Question: (Informtion management) may have more than one answer. 4) Which of the following is/are the report(s) produced from tactical systems. A. Drill down report and
(Informtion management)
may have more than one answer.

4) Which of the following is/are the report(s) produced from tactical systems. A. Drill down report and Summary report B. Exception report and ad-hoc report C. 3-year sales forecasts report D. Key-indicator report E. None of the above. 5) Which of the following is/are the most common organizational business information system(s)? A. decision support systems B. transaction processing systems C. electronic commerce systems D. management information systems E. None of the above. 6) Which of the following statement is/are FALSE? A. The events of breaking the security mechanism of a computer network are called hacking. The person who hacks is called a hacker. B. Besides hacking, we also use the term "routing" to describe those activities that may cause damages to computers and networks, or cause some kinds of loss | to a user. C. Spyware is a software which can collect users information (e.g. internet surfing habits, personal information, bank account, etc.), and send to another entity without their consent. D. Denial of Service (DoS) is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources, so that the server cannot handle normal users' requests. E. None of the above. 7) To prevent malware attacks, what type of software should be installed on a personal computer? A. printer driver B. communication software C. antivirus software D. operating system E. None of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
