Filters
Question type

Study Flashcards

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?


A) Ethics
B) Intellectual property
C) Copyright
D) Privacy

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.

Correct Answer

verifed

verified

Different monitoring technologies includ...

View Answer

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

A(n) ___________ privacy policy contains general principles regarding information privacy.

Correct Answer

verifed

verified

What is software that is manufactured to look like the real thing and sold as such?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is the policy that contains general principles to guide computer user behavior?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of the above

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is part of the acceptable use policy stipulations?


A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?


A) Ethics
B) ePolicies
C) All of the above
D) None of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Describe the relationship between an email privacy policy and in Internet use policy.

Correct Answer

verifed

verified

Organizations can mitigate the risks of ...

View Answer

Which of the following is part of the acceptable use policy stipulations?


A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

Which policy typically contains a nonrepudiation clause?


A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is the assurance that messages and information remain available only to those authorized to view them?


A) Confidentiality
B) Pirated software
C) Counterfeit software
D) Privacy

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?


A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

Correct Answer

verifed

verified

Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Correct Answer

verifed

verified

____________ are the principles and standards that guide our behavior toward other people.

Correct Answer

verifed

verified

What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?


A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 71

Related Exams

Show Answer