Deck 11: Systems Development and Project Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/114
Play
Full screen (f)
Deck 11: Systems Development and Project Management
1
Confidential e-mail messages are seldom monitored,although other business communication routinely is.
False
2
Using office resources,such as networks and computers,to search for side jobs is generally not considered workplace Internet abuse.
False
3
Many companies and organizations have established guidelines for ethical conduct,but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
False
4
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage,and does not reveal them either to the general public or to the manufacturer for correction.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
5
The technical tools to steal credit card numbers and online bank account log-in data are often as valuable as the stolen good themselves.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
6
Most companies don't reveal that they have been targets or victims of computer crime.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
7
Cybercrime is becoming one of the Net's growth businesses.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
8
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
9
According to the text case,about two-thirds of the companies surveyed monitor their Internet connections,but only two states require informing employees that they do so.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
10
A virus is a distinct program that can run unaided.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
11
Spyware is annoying,but generally no threat to your privacy.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
12
A malicious applet is an instruction in a computer program that triggers a malicious act.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
13
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
14
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet,capturing passwords or content.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
15
According to one survey,90 percent of U.S.workers admit to surfing recreational sites during office hours.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
16
Electronic breaking and entering means getting access to a computer system,reading some files,but neither stealing nor damaging anything.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
17
There are underground websites where stolen data are swapped as easily as baseball cards on eBay.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
18
The music industry reports that illegal downloading of music and videos is a growing problem.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
19
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
20
Russia has some of the strictest anti-spamming laws in the world.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
21
In the United States,opt-out is the default position,whereas in Europe consumers must opt-in or their personal information cannot be used.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
22
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints,voice,or other physical trait.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
23
People who sit at PC workstations or visual display terminals in fast-paced,repetitive-keystroke jobs can suffer from a variety of health problems,known collectively as computer trauma disorders (CTDs).
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
24
Security monitors can control the use of the hardware,software,and data resources of a computer system.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
25
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
26
According to the text case,ETrade is more concerned with the security of their information than with the costs of computer hardware.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
27
In some systems,the password to read the contents of a file is different from that required to write to a file (change its contents).
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
28
According to the text case,monitoring employees use of email and the Internet has become commonplace.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
29
As a business professional,you have a responsibility to promote ethical uses of information technology in the workplace.This responsibility includes:
A)Performing your role as a vital business resource by participating on every development team
B)Using the Internet only during breaks and after-work hours
C)Performing your role as a vital human resource in the business systems you help develop and use in your organization
D)Documenting all employee electronic mail usage and Internet searches
A)Performing your role as a vital business resource by participating on every development team
B)Using the Internet only during breaks and after-work hours
C)Performing your role as a vital human resource in the business systems you help develop and use in your organization
D)Documenting all employee electronic mail usage and Internet searches
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
30
The most widely used encryption method uses a pair of public and private keys unique to each individual.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
31
Lawsuits by monitored workers against employers are increasing.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
32
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
33
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
34
When managers apply the _____________ theory of ethical decision making,they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
A)social contract
B)stakeholder
C)stockholder
D)midas
A)social contract
B)stakeholder
C)stockholder
D)midas
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
35
The use of information technologies is causing a significant reduction in some types of job opportunities.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
36
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in,gigabytes out (GIGO)syndrome.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
37
These days,corporate antivirus protection is a centralized function of information technology.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
38
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
39
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
40
Security suites integrate virus protection with firewalls,Web security,and encrypted e-mail.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
41
_______________ refers to sifting through a company's garbage to find information to help break into their computers.
A)Dumpster Diving
B)Password cracker
C)Back door
D)Sniffer
A)Dumpster Diving
B)Password cracker
C)Back door
D)Sniffer
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
42
One of the major principles of technology ethics is that the benefits and burdens of the technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk.This principle is:
A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
43
According to the text,a hacker:
A)Maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage,not revealing them to either the general public or the manufacturer for correction.
B)Promotes individual freedom and accessibility over privacy and security.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
A)Maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage,not revealing them to either the general public or the manufacturer for correction.
B)Promotes individual freedom and accessibility over privacy and security.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
44
All of the following are AITP standards of professional conduct related to a person's obligation to society except:
A)Protect the privacy and confidentiality of all information entrusted to me.
