Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business138 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware157 Questions
Exam 4: Computer Software146 Questions
Exam 5: Data Resource Management117 Questions
Exam 6: Telecommunications and Networks131 Questions
Exam 7: E-Business Systems118 Questions
Exam 8: Business Across the Enterprise115 Questions
Exam 9: E-Commerce Systems121 Questions
Exam 10: Supporting Decision Making123 Questions
Exam 11: Businessit Strategies for Development122 Questions
Exam 12: Implementing Businessit Solutions141 Questions
Exam 13: Security and Ethical Challenges116 Questions
Exam 14: Enterprise and Global Management of Information Technology121 Questions
Select questions type
The use of information technology in the workplace raises a variety of health issues. For example, some computer users suffer from ________________ syndrome, a painful, crippling ailment of the hand and wrist that can require surgery to cure.
(Short Answer)
4.9/5
(44)
When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.
(Multiple Choice)
4.8/5
(35)
According to the text case, __________ of people have stolen key information from work.
(Short Answer)
4.9/5
(36)
Unauthorized copying of software, or ________________, is a major form of software theft.
(Short Answer)
4.8/5
(43)
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
(True/False)
4.9/5
(41)
According to the text, all the following are examples of ethical behavior by organizations, except:
(Multiple Choice)
4.8/5
(29)
Good ergonomic design considers tools, tasks, the workstation, and _______________.
(Multiple Choice)
4.9/5
(34)
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in, gigabytes out (GIGO) syndrome.
(True/False)
4.7/5
(29)
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.
(Multiple Choice)
4.8/5
(31)
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
(True/False)
4.9/5
(35)
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
(Multiple Choice)
4.9/5
(36)
Unauthorized copying of software (software piracy) is illegal because software is considered ________________ that is protected by copyright law and user licensing agreements.
(Short Answer)
5.0/5
(35)
All of the following are common ways for a computer virus to enter a computer system except:
(Multiple Choice)
4.9/5
(42)
According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.
(True/False)
4.7/5
(39)
Showing 101 - 116 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)