Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business146 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware160 Questions
Exam 4: Computer Software139 Questions
Exam 5: Data Resource Management119 Questions
Exam 6: Telecommunications and Networks126 Questions
Exam 7: Electronic Business Systems112 Questions
Exam 8: Enterprise Business Systems105 Questions
Exam 9: Electronic Commerce Systems111 Questions
Exam 10: Decision Support Systems123 Questions
Exam 11: Developing Businessit Strategies125 Questions
Exam 12: Developing Businessit Solutions145 Questions
Exam 13: Security and Ethical Challenges119 Questions
Exam 14: Enterprise and Global Management of Information Technology124 Questions
Select questions type
Which of the following best describes the ethical principle of informed consent?
(Multiple Choice)
4.8/5
(40)
________________ is described as the process of scrambling data or converting it, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients.
(Short Answer)
4.8/5
(41)
The use of information technologies is causing a significant reduction in some types of job opportunities.
(True/False)
4.9/5
(34)
Most companies don't reveal that they have been targets or victims of computer crime.
(True/False)
4.8/5
(34)
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:
(Multiple Choice)
4.8/5
(38)
Laws intended to regulate activities over the Internet or via the use of electronic data communications are collectively referred to as ________________ law.
(Short Answer)
4.9/5
(37)
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.
(True/False)
4.8/5
(38)
The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.
(Multiple Choice)
4.7/5
(33)
One way hackers gain access to a company's information to help break into their computers is by sifting through a company's garbage. This is referred to as ________________.
(Short Answer)
4.7/5
(37)
The documentation that allows a transaction to be traced through all stages of information processing is called an ________________ trail.
(Short Answer)
4.8/5
(37)
The text defines ________________ as the science and technology emphasizing the safety, comfort, and ease of use of human-operated machines, such as computers. It is also called human factors engineering.
(Short Answer)
5.0/5
(40)
Security monitors can control the use of all the following except:
(Multiple Choice)
4.9/5
(31)
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
(True/False)
4.9/5
(37)
Computer ________________ is defined in the text as the act of using computers to monitor the behavior and productivity of workers on the job and in the workplace.
(Short Answer)
4.8/5
(39)
According to the Real World case, which of the following is not a sensitive type of information that firms watch for when examining data leaving the organization?
(Multiple Choice)
4.8/5
(41)
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in, gigabytes out (GIGO) syndrome.
(True/False)
4.8/5
(34)
According to the text, companies are protecting themselves from computer crime by using:
(Multiple Choice)
4.9/5
(46)
According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.
(True/False)
4.7/5
(32)
The music industry reports that illegal downloading of music and videos is a growing problem.
(True/False)
4.9/5
(42)
Showing 81 - 100 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)