Multiple Choice Questions: 1. Hackers can be differentiated from crackers by: a. The types of targets they
Question:
Multiple Choice Questions:
1. Hackers can be differentiated from crackers by:
a. The types of targets they select.
b. The tools that they use.
c. Their level of malicious intent.
d. Whether they are internal or external.
2. IT leaders who establish mechanisms for joint IT-business decision making are fostering which IT asset?
a. Procedural IT asset
b. Technology infrastructure asset
c. Business/IT relationship asset
d. Human resources asset
3. When a web site mimics a legitimate site for the purpose of misleading or defrauding an Internet user, it is called:
a. Identity theft.
b. Illegal spam.
c. Spoofing.
d. Phishing.
4. The language translator program which translates an entire 3GL or 4GL program into machine language before any of the program is executed is called a (an):
a. Control unit.
b. Interpreter.
c. Compiler.
d. Converter.
5. Testing a new custom system before implementation is the responsibility of:
a. Users and IS analysts.
b. Users only.
c. iS analysts only.
d. Independent third parties.
Cornerstones of Financial and Managerial Accounting
ISBN: 978-1111879044
2nd edition
Authors: Rich, Jeff Jones, Dan Heitger, Maryanne Mowen, Don Hansen