Deck 13: Security and Ethical Challenges
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/119
Play
Full screen (f)
Deck 13: Security and Ethical Challenges
1
Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.
False
2
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
True
3
According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.
True
4
Confidential e-mail messages are seldom monitored, although other business communication routinely is.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
5
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
6
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
7
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
8
A malicious applet is an instruction in a computer program that triggers a malicious act.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
9
Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
10
Most companies don't reveal that they have been targets or victims of computer crime.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
11
Spyware is annoying, but generally no threat to your privacy.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
12
According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
13
The music industry reports that illegal downloading of music and videos is a growing problem.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
14
In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
15
Cyber crime is becoming one of the Net's growth businesses.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
16
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
17
According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
18
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
19
A virus is a distinct program that can run unaided.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
20
The use of information technologies is causing a significant reduction in some types of job opportunities.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
21
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in, gigabytes out (GIGO) syndrome.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
22
According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:
A) Intellectual property rights
B) Whistle blowing
C) Customer and employee privacy
D) Workplace safety
A) Intellectual property rights
B) Whistle blowing
C) Customer and employee privacy
D) Workplace safety
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
23
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
24
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
25
According to the text, information technology has caused ethical controversy in which of the following basic categories of ethical business issues?
A) Comparable worth
B) Whistle blowing
C) Workplace safety
D) Employee conflicts of interest
A) Comparable worth
B) Whistle blowing
C) Workplace safety
D) Employee conflicts of interest
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
26
According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
27
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
A) Performing your role as a vital business resource by participating on every development team
B) Using the Internet only during breaks and after-work hours
C) Performing your role as a vital human resource in the business systems you help develop and use in your organization
D) Documenting all employee electronic mail usage and Internet searches
A) Performing your role as a vital business resource by participating on every development team
B) Using the Internet only during breaks and after-work hours
C) Performing your role as a vital human resource in the business systems you help develop and use in your organization
D) Documenting all employee electronic mail usage and Internet searches
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
28
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
29
Security monitors can control the use of the hardware, software, and data resources of a computer system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
30
According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?
A) Intellectual property rights, customer and employee privacy, security of company information, and workplace safety
B) Executive salaries, affirmative action, whistle blowing, and advertising content
C) Product pricing, shareholder interests, inappropriate gifts, divestment
D) Comparable worth, sexual harassment, employee conflicts of interest, product safety
A) Intellectual property rights, customer and employee privacy, security of company information, and workplace safety
B) Executive salaries, affirmative action, whistle blowing, and advertising content
C) Product pricing, shareholder interests, inappropriate gifts, divestment
D) Comparable worth, sexual harassment, employee conflicts of interest, product safety
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
31
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
32
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
33
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
34
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
35
Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
36
Lawsuits by monitored workers against employers are increasing.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
37
The most widely used encryption method uses a pair of public and private keys unique to each individual.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
38
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
39
These days, corporate antivirus protection is a centralized function of information technology.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
40
According to the text case, monitoring employees use of email and the Internet has become commonplace.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
41
The social contract theory maintains that:
A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
42
When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.
A) social contract
B) stakeholder
C) stockholder
D) Midas
A) social contract
B) stakeholder
C) stockholder
D) Midas
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
43
Talking unsuspecting company employees out of valuable information such as passwords is called:
A) Sniffing
B) Denial of service
C) A back door
D) Social engineering
A) Sniffing
B) Denial of service
C) A back door
D) Social engineering
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
44
All of the following are AITP standards of professional conduct related to a person's obligation to society except:
A) Protect the privacy and confidentiality of all information entrusted to me
B) To the best of my ability, ensure that the products of my work are used in a socially responsible way
C) Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D) Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
A) Protect the privacy and confidentiality of all information entrusted to me
B) To the best of my ability, ensure that the products of my work are used in a socially responsible way
C) Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D) Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
45
_______________ is/are the most commonly used security technology at large companies.
A) Intrusion-detection systems
B) Smart cards
C) Biometrics
D) Antivirus software
A) Intrusion-detection systems
B) Smart cards
C) Biometrics
D) Antivirus software
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
46
The stakeholder theory maintains that:
A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
47
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:
A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
48
According to the text, all of the following statements are included in the definition of computer crime except:
A) Unauthorized modification of software, data, or network resources
B) Unauthorized release of information
C) Unauthorized copying of software
D) Unauthorized distribution of public domain software
A) Unauthorized modification of software, data, or network resources
B) Unauthorized release of information
C) Unauthorized copying of software
D) Unauthorized distribution of public domain software
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
49
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.
