Deck 27: Ethics

Full screen (f)
exit full mode
Question
Which act allows any person to examine government records unless it would cause an invasion of privacy?

A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act
Use Space or
up arrow
down arrow
to flip the card.
Question
Which act restricts what information the federal government can collect?

A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act
Question
What is the unauthorized use,duplication,distribution,or sale of copyrighted software?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Question
Which of the following is not considered an ePolicy?

A) Acceptable use policy
B) Email Privacy policy
C) Ethical computer use policy
D) Security badge policy
Question
Which act strengthened criminal laws governing identity theft?

A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of these
Question
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

A) The Sarbanes-Oxley Act
B) The Identity Theft and Assumption Deterrence Act
C) The CAN-Spam Act
D) None of these
Question
What is the ideal type of decision making for people in an organization?

A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
Question
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Question
What is software that is manufactured to look like the real thing and sold as such?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Question
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Question
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these
Question
What is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
Question
What is the assurance that messages and information remain available only to those authorized to view them?

A) Confidentiality
B) Pirated software
C) Counterfeit software
D) Privacy
Question
What are the principles and standards that guide our behavior toward other people?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
Question
What is intangible creative work that is embodied in physical form?

A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality
Question
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

A) Ethics
B) ePolicies
C) All of these
D) None of these
Question
Which of the following describes ePolicies?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Question
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?

A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act
Question
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Question
Which of the following is not included in the four quadrants of ethical and legal behavior?

A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these
Question
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Question
Which policy contains general principles regarding information privacy?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
Question
Which policy typically contains a nonrepudiation clause?

A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
Question
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
Question
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of these
Question
Which of the following is part of the acceptable use policy stipulations?

A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
Question
Which policy details the extent to which email messages may be read by others?

A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of these
Question
If an organization were to have only one policy,which one would it want?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Question
Which of the following describes Workplace MIS monitoring?

A) Tracking people's activities by such measures as number of keystrokes.
B) Tracking people's activities by such measures as error rate.
C) Tracking people's activities by such measures as number of transactions processed.
D) All of these.
Question
What is a mail bomb?

A) Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions.
C) Sending a few emails to random people or systems resulting in filling up the user's disk space.
D) A contractual stipulation to ensure that ebusiness participants deny their online actions.
Question
What is the policy that contains general principles to guide computer user behavior?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of these
Question
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
Question
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Question
What is a program,when installed on a computer,records every keystroke and mouse click?

A) Key logger software
B) Spyware
C) Cookie
D) Adware
Question
Which of the following is not a part of the email privacy policy stipulations?

A) It defines who legitimate email users are.
B) It explains the backup procedures.
C) It describes the legitimate grounds for reading someone's email.
D) It informs people that the organization has full control over email once it is transmitted outside the organization.
Question
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being gaining network access?

A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
Question
According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.

A) informed; collaborate
B) consent; informed
C) informed; consent
D) None of these
Question
Which of the following is part of the acceptable use policy stipulations?

A) Not using the service as part of violating any law.
B) Not attempting to break the security of any computer network or user.
C) Not posting commercial messages to groups without prior permission.
D) All of these.
Question
Which of the following is a classic example of unintentional information reuse?

A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Question
What is one of the major problems with email?

A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of these
Question
Epolicies are policies and procedures that address information management along with the ethical use of computers and Internet usage in the ___________ environment.
Question
_________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.
Question
The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.
Question
Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.
Question
Ethical computer use policy contains general principles to guide computer user behavior.
Question
The _________ Act restricts what information the federal government can collect.
Question
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Question
A(n)___________ privacy policy contains general principles regarding information privacy.
Question
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
Question
_________ is unsolicited email.
Question
The __________ communications privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
Question
_____________ is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Question
A(n)____________ computer use policy contains general principles to guide computer user behavior.
Question
A(n)__________ use policy contains general principles to guide the proper use of the Internet.
Question
A(n)__________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
Question
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Question
A(n)____________ privacy policy details the extent to which email messages may be read by others.
Question
____________ are the principles and standards that guide our behavior toward other people.
Question
Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Question
The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.
Question
Summarize the common Internet monitoring technologies and explain the importance of an employee monitoring policy.
Question
Describe the important ethical concepts steaming from information technology.
Question
__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.
Question
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
Question
Explain the statement "information has no ethics."
Question
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
Question
________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Question
Describe the relationship between an email privacy policy and the Internet use policy.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/68
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 27: Ethics
1
Which act allows any person to examine government records unless it would cause an invasion of privacy?

