Exam 2: Ethics for It Workers and It Users

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

From a legal perspective, IT workers are not recognized as professionals because they are not licensed by the state or federal government.

(True/False)
4.7/5
(29)

Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to IT staff members.

(True/False)
5.0/5
(39)

The relationship between IT workers and clients is usually documented in a contract that specifies who does what, when the work begins, how long it will take, and how much the client will pay. However, decision making is solely the responsibility of the IT worker.

(True/False)
4.8/5
(38)

No policy can stop wrongdoers from taking inappropriate actions, but it can set forth the general rights and responsibilities of all IT users, establish boundaries of acceptable and unacceptable behavior and enable management to punish violators.

(True/False)
4.9/5
(43)

Many of the cases of software piracy reported to the Business Software Alliance come from ____________________.

(Short Answer)
4.8/5
(41)

Organizations must implement systems and procedures to provide access to all organizational data by all employees no matter where they are located.

(True/False)
4.9/5
(38)

A feature that is associated with a bribe is that a bribe ____.

(Multiple Choice)
4.7/5
(37)

IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____.

(Multiple Choice)
4.9/5
(41)

Many professional roles carry special rights and responsibilities.

(True/False)
4.8/5
(37)

Briefly define negligence and duty of care and distinguish between the reasonable person standard and the reasonable professional standard.

(Essay)
4.8/5
(44)

Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business.

(True/False)
4.9/5
(34)

A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential.

(Multiple Choice)
4.9/5
(40)

A ____________________ is information, generally unknown to the public, that a company has taken strong efforts to keep confidential.

(Short Answer)
4.7/5
(44)

There is little organizations can do to stop employees who participate in chat rooms, view pornographic sites, and play computer games while at work.

(True/False)
4.9/5
(35)

____________________ is a government-issued permission to engage in an activity or to operate a business.

(Short Answer)
4.7/5
(34)

Fraud is the crime of obtaining goods, services, or property through ____________________.

(Short Answer)
4.8/5
(31)

Briefly discuss the inappropriate use of computing resources in the workplace by providing examples and identifying the potential harm that can be caused.

(Essay)
4.9/5
(36)

As the stewards of an organization's IT resources, IT workers must set an example and enforce ____________________ regarding the ethical use of IT.

(Short Answer)
4.8/5
(31)

The mission of the Business Software Alliance is to ____.

(Multiple Choice)
4.9/5
(43)

The Business Software Alliance is a trade group that represents the world's largest software and hardware manufacturers and whose goal is to stop unauthorized software produced by its members. Each year it receives over 25,000 piracy reports.

(True/False)
4.8/5
(42)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)