exam1+2 t/f quizlet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/160

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

161 Terms

1
New cards

An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.

False

2
New cards

Because an activity is defined as legal, the activity is also considered ethical.

False

3
New cards

The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.

False

4
New cards

The board of directors of an organization is normally responsible for day-to-day management and operations of the organization.

False

5
New cards

Legal acts conform to what an individual believes to be the right thing to do.

False

6
New cards

Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.

False

7
New cards

Compliance means to be in conformance with a profession's core body of knowledge.

False

8
New cards

The internal audit department includes members of the board of directors who determine that the internal systems and controls of the organization are adequate and effective.

False

9
New cards

When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient almost always coincide.

False

10
New cards

A breach of the duty of care is defined as a failure to conform to the code of ethics of a professional organization.

False

11
New cards

Government licensing of IT workers is common within most of the states of the United States.

False

12
New cards

The Foreign Corrupt Practices Act is a legally binding global treaty to fight bribery and corruption.

False

13
New cards

The United Nations Convention Against Corruption makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office.

False

14
New cards

A spear phishing attach typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.

False

15
New cards

Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

False

16
New cards

Computer forensics is such a new field that there is little training or certification processes avalible.

False

17
New cards

Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.

False

18
New cards

The Fifth Amendment regulates the collection of the content of wire and electronic communications.

False

19
New cards

The cost of creating an email campaign for a product or service is typically more expensive and takes longer to conduct than a direct-mail campaign.

False

20
New cards

The U.S. has a single, overarching national data privacy policy.

False

21
New cards

Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.

False

22
New cards

Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.

False

23
New cards

A pen register is a device that records the originating number of incoming calls for a particular phone number.

False

24
New cards

The rights assigned to parents by the Family Educational Rights and Privacy Act transfer to the student once the student reaches the age of 21.

False

25
New cards

Title III of the Wiretap Act allows state and federal law enforcement officials to use wiretapping without requiring them to obtain warrants.

False

26
New cards

The USA PATRIOT Act grants citizens the right to access certain information and records of federal, state, and local governments upon request.

False

27
New cards

The plaintiff in a strategic lawsuit against public participation (SLAPP) can present themselves to the court admitting that their intent is to censor their critics.

False

28
New cards

Free-speech advocates believe that purchasing adult pornographic material is illegal and wrong even for consenting adults.

False

29
New cards

Anti-SLAPP laws are designed to protect children from pornography.

False

30
New cards

The Fifth Amendment protects American's rights to freedom of religion and freedom of expression.

False

31
New cards

An oral defamatory statement is libel.

False

32
New cards

Anonymity on the Internet is practically guaranteed.

False

33
New cards

A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country.

False

34
New cards

Phishing frequently leads consumers to counterfeit websites designed to trick them into initiating a denial-of-service attack.

False

35
New cards

Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.

False

36
New cards

A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

True

37
New cards

Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment.

True

38
New cards

In the business world, important decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.

True

39
New cards

The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.

True

40
New cards

Increasingly, managers are including ethical conduct as part of an employee's performance appraisal.

True

41
New cards

Ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the CEO.

True

42
New cards

Consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization—that it will behave in the future much as it has in the past.

True

43
New cards

Setting corporate social responsibility (CSR) goals encourages an organization to achieve higher moral and ethical standards.

True

44
New cards

The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong.

True

45
New cards

While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.

True

46
New cards

There are many industry association certifications in a variety of IT-related subject areas.

True

47
New cards

Gifts come with no expectation of a future favor for the donor.

True (if people actually follow the rules)

48
New cards

Vendor certifications require passing a written exam, which usually contains multiple-choice questions because of legal concerns about whether other types of exams can be graded objectively.

True

49
New cards

There is potential conflict of interest when IT consultants or auditors recommend their own products and services or those of an affiliated vendor or remedy a problem they have detected.

True

50
New cards

Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.

True

51
New cards

Today's computer menace is much better organized and may be part of an organized group.

True

52
New cards

The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.

True

53
New cards

It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.

True

54
New cards

Through the use of cookies, a Web site is able to identify visitors on subsequent visits.

True

55
New cards

The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.

True

56
New cards

The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.

True

57
New cards

The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.

True

58
New cards

Electronically stored information includes any form of digital information stored on any form of electronic storage device.

True

59
New cards

In general, the closer an Internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will apply.

True

60
New cards

Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First amendment.

True

61
New cards

Private schools may prohibit students, instructors, and other employees from engaging in offensive speech.

True

62
New cards

A strategic lawsuit against public participation (SLAPP) is typically without merit.

True

63
New cards

The right to freedom of expression is restricted when the expressions, whether spoken or written, are untrue and cause harm to another person.

True

64
New cards

With URL filtering, a particular URL or domain name is identified as an objectionable site and the user is not allowed access to it.

True

65
New cards

Anti-SLAPP laws can identify whether there are any merits to a lawsuit.

True

66
New cards

Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity laws.

True

67
New cards

Most countries other than the United States do not provide constitutional protection for hate speech.

True

68
New cards

Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain cases.

True

69
New cards

Even when preventative measures are implemented, no organization is completely secure from a determined computer attack.

True

70
New cards

The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.

False

71
New cards

The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.

False

72
New cards

A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.

False

73
New cards

The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.

False

74
New cards

A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

False

75
New cards

Industrial espionage and competitive intelligence are essentially the same.

False

76
New cards

Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.

False

77
New cards

Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.

False

78
New cards

From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is 50.

False

79
New cards

When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.

False

80
New cards

In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.

False

81
New cards

Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.

False

82
New cards

Software developers do not typically work closely with safety and software engineers.

False

83
New cards

When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.

False

84
New cards

Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

False

85
New cards

In integration testing, special software programs called static analyzers are run against the new code.

False

86
New cards

In the early days of IT in the 1960s, productivity improvements were difficult to measure.

False

87
New cards

Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.

False

88
New cards

Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.

False

89
New cards

Effective use of CDS (Clinical Decision Support) systems increases the quality of patient care but at the expense of rising healthcare costs.

False

90
New cards

Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.

False

91
New cards

Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.

False

92
New cards

It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms.

False

93
New cards

Lifestyle changes have led to a decrease in chronic illnesses such as diabetes and heart disease, that are expensive and difficult to treat.

False

94
New cards

Live telemedicine requires the presence of patients and healthcare providers at the same site.

False

95
New cards

The information in the EHR is not easily shared with others outside of the healthcare organization where the data originated.

False

96
New cards

It usually takes less than two years for IT to result in a significant increase in productivity in large firms.

False

97
New cards

Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes heart disease, that are expensive and difficult to treat.

False

98
New cards

Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.

False

99
New cards

MySpace is the most popular social network destination worldwide.

False

100
New cards

The goal of viral marketing is to spread rumors and innuendo about a rival's product that will hurt its image.

False