Business Ethics exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Building ethical safeguards into a company's everyday routines is called: A. Change management. B. Justifying ethics. C. Institutionalizing ethics. D. Ethical awareness.

C. Institutionalizing ethics.

Public policies and government regulations are shaped by: A. Business. B. Special interest groups. C. Government. D. All of the above.

D. All of the above.

37. Which of these statements accurately describe hacktivists known as grey hatters?

A. They always work in tight-knit groups. B. They are highly welcomed by businesses. C. They seek retaliation on businesses. D. They seek media attention and profits.

39. A CIO is the company's: A. Chief intelligence officer. B. Chief information officer. C. Coordinator of international operations. D. Controller of internal overhead.

B. Chief information officer.

Bill Joy, Sun Microsystems' chief scientist, warned that the rapid advances of technology: A. Solve every insurmountable problem in no time flat. B. Move too fast, and can take on a life of its own. C. Are the safest and most human friendly known to civilization. D. Must be controlled by the companies that invest in them to protect society.

B. Move too fast, and can take on a life of its own.

Which country recently enacted new laws to counter bribery and corruption? A. Russia. B. Somalia. C. Brazil. D. Argentina.

C. Brazil.

35. Which type of employee is most likely to report ethical issues in the workplace? A. Rank and file. B. Middle managers. C. Executives. D. Temporary workers.

C. Executives.

Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones: A. China. B. Japan. C. United Kingdom. D. Germany.

C. United Kingdom.

30. Hiring former government officials for positions in the corporate world is: A. Normally legal. B. Always unethical. C. Considered unethical by over 50% of Americans. D. A and C, but not B.

D. A and C, but not B.

In some economically developed countries and most developing countries around the world genetically modified food was: A. Looked upon with caution but generally accepted. B. Welcomed as a way to increase crop yields. C. Rejected by most governments. D. Viewed with extreme caution.

D. Viewed with extreme caution.

30. Integrity-based ethics programs

B. Combines concern for the law with an emphasis on employee responsibility.

38. Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks? A. Support from executive leadership. B. Involvement by all functional departments. C. Focus on how to respond to a breach. D. All of the above.

D. All of the above.

34. Hackers who intend to profit from their actions are motived by: A. The need for media attention. B. A desire to retaliate against the government. C. The thrill of it. D. Financial incentives.

D. Financial incentives.

The process of firms buying and selling the right to pollute is an example of which type of environmental regulation? A. Command. B. Control. C. Market-based. D. Emissions charges.

C. Market-based.

Lobbyists, under U.S. law, must disclose their: A. Political affiliation and expenses. B. Earnings. C. Expenses. D. Earnings and expenses.

D. Earnings and expenses.

27. The information strategy tool most used by business is: A. Political contributions. B. Lobbying. C. Legal challenges. D. Direct communication.

B. Lobbying.

20. In 2013, North Korea opened Internet access to which group of people? A. All of its natural citizens. B. South Korean residents. C. Foreigners using mobile devices and laptops. D. Investors of Koryolink, a state-owned telecommunications company.

C. Foreigners using mobile devices and laptops

Which of the following countries is not one of the top 15 Internet users? A. Singapore. B. United Kingdom. C. China. D. United States.

A. Singapore.

Which political action strategy seeks to gain support from other affected organizations to better influence policymakers? A. Information strategy. B. Constituency-building strategy. C. Financial-incentive strategy. D. Lobbying strategy.

B. Constituency-building strategy.

Malware that is designed to maliciously steal and compromise financial customers is called: A. Trojans. B. Crimeware. C. Auto-replicating worms. D. Phishing

B. Crimeware. C. Auto-replicating worms. D. Phishing.

Which country has made the greatest progress in reducing its solid waste stream? A. United Kingdom. B. Germany. C. Sweden. D. United States.

B. Germany.

18. If a manager approaches ethical issues with a self-centered approach, emphasis will be on: A. Integrity. B. Social relationship. C. Economic efficiency. D. Laws.

C. Economic efficiency.

Businesses promote an information strategy by inviting government leaders to: A. Visit local plant facilities. B. Attend company award ceremonies. C. Give speeches to employees. D. All of the above.

D. All of the above.

The typical public affairs executive spends most of the day: A. Coalition building. B. Direct lobbying. C. Fund raising. D. All of the above.

