MGSC 300 Exercises

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Describe the potential benefits of 5G networks to the Internet of Things (IoT). More than one answer may be correct. 1. 5G connectivity has the potential to create truly connected cities. 2. 5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment. 3. 5G connectivity will greatly improve what businesses and individuals can do with connected devices. 4. 5G connectivity will allow for faster communications, even faster than fiber optic connections.

1. 5G connectivity has the potential to create truly connected cities 2. 5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment. 3. 5G connectivity will greatly improve what businesses and individuals can do with connected devices. Explanation: 5G networks can handle the large amount of data generated by a connected city. 5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment. 5G will enable the support of more simultaneous Internet connections and even more connected devices.

From the following list, select the statement(s) that correctly define(s) that type of network. 1. A PAN connects devices around an individual. 2. The Internet connects LANs, WANs, and other Internet networks together. 3. An WAN connects a variety of devices at a single site, such as an office. 4. A LAN connects a variety of devices between two or more geographic locations.

1. A PAN connects devices around an individual. 2. The Internet connects LANs, WANs, and other Internet networks together. Explanation: A PAN or personal area network connects the personal devices around an individual, such as laptops, tablets, and smartphones; an Internet is a network that connects other networks (LANs, WANs, and other Internet networks).

Describe computer viruses. More than one answer may be correct. 1. A computer virus is software. 2. A computer virus can take over an operating system 3. A computer virus can destroy a computer's programs. 4. A computer virus lurks in a system, displaying no symptoms.

1. A computer virus is software. 2. A computer virus can take over an operating system 3. A computer virus can destroy a computer's programs. Explanation A computer virus is software, created using computer code. Viruses can destroy programs, disrupt networks, or alter the operations of a computer. Frederick Cohen, a student at USC, coined the phrase "computer virus" after creating software that could take over a computer's operating system.

Which of the following statements accurately describes computer networks? More than one answer may be correct. 1. A network is a group of two or more devices/computers that are connected together. 2. Networks range in size from small home networks to the Internet, the world's largest network. 3. Networks support many different software applications and online or offline services. 4. Only certain types of networks can be linked together and supported by the Internet.

1. A network is a group of two or more devices/computers that are connected together. 2. Networks range in size from small home networks to the Internet, the world's largest network. 3. Networks support many different software applications and online or offline services. Explanation: A network is a group of two or more devices/computers that are connected to allow for the exchange of information and for the sharing of resources; networks come in various sizes and support many different software applications and services, including allowing access to the World Wide Web, digital video and audio, storage, application servers, and email.

How does AI differ from traditional computing technologies? 1. AI can simulate human problem-solving capabilities 2. AI only operates within pre-programmed parameters 3. AI includes technologies like machine learning and deep learning 4. AI is incapable of learning from raw data

1. AI can simulate human problem-solving capabilities 3. AI includes technologies like machine learning and deep learning This choice should be selected. A key feature of AI is its ability to mimic human cognitive functions such as problem-solving which make it different from traditional computing. This choice should be selected. Machine learning and deep learning are subsets of AI that allow it to learn from data and improve over time without being explicitly programmed for every task.

The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct. 1. Access control 2. authentication 3. encryption 4. physical security

1. Access control 2. Authentication Explanation Ensuring that former employees no longer have access to corporate materials is one way to maintain confidentiality. Access control ensures that the correct people will have access to confidential materials, while authentication validates a user to confirm that they should have access to such confidential materials.

How do managers use personal computers for their business needs? More than one answer may be correct. 1. Communicating via email 2. Creating and using databases and spreadsheets 3. Keeping internal communication confidential 4. Managing database operations

1. Communicating via email 2. Creating and using databases and spreadsheets Explanation Personal computers allow for communication between off-site and on-site employees and managers. In addition, personal computers allow users to create and use business documents.