A) hacking
B) cyber-slacking
C) cracking
D) resource theft
A) hacking
B) cyber-slacking
C) cracking
D) resource theft
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following best describes the ethical principle of informed consent?
A) The good achieved by technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk
B) Those affected by technology should understand and accept the risks
C) The benefits and burdens of technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk
D) Even if judged acceptable by the other guidelines, the technology must be implemented so as to avoid all unnecessary risks
A) The good achieved by technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk
B) Those affected by technology should understand and accept the risks
C) The benefits and burdens of technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk
D) Even if judged acceptable by the other guidelines, the technology must be implemented so as to avoid all unnecessary risks
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
51
The stockholder theory maintains that:
A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
A) Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
B) Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C) Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
D) Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
52
According to the text, all the following are examples of ethical behavior by organizations, except:
A) Scheduling work breaks
B) Stockholder theory
C) Limiting exposure to computer monitors
D) Preventing hand or eye injuries
A) Scheduling work breaks
B) Stockholder theory
C) Limiting exposure to computer monitors
D) Preventing hand or eye injuries
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
53
When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
A) social contract
B) stakeholder
C) stockholder
D) Midas
A) social contract
B) stakeholder
C) stockholder
D) Midas
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
54
The text defines a ________________ as a person who maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage, not revealing them to either the general public or the manufacturer for correction.
A) hacker
B) cyber-slacking
C) cracker
D) resource theft
A) hacker
B) cyber-slacking
C) cracker
D) resource theft
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
55
When managers apply the _____________ theory of ethical decision making, they believe that managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company.
A) social contract
B) stakeholder
C) stockholder
D) Midas
A) social contract
B) stakeholder
C) stockholder
D) Midas
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
56
_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
A) Electronic breaking and entering
B) Sniffing
C) Snooping
D) Dumpster diving
A) Electronic breaking and entering
B) Sniffing
C) Snooping
D) Dumpster diving
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
57
Sifting through a company's garbage looking for information to help break into the company's computers; sometimes used in conjunction with social engineering is called:
A) Dumpster diving
B) Denial of service
C) A back door
D) A sniffer
A) Dumpster diving
B) Denial of service
C) A back door
D) A sniffer
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
58
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:
A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
A) Informed consent
B) Justice
C) Minimized risk
D) Proportionality
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
59
According to the text, companies are protecting themselves from computer crime by using:
A) Antivirus software
B) Intrusion-detection systems
C) Biometrics
D) All of the choices are correct.
A) Antivirus software
B) Intrusion-detection systems
C) Biometrics
D) All of the choices are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
60
Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:
A) A logic bomb
B) Denial of service
C) A back door
D) Social engineering
A) A logic bomb
B) Denial of service
C) A back door
D) Social engineering
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
61
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:
A) Computer profiling and computer matching
B) Unauthorized opt-in
C) Censorship
D) Adware
A) Computer profiling and computer matching
B) Unauthorized opt-in
C) Censorship
D) Adware
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
62
The goal of ergonomics is to design:
A) Effective work environments that are conducive to fast-paced, repetitive jobs
B) Efficient work environments that are productive and promote high morale
C) Healthy work environments that are safe, comfortable, and pleasant for people to work in
D) Policies regarding work environment structures
A) Effective work environments that are conducive to fast-paced, repetitive jobs
B) Efficient work environments that are productive and promote high morale
C) Healthy work environments that are safe, comfortable, and pleasant for people to work in
D) Policies regarding work environment structures
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
63
Lawsuits by monitored workers against employers are:
A) increasing
B) decreasing
C) staying the same
D) no longer permitted in any of the 50 states
A) increasing
B) decreasing
C) staying the same
D) no longer permitted in any of the 50 states
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
64
A _______________ is software that can guess passwords.
