Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems Study Set 4
Exam 13: Security and Ethical Challenges
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
The goal of ergonomics is to design:
Question 2
Multiple Choice
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:
Question 3
Multiple Choice
_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
Question 4
True/False
These days, corporate antivirus protection is a centralized function of information technology.
Question 5
True/False
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
Question 6
Multiple Choice
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
Question 7
Short Answer
According to the textbook, the unauthorized use of computer systems and networks can be called time and ________________ theft.
Question 8
Short Answer
The use of information technology in the workplace raises a variety of health issues. For example, some computer users suffer from ________________ syndrome, a painful, crippling ailment of the hand and wrist that can require surgery to cure.
Question 9
True/False
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
Question 10
True/False
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
Question 11
True/False
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
Question 12
Multiple Choice
The stakeholder theory maintains that:
Question 13
True/False
A malicious applet is an instruction in a computer program that triggers a malicious act.
Question 14
True/False
Cyber crime is becoming one of the Net's growth businesses.
Question 15
Multiple Choice
The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.