Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:

(Multiple Choice)
4.9/5
(43)

To use public domain software legally, a company:

(Multiple Choice)
4.9/5
(35)

According to the text, backup files:

(Multiple Choice)
4.7/5
(45)

The social contract theory maintains that:

(Multiple Choice)
4.9/5
(31)

According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.

(True/False)
4.9/5
(32)

The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.

(True/False)
4.8/5
(36)

The music industry reports that illegal downloading of music and videos is a growing problem.

(True/False)
4.8/5
(39)

One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:

(Multiple Choice)
4.9/5
(34)

According to the text, companies are protecting themselves from computer crime by using:

(Multiple Choice)
4.8/5
(35)

In most cases, the purchase of a commercial software package is really a payment to license its fair use by an individual end user. Therefore, many companies sign ________________ licenses that allow them to legally make a certain number of copies for use by their employees at a particular location.

(Short Answer)
4.8/5
(33)

A virus is a distinct program that can run unaided.

(True/False)
4.8/5
(35)

Lawsuits by monitored workers against employers are increasing.

(True/False)
4.8/5
(37)

Computer ________________ is defined in the text as the act of using computers to monitor the behavior and productivity of workers on the job and in the workplace.

(Short Answer)
4.9/5
(37)

According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.

(True/False)
4.9/5
(36)

Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems:

(Multiple Choice)
4.7/5
(43)

________________ consist of computers, communications processors, and/or software that protect computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other networks.

(Short Answer)
4.8/5
(27)

The documentation that allows a transaction to be traced through all stages of information processing is called an ________________ trail.

(Short Answer)
4.7/5
(41)

_______________ is/are the most commonly used security technology at large companies.

(Multiple Choice)
4.9/5
(44)

IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.

(True/False)
4.8/5
(34)

Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.

(True/False)
4.8/5
(37)
Showing 61 - 80 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)