INSTURCTION
Try answering ALL questions and click on SHOW ANSWERS at the bottom of the page to see the suggested answers. All the best!!
Share your comments, answers or questions with us via Whatsapp (+233) 0553969961
1. When a transaction is processed online, how can the merchant verify the customer's identity?
2. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?
3. What is a model of a proposed product, service, or system?
4. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two?
5. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
6. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
7. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
8. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
9. What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
10. Which factor determines when your IT system will be available for knowledge workers to access?
11. Which factor determines who has the right to access different types of IT systems and information?
12. Which factor ensures your IT systems are functioning correctly and providing accurate information?
13. Which factor represents how well your system can adapt to increased demands?
14. Which factor represents a system's ability to change quickly?
15. What is a set of conditions used to measure how well a product or system functions?
16. What determines the future IT infrastructure requirements for new equipment and additional network capacity?
17. What automates business processes?
18. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
19. What sends work assignments through an e-mail system?
20. Which will not harm computer resources