NAME

Question types


Start with


Question limit

of 74 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Heuristics
  2. Identity theft
  3. Informatics
  4. Electronic Data Interchange (EDI)
  5. Zombie Computer
  1. a the criminal act of using stolen information about a person to assume that person's identity, typically for financial gain
  2. b commonly accepted guidelines or procedures that usually find a good solution, but not necessarily the optimal solution—are often used in the decision-making process
  3. c uses private communications networks called value-added networks (vans) to transmit standardized transaction between partners and suppliers
  4. d A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus
  5. e combines traditional disciplines, like science and medicine, with computer systems and technology

5 Multiple choice questions

  1. the crime of deliberately deceiving a person over the Internet in order to damage them and to obtain property or services from him or her unjustly
  2. program that attaches itself to a file, spreads to other files, and delivers a destructive action called a payload
  3. the accuracy of the data in a database
  4. Business to business e commerce
  5. systems investigation, systems analysis, systems design, systems implementation, systems maintenance and review

5 True/False questions

  1. Offshoringprocess of extracting information from a data warehouse or a data mart

          

  2. Decision Support System (DSS)information system used to support problem-specific decision making

          

  3. Data AnalysisA collection of data organized to meet user's needs

          

  4. Transactionsecurity technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient

          

  5. Study of Ethicsthe science and technology of authentication by scanning and measuring a person's unique physical features such as fingerprints, retinal patterns, and facial characteristics

          

Create Set