Filters
Question type

Study Flashcards

Which act protects investors by improving the accuracy and reliability of corporate disclosures?


A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?


A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not considered an ePolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Security badge policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A

Describe the important ethical concepts steaming from information technology.

Correct Answer

verifed

verified

Intellectual property-intangible creativ...

View Answer

_________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.

Correct Answer

verifed

verified

What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) All of the above
F) None of the above

Correct Answer

verifed

verified

If an organization were to have only one policy, which one would it want?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which act allows any person to examine government records unless it would cause an invasion of privacy?


A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A(n) ____________ computer use policy contains general principles to guide computer user behavior.

Correct Answer

verifed

verified

Which act restricts what information the federal government can collect?


A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Correct Answer

verifed

verified

Which act strengthened criminal laws against identity theft?


A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What are the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Copyright
D) Privacy

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Hardware key logger
C) Cookie
D) Adware

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

B

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of the above

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

B

Showing 1 - 20 of 71

Related Exams

Show Answer