A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act
C
Explanation: The Freedom of Information Act allows any person to examine government records unless it causes an invasion of privacy.
2
Which act restricts what information the federal government can collect?

A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act
A
Explanation: The Privacy Act restricts what information the federal government can collect.
3
What is the unauthorized use,duplication,distribution,or sale of copyrighted software?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
B
Explanation: This is the definition of pirated software.
4
Which of the following is not considered an ePolicy?

A) Acceptable use policy
B) Email Privacy policy
C) Ethical computer use policy
D) Security badge policy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
5
Which act strengthened criminal laws governing identity theft?

A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
6
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

A) The Sarbanes-Oxley Act
B) The Identity Theft and Assumption Deterrence Act
C) The CAN-Spam Act
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
7
What is the ideal type of decision making for people in an organization?

A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
9
What is software that is manufactured to look like the real thing and sold as such?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
12
What is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
13
What is the assurance that messages and information remain available only to those authorized to view them?

A) Confidentiality
B) Pirated software
C) Counterfeit software
D) Privacy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
14
What are the principles and standards that guide our behavior toward other people?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
15
What is intangible creative work that is embodied in physical form?

A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
16
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

A) Ethics
B) ePolicies
C) All of these
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following describes ePolicies?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
18
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?

A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
19
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not included in the four quadrants of ethical and legal behavior?

A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
21
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
22
Which policy contains general principles regarding information privacy?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
23
Which policy typically contains a nonrepudiation clause?

A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
24
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
25
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is part of the acceptable use policy stipulations?

A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
27
Which policy details the extent to which email messages may be read by others?

A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
28
If an organization were to have only one policy,which one would it want?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following describes Workplace MIS monitoring?

A) Tracking people's activities by such measures as number of keystrokes.
B) Tracking people's activities by such measures as error rate.
C) Tracking people's activities by such measures as number of transactions processed.
D) All of these.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
30
What is a mail bomb?

A) Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions.
C) Sending a few emails to random people or systems resulting in filling up the user's disk space.
D) A contractual stipulation to ensure that ebusiness participants deny their online actions.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
31
What is the policy that contains general principles to guide computer user behavior?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
32
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
33
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
34
What is a program,when installed on a computer,records every keystroke and mouse click?

A) Key logger software
B) Spyware
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is not a part of the email privacy policy stipulations?

A) It defines who legitimate email users are.
B) It explains the backup procedures.
C) It describes the legitimate grounds for reading someone's email.
D) It informs people that the organization has full control over email once it is transmitted outside the organization.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
36
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being gaining network access?

A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
37
According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.

A) informed; collaborate
B) consent; informed
C) informed; consent
D) None of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is part of the acceptable use policy stipulations?

A) Not using the service as part of violating any law.
B) Not attempting to break the security of any computer network or user.
C) Not posting commercial messages to groups without prior permission.
D) All of these.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is a classic example of unintentional information reuse?

A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
40
What is one of the major problems with email?

A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
41
Epolicies are policies and procedures that address information management along with the ethical use of computers and Internet usage in the ___________ environment.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
42
_________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
43
The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
44
Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
45
Ethical computer use policy contains general principles to guide computer user behavior.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
46
The _________ Act restricts what information the federal government can collect.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
47
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
48
A(n)___________ privacy policy contains general principles regarding information privacy.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
49
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
50
_________ is unsolicited email.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
51
The __________ communications privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
52
_____________ is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)____________ computer use policy contains general principles to guide computer user behavior.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
54
A(n)__________ use policy contains general principles to guide the proper use of the Internet.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
55
A(n)__________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
56
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
57
A(n)____________ privacy policy details the extent to which email messages may be read by others.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
58
____________ are the principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
59
Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
60
The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
61
Summarize the common Internet monitoring technologies and explain the importance of an employee monitoring policy.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
62
Describe the important ethical concepts steaming from information technology.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
63
__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
64
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
65
Explain the statement "information has no ethics."
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
66
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
67
________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
68
Describe the relationship between an email privacy policy and the Internet use policy.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 68 flashcards in this deck.