Preview

BEC IT Homework

Good Essays
Open Document
Open Document
475 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BEC IT Homework
Information Technology:
2. The most likely disadvantage for an entity that keeps data files prepared by personal computers rather than manually prepared files:
C. It is usually easier for unauthorized persons to access and alter the files
4. Which of the following represents an internal control weakness in a computer-based system?
A. Computer operators have access to the instructions and the authority to change programs
6. Which of the following is most suitable for an expert system?
C. Automate daily managerial decisions
8. A distributed processing environment is most beneficial in the following situation:
B. Large volumes of data are generated centrally
10. The following should not be a responsibility of a database administrator
A. Develop applications
12. What is a server in a LAN (local area network)
D. A device that stores program and data file for users of the LAN
14. The following is false about an accounting information system (AIS)
B. It is best suited to solve problems when uncertainty is great
16. A computer operator needed to know whether a particular job had already been run today, they figure this out by viewing the…
C. Console Log
18. The following statement regarding the decision support system is generally true…
B. Support structured applications
20. What is probably the result associated with the conversion to the new automatic system.
B. Risk exposure is reduced
PART II:
2. Which program uses the computers of innocent parties affected with Trojan horse programsA. Password cracking
4. An interactive system environment is best characterized by
B. The processing of groups of data at intervals
6. An organizations computer system should have an IDS (instrusion detection system) if it has external connections. An IDS…
C. Uses behavior based detection
8. Which of the following controls would most likely check for this type of errorC. Check digit verification
10. What is the best course of action to take if a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ABurnett Chpt12

    • 344 Words
    • 1 Page

    20. The replacement vehicle will be ready in good time for the start of the survey season.…

    • 344 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    4. Obtain number of last receiving report issued as part of physical observation of inventory.…

    • 198 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It203 Homework 5

    • 319 Words
    • 2 Pages

    In the table design view of SQL Server, select all the columns that make up the primary key and then select Set as Primary Key.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/210 Final Exam

    • 1235 Words
    • 5 Pages

    4. The calculation should be executed only after all the valid input values are provided.…

    • 1235 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    9. A student writes a report using a word processor, saving the repot in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he pasts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files as defined by a computer OS?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, and The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Biology Exam Paper

    • 2143 Words
    • 9 Pages

    The term ____ refers to the practice of copying a file from a remote computer to a local computer.…

    • 2143 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Homework Assignment 5

    • 1706 Words
    • 7 Pages

    The four levels of state courts are as follows: The trial court of limited jurisdiction, the trial court of general jurisdiction which hears various kinds of cases, the intermediate appellate courts with a fixed maximum and minimum term of imprisonment and only hears appeals and the state courts of last report or Supreme Court of the state.…

    • 1706 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    An IDS is a software or hardware tool which allows to detect and warn about an attack or…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    it320 assignment 1-3

    • 1779 Words
    • 8 Pages

    9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files defined by a computer OS? ()…

    • 1779 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Acc564 Week 5 Homewrk

    • 2054 Words
    • 9 Pages

    b. For each of the five data fields, suggest one or more input edit controls that could be used to detect input errors.…

    • 2054 Words
    • 9 Pages
    Good Essays