Exam 15: Information Technology Ethics
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Web's Resources76 Questions
Exam 4: Application Software: Programs That Let You Work and Play74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: The History of the Personal Computer41 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 15: Information Technology Ethics37 Questions
Exam 16: Under the Hood38 Questions
Exam 17: Careers in IT38 Questions
Select questions type
Unethical behavior is illegal behavior and illegal behavior is unethical behavior.
(True/False)
4.8/5
(40)
All of the following are types of cyberbullying EXCEPT ________.
(Multiple Choice)
4.9/5
(38)
Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.
(Short Answer)
4.8/5
(42)
Harassing individuals through electronic means such as video or cell phones is called ________.
(Short Answer)
4.9/5
(35)
A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency.
(Multiple Choice)
4.8/5
(38)
Intellectual property (such as music, writing, and software)is protected through ________ law.
(Multiple Choice)
4.9/5
(40)
________ behavior is behavior where a person has no sense of right and wrong and has no interest in the moral consequences of their actions.
(Short Answer)
4.8/5
(32)
Which of the following countries has a software piracy rate over 70%?
(Multiple Choice)
4.8/5
(37)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(32)
Facebook allows you to determine the extent to which your information can be shared.
(True/False)
4.9/5
(44)
The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.
(Short Answer)
4.7/5
(41)
________ is the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs.
(Multiple Choice)
4.8/5
(43)
It is estimated that the global loss in 2013 due to software piracy is in the billions of dollars.
(True/False)
4.9/5
(36)
An example of ethical uses of computers and social media is the coordination of relief efforts after a natural disaster.
(True/False)
4.7/5
(47)
By using ________, a smartphone with a GPS chip can determine your exact position.
(Multiple Choice)
4.8/5
(35)
Cyberbullying is harassing, threatening, humiliating, embarrassing, or tormenting individuals by means of technology.
(True/False)
4.8/5
(40)
Showing 21 - 37 of 37
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)