BIS 220 MASTER Learn by Doing/bis220master.com BIS 220 MASTER Learn by Doing/bis220master.com | Page 2
6) Your company’s computers have been taken over by an attacker and
used to attack another organization’s information systems. Your
problem is which of the following?
7) You are the only person in your office to upgrade to Microsoft®
Word 2010. Before you share documents with coworkers, you should
do which of the following?
8) Which of the following is detected by the contextual spelling
checker?
9) If your cursor is near the bottom of a page and you want to display
the next paragraph you type at the top of a new page, you should use
which of the following?
10) Your ______ is the collection of traceable data that is captured
when you use various information technologies such as credit cards or
the Internet
11) No alphabetic characters in a social security number field is an
example of
12) In a database, the primary key field is used to
13) Search engines and metasearch engines are examples of which
network application?
14) ______ portals coordinate content within relatively narrow
organizational and partners’ communities
15) Workflow, groupware, and telepresence systems are examples of
which network application?
16) Which type of e-commerce does an organization provide
information and services to its workers?