D. All of the above.

41. Over time the role of the CIO: A. Has remained the same. B. Has decreased in level of responsibility. C. Has changed dramatically, superseding the role of the chief executive officer. D. Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.

D. Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.

29. Since 2011, the total amount spent on lobbying activity has: A. Remained exactly the same. B. Doubled. C. Decreased slightly. D. Increased slightly.

C. Decreased slightly.

39. In 2013 what percentage of large firms issued triple bottom line reporting in a single document? A. 10 percent. B. 45 percent. C. 72 percent. D. 93 percent.

A. 10 percent.

Sustainability leaders have found that the most effective environmental management approach involves: A. A team of line managers from across the business organization. B. Leadership from top-level executives who make all corporate decisions. C. Only shareholders. D. An engaged board of directors that dictates strategy.

A. A team of line managers from across the business organization.

A pain or numbness in your thumbs caused by constant e-mailing, messaging, or Internet surfing on hand-held devices is called: A. BlackBerry thumb. B. Cell phone thumb. C. PDA thumb. D. None of the above.

A. BlackBerry thumb.

Some researchers believe that business firms moving towards ecological sustainability results in: A. Competitive advantages. B. Decreased worker productivity. C. More government regulation. D. Less money for shareholders.

A. Competitive advantages.

Being able to continue their activities indefinitely, without altering the carrying capacity of the earth's ecosystem, is a characteristic of: A. Ecologically sustainable organizations. B. Concerned citizens. C. Codes of environmental conduct. D. Environmental regulations.

A. Ecologically sustainable organizations.

The unspoken understanding among employees of what is and is not acceptable behavior is called: A. Ethical climate. B. Efficiency. C. Success. D. Rites and rituals.

A. Ethical climate.

Which of the following is not a constituency-building strategy tool? A. Expert witness testimony. B. Advocacy advertising. C. Public relations. D. Legal challenges.

A. Expert witness testimony.

20. If a manger approaches ethics with benevolence in mind, he or she would stress what? A. Friendly relations with an employee. B. Company rules and procedures. C. Laws and professional codes. D. Economic efficiency.

A. Friendly relations with an employee.

26. Software piracy is a major problem in which part of the world?

A. Globally. B. North America only. C. Asia only. D. North America and Asia.

The purpose of the right to be forgotten is to: A. Increase protection of privacy and personal information. B. Protect property rights. C. Protect intellectual property. D. Prevent software privacy.

A. Increase protection of privacy and personal information.

The digital divide describes the gap between those: A. Individuals who have technology and those who do not. B. Businesses who use e-business and those who do not. C. Hospitals who use online information and those who do not. D. Individuals who have broadband technology and those who do not.

A. Individuals who have technology and those who do not.

22. We are currently in which phase in the development of technology?

A. Industrial. B. Service. C. Information. D. Semantic.

37. Advocacy ads are also called: A. Issue advertisements. B. Research and development plans. C. Constituent advertisements. D. Price control advertisements.

A. Issue advertisements.

336. Which of these statements is true about ecologically sustainable organizations? A. Making and transporting products using minimal energy. B. Using more natural resources than they replenish. C. Designing products with limited durability. D. A and B, but not C.

A. Making and transporting products using minimal energy.

Which sales channel is projected to top $450 billion within the next several years? A. Online sales. B. Mobile sales. C. Brick and mortar stores. D. Flea markets.

A. Online sales..

A company that channels employee behavior in a lawful direction by emphasizing the threat of detection and punishment is: A. Operating under the compliance-based approach. B. Practicing "tone at the top." C. Operating under the integrity-based approach. D. Operating under the instrumental policy approach.

A. Operating under the compliance-based approach.

Which condition below accurately describes a "web-junkie"? A. Plays video games for hours on end without a break. B. Views the real-world more realistically. C. Learns faster overall. D. Creates "mega-moments".

A. Plays video games for hours on end without a break.

33. One of the oldest financial-incentive strategy tools is: A. Political action committee contributions. B. Political consulting aid. C. Advocacy advertising. D. Lobbying.

A. Political action committee contributions.

Environmental justice is a movement to: A. Prevent inequitable exposure to risk, such as from hazardous waste. B. Identify polluters and require them to pay for the cleanup of their toxic waste. C. Reduce pollution at the source, rather than treat and dispose of waste at the "end of the pipe." D. Specifically restrict the use of dangerous pesticides which can pollute groundwater.

