BIS 220 MASTER Think Big /bis220master.com BIS 220 MASTER Think Big /bis220master.com | Page 2

5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet 11) No alphabetic characters in a social security number field is an example of 12) In a database, the primary key field is used to