Exam 14: The Personal and Social Impact of Computers
Exam 1: An Introduction to Information Systems85 Questions
Exam 2: Information Systems in Organizations85 Questions
Exam 3: Hardware: Input, Processing, Output, and Storage Devices85 Questions
Exam 4: Software: Systems and Application Software85 Questions
Exam 5: Database Systems and Applications85 Questions
Exam 6: Telecommunications and Networks85 Questions
Exam 7: The Internet, Web, Intranets, and Extranets85 Questions
Exam 8: Electronic and Mobile Commerce85 Questions
Exam 9: Enterprise Systems85 Questions
Exam 10: Information and Decision Support Systems85 Questions
Exam 11: Knowledge Management and Specialized Information Systems85 Questions
Exam 12: Systems Development85 Questions
Exam 13: Systems Development: Construction, Integration and Testing, Implementation, Operation an85 Questions
Exam 14: The Personal and Social Impact of Computers85 Questions
Select questions type
Some web sites offer digital tools-often without charge-that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.
Free
(True/False)
4.8/5
(26)
Correct Answer:
True
Incidents of identity theft are reported to the Federal Trade Commission (FTC).
Free
(True/False)
5.0/5
(34)
Correct Answer:
True
Only few small and mid-sized organizations are willing to outsource their network security operations.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
(True/False)
4.8/5
(39)
Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.
(True/False)
4.7/5
(37)
Outline six useful policies to minimize computer-related waste and mistakes.
(Essay)
4.9/5
(40)
The act of going through the trash of an organization to find secret or confidential information, including information needed to access an information system or its data is known as _____.
(Short Answer)
4.7/5
(35)
A useful guideline to protect corporate computers from criminal hackers is to _____.
(Multiple Choice)
4.9/5
(31)
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
(True/False)
4.9/5
(35)
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
(True/False)
4.8/5
(30)
_____ is the act of unauthorized copying, downloading, sharing, selling, or installing of software.
(Short Answer)
4.8/5
(34)
Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.
(True/False)
4.7/5
(36)
A(n) _____ is a malicious program that disguises itself as a useful application or game and purposefully does something a user does not expect.
(Short Answer)
4.9/5
(25)
_____ is a set of programs that enables its user to gain administrator level access to a computer or network.
(Multiple Choice)
4.7/5
(34)
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
(Short Answer)
4.8/5
(36)
Role-based system access means that only people who fill a particular role can access a specific system.
(True/False)
4.8/5
(32)
A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.
(Multiple Choice)
4.8/5
(29)
A job that requires sitting at a desk and using a computer for many hours a day can lead to:
(Multiple Choice)
4.7/5
(41)
Showing 1 - 20 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)