info@avatto.com
+91-9920808017
36. Information systems that cross the boundaries of functional business areas in order to support the business processes across the organization. The best fit will be
eross-functional information system
business information system
knowledge management system
expert systems
Your email address will not be published. Required fields are marked *
Report
Name
Email
Website
Save my name, email, and website in this browser for the next time I comment.
Comment
37. Software that can control access and use a computer system is
system security monitor
software piracy
facility controls
fault tolerant
38. A computer system that serves as a filter for access to and from other networks by a company's networked computers are
controls for end user computing
audit trade
auditing information systems
firewall
39. Scrambling data during its transmission for
encryption
control totals
disaster recovery
biometric controls
40. Examples include egoism, natural law, utilitarianism and respect for persons. These examples belong to which of the following?
security codes
network security
ethical philosophies
ethical models
Login with Facebook
Login with Google
Forgot your password?
Lost your password? Please enter your email address. You will receive mail with link to set new password.
Back to login