Enterprise integration may increase personnel cost.Select on
Enterprise integration may increase personnel cost.Select one:a. TRUE b. FALSE Question 2Not yet answeredMarked out of 2.00 Flag questionQuestion textEncapsulation means information hiding.Select one:a. TRUE b. FALSE Question 3Not yet answeredMarked out of 2.00 Flag questionQuestion textThe traditional technology approach may lead to potential disconnects between the information and procedures.Select one:a. TRUE b. FALSE Question 4Not yet answeredMarked out of 2.00 Flag questionQuestion textBreaking down the information and procedures for ease of use and ability is called information decomposition.Select one:a. TRUE b. FALSE Question 5Not yet answeredMarked out of 2.00 Flag questionQuestion textAn n-tier infrastructure starts with the 2-tier basic model adding applications as needed.Select one:a. TRUE b. FALSE Question 6Not yet answeredMarked out of 2.00 Flag questionQuestion textThe current generation of ERP often includes CRM and SCM.Select one:a. TRUE b. FALSE Question 7Not yet answeredMarked out of 2.00 Flag questionQuestion textThe object-oriented approach helps knowledge workers to understand the entire system, to determine if any key information is missing that would be required in order to perform all of the procedures, and to determine if any key procedures are missing required to manipulate the information.Select one:a. TRUE b. FALSE Question 8Not yet answeredMarked out of 2.00 Flag questionQuestion textThe necessity for a common database was the main difference between ERP and MRP systems.Select one:a. TRUE b. FALSE Question 9Not yet answeredMarked out of 2.00 Flag questionQuestion textERP does not help with inventory management.Select one:a. TRUE b. FALSE Question 10Not yet answeredMarked out of 2.00 Flag questionQuestion textThe early stages of ERP goes back to the 1970s with Mainframe Requirements Planning.Select one:a. TRUE b. FALSE Question 11Not yet answeredMarked out of 2.00 Flag questionQuestion textDisaster recovery plans specify how an IT system or information can be recovered in the event of a catastrophe.Select one:a. TRUE b. FALSE Question 12Not yet answeredMarked out of 2.00 Flag questionQuestion textThe IT architecture is the blueprint for translating a business strategy into a plan.Select one:a. TRUE b. FALSE Question 13Not yet answeredMarked out of 2.00 Flag questionQuestion textIn a tiered infrastructure each layer duplicates another layer for backup and recovery.Select one:a. TRUE b. FALSE Question 14Not yet answeredMarked out of 2.00 Flag questionQuestion textSince the IT infrastructure rarely changes it only needs to be reviewed about every 5 years.Select one:a. TRUE b. FALSE Question 15Not yet answeredMarked out of 2.00 Flag questionQuestion textAn object-oriented database works with traditional database information and also complex data types such as diagrams, schematic drawings, video, sound and text documents.Select one:a. TRUE b. FALSE distributed denial-of-service attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes.Select one:a. TRUE b. FALSE Question 2Not yet answeredMarked out of 2.00 Flag questionQuestion textWhat is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?Select one:a. Backup b. Anti-virus c. Firewall d. Biometrics Question 3Not yet answeredMarked out of 2.00 Flag questionQuestion textWhich of the following is a result of identify theft?Select one:a. It costs individuals an average of about $1,000 per year b. It costs businesses and consumers about $60 billion per year c. Over half the victims are between 18-39 d. All of the above Question 4Not yet answeredMarked out of 2.00 Flag questionQuestion textWhich act permits law enforcement to access almost any information when investigating terrorism or hostile intelligence activities?Select one:a. Sarbanes-Oxley Act b. US Patriot Act c. Homeland Security Act d. Fair and Accurate Credit Transactions Act Question 5Not yet answeredMarked out of 2.00 Flag questionQuestion textMalware bots are programs that can detect virus attacks and launch a counterattach.Select one:a. TRUE b. FALSE Question 6Not yet answeredMarked out of 2.00 Flag questionQuestion textWhich of the following system is used (legally, with a court order) by the FBI and NSA to gather information about suspected criminals?Select one:a. Carnivore b. DCS-1000 c. Echelon d. All of the above Question 7Not yet answeredMarked out of 2.00 Flag questionQuestion textWhat is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?Select one:a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy Question 8Not yet answeredMarked out of 2.00 Flag questionQuestion textWhich act requires companies to implement policies to prevent illegal activity within the company and to respond in a timely manner to investigate illegal activity?Select one:a. Identity Theft and Assumption Act b. Sarbanes-Oxley Act c. CAN-Spam Act d. Fair and Accurate Credit Transactions Act Question 9Not yet answeredMarked out of 2.00 Flag questionQuestion textWeb defacing is a program that, when installed on a computer, records every keystroke and mouse click.Select one:a. TRUE b. FALSE Question 10Not yet answeredMarked out of 2.00 Flag questionQuestion textMacro viruses spread by binding themselves to software such as Word or Excel.Select one:a. TRUE b. FALSE Question 11Not yet answeredMarked out of 2.00 Flag questionQuestion textWhat might identity thieves do with your identity?Select one:a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above Question 12Not yet answeredMarked out of 2.00 Flag questionQuestion textSteganography is the hiding of information inside other information.Select one:a. TRUE b. FALSE Question 13Not yet answeredMarked out of 2.00 Flag questionQuestion textWhat is intangible creative work that is embodied in physical form?Select one:a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine Question 14Not yet answeredMarked out of 2.00 Flag questionQuestion textWhat legislation has been enacted to ensure the confidentiality of medical information?Select one:a. Privacy act b. HIPAA c. Sarbanes-Oxley d. Identity Theft Act Question 15Not yet answeredMarked out of 2.00 Flag questionQuestion textWhat is software that comes hidden in free downloadable software and may track your online movements?Select one:a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above Network connection lost. (Autosave failed).Make a note of any responses entered on this page in the last few minutes, then try to re-connect.Once connection has been re-established, your responses should be saved and this message will disappear.Network connection restored. You may continue safely.Skip Quiz navigationQuiz navigationQuestion 1 This page Question 2 This page Question 3 This page Question 4 This page Question 5 This page Question 6 This page Question 7 This page Question 8 This page Question 9 This page Question 10 This page Question 11 This page Question 12 This page Question 13 This page Question 14 This page Question 15 This page Finish attempt …Time left 1:29:32