Question: Question 1 2 Points What is the difference between backup and recovery and disaster recovery? A Backup and recovery is for general employees; disaster recovery

Question 1 2 Points What is the difference
Question 1 2 Points What is the difference
Question 1 2 Points What is the difference
Question 1 2 Points What is the difference
Question 1 2 Points What is the difference
Question 1 2 Points What is the difference
Question 1 2 Points What is the difference between backup and recovery and disaster recovery? A Backup and recovery is for general employees; disaster recovery is for high-level executives. Backup and recovery provides a copy of a system's information so it can quickly get running again after a system B issue; disaster recovery includes backup and recovery plus how information systems will be recovered after a physical disaster. The terms are interchangeable Backup and recovery pertains to data only; disaster recovery pertains to only hardware and building damage. Question 2 2 Points What is the term used to describe the process of continuously measuring information system metrics and comparing those to optimal system performance and competitor values? A Artificial intelligence B Transactional processing Benchmarking Analytics Question 3 2 Points As a future manager, why will it be important to engage in systems thinking? A Because a successful manager knows how to program the systems needed by his or her department B Because a successful manager keeps in mind that an organization's operations must work together through the entire process of creating their product or service Because a successful manager can troubleshoot all technical issues in the information systems used by his or her department Because a successful manager knows that without information systems it's not possible to create a product or provide a service Question 4 2 Points What is a computer-simulated environment that simulates the real world or an imaginary world used for entertainment, training and remote, "hands-on" work? A Decision Support Systems B Virtual reality Business Model Intelligent Agent Question 5 2 Points A firewall is hardware and/or software that protects computer networks by screening all the network traffic and only allowing access to transmissions that have already been authorized. Firewalls are considered to be in which of the three technology based defense categories? Search and rescue B Prevention and resistance Detection and Response Authentication and authorization Question 6 2 Points What is multifactor authentication? A Requires the user to provide multiple means of authentication to confirm his/her identity B The identification of a user based on physical characteristics such as a fingerprint, iris, face, voice or handwriting The traditional security process, which requires a username and password Requires more than one authenticated user to enter a secure area of a building Question 7 2 Points Which is a benefit of cloud computing? A All of these are benefits of cloud computing Utilizing shared computing resources Accessibility of data and applications from various devices Ability to increase storage and processing power as necessary Question 8 2 Points What are the three business functions supported by MIS infrastructure? A operations, change, and sustainability B operations, customers, and ewaste operations, clients, and servers information, change, and business continuity planning Question 9 2 Points What scrambles information into an alternative form that requires a key or password to decode? A Cryptography Content filtering Digital certificate Encryption Question 10 2 Points Which TWO are drawbacks related to Moore's law? (Select 2) Increasing customer demand for faster wifi B Increasing energy consumption Increasing amounts of outdated hardware and e waste D Increasing cost of electronic devices Question 11 2 Points 80% of online business falls under this type of eBusiness model, which requires more complex security measures than the other models A Business-to-Business (B2B) B Business-to-Consumer (B2C) Consumer-to-Consumer (C2C) Consumer-to-Business (C2B) Question 12 2 Points Your MIS assignment is due in an hour, and you just started it. Without warning your Internet connection goes out, and comes back on 15 minutes before the assignment is due. You decide to copy paste text from online to answer the questions to get it in on time (despite the generous late submission policy and mulligan your instructor has graciously offered you). You have just tangled with which two common Web 2.0 challenges? Plagiarism and trademark violation B Technology dependence and information vandalism Copyright violation and information vandalism Technology dependence and plagiarism

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!