Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The goal of ergonomics is to design:

Free
(Multiple Choice)
4.7/5
(48)
Correct Answer:
Verified

C

Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
Verified

A

These days, corporate antivirus protection is a centralized function of information technology.

(True/False)
4.8/5
(36)

In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).

(True/False)
4.9/5
(28)

As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:

(Multiple Choice)
4.8/5
(40)

According to the textbook, the unauthorized use of computer systems and networks can be called time and ________________ theft.

(Short Answer)
4.9/5
(39)

The use of information technology in the workplace raises a variety of health issues. For example, some computer users suffer from ________________ syndrome, a painful, crippling ailment of the hand and wrist that can require surgery to cure.

(Short Answer)
4.9/5
(29)

Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.

(True/False)
4.9/5
(30)

As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.

(True/False)
4.9/5
(34)

Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

(True/False)
4.8/5
(43)

The stakeholder theory maintains that:

(Multiple Choice)
4.7/5
(44)

A malicious applet is an instruction in a computer program that triggers a malicious act.

(True/False)
4.9/5
(41)

Cyber crime is becoming one of the Net's growth businesses.

(True/False)
4.8/5
(36)

The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.

(Multiple Choice)
4.8/5
(46)

The most widely used encryption method uses a pair of public and private keys unique to each individual.

(True/False)
4.9/5
(32)

End users should regularly use ________________ programs that locate and remove computer viruses from infected files on their hard disk.

(Short Answer)
4.8/5
(36)

Many times, an electronic audit trail takes the form of _______________ that automatically record all computer network activity on magnetic disk or tape devices.

(Short Answer)
4.8/5
(39)

Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.

(True/False)
4.8/5
(43)

The text describes ________________ as the practice of sending extremely critical, derogatory, and often-vulgar E-mail messages or electronic bulletin board postings to other users on the Internet or online services.

(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)