Business Ethics exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

17. Public policies and government regulations are shaped by

A. Business. B. Special interest groups. C. Government. D. All of the above.

17. The unspoken understanding among employees of what is and is not acceptable behavior is called

A. Ethical climate. B. Efficiency. C. Success. D. Rites and rituals.

25. Which of the following is not a constituency-building strategy tool?

A. Expert witness testimony. B. Advocacy advertising. C. Public relations. D. Legal challenges.

26. Software piracy is a major problem in which part of the world?

A. Globally. B. North America only. C. Asia only. D. North America and Asia.

19. In the nomadic-agrarian phase of technology in society, people

A. Hunted wild animals for meat. B. Gathered wild plants for food. C. Provided services. D. Both A and B, but not C.

24. The purpose of the right to be forgotten is to

A. Increase protection of privacy and personal information. B. Protect property rights. C. Protect intellectual property. D. Prevent software privacy.

45. Companies that cultivate a vision of sustainability must adopt sophisticated strategic planning techniques to

A. Increase the competitive advantage of other global organizations. B. Detect the limited number of internal factors that influence the employee performance reviews. C. Allow their top manager to assess the full range of the firm's effects on the environment. D. Increase the number of government regulations that are passed to reduce pollution

34. Which stage of corporate environmental responsibility focuses on the full life cycle of a product?

A. Pollution prevention stage. B. Clean technology stage. C. Product stewardship stage. D. Green management stage.

33. General Electric's "Ecomagination" effort to invest in clean technology is an example of

A. Pollution prevention. B. Product stewardship. C. Clean technology. D. None of the above.

45. Which country recently enacted new laws to counter bribery and corruption?

A. Russia. B. Somalia. C. Brazil. D. Argentina.

26. Which of the following countries is not one of the top 15 Internet users?

A. Singapore. B. United Kingdom. C. China. D. United States.

38. Some argue that publishing personal DNA sequencing results is unethical because

A. The results could compromise one's employment situation. B. Life insurance could be denied. C. The cost of health insurance could rise. D. All of the above.

16. The core components upon which a company's ethical performance depends include

A. The values and virtues of the managers. B. The personal character of the managers and employees. C. The traditions, attitudes, and business practices built into a company's culture. D. All of the above.

37. Which of these statements accurately describe hacktivists known as grey hatters?

A. They always work in tight-knit groups. B. They are highly welcomed by businesses. C. They seek retaliation on businesses. D. They seek media attention and profits.

33. Which of these statements is (are) true about the group known as Anonymous?

A. They are a tightly bonded group of hacktivists. B. They are distinguished by masks with an over-sized smile and red cheeks. C. They supported WikiLeaks and the Occupy movement. D. Both B and C, but not A.

31. Businesses promote an information strategy by inviting government leaders to

A. Visit local plant facilities. B. Attend company award ceremonies. C. Give speeches to employees. D. All of the above.

43. This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks

A. Cyberattack Awareness Day. B. Anti-cyber International. C. International Defense Against Web Attacks (IDAWA). D. Data Privacy Day.

22. We are currently in which phase in the development of technology?

A. Industrial. B. Service. C. Information. D. Semantic.

32. M-Commerce is facilitated primarily by

A. Lap-tops. B. Personal computers. C. Mobile or cell phones. D. The government.

39. In 2013 what percentage of large firms issued triple bottom line reporting in a single document?

A. 10 percent. B. 45 percent. C. 72 percent. D. 93 percent.

39. In 2014, the percentage of Americans who believed that stem-cell research is morally acceptable was

A. 52 percent. B. 60 percent. C. 65 percent. D. 27 percent.

18. Proponents of business as a political participant argue

A. A pluralistic system invites many participants. B. It is business's constitutional right to be involved. C. Business is a vital stakeholder of government. D. Both A and C, but not B.

19. Which of the following statements is not true with respect to acid rain?

A. A primary source of acid rain is coal-fired utilities. B. Acid rain occurs when carbon dioxide combines with water vapor in the atmosphere. C. Acid rain is worse in some regions of the United States than others. D. Acid rain degrades buildings.

38. Sustainability leaders have found that the most effective environmental management approach involves

A. A team of line managers from across the business organization. B. Leadership from top-level executives who make all corporate decisions. C. Only shareholders. D. An engaged board of directors that dictates strategy.

