MIS 309: Unit 3 Quiz Questions

Ace your homework & exams now with Quizwiz!

Use the correct HTML to make the text below into a link to "default.html" <______ _______>Visit our HTML tutorial<______>

<a href="default.html">Visit our HTML tutorial</a>

Use the correct HTML to make the text below into a link to "default.html" <__________ _________>Visit our HTML tutorial<________>

<a href="default.html">Visit our HTML tutorial</a>

What is the correct HTML for creating a hyperlink?

<a href="https://www.olemiss.edu">Some Text</a>

What is the correct HTML element for inserting a line break?

<br>

The HTML document type declaration is the first line of code required in every HTML or XHTML document. What is the appropriate tag for it?

<doctype HTML>

What is the correct HTML element for the largest heading?

<h1>

Clean up this document with proper end tags <h1>This is a Heading<_____> <p>This is a paragraph<_____>

<h1>This is a Heading</h1> <p>This is a paragraph</p>

The HTML element title tags go inside what tag?

<head></head>

Add the correct HTML attribute to display the "smiley.gif" image <img_______/>

<img src="smiley.gif" />

Insert the correct property to make the text color violet <p style="_______: violet">This is a paragraph </p>

<p style="color: violet">This is a paragraph</p>

Choose the correct HTML element bold text

<strong>

The two table headers should have the value "Name" and "Age". Complete the empty <> tags <table> __________ _________ _________ __________ <tr> <td>Jill Smith</td> <td>50</td> </tr> </table>

<tr> <th>Name</th> <th>Age</th> </tr>

Which of the following is most likely to be a result of hacking?

An unauthorized transaction from a user's credit card

Strong tag is used to make the test

Bold

A______manages security for the organization's information systems and information

Chief information security officer

A________manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital

Chief security officer

The first step in the system definition phase of the systems development life cycle (SDLC) is to_______

Define the goals and scope

T or F: A steering committee is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities

True

T or F: Biometric authentication uses physical characteristics such as retinal scans to authenticate users

True

T or F: Email spoofing is a synonym for phishing

True

T or F: HTML tags start with < and ends with >

True

T or F: In general, the more technical the organization the more open and lenient the social policies

True

T or F: Organizations have social capital

True

T or F: Phishing is a technique for obtaining unauthorized data that uses pretexting via email

True

T or F: Recruiters who notice poor grammar on social media sites tend to have a negative view of potential candidate

True

T or F: Social capital can be earned and spent

True

T or F: Social media allows people to form communities

True

T or F: Symmetric encryption is simpler and much faster than asymmetric encryption

True

T or F: Systems analytics facilitate the work of programmers, testers, and users

True

T orF: The general belief of social media providers is that the users wouldn't mind the "small" loss of privacy if they got the service for free

True

The img tag has the following attribute that points to the location and file name of an image

src

Use the correct CSS border values to create a solid black 3 pixels border on a table element table, th, td { border:_______; }

table, th, td { border: 3px solid black; }

What does HTML stand for?

Hypertext Markup Language

Heading 6 or <h6> is the

Smallest heading in HTML

Tasks in the_______phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system

System implementation

A______works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans

Systems analysis

The first phase of the systems development life cycle (SDLC) is_________

Defining the system

T or F: A bounce rate is the percentage of people who visit your Web site and then purchase a product

False

T or F: An organization can be a social media provider but not a social media user

False

T or F: Business literature defines four types of capital

False

T or F: Human error cannot cause unathorized data disclosure

False

T or F: Mobile users click ads less often than PC users

False

All of the following are sources of threats except

Firewalls

Which of the following is considered a computer crime?

Hacking of information systems

_______is a broad category of software that includes viruses, spyware, and adware

Malware

A______monitors, maintains, fixes, and tunes computer networks

Network administrator

Email spoofing is a synonym for______

Phishing


Related study sets

Chapter 3 Doing Business in Global Markets

View Set

MGMT 490 chapter 6 Support the Business level strategy : Competitive and cooperative Moves

View Set

Rallye 1 - Liste de vocabulaire 1: je retiens! + Mes mots à moi (C. p. 21 + 22)

View Set

Chapter 40: Nursing Care of the Child With an Alteration in Gas Exchange/Respiratory Disorder

View Set