MIS 309: Unit 3 Quiz Questions
Use the correct HTML to make the text below into a link to "default.html" <______ _______>Visit our HTML tutorial<______>
<a href="default.html">Visit our HTML tutorial</a>
Use the correct HTML to make the text below into a link to "default.html" <__________ _________>Visit our HTML tutorial<________>
<a href="default.html">Visit our HTML tutorial</a>
What is the correct HTML for creating a hyperlink?
<a href="https://www.olemiss.edu">Some Text</a>
What is the correct HTML element for inserting a line break?
<br>
The HTML document type declaration is the first line of code required in every HTML or XHTML document. What is the appropriate tag for it?
<doctype HTML>
What is the correct HTML element for the largest heading?
<h1>
Clean up this document with proper end tags <h1>This is a Heading<_____> <p>This is a paragraph<_____>
<h1>This is a Heading</h1> <p>This is a paragraph</p>
The HTML element title tags go inside what tag?
<head></head>
Add the correct HTML attribute to display the "smiley.gif" image <img_______/>
<img src="smiley.gif" />
Insert the correct property to make the text color violet <p style="_______: violet">This is a paragraph </p>
<p style="color: violet">This is a paragraph</p>
Choose the correct HTML element bold text
<strong>
The two table headers should have the value "Name" and "Age". Complete the empty <> tags <table> __________ _________ _________ __________ <tr> <td>Jill Smith</td> <td>50</td> </tr> </table>
<tr> <th>Name</th> <th>Age</th> </tr>
Which of the following is most likely to be a result of hacking?
An unauthorized transaction from a user's credit card
Strong tag is used to make the test
Bold
A______manages security for the organization's information systems and information
Chief information security officer
A________manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital
Chief security officer
The first step in the system definition phase of the systems development life cycle (SDLC) is to_______
Define the goals and scope
T or F: A steering committee is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities
True
T or F: Biometric authentication uses physical characteristics such as retinal scans to authenticate users
True
T or F: Email spoofing is a synonym for phishing
True
T or F: HTML tags start with < and ends with >
True
T or F: In general, the more technical the organization the more open and lenient the social policies
True
T or F: Organizations have social capital
True
T or F: Phishing is a technique for obtaining unauthorized data that uses pretexting via email
True
T or F: Recruiters who notice poor grammar on social media sites tend to have a negative view of potential candidate
True
T or F: Social capital can be earned and spent
True
T or F: Social media allows people to form communities
True
T or F: Symmetric encryption is simpler and much faster than asymmetric encryption
True
T or F: Systems analytics facilitate the work of programmers, testers, and users
True
T orF: The general belief of social media providers is that the users wouldn't mind the "small" loss of privacy if they got the service for free
True
The img tag has the following attribute that points to the location and file name of an image
src
Use the correct CSS border values to create a solid black 3 pixels border on a table element table, th, td { border:_______; }
table, th, td { border: 3px solid black; }
What does HTML stand for?
Hypertext Markup Language
Heading 6 or <h6> is the
Smallest heading in HTML
Tasks in the_______phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system
System implementation
A______works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans
Systems analysis
The first phase of the systems development life cycle (SDLC) is_________
Defining the system
T or F: A bounce rate is the percentage of people who visit your Web site and then purchase a product
False
T or F: An organization can be a social media provider but not a social media user
False
T or F: Business literature defines four types of capital
False
T or F: Human error cannot cause unathorized data disclosure
False
T or F: Mobile users click ads less often than PC users
False
All of the following are sources of threats except
Firewalls
Which of the following is considered a computer crime?
Hacking of information systems
_______is a broad category of software that includes viruses, spyware, and adware
Malware
A______monitors, maintains, fixes, and tunes computer networks
Network administrator
Email spoofing is a synonym for______
Phishing
