Deck 13: Security and Ethical Challenges

ملء الشاشة (f)
exit full mode
سؤال
Spyware is annoying, but generally no threat to your privacy.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
سؤال
The music industry reports that illegal downloading of music and videos is a growing problem.
سؤال
A malicious applet is an instruction in a computer program that triggers a malicious act.
سؤال
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.
سؤال
According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.
سؤال
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
سؤال
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
سؤال
According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.
سؤال
A virus is a distinct program that can run unaided.
سؤال
Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.
سؤال
The use of information technologies is causing a significant reduction in some types of job opportunities.
سؤال
According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.
سؤال
Cyber crime is becoming one of the Net's growth businesses.
سؤال
Most companies don't reveal that they have been targets or victims of computer crime.
سؤال
Confidential e-mail messages are seldom monitored, although other business communication routinely is.
سؤال
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.
سؤال
In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.
سؤال
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
سؤال
Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
سؤال
The most widely used encryption method uses a pair of public and private keys unique to each individual.
سؤال
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
سؤال
Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.
سؤال
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
سؤال
According to the text case, monitoring employees use of email and the Internet has become commonplace.
سؤال
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
سؤال
Lawsuits by monitored workers against employers are increasing.
سؤال
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
سؤال
According to the text, information technology has caused ethical controversy in which of the following basic categories of ethical business issues?

A) Comparable worth
B) Whistle blowing
C) Workplace safety
D) Employee conflicts of interest
سؤال
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
سؤال
Security monitors can control the use of the hardware, software, and data resources of a computer system.
سؤال
According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?

A) Intellectual property rights, customer and employee privacy, security of company information, and workplace safety
B) Executive salaries, affirmative action, whistle blowing, and advertising content
C) Product pricing, shareholder interests, inappropriate gifts, divestment
D) Comparable worth, sexual harassment, employee conflicts of interest, product safety
سؤال
According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:

A) Intellectual property rights
B) Whistle blowing
C) Customer and employee privacy
D) Workplace safety
سؤال
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
سؤال
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).
سؤال
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
سؤال
According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.
سؤال
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in, gigabytes out (GIGO) syndrome.
سؤال
These days, corporate antivirus protection is a centralized function of information technology.
سؤال
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:

A) Performing your role as a vital business resource by participating on every development team
B) Using the Internet only during breaks and after-work hours
C) Performing your role as a vital human resource in the business systems you help develop and use in your organization
D) Documenting all employee electronic mail usage and Internet searches
سؤال
When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.

A) social contract
B) stakeholder
C) stockholder
D) Midas
سؤال
When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.

A) social contract
B) stakeholder
C) stockholder
D) Midas
سؤال
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:

A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
سؤال
_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

A) Electronic breaking and entering
B) Sniffing
C) Snooping
D) Dumpster diving
سؤال
According to the text, companies are protecting themselves from computer crime by using:

A) Antivirus software
B) Intrusion-detection systems
C) Biometrics
D) All of the choices are correct.
سؤال
The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.

A) hacker
B) cyber-slacking
C) cracker
D) resource theft
سؤال
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:

A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
سؤال
According to the text, all of the following statements are included in the definition of computer crime except:

A) Unauthorized modification of software, data, or network resources
B) Unauthorized release of information
C) Unauthorized copying of software
D) Unauthorized distribution of public domain software
سؤال
The stakeholder theory maintains that:

A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
سؤال
Sifting through a company's garbage looking for information to help break into the company's computers; sometimes used in conjunction with social engineering is called:

A) Dumpster diving
B) Denial of service
C) A back door
D) A sniffer
سؤال
Talking unsuspecting company employees out of valuable information such as passwords is called:

A) Sniffing
B) Denial of service
C) A back door
D) Social engineering
سؤال
Which of the following best describes the ethical principle of informed consent?

