Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business138 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware157 Questions
Exam 4: Computer Software146 Questions
Exam 5: Data Resource Management117 Questions
Exam 6: Telecommunications and Networks131 Questions
Exam 7: E-Business Systems118 Questions
Exam 8: Business Across the Enterprise115 Questions
Exam 9: E-Commerce Systems121 Questions
Exam 10: Supporting Decision Making123 Questions
Exam 11: Businessit Strategies for Development122 Questions
Exam 12: Implementing Businessit Solutions141 Questions
Exam 13: Security and Ethical Challenges116 Questions
Exam 14: Enterprise and Global Management of Information Technology121 Questions
Select questions type
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:
(Multiple Choice)
4.7/5
(36)
A malicious applet is an instruction in a computer program that triggers a malicious act.
(True/False)
4.9/5
(44)
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
(True/False)
4.8/5
(39)
All of the following are AITP standards of professional conduct related to a person's obligation to society except:
(Multiple Choice)
4.9/5
(35)
The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.
(Multiple Choice)
4.8/5
(39)
________________ file sharing software enables direct MP3 audio file transfers of specified tracks of music between your PC and those of other users on the Internet.
(Short Answer)
4.8/5
(28)
According to the text case, monitoring employees use of email and the Internet has become commonplace.
(True/False)
4.8/5
(42)
Which of the following is not a health issue commonly related to the use of information technology in the workplace?
(Multiple Choice)
4.7/5
(37)
An effective disaster recovery plan would include which of the following?
(Multiple Choice)
4.7/5
(37)
________________ is a special class of adware that collects specific information about you, ranging from general demographics to credit card and social security numbers, using the user's Internet connection in the background without his/her knowledge or explicit permission.
(Short Answer)
4.9/5
(37)
According to the text, all of the following statements are included in the definition of computer crime except:
(Multiple Choice)
4.9/5
(45)
These days, corporate antivirus protection is a centralized function of information technology.
(True/False)
4.7/5
(37)
According to the text case, ________________ of people have stolen key information from work.
(Multiple Choice)
4.9/5
(35)
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
(True/False)
4.8/5
(45)
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
(True/False)
4.7/5
(35)
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as _______________.
(Multiple Choice)
4.9/5
(35)
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.
(Multiple Choice)
4.8/5
(41)
When managers apply the _____________ theory of ethical decision making, they believe that managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company.
(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)