Question

​​​​​​Exercise 35- Pick the best answer Bloomsdale wants to determine if the company from whom she buys seafood is buyi...

​​​​​​Exercise 35- Pick the best answer

  1. Bloomsdale wants to determine if the company from whom she buys seafood is buying only sustainable seafood. Bloomsdale may be able to use ____________ to find this information.
  2. Mobile devices that connect to important organizational systems should be:
    1. Reticulated.
    2. Allowed.
    3. Banned.
    4. Password protected with strong passwords or multifactor authentication.

                                               

  1. According to the framework for cybersecurity, protecting and securing the U.S. critical infrastructure requires a partnership between ___________ and __________.
    1. ISPs; government.
    2. Security professionals; the federal government.
    3. Public entities; private entities.
    4. Auditors; clients.

                                                           

  1. Which of the following is often a contract with a vendor for the purchase of goods?
    1. Remittance advice.
    2. Vendor invoice.
    3. Packing lists.
    4. Purchase order.

  1. Ruth Milkweed, a hot tub and spa manufacturer, currently has a fast network and a large, centralized computer. The computing capacity, while large, is not linked to each location's processing needs. Without any upgrades to the system, Ruth Milkweed probably uses a ___________ system.
    1. Matrix.
    2. Centralized.
    3. Decentralized.
    4. Hybri

  1. A computer input control is designed to ensure that:
    1. Machine processing is accurate.
    2. Only authorized personnel have access to the computer area.
    3. Data received for processing are properly authorized and converted to machine-readable form.
    4. Computer processing has been performed as intended for the particular application.

  1. IT policies are particularly valuable in _______ and _________ organizations.
    1. Asset-intensive; centralized.
    2. Decentralized; geographically distributed.
    3. Low-reliability; gaming.
    4. Cooperative; incipient.

  1. SQL is most directly related to:
    1. String question language processing.
    2. The “grandfather, father, son” method of record retention.
    3. Electronic commerce.
    4. Relational databases.

                                   

  1. The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the:
    1. Computer operator.
    2. Keypunch operator.
    3. Computer programmer.
    4. Maintenance technician.

                                                           

  1. Which of the following steps in the accounting cycle comes before posting entries to accounts?
    1. Journalize closing entries.
    2. Analyze transactions.
    3. Prepare reports.
    4. Prepare post-closing trial balance.

                                                           

  1. Which of the following risks increases the least with cloud-based computing compared with local server storage for an organization that implements cloud-based computing?
    1. Data loss.
    2. Vendor security failure.
    3. Global visibility.
    4. System hacks.

                                                                       

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. D mobile devices should have strong password protection to access organizational systems.

2. A both ISPs and government together can develop a strong framework for cybersecurity

3. B invoice is an agreement for purchase of goods.

4. C since its processing needs are not linked it is a decentralised system.

5. C Computer input control ensures data received is authorised and converted to machine readable language.

6. A IT policy are used in asset intensive and centralised organisations.

7. D SQL is related to Relational databases.

8. A Header label is used to identify the file which is next store in magnetic tape. Sometimes computer operator store files in different places in magnetic tape, on that condition file can be search using information which store in header label. So it is necessary to use header label in conjunction with magnetic tape.

9. A Journal entries is followed by ledger posting

10. B Vendor security failure is least in cloud computing compared to local server storage.

Add a comment
Know the answer?
Add Answer to:
​​​​​​Exercise 35- Pick the best answer Bloomsdale wants to determine if the company from whom she buys seafood is buyi...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT