BIS 220 MASTER Think Big /bis220master.com BIS 220 MASTER Think Big /bis220master.com | Page 2
5) _____ issues involve collecting, storing, and disseminating
information about individuals.
6) Your company’s computers have been taken over by an attacker and
used to attack another organization’s information systems. Your
problem is which of the following?
7) You are the only person in your office to upgrade to Microsoft®
Word 2010. Before you share documents with coworkers, you should
do which of the following?
8) Which of the following is detected by the contextual spelling
checker?
9) If your cursor is near the bottom of a page and you want to display
the next paragraph you type at the top of a new page, you should use
which of the following?
10) Your ______ is the collection of traceable data that is captured
when you use various information technologies such as credit cards or
the Internet
11) No alphabetic characters in a social security number field is an
example of
12) In a database, the primary key field is used to