39. When a business seeks to overturn a law after it has been passed or threatens to challenge the legal legitimacy of the new regulation in the courts, this is called

A. Accumulating. B. Overturn lobbying. C. Legal challenges. D. Funneling.

34. Most ethics or compliance officers are generally entrusted to

A. Act as a liaison between the company and the Securities and Exchange Commission. B. Reduce the risks to the company of employee misconduct. C. Annually distribute copies of the company's code of ethics to all interested stakeholders. D. Arrange for ethics training for employees at a nearby university.

42. Which of the following is not a role of the CIO?

A. Acting as lead security officer. B. Educating the organization about technology initiatives. C. Marketing technology projects to stakeholders. D. Monitoring the appropriate level of employee headcount.

20. The phase of technology that focuses on building material goods and manual labor is

A. Agrarian. B. Service. C. Industrial. D. Information.

18. Which of the following statements is true of air pollution?

A. Air pollution occurs when more pollutants are emitted into the atmosphere than can be safely absorbed and diluted by natural processes. B. A majority of the people in the U.S. breathe unsafe air for at least part of the year. C. Air pollution caused by particulate matter is responsible for fewer than 600 premature or unnecessary deaths annually. D. The EPA has identified hundreds of "criteria" pollutants, relatively common harmful substances that serve as indicators of overall levels of air pollution.

17. In the United States, the federal government regulates which of the following major areas of environmental protection?

A. Air pollution. B. Water pollution. C. Land pollution. D. All of the above.

20. In 2013, North Korea opened Internet access to which group of people?

A. All of its natural citizens. B. South Korean residents. C. Foreigners using mobile devices and laptops. D. Investors of Koryolink, a state-owned telecommunications company.

34. Which of these statements accurately describes a Super PAC?

A. Allows limited contributions from unions. B. Allows limited contributions from individuals. C. Is also called the dependent expenditure-only committee. D. Does not allow direct contributions to candidates or political parties.

35. Dark money refers to

A. Anonymous contributions to for-profit organizations. B. Money collected illegally by PACs. C. Soft money. D. Undisclosed contributions to tax-exempt organizations.

41. Recipients of the corporate ethics awards show that

A. Awards are based on economic power, not ethical performance. B. Firms can be financially successful and ethically focused. C. Being legally compliant results in receiving an ethics award. D. Improving ethical performance is very costly, but bolsters a firm's reputation.

25. A technological application that uses biological systems or living organisms to make or modify products or processes for specific use is called

A. Biosphere outcome. B. Metatechnology. C. Biology. D. Biotechnology.

33. A pain or numbness in your thumbs caused by constant e-mailing, messaging, or Internet surfing on hand-held devices is called

A. BlackBerry thumb. B. Cell phone thumb. C. PDA thumb. D. None of the above.

22. To influence government policymakers' actions, an information strategy involves

A. Business leaders speaking before government policymakers. B. Government policymakers hiring special interest groups for fact-finding projects. C. Businesses listening to government policymakers in order to develop a corporate strategy. D. Gaining support from other affected organizations.

28. Building ethical safeguards into a company's everyday routines is called

A. Change management. B. Justifying ethics. C. Institutionalizing ethics. D. Ethical awareness.

40. In a study of CIOs from around the world, McKinsey & Company found that most CIOs reported to their

A. Chief executive officer. B. Chief financial officer. C. Chief operating officer. D. Managing supervisor.

39. A CIO is the company's

A. Chief intelligence officer. B. Chief information officer. C. Coordinator of international operations. D. Controller of internal overhead.

28. Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones

A. China. B. Japan. C. United Kingdom. D. Germany.

18. The self-reinforcing feature of technology means that

A. Civilization develops at an uncontrollable pace. B. Developing economies demand newer and larger innovations. C. Technology acts as a multiplier to encourage is own faster development. D. An invention in one place is localized only.

43. The typical public affairs executive spends most of the day

A. Coalition building. B. Direct lobbying. C. Fund raising. D. All of the above.

27. The process of firms buying and selling the right to pollute is an example of which type of environmental regulation?

A. Command. B. Control. C. Market-based. D. Emissions charges.

41. Some researchers believe that business firms moving towards ecological sustainability results in

A. Competitive advantages. B. Decreased worker productivity. C. More government regulation. D. Less money for shareholders.

