Ask Marketing Management Expert

1.Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.

A. boot sector

B. file infector

C. file destroyer

D. file command

2._________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.

A. Johann Gutenberg

B. Phil Zimmerman

C. William (Bill) Gates

D. Tim Burners-Lee

3.Which of the following is NOT an example of a computer crime as listed in the textbook?

A. Data diddling

B. Salami slicing

C. Piggybacking

D. Cold calling

4.One common way to gain access to a password-protected system is to use a __________ approach.

A. back-door

B. “sneak peek”

C. brute-force

D. social engineering


5.According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.

A. 25 percent or less

B. 50 percent

C. 75 percent

D. nearly 90 percent


6.Persons who plant viruses are called:

A. computer hackers.

B. cyberterrorists.

C. vandals.

D. predators.


7.A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:

A. authentication.

B. privacy/confidentiality.

C. nonrepudiation.

D. integrity.


8.The global reach of computer networks has raised concerns over:

A. copyrights.

B. privacy.

C. security.

D. All of the above


9. encryption software allows users to ensure:

A. authentication.

B. privacy/confidentiality.

C. nonrepudiation.

D. All of the above

10.The slang term for stolen software is:

A. hackerware.

B. warez.

C. vaporware.

D. discountware.


11.__________ are the least used security technology.

A. Passwords

B. Biometrics

C. Encrypted files

D. Firewalls


12.__________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.

A. Access control software

B. Computer security software

C. Application restriction software

D. Data protection software


13.The Computer Fraud and Abuse Act of 1986 prohibited:

A. stealing or compromising data about national defense and foreign relations.

B. breaking into any electronic communications service.

C. monitoring voice communications.

D. stealing trade secrets.


14.A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.

A. information systems security plan

B. disaster recovery plan

C. infrastructure management

D. risk assessment plan


15.ECPA is an acronym that refers to the:

A. Electronic Controls Privacy Act.

B. Electronic Communications Privacy Act.

C. E-Commerce Customer Protection Association.

D. Electric Computer Protection Agency.


16.To execute denial of service attacks, intruders often use __________ computers.

A. zombie

B. monster

C. robot

D. android


17.Crimes committed against telephone company computers are an example of:

A. phreaking.

B. spoofing.

C. social engineering.

D. data diddling.


18.Examples of the ethical conundrum include all EXCEPT:

A. using computer time at work to read personal e-mail.

B. organizations compiling personal information about shopping habits.

C. the government regulating computer crimes.

D. using technology to rearrange photographs.

19.Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the:

A. Information Age.

B. Industrial Revolution.

C. Agriculture and Handwork Age.

D. Modern Age.


20.Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.

A. freaking

B. tricking

C. phishing

D. luring

Marketing Management, Management Studies

  • Category:- Marketing Management
  • Reference No.:- M9763701

Have any Question?


Related Questions in Marketing Management

Question 1 application of conceptstime value of money2

Question: 1. Application of concepts/time value of money? 2. Which is more detrimental to a firm, pricing your product or service too high, or pricing your product or service too low? 3. Discuss the role of demographics ...

Question imagine that you are in the market for a new

Question: Imagine that you are in the market for a new career. How can the marketing research process apply to your career search? Think of a specific topic you need to learn more about that relates to your career as a o ...

Question strategic marketing planintroductionthis

Question: STRATEGIC MARKETING PLAN INTRODUCTION This assignment entails development of a comprehensive strategic marketing plan for a new product or service that is ready to "go to market". A Project Template is provided ...

Qestion ready set strive gen z is comingby janet adamy

Question: Ready, Set, Strive : Gen Z Is Coming By Janet Adamy | Sep 07, 2018 TOPICS: Consumer Behavior, External Marketing Environment, Targeting SUMMARY: About 17 million members of Generation Z are now adults and start ...

Question in your marketing plan you should1establish a

Question: In your Marketing Plan, you should: 1. Establish a Mission Statement and a Vision Statement for your new organization. 2. Briefly describe basic services it has been providing during the first six months of ope ...

Question 1review the terminal course objectives accessed by

Question: 1. Review the Terminal Course Objectives, accessed by clicking on the "Course Information" tab at the top of your screen, scrolling down to the "Course Objectives" and then selecting View class objectives. How ...

Question read the worddoc first and answer those following

Question: Read the word.doc first and answer those following question 1. Provide a list of at least five pieces of information that airlines have about their customers, and for each, explain how that information might he ...

In this unit you are asked to produce a public relations

In this unit you are asked to produce a Public Relations Campaign Proposal document and an essay that explains the theory behind your planned approach to the Proposal task. You may base your assessment on the suggested s ...

Question 1200 words on your favorite retailer and their

Question: 1200 words on your favorite retailer and their major competitor as discussed in class. This should focus on the different elements that make up the retail strategy of the companies and other factors that appeal ...

Question bulltype of paper assignmentbullsubject

Question: • Type of paper Assignment • Subject Other • Number of pages 1 • Format of citation Other • Number of cited resource s0 • Type of service Writing from scratch First, choose a piece of art from any genre (music, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As