Filters
Question type

Study Flashcards

Which of the following describes information technology monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following describes ePolicies?


A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not a part of the email privacy policy stipulations?


A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.


A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A(n) ____________ privacy policy details the extent to which email messages may be read by others.

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form?


A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.

Correct Answer

verifed

verified

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Explain the statement "information has no ethics."

Correct Answer

verifed

verified

Information has no ethics. Information d...

View Answer

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?


A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
It is common practice to sign an AUP before being granted a network ID.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A(n) __________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.

Correct Answer

verifed

verified

What is a program, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

_________ is unsolicited email.

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 71

Related Exams

Show Answer