Deck 5: Organizational Structures That Support Strategic Initiatives
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/132
Play
Full screen (f)
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
True
2
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
True
3
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
True
4
Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
5
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
6
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
7
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
8
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
9
Ethics and security are two fundamental building blocks for all organizations.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
10
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
11
Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
12
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
13
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
14
Pirated software is software that is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
15
Information governance is a method or system of government for information management or control.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
16
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
17
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
18
Information compliance is the act of conforming, acquiescing, or yielding information.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
19
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
20
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
21
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
22
Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
23
Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
24
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
25
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
26
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
27
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
28
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
29
A worm spreads itself not only from file to file but also from computer to computer.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
30
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
31
A worm spreads itself not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
32
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
33
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
34
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
35
Backdoor programs change their form as they propagate.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
36
A worm is a form of malicious software that infects your computer and asks for money.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
37
Script-kiddies have criminal intent when hacking.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
38
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
39
Backdoor programs open a way into the network for future attacks.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
40
Ransomware is a form of malicious software that infects your computer and asks for money.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
41
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________.
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
43
What is intangible creative work that is embodied in physical form and includes trademarks and patents?
A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
A) Information code
B) Information technology
C) Information management
D) Information governance
A) Information code
B) Information technology
C) Information management
D) Information governance
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
45
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following represents the two fundamental building blocks that protect organizational information?
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the below represents the definition of information secrecy?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
48
Emily Kent works as a computer programmer for a software company. Her boss, Sam Anderson, is responsible for developing a new software game for the Nintendo Switch. After completion of the project, Sam gives all of the team members a free copy of the game without consent from the company. Emily is a little hesitant and unsure about accepting the game because legally it would be considered ________.
A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
49
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following represents the definition of information governance?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
51
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
52
What is the method or system of government for information management or control?
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
53
What is the difference between pirated and counterfeit software?
A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
55
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
57
Trust between companies, customers, partners, and suppliers is the support structure of which of the following?
A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following represents the definition of information property?
A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the below represents the definition of information management?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
60
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following represents the definition of information compliance?
A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures
A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
62
As the president of a local trade company, Lisa is faced with leadership, ethical, and operational decisions on a daily basis. Lisa's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Lisa overseeing for the company?
A) Information codes
B) Information management
C) Information deployment
D) Information security
A) Information codes
B) Information management
C) Information deployment
D) Information security
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the below represents the definition of information compliance?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
64
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
65
What is pirated software?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following describes privacy?
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
67
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
68
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
70
What was passed to protect minors from accessing inappropriate material on the Internet?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is included in the four quadrants of ethical and legal behavior?
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the choices are correct
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the choices are correct
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is an example of acting ethically?
A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information
C) Individuals hack into computer systems to steal proprietary information
D) None of these offers an example of acting ethically
A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information
C) Individuals hack into computer systems to steal proprietary information
D) None of these offers an example of acting ethically
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
73
What is the Child Online Protection Act?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
74
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these
A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
75
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
76
What is digital rights management?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) Law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) Law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following describes confidentiality?
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
79
What is ediscovery?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
80
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck