Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business146 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware160 Questions
Exam 4: Computer Software139 Questions
Exam 5: Data Resource Management119 Questions
Exam 6: Telecommunications and Networks126 Questions
Exam 7: Electronic Business Systems112 Questions
Exam 8: Enterprise Business Systems105 Questions
Exam 9: Electronic Commerce Systems111 Questions
Exam 10: Decision Support Systems123 Questions
Exam 11: Developing Businessit Strategies125 Questions
Exam 12: Developing Businessit Solutions145 Questions
Exam 13: Security and Ethical Challenges119 Questions
Exam 14: Enterprise and Global Management of Information Technology124 Questions
Select questions type
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
A
_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
A
These days, corporate antivirus protection is a centralized function of information technology.
(True/False)
4.8/5
(36)
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
(True/False)
4.9/5
(28)
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
(Multiple Choice)
4.8/5
(40)
According to the textbook, the unauthorized use of computer systems and networks can be called time and ________________ theft.
(Short Answer)
4.9/5
(39)
The use of information technology in the workplace raises a variety of health issues. For example, some computer users suffer from ________________ syndrome, a painful, crippling ailment of the hand and wrist that can require surgery to cure.
(Short Answer)
4.9/5
(29)
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
(True/False)
4.9/5
(30)
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
(True/False)
4.9/5
(34)
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
(True/False)
4.8/5
(43)
A malicious applet is an instruction in a computer program that triggers a malicious act.
(True/False)
4.9/5
(41)
The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.
(Multiple Choice)
4.8/5
(46)
The most widely used encryption method uses a pair of public and private keys unique to each individual.
(True/False)
4.9/5
(32)
End users should regularly use ________________ programs that locate and remove computer viruses from infected files on their hard disk.
(Short Answer)
4.8/5
(36)
Many times, an electronic audit trail takes the form of _______________ that automatically record all computer network activity on magnetic disk or tape devices.
(Short Answer)
4.8/5
(39)
Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
(True/False)
4.8/5
(43)
The text describes ________________ as the practice of sending extremely critical, derogatory, and often-vulgar E-mail messages or electronic bulletin board postings to other users on the Internet or online services.
(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)