In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for 1. Distributed Denial of Service 2. Distributed Denial of Security 3. Developed Denial of Security 4. Developed Denial of Service

1. Distributed Denial of Service

What are key factors that increase the risk of supply chain attacks in hybrid environments? 1. Integration of cloud services and on-premises infrastructure 2. Extensive use of encrypted data 3. Third-party vulnerabilities 4. Global interconnectivity of organizational supply chains

1. Integration of cloud services and on-premises infrastructure 3. Third-party vulnerabilities 4. Global interconnectivity of organizational supply chains Explanation: This choice should be selected. The integration of different environments increases complexity and potential points of entry for attackers.This choice should be selected. Third-party components often introduce vulnerabilities that attackers can exploit.This choice should be selected. The extensive interconnectivity can propagate the impact of a breach more widely and quickly.

Which of the following applications or services will Web 3.0 be built to support? More than one answer may be correct. 1. IoT 2. SaaS 3. ubiquitous computing 4. the Internet

1. IoT 2. SaaS 3. Ubiquitous Computing Explanation: Web 3.0 will help to support the many features of the IoT, SaaS in business environments, and ubiquitous computing (being everywhere at the same time).

What is the benefit of designing data visualizations for the target audience? 1. It improves communication and understanding. 2. It ensures the visualizations are visually appealing. 3. It guarantees that all data will be represented. 4. It makes the visualizations more complicated.

1. It improves communication and understanding.

What makes biometric verification a preferred method of identity verification? 1. Its convenience 2. The uniqueness of biometric features 3. Its reliance on easily guessable data 4. .The difficulty in replicating biometric features

1. Its convenience 2. The uniqueness of biometric features 4. .The difficulty in replicating biometric features Explanation This choice should be selected. Biometrics offer a convenient method of authentication without the need for memorizing passwords. This choice should be selected. Biometric features are unique to each individual, enhancing security. This choice should be selected. The difficulty in replicating biometric features makes it a secure option for authentication.

Which of the following are tips to avoid falling victim to a social engineering attack? 1. Make sure to research the facts contained in an email message. 2. Slow down and think about the scenario. 3. Be mindful of web searches to make sure you are landing on legitimate sites. 4. Rely on your antivirus software to find and inform you about social engineering threats.

1. Make sure to research the facts contained in an email message. 2. Slow down and think about the scenario. 3. Be mindful of web searches to make sure you are landing on legitimate sites. Explanation To be safe, research the validity of emails and phone calls. Remember to slow down and think about what's being offered: if it sounds too good to be true, it probably is. Finally, do your best to visit only legitimate websites.

What features make Python popular for data analytics? 1. Open-source nature 2. Requires extensive coding experience 3. Active developer community 4. Supports graphics and visualization tools

1. Open source nature 3. Active developer community 4. Supports graphics and visualization tools Explanation This choice should be selected. Python's open-source nature allows free access to the language and its extensive libraries. This is highly appealing in the data science community. This choice should be selected. The active community around Python provides substantial support and continuous improvements to its libraries .This choice should be selected. Python's support for graphics and visualization tools like Matplotlib and Seaborn makes it highly suitable for data visualization tasks in data analytics

From the following list, select all the possible warning signs of social engineering attacks. 1. Strange emails from known, trusted personal contacts and organizations 2. emails or texts containing links to more information or a free download 3. emails or web pages that request personal information in exchange for a free offer 4. phone calls from service providers that ask you to verify your account information

1. Strange emails from known, trusted personal contacts and organizations 2. emails or texts containing links to more information or a free download 3. emails or web pages that request personal information in exchange for a free offer Explanation Criminals often impersonate others and offer free giveaways in emails, texts, or webpages to encourage people to give up personal information or click a malicious link.

Which of the following is a characteristic of the Internet that helps explain how it works? More than one answer may be correct. 1. The Internet has connections points called nodes. 2. Data is usually stored on specialized computers called servers. 3. Data is transferred between networks through hardware called routers. 4. Information is transferred over the Internet in small groupings called segments.

1. The Internet has connections points called nodes. 2. Data is usually stored on specialized computers called servers. 3. Data is transferred between networks through hardware called routers. Explanation: The Internet uses nodes (connection points), servers that store information, and routers that help to facilitate information exchange. Information is transferred over the Internet in small groupings called packets.

