Preview

Mis 350-01: Management Information System

Satisfactory Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mis 350-01: Management Information System
Cheri Gantt
April 18, 2012
Management Information Systems
MISY 350-01
Homework 3

1. How do antivirus programs detect and identify a virus? What is virus hoax? - Antivirus programs protect computers against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. A virus hoax is an e-mail message that warns users of non-existent virus or other malware.

2. What is information privacy? List 5 ways to safeguard your personal information. - Information privacy refers to the rights of individuals and companies to deny or restrict the collection and use of information about them. 1. Do not reply to spam for any reason. 2. Install a personal firewall. 3.


You May Also Find These Documents Helpful

  • Good Essays

    This practice exam is structured to take 180 minutes. Since it is worth 50 marks, you would allocate 3.6 minutes for each mark.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Instructor Essay Example

    • 3769 Words
    • 16 Pages

    A person may commit an intentional tort if he or she acts knowing with substantial certainty that certain consequences will result.…

    • 3769 Words
    • 16 Pages
    Good Essays
  • Good Essays

    US MPA

    • 1158 Words
    • 5 Pages

    The United States Constitution is an important document that keeps our great country running. The three main sections (The Preamble, The Articles, and the Amendments) are all important parts of the Constitution and all bring up important rights that we have as Americans. The Preamble unifies all Americans as “We the people” and introduces the Constitution; the Articles explain the 3 branches of government (Legislative, Executive, and Judicial), and the Amendments are written changes to the constitution that help it keep up with the changing times (The Bill of Rights, or the list of rights that us Americans have that can’t be taken away by the government, is located here). This essay will be based mostly on the Federal system, and explaining the powers of each of the three branches. In my opinion, the Judicial Branch has the most power of the three branches.…

    • 1158 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Principles of Care

    • 1759 Words
    • 8 Pages

    Privacy: Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others. Privacy is your right to control what happens with personal information about you.…

    • 1759 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Would you entrust your corporate systems to a cloud computing provider? Why or why not?…

    • 287 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Farhan

    • 3202 Words
    • 13 Pages

    8. Information privacy is the ability of an individual or group to stop information about themselves from becoming known to people other than those they choose to give the information to. Privacy is sometimes related to anonymity although it is often most highly valued by people who are publicly known.…

    • 3202 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Privacy is the right of an individual to limit access to others to some aspect of their person. A more specific type of privacy is informational privacy (which is the notion of privacy we are most familiar with). Information privacy is the right of a person to determine at what time, in what way, and to what extent information about the person is communicated to others.…

    • 2070 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Maxis Berhad is a leading telecommunication company in Malaysia with more than 11.4 million mobile subscribers, Maxis has been providing a full suite of services on multiple platforms to fulfill the telecommunication needs of individual consumers, SMEs and large corporations in Malaysia. Other than that, Maxis Berhad is offering on postpaid services under the Maxis brand and via prepaid formast under the Hotlink. It uses the dialling prefix identifier of "012", "014" and "017". The uses of different brands are to support each other by synergy value. It helps Maxis Berhad to maintain and develop prepaid businesses while keep on maintaining their growth in postpaid field.…

    • 5289 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Inputs: The inputs include package information, customer signature, pickup, delivery, time-card data, current location (while en route), and billing and customer clearance documentation.…

    • 2580 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    A stealth virus hides the modifications made to file and boot records by modifying and forging the result of calls to function, therefore programs believe they are reading the original file and not the modified file. A good anti-virus software will probably detect stealth virus due to the fact that a stealth virus attempts to hide itself in memory when anti-virus software is launched.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    How does the leading clothing retailer in Sri Lanka actually conduct their operations so efficiently to satisfy not only the domestic market, but also its international market? Not visible to those who visit their shopping arcades or visit their online store, there is an advanced Information Technology enabled system with professionals working tirelessly to provide their customers with a satisfying shopping experience.…

    • 3506 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    Status of Agrarian Reform

    • 1322 Words
    • 6 Pages

    The idea of initiating land reform programs in Philippines can be traced back to 1963. The enactment of the Republic Act (RA) 3844, Section 49, better known as the Agricultural Land Reform Code emphasized on the foundation of an organization called the Land Authority.Established on 8th August 1963, the Land Authority was endowed with the responsibility of implementing the Republic Act 3844 policies. To hasten up the other activities associated with the land reform programs in Philippines, the Republic Act 3844 offered formal recognition to all the existing agencies involved with similar activities. The functions of these agencies were re-coordinated, with the aim of fulfilling the common objectives of the land reform programs.…

    • 1322 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Viruses and Anti-Virus

    • 3458 Words
    • 14 Pages

    Computer viruses are the small software programs that are designed for the purpose of spreading from one computer to another in order to interfere with the computer operations.…

    • 3458 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Social Crime

    • 2453 Words
    • 10 Pages

    Virus: This is a code that attaches itself to a program in a computer and then reproduces itself. It can erase files or lock up a system.…

    • 2453 Words
    • 10 Pages
    Powerful Essays