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain.
A)Protect the privacy and confidentiality of all information entrusted to me.
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
45
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers.This is known as ________________.
A)sniffing
B)hacking
C)phishing
D)spoofing
A)sniffing
B)hacking
C)phishing
D)spoofing
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
46
The stakeholder theory maintains that:
A)Companies have ethical responsibilities to all members of society,which allow corporations to exist based on a social contract
B)Managers are agents of the stockholders,and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C)Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a stake in or claim on a company
D)Managers are agents of the customer,and their only ethical responsibility is to increase the service of the business,without violating the law or engaging in fraudulent practices
A)Companies have ethical responsibilities to all members of society,which allow corporations to exist based on a social contract
B)Managers are agents of the stockholders,and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C)Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a stake in or claim on a company
D)Managers are agents of the customer,and their only ethical responsibility is to increase the service of the business,without violating the law or engaging in fraudulent practices
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
47
The text defines ________________ as the obsessive use of computers,or the unauthorized access and use of networked computer systems.
A)hacking
B)cyber-slacking
C)cracking
D)resource theft
A)hacking
B)cyber-slacking
C)cracking
D)resource theft
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
48
According to the textbook case,which statement is true?
A)Credibility is difficult to earn in business.
B)Credibility is earned slowly by conducting your business with integrity over time.
C)Credibility is earned by showing exceptional leadership in exceptional circumstances.
D)All of the choices are correct.
A)Credibility is difficult to earn in business.
B)Credibility is earned slowly by conducting your business with integrity over time.
C)Credibility is earned by showing exceptional leadership in exceptional circumstances.
D)All of the choices are correct.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
49
According to the text,a cracker:
A)Maintains knowledge of the vulnerabilities he or she finds and reveals them to the general public and the manufacturer for correction.
B)Promotes privacy and security over individual freedom and accessibility.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
A)Maintains knowledge of the vulnerabilities he or she finds and reveals them to the general public and the manufacturer for correction.
B)Promotes privacy and security over individual freedom and accessibility.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
50
All of the following are AITP standards of professional conduct related to a person's obligation to his employer except:
A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Never exploit the weakness of a computer system for personal gain or personal satisfaction.
A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Never exploit the weakness of a computer system for personal gain or personal satisfaction.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
51
A _______________ is software that can guess passwords.
A)logic bomb
B)password cracker
C)back door
D)sniffer
A)logic bomb
B)password cracker
C)back door
D)sniffer
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
52
According to the text,all of the following statements are included in the definition of computer crime except:
A)Unauthorized modification of software,data,or network resources
B)Unauthorized release of information
C)Unauthorized copying of software
D)Unauthorized distribution of public domain software
A)Unauthorized modification of software,data,or network resources
B)Unauthorized release of information
C)Unauthorized copying of software
D)Unauthorized distribution of public domain software
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following are AITP standards of professional conduct related to a person's obligation to society?
A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Not exploit the weakness of a computer system for personal gain or personal satisfaction.
A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Not exploit the weakness of a computer system for personal gain or personal satisfaction.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following are AITP standards of professional conduct related to a person's obligation to his employer?
A)Protect the privacy and confidentiality of all information entrusted to me
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
A)Protect the privacy and confidentiality of all information entrusted to me
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
55
According to the text,companies are protecting themselves from computer crime by using:
A)Antivirus software
B)Intrusion-detection systems
C)Content filtering/monitoring
D)All of the choices are correct.
A)Antivirus software
B)Intrusion-detection systems
C)Content filtering/monitoring
D)All of the choices are correct.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following best describes the ethical principle of informed consent?
A)The good achieved by technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk
B)Those affected by technology should understand and accept the risks
C)The benefits and burdens of technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk
D)Even if judged acceptable by the other guidelines,the technology must be implemented so as to avoid all unnecessary risks
A)The good achieved by technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk
B)Those affected by technology should understand and accept the risks
C)The benefits and burdens of technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk
D)Even if judged acceptable by the other guidelines,the technology must be implemented so as to avoid all unnecessary risks
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
57
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk.This principle is:
A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
58
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines,the technology must be implemented so as to avoid all unnecessary risk.This principle is:
A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
59
_______________ is/are the most commonly used security technology at large companies.
A)Intrusion-detection systems
B)Smart cards
C)Biometrics
D)Antivirus software
A)Intrusion-detection systems
B)Smart cards
C)Biometrics
D)Antivirus software
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
60
According to the textbook case,which statement is true of Enron?