18. The primary reason that governments try to keep pace with technology is to

A. Control the speed of innovation. B. Manage the cost of technology. C. Ensure that the public is protected. D. Avoid threats to individuals.

31. Environmental regulations stimulate some sectors of the economy by

A. Creating jobs in industries like environmental consulting, asbestos abatement, and instrument manufacturing. B. Saving jobs in industries like fishing and tourism when natural areas are protected or restored. C. Compelling businesses to become more efficient by conserving energy. D. All of the above.

17. How has the increase in information technology affected criminal activities globally?

A. Crime has remained about the same. B. Crime has decreased due to better monitoring efforts. C. The need for government cooperation has been reduced. D. New mechanisms for stealing data, trafficking contraband and laundering money have emerged.

26. Ethical challenges for information technology employees include

A. Data privacy. B. Laptop speed. C. Copyright protection. D. Both A and C, but not B.

33. Ethics policies typically cover all of the following issues except

A. Developing guidelines for accepting or refusing gifts from suppliers. B. Encouraging discriminatory personnel practices. C. Avoiding conflict of interest. D. Maintaining the security of proprietary information.

28. Which of the following is (are) true about emission fees?

A. Each business is charged for the undesirable pollution that it emits. B. Companies emitting more pollutants end up paying more pollution taxes. C. Revenues from emission fees can be used to support environmental efforts. D. All of the above.

35. Being able to continue their activities indefinitely, without altering the carrying capacity of the earth's ecosystem, is a characteristic of

A. Ecologically sustainable organizations. B. Concerned citizens. C. Codes of environmental conduct. D. Environmental regulations.

21. Which ethical criterion is described by the idea that a company should strive for efficiency?

A. Egoism. B. Benevolence. C. Principle. D. Business-centered.

19. Which of the following is not an example of an ethical criterion?

A. Egoism. B. Concern for others. C. Principle. D. Corporate driven.

16. What method(s) did the businesses opposed to Arkansas' "religious freedom" laws use to influence lawmakers?

A. Filed a lawsuit. B. Made public announcements. C. Hired private lobbyists. D. Both B and C, but not A.

25. All of the following are considered to be ethical issues for marketing professionals except

A. Fostering trust in the marketing system. B. Embracing ethical values. C. Doing no harm. D. Ignoring market fair dealing.

If a manger approaches ethics with benevolence in mind, he or she would stress what?

A. Friendly relations with an employee. B. Company rules and procedures. C. Laws and professional codes. D. Economic efficiency.

42. In a survey of 110 companies in 2014, the most frequent public affairs tactic was related to

A. Grassroots issues. B. Political action committees. C. Issues management. D. Federal government regulations.

36. Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called

A. Grey hatters. B. Black hatters. C. White hatters. D. Mad hatters.

35. Which website received a favorable review because they limited the ability of hackers to take advantage of one another?

A. Hackers for Hire. B. Hacker's List. C. Facebook. D. ISIS.

31. Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as

A. Hacking. B. Software piracy. C. Cybercrime. D. Internet censorship.

41. Over time the role of the CIO

A. Has remained the same. B. Has decreased in level of responsibility. C. Has changed dramatically, superseding the role of the chief executive officer. D. Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.

20. A corporate political strategy does not

A. Hinder a competitor's ability to compete economically. B. Seek to continue the firm's economic survival or growth. C. Determine the legal limits allowed for campaign financing. D. Exercise a firm's right to a voice in government affairs.

36. Economic leverage occurs when a business uses it economic power to

A. Hire lobbyists to gain a desired political action. B. Pay for the costs of regulation to acquire a desired political action. C. Threaten to leave a location unless a desired political action is taken. D. Buyout another firm to acquire a desired political action.

45. In 2011, the Global Electoral Organization (GEO) discussed which critical election administration issues?

A. How to disengage electoral stakeholders. B. The role of the media in elections. C. How to increase election disputes. D. How to hide dark money contributions.

38. Supporters of advocacy advertisements believe that they

A. Identify a company as an interested and active stakeholder. B. Can help mold public opinion on a particular policy issue. C. Increase union activity and long-term expenses for an organization. D. Both A and B, but not C.

