Choose the correct option. Which information system allows for easy integration and central data storage? Enterprise Legacy Software Hardware   Which of the following is considered a computer crime? A) deletion of records by an employee who is unaware of operating procedures B) poorly written programs resulting in data losses C) loss of data as a result of flooding D) hacking of information systems   Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently   Which of the following is a critical security function that should be addressed by the senior management of an organization? A) sharing the private key with all systems connected to the network B) creating IS security software programs C) establishing the security policy D) avoiding the use of perimeter firewalls In information security, which of the following is true about managing risk? A) All organizations except financial institutions should invest heavily in security safeguards. B) Organizations should implement safeguards that balance the trade-off between risk and cost. C) Passwords are classified as technical safeguards. D) Physical security is classified as human   Which of the following is classified as a technical safeguard? A) cookies B) firewalls C) key escrow D) passwords   A word processing program would be an example of: A) Hardware B) Software C) Data D) Procedures   All of the following are components of an information system except: A) Software B) Culture C) Hardware D) Procedures E) People   Which systems are typically a major source of data for other systems? A) Transaction Processing Systems B) Management Information Systems C) Executive Support Systems D) Decision Support Systems   The average temperature on the surface of the moon would probably be___________________ information for a financial analyst. A) Important B) Timely C) Irrelevant D) Accurate

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter14: System Administration
Section: Chapter Questions
Problem 8RQ
icon
Related questions
Question
100%

Choose the correct option.

  1. Which information system allows for easy integration and central data storage?

    Enterprise
  2. Legacy
  3. Software
  4. Hardware

 

  1. Which of the following is considered a computer crime?
    A) deletion of records by an employee who is unaware of operating procedures
    B) poorly written programs resulting in data losses
    C) loss of data as a result of flooding
    D) hacking of information systems

 

  1. Which of the following is most likely to be a result of hacking?
    A) certain Web sites being censored for hurting sentiments
    B) small amounts of spam in a user's inbox
    C) an unauthorized transaction from a user's credit card
    D) pop-up ads appearing frequently

 

  1. Which of the following is a critical security function that should be addressed by the senior management of an organization?
    A) sharing the private key with all systems connected to the network
    B) creating IS security software programs
    C) establishing the security policy
    D) avoiding the use of perimeter firewalls

  2. In information security, which of the following is true about managing risk?
    A) All organizations except financial institutions should invest heavily in security safeguards.
    B) Organizations should implement safeguards that balance the trade-off between risk and cost.
    C) Passwords are classified as technical safeguards.
    D) Physical security is classified as human

 

  1. Which of the following is classified as a technical safeguard?
    A) cookies
    B) firewalls
    C) key escrow
    D) passwords

 

  1. A word processing program would be an example of:
    A) Hardware
    B) Software
    C) Data
    D) Procedures

 

  1. All of the following are components of an information system except:
    A) Software
    B) Culture
    C) Hardware
    D) Procedures
    E) People

 

  1. Which systems are typically a major source of data for other systems?
    A) Transaction Processing Systems
    B) Management Information Systems
    C) Executive Support Systems
    D) Decision Support Systems

 

  1. The average temperature on the surface of the moon would probably be___________________ information for a financial analyst.
    A) Important
    B) Timely
    C) Irrelevant
    D) Accurate

 

 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Fundamentals of managing system
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning