Deck 5: Organizational Structures That Support Strategic Initiatives

ملء الشاشة (f)
exit full mode
سؤال
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
سؤال
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
سؤال
Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
سؤال
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
سؤال
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
سؤال
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
سؤال
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
سؤال
Ethics and security are two fundamental building blocks for all organizations.
سؤال
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
سؤال
Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
سؤال
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
سؤال
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
سؤال
Pirated software is software that is manufactured to look like the real thing and sold as such.
سؤال
Information governance is a method or system of government for information management or control.
سؤال
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
سؤال
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
سؤال
Information compliance is the act of conforming, acquiescing, or yielding information.
سؤال
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
سؤال
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
سؤال
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
سؤال
Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
سؤال
Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.
سؤال
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
سؤال
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
سؤال
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
سؤال
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
سؤال
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
سؤال
A worm spreads itself not only from file to file but also from computer to computer.
سؤال
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
سؤال
A worm spreads itself not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.
سؤال
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
سؤال
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
سؤال
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Backdoor programs change their form as they propagate.
سؤال
A worm is a form of malicious software that infects your computer and asks for money.
سؤال
Script-kiddies have criminal intent when hacking.
سؤال
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
سؤال
Backdoor programs open a way into the network for future attacks.
سؤال
Ransomware is a form of malicious software that infects your computer and asks for money.
سؤال
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________.

A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
سؤال
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?

A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
سؤال
What is intangible creative work that is embodied in physical form and includes trademarks and patents?

A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
سؤال
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

A) Information code
B) Information technology
C) Information management
D) Information governance
سؤال
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
سؤال
Which of the following represents the two fundamental building blocks that protect organizational information?

A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
سؤال
Which of the below represents the definition of information secrecy?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively
سؤال
Emily Kent works as a computer programmer for a software company. Her boss, Sam Anderson, is responsible for developing a new software game for the Nintendo Switch. After completion of the project, Sam gives all of the team members a free copy of the game without consent from the company. Emily is a little hesitant and unsure about accepting the game because legally it would be considered ________.

A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
سؤال
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
سؤال
Which of the following represents the definition of information governance?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
سؤال
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
سؤال
What is the method or system of government for information management or control?

A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
سؤال
What is the difference between pirated and counterfeit software?

A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
سؤال
Which of the following key terms represents the principles and standards that guide our behavior toward other people?

A) Ethics
B) Intellectual property
C) Standards of living
D) Security
سؤال
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
سؤال
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
سؤال
Trust between companies, customers, partners, and suppliers is the support structure of which of the following?

A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
سؤال
Which of the following represents the definition of information property?

A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
سؤال
Which of the below represents the definition of information management?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
سؤال
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
سؤال
Which of the following represents the definition of information compliance?

A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures
سؤال
As the president of a local trade company, Lisa is faced with leadership, ethical, and operational decisions on a daily basis. Lisa's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Lisa overseeing for the company?

A) Information codes
B) Information management
C) Information deployment
D) Information security
سؤال
Which of the below represents the definition of information compliance?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
سؤال
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
سؤال
What is pirated software?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
سؤال
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
سؤال
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
سؤال
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
سؤال
Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
سؤال
What was passed to protect minors from accessing inappropriate material on the Internet?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
سؤال
Which of the following is included in the four quadrants of ethical and legal behavior?

A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the choices are correct
سؤال
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information
C) Individuals hack into computer systems to steal proprietary information
D) None of these offers an example of acting ethically
سؤال
What is the Child Online Protection Act?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
سؤال
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these
سؤال
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
سؤال
What is digital rights management?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) Law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
سؤال
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
سؤال
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
سؤال
What is ediscovery?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
سؤال
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/132
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
True
2
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
True
3
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
True
4
Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
5
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
6
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
7
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
8
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
9
Ethics and security are two fundamental building blocks for all organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
10
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
11
Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
12
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
13
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
14
Pirated software is software that is manufactured to look like the real thing and sold as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
15
Information governance is a method or system of government for information management or control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
16
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
17
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
18
Information compliance is the act of conforming, acquiescing, or yielding information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
19
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
20
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
21
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
22
Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
23
Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
24
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
25
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
26
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
27
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
28
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
29
A worm spreads itself not only from file to file but also from computer to computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
30
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
31
A worm spreads itself not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
32
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
33
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
34
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
35
Backdoor programs change their form as they propagate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
36
A worm is a form of malicious software that infects your computer and asks for money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
37
Script-kiddies have criminal intent when hacking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
38
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
39
Backdoor programs open a way into the network for future attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
40
Ransomware is a form of malicious software that infects your computer and asks for money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
41
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________.

A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?

A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is intangible creative work that is embodied in physical form and includes trademarks and patents?

A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

A) Information code
B) Information technology
C) Information management
D) Information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
45
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following represents the two fundamental building blocks that protect organizational information?

A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the below represents the definition of information secrecy?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
48
Emily Kent works as a computer programmer for a software company. Her boss, Sam Anderson, is responsible for developing a new software game for the Nintendo Switch. After completion of the project, Sam gives all of the team members a free copy of the game without consent from the company. Emily is a little hesitant and unsure about accepting the game because legally it would be considered ________.

A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following represents the definition of information governance?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
51
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
52
What is the method or system of government for information management or control?

A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
53
What is the difference between pirated and counterfeit software?

A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following key terms represents the principles and standards that guide our behavior toward other people?

A) Ethics
B) Intellectual property
C) Standards of living
D) Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
55
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
57
Trust between companies, customers, partners, and suppliers is the support structure of which of the following?

A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following represents the definition of information property?

A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the below represents the definition of information management?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
60
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following represents the definition of information compliance?

A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
62
As the president of a local trade company, Lisa is faced with leadership, ethical, and operational decisions on a daily basis. Lisa's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Lisa overseeing for the company?

A) Information codes
B) Information management
C) Information deployment
D) Information security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the below represents the definition of information compliance?

A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
64
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
65
What is pirated software?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
67
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
68
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
70
What was passed to protect minors from accessing inappropriate material on the Internet?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following is included in the four quadrants of ethical and legal behavior?

A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the choices are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information
C) Individuals hack into computer systems to steal proprietary information
D) None of these offers an example of acting ethically
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
73
What is the Child Online Protection Act?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
74
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
76
What is digital rights management?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) Law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is ediscovery?

A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
80
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 132 في هذه المجموعة.