Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business146 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware160 Questions
Exam 4: Computer Software139 Questions
Exam 5: Data Resource Management119 Questions
Exam 6: Telecommunications and Networks126 Questions
Exam 7: Electronic Business Systems112 Questions
Exam 8: Enterprise Business Systems105 Questions
Exam 9: Electronic Commerce Systems111 Questions
Exam 10: Decision Support Systems123 Questions
Exam 11: Developing Businessit Strategies125 Questions
Exam 12: Developing Businessit Solutions145 Questions
Exam 13: Security and Ethical Challenges119 Questions
Exam 14: Enterprise and Global Management of Information Technology124 Questions
Select questions type
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.
(Multiple Choice)
4.8/5
(34)
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
(True/False)
4.7/5
(35)
________________ is a special class of adware that collects specific information about you, ranging from general demographics to credit card and social security numbers, using the user's Internet connection in the background without his/her knowledge or explicit permission.
(Short Answer)
4.8/5
(41)
The text describes ________________ as the indiscriminate sending of unsolicited e-mail messages to many Internet users.
(Short Answer)
4.7/5
(32)
All of the following are AITP standards of professional conduct related to a person's obligation to society except:
(Multiple Choice)
4.8/5
(43)
Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.
(Multiple Choice)
4.7/5
(33)
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
(True/False)
4.9/5
(36)
Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.
(True/False)
4.8/5
(27)
According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?
(Multiple Choice)
4.9/5
(36)
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.
(Multiple Choice)
4.8/5
(30)
According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.
(Multiple Choice)
4.8/5
(40)
Sifting through a company's garbage looking for information to help break into the company's computers; sometimes used in conjunction with social engineering is called:
(Multiple Choice)
4.8/5
(32)
Computer monitoring has been criticized as unethical because:
(Multiple Choice)
4.9/5
(33)
According to the text case, __________ of people have stolen key information from work.
(Short Answer)
4.7/5
(30)
Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:
(Multiple Choice)
4.9/5
(51)
When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.
(Multiple Choice)
5.0/5
(38)
Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.
(True/False)
4.8/5
(43)
Information technologies have caused a significant reduction in the following types of job opportunities, except:
(Multiple Choice)
4.9/5
(29)
According to the text, all the following are examples of ethical behavior by organizations, except:
(Multiple Choice)
4.9/5
(39)
Showing 61 - 80 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)