What is a characteristic shared by all devices that can be infected by a computer virus? 1. They are connected to the Internet 2. They are PC-based 3. They are laptops and desktop computers 4. They are all relatively old devices

1. They are connected to the Internet Explanation Due to the nature of our always connected world, it is very easy for viruses to spread to laptops, desktops, smartphones, and tablet computers, whether they are PC- or Mac-based.

From the following list, select all the examples of cybercrimes. 1. Trojan horse viruses 2. computer hacking 3. digital identity theft 4. pop-up advertising

1. Trojan horse viruses 2. computer hacking 3. digital identity theft Explanation Trojan horse viruses, computer hacking, and identity theft are considered cybercrimes.

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create: 1. an intranet 2. a LAN 3. an Internet 4. a network of PANs

1. an intranet Explanation: Intranets are private networks designed for internal use only; typically, an intranet cannot be used without an authorized login and password.

Some of the responsibilities of a data analyst include which three of the following? 1. data visualization 2 data creation 3. data structuring 4. data reporting

1. data visualization 3. data structuring 4. data reporting Explanation This choice should be selected. Data visualization aids in the interpretation of data.This choice should be selected. Structuring large data sets to ensure data is accessible and usable is part of a data analyst's responsibilities.This choice should be selected. Creating reports and presentations for management and executives that outline key findings and recommendations is an important role of data analysts.

Which three of the following are major varieties of data formats? 1. discrete data 2. structured data 3. unstructured data 4. speculative data

1. discrete data 2. structured data 3. unstructured data Explanation This choice should be selected. Discrete data is measurable and counted data that has a limited number of values. This choice should be selected. Structured data is data that is organized according to a defined format such as in rows and columns. This choice should be selected. Unstructured data is data that is not organized according to any structure, such as Instagram posts.

List disadvantages of cloud computing. More than one answer may be correct. 1. downtime 2. security risk 3. limited control 4. file size limitations

1. downtime 2. security risk 3. limited control Explanation: Downtime, planned and unplanned, can occur because of maintenance, system/mechanical failure, natural disasters, and outside intrusions/attacks. Cloud service providers do their best to implement the best security measures they can, but there is always a certain level of risk involved for the user. Cloud infrastructure is owned, managed, controlled, and monitored by the cloud service provider. This means the customer often has little control over cloud service processes and procedures.

When discussing personally identifiable information (PII), which three of the following are usually anonymized? 1. names 2. phone numbers 3. social media activity 4. Social Security numbers

1. names 2. Phone numbers 3. Social security numbers Explanation This choice should be selected. In addition to names, Social Security numbers, account numbers, and IP addresses are also considered PII data that should be anonymized.This choice should be selected. In addition to phone numbers, medical records, account numbers, and IP addresses are also considered PII data that should be anonymized.This choice should be selected. In addition to Social Security numbers, account numbers, and IP addresses are also considered PII data that should be anonymized.

Before the use of computers and database management systems (DBMS), traditional files systems used _______ files, ________, and ________. 1. paper 2. folders 3. filing cabinets 4. disk drives

1. paper 2. folders 3. filing cabinets Explanation: Before computers, database management systems (DBMS) traditional file systems used paper files, folders, and filing cabinets.

From the following list, select the functions of an Internet Service Provider (ISP) 1. providing an Internet Protocol (IP) address 2. providing access or a gateway to the resources on the Internet 3. paying for their customers' access to the Internet 4. creating protocols and other standards for transmitting messages

1. providing an Internet Protocol (IP) address 2. providing access or a gateway to the resources on the Internet 3. paying for their customers' access to the Internet Explanation: ISPs allow devices and individuals to connect to the Internet and online resources by assigning an IP address to all connected devices and collecting money to pay for users' access.

The main objectives of data governance include high-quality data and which other goals? 1. risk mitigation 2. data use rules 3. requirement compliance 4. cost-saving

1. risk mitigation 2. data use rules 3. requirement compliance 4. cost-saving Explanation: The key goals of data governance include risk mitigation, rules for data use, compliance to requirements, cost reduction, and high-quality data.

