Exam 12: Regulating and Managing Information Technology
Exam 1: The Corporation and Its Stakeholders52 Questions
Exam 2: Managing Public Issues and Stakeholder Relationships52 Questions
Exam 3: Corporate Social Responsibility and Citizenship52 Questions
Exam 4: Business in a Globalized World52 Questions
Exam 5: Ethics and Ethical Reasoning52 Questions
Exam 6: Organizational Ethics52 Questions
Exam 7: Businessgovernment Relations52 Questions
Exam 8: Influencing the Political Environment52 Questions
Exam 9: Sustainable Development and Global Business52 Questions
Exam 10: Managing for Sustainability52 Questions
Exam 11: The Role of Technology52 Questions
Exam 12: Regulating and Managing Information Technology52 Questions
Exam 14: Consumer Protection52 Questions
Exam 15: Employees and the Corporation52 Questions
Exam 16: Managing a Diverse Workforce52 Questions
Exam 17: Business and Its Suppliers52 Questions
Exam 18: The Community and the Corporation52 Questions
Exam 19: The Public and Corporate Reputation52 Questions
Select questions type
Creating and distributing viruses on other computers is called hacking.
(True/False)
4.9/5
(34)
Why is the management and regulation of information technology a challenge for governments and businesses? What are some advantages of the two entities working together?
(Short Answer)
4.8/5
(35)
How is the corporate Chief Information Officer (CIO)a "security guard" for the organization? What are some of the important responsibilities of the CIO?
(Essay)
4.8/5
(26)
Discuss the global impact of cybercrime and explain how some international and national groups are fighting it.
(Essay)
5.0/5
(40)
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:
(Multiple Choice)
4.9/5
(32)
The U.S.government strictly controls the use of GPS and similar tracking devices at the federal level.
(True/False)
5.0/5
(37)
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:
(Multiple Choice)
4.8/5
(30)
Which of these statements is (are)true about the group known as Anonymous?
(Multiple Choice)
4.8/5
(32)
Software piracy is a major problem in which part of the world?
(Multiple Choice)
4.9/5
(30)
Which website received a favorable review because they limited the ability of hackers to take advantage of one another?
(Multiple Choice)
4.8/5
(32)
The U.S.PRISM program was designed primarily to protect public privacy.
(True/False)
4.9/5
(29)
Many authoritarian governments have expanded Internet censorship in recent years.
(True/False)
4.8/5
(47)
Which country recently required all video-streaming sites to be approved by the government or risk having their content banned?
(Multiple Choice)
4.9/5
(27)
In 2014,a Ponemon Institute study reported that businesses took an average of 60 days to recover from a cyberattack.
(True/False)
4.9/5
(28)
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.
(True/False)
4.8/5
(27)
Which of these statements accurately describe hacktivists known as grey hatters?
(Multiple Choice)
4.8/5
(32)
Hackers who intend to profit from their actions are motived by:
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)