A)It showed scant interest in questions or doubts about its questionable,unethical,and even illegal business and accounting practices.
B)It could well have been a successful Fortune 1000 firm.
C)They are a textbook case of greed and mismanagement.
D)All of the choices are correct.
A)It showed scant interest in questions or doubts about its questionable,unethical,and even illegal business and accounting practices.
B)It could well have been a successful Fortune 1000 firm.
C)They are a textbook case of greed and mismanagement.
D)All of the choices are correct.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
61
All the following statements are true about encryption,except:
A)Encryption has become an important way to protect data,especially on the Internet.
B)Encryption has become an important method for storing data on hardware devices,such as large hard drives on the Internet.
C)Passwords and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users.
D)Encryption involves using mathematical algorithms to scramble digital data before they are transmitted,and then to decode the data when they are received.
A)Encryption has become an important way to protect data,especially on the Internet.
B)Encryption has become an important method for storing data on hardware devices,such as large hard drives on the Internet.
C)Passwords and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users.
D)Encryption involves using mathematical algorithms to scramble digital data before they are transmitted,and then to decode the data when they are received.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
62
All of the following are common ways for a computer virus to enter a computer system except:
A)E-mail and file attachments
B)Running antivirus programs
C)Downloaded copies of shareware
D)Borrowed copies of software
A)E-mail and file attachments
B)Running antivirus programs
C)Downloaded copies of shareware
D)Borrowed copies of software
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
63
To use public domain software legally,a company:
A)Must purchase individual copies or a site license for a certain number of copies
B)Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C)Can make as many copies as desired because the software is not copyrighted
D)None of the choices are correct.
A)Must purchase individual copies or a site license for a certain number of copies
B)Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C)Can make as many copies as desired because the software is not copyrighted
D)None of the choices are correct.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
64
According to the textbook case,many C-level executives do all the following regarding information security,except:
A)C-level executives recognize the importance of information security.
B)C-level executives actively support their IT organizations' efforts to protect corporate assets and reduce risk.
C)C-level executives are changing their attitudes about security in the face of rising costs of information breaches.
D)C-level executives are primarily interested in maintaining the stock prices of the firm.
A)C-level executives recognize the importance of information security.
B)C-level executives actively support their IT organizations' efforts to protect corporate assets and reduce risk.
C)C-level executives are changing their attitudes about security in the face of rising costs of information breaches.
D)C-level executives are primarily interested in maintaining the stock prices of the firm.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
65
The practice of sending extremely critical,derogatory e-mail messages or newsgroup postings to other users on the Internet is called _______________.
A)flaming
B)spamming
C)spoofing
D)spying
A)flaming
B)spamming
C)spoofing
D)spying
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
66
According to the text,all the following are goals of security management relating to information system processes and resources,except:
A)Speed.
B)Accuracy.
C)Integrity.
D)Safety.
A)Speed.
B)Accuracy.
C)Integrity.
D)Safety.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
67
The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.
A)firewall
B)filtered portal
C)encoder
D)telecommunications line
A)firewall
B)filtered portal
C)encoder
D)telecommunications line
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
68
Individuals have been mistakenly arrested and jailed,and others have been denied credit because of their physical profiles or personal data.These are often the result of:
A)Computer profiling and computer matching
B)Unauthorized opt-in
C)Censorship
D)Adware
A)Computer profiling and computer matching
B)Unauthorized opt-in
C)Censorship
D)Adware
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
69
The goal of ergonomics is to design:
A)Effective work environments that are conducive to fast-paced,repetitive jobs
B)Efficient work environments that are productive and promote high morale
C)Healthy work environments that are safe,comfortable,and pleasant for people to work in
D)Policies regarding work environment structures
A)Effective work environments that are conducive to fast-paced,repetitive jobs
B)Efficient work environments that are productive and promote high morale
C)Healthy work environments that are safe,comfortable,and pleasant for people to work in
D)Policies regarding work environment structures
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
70
According to the Real World case,CIOs should look at _______________ as a supplemental tool to limit communication of sensitive data.