Information in a database table is made up of ________ called records or objects, and ______ called fields. 1. rows 2. columns 3. fields 4. objects

1. rows 2. columns Explanation Information in database tables is stored in rows called records or objects, and columns called fields.

The main tools used by data analysts include which three of the following? 1. spreadsheets 2. Punnett squares 3. databases and query languages 4. data visualization tools

1. spreadsheets 3. databases and query languages 4. data visualization tools Explanation This choice should be selected. The two most popular spreadsheet programs are Microsoft Excel and Google Sheets. Other spreadsheet programs include OpenOffice Calc and Mac Numbers.This choice should be selected. With the use of database management systems (DBMS), users can extract and query data which cannot be done using spreadsheet software.This choice should be selected. Data visualization is the graphical and structured representation of data.

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's 1. syntax 2. records 3. fields 4. queries

1. syntax Explanation This choice should be selected. Syntax includes the structure of words, symbols, numbers, and punctuation used to extract data and information.

From the following list, select all the examples of different cybersecurity breaches. 1. viruses 2. spyware 3. impersonation 4. Distributed Denial of Service (DDOS) 5. security patches

1. viruses 2. spyware 3. impersonation 4. Distributed Denial of Service (DDOS) Explanation Viruses, spyware, impersonation, and DDOS attacks are all common types of cybersecurity breaches.

Which of the following are examples of spear phishing? 1. Someone creates a fake Instagram profile using your name and photos and attempts to get all of your contacts to add the fake account as a friend. 2. An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device. 3. An email is sent to everyone with a Gmail email address providing a link to click on to update their PayPal account details. 4. A message containing a pornographic image is sent via Facebook Messenger app to female Facebook users.

2. 2. An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device. Explanation Spear phishing is email attacks that are targeted to specific people or companies and designed to steal data and possibly install malicious software on a user's device.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing? 1. Cloud computing provides safer access to the Internet. 2. Cloud computing diminishes the need to store files and software on a local drive. 3. Cloud computing allows single users to access shared files. 4. Cloud computing bypasses the need for user passwords and login information.

2. Cloud computing diminishes the need to store files and software on a local drive. Explanation: Cloud computing eliminates the need to store data, files, and software on a device. Organizations use cloud services to internally run and maintain data centers and software applications

How does a firewall work? 1. It forwards secure data packets from a computer to the network. 2. It determines what Internet traffic can leave or enter a network or computer. 3. It connects secure devices together on a network. 4. It determines what Internet traffic can enter a network or computer.

2. It determines what Internet traffic can leave or enter a network or computer. Explanation A firewall is hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic in and out of a network or computer.

What distinguishes Multi-Factor Authentication (MFA) from Two-Factor Authentication (2FA)? 1. MFA uses only two verification factors 2. MFA can include biometrics, security tokens, or SMS codes 3. MFA is less secure than 2FA 4. MFA requires two or more verification factors

2. MFA can include biometrics, security tokens, or SMS codes 4. MFA requires two or more verification factors Explanation This choice should be selected. MFA includes a variety of factors, which can be combined for enhanced security. This choice should be selected. MFA specifically requires two or more factors, making it more comprehensive than 2FA.

What does the abbreviation SQL stand for? 1. Structured Quality Language 2. Structured Query Language 3. Standard Query Language 4. Standard Quality Language

2. Structured Query Language Explanation: SQL stands for Structured Query Language

Popular applications used by today's organizations in web mining include Google Analytics, Data Miner, and ______. 1. Tanalytics 2. Tableau 3. Tab Miner 4. Tablet

2. Tableau Explanation: Popular applications used by today's organizations in web mining include Google Analytics, Data Miner, and Tableau.

How does VPN software ensure that people accessing a network are authorized to do so? 1. VPN software establishes secure connections. 2. VPN software authenticates users. 3. VPN software uses encryption to protect the users' credentials. 4. VPN software links blocks of transactions connected to the user.

2. VPN software authenticates users. Explanation: VPN software authenticates users who attempt to access the network before establishing a secure connection with the network.

