Exam 15: Information Technology Ethics

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Most states have enacted antibullying laws.

(True/False)
4.9/5
(39)

Unethical behavior is illegal behavior and illegal behavior is unethical behavior.

(True/False)
4.8/5
(40)

All of the following are types of cyberbullying EXCEPT ________.

(Multiple Choice)
4.9/5
(38)

Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.

(Short Answer)
4.8/5
(42)

Harassing individuals through electronic means such as video or cell phones is called ________.

(Short Answer)
4.9/5
(35)

A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency.

(Multiple Choice)
4.8/5
(38)

Intellectual property (such as music, writing, and software)is protected through ________ law.

(Multiple Choice)
4.9/5
(40)

________ behavior is behavior where a person has no sense of right and wrong and has no interest in the moral consequences of their actions.

(Short Answer)
4.8/5
(32)

Which of the following countries has a software piracy rate over 70%?

(Multiple Choice)
4.8/5
(37)
Match each of the following terms to its definition:
copyright
having no sense of right and wrong and no interest in moral consequences
amoral behavior
act of blocking dissenting opinions
censorship
not conforming to a set of approved behavioral standards
Correct Answer:
Verified
Premises:
Responses:
copyright
having no sense of right and wrong and no interest in moral consequences
amoral behavior
act of blocking dissenting opinions
censorship
not conforming to a set of approved behavioral standards
unethical behavior
study of the general nature of morals and the specific moral choices made by individuals
ethics
protection afforded to creators of intellectual property
(Matching)
4.7/5
(32)

Facebook allows you to determine the extent to which your information can be shared.

(True/False)
4.9/5
(44)

The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.

(Short Answer)
4.7/5
(41)

________ is the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs.

(Multiple Choice)
4.8/5
(43)

It is estimated that the global loss in 2013 due to software piracy is in the billions of dollars.

(True/False)
4.9/5
(36)

An example of ethical uses of computers and social media is the coordination of relief efforts after a natural disaster.

(True/False)
4.7/5
(47)

By using ________, a smartphone with a GPS chip can determine your exact position.

(Multiple Choice)
4.8/5
(35)

Cyberbullying is harassing, threatening, humiliating, embarrassing, or tormenting individuals by means of technology.

(True/False)
4.8/5
(40)
Showing 21 - 37 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)