A)outbound content management
B)inbound content management
C)in-house content management
D)competitors' content management
A)outbound content management
B)inbound content management
C)in-house content management
D)competitors' content management
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
71
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.
A)flaming
B)spamming
C)spoofing
D)spying
A)flaming
B)spamming
C)spoofing
D)spying
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is not a health issue commonly related to the use of information technology in the workplace?
A)Damaged arm and neck muscles
B)Eyestrain
C)Job stress
D)Hearing loss
A)Damaged arm and neck muscles
B)Eyestrain
C)Job stress
D)Hearing loss
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
73
Governments around the world are debating privacy issues and considering various forms of legislation.One area central to the privacy debate is opt-in versus opt-out.Those preferring the opt-in standard do so because this standard would:
A)Make privacy the default for consumers
B)Make privacy the default,if a consumer calls in to request no data sharing
C)Make sharing private information the default
D)It would match the existing policy of most Internet-based companies
A)Make privacy the default for consumers
B)Make privacy the default,if a consumer calls in to request no data sharing
C)Make sharing private information the default
D)It would match the existing policy of most Internet-based companies
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following statements about adware and spyware is true?
A)Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B)Removal programs are 100% successful,although they are very expensive
C)Adware software removes spyware software from a user's computer
D)A user must approve the downloading of adware,even if tricked into doing so
A)Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B)Removal programs are 100% successful,although they are very expensive
C)Adware software removes spyware software from a user's computer
D)A user must approve the downloading of adware,even if tricked into doing so
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
75
What is the purpose of external firewalls?
A)To prevent users from accessing sensitive human resource or financial data
B)To limit access of intranet resources to specific users
C)To avoid creating security holes to back-end resources
D)To keep out unauthorized Internet users from intranet networks
A)To prevent users from accessing sensitive human resource or financial data
B)To limit access of intranet resources to specific users
C)To avoid creating security holes to back-end resources
D)To keep out unauthorized Internet users from intranet networks
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
76
According to the Real World case,which of the following is not a sensitive type of information that firms watch for when examining data leaving the organization?
A)Top secret government information
B)Personally identifiable information
C)Confidential company information
D)Inappropriate use of company resources
A)Top secret government information
B)Personally identifiable information
C)Confidential company information
D)Inappropriate use of company resources
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
77
All the following statements are true about encryption,except:
A)The most widely used encryption method uses a pair of public and private keys unique to each individual.
B)Encryption programs are sold as separate products or built into other software used for the encryption process.
C)An e-mail could be scrambled and encoded using a unique private key,then unscrambled using the recipient's secret public key.
D)There are several competing software encryption standards,but the top two are RSA and PGP.
A)The most widely used encryption method uses a pair of public and private keys unique to each individual.
B)Encryption programs are sold as separate products or built into other software used for the encryption process.
C)An e-mail could be scrambled and encoded using a unique private key,then unscrambled using the recipient's secret public key.
D)There are several competing software encryption standards,but the top two are RSA and PGP.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
78
According to the text,which of the following statements is true of cyber law?
A)Cyber law is often controversial.
B)Cyber law regulates the Internet and intellectual property in all countries.
C)Cyber law regulates electronic data communications but not the Internet.
D)Cyber law affects legal issues but avoids political issues.
A)Cyber law is often controversial.
B)Cyber law regulates the Internet and intellectual property in all countries.
C)Cyber law regulates electronic data communications but not the Internet.
D)Cyber law affects legal issues but avoids political issues.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
79
According to the text,good ergonomic design considers the software,the computer,the workstation,and _______________.
A)the users
B)job design
C)psychological stress
D)previous injuries
A)the users
B)job design
C)psychological stress
D)previous injuries
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
80
Firewall software has become an essential computer system component for individuals connecting to the Internet with DSL or cable modems because:
A)Their "always-on" connection status makes them particularly vulnerable.
B)Crackers dislike DSL connections for using too much band-width on the Internet.
C)DSL will not operate without a firewall.
D)Firewalls are the only security that works with cable modems.
A)Their "always-on" connection status makes them particularly vulnerable.
B)Crackers dislike DSL connections for using too much band-width on the Internet.
C)DSL will not operate without a firewall.
D)Firewalls are the only security that works with cable modems.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck