BIS 220 MASTER Learn by Doing/bis220master.com BIS 220 MASTER Learn by Doing/bis220master.com | Page 2

6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet 11) No alphabetic characters in a social security number field is an example of 12) In a database, the primary key field is used to 13) Search engines and metasearch engines are examples of which network application? 14) ______ portals coordinate content within relatively narrow organizational and partners’ communities 15) Workflow, groupware, and telepresence systems are examples of which network application? 16) Which type of e-commerce does an organization provide information and services to its workers?