0 of 44 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 44 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which of the following is not a characteristic of information?
The …………… is the component of communication to which information is transferred to.
The criminal act of sending messages or emails that seems to come from credible sources which require users to part with personal data is called:
All of the following are examples of Operating Software EXCEPT:
The IT security system that identifies both authorized and unauthorized traffic and notify management to take action is ………………
Which of these is a common cause of data problems in MIS?
The Software which contains row and columns is called ………….
Which of the following is an example of an information technology crime?
The following are not Input / Output units of I.C.T gadgets except:
Which of the following is not a correct e-mail address?
The information system that produces standardized report in summarized, structured form used to support middle managers.
The implementation stage of a system development activity involves the following EXCEPT:
Which information system gives the executive easy access to key internal and external data in a summarised form?
One of the following are is ODD:
A multi-user environment is driven by……………..
The criminal act of impersonation of email address which may not require users to part with personal data is called:
The enterprise application that build and nurture long-lasting relationship with customers, identify their needs, meet those needs and build a strong loyal customer’s relationship is:
The purpose of Information Systems Control is to prevent, detect and ………. errors and irregularities in an information systems area.
6.8 GB RAM represents …………………
The CAAT used to process test data in a live environment as a means of verifying processing accuracy is called …………
__________________ is the transacting or enabling the market, buying and selling goods and/or information through an electronic media, specifically the internet.
_______ is a device and/or software that stands between a local network and the Internet, and filters traffic that might be harmful.
Black Hat Computer Audit is the same as ______
An area in the memory in which data are kept temporarily for processing is known as _______
A code usually supplied to computer in order that only the user can gain access into the computer system is ………………
……………… is a piece of software which attaches itself to another program on a system in order both to spread itself to other program and to have undesirable effects on the program it become attached to.
A computer that stores the data shared by users on a LAN is called a ………
_______ is a collection of related records
________ is a type of information system that combines data, analytical tools, and models to support semi-structured and unstructured decision making.
Memory that does not retain data when there is power failure is ……………..
Management Support System is an information system, which gives _____ easy access to key internal and external data.
_______ is the most significant feature of information.
A suite of programs that allows the hardware to function optimally and which allows the end user to interact with the hardware is called______
The type of decisions where established procedures exists for making the decisions is called ______
________ is a pool of non-redundant and interrelated data, readily available for use as the input to the user’s application programs.
The best method of collecting data under system analysis is ______
_______ goods are products/services that can be delivered over a digital network.
Software/hardware based technology used to keep network secure by control ling the incoming and outgoing network traffic by analysing the data packets and determining whether it should be allowed or not, based on a predetermined rule set is called___
_______ is the strongest physical access control method in an organisation.
_______ is the CAAT that facilitates and automate the testing of 100% of a population and focuses auditors’ attention on specific areas or transactions which are of higher risk.
The Managing Director of your company has just attended a seminar on Information Technology for business. At the seminar, he was made to understand that an information system is technically a set of interrelated components that collects process, store and distribute information to support decision making and control in an organization. As the head of Information Technology Department, the Managing Director asks you to provide him with detailed information on the various information systems that support decision making.
This response will be awarded full points automatically, but it can be reviewed and adjusted after submission.
Computer crime refers to using computer resources to engage in unauthorized or illegal acts.
(a) Discuss the categories of Computer Cyber Crimes prevalent in any system.
(b) Explain the various types of crimes that can be perpetrated through the computer.
This response will be awarded full points automatically, but it can be reviewed and adjusted after submission.
Business Continuity, Business Impact Analysis and Disaster Recovery are IT solutions to digital attacks.
Required: Differentiate the above three solutions.
This response will be awarded full points automatically, but it can be reviewed and adjusted after submission.
[a] The development of an effective information system can be described as a lifecycle in view of the important stages that have to be considered.
You are required to outline what you considered as a system life cycle.
[b] Information Technology has pervaded every aspect of human business activities. Discuss its impact in the financial sector of Nigeria.
This response will be reviewed and graded after submission.