A. Prevent inequitable exposure to risk, such as from hazardous waste.

To help control political favoritism, there have been global efforts to: A. Promote fairness in the electoral process. B. Control the rapid decrease in campaign costs. C. Diminish the role of political parties. D. Discourage grassroots participation.

A. Promote fairness in the electoral process.

When environmentally proactive companies seek out imaginative, innovative new methods for reducing pollution and increasing efficiency, they are adopting which strategy? A. Technological innovation. B. Product differentiation. C. Brand differentiation. D. Cost savings.

A. Technological innovation.

16. This term refers to the practical applications of science and knowledge to commercial and organizational activities. A. Technology. B. E-commerce. C. Agrarian. D. Semantic.

A. Technology.

39. Which of these components are not considered during a risk assessment audit to gauge the effectiveness of a firm's ethics programs? A. The financial bottom line. B. Top management commitment. C. Training programs. D. Ethical policies.

A. The financial bottom line.

Which of the following statements is not true with respect to acid rain? A. A primary source of acid rain is coal-fired utilities. B. Acid rain occurs when carbon dioxide combines with water vapor in the atmosphere. C. Acid rain is worse in some regions of the United States than others. D. Acid rain degrades buildings.

B. Acid rain occurs when carbon dioxide combines with water vapor in the atmosphere.

When a firm solicits its stockholders for political contributions for a particular candidate by letter and then sends those contributions to the candidate on behalf of its stockholders, it is called: A. Lobbying. B. Bundling. C. Collating. D. Constituency building.

B. Bundling.

**44. Which of these statements is true about the U.K. Bribery Act? A. Provides an exemption for "facilitating payments". B. Contains a strict liability offense for failure to prevent bribery by commercial organizations. C. Prohibits bribery only for government officials. D. Requires that improper actions be made "corruptly."

B. Contains a strict liability offense for failure to prevent bribery by commercial organizations.

21. The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called: A. The personal computer. B. Cyberspace. C. Cloud computing. D. Communication.

B. Cyberspace. C. Cloud computing. D. Communication.

27. This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users: A. Software Business Piracy Act. B. Digital Millennium Copyright Act. C. Intellectual Property Millennium Act. D. Copyright Act of 1998.

B. Digital Millennium Copyright Act.

Ethics policies typically cover all of the following issues except: A. Developing guidelines for accepting or refusing gifts from suppliers. B. Encouraging discriminatory personnel practices. C. Avoiding conflict of interest. D. Maintaining the security of proprietary information.

B. Encouraging discriminatory personnel practices.

When businesses form voluntary, collaborative partnerships with environmental organizations and regulators to achieve specific objectives this is called: A. Inter-organizational alliances. B. Environmental partnerships. C. Cross-functional teams. D. Command and control.

B. Environmental partnerships.

Recipients of the corporate ethics awards show that: A. Awards are based on economic power, not ethical performance. B. Firms can be financially successful and ethically focused. C. Being legally compliant results in receiving an ethics award. D. Improving ethical performance is very costly, but bolsters a firm's reputation.

B. Firms can be financially successful and ethically focused.

Which website received a favorable review because they limited the ability of hackers to take advantage of one another? A. Hackers for Hire. B. Hacker's List. C. Facebook. D. ISIS.

B. Hacker's List.

24. The information phase of technology primarily requires: A. Providing services. B. Intellectual and electronic skills. C. Manual and machine skills. D. The same skills as needed in previous phases.

B. Intellectual and electronic skills.

Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"? A. Russia. B. Iran. C. Iraq. D. Mexico.

B. Iran.

In the U.S., the right to free speech: A. Is an absolute privilege to all citizens. B. Is a constant threat to every business. C. Must be weighed against the consequences for the community. D. Depends on state law.

B. Is a constant threat to every business.

Which of the following is true about the Toxic Substances Control Act? A. It required reductions in urban smog, acid rain, and greenhouse gas emissions. B. It established a national policy to regulate, restrict, and, if necessary, ban toxic chemicals. C. It promoted nontoxic chemicals and fuels for business use. D. It authorized funds for treatment plans and toxic waste cleanup.

B. It established a national policy to regulate, restrict, and, if necessary, ban toxic chemicals.

Most ethics or compliance officers are generally entrusted to: A. Act as a liaison between the company and the Securities and Exchange Commission. B. Reduce the risks to the company of employee misconduct. C. Annually distribute copies of the company's code of ethics to all interested stakeholders. D. Arrange for ethics training for employees at a nearby university.

B. Reduce the risks to the company of employee misconduct.

In 2011, the Global Electoral Organization (GEO) discussed which critical election administration issues? A. How to disengage electoral stakeholders. B. The role of the media in elections. C. How to increase election disputes. D. How to hide dark money contributions.

B. The role of the media in elections.

Companies that cultivate a vision of sustainability must adopt sophisticated strategic planning techniques to: A. Increase the competitive advantage of other global organizations. B. Detect the limited number of internal factors that influence the employee performance reviews. C. Allow their top manager to assess the full range of the firm's effects on the environment. D. Increase the number of government regulations that are passed to reduce pollution.

C. Allow their top manager to assess the full range of the firm's effects on the environment.

Which of the following is not true about the guidelines for sentencing environmental wrongdoers set by the U.S. Sentencing Commission in the event of a violation? A. The penalties reflect the severity of the offense and the company's demonstrated environmental commitment. B. Businesses having an active compliance program would receive lighter sentences. C. Businesses having no active compliance program would be granted an extension to develop a program. D. Businesses that promptly assisted any victims would receive lighter sentences.

C. Businesses having no active compliance program would be granted an extension to develop a program.

General Electric's "Ecomagination" effort to invest in clean technology is an example of: A. Pollution prevention. B. Product stewardship. C. Clean technology. D. None of the above.

C. Clean technology.

27. When attempting to build ethical safeguards into the company, businesses can take the following specific approaches: A. Institutional and Legal. B. Legal and Practical. C. Compliance and Integrity. D. Value-based and Consequentialism.

C. Compliance and Integrity.

Which of the following is not a possible cost of environmental regulation? A. Unemployment. B. Reduced capital investment. C. Corporate restructuring. D. Lowered productivity.

C. Corporate restructuring.

Which of the following is true about the U.S. government's PRISM program? A. Technology companies could voluntarily turn over individual private communications. B. The clandestine program was hidden by Edward Snowden. C. Critics of the program called it an unwarranted intrusion by Big Brother. D. Google challenged the program rules and won.

C. Critics of the program called it an unwarranted intrusion by Big Brother.

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as: A. Hacking. B. Software piracy. C. Cybercrime. D. Internet censorship.

C. Cybercrime.

20. A corporate political strategy does not: A. Hinder a competitor's ability to compete economically. B. Seek to continue the firm's economic survival or growth. C. Determine the legal limits allowed for campaign financing. D. Exercise a firm's right to a voice in government affairs.

C. Determine the legal limits allowed for campaign financing.

23. All of the following are commitments of the Principles of the Code of Professional Conduct of the American Institute of Certified Public Accountants except: A. The Public Interest. B. Objectivity and Independence. C. Due Process. D. Due Care.

C. Due Process.

Supporters of digitized medical records claim that: A. The number of common medical errors has remained constant. B. Computerized prescription-ordering systems avoided over seven million mistakes. C. Electronic alerts prevented dangerous drug combinations from being prescribed. D. Both B and C, but not A.

C. Electronic alerts prevented dangerous drug combinations from being prescribed..

The primary reason that governments try to keep pace with technology is to: A. Control the speed of innovation. B. Manage the cost of technology. C. Ensure that the public is protected. D. Avoid threats to individuals.

C. Ensure that the public is protected.

These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations: A. Software pirates. B. Comodohackers. C. Hacktivists. D. Data trafficking groups.

C. Hacktivists.

16. What method(s) did the businesses opposed to Arkansas' "religious freedom" laws use to influence lawmakers? A. Filed a lawsuit. B. Made public announcements. C. Hired private lobbyists. D. Both B and C, but not A.

C. Hired private lobbyists.

Business managers need a set of ethical guidelines to help them: A. Understand the changing customs throughout the world. B. Justify the resolution which best helps them. C. Identify and analyze the nature of the ethical problem. D. None of the above.

C. Identify and analyze the nature of the ethical problem.

32. Expert witness testimony is often collected: A. Through company newsletters. B. On the steps of the White House. C. In Congressional hearings. D. From The Wall Street Journal.

C. In Congressional hearings.

Which of the following is not true about water pollution? A. It affects crop yields. B. It can be caused by pesticides and herbicides. C. It can be caused by biodegradable products. D. The Water Pollution Control Act maintains the integrity of all surface water in the United States.

