100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

msis 2103 exam 1 Questions and Answers New (2024/2025) Solved 100% Correct

Rating
-
Sold
1
Pages
6
Grade
A+
Uploaded on
01-08-2024
Written in
2024/2025

______________ is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers. - Open-source software ______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically - The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment ______________ is not a specific goal of green computing. - Combating global climate chang _______________ are three subclasses of computers associated with the multiple-user computer. - Server, mainframe, and supercomputer _______________ is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation. - leavitts diamond _______________ is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications. - Service-oriented architecture _________________provide data and instructions to the computer and receive results from it. - input / output device A _______________ is a class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact - single-user portable computer A blended threat, phishing, and virus are all examples of a(n) - attack vectorA data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center - 4 A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage. - Stored Wire and Electronic Communications and Transactional Records Access Statute A form of cyberattack that is estimated to occur every 10 seconds against an individual in the U.S. is _______________ - ransomware A key difference between grid computing, multiprocessing, and parallel processing is that _______________ - grid computing relies on a community of computers acting together A key difference between the U.S. and EU fair information practices is that _______________ - although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States Acting in an ethical manner and acting in a legal manner will always lead to the same actions. True or False? - false an _____________is the technique used to gain unauthorized access to a device or a network - attack vector An organization that monitors, manages, and maintains computer and network security for other organizations is called a _______________service provider - managed security Computer forensics is a discipline that combines elements of_______ and computer science - law Each user should conduct a security self-assessment test. True or False - trueFive actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident __________ - follow up Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and - business unit strategy Four information system types based on their sphere of influence include interorganizational, personal, enterprise, and _______ - workgroup Managers of the business functions most affected by a new information system have a key responsibility to ensure that - the people, processes, and human structure components are fully addressed One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https. True or False - True One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is _______________ - legal consequences Programming languages are commonly used to perform data analysis and build application software, system software, embedded systems, Web sites, and _____________ - games Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably. True or False? - false The builders of safety-critical systems must determine when they have completed sufficient testing and sign off their approval to release the product. This is typically an easy and straight-forward decision. True or False - falseThe class of computer used to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers is the ___________ - multiple user computer The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they are part of the process itself. True or False? - true The fact that _______________ is not a benefit that can be expected from following a professional code of ethics - a code can provide an answer to every ethical dilemma The four levels at which the CIA security triad must be implemented include _______________ - organizational, network, application, and end user The growth of the Internet of Things is helping to curb the number of cyberattacks. True or False? - false The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long. True or False - false

Show more Read less
Institution
Msis 2103
Module
Msis 2103









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Msis 2103
Module
Msis 2103

Document information

Uploaded on
August 1, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

msis 2103 exam 1 ______________ is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers. - Open -source software ______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically - The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment ______________ is not a specific goal of green computing. - Combating global climate chang _______________ are three subclasses of computers associated with the multiple -user computer. - Server, mainframe, and supercomputer _______________ is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation. - leavitts diamond _______________ is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications. - Service -oriented architecture _________________provide data and instructions to the computer and receive results from it. - input / output device A _______________ is a class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact - single -user portable computer A blended threat, phishing, and virus are all examples of a(n) - attack vector A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center - 4 A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage. - Stored Wire and Electronic Communications and Transactional Records Access Statute A form of cyberattack that is estimated to occur every 10 seconds against an individual in the U.S. is _______________ - ransomware A key difference between grid computing, multiprocessing, and parallel processing is that _______________ - grid computing relies on a community of computers acting together A key difference between the U.S. and EU fair information practices is that _______________ - although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States Acting in an ethical manner and acting in a legal manner will always lead to the same actions. True or False? - false an _____________is the technique used to gain unauthorized access to a device or a network - attack vector An organization that monitors, manages, and maintains computer and network security for other organizations is called a _______________service provider - managed security Computer forensics is a discipline that combines elements of_______ and computer science - law Each user should conduct a security self -assessment test. True or False - true
£6.15
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICMATERIALS City University New York
Follow You need to be logged in order to follow users or courses
Sold
559
Member since
2 year
Number of followers
186
Documents
10590
Last sold
1 day ago

4.1

94 reviews

5
53
4
11
3
21
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions