Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

(Multiple Choice)
4.8/5
(26)

What is spyware?

(Multiple Choice)
5.0/5
(41)

What is adware?

(Multiple Choice)
5.0/5
(42)

What is drive-by hacking?

(Multiple Choice)
4.8/5
(46)

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

(True/False)
4.9/5
(30)

As the president of a local trade company, Lisa is faced with leadership, ethical, and operational decisions on a daily basis. Lisa's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Lisa overseeing for the company?

(Multiple Choice)
4.9/5
(33)

What is information security?

(Multiple Choice)
4.9/5
(32)

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

(True/False)
4.9/5
(39)

What is malware?

(Multiple Choice)
4.8/5
(36)

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________.

(Multiple Choice)
4.8/5
(37)

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

(Multiple Choice)
4.8/5
(32)

Who are hackers with criminal intent?

(Multiple Choice)
4.8/5
(30)

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

(Multiple Choice)
5.0/5
(34)

A worm spreads itself not only from file to file but also from computer to computer.

(True/False)
4.9/5
(45)

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

(Multiple Choice)
4.9/5
(40)

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?

(Multiple Choice)
4.9/5
(33)

Ethics and security are two fundamental building blocks for all organizations.

(True/False)
4.8/5
(39)

Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

(True/False)
4.9/5
(39)

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?

(Multiple Choice)
4.8/5
(38)

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

(True/False)
4.8/5
(35)
Showing 41 - 60 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)