Exam 10: Ethical Implications of Information Technology
Exam 1: Introduction to Information Systems78 Questions
Exam 2: Information Systems for Competitive Advantage80 Questions
Exam 3: Using Information Technology to Engage in Electronic Commerce78 Questions
Exam 4: System Users and Developers80 Questions
Exam 5: Computing and Communications Resources80 Questions
Exam 6: Database Management Systems79 Questions
Exam 7: Systems Development80 Questions
Exam 8: Information in Action80 Questions
Exam 9: Information Security80 Questions
Exam 10: Ethical Implications of Information Technology80 Questions
Exam 11: Decision Support Systems79 Questions
Exam 12: Everyday Technology Skills20 Questions
Exam 13: Web/HTML Project Using Microsoft FrontPage20 Questions
Exam 14: Web/HTML Project Using Notepad20 Questions
Exam 15: Web/HTML Student Survey20 Questions
Exam 16: Web/HTML Book Purchase20 Questions
Exam 17: Spreadsheet Basics20 Questions
Exam 18: Spreadsheets with Data Capture - Vacation Choice20 Questions
Exam 19: Spreadsheets with Data Capture - Movie Ticket Purchase20 Questions
Exam 20: Database Forms and Reports20 Questions
Exam 21: Database Queries - Customer Database20 Questions
Exam 22: Database Queries - Inventory Database20 Questions
Exam 23: Reports Based on Queries20 Questions
Select questions type
A _____________ is the same as an operational audit except that this type is ongoing.
(Essay)
4.7/5
(32)
In an ethics audit, an internal auditor meets with a manager in a several- hour session to learn how the manager's unit is carrying out the corporate credo.
(True/False)
4.8/5
(31)
The act that made it a federal felony for someone to gain unauthorized access to information pertaining to national defense or foreign relations was the:
(Multiple Choice)
4.8/5
(34)
Which of the following is not one of Mason's categories of PAPA?
(Multiple Choice)
4.8/5
(35)
In the corporate credo for Security Pacific Corporation, who is the first commitment to?
(Multiple Choice)
4.8/5
(39)
James Moor has defined computer ethics as the analysis of the nature and social impact of computer technology, as well as the corresponding formulation and justification of policies for the ethical use of such technology.
(True/False)
4.8/5
(28)
Which of the following is not a major area of expectation according to the ACM Software Engineering Code of Ethics and Professional Practice?
(Multiple Choice)
4.8/5
(37)
___________are formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens.
(Essay)
4.8/5
(32)
Mason coined the acronym___________ to represent society's four basic rights in terms of information: privacy, accuracy, property, and accessibility.
(Essay)
4.9/5
(33)
Software that is illegally copied and then used or sold is referred to as pirated.
(True/False)
4.7/5
(37)
The ability to program the computer to do practically anything you want it to do is called:
(Multiple Choice)
4.8/5
(38)
Under which program heading should the CIO initiate projects to review transaction processing systems and financial information systems to ensure that they are operating at maximum effectiveness?
(Multiple Choice)
4.8/5
(28)
Which type of auditing activity verifies the accuracy of the firm's records and is the type of activity performed by external auditors?
(Multiple Choice)
4.8/5
(32)
The Software Engineering Code of Ethics and Professional Practice deals with responsibility to constituents, professional performance, and self- improvement.
(True/False)
4.8/5
(25)
Which opportunity for invisible programming exists because of intentional programming acts that cross legal as well as ethical boundaries?
(Multiple Choice)
4.8/5
(32)
Under which program heading should the CIO work with the stockholder relations department to identify the information to be included in stockholder reports?
(Multiple Choice)
4.9/5
(30)
The mostly widely publicized classification of human rights in the computer area is Richard O. Mason's___________ .
(Essay)
4.7/5
(40)
Richard Mason believes "the right to be let alone" is being threatened.
(True/False)
4.8/5
(37)
Formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens are:
(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)