Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Business Driven Technology Study Set 4
Quiz 26: Accessing Organizational Informationdata Warehouses
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
A social media policy outlines the corporate guidelines or principles governing employee online communications.
Question 2
True/False
An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
Question 3
True/False
Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
Question 4
True/False
Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
Question 5
True/False
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Question 6
True/False
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
Question 7
True/False
Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
Question 8
True/False
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Question 9
True/False
Different organisations and countries have their own terms for these concerns. The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organisation for Economic Co-operation and Development (OECD) has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.
Question 10
True/False
Cybervandalism is the electronic defacing of an existing website.
Question 11
True/False
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Question 12
True/False
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
Question 13
True/False
Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Question 14
True/False
Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
Question 15
True/False
An ethical computer use policy contains general principles to guide computer user behavior.
Question 16
True/False
BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems and data; access, but with IT control over personal devices, apps, and stored data; access, but preventing local storage of data on personal devices.
Question 17
True/False
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Question 18
True/False
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Question 19
True/False
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.