Exam 27: Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following describes confidentiality?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

A

Explain the statement "information has no ethics."

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

Information has no ethics.Information does not care how it is used.Information will not stop itself from sending spam,sharing itself if it is sensitive or personal,or revealing details to third parties.Information cannot delete or preserve itself.For these reasons it falls to those who own the information to develop ethical guidelines on how to mange it.

Which of the following describes privacy?

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

C

Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

(Short Answer)
4.8/5
(40)

A(n)__________ use policy contains general principles to guide the proper use of the Internet.

(Short Answer)
4.9/5
(32)

What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

(Multiple Choice)
4.7/5
(39)

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

(Multiple Choice)
4.8/5
(40)

What is a program,when installed on a computer,records every keystroke and mouse click?

(Multiple Choice)
4.8/5
(34)

The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.

(Short Answer)
4.8/5
(32)

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

(True/False)
4.8/5
(45)

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

(Essay)
4.9/5
(24)

The __________ communications privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

(Short Answer)
4.9/5
(44)

Which act allows any person to examine government records unless it would cause an invasion of privacy?

(Multiple Choice)
4.7/5
(32)

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

(Multiple Choice)
4.8/5
(39)

What is the unauthorized use,duplication,distribution,or sale of copyrighted software?

(Multiple Choice)
4.9/5
(40)

If an organization were to have only one policy,which one would it want?

(Multiple Choice)
4.8/5
(31)

What is the policy that contains general principles to guide computer user behavior?

(Multiple Choice)
4.9/5
(39)

Which of the following is not a part of the email privacy policy stipulations?

(Multiple Choice)
4.9/5
(33)

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

(Short Answer)
4.9/5
(39)

_________ is unsolicited email.

(Short Answer)
4.8/5
(34)
Showing 1 - 20 of 68
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)