BIS 220 MASTER Invent Yourself/bis220master.com BIS 220 MASTER Invent Yourself/bis220master.com | Page 2

5 ) _____ issues involve collecting , storing , and disseminating information about individuals .
6 ) Your company ’ s computers have been taken over by an attacker and used to attack another organization ’ s information systems . Your problem is which of the following ?
7 ) You are the only person in your office to upgrade to Microsoft ® Word 2010 . Before you share documents with coworkers , you should do which of the following ?
8 ) Which of the following is detected by the contextual spelling checker ?
9 ) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page , you should use which of the following ?
10 ) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet
11 ) No alphabetic characters in a social security number field is an example of
12 ) In a database , the primary key field is used to