Business

Ian returned to his Moscow hotel only to discover that his wallet had

QUESTION Ian returned to his Moscow hotel only to discover that his wallet had been pickpocketed on the subway. It’s been gone for hours. While he can replace the traveler’s checks and credit cards, what is Ian most at risk of? A) hackers B) Trojan horses C) identity theft D) spoofing E) pharming   ANSWER […]

Read full post

Date: September 3rd, 2020

Which of the following lists the elements in correct order from least

QUESTION Which of the following lists the elements in correct order from least to most complex? A) data warehouse > data file > business intelligence system > GPS field reports B) GPS field reports > business intelligence system > data file > data warehouse C) GPS field reports > data file > data warehouse > […]

Read full post

Date: September 3rd, 2020

Paulina has built a successful business assigning teams to break in to

QUESTION Paulina has built a successful business assigning teams to break in to corporate computer systems. Teams then report on the security vulnerabilities that they uncovered and make recommendations to fix them. Which of the following are on Paulina’s staff? A) phishers B) crackers C) pirates D) white hats E) thrill seekers   ANSWER Answer: […]

Read full post

Date: September 3rd, 2020

Which of the following is considered information that is useful for a

QUESTION Which of the following is considered information that is useful for a business? A) one week of GPS locations for delivery trucks B) one week of sales figures in all coffee store outlets C) incoming and outgoing office e-mail counts for one day D) one month of golf cleat sales figures to customers over […]

Read full post

Date: September 3rd, 2020

Which of the following is NOT a preventive strategy against cyberthrea

QUESTION Which of the following is NOT a preventive strategy against cyberthreats? A) firewall B) password C) disaster recovery plan D) biometric authentication E) encryption   ANSWER Answer: C Explanation: C) The best way to avoid harm from cyberthreats is to prevent access with strategies such as encryption and firewalls. But attacks can occur despite […]

Read full post

Date: September 3rd, 2020

For information to be useful to a business, it must have five characte

QUESTION For information to be useful to a business, it must have five characteristics. Firewalls address which of these characteristics? A) relevance B) security C) accuracy D) timeliness E) completeness   ANSWER Answer: B Explanation: B) Information must be secure—uncompromised by hackers or data thieves—in order to be useful. A firewall is a system of […]

Read full post

Date: September 3rd, 2020

Tuan is analyzing quarterly sales data from 2007 to the present to det

QUESTION Tuan is analyzing quarterly sales data from 2007 to the present to determine why sales for the company’s hybrid motorcycle released in 2010 have not met projections. To get a more accurate picture, Tuan eliminates all pre-2010 reports from his analysis. Why? A) The information is not secure. B) The information is not timely. […]

Read full post

Date: September 3rd, 2020

Which of the following is NOT considered specialty software? A) messa

QUESTION Which of the following is NOT considered specialty software? A) message center software B) groupware C) personal information manager D) desktop publishing software E) project management software   ANSWER Answer: C Explanation: C) Personal information managers, such as Lotus organizer and Microsoft Task Scheduler, are considered common business software. The other options all focus […]

Read full post

Date: September 3rd, 2020

Which of the following is NOT part of a software suite? A) word proce

QUESTION Which of the following is NOT part of a software suite? A) word processing software B) spreadsheet software C) system software D) e-mail software E) presentation software   ANSWER Answer: C Explanation: C) Software suites are packages of integrated application software. System software helps application software interact with the computer.

Read full post

Date: September 3rd, 2020

Tina sends an e-mail on the company intranet to her supervisor Jonah a

QUESTION Tina sends an e-mail on the company intranet to her supervisor Jonah across the hall. What does the e-mail pass through before Jonah reads it? A) mainframe B) microcontroller C) server D) flash drive E) client   ANSWER Answer: C Explanation: C) A server is a central computer that holds data and programs for […]

Read full post

Date: September 3rd, 2020