Exam 2: Ethics for It Workers and It Users
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users85 Questions
Exam 3: Computer and Internet Crime90 Questions
Exam 4: Privacy95 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development90 Questions
Exam 8: The Impact of Information Technology on Productivity and the Quality of Life90 Questions
Exam 9: Social Networking85 Questions
Exam 10: Ethics of It Organizations85 Questions
Select questions type
Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____.
(Multiple Choice)
4.8/5
(44)
Whistle-blowing is an effort by an organization's marketing people to call attention to a new product or new feature in an existing product.
(True/False)
4.9/5
(46)
The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____.
(Multiple Choice)
4.9/5
(33)
Clients expect to be able to see work-in-progress in real time, and they expect to be able to influence that work. This is an example of a need for increased ____________________ in professional services.
(Short Answer)
4.8/5
(36)
The ____________________ makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office.
(Short Answer)
4.9/5
(38)
Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional.
(Multiple Choice)
4.9/5
(36)
Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work.
(Multiple Choice)
4.9/5
(37)
____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract.
(Multiple Choice)
4.8/5
(36)
Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____.
(Multiple Choice)
4.9/5
(37)
Because there are no ____ against which to compare a software engineer's professional behavior, he or she cannot be subject to malpractice lawsuits.
(Multiple Choice)
4.8/5
(40)
Highlight some differences between certifications by industry associations and vendor certifications.
(Essay)
4.8/5
(43)
The Association of Information Technology Professionals (AITP) was founded in 1947 and has 24,000 student members and 68,000 professional members in more than 100 countries.
(True/False)
4.9/5
(32)
The design of new software code and computer hardware cannot be treated as a trade secret.
(True/False)
4.8/5
(45)
____________________ involves lying on a resume and claiming competence in an IT skill that is in high demand.
(Short Answer)
4.8/5
(36)
Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making.
(Multiple Choice)
4.8/5
(42)
____________________ is the misstatement or incomplete statement of a material fact.
(Short Answer)
4.8/5
(40)
The obligation to protect people against any unreasonable harm or risk is called ____.
(Multiple Choice)
4.9/5
(41)
The key distinguishing factor between a gift and a bribe is that no gift should be hidden.
(True/False)
4.9/5
(41)
The growing use of IT has increased the potential for new ethical issues and problems, so many organizations have recognized the need to develop policies that protect against abuses. Adherence to the policy can improve services to users, increase productivity, and reduce costs. Identify four specific areas companies must address when creating an IT usage policy.
(Essay)
4.9/5
(31)
Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume.
(Multiple Choice)
4.8/5
(39)
Showing 61 - 80 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)