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information? 1. personal area network (PAN) 2. wide area network (WAN)Correct 3. local area network (LAN) 4. World Wide Web (WWW)

2. Wide area network (WAN) Explanation: WANs connect a variety of devices between two or more geographic locations, enabling them to facilitate communication and the sharing of information between devices across cities, countries, and the globe.

What is a cybersecurity threat? 1. disruptions that may cause the loss of IT assets and that always result in the loss of assets 2. an event or condition that can lead to IT asset loss and the negative consequences of such loss 3. damage caused by intentional actions or events and by unintentional or accidental events 4. threats to the security of data and information and to the operation of software or hardware

2. an event or condition that can lead to IT asset loss and the negative consequences of such loss Explanation This is the National Institute of Standards and Technology's (NIST) definition of cybersecurity threats.

Spyware's basic function is to 1. attach itself to outgoing messages and texts 2. capture the user's account data, passwords, keystrokes, and more 3. direct the user to clickable ads and websites based on interaction 4. warn the user when a website or transaction is insecure.

2. capture the user's account data, passwords, keystrokes, and more Explanation Spyware targets confidential information, including account data, passwords, and keystrokes.

One surveillance technology that relies on how the user enters data is a 1. bot 2. keylogger 3. virus 4. rootkit

2. keylogger Explanation A keylogger monitors keyboard data input to capture private information.

Which threat to cybersecurity can only come from outside an organization? 1. responses to impersonation 2. ransomware 3. intentional attacks on systems and data 4. unnoticed erasure or corruption of data

2. ransomware Explanation Ransomware is malware that invades a computer or system from an external source and makes data inaccessible until the organization pays a ransom to the cybercriminals.

What does the acronym RDBMS stand for? 1. Referential Database Management Systems 2. Records of Database Management Systems 3. Relational Database Management Systems 4. Redundant Database Management Systems

3. Relational Database Management Systems Explanation RDBMS stands for Relational Database Management Systems

What is a primary responsibility of a CISO in relation to the information security team? 1. To reduce the team's operational costs regardless of the impact. 2. To provide technical support for the organization's IT infrastructure. 3. To lead the information security team ensuring alignment with the business's strategic direction. 4. To solely focus on the recruitment of new team members.

3. To lead the information security team ensuring alignment with the business's strategic direction. Explanation This choice should be selected. A CISO's primary responsibility regarding the information security team is to lead and ensure that their efforts align with the strategic direction of the business.

Using a Database Management System (DBMS) increases data security by using ________ so that only authorized users can access data. 1. storage fees 2. storage times 3. access rules 4. data

3. access rules Explanation A DBMS allows for the creation of access constraints so that only authorized users can access the data. Users are assigned a different set of access rules; this helps to protect data and users from identity theft, data leaks, and the misuse of data.

A ________ deliberately modifies the normal operations of a computer or network through the use of malicious code. 1. cyberintruder 2. cyberthreat 3. cyberattack 4. computer application

3. cyberattack Explanation A deliberate misuse of computers and networks, cyberattacks use malicious code to modify the normal operations of a computer or network.

Online Analytical Processing (OLAP) is included in many Business Intelligence (BI) software applications. We use this OLAP for a range of ________Blank discovery activities, including report creation and analysis, analytical calculations, forecasting, budgeting, planning, and what-if predicative analysis. 1. query 2. report 3. data 4. analyzed

3. data Explanation: Online Analytical Processing (OLAP) is included in many Business Intelligence (BI) software applications and is used for a variety of data discovery activities, including report creation and analysis, analytical calculations, forecasting, budgeting, planning, and what-if predicative analysis.

A dependent data mart is constructed from ________ warehouses and utilize a top-down approach where organizational data is stored in a centralized location. Specific data is extracted when an analysis is needed. 1. separate 2. assimilated 3. existing 4. integrated

3. existing Explanation A dependent data mart is constructed from existing data warehouses and utilize a top-down approach where organizational data is stored in a centralized location; then, specific data is extracted when analysis is needed.

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for _______ query language. 1. spreadsheet 2. simple 3. structured 4. share

3. structured Explanation This choice should be selected. Popular SQL programs include MYSQL, Microsoft SQL, and Oracle SQL.

