Reference no: EM132230794
1. Which of the following involves collecting and maintaining data in such a way that the information can be used as evidence in a court of? law?
A. Data warehousing
B. Computer analysis
C. Business intelligence
D. Business analytics
E. Computer forensics
2. Which law provides rules related to the creation of financial statements to help avoid? fraud?
A. Public Company Accounting Reform and Investor Protection Act
B. ?Gramm-Leach-Bliley Act
C. Federal Information Protection Act
D. ?Sarbanes-Oxley Act
E. HIPAA
3. A project network has been completed including the Early Start, Early Finish, Late Start and Late Finish times for all activities. The critical path has been identified. If there are no constraints as to when the project must be completed, the critical activities on the critical path will have _______ slack.
zero
zero or negative
negative
not enough information given
4. Regulations promulgated by the Federal Communications Commission, once finalized, are eventually compiled in the __________.
a. United States Reports b. Code of Federal Regulations c. United States Code d. Statutes-at-Large
5. In addition to developing a policy for restoring computer and communication? services, some companies go a step further with? _____, which focuses on how to get the business operations up and running again after a disaster.
A. a hot site
B. business continuity planning
C. disaster recovery planning
D. an information system audit
E. a mirror serve