C. It can be caused by biodegradable products.

When a business seeks to overturn a law after it has been passed or threatens to challenge the legal legitimacy of the new regulation in the courts, this is called: A. Accumulating. B. Overturn lobbying. C. Legal challenges. D. Funneling.

C. Legal challenges.

42. The purpose of the Institute of Business Ethics' mobile application "Say No Toolkit" is to: A. Monitor inter-office dating. B. Always get the lowest prices on supplies. C. Minimize the risk of corruption. D. Avoid drugs in the workplace.

C. Minimize the risk of corruption.

Which of the following is indicative of a firm in the pollution prevention stage of the corporate environmental responsibility model? A. Realizing that it would be less efficient and more expensive to prevent pollution before it is created. B. Focusing on all environmental impacts of the product life-cycle. C. Minimizing or eliminating waste before it is created. D. Incurring losses due to environmental costs.

C. Minimizing or eliminating waste before it is created.

M-Commerce is facilitated primarily by: A. Lap-tops. B. Personal computers. C. Mobile or cell phones. D. The government.

C. Mobile or cell phones.

Which stage of corporate environmental responsibility focuses on the full life cycle of a product? A. Pollution prevention stage. B. Clean technology stage. C. Product stewardship stage. D. Green management stage.

C. Product stewardship stage.

38. Which company ethics safeguard is commonly implemented as an employee "helpline"? A. Top management commitment. B. Code of ethics. C. Reporting mechanisms. D. Compliance tracking.

C. Reporting mechanisms.

Integrity-based ethics programs: A. Seeks to avoid legal sanctions. B. Combines concern for the law with an emphasis on employee responsibility. C. Threatens employees with punishment for non-compliance with the ethics program. D. Are predominately implemented within the European Union.

C. Senior-level managers signal to employees that they believe ethics is a high priority.

The self-reinforcing feature of technology means that: A. Civilization develops at an uncontrollable pace. B. Developing economies demand newer and larger innovations. C. Technology acts as a multiplier to encourage is own faster development. D. An invention in one place is localized only.

C. Technology acts as a multiplier to encourage is own faster development.

Which of the following statements is not true about environmental standards? A. Regulatory agencies can establish standard allowable levels of pollutants. B. The government has the power to command business firms to comply with certain standards. C. The government rarely interferes in a business's choice of pollution technology. D. They are the most widely used methods of regulation.

C. The government rarely interferes in a business's choice of pollution technology.

37. The critical component in installing an effective ethics program is: A. To allow all employees the freedom to act as they wish. B. In hiring an expensive ethics consultant. C. The integration of various ethics safeguards into a comprehensive program. D. Maintaining the position as the industry sales leader.

C. The integration of various ethics safeguards into a comprehensive program.

Economic leverage occurs when a business uses it economic power to: A. Hire lobbyists to gain a desired political action. B. Pay for the costs of regulation to acquire a desired political action. C. Threaten to leave a location unless a desired political action is taken. D. Buyout another firm to acquire a desired political action.

C. Threaten to leave a location unless a desired political action is taken.

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called: A. Grey hatters. B. Black hatters. C. White hatters. D. Mad hatters.

C. White hatters.

17. Which of these specializations was/were spurred by the rapid changes in technology over the past few decades?Which of these specializations was/were spurred by the rapid changes in technology over the past few decades? A. Smart manufacturing. B. Wireless networks. C. Processing of enormous amounts of data. D. All of the above.

D. All of the above.

A member of the Chartered Financial Analyst Institute (CFA) must: A. Promote the integrity of and uphold the rules governing global capital markets. B. Act with integrity, competence, diligence, respect, and in an ethical manner with the public. C. Maintain and improve their professional competence. D. All of the above.

D. All of the above.

Environmental regulations stimulate some sectors of the economy by: A. Creating jobs in industries like environmental consulting, asbestos abatement, and instrument manufacturing. B. Saving jobs in industries like fishing and tourism when natural areas are protected or restored. C. Compelling businesses to become more efficient by conserving energy. D. All of the above.

D. All of the above.

In the United States, the federal government regulates which of the following major areas of environmental protection? A. Air pollution. B. Water pollution. C. Land pollution. D. All of the above.

D. All of the above.

Most U.S. state laws permit the monitoring of employees through: A. Tracking software. B. Eavesdropping on phone calls. C. Recording computer keystrokes. D. All of the above.

D. All of the above.

The core components upon which a company's ethical performance depends include: A. The values and virtues of the managers. B. The personal character of the managers and employees. C. The traditions, attitudes, and business practices built into a company's culture. D. All of the above.

D. All of the above.

The use of robotics in the workplace has increased recently because: A. The cost of robots has decreased. B. Robots are more reliable than people. C. New collaborative machines have been invented. D. All of the above.

D. All of the above.

Which of the following is (are) true about emission fees? A. Each business is charged for the undesirable pollution that it emits. B. Companies emitting more pollutants end up paying more pollution taxes. C. Revenues from emission fees can be used to support environmental efforts. D. All of the above.

D. All of the above.

Which of the following statements accurately describe the role of chief sustainability officer? A. Typically reports to the CEO. B. Supervises staff across functional areas. C. Requires strong interpersonal skills. D. All of the above.

D. All of the above.

By law, the financial records of publicly held companies are required to be: A. Managed by an accounting department of at least five CPAs. B. Summarized in the employee manual for new hires. C. Reviewed quarterly by the IRS. D. Audited by a certified professional accounting firm.

D. Audited by a certified professional accounting firm.

25. A technological application that uses biological systems or living organisms to make or modify products or processes for specific use is called: A. Biosphere outcome. B. Metatechnology. C. Biology. D. Biotechnology.

D. Biotechnology.

19. In the nomadic-agrarian phase of technology in society, people: A. Hunted wild animals for meat. B. Gathered wild plants for food. C. Provided services. D. Both A and B, but not C.

D. Both A and B, but not C.

45. Which of these steps has the U.S. recently taken to counter cybercrime? A. Setup a system of voluntary cybersecurity standards. B. Opened a new center dedicated to managing cyber activities. C. Passed sweeping new legislation that required Internet providers to guarantee security. D. Both A and B, but not C.

D. Both A and B, but not C.

Supporters of advocacy advertisements believe that they: A. Identify a company as an interested and active stakeholder. B. Can help mold public opinion on a particular policy issue. C. Increase union activity and long-term expenses for an organization. D. Both A and B, but not C.

D. Both A and B, but not C.

18. Proponents of business as a political participant argue: A. A pluralistic system invites many participants. B. It is business's constitutional right to be involved. C. Business is a vital stakeholder of government. D. Both A and C, but not B.

D. Both A and C, but not B.

29. MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to: A. Uniquely identify an individual's shopping habits and preferences. B. Collect individual social security numbers. C. Identify an individual shopper using only four bits of secondary information. D. Both A and C, but not B.

D. Both A and C, but not B.

Ethical challenges for information technology employees include: A. Data privacy. B. Laptop speed. C. Copyright protection. D. Both A and C, but not B.

D. Both A and C, but not B.

Which of the following statements is (are) true about the Comprehensive Environmental Response Compensation and Liability Act (CERCLA)? A. It established a fund supported primarily by a tax on the petroleum and chemical companies. B. It is regarded as one of the most successful environmental laws. C. The funds collected are used to clean up sites where the original polluter cannot be identified. D. Both A and C, but not B.

D. Both A and C, but not B.

Since 2000, most changes to federal regulatory oversight of environmental protection have been due to: A. Supreme Court rulings. B. Agency rulemaking. C. Executive action. D. Both B and C, but not A.

D. Both B and C, but not A.

Which of these statements is (are) true about the group known as Anonymous? A. They are a tightly bonded group of hacktivists. B. They are distinguished by masks with an over-sized smile and red cheeks. C. They supported WikiLeaks and the Occupy movement. D. Both B and C, but not A.

D. Both B and C, but not A.

Which of the following is not a potential source of personal private data? A. Smartphones. B. Internet connections. C. Automobiles. D. Broadcast radio.

D. Broadcast radio.

Which country recently required all video-streaming sites to be approved by the government or risk having their content banned? A. Iran. B. Pakistan. C. North Korea. D. China.

D. China.

19. Which of the following is not an example of an ethical criterion? A. Egoism. B. Concern for others. C. Principle. D. Corporate driven.

D. Corporate driven.

Companies that reduce pollution and hazardous waste, reuse or recycle materials, and operate with greater energy efficiency achieve a competitive advantage due to: A. Technological innovation. B. Product differentiation. C. Green marketing. D. Cost savings.

