Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The use of information technology in the workplace raises a variety of health issues. For example, some computer users suffer from ________________ syndrome, a painful, crippling ailment of the hand and wrist that can require surgery to cure.

(Short Answer)
4.9/5
(44)

When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.

(Multiple Choice)
4.8/5
(35)

According to the text case, __________ of people have stolen key information from work.

(Short Answer)
4.9/5
(36)

Unauthorized copying of software, or ________________, is a major form of software theft.

(Short Answer)
4.8/5
(43)

The stockholder theory maintains that:

(Multiple Choice)
4.7/5
(29)

Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

(True/False)
4.9/5
(41)

According to the text, all the following are examples of ethical behavior by organizations, except:

(Multiple Choice)
4.8/5
(29)

Good ergonomic design considers tools, tasks, the workstation, and _______________.

(Multiple Choice)
4.9/5
(34)

IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in, gigabytes out (GIGO) syndrome.

(True/False)
4.7/5
(29)

Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.

(Multiple Choice)
4.8/5
(31)

Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.

(True/False)
4.9/5
(35)

As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:

(Multiple Choice)
4.9/5
(36)

Unauthorized copying of software (software piracy) is illegal because software is considered ________________ that is protected by copyright law and user licensing agreements.

(Short Answer)
5.0/5
(35)

What is the purpose of external firewalls?

(Multiple Choice)
4.8/5
(43)

All of the following are common ways for a computer virus to enter a computer system except:

(Multiple Choice)
4.9/5
(42)

According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.

(True/False)
4.7/5
(39)
Showing 101 - 116 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)