Deck 7: Ethics

ملء الشاشة (f)
exit full mode
سؤال
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

A) Ethics
B) ePolicies
C) All of the above
D) None of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What are the principles and standards that guide our behavior toward other people?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
سؤال
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
سؤال
Which of the following is not included in the four quadrants of ethical and legal behavior?

A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) None of the above
سؤال
Which of the following is not considered an ePolicy?

A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Security badge policy
سؤال
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
سؤال
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the above
سؤال
What is the ideal type of decisions for people in an organization to make?

A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
سؤال
Which act restricts what information the federal government can collect?

A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
سؤال
What is software that is manufactured to look like the real thing and sold as such?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above.
سؤال
What is the assurance that messages and information remain available only to those authorized to view them?

A) Confidentiality
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
سؤال
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?

A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
سؤال
What is intangible creative work that is embodied in physical form?

A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality
سؤال
Which act allows any person to examine government records unless it would cause an invasion of privacy?

A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
سؤال
Which of the following describes ePolicies?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
سؤال
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
Which act strengthened criminal laws against identity theft?

A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above
سؤال
Which of the following is part of the acceptable use policy stipulations?

A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above
سؤال
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above
سؤال
Which policy contains general principles regarding information privacy?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
سؤال
Which policy typically contains a nonrepudiation clause?

A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
سؤال
Which of the following describes information technology monitoring?

A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
سؤال
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
سؤال
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
سؤال
What is a program, when installed on a computer, records every keystroke and mouse click?

A) Key logger software
B) Spyware
C) Cookie
D) Adware
سؤال
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
It is common practice to sign an AUP before being granted a network ID.
سؤال
Which of the following is not a part of the email privacy policy stipulations?

A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization
سؤال
What is a mail bomb?

A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
سؤال
Which of the following represents the classic example of unintentional information reuse?

A) Phone number
B) Social Security number
C) Address
D) Driver's license number
سؤال
If an organization were to have only one policy, which one would it want?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
سؤال
Which of the following is part of the acceptable use policy stipulations?

A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
سؤال
What is one of the major problems with email?

A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above
سؤال
What is the policy that contains general principles to guide computer user behavior?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of the above
سؤال
Which policy details the extent to which email messages may be read by others?

A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of the above
سؤال
What is one of the guidelines an organization can follow when creating an information privacy policy?

A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above
سؤال
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above
سؤال
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
سؤال
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
سؤال
A(n) __________ use policy contains general principles to guide the proper use of the Internet.
سؤال
_________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.
سؤال
_________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.
سؤال
A(n) __________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
سؤال
The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
سؤال
The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.
سؤال
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
سؤال
Ethical computer use policy contains general principles to guide computer user behavior.
سؤال
The _________ act restricts what information the federal government can collect.
سؤال
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
سؤال
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
سؤال
A(n) ____________ privacy policy details the extent to which email messages may be read by others.
سؤال
____________ are the principles and standards that guide our behavior toward other people.
سؤال
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
سؤال
A(n) ___________ privacy policy contains general principles regarding information privacy.
سؤال
_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
سؤال
The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.
سؤال
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.
سؤال
A(n) ____________ computer use policy contains general principles to guide computer user behavior.
سؤال
__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
سؤال
Key logger or key trapper software is a __________ that when installed on a computer, records every keystroke and mouse click.
سؤال
Describe the relationship between an email privacy policy and in Internet use policy.
سؤال
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
سؤال
Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
سؤال
Explain the statement "information has no ethics."
سؤال
Describe the important ethical concepts steaming from information technology.
سؤال
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
سؤال
________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
سؤال
_________ is unsolicited email.
سؤال
Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Ethics
1
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

A) Ethics
B) ePolicies
C) All of the above
D) None of the above
B
2
What are the principles and standards that guide our behavior toward other people?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
A
3
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
A
4
Which of the following is not included in the four quadrants of ethical and legal behavior?

A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not considered an ePolicy?

A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Security badge policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the ideal type of decisions for people in an organization to make?

A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which act restricts what information the federal government can collect?

A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
10
What is software that is manufactured to look like the real thing and sold as such?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is the assurance that messages and information remain available only to those authorized to view them?

A) Confidentiality
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?

A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is intangible creative work that is embodied in physical form?

A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which act allows any person to examine government records unless it would cause an invasion of privacy?

A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following describes ePolicies?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which act strengthened criminal laws against identity theft?

A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is part of the acceptable use policy stipulations?

A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
22
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which policy contains general principles regarding information privacy?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which policy typically contains a nonrepudiation clause?

A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following describes information technology monitoring?

A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is a program, when installed on a computer, records every keystroke and mouse click?

A) Key logger software
B) Spyware
C) Cookie
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
It is common practice to sign an AUP before being granted a network ID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is not a part of the email privacy policy stipulations?

A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
31
What is a mail bomb?

A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following represents the classic example of unintentional information reuse?

A) Phone number
B) Social Security number
C) Address
D) Driver's license number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
33
If an organization were to have only one policy, which one would it want?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is part of the acceptable use policy stipulations?

A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is one of the major problems with email?

A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the policy that contains general principles to guide computer user behavior?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which policy details the extent to which email messages may be read by others?

A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is one of the guidelines an organization can follow when creating an information privacy policy?

A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
39
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
41
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
42
A(n) __________ use policy contains general principles to guide the proper use of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
43
_________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n) __________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
46
The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
47
The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
48
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
49
Ethical computer use policy contains general principles to guide computer user behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
50
The _________ act restricts what information the federal government can collect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
51
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
52
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
53
A(n) ____________ privacy policy details the extent to which email messages may be read by others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
54
____________ are the principles and standards that guide our behavior toward other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
55
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
56
A(n) ___________ privacy policy contains general principles regarding information privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
57
_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
58
The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
59
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) ____________ computer use policy contains general principles to guide computer user behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
61
__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
62
Key logger or key trapper software is a __________ that when installed on a computer, records every keystroke and mouse click.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
63
Describe the relationship between an email privacy policy and in Internet use policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
64
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
65
Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
66
Explain the statement "information has no ethics."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
67
Describe the important ethical concepts steaming from information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
68
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
69
________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
70
_________ is unsolicited email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
71
Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.