Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business138 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware157 Questions
Exam 4: Computer Software146 Questions
Exam 5: Data Resource Management117 Questions
Exam 6: Telecommunications and Networks131 Questions
Exam 7: E-Business Systems118 Questions
Exam 8: Business Across the Enterprise115 Questions
Exam 9: E-Commerce Systems121 Questions
Exam 10: Supporting Decision Making123 Questions
Exam 11: Businessit Strategies for Development122 Questions
Exam 12: Implementing Businessit Solutions141 Questions
Exam 13: Security and Ethical Challenges116 Questions
Exam 14: Enterprise and Global Management of Information Technology121 Questions
Select questions type
According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.
(Multiple Choice)
4.9/5
(27)
Security monitors can control the use of the hardware, software, and data resources of a computer system.
(True/False)
4.9/5
(32)
Many times, an electronic audit trail takes the form of _______________ that automatically record all computer network activity on magnetic disk or tape devices.
(Short Answer)
4.7/5
(36)
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).
(True/False)
5.0/5
(41)
________________ is software that, while purporting to serve some useful function, also allows Internet advertisers to display advertisements as banners and pop-up ads without the consent of the computer user.
(Short Answer)
4.7/5
(44)
The text defines ________________ as the science and technology emphasizing the safety, comfort, and ease of use of human-operated machines, such as computers. It is also called human factors engineering.
(Short Answer)
4.8/5
(31)
The use of information technologies is causing a significant reduction in some types of job opportunities.
(True/False)
4.9/5
(41)
Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:
(Multiple Choice)
4.7/5
(42)
Which of the following best describes the ethical principle of informed consent?
(Multiple Choice)
4.8/5
(32)
The most widely used encryption method uses a pair of public and private keys unique to each individual.
(True/False)
4.8/5
(36)
Computer monitoring has been criticized as an invasion of employee privacy because:
(Multiple Choice)
4.8/5
(45)
A company may use computer systems that have redundant processors, peripherals, and software to obtain a ________________ capability, where the computer system continues to operate at the same level even if there is a major hardware or software failure.
(Short Answer)
4.8/5
(37)
Which of the following is a method used to defend against denial of service attacks at the victim's website?
(Multiple Choice)
4.8/5
(43)
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
(True/False)
4.8/5
(50)
Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.
(True/False)
4.7/5
(37)
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
(True/False)
4.9/5
(35)
_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
(Multiple Choice)
4.8/5
(46)
The text refers to the unauthorized use of computer systems and networks. To attack this problem, companies can use ________________ to monitor network traffic in order to reveal evidence of improper use.
(Short Answer)
4.9/5
(40)
Showing 81 - 100 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)