31. The digital divide describes the gap between those

A. Individuals who have technology and those who do not. B. Businesses who use e-business and those who do not. C. Hospitals who use online information and those who do not. D. Individuals who have broadband technology and those who do not.

23. Which political action strategy seeks to gain support from other affected organizations to better influence policymakers?

A. Information strategy. B. Constituency-building strategy. C. Financial-incentive strategy. D. Lobbying strategy.

26. A company that builds stakeholder coalitions to influence government is using which strategy?

A. Informational. B. Financial-incentives. C. Constituency-building. D. Friendly forces.

27. When attempting to build ethical safeguards into the company, businesses can take the following specific approaches

A. Institutional and Legal. B. Legal and Practical. C. Compliance and Integrity. D. Value-based and Consequentialism.

18. If a manager approaches ethical issues with a self-centered approach, emphasis will be on

A. Integrity. B. Social relationship. C. Economic efficiency. D. Laws.

40. When businesses form voluntary, collaborative partnerships with environmental organizations and regulators to achieve specific objectives this is called

A. Inter-organizational alliances. B. Environmental partnerships. C. Cross-functional teams. D. Command and control.

19. Which country recently required all video-streaming sites to be approved by the government or risk having their content banned?

A. Iran. B. Pakistan. C. North Korea. D. China.

**45. In the U.S., the right to free speech

A. Is an absolute privilege to all citizens. B. Is a constant threat to every business. C. Must be weighed against the consequences for the community. D. Depends on state law.

37. Advocacy ads are also called

A. Issue advertisements. B. Research and development plans. C. Constituent advertisements. D. Price control advertisements.

20. Which of the following is not true about water pollution?

A. It affects crop yields. B. It can be caused by pesticides and herbicides. C. It can be caused by biodegradable products. D. The Water Pollution Control Act maintains the integrity of all surface water in the United States.

25. Which of the following statements is (are) true about the Comprehensive Environmental Response Compensation and Liability Act (CERCLA)?

A. It established a fund supported primarily by a tax on the petroleum and chemical companies. B. It is regarded as one of the most successful environmental laws. C. The funds collected are used to clean up sites where the original polluter cannot be identified. D. Both A and C, but not B.

23. Which of the following is true about the Toxic Substances Control Act?

A. It required reductions in urban smog, acid rain, and greenhouse gas emissions. B. It established a national policy to regulate, restrict, and, if necessary, ban toxic chemicals. C. It promoted nontoxic chemicals and fuels for business use. D. It authorized funds for treatment plans and toxic waste cleanup.

23. Which of the following is not true about the service phase of technology?

A. It was the fourth phase in the development of technology. B. It emphasized providing services. C. It required manual and intellectual skills. D. It dominated from 1900 to 1960.

41. When managers become personally involved in developing public policy, the firm is at what level of business political involvement?

A. Limited organizational involvement. B. Moderate organizational involvement. C. Aggressive organizational involvement. D. Holistic organizational involvement.

40. When a firm solicits its stockholders for political contributions for a particular candidate by letter and then sends those contributions to the candidate on behalf of its stockholders, it is called

A. Lobbying. B. Bundling. C. Collating. D. Constituency building.

24. A common tactic in a financial-incentive political strategy is

A. Lobbying. B. Legal challenges. C. Expert witness testimony. D. Political contributions.

36. In some economically developed countries and most developing countries around the world genetically modified food was

A. Looked upon with caution but generally accepted. B. Welcomed as a way to increase crop yields. C. Rejected by most governments. D. Viewed with extreme caution.

40. The buying and selling of goods and services electronically is called

A. M-commerce. B. E-business. C. Telecommunications. D. Software piracy.

36. Which of these statements is true about ecologically sustainable organizations?

A. Making and transporting products using minimal energy. B. Using more natural resources than they replenish. C. Designing products with limited durability. D. A and B, but not C.

22. By law, the financial records of publicly held companies are required to be?

A. Managed by an accounting department of at least five CPAs. B. Summarized in the employee manual for new hires. C. Reviewed quarterly by the IRS. D. Audited by a certified professional accounting firm.

42. The purpose of the Institute of Business Ethics' mobile application "Say No Toolkit" is to

A. Monitor inter-office dating. B. Always get the lowest prices on supplies. C. Minimize the risk of corruption. D. Avoid drugs in the workplace.

