishing is an example of __________.

 

Copyright infringement

 

Espionage

 

Software attack

 

Sabotage

 

Question 13

 

You start browsing your favorite home improvement company’s website and notice someone has changed all the logos to their main competitor’s logos. This is an example of ___________.

 

Espionage

 

Identity theft

 

Information extortion

 

Sabotage

 

Question 14

 

Application software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs.

 

True

 

False

 

Question 15

 

Software consists of the instructions given to computer hardware.

 

True

 

False

 

Question 16

 

Application software is a set of computer instructions that provide specific functionality for a user.

 

True

 

False

 

Question 17

 

Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software.

 

True

 

False

 

Question 18

 

Hardware costs have been _______________ over time and software costs have been _______________ over time.

 

increasing; increasing

 

decreasing; decreasing

 

increasing; decreasing

 

decreasing; increasing

 

Question 19

 

_________________ software is an intermediary between computer hardware and _________________ software.

 

Systems; programming

 

Application; systems

 

Systems; application

 

Application; programming

 

Question 20

 

Hardware interacts directly with _______________ software.

 

Systems

 

Application

 

Programming

 

Documentation

 

Question 21

 

Hardware has become less complex while software has become more complex.

 

True

 

False

 

Question 22

 

Discrete speech-recognition software recognizes and interprets one word at a time.

 

True

 

False

 

Question 23

 

The set of computer programs used to manage hardware resources is called:

 

Personal application software.

 

Microsoft Office Suite.

 

General software.

 

Systems software.

 

Application software

 

Question 24

 

It is not necessary for computer programs to have documentation, because the code itself is easy to read and follow.

 

True

 

False

 

Question 25

 

Computer hardware is designed specifically for a particular application.

 

True

 

False

Write a review

Order Id

Order Id will be kept Confidential
Your Name:


Your Review:
Rating:   A   B   C   D   F  

Enter the code in the box below:



Related Products
CIS 207 All Assignments
$40.00
Rating:A+
Purchased: 7 time
Add to Cart
CIS 207 Week 2 Individual Map Your Network
$7.00
No rating
Purchased: 1 time
Add to Cart
CIS 207 Week 5 Individual Career Plan
$5.00
No rating
Purchased: 1 time
Add to Cart
CIS 207T Week 1 WileyPLUS Weekly Exam
$7.99
Rating:A+
Purchased: 3 time
Add to Cart
CIS 207T Week 2 WileyPLUS Weekly Exam
$7.99
No rating
Purchased: 2 time
Add to Cart
CIS 207T Week 3 WileyPLUS Weekly Exam
$7.99
Rating:A
Purchased: 3 time
Add to Cart
CIS 207T Week 4 WileyPLUS Weekly Exam
$7.99
Rating:A+
Purchased: 4 time
Add to Cart
webzindagi
Tutorial Rank © 2021