A) The good achieved by technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk
B) Those affected by technology should understand and accept the risks
C) The benefits and burdens of technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk
D) Even if judged acceptable by the other guidelines, the technology must be implemented so as to avoid all unnecessary risks
سؤال
_______________ is/are the most commonly used security technology at large companies.

A) Intrusion-detection systems
B) Smart cards
C) Biometrics
D) Antivirus software
سؤال
When managers apply the _____________ theory of ethical decision making, they believe that managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company.

A) social contract
B) stakeholder
C) stockholder
D) Midas
سؤال
The social contract theory maintains that:

A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
سؤال
All of the following are AITP standards of professional conduct related to a person's obligation to society except:

A) Protect the privacy and confidentiality of all information entrusted to me
B) To the best of my ability, ensure that the products of my work are used in a socially responsible way
C) Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D) Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
سؤال
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.

A) hacking
B) cyber-slacking
C) cracking
D) resource theft
سؤال
Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:

A) A logic bomb
B) Denial of service
C) A back door
D) Social engineering
سؤال
According to the text, all the following are examples of ethical behavior by organizations, except:

A) Scheduling work breaks
B) Stockholder theory
C) Limiting exposure to computer monitors
D) Preventing hand or eye injuries
سؤال
The stockholder theory maintains that:

A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
سؤال
According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.

A) sniffers
B) snoopers
C) zombies
D) password crackers
سؤال
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.

A) flaming
B) spamming
C) spoofing
D) spying
سؤال
A _______________ is software that can guess passwords.

A) logic bomb
B) password cracker
C) back door
D) sniffer
سؤال
Good ergonomic design considers tools, tasks, the workstation, and _______________.

A) the users
B) the environment
C) the software
D) previous injuries
سؤال
Information technologies have caused a significant reduction in the following types of job opportunities, except:

A) Accounting
B) Control of machine tools
C) E-commerce directors
D) All the answers are jobs that have been reduced by information technologies
سؤال
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.

A) sniffing
B) hacking
C) phishing
D) spoofing
سؤال
Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:

A) Make privacy the default for consumers
B) Make privacy the default, if a consumer calls in to request no data sharing
C) Make sharing private information the default
D) It would match the existing policy of most Internet-based companies
سؤال
According to the text case, ________________ of people have stolen key information from work.

A) 10%
B) 20%
C) 70%
D) 80%
سؤال
Lawsuits by monitored workers against employers are:

A) increasing
B) decreasing
C) staying the same
D) no longer permitted in any of the 50 states
سؤال
To use public domain software legally, a company:

A) Must purchase individual copies or a site license for a certain number of copies
B) Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C) Can make as many copies as desired because the software is not copyrighted
D) None of the choices are correct.
سؤال
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as _______________.

A) Computer trauma disorders
B) Eyestrain
C) Carpal tunnel distress
D) Cumulative trauma disorders
سؤال
Which of the following statements about adware and spyware is true?

A) Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B) Removal programs are 100% successful, although they are very expensive
C) Adware software removes spyware software from a user's computer
D) A user must approve the downloading of adware, even if tricked into doing so
سؤال
Which of the following is not a health issue commonly related to the use of information technology in the workplace?

A) Damaged arm and neck muscles
B) Eyestrain
C) Job stress
D) Hearing loss
سؤال
Computer monitoring has been criticized as unethical because:

A) It only monitors the work being done
B) Nobody is overseeing the person doing the monitoring
C) It is outside human control
D) It monitors individuals, not just the job
سؤال
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:

A) Computer profiling and computer matching
B) Unauthorized opt-in
C) Censorship
D) Adware
سؤال
The goal of ergonomics is to design:

A) Effective work environments that are conducive to fast-paced, repetitive jobs
B) Efficient work environments that are productive and promote high morale
C) Healthy work environments that are safe, comfortable, and pleasant for people to work in
D) Policies regarding work environment structures
سؤال
All of the following are common ways for a computer virus to enter a computer system except:

A) E-mail and file attachments
B) Running antivirus programs
C) Downloaded copies of shareware
D) Borrowed copies of software
سؤال
Computer monitoring has been criticized as an invasion of employee privacy because:

A) Many times employees do not know they are being monitored
B) Employees know how the information is being used
C) It monitors the work being done
D) It is outside human control
سؤال
Software that is not copyrighted is called:

A) Shareware
B) Open source
C) Public domain
D) None of the choices are correct.
سؤال
Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.

