NAME

Question types


Start with


Question limit

of 74 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Outsourcing
  2. Database
  3. Data Manipulation Language (DML)
  4. Demand Reports
  5. Knowledge Management (KM) System
  1. a developed to get certain information at a person's request
  2. b specific language provided with the DBMS that allows people and other database users to access, modify, and make queries about data contained in the database, and to generate reports
  3. c a business' use of an outside company to take over portions of its workload
  4. d assists an organization in capturing, storing, and distributing knowledge for use and reuse by the organization and sometimes by its partners and customers
  5. e A collection of data organized to meet user's needs

5 Multiple choice questions

  1. the close monitoring of behavior
  2. produced periodically on a schedule
  3. automatically produced when a situation is unusual or requires action
  4. The act of driving through neighborhoods with a wireless notebook looking for unsecured wifi networks
  5. an exchange or transfer of goods, services, or funds

5 True/False questions

  1. Total information securitysecuring all components of the global digital information infrastructure

          

  2. Phishing Scamscommonly accepted guidelines or procedures that usually find a good solution, but not necessarily the optimal solution—are often used in the decision-making process

          

  3. Computer-aided software engineering (CASE) toolsautomate many of the tasks required in a systems development effort

          

  4. Globalizationsecurity technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient

          

  5. Firewallnetwork hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous

          

Create Set