Deck 3: Ethics and Privacy
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/8
العب
ملء الشاشة (f)
Deck 3: Ethics and Privacy
1
One of the most dangerous (in terms of their unethical violation of privacy) aspects of Web sites such as WikiLeaks is that their activities cannot be regulated or criminalized because they do not fall under the jurisdiction of any one nation.
True
2
If your employer clearly states in the employee handbook that work email addresses should be used for official business only and then proceeds to read all the emails you send and receive, he or she is guilty of a legal violation.
False
3
Tagging your friends' pictures on Facebook will not compromise their privacy as long as you obtain their permission.
False
4
Major scandals at Enron, WorldCom, and Tyco led to the passage of which law in 2002?
A) The Securities and Exchange Commission Act
B) The Sarbanes-Oxley Act
C) The Banking Regulation and Overhaul Act
D) The Federal Trade Commission Act
A) The Securities and Exchange Commission Act
B) The Sarbanes-Oxley Act
C) The Banking Regulation and Overhaul Act
D) The Federal Trade Commission Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
5
The legal concept that gives individuals the right to recover damages done to them by other individuals, organizations, or systems is known as:
A) Liability.
B) Responsibility.
C) Legal integrity.
D) Accountability.
A) Liability.
B) Responsibility.
C) Legal integrity.
D) Accountability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
6
Terry Childs was accused of all of the following except:
A) Creating passwords that granted him exclusive access to the system.
B)Collecting pages of user names and passwords so he could use their network login information.
C) Downloading city data to a personal encrypted storage device.
D)Sharing proprietary data with friends and colleagues.
A) Creating passwords that granted him exclusive access to the system.
B)Collecting pages of user names and passwords so he could use their network login information.
C) Downloading city data to a personal encrypted storage device.
D)Sharing proprietary data with friends and colleagues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
7
Two major conflicting issues related to privacy are ___ and ___.
A) Freedom of speech, human rights
B) Human rights, equal opportunity employment
C) Freedom of speech, national security
D) None of these
A) Freedom of speech, human rights
B) Human rights, equal opportunity employment
C) Freedom of speech, national security
D) None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
8
Using apps on your smart phones that broadcast your location to others is a harmless act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck

