Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business138 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware157 Questions
Exam 4: Computer Software146 Questions
Exam 5: Data Resource Management117 Questions
Exam 6: Telecommunications and Networks131 Questions
Exam 7: E-Business Systems118 Questions
Exam 8: Business Across the Enterprise115 Questions
Exam 9: E-Commerce Systems121 Questions
Exam 10: Supporting Decision Making123 Questions
Exam 11: Businessit Strategies for Development122 Questions
Exam 12: Implementing Businessit Solutions141 Questions
Exam 13: Security and Ethical Challenges116 Questions
Exam 14: Enterprise and Global Management of Information Technology121 Questions
Select questions type
According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:
(Multiple Choice)
4.9/5
(43)
According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.
(True/False)
4.9/5
(32)
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
(True/False)
4.8/5
(36)
The music industry reports that illegal downloading of music and videos is a growing problem.
(True/False)
4.8/5
(39)
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:
(Multiple Choice)
4.9/5
(34)
According to the text, companies are protecting themselves from computer crime by using:
(Multiple Choice)
4.8/5
(35)
In most cases, the purchase of a commercial software package is really a payment to license its fair use by an individual end user. Therefore, many companies sign ________________ licenses that allow them to legally make a certain number of copies for use by their employees at a particular location.
(Short Answer)
4.8/5
(33)
Computer ________________ is defined in the text as the act of using computers to monitor the behavior and productivity of workers on the job and in the workplace.
(Short Answer)
4.9/5
(37)
According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.
(True/False)
4.9/5
(36)
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems:
(Multiple Choice)
4.7/5
(43)
________________ consist of computers, communications processors, and/or software that protect computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other networks.
(Short Answer)
4.8/5
(27)
The documentation that allows a transaction to be traced through all stages of information processing is called an ________________ trail.
(Short Answer)
4.7/5
(41)
_______________ is/are the most commonly used security technology at large companies.
(Multiple Choice)
4.9/5
(44)
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
(True/False)
4.8/5
(34)
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
(True/False)
4.8/5
(37)
Showing 61 - 80 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)