Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 1
Quiz 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Question 2
True/False
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Question 3
Multiple Choice
Which of the following describes confidentiality?
Question 4
True/False
Ethics and security are two fundamental building blocks for all organizations.
Question 5
True/False
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
Question 6
True/False
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Question 7
True/False
Pirated software is software that is manufactured to look like the real thing and sold as such.
Question 8
Multiple Choice
Which of the following describes privacy?
Question 9
True/False
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
Question 10
True/False
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Question 11
Multiple Choice
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Question 12
True/False
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
Question 13
Multiple Choice
Which of the following is an example of acting ethically?
Question 14
True/False
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
Question 15
True/False
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Question 16
True/False
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
Question 17
True/False
Information governance is a method or system of government for information management or control.
Question 18
True/False
Information compliance is the act of conforming, acquiescing, or yielding information.
Question 19
True/False
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.