Exam 27: Ethics
Exam 1: Business Driven Technology78 Questions
Exam 2: Identifying Competitive Advantages114 Questions
Exam 3: Strategic Initiatives for Implementing Competitive Advantages53 Questions
Exam 4: Measuring the Success of Strategic Initiatives44 Questions
Exam 5: Organizational Structures That Support Strategic Initiatives34 Questions
Exam 6: Valuing Organizational Information36 Questions
Exam 7: Storing Organizational Information-Databases45 Questions
Exam 8: Accessing Organizational Information-Data Warehouse46 Questions
Exam 9: Enabling the Organization-Decision Making39 Questions
Exam 10: Extending the Organization-Supply Chain Management19 Questions
Exam 11: Building a Customer-Centric Organization-Customer Relationship Management19 Questions
Exam 12: Integrating the Organization From End to End-Enterprise Resource Planning21 Questions
Exam 13: Creating Innovative Organizations87 Questions
Exam 14: Ebusiness81 Questions
Exam 15: Creating Collaborative Partnerships108 Questions
Exam 16: Integrating Wireless Technology in Business11 Questions
Exam 17: Developing Software to Streamline Operations31 Questions
Exam 18: Methodologies for Supporting Agile Organizations29 Questions
Exam 19: Managing Organizational Projects38 Questions
Exam 20: Developing a 21st-Century Organization26 Questions
Exam 21: Business Basics53 Questions
Exam 22: Business Process30 Questions
Exam 23: Hardware and Software Basics36 Questions
Exam 24: Mis Infrastructures38 Questions
Exam 25: Networks and Telecommunications49 Questions
Exam 26: Information Security76 Questions
Exam 27: Ethics68 Questions
Exam 28: Operations Management49 Questions
Exam 29: Sustainable Mis Infrastructures16 Questions
Exam 30: Business Intelligence32 Questions
Exam 31: Global Information Systems69 Questions
Exam 32: Global Trends62 Questions
Select questions type
Which of the following describes confidentiality?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
Explain the statement "information has no ethics."
Free
(Essay)
4.8/5
(31)
Correct Answer:
Information has no ethics.Information does not care how it is used.Information will not stop itself from sending spam,sharing itself if it is sensitive or personal,or revealing details to third parties.Information cannot delete or preserve itself.For these reasons it falls to those who own the information to develop ethical guidelines on how to mange it.
Which of the following describes privacy?
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
C
Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
(Short Answer)
4.8/5
(40)
A(n)__________ use policy contains general principles to guide the proper use of the Internet.
(Short Answer)
4.9/5
(32)
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?
(Multiple Choice)
4.7/5
(39)
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
(Multiple Choice)
4.8/5
(40)
What is a program,when installed on a computer,records every keystroke and mouse click?
(Multiple Choice)
4.8/5
(34)
The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.
(Short Answer)
4.8/5
(32)
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
(True/False)
4.8/5
(45)
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
(Essay)
4.9/5
(24)
The __________ communications privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
(Short Answer)
4.9/5
(44)
Which act allows any person to examine government records unless it would cause an invasion of privacy?
(Multiple Choice)
4.7/5
(32)
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
(Multiple Choice)
4.8/5
(39)
What is the unauthorized use,duplication,distribution,or sale of copyrighted software?
(Multiple Choice)
4.9/5
(40)
If an organization were to have only one policy,which one would it want?
(Multiple Choice)
4.8/5
(31)
What is the policy that contains general principles to guide computer user behavior?
(Multiple Choice)
4.9/5
(39)
Which of the following is not a part of the email privacy policy stipulations?
(Multiple Choice)
4.9/5
(33)
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
(Short Answer)
4.9/5
(39)
Showing 1 - 20 of 68
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)