What is the purpose of social engineering in conjunction with ransomware? 1. tricks victims' computers into sharing information 2. encrypts the victim's data 3. tricks victims into allowing access to data 4. uses computer code to access data

3. tricks victims into allowing access to data Explanation Often, ransomware attacks include built-in social engineering software that tricks the victim into extending administrative access to crucial data to the attacker

A database and a DBMS are different. A database is a collection of metadata, relationships, and ______. 1. Reports 2. Queries 3. Forms 4. Tables

4. Tables Explanation: A database is a collection of tables, relationships, and metadata.

What is one of the advantages of data visualization? 1. reduces interactivity 2. makes data less accessible 3. hides complex data 4. illustrates patterns in data

4. illustrates patterns in data

The main advantage of the IPv6 format for IP addresses is that 1. it is shorter and easier to remember than addresses in the IPv4 format. 2. it can be temporarily assigned by your Internet Service Provider (ISP). 3. it can be given a verbal name without using the Domain Name System (DNS). 4. it can accommodate many more addresses than the IPv4 format.

4. it can accommodate many more addresses than the IPv4 format. Explanation: The IPv6 format can accommodate at least 340 undecillion addresses, compared to the 4 billion addresses possible with IPv4.

A ______ is also known as a question. A request for information from a database. 1. form 2. table 3. report 4. query

4. query Explanation A query is a request for information from a table (or combination of tables) in a database.

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its 1. Hardware capabilities 2. remote operations 3. policy for human oversight 4. software

4. software Explanation The organization's vulnerability stems from its problematic software for automatic backups.

T/F A server is a group of two or more devices/computers that are connected to allow them to exchange information and share resources.

False - Explanation: A group of two or more devices/computers that are connected to allow for the exchange of information and the sharing of resources (such as printers, files, and servers) is called a network, not a server.

T/F: "White-hat testing" refers to paying hackers to hack into one's own private networks and applications.

False: Explanation This practice is referred to as penetration testing; the term "white-hat" describes the hackers who are paid to test the networks and applications.

T/F: Someone commits a cyberattack when they intentionally use malicious code to modify the normal operations of a computer or network via the Internet.

True Explanation A cyberattack is the deliberate misuse of computers and networks to modify their normal operations via the Internet and malicious code.

T/F All Internet-connected devices (routers, modems, etc.) have an Internet Protocol Address which identifies the device and allows it to communicate with the other devices on a computer network, including the Internet.

True Explanation An Internet Protocol (IP) address is a number that functions like the mailing address of an individual: all information technology devices (routers, modems, etc.) are assigned a unique IP address that allows them to receive information from other networked devices.

T/F: A data warehouse is a storehouse of data and information that organizations analyze to make informed business and operational decisions.

True Explanation: A data warehouse is a repository of data and information that organizations analyze to make informed business and operational decisions.

T/F: Middleware is software that provides processing capabilities outside what is offered by the user's operating system.

True Explanation: Middleware is software that supplies processing capabilities outside what is offered by the user's operating system. This allows for the processing of data in parallel, which leads to enhanced data processes and access speeds.

T/F: Collaboration software allows for the creation of a dedicated workspace where users can add data and workflows, thus enhancing the productivity of teams and organizations.

True Explanation: The dedicated workspace is viewable and editable in real time, enabling employees to work collaboratively and productively with up-to-date information from team members.

T/F: The Four Vs of big data include Volume: Scale of Data, Variety: Different forms of data, Veracity: Uncertainty of data, and Velocity: Analysis of streaming data.

True Explanation: The Four Vs of big data include volume, variety, veracity, and velocity.

T/F: The term "Web 2.0" refers to the second-generation Internet, which is based on interactivity and dynamic content and includes content shared online via social media.

True Explanation: Web 2.0 provides many of the services and interactive features used in social media, unlike the earlier version of the internet.

A _______ is a collection of related fields in a data file.

record


संबंधित स्टडी सेट्स

Absolute Value, Classifying Numbers, Adding Integers

View Set

Business Ethics Chapter 04: Video Case - Sarbanes-Oxley

View Set