1/116
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?
The Utilitarian Principle
Computer ethics violations fall in two major categories; illegal activity and organizational _______violations.
policy
Along with the employee, which of the following is most responsible for an employee's ethical behavior?
managment
Under what circumstance should you report a computer ethics violation to your employer?
You pass a co-worker's computer screen and see him surfing through child pornography.
Managers must protect the online ___ of employees and organization stakeholders.
privacy
Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is Blank______.
The principle of distributive justice
Select three correct statements regarding international Internet privacy laws.
-International laws on Internet privacy vary greatly.
-The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.
-It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.
This principle states that a manager must attempt to determine if this decision is fair for all involved.
The Universalist Principle
This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the Blank______ principle.
Utilitarian
With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because Blank______
it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.
Select two ways managers encourage employees to act unethically.
By not enforcing strong ethical behavior.
By failing to act ethically themselves.
Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.
-Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet.
-Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings.
-Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material.
A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet Blank______.
privacy
The Cybersecurity Information _____Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.
sharing
Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.
true
Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.
The Electronic Communications Privacy Act
The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the______ principle.
universalist
The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct _____.
Terrorism
Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because Blank______ .
the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.
The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:
The Digital Millennium Copyright Act (DMCA)
The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information _______Management Act (FISMA).
security
Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?
The Cybersecurity Information Sharing Act
The Act that protects person-to-person wire, oral, and electronic communications is Blank______.
The Wiretap Act
The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications ______Act.
privacy
Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.
The US PATRIOT Act/USA Freedom Act
This is a small text file of information created by websites you visit that your web browser stores on your hard disk.
cookie
With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because _______
it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
session
This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.
The Federal Information Security Management Act
Cookies are stored on the hard drive and are not lost when the web browser is closed are called Blank______ cookies
Persistent
The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The _____Act.
Wiretap
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as Blank______ cookies.
third-party
Small text files created by websites you visit that your web browser stores on your hard disk are called_____
cookies
In the settings area of each browser you should consider adjusting which three of the following?
-Blocking or customizing your cookie settings
-Deciding from which sites you want to allow cookies
-Deleting cookies
A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a _____cookie.
session
A form of spyware that records all actions typed on a keyboard is called a __ logger.
Keystroke
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called __ cookies.
Persistent
A checkbox may ask if you want to receive news and updates, or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an Blank______.
Opt-in and Opt-out
The Act that protects person-to-person wire, oral, and electronic communications is______
The Wiretap Act
1. Invention-
2. Novel-
3. Logo-
1. -Patent
2. -Copyright
3. -Trademark
Select three privacy concerns associated with cookies.
-Corporate and government entities can use cookies to monitor your surfing behavior.
-Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties.
-Websites can use cookies to track your surfing behavior and use this information to create specific user profiles.
Which two of the following can be awarded copyright protection?
Sculptures
Choreography
Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).
False
When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a _____.
patent
Keystroke loggers and packet analyzers (sniffers) are two common types of ____
spyware
Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.
structured
If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) _________-in.
opt
Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?
Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.
An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.
Property rights that allow creators to profit from their work, thereby encouraging creativity, are called _______property rights.
intellectual
Insurance companies use big ______in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.
data
A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _______
copyright
Having a customer fill out a survey
direct inquiry
Using cookies to follow a customer's search history
indirect tracking
Buying a list of potential customers from an outside agency
Third party data purchase
Select the three correct statements regarding patents.
A patent will only be granted for something that is useful.
To qualify for a patent, the invention must be novel, or different, from other similar inventions.
To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected.
Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as Blank______ data.
structured
Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use _____data.
big
Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings.
loan default
When you order a pizza online and are asked to provide your address, the company stores this information. This manner of data collection is referred to as ___.
direct inquiry
Select three common methods in which organizations collect data.
Third-party data purchase
Direct inquiry
Indirect tracking
A Wi-Fi tracker follows a shopper's path from store to store.
indirect tracking
Select the two major types of patents.
Design
Utility
Companies that purchase consumer behavior information from other organizations are engaged in ___.
Third party data purchase
A major transition in the big data security sector is to move all data storage to ____storage.
cloud
These programs use a variety of techniques to identify and remove viruses and malware.
Anti-virus software
This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.
Private browsing
This essentially hides your IP address to outside websites by running your communications through a secure network.
Virtual private network (VPN)
Checking your FICO score from each different agency every four months and watching for unusual activity.
Credit monitoring
Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as ______ inquiry
direct
Kevin needs to create a password to access his bank's online banking system. He is considering the passwords below. Which is most secure?
Sxf6512@fg%
Select two common methods of using indirect tracking to gather data.
A cookie tracks your purchasing searches
A mobile game app uploads your phone's browser activity
Select two common techniques used by anti-virus software to identify malware.
Heuristic-based detection
Signature-based detection
You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called Blank______.
Third party data purchase
Which three of the following are widely used tactics that can help keep you safe on the Web?
Make sure the sites you visit use HTTPS if entering personal information
Use your browser's private browsing mode.
Consider using a VPN
Many businesses have reduced the likelihood of experiencing an expensive data breach by moving data storage to __
major cloud storage service providers such as Amazon Web Services.
Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal ______while using the Internet.
privacy
To determine the interest rate you will be charged or the amount of money you are qualified to borrow, lenders will check your ___.
credit report
Wyatt needs a password for his school's email system. Of the following, which password is the most secure?
Xj9%ft7y
Which of the following is a primary ethical concern with the use of AI in business?
AI may perpetuate biases based on biased data sources.
A computer program that scans files to identify and remove computer viruses and other malicious programs is called Blank______.
Antivirus software
What does the EU's Artificial Intelligence Act primarily focus on?
Protecting intellectual property and personal data privacy
Select two reasons why a credit card offers more protection than a debit card when shopping online.
With a credit card you have a layer of security between your cash and hackers on the Internet.
Using your debit card can give hackers direct access to your checking accounts.
In the European Union's AI Act, which of the following AI risks is categorized as "Unacceptable Risk"?
Social scoring systems
A major transition in the big data security sector is to move all data storage to ____ storage.
cloud
If you believe you are at significant risk of fraud, for example, if you have been the victim of a data breach, you should consider purchasing ______monitoring.
credit
Which two of the following are risks associated with the use of AI in business?
AI may cause employees to become overly reliant on the software, leading to skill atrophy.
AI may perpetuate biases based on the data it has been trained on.
Which three of the following are challenges associated with the AI-driven data-mining process?
Data transparency.
Privacy protection in highly connected environments.
Obtaining user consent.
What is one of the primary challenges businesses face when attempting to create ethical guidelines for the use of AI in the workplace?
The rapid pace of AI technology changes
Select three true statements regarding protecting big data.
Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses.
One advantage of cloud storage is that it greatly reduces the human factor in data protection.
Over half of all data breaches can be traced to human error.
Which dimension of ethical behavior in the digital age is represented by the following question?
You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?
Multiple choice question.
Information Privacy Rights
After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .
determine the affected
Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .
Cryptocurrency
The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.
Standards
Which three of the following are considered intellectual property and entitled to protection?
A mural that you painted.
A story that you published.
A song that you wrote.
Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.
Only report incidences that you have personally witnessed.
Be brief and remember that your employer probably did not hire you monitor inappropriate computer use.
The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to _____and accountability.
control
The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ .
listing options
Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ______
The principle of distributive justice
With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ______
it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.
When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a _____
patent