Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
BUSN Study Set 2
Quiz 15: Managing Information and Technology: Finding New Ways to Learn and Link
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Multiple Choice
What is the term for the small text files placed on the computer of a user who visits a company's Website?
Question 122
Multiple Choice
According to eWeek.com,computers are not the only devices susceptible to viruses.Which of the following can also be infected?
Question 123
Multiple Choice
In order to provide more security,many companies have begun relying on which of the following methods,such as fingerprint scanners,to prevent unauthorized access to sensitive materials?
Question 124
Multiple Choice
In which of the following markets do customers often do very careful research,comparing multiple vendors and perhaps even soliciting bids?
Question 125
Multiple Choice
Which of the following are hackers motivated by political or ideological beliefs with malicious intent to do harm,steal identities,or disrupt business?
Question 126
Multiple Choice
The Business Software Alliance,an organization dedicated to combating the piracy of software,estimates that what percentage of all software installed on computers in 2009 was illegally obtained,resulting in the loss of over $40 billion in revenue to software companies?
Question 127
Multiple Choice
Which of the following is the result of creative efforts such as books,musical works,inventions,and computer software?
Question 128
Multiple Choice
When comparing seat belt prices for his firm's auto assembly plant,purchasing manager Ernie Wong finds it most convenient to access which of the following?
Question 129
Multiple Choice
According to Microsoft's criteria,4&nrU3r# is a good example of which of the following?
Question 130
Multiple Choice
Which of the following are skilled computer users who try to gain unauthorized access to other people's computers?
Question 131
Multiple Choice
Data becomes information when which of the following happens?
Question 132
Multiple Choice
Which of the following is the sending of official-looking (but fake) e-mail messages designed to get users to disclose personal information in an attempt to steal identities?