Exam 10: Ethical Implications of Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

___________is software that is illegally copied and then used or sold.

(Essay)
4.8/5
(38)

A problem in the People's Republic of China is that the term "privacy" often has a negative connotation, being associated with someone who has something to hide.

(True/False)
4.8/5
(31)

Software vendors can guard against theft of their intellectual property by means of copyrights, patents, and license agreements.

(True/False)
4.7/5
(30)

Regarding information auditing, who reports to the CEO or the CFO?

(Multiple Choice)
4.8/5
(41)

The right to be left alone falls under which category of Mason's PAPA?

(Multiple Choice)
5.0/5
(34)

An effort consisting of multiple activities designed to provide employees with direction in carrying out the corporate credo is referred to as an:

(Multiple Choice)
4.9/5
(31)

Which of the following laws was passed in the 1970s dealing with the handling of credit data?

(Multiple Choice)
4.9/5
(31)

One of SOX provisions is that CEOs and CFOs must certify the financial reports.

(True/False)
4.9/5
(33)

An audit committee defines the responsibilities of the internal auditing department and receives many of the audit reports.

(True/False)
4.7/5
(28)

The auditing activity that involves the internal auditors in system development is:

(Multiple Choice)
4.8/5
(34)

The reason behind society's high level of interest in computer ethics is that all of the computer's internal operations are hidden from view is referred to as:

(Multiple Choice)
4.8/5
(34)

Which part of the ACM Code of Ethics and Professional Conduct deals with moral behavior and issues that are currently receiving legal attention?

(Multiple Choice)
4.9/5
(42)

The first person charged with committing a computer crime was a programmer who put a patch in a program so that it would not flag his bank account as being overdrawn.

(True/False)
4.8/5
(36)

Internal auditors should participate in systems development because they can offer expertise that can improve the quality of the system.

(True/False)
4.9/5
(37)

James Moor believes that the two main reasons for society's high level of interest in computer ethics are logical malleability and the invisibility factor.

(True/False)
4.8/5
(34)

The Association for Computing Machinery is the oldest professional computer organization in the world.

(True/False)
4.9/5
(38)

What does the acronym PAPA refer to?

(Essay)
4.8/5
(40)

As of August 11, 2002, CEOs, CFOs, and CIOs are required to sign off on the accuracy of their financial statements.

(True/False)
4.8/5
(37)

Morals are a social institution with a history and a list of rules.

(True/False)
4.9/5
(34)

The Electronic Communications Privacy Act of 1968 covered voice, digital, data, and video communications, as well as electronic mail.

(True/False)
4.7/5
(37)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)