A) flaming
B) spamming
C) spoofing
D) spying
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/116
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Security and Ethical Challenges
1
Spyware is annoying, but generally no threat to your privacy.
False
2
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
True
3
The music industry reports that illegal downloading of music and videos is a growing problem.
False
4
A malicious applet is an instruction in a computer program that triggers a malicious act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
5
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
7
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
8
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
10
A virus is a distinct program that can run unaided.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
11
Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
12
The use of information technologies is causing a significant reduction in some types of job opportunities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
13
According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cyber crime is becoming one of the Net's growth businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
15
Most companies don't reveal that they have been targets or victims of computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
16
Confidential e-mail messages are seldom monitored, although other business communication routinely is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
17
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
19
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
20
Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
21
The most widely used encryption method uses a pair of public and private keys unique to each individual.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
22
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
23
Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
24
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
25
According to the text case, monitoring employees use of email and the Internet has become commonplace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
26
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
27
Lawsuits by monitored workers against employers are increasing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
28
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
29
According to the text, information technology has caused ethical controversy in which of the following basic categories of ethical business issues?

A) Comparable worth
B) Whistle blowing
C) Workplace safety
D) Employee conflicts of interest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
30
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
31
Security monitors can control the use of the hardware, software, and data resources of a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
32
According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?

A) Intellectual property rights, customer and employee privacy, security of company information, and workplace safety
B) Executive salaries, affirmative action, whistle blowing, and advertising content
C) Product pricing, shareholder interests, inappropriate gifts, divestment
D) Comparable worth, sexual harassment, employee conflicts of interest, product safety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
33
According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:

A) Intellectual property rights
B) Whistle blowing
C) Customer and employee privacy
D) Workplace safety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
34
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
35
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
36
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
37
According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
38
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in, gigabytes out (GIGO) syndrome.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
39
These days, corporate antivirus protection is a centralized function of information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
40
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:

A) Performing your role as a vital business resource by participating on every development team
B) Using the Internet only during breaks and after-work hours
C) Performing your role as a vital human resource in the business systems you help develop and use in your organization
D) Documenting all employee electronic mail usage and Internet searches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
41
When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.

A) social contract
B) stakeholder
C) stockholder
D) Midas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
42
When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.

A) social contract
B) stakeholder
C) stockholder
D) Midas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
43
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:

A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
44
_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

A) Electronic breaking and entering
B) Sniffing
C) Snooping
D) Dumpster diving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
45
According to the text, companies are protecting themselves from computer crime by using:

A) Antivirus software
B) Intrusion-detection systems
C) Biometrics
D) All of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
46
The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.

A) hacker
B) cyber-slacking
C) cracker
D) resource theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
47
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:

A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
48
According to the text, all of the following statements are included in the definition of computer crime except:

A) Unauthorized modification of software, data, or network resources
B) Unauthorized release of information
C) Unauthorized copying of software
D) Unauthorized distribution of public domain software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
49
The stakeholder theory maintains that:

A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
50
Sifting through a company's garbage looking for information to help break into the company's computers; sometimes used in conjunction with social engineering is called:

A) Dumpster diving
B) Denial of service
C) A back door
D) A sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
51
Talking unsuspecting company employees out of valuable information such as passwords is called:

A) Sniffing
B) Denial of service
C) A back door
D) Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following best describes the ethical principle of informed consent?

A) The good achieved by technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk
B) Those affected by technology should understand and accept the risks
C) The benefits and burdens of technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk
D) Even if judged acceptable by the other guidelines, the technology must be implemented so as to avoid all unnecessary risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
53
_______________ is/are the most commonly used security technology at large companies.

