________ is a way to improve the efficiency of business processes.
Workflow
Bottlenecks
Redundancy
Streamlining Ans✓✓✓ Redundancy
____________ is the process of computerizing manual tasks, making
them more efficient and effective, and dramatically lowering operational
costs.
Workflow
Swim lane
Automation
Streamlining Ans✓✓✓ Automation
_____________ is a contractual stipulation to ensure that ebusiness
participants do not deny their online actions.
Nonrepudiation
Irrevocability
No take-backsies
Fair information practice Ans✓✓✓ Nonrepudiation
,_______________ is a form of social engineering.
escalation of privelege
zombie farming
ransomware
pretexting Ans✓✓✓ pretexting
_______________ reroutes requests for legitimate websites to false
websites.
phishing
DDoS
a Trojan horse
pharming Ans✓✓✓ pharming
___________________ is (are) the first line of defense in organizational
information security.
An information security plan
People
Firewalls
Data Ans✓✓✓ People
,A __________ displays the path in which the process flows.
BPMN event
BPMN activity
BPMN flow
BPMN gateway Ans✓✓✓ BPMN flow
A __________ is an example of a token.
voice print
password
smart card
certificate Ans✓✓✓ smart card
A ___________ is a task in a business process.
BPMN event
BPMN activity
BPMN flow
BPMN gateway Ans✓✓✓ BPMN activity
A copyright protects the expression of an idea, not the idea itself.
, True
False Ans✓✓✓ True
A digital dashboard is a common tool to support:
TPS
Source documents
Visualization
Optimization Ans✓✓✓ Visualization
A folksonomy uses ____________________ to determine a
classification system.
a taxonomy
tacit knowledge
the semantic web
crowdsourcing Ans✓✓✓ crowdsourcing
A primary goal of information security is to reduce costs incurred from
________.
hackers
identity theft