42. The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called

A. Multi-channel. B. Cyber Monday. C. Fulfillment center. D. Omnichannel.

21. Firms in the chemical industry, which must contend with frequently changing environmental regulations and the risk of dangerous accidents, usually have

A. No defined political strategy. B. A sophisticated political strategy. C. A political strategy focused on intellectual property rights. D. A political strategy focused on licensing rights.

30. Hiring former government officials for positions in the corporate world is

A. Normally legal. B. Always unethical. C. Considered unethical by over 50% of Americans. D. A and C, but not B.

35. In 2015, 2 billion people worldwide used social networking sites

A. Once per hour. B. Once per day. C. Once per week. D. Once per month.

41. Which sales channel is projected to top $450 billion within the next several years?

A. Online sales. B. Mobile sales. C. Brick and mortar stores. D. Flea markets.

29. A company that channels employee behavior in a lawful direction by emphasizing the threat of detection and punishment is

A. Operating under the compliance-based approach. B. Practicing "tone at the top." C. Operating under the integrity-based approach. D. Operating under the instrumental policy approach.

29. The practice of using fake business emails in order to trick users into divulging personal data, such as usernames and passwords, is called

A. Phishing. B. Pharming. C. Tweeting. D. Censorship.

34. Which condition below accurately describes a "web-junkie"?

A. Plays video games for hours on end without a break. B. Views the real-world more realistically. C. Learns faster overall. D. Creates "mega-moments".

33. One of the oldest financial-incentive strategy tools is

A. Political action committee contributions. B. Political consulting aid. C. Advocacy advertising. D. Lobbying.

28. Lobbyists, under U.S. law, must disclose their

A. Political affiliation and expenses. B. Earnings. C. Expenses. D. Earnings and expenses.

27. The information strategy tool most used by business is

A. Political contributions. B. Lobbying. C. Legal challenges. D. Direct communication.

24. Environmental justice is a movement to

A. Prevent inequitable exposure to risk, such as from hazardous waste. B. Identify polluters and require them to pay for the cleanup of their toxic waste. C. Reduce pollution at the source, rather than treat and dispose of waste at the "end of the pipe." D. Specifically restrict the use of dangerous pesticides which can pollute groundwater.

44. To help control political favoritism, there have been global efforts to

A. Promote fairness in the electoral process. B. Control the rapid decrease in campaign costs. C. Diminish the role of political parties. D. Discourage grassroots participation.

24. A member of the Chartered Financial Analyst Institute (CFA) must

A. Promote the integrity of and uphold the rules governing global capital markets. B. Act with integrity, competence, diligence, respect, and in an ethical manner with the public. C. Maintain and improve their professional competence. D. All of the above.

22. Which of these actions have Western nations taken to fight cybercrime?

A. Protected only the individual's intellectual property. B. Guaranteed only personal information privacy. C. Accessed public information strictly for the private good. D. Some nations protected personal privacy and others accessed private information for the public good.

25. Intellectual property refers to

A. Protecting one's ideas, concepts, and symbolic creations. B. Special laws protecting copyrights, patents, and trademarks. C. Prohibiting the downloading of commercial software or videogames. D. All of the above.

**44. Which of these statements is true about the U.K. Bribery Act?

A. Provides an exemption for "facilitating payments". B. Contains a strict liability offense for failure to prevent bribery by commercial organizations. C. Prohibits bribery only for government officials. D. Requires that improper actions be made "corruptly."

37. What are the benefits of sequencing the human genome?

A. Provides early diagnosis of diseases. B. Allows the development of generic drug-therapies. C. Spurs new ways to prevent illnesses. D. A and C only, not B.

24. The information phase of technology primarily requires

A. Providing services. B. Intellectual and electronic skills. C. Manual and machine skills. D. The same skills as needed in previous phases.

35. Which type of employee is most likely to report ethical issues in the workplace?

A. Rank and file. B. Middle managers. C. Executives. D. Temporary workers.

32. Which of the following is indicative of a firm in the pollution prevention stage of the corporate environmental responsibility model?

A. Realizing that it would be less efficient and more expensive to prevent pollution before it is created. B. Focusing on all environmental impacts of the product life-cycle. C. Minimizing or eliminating waste before it is created. D. Incurring losses due to environmental costs.

21. In the U.S., most solid waste ends up

A. Recycled. B. Composted. C. Incinerated. D. In landfills.

40. Ethisphere Magazine recognizes and rewards ethical leadership and business practices worldwide according to their

A. Regulatory Percentage Track (RPT). B. Ethics and Leadership Radar (ELR). C. Quality Measurement (QM). D. Ethical Quotient (EQ).

26. Which of the following statements is not true about environmental standards?

A. Regulatory agencies can establish standard allowable levels of pollutants. B. The government has the power to command business firms to comply with certain standards. C. The government rarely interferes in a business's choice of pollution technology. D. They are the most widely used methods of regulation.

29. Since 2011, the total amount spent on lobbying activity has

A. Remained exactly the same. B. Doubled. C. Decreased slightly. D. Increased slightly.

44. Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"?

A. Russia. B. Iran. C. Iraq. D. Mexico.

30. Integrity-based ethics programs

A. Seeks to avoid legal sanctions. B. Combines concern for the law with an emphasis on employee responsibility. C. Threatens employees with punishment for non-compliance with the ethics program. D. Are predominately implemented within the European Union.

45. Which of these steps has the U.S. recently taken to counter cybercrime?

A. Setup a system of voluntary cybersecurity standards. B. Opened a new center dedicated to managing cyber activities. C. Passed sweeping new legislation that required Internet providers to guarantee security. D. Both A and B, but not C.

19. In recent annual Harris polls, which entity did Americans believe had the greatest amount of political power?

A. Small businesses. B. Large businesses. C. Political action committees. D. Lobbyists.

17. Which of these specializations was/were spurred by the rapid changes in technology over the past few decades?

A. Smart manufacturing. B. Wireless networks. C. Processing of enormous amounts of data. D. All of the above.

44. Which of the following is not a potential source of personal private data?

A. Smartphones. B. Internet connections. C. Automobiles. D. Broadcast radio.

27. This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users

A. Software Business Piracy Act. B. Digital Millennium Copyright Act. C. Intellectual Property Millennium Act. D. Copyright Act of 1998.

32. These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations

A. Software pirates. B. Comodohackers. C. Hacktivists. D. Data trafficking groups.

16. Bill Joy, Sun Microsystems' chief scientist, warned that the rapid advances of technology

A. Solve every insurmountable problem in no time flat. B. Move too fast, and can take on a life of its own. C. Are the safest and most human friendly known to civilization. D. Must be controlled by the companies that invest in them to protect society.

27. Another name for unsolicited commercial emails is

A. Spam. B. Junk e-mail. C. UCE. D. All of the above.

38. Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?

A. Support from executive leadership. B. Involvement by all functional departments. C. Focus on how to respond to a breach. D. All of the above.

21. Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to?

A. Suppress political dissent. B. Impose religious or ideological views. C. Increase bandwidth for government usage. D. A and B, but not C.

16. Since 2000, most changes to federal regulatory oversight of environmental protection have been due to

A. Supreme Court rulings. B. Agency rulemaking. C. Executive action. D. Both B and C, but not A.

44. When environmentally proactive companies seek out imaginative, innovative new methods for reducing pollution and increasing efficiency, they are adopting which strategy?

A. Technological innovation. B. Product differentiation. C. Brand differentiation. D. Cost savings.

42. Companies that reduce pollution and hazardous waste, reuse or recycle materials, and operate with greater energy efficiency achieve a competitive advantage due to

A. Technological innovation. B. Product differentiation. C. Green marketing. D. Cost savings.

43. When companies develop a reputation for environmental excellence, and they produce and deliver products and services designed to attract environmentally aware customers, this is called

A. Technological innovation. B. Strategic planning. C. Brand differentiation. D. Cost savings.

23. Which of the following is true about the U.S. government's PRISM program?

A. Technology companies could voluntarily turn over individual private communications. B. The clandestine program was hidden by Edward Snowden. C. Critics of the program called it an unwarranted intrusion by Big Brother. D. Google challenged the program rules and won.

16. This term refers to the practical applications of science and knowledge to commercial and organizational activities.

A. Technology. B. E-commerce. C. Agrarian. D. Semantic.

23. All of the following are commitments of the Principles of the Code of Professional Conduct of the American Institute of Certified Public Accountants except

A. The Public Interest. B. Objectivity and Independence. C. Due Process. D. Due Care.

43. Which U.S. Act prohibits executives representing U.S.-based companies from paying bribes to foreign government officials, political parties, or political candidates?

A. The USA Patriot Act. B. The U.K. Bribery Act. C. The Corruption of Foreign Officials Act. D. The U.S. Foreign Corrupt Practices Act.

43. The use of robotics in the workplace has increased recently because

A. The cost of robots has decreased. B. Robots are more reliable than people. C. New collaborative machines have been invented. D. All of the above.

39. Which of these components are not considered during a risk assessment audit to gauge the effectiveness of a firm's ethics programs?

A. The financial bottom line. B. Top management commitment. C. Training programs. D. Ethical policies.

31. A giant step is taken toward improving ethical performance throughout the company when

A. The firm hires a university ethics professor to lecture employees on moral philosophy. B. The Justice Department launches an investigation of the firm's pricing practices. C. Senior-level managers signal to employees that they believe ethics is a high priority. D. A consumer hot line is created and staffed 24 hours a day.

34. Hackers who intend to profit from their actions are motived by

A. The need for media attention. B. A desire to retaliate against the government. C. The thrill of it. D. Financial incentives.

30. Supporters of digitized medical records claim that

A. The number of common medical errors has remained constant. B. Computerized prescription-ordering systems avoided over seven million mistakes. C. Electronic alerts prevented dangerous drug combinations from being prescribed. D. Both B and C, but not A.

29. Which of the following is not true about the guidelines for sentencing environmental wrongdoers set by the U.S. Sentencing Commission in the event of a violation?

A. The penalties reflect the severity of the offense and the company's demonstrated environmental commitment. B. Businesses having an active compliance program would receive lighter sentences. C. Businesses having no active compliance program would be granted an extension to develop a program. D. Businesses that promptly assisted any victims would receive lighter sentences.

21. The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called

A. The personal computer. B. Cyberspace. C. Cloud computing. D. Communication.

32. Expert witness testimony is often collected

A. Through company newsletters. B. On the steps of the White House. C. In Congressional hearings. D. From The Wall Street Journal.

37. The critical component in installing an effective ethics program is

A. To allow all employees the freedom to act as they wish. B. In hiring an expensive ethics consultant. C. The integration of various ethics safeguards into a comprehensive program. D. Maintaining the position as the industry sales leader.

38. Which company ethics safeguard is commonly implemented as an employee "helpline"?

A. Top management commitment. B. Code of ethics. C. Reporting mechanisms. D. Compliance tracking.

28. Most U.S. state laws permit the monitoring of employees through

A. Tracking software. B. Eavesdropping on phone calls. C. Recording computer keystrokes. D. All of the above.

30. Malware that is designed to maliciously steal and compromise financial customers is called

A. Trojans. B. Crimeware. C. Auto-replicating worms. D. Phishing.

37. Which of the following statements accurately describe the role of chief sustainability officer?

A. Typically reports to the CEO. B. Supervises staff across functional areas. C. Requires strong interpersonal skills. D. All of the above.

32. Business managers need a set of ethical guidelines to help them

A. Understand the changing customs throughout the world. B. Justify the resolution which best helps them. C. Identify and analyze the nature of the ethical problem. D. None of the above.

30. Which of the following is not a possible cost of environmental regulation?

A. Unemployment. B. Reduced capital investment. C. Corporate restructuring. D. Lowered productivity.

29. MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to

A. Uniquely identify an individual's shopping habits and preferences. B. Collect individual social security numbers. C. Identify an individual shopper using only four bits of secondary information. D. Both A and C, but not B.

22. Which country has made the greatest progress in reducing its solid waste stream?

A. United Kingdom. B. Germany. C. Sweden. D. United States.


Kaugnay na mga set ng pag-aaral

Chemistry: Naming Ionic Compounds with Polyatomic Ions

View Set

Chapter 2 Financial Statements, Taxes and Cash Flow

View Set

Agriculture, Industry, and Development Test Review HG

View Set

Peak by Roland Smith Vocab Definitions

View Set

Computer Science Paper 1 - Fundamentals of algorithms

View Set