Week 6 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

9. "While employed at this company, no information obtained in the course of employment may be used to advance personal gain, including financial reward." In which of the documents below would this statement likely be found?

An employee code of conduct

2. What might members of a professional organization be doing when they refer to the organization's code of ethics?

Clarifying whether a business practice violates the code of ethics.

17. True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world.

False

18. (True/False). Making data secure means keeping it secret.

False

21. For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information. Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.

Good Practice

3. Which of the following statements would be most likely to appear in a professional association's code of ethics for its members?

I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.

10. Would the following activity likely be or not be a violation of an employee code of conduct: Tracey accepts two tickets from a supplier for a professional basketball game being played in his area.

Likely a violation

12. Would the following activity likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company's employee picnic.

Likely not a violation

14. (Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?

No

5. You make a copy of a software application CD or DVD to lend to a friend. Is this legal?

No

16. In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?

Posting photos of oneself that might be considered risque or offensive

20. (True/False). Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

True

4. (True/False). Although adults can be victims of cyberbullying, the term is most often referred to as online harassment directed toward minors.

True

7. (True/False). A friend gives you his single-user copy of a copyrighted software application program so that you can load it on your computer. Both of you are guilty of an inappropriate use of digital content sharing.

True

1. In terms of specific rules and regulations, which of these choices lists the documents in order from most specific to most general?

User access agreement, employee code of conduct, professional association code of conduct.

23. Lately, Sylvia's home computer is super slow, and it restarts and shuts down without warning. The computer probably has a __________.

Virus

13. Would the following behavior most likely be a violation of an employee code of conduct? Using your work computer to invite friends and co-workers to a party at your home.

Yes

22. (Yes/No). Would the following incident be an example of social engineering/phishing? You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver's license number and telephone number.

Yes

6. (Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?

Yes

8. Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No. To outline penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.

Yes

25. What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?

Your user ID and password.


Conjuntos de estudio relacionados

Biz 1000 - SLU - Finance & Accounting

View Set

examen cosmetologia..... coloracion 20

View Set

CJ 300 Ethics in Legal Studies Mindtap Quizzes

View Set

Video Notes - Newton's First Law

View Set

250 Foundations Comprehensive Final

View Set