Filters
Question type

Study Flashcards

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

Explain the statement "information has no ethics."

Correct Answer

verifed

verified

Information has no ethics.Information does not care how it is used.Information will not stop itself from sending spam,sharing itself if it is sensitive or personal,or revealing details to third parties.Information cannot delete or preserve itself.For these reasons it falls to those who own the information to develop ethical guidelines on how to mange it.

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

C

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

Correct Answer

verifed

verified

Ethical computer use policy - contains g...

View Answer

Which of the following is not a part of the email privacy policy stipulations?


A) It defines who legitimate email users are.
B) It explains the backup procedures.
C) It describes the legitimate grounds for reading someone's email.
D) It informs people that the organization has full control over email once it is transmitted outside the organization.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.

Correct Answer

verifed

verified

What is a program,when installed on a computer,records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?


A) Ethics
B) ePolicies
C) All of these
D) None of these

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

If an organization were to have only one policy,which one would it want?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

Correct Answer

verifed

verified

What is the unauthorized use,duplication,distribution,or sale of copyrighted software?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) All of the above
F) None of the above

Correct Answer

verifed

verified

_________ is unsolicited email.

Correct Answer

verifed

verified

Which act allows any person to examine government records unless it would cause an invasion of privacy?


A) The Privacy Act
B) The Bork bill
C) The Freedom of Information Act
D) The Communications Assistance for Law Enforcement Act

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is the policy that contains general principles to guide computer user behavior?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of these

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Hardware key logger
C) Cookie
D) Adware

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The __________ communications privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Correct Answer

verifed

verified

A(n)__________ use policy contains general principles to guide the proper use of the Internet.

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A

Showing 1 - 20 of 68

Related Exams

Show Answer