A) logic bomb
B) password cracker
C) back door
D) sniffer
A) logic bomb
B) password cracker
C) back door
D) sniffer
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
65
To use public domain software legally, a company:
A) Must purchase individual copies or a site license for a certain number of copies
B) Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C) Can make as many copies as desired because the software is not copyrighted
D) None of the choices are correct.
A) Must purchase individual copies or a site license for a certain number of copies
B) Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C) Can make as many copies as desired because the software is not copyrighted
D) None of the choices are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is not a health issue commonly related to the use of information technology in the workplace?
A) Damaged arm and neck muscles
B) Eyestrain
C) Job stress
D) Hearing loss
A) Damaged arm and neck muscles
B) Eyestrain
C) Job stress
D) Hearing loss
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
67
According to the text case, ________________ of people have stolen key information from work.
A) 10%
B) 20%
C) 70%
D) 80%
A) 10%
B) 20%
C) 70%
D) 80%
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
68
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as _______________.
A) Computer trauma disorders
B) Eyestrain
C) Carpal tunnel distress
D) Cumulative trauma disorders
A) Computer trauma disorders
B) Eyestrain
C) Carpal tunnel distress
D) Cumulative trauma disorders
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
69
All of the following are common ways for a computer virus to enter a computer system except:
A) E-mail and file attachments
B) Running antivirus programs
C) Downloaded copies of shareware
D) Borrowed copies of software
A) E-mail and file attachments
B) Running antivirus programs
C) Downloaded copies of shareware
D) Borrowed copies of software
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
70
Software that is not copyrighted is called:
A) Shareware
B) Open source
C) Public domain
D) None of the choices are correct.
A) Shareware
B) Open source
C) Public domain
D) None of the choices are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
71
According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.
A) sniffers
B) snoopers
C) zombies
D) password crackers
A) sniffers
B) snoopers
C) zombies
D) password crackers
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
72
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.
A) sniffing
B) hacking
C) phishing
D) spoofing
A) sniffing
B) hacking
C) phishing
D) spoofing
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
73
Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.
A) flaming
B) spamming
C) spoofing
D) spying
A) flaming
B) spamming
C) spoofing
D) spying
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
74
Computer monitoring has been criticized as an invasion of employee privacy because:
A) Many times employees do not know they are being monitored
B) Employees know how the information is being used
C) It monitors the work being done
D) It is outside human control
A) Many times employees do not know they are being monitored
B) Employees know how the information is being used
C) It monitors the work being done
D) It is outside human control
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following statements about adware and spyware is true?
A) Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B) Removal programs are 100% successful, although they are very expensive
C) Adware software removes spyware software from a user's computer
D) A user must approve the downloading of adware, even if tricked into doing so
A) Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B) Removal programs are 100% successful, although they are very expensive
C) Adware software removes spyware software from a user's computer
D) A user must approve the downloading of adware, even if tricked into doing so
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
76
Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:
A) Make privacy the default for consumers
B) Make privacy the default, if a consumer calls in to request no data sharing
C) Make sharing private information the default
D) It would match the existing policy of most Internet-based companies
A) Make privacy the default for consumers
B) Make privacy the default, if a consumer calls in to request no data sharing
C) Make sharing private information the default
D) It would match the existing policy of most Internet-based companies
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
77
Information technologies have caused a significant reduction in the following types of job opportunities, except:
A) Accounting
B) Control of machine tools
C) E-commerce directors
D) All the answers are jobs that have been reduced by information technologies
A) Accounting
B) Control of machine tools
C) E-commerce directors
D) All the answers are jobs that have been reduced by information technologies
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
78
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.
A) flaming
B) spamming
C) spoofing
D) spying
A) flaming
B) spamming
C) spoofing
D) spying
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
79
Computer monitoring has been criticized as unethical because:
A) It only monitors the work being done
B) Nobody is overseeing the person doing the monitoring
C) It is outside human control
D) It monitors individuals, not just the job
A) It only monitors the work being done
B) Nobody is overseeing the person doing the monitoring
C) It is outside human control
D) It monitors individuals, not just the job
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
80
Good ergonomic design considers tools, tasks, the workstation, and _______________.
A) the users
B) the environment
C) the software
D) previous injuries
A) the users
B) the environment
C) the software
D) previous injuries
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck