رد: التمويل ...
الاسئله الي متذكرتها من النظم
طبعا 40 صح وخطأ 40 اختيارات
الاسئله موحده لان مكتوب فوق Mis department
في كم سؤال من برا التست بانك
Chapter 4 IT Infrastructure: Hardware and Software
4) One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.
Answer: FALSE
18) Total cost of ownership components include costs for downtime, training and support.
Answer: TRUE
67) The contracting of custom software development to outside firms is commonly referred to as:
A) outsourcing.
Chapter 7 Securing Information Systems
2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Answer: TRUE
6) Viruses can be spread through e-mail.
Answer: TRUE
12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Answer: TRUE
23) Large amounts of data stored in electronic form are ________ than the same data in manual form.
A) less vulnerable to damage
B) more secure
C) vulnerable to many more kinds of threats
D) more critical to most businesses
Answer: C
ch7
14.
Specific security challenges that threaten corporate servers in a client/server environment include:
a.
tapping; sniffing; message alteration; radiation.
b.
hacking; vandalism; denial of service attacks.
c.
theft, copying, alteration of data; hardware or software failure.
d.
unauthorized access; errors; spyware.
43) You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
A) Wireless network
B) Employees
C) Authentication procedures
D) Lack of data encryption
Answer: B
Chapter 9 E-commerce: Digital Markets, Digital Goods
4) Information asymmetry exists when one party in a transaction has more information for the transaction than the other party.
Answer: TRUE
|