Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business138 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware157 Questions
Exam 4: Computer Software146 Questions
Exam 5: Data Resource Management117 Questions
Exam 6: Telecommunications and Networks131 Questions
Exam 7: E-Business Systems118 Questions
Exam 8: Business Across the Enterprise115 Questions
Exam 9: E-Commerce Systems121 Questions
Exam 10: Supporting Decision Making123 Questions
Exam 11: Businessit Strategies for Development122 Questions
Exam 12: Implementing Businessit Solutions141 Questions
Exam 13: Security and Ethical Challenges116 Questions
Exam 14: Enterprise and Global Management of Information Technology121 Questions
Select questions type
One ethics challenge presented by IT is that computer monitoring, in its extremes, can create an electronic ________________, where workers are forced to work at a hectic pace under poor working conditions.
(Short Answer)
4.9/5
(38)
Many computer crimes involve the theft of money. In the majority of these cases they are ________________ that involve unauthorized network entry and fraudulent alteration of computer database to cover the tracks of the employees involved.
(Short Answer)
4.9/5
(35)
One way hackers gain access to a company's information to help break into their computers is by sifting through a company's garbage. This is referred to as ________________.
(Short Answer)
4.9/5
(35)
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
(True/False)
4.9/5
(35)
Security monitors can control the use of all the following except:
(Multiple Choice)
4.8/5
(39)
A ________________ plan is a method for ensuring that an organization recovers from natural and human-caused disasters that affect its computer-based operations. These plans specify items such as hardware, software, employee duties, and facilities to be used.
(Short Answer)
4.8/5
(38)
Which of the following is not a method used to defend against denial of service attacks at "zombie" machines?
(Multiple Choice)
4.9/5
(44)
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.
(True/False)
4.8/5
(43)
When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
(Multiple Choice)
4.8/5
(44)
End users should regularly use ________________ programs that locate and remove computer viruses from infected files on their hard disk.
(Short Answer)
4.8/5
(46)
According to the text, information technology has caused ethical controversy in which of the following basic categories of ethical business issues?
(Multiple Choice)
4.9/5
(34)
The text describes ________________ as the practice of sending extremely critical, derogatory, and often-vulgar E-mail messages or electronic bulletin board postings to other users on the Internet or online services.
(Short Answer)
4.9/5
(36)
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.
(Multiple Choice)
4.8/5
(41)
Sifting through a company's garbage looking for information to help break into the company's computers; sometimes used in conjunction with social engineering is called:
(Multiple Choice)
5.0/5
(37)
Confidential e-mail messages are seldom monitored, although other business communication routinely is.
(True/False)
4.9/5
(34)
The text describes ________________ as the indiscriminate sending of unsolicited e-mail messages to many Internet users.
(Short Answer)
4.9/5
(44)
________________ is described as the process of scrambling data or converting it, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients.
(Short Answer)
4.9/5
(39)
According to the textbook, the unauthorized use of computer systems and networks can be called time and ________________ theft.
(Short Answer)
4.9/5
(31)
Showing 41 - 60 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)