A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Correct Answer
verified
Multiple Choice
A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
It is common practice to sign an AUP before being granted a network ID.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Key logger software
B) Spyware
C) Cookie
D) Adware
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 71
Related Exams