Question: please do not answer if you are not sure . thank you 40) 40) Tapping into a communications line and then entering the system by

please do not answer if you are not sure . thank you please do not answer if you are not sure . thank you

40) 40) Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called A) piggybacking. B) hijacking C) pretexting. D) vishing. 41) 41) A document that shows all projects that must be completed and the related IT needs in order to achieve long-range company goals is known as a A) performance evaluation. B) strategic master plan. C) project development plan. D) data processing schedule. 42) 42) The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as A) deep packet inspection. B) access control list. C) packet filtering. D) access control matrix 43) 43) An analytic answers the question "what happened?" is an example of which type of analytic? A) Descriptive analytic B) Diagnostic analytic C) Predictive analytic D) Prescriptive analytic 44) 44) Incentive programs were introduced to sales staff to decrease the amount of time spent on each order. This incentive program is likely to increase which type of error? A) Data threshold values. B) Data imputation. C) Data input. D) Violated attribute dependency. E) Data de-duplication. 45) 45) A vice president in the organization believes that employees working in cubicles will not perform better if they use augmented reality headsets. Her expectation that augmented reality headsets will not improve performance is an example of which of the following? A) Hypothesis stated in the alternative form. B) Hypothesis stated in the null form. C) A type I error. D) A type II error. 46) Lauren wants to open a floral shop in a downtown business district. She doesn't have funds enough 46) to purchase inventory and pay six months' rent up front. Lauren approaches a good friend, Jamie, to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business. After a lengthy discussion, Jamie agrees to invest. Eight months later, Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation. In order for Jamie to sue Lauren for fraud, all the following must be true except A) Jamie trusted and relied on Lauren's representation of the business financial operation. B) Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis. C) Jamie has suffered a substantial loss in her investment because of Lauren's deception. D) Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience. 47) 47) A set of unauthorized computer instructions in an otherwise properly functioning program is known as a A) spyware. B) trap door. C) Trojan horse. D) logic bomb

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!