A) Intrusion-detection systems
B) Smart cards
C) Biometrics
D) Antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
54
When managers apply the _____________ theory of ethical decision making, they believe that managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company.

A) social contract
B) stakeholder
C) stockholder
D) Midas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
55
The social contract theory maintains that:

A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
56
All of the following are AITP standards of professional conduct related to a person's obligation to society except:

A) Protect the privacy and confidentiality of all information entrusted to me
B) To the best of my ability, ensure that the products of my work are used in a socially responsible way
C) Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D) Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
57
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.

A) hacking
B) cyber-slacking
C) cracking
D) resource theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
58
Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:

A) A logic bomb
B) Denial of service
C) A back door
D) Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
59
According to the text, all the following are examples of ethical behavior by organizations, except:

A) Scheduling work breaks
B) Stockholder theory
C) Limiting exposure to computer monitors
D) Preventing hand or eye injuries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
60
The stockholder theory maintains that:

A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
61
According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.

A) sniffers
B) snoopers
C) zombies
D) password crackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
62
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.

A) flaming
B) spamming
C) spoofing
D) spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
63
A _______________ is software that can guess passwords.

A) logic bomb
B) password cracker
C) back door
D) sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
64
Good ergonomic design considers tools, tasks, the workstation, and _______________.

A) the users
B) the environment
C) the software
D) previous injuries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
65
Information technologies have caused a significant reduction in the following types of job opportunities, except:

A) Accounting
B) Control of machine tools
C) E-commerce directors
D) All the answers are jobs that have been reduced by information technologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
66
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.

A) sniffing
B) hacking
C) phishing
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
67
Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:

A) Make privacy the default for consumers
B) Make privacy the default, if a consumer calls in to request no data sharing
C) Make sharing private information the default
D) It would match the existing policy of most Internet-based companies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
68
According to the text case, ________________ of people have stolen key information from work.

A) 10%
B) 20%
C) 70%
D) 80%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
69
Lawsuits by monitored workers against employers are:

A) increasing
B) decreasing
C) staying the same
D) no longer permitted in any of the 50 states
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
70
To use public domain software legally, a company:

A) Must purchase individual copies or a site license for a certain number of copies
B) Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C) Can make as many copies as desired because the software is not copyrighted
D) None of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
71
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as _______________.

A) Computer trauma disorders
B) Eyestrain
C) Carpal tunnel distress
D) Cumulative trauma disorders
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following statements about adware and spyware is true?

A) Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B) Removal programs are 100% successful, although they are very expensive
C) Adware software removes spyware software from a user's computer
D) A user must approve the downloading of adware, even if tricked into doing so
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is not a health issue commonly related to the use of information technology in the workplace?

A) Damaged arm and neck muscles
B) Eyestrain
C) Job stress
D) Hearing loss
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
74
Computer monitoring has been criticized as unethical because:

A) It only monitors the work being done
B) Nobody is overseeing the person doing the monitoring
C) It is outside human control
D) It monitors individuals, not just the job
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
75
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:

A) Computer profiling and computer matching
B) Unauthorized opt-in
C) Censorship
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
76
The goal of ergonomics is to design:

A) Effective work environments that are conducive to fast-paced, repetitive jobs
B) Efficient work environments that are productive and promote high morale
C) Healthy work environments that are safe, comfortable, and pleasant for people to work in
D) Policies regarding work environment structures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
77
All of the following are common ways for a computer virus to enter a computer system except:

A) E-mail and file attachments
B) Running antivirus programs
C) Downloaded copies of shareware
D) Borrowed copies of software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
78
Computer monitoring has been criticized as an invasion of employee privacy because:

A) Many times employees do not know they are being monitored
B) Employees know how the information is being used
C) It monitors the work being done
D) It is outside human control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
79
Software that is not copyrighted is called:

A) Shareware
B) Open source
C) Public domain
D) None of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
80
Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.

A) flaming
B) spamming
C) spoofing
D) spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.