Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Study Set 6
Quiz 11: Systems Development and Project Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
In the United States,opt-out is the default position,whereas in Europe consumers must opt-in or their personal information cannot be used.
Question 22
True/False
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints,voice,or other physical trait.
Question 23
True/False
People who sit at PC workstations or visual display terminals in fast-paced,repetitive-keystroke jobs can suffer from a variety of health problems,known collectively as computer trauma disorders (CTDs).
Question 24
True/False
Security monitors can control the use of the hardware,software,and data resources of a computer system.
Question 25
True/False
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
Question 26
True/False
According to the text case,ETrade is more concerned with the security of their information than with the costs of computer hardware.
Question 27
True/False
In some systems,the password to read the contents of a file is different from that required to write to a file (change its contents).
Question 28
True/False
According to the text case,monitoring employees use of email and the Internet has become commonplace.
Question 29
Multiple Choice
As a business professional,you have a responsibility to promote ethical uses of information technology in the workplace.This responsibility includes:
Question 30
True/False
The most widely used encryption method uses a pair of public and private keys unique to each individual.
Question 31
True/False
Lawsuits by monitored workers against employers are increasing.
Question 32
True/False
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
Question 33
True/False
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
Question 34
Multiple Choice
When managers apply the _____________ theory of ethical decision making,they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.