Exam 10: Ethical Implications of Information Technology
Exam 1: Introduction to Information Systems78 Questions
Exam 2: Information Systems for Competitive Advantage80 Questions
Exam 3: Using Information Technology to Engage in Electronic Commerce78 Questions
Exam 4: System Users and Developers80 Questions
Exam 5: Computing and Communications Resources80 Questions
Exam 6: Database Management Systems79 Questions
Exam 7: Systems Development80 Questions
Exam 8: Information in Action80 Questions
Exam 9: Information Security80 Questions
Exam 10: Ethical Implications of Information Technology80 Questions
Exam 11: Decision Support Systems79 Questions
Exam 12: Everyday Technology Skills20 Questions
Exam 13: Web/HTML Project Using Microsoft FrontPage20 Questions
Exam 14: Web/HTML Project Using Notepad20 Questions
Exam 15: Web/HTML Student Survey20 Questions
Exam 16: Web/HTML Book Purchase20 Questions
Exam 17: Spreadsheet Basics20 Questions
Exam 18: Spreadsheets with Data Capture - Vacation Choice20 Questions
Exam 19: Spreadsheets with Data Capture - Movie Ticket Purchase20 Questions
Exam 20: Database Forms and Reports20 Questions
Exam 21: Database Queries - Customer Database20 Questions
Exam 22: Database Queries - Inventory Database20 Questions
Exam 23: Reports Based on Queries20 Questions
Select questions type
A succinct statement of the values that the firm seeks to uphold is referred to as a(n):
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
C
A concurrent audit is the same as a financial audit except that the concurrent audit is ongoing.
Free
(True/False)
4.8/5
(42)
Correct Answer:
False
A___________ verifies the accuracy of the firm's records and is the type of activity performed by external auditors.
Free
(Essay)
4.7/5
(29)
Correct Answer:
financial audit
An ____________ is not conducted to verify the accuracy of records, but rather to validate the effectiveness of procedures.
(Essay)
4.9/5
(37)
___________deal with moral behavior and issues that are currently receiving legal attention.
(Essay)
4.9/5
(37)
In an AMA 2002 Corporate Values Survey, what percent of the respondents' firms adhered to ethical and integrity guidelines only part of the time?
(Multiple Choice)
4.8/5
(28)
___________includes intentional acts that cross legal as well as ethical boundaries.
(Essay)
4.8/5
(40)
Morals are a suite of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people.
(True/False)
4.8/5
(32)
The analysis of the nature and social impact of computer technology as well as the corresponding formulation and justification of policies for the ethical use of such technology is referred to as:
(Multiple Choice)
4.9/5
(33)
What are the three reasons for the importance of computer ethics as posed by James Moor?
(Essay)
4.8/5
(37)
___________take the form of programs that are so complex that users do not understand them.
(Essay)
4.8/5
(32)
The Counterfeit Access Device and Computer Fraud and Abuse Act made it a federal felony for someone to gain unauthorized access to information pertaining to national defense or foreign relations.
(True/False)
4.9/5
(29)
An___________ is an effort consisting of multiple activities designed to provide employees with direction in carrying out the corporate credo.
(Essay)
4.8/5
(44)
The ___________manages the internal auditing department and usually reports to the CEO or the CFO.
(Essay)
4.9/5
(36)
A ____________ is a succinct statement of the values that the firm seeks to uphold.
(Essay)
4.9/5
(31)
When top- level management imposes the ethics culture in a top- down manner, which step comes first?
(Multiple Choice)
4.8/5
(27)
Invisible programming values are those routines that the programmer intentionally codes into the program that do not produce the processing that the user desires.
(True/False)
4.8/5
(32)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)