Filters
Question type

Study Flashcards

Describe the relationship between an email privacy policy and the Internet use policy.

Correct Answer

verifed

verified

Organizations can mitigate the risks of ...

View Answer

Ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

What is the assurance that messages and information remain available only to those authorized to view them?


A) Confidentiality
B) Pirated software
C) Counterfeit software
D) Privacy

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and Internet usage in the ___________ environment.

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents?


A) Ethics
B) Intellectual property
C) Copyright
D) Privacy

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.

Correct Answer

verifed

verified

What are the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Copyright
D) Privacy

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which policy typically contains a nonrepudiation clause?


A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of these

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

The _________ Act restricts what information the federal government can collect.

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.


A) informed; collaborate
B) consent; informed
C) informed; consent
D) None of these

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

What is software that is manufactured to look like the real thing and sold as such?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form?


A) Ethics
B) Intellectual property
C) Copyright
D) Confidentiality

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?


A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

____________ are the principles and standards that guide our behavior toward other people.

Correct Answer

verifed

verified

A(n)____________ privacy policy details the extent to which email messages may be read by others.

Correct Answer

verifed

verified

Which of the following is not included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 68

Related Exams

Show Answer