module 9 pt 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The ethical concerns of the digital age can be divided into ___ dimensions (categories). The ethical concerns of the digital age can be divided into ___ dimensions (categories). drop zone empty. 6 4 3 5

5

Select two ways managers encourage employees to act unethically.

By not enforcing strong ethical behavior. By failing to act ethically themselves.

Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions? Multiple select question. Copyright and intellectual property rights Quality of life Information privacy rights Honesty of content

Copyright and intellectual property rights Quality of life Information privacy rights

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ . Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ . drop zone empty. U.S. dollars Cryptocurrency Gold Euros

Cryptocurrency

In the settings area of each browser you should consider adjusting which three of the following? Multiple select question. Deleting cookies Adjusting your firewall settings Blocking or customizing your cookie settings Deciding from which sites you want to allow cookies

Deleting cookies Blocking or customizing your cookie settings Deciding from which sites you want to allow cookies

Select three of steps included in the 5 steps of an ethical analysis. Multiple select question. Determining who is affected. Getting all the pertinent facts. Searching for precedents. Setting a strong example.

Determining who is affected. Getting all the pertinent facts. Searching for precedents.

Select three correct statements regarding international Internet privacy laws. Multiple select question. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. Internet users can be assured of their privacy when traveling in Europe. International laws on Internet privacy vary greatly.

It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly.

Select three steps you can take to help to safeguard your privacy in the digital age. Multiple select question. Monitor your credit reports Incorporate anti-virus protection Practice safe online purchasing techniques Use the same strong password on all accounts

Monitor your credit reports Incorporate anti-virus protection Practice safe online purchasing techniques

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings? Multiple select question. Target keeps track of how many shoppers visit their stores on Sundays. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. DropBox tracks how many people subscribe to their services after viewing a specific marketing e-mail.

Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.

Which three of the following situations involve information privacy rights? Multiple select question. One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? Your neighbor has a history of abusing children, do you have a right to know this? An employee has some paid/personal time off due and asks if she can take Friday and Monday off. You say it's fine, but only if she can spare 45 minutes to join a Zoom meeting with an important client Monday morning.

One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? Your neighbor has a history of abusing children, do you have a right to know this?

This software allows managers to take control of an employee's computer remotely. This software allows managers to take control of an employee's computer remotely. drop zone empty. Remote desktop software Office productivity software Employee monitoring software Packet sniffing software

Remote desktop software

Which of the following statements accurately describes spyware? More than one answer may be correct. Multiple select question. Spyware can be replicated and passed from user to user. Spyware captures private information by monitoring how users interact online. Downloading software or documents from unvetted sources is one way spyware can be installed. Browsing history is a common way users are exposed to spyware

Spyware captures private information by monitoring how users interact online. Downloading software or documents from unvetted sources is one way spyware can be installed.

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security. This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security. drop zone empty. The Digital Millennium Copyright Act The Federal Information Security Management Act The Children's Internet Protection Act The Electronic Communications Privacy Act

The Federal Information Security Management Act

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ . After getting all the pertinent facts, the next step in making an ethical analysis is to ___ . drop zone empty. list options determine the affected search for precedents make a decision

determine the affected

Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings. Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings. drop zone empty. retail sales loan default rate increases hurricanes

loan default

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ . Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ . drop zone empty. list options determine who is affected make a decision search for precedents

search for precedents

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data. Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data. drop zone empty. structured big private organized

structured


Kaugnay na mga set ng pag-aaral

HEALTH ASSESSMENT BATTERY EXAM REVIEWER Prelim

View Set

Chapter 26: Growth and Development of the School-Aged Child: 6 to 10 Years

View Set

MKTG Research 4333 Apply It CH 10

View Set

8a dědičnost pohlavně vázaná v pokusu a rodokmenu

View Set

Nguyên lý kế toán - Chương 3

View Set

Allison's Bad-to-the-Bone CISSP Flashcards (Domain 3 Security Architecture & Engineering)

View Set

Pharm Exam 3 Practice NCLEX style questions

View Set