100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MIS 111 CCR 1 Exam Questions With Correct Answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
29-08-2024
Written in
2024/2025

MIS 111 CCR 1 Exam Questions With Correct Answers From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential positive application of these deepfake videos that benefits individuals struck by disease? - answerAllowing people who have lost their voice to have synthetic voices From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential negative application that could cause great harm to well known people? - answerCommitting fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise the theory of machine-independent programming languages. She also noted the first actual computer bug in 1945, what was the bug? - answera moth stuck between the contacts of a mechanical relay in the machine Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19? - answerDr. Sudha Ram What is the harm of journalists editing or combining photos to create a 'more compelling scene' which also projects an image that never actually existed? - answerAll of the above Which of the following is TRUE? - answerRemote supervision will probably become a norm. Which of the following is TRUE? - answerIT impacts entire industries. What technology was introduced in 1657 that fundamentally changed society? - answerBalance spring IT makes managers ________ productive and ________ the number of employees who can report to a single manager. - answermore; increases In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), ________ is the Internet on a portable hard drive. - answerEl Paquete Semanal ©THEBRIGHT 2024 Wireless is a(n) inherently _________ network. - answeruntrusted You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________. - answertailgating; an unintentional threat to your organization ___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. - answerInformation extortion A ___________ is a remote attack needing no user action. - answerdenial-of-service attack A ___________ is an attack by a programmer developing a system. - answerback door All of the following are social engineering tactics discussed in the LO lecture except? - answerSmishing - Sending fake texts to fool victims into giving away their information Social Engineering Threats Video: In the video, how could a hacker break two-factor authentication on an account of yours without access to your phone and without phishing you? - answerCall the phone company and pretend to be you, getting the phone company to switch the phone number to a new sim card How VPNs Improve Security Video: What technique does a VPN use to allow access to services in a company or on campus to all be accessible to a remote user as if they were on campus or at the workplace? - answerThe user get a company internal IP address How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping on a public network from seeing your data? - answerTunneling, encryption Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login from being hacked through what method? - answer2FA Requires hackers also have your physical device (second factor) All investments involve some degree of risk, what is the reward for taking on risk? - answerThe potential for a greater investment return The guiding principles to investing include many things, but one of the most critical protections against risk and market downturns is what? - answerTime When researching a public company, which financial statement shows changes in the value of owned stock over time? - answerThe Statement of Shareholder Equity Understanding Fees is critical to understanding investments.Fees can take a huge bite out of investment returns. Which fees might a Mutual Fund have that can impact your return? - answerMutual funds can have so

Show more Read less
Institution
MIS 111
Course
MIS 111









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MIS 111
Course
MIS 111

Document information

Uploaded on
August 29, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©THEBRIGHT 2024



MIS 111 CCR 1 Exam Questions With
Correct Answers


From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
positive application of these deepfake videos that benefits individuals struck by disease? -
answer✔✔Allowing people who have lost their voice to have synthetic voices
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
negative application that could cause great harm to well known people? - answer✔✔Committing
fraud by creating a fake video that could be used to blackmail an individual or ruin their
reputation
Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise
the theory of machine-independent programming languages. She also noted the first actual
computer bug in 1945, what was the bug? - answer✔✔a moth stuck between the contacts of a
mechanical relay in the machine
Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify
person-density in buildings and spaces at the University using temporal and spatial data to help
fight Covid-19? - answer✔✔Dr. Sudha Ram
What is the harm of journalists editing or combining photos to create a 'more compelling scene'
which also projects an image that never actually existed? - answer✔✔All of the above

Which of the following is TRUE? - answer✔✔Remote supervision will probably become a
norm.

Which of the following is TRUE? - answer✔✔IT impacts entire industries.
What technology was introduced in 1657 that fundamentally changed society? -
answer✔✔Balance spring
IT makes managers ________ productive and ________ the number of employees who can
report to a single manager. - answer✔✔more; increases
In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook),
________ is the Internet on a portable hard drive. - answer✔✔El Paquete Semanal

, ©THEBRIGHT 2024


Wireless is a(n) inherently _________ network. - answer✔✔untrusted
You are a nice person, so you hold the door open for the person running in behind you. Since
you needed to use your ID badge to open the door, the person running in behind you is
__________; this is _________. - answer✔✔tailgating; an unintentional threat to your
organization
___________ is threatening to steal or actually stealing information from a company and then
demanding payment to not use or release that information. - answer✔✔Information extortion

A ___________ is a remote attack needing no user action. - answer✔✔denial-of-service attack

A ___________ is an attack by a programmer developing a system. - answer✔✔back door
All of the following are social engineering tactics discussed in the LO lecture except? -
answer✔✔Smishing - Sending fake texts to fool victims into giving away their information
Social Engineering Threats Video: In the video, how could a hacker break two-factor
authentication on an account of yours without access to your phone and without phishing you? -
answer✔✔Call the phone company and pretend to be you, getting the phone company to switch
the phone number to a new sim card
How VPNs Improve Security Video: What technique does a VPN use to allow access to services
in a company or on campus to all be accessible to a remote user as if they were on campus or at
the workplace? - answer✔✔The user get a company internal IP address
How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping
on a public network from seeing your data? - answer✔✔Tunneling, encryption
Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login
from being hacked through what method? - answer✔✔2FA Requires hackers also have your
physical device (second factor)
All investments involve some degree of risk, what is the reward for taking on risk? -
answer✔✔The potential for a greater investment return
The guiding principles to investing include many things, but one of the most critical protections
against risk and market downturns is what? - answer✔✔Time
When researching a public company, which financial statement shows changes in the value of
owned stock over time? - answer✔✔The Statement of Shareholder Equity
Understanding Fees is critical to understanding investments.Fees can take a huge bite out of
investment returns. Which fees might a Mutual Fund have that can impact your return? -
answer✔✔Mutual funds can have some or even all of these fees

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Thebright Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
171
Member since
1 year
Number of followers
6
Documents
11962
Last sold
22 hours ago
Topscore Emporium.

On this page, you find verified, updated and accurate documents and package deals.

3.7

34 reviews

5
12
4
10
3
7
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions