Question

Page 5 TR-Exam 2, Version C The protection of information from accidental or intentional misuse by persons inside or outside an organization 27. A. Information Downtime B. Information Security C. Information Ethics D. Information Governance 28. The ethical component of an Information System: A. AI B. Expert System C. Govemance D. Individuals 29, Methods for confirming users identities. A. Something the user has B. Something the user knows. C. Something that is part of the user. D. All of these. 30. What makes big data big? A. Volume, Velocity, Variety B. It is unstructured C. It is structured D. SQL In the network shown, the machines on the right connect to the machine on the left in order to 31. get access to webpages, files music, and/or other services. It is what kind of network? A. LAN B. Peer-to-Peer C. Client/Server D. Ring What item sells best at Walmarts in Florida when a hurricane is on the way? 32. A. Strawberry Pop-Tarts B. Beer C. Batteries D. Generators
0 0
Add a comment Improve this question Transcribed image text
Answer #1

27.) B (Information security)

  • Information security is practice of preventing unauthorized access , and any kind of disclosure of the important and internal data.

28.) D (Individuals)

  • Information system has 5 components : hardware, software, data, people, and process.

29.) D ( all of these)

  • Most secure authentication is combination of all these
    1) something the user knows such as an ID and password.
    2) something the user has such as smart card ,driving license
    3) something that is part of the user such as fingerprint or retina scan.

30.) A ( Volume, Velocity,Variety)

  • Big, of course, is also subjective. Big in Big data refers to three vectors: volume, velocity, and variety -- the three Vs.

31.) C (client/server)

  • Because a server is a machine which stores all files, data and client request to the server for a particular things according to its need.

32.) A (Strawberry Pop-Tarts)

--------------------------------------------------------------------------------------------------------------------------------

please give me a thumbs up when my solution meets your requirement

Add a comment
Know the answer?
Add Answer to:
Page 5 TR-Exam 2, Version C The protection of information from accidental or intentional misuse by...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT