Deck 5: Organizational Structures That Support Strategic Initiatives
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/121
Play
Full screen (f)
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
True
2
Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
False
3
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
True
4
Ethics and security are two fundamental building blocks for all organizations.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
5
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
6
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
7
Information compliance is the act of conforming, acquiescing, or yielding information.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
8
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
9
Pirated software is software that is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
10
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
11
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
12
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
13
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
14
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
15
Information governance is a method or system of government for information management or control.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
16
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
17
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
18
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
19
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
20
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
21
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
22
Script-kiddies have criminal intent when hacking.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
23
A worm is a form of malicious software that infects your computer and asks for money.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
24
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
25
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
26
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
27
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
28
Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
29
Worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
30
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
31
Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
32
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
33
Backdoor programs open a way into the network for future attacks.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
34
Backdoor programs change their form as they propagate.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
35
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
36
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
37
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
38
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
39
A worm spreads itself not only from file to file but also from computer to computer.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
40
Ransomware is a form of malicious software that infects your computer and asks for money.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
41
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
A)Contentment
B)Ethical standard
C)Confidentiality
D)Firewall security
A)Contentment
B)Ethical standard
C)Confidentiality
D)Firewall security
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
42
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
A)Information management
B)Information compliance
C)Information secrecy
D)Information ethics
A)Information management
B)Information compliance
C)Information secrecy
D)Information ethics
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the below represents the definition of information compliance?
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following represents the definition of information governance?
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?
A)Safety
B)Ethical standard
C)Privacy
D)Confidentiality
A)Safety
B)Ethical standard
C)Privacy
D)Confidentiality
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
46
What is intangible creative work that is embodied in physical form and includes trademarks and patents?
A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following represents the definition of information property?
A)An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
B)A method or system of government for information management or control.
C)The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
A)An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
B)A method or system of government for information management or control.
C)The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
48
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.
A)Legal and confidential
B)Legal and ethical
C)Legal and technical
D)Confidential and open
A)Legal and confidential
B)Legal and ethical
C)Legal and technical
D)Confidential and open
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the below represents the definition of information management?
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)The protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)The protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
50
What is the method or system of government for information management or control?
A)Information management
B)Information compliance
C)Information governance
D)Information secrecy
A)Information management
B)Information compliance
C)Information governance
D)Information secrecy
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
A)Information code
B)Information technology
C)Information management
D)Information governance
A)Information code
B)Information technology
C)Information management
D)Information governance
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
52
What is the difference between pirated and counterfeit software?
A)Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B)Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C)Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D)Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
A)Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B)Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C)Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D)Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
53
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the below represents the definition of information secrecy?
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively.
A)The act of conforming, acquiescing, or yielding information.
B)A method or system of government for information management or control.
C)The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D)The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
55
Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.
A)Counterfeit software
B)Pirated software
C)Ethical software
D)Governance software
A)Counterfeit software
B)Pirated software
C)Ethical software
D)Governance software
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
A)Ethics
B)Intellectual property
C)Standards of living
D)Security
A)Ethics
B)Intellectual property
C)Standards of living
D)Security
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
57
Trust between companies, customers, partners, and suppliers is the support structure of which of the following?
A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
A)Ethical information
B)Information technology
C)Information policies
D)Information ethics
A)Ethical information
B)Information technology
C)Information policies
D)Information ethics
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following represents the two fundamental building blocks that protect organizational information?
A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
60
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A)Digital rights management
B)Counterfeit software
C)Privacy
D)Pirated software
A)Digital rights management
B)Counterfeit software
C)Privacy
D)Pirated software
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is not an example of unplanned downtime?
A)Power outages
B)Tornados
C)A system upgrade
D)Network failure
A)Power outages
B)Tornados
C)A system upgrade
D)Network failure
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is a cost of downtime in addition to lost revenue?
A)Legal expenses
B)Loss in financial performance
C)Damage to reputation
D)All of these
A)Legal expenses
B)Loss in financial performance
C)Damage to reputation
D)All of these
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
63
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
A)Ethics
B)Intellectual property
C)Privacy
D)Confidentiality
A)Ethics
B)Intellectual property
C)Privacy
D)Confidentiality
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
64
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
65
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
66
As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively.What is Kristin overseeing for the company?
A)Information codes
B)Information management
C)Information deployment
D)Information security
A)Information codes
B)Information management
C)Information deployment
D)Information security
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is an example of acting ethically?
A)Individuals copy, use, and distribute software.
B)Employees search organizational databases for sensitive corporate and personal information.
C)Individuals hack into computer systems to steal proprietary information.
D)None of these offers an example of acting ethically
A)Individuals copy, use, and distribute software.
B)Employees search organizational databases for sensitive corporate and personal information.
C)Individuals hack into computer systems to steal proprietary information.
D)None of these offers an example of acting ethically
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
A)Confidentiality
B)Digital information
C)Privacy policies
D)Information ethics
A)Confidentiality
B)Digital information
C)Privacy policies
D)Information ethics
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following refers to a period of time when a system is unavailable?
A)Downtime
B)MIS down
C)Direct data loss
D)Downtown
A)Downtime
B)MIS down
C)Direct data loss
D)Downtown
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
70
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
A)Employees copying and distributing company owned software.
B)Employees searching other employee's private information without consent.
C)Employees intentionally creating or spreading viruses to confuse IT.
D)All of these.
A)Employees copying and distributing company owned software.
B)Employees searching other employee's private information without consent.
C)Employees intentionally creating or spreading viruses to confuse IT.
D)All of these.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
71
What is digital rights management?
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)Law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)Law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
A)Eauthorization
B)Emanagement
C)Ediscovery
D)Epolicies
A)Eauthorization
B)Emanagement
C)Ediscovery
D)Epolicies
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following describes confidentiality?
A)The assurance that messages and information are available only to those who are authorized to view them.
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C)The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D)The principles and standards that guide our behavior toward other people.
A)The assurance that messages and information are available only to those who are authorized to view them.
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C)The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D)The principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
74
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
75
What is ediscovery?
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)A law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)A law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following represents the definition of information compliance?
A)The act of conforming, acquiescing, or yielding information.
B)The ability to comply with software.
C)The understanding of technology.
D)The verbalization of information governance in a company's policies and procedures.
A)The act of conforming, acquiescing, or yielding information.
B)The ability to comply with software.
C)The understanding of technology.
D)The verbalization of information governance in a company's policies and procedures.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
77
What is the Child Online Protection Act?
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)A law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)A law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
78
What is pirated software?
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)A law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
A)The unauthorized use, duplication, distribution, or sale of copyrighted software.
B)The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C)A law passed to protect minors from accessing inappropriate material on the Internet.
D)A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
79
What was passed to protect minors from accessing inappropriate material on the Internet?
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
A)Ediscovery
B)Child Online Protection Act
C)Digital rights management
D)Pirated software
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following describes privacy?
A)The assurance that messages and data are available only to those who are authorized to view them.
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C)The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D)The principles and standards that guide our behavior toward other people.
A)The assurance that messages and data are available only to those who are authorized to view them.
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C)The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D)The principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck