info@avatto.com
+91-9920808017
41. Using computers to steal money, service software or data is called
computer crime
computer laws
software piracy
hacking
Your email address will not be published. Required fields are marked *
Report
Name
Email
Website
Save my name, email, and website in this browser for the next time I comment.
Comment
42. Designing computer hardware, software, and work stations that are safe,comfortable and easy to use is called
responsible end user
ergonomics
flaming
computer virus
43. Which among the following outline a business vision, business/IT strategies, and technical architecture for the information systems functions
operational for planning
tactical systems planning
strategic systems planning
organization planning
44. A management steering committee is an example of
management involvement
information systems performance
five dimensions of IRM
information resource management
45. Managing systems analysis and design, computer programme and systems maintenance activities are called
end user services
information services functions
chief information officer
system development management
Login with Facebook
Login with Google
Forgot your password?
Lost your password? Please enter your email address. You will receive mail with link to set new password.
Back to login