D. Cost savings.

This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks: A. Cyberattack Awareness Day. B. Anti-cyber International. C. International Defense Against Web Attacks (IDAWA). D. Data Privacy Day.

D. Data Privacy Day.

Which of these statements accurately describes a Super PAC? A. Allows limited contributions from unions. B. Allows limited contributions from individuals. C. Is also called the dependent expenditure-only committee. D. Does not allow direct contributions to candidates or political parties.

D. Does not allow direct contributions to candidates or political parties.

Ethisphere Magazine recognizes and rewards ethical leadership and business practices worldwide according to their: A. Regulatory Percentage Track (RPT). B. Ethics and Leadership Radar (ELR). C. Quality Measurement (QM). D. Ethical Quotient (EQ)

D. Ethical Quotient (EQ).

In a survey of 110 companies in 2014, the most frequent public affairs tactic was related to: A. Grassroots issues. B. Political action committees. C. Issues management. D. Federal government regulations.

D. Federal government regulations.

All of the following are considered to be ethical issues for marketing professionals except: A. Fostering trust in the marketing system. B. Embracing ethical values. C. Doing no harm. D. Ignoring market fair dealing.

D. Ignoring market fair dealing.

In the U.S., most solid waste ends up: A. Recycled. B. Composted. C. Incinerated. D. In landfills.

D. In landfills.

Which of the following is not a role of the CIO? A. Acting as lead security officer. B. Educating the organization about technology initiatives. C. Marketing technology projects to stakeholders. D. Monitoring the appropriate level of employee headcount.

D. Monitoring the appropriate level of employee headcount.

17. How has the increase in information technology affected criminal activities globally? A. Crime has remained about the same. B. Crime has decreased due to better monitoring efforts. C. The need for government cooperation has been reduced. D. New mechanisms for stealing data, trafficking contraband and laundering money have emerged.

D. New mechanisms for stealing data, trafficking contraband and laundering money have emerged.

The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called: A. Multi-channel. B. Cyber Monday. C. Fulfillment center. D. Omnichannel.

D. Omnichannel.

In 2015, 2 billion people worldwide used social networking sites: A. Once per hour. B. Once per day. C. Once per week. D. Once per month.

D. Once per month.

22. Which of these actions have Western nations taken to fight cybercrime? A. Protected only the individual's intellectual property. B. Guaranteed only personal information privacy. C. Accessed public information strictly for the private good. D. Some nations protected personal privacy and others accessed private information for the public good.

D. Some nations protected personal privacy and others accessed private information for the public good.

43. Which U.S. Act prohibits executives representing U.S.-based companies from paying bribes to foreign government officials, political parties, or political candidates? A. The USA Patriot Act. B. The U.K. Bribery Act. C. The Corruption of Foreign Officials Act. D. The U.S. Foreign Corrupt Practices Act.

D. The U.S. Foreign Corrupt Practices Act.

Dark money refers to: A. Anonymous contributions to for-profit organizations. B. Money collected illegally by PACs. C. Soft money. D. Undisclosed contributions to tax-exempt organizations.

D. Undisclosed contributions to tax-exempt organizations.

19. In recent annual Harris polls, which entity did Americans believe had the greatest amount of political power? A. Small businesses. B. Large businesses. C. Political action committees. D. Lobbyists.

B. Large businesses.

When companies develop a reputation for environmental excellence, and they produce and deliver products and services designed to attract environmentally aware customers, this is called: A. Technological innovation. B. Strategic planning. C. Brand differentiation. D. Cost savings.

C. Brand differentiation.

20. The phase of technology that focuses on building material goods and manual labor is: A. Agrarian. B. Service. C. Industrial. D. Information.

C. Industrial.

Another name for unsolicited commercial emails is: A. Spam. B. Junk e-mail. C. UCE. D. All of the above.

D. All of the above.

Which of the following statements is true of air pollution? A. Air pollution occurs when more pollutants are emitted into the atmosphere than can be safely absorbed and diluted by natural processes. B. A majority of the people in the U.S. breathe unsafe air for at least part of the year. C. Air pollution caused by particulate matter is responsible for fewer than 600 premature or unnecessary deaths annually. D. The EPA has identified hundreds of "criteria" pollutants, relatively common harmful substances that serve as indicators of overall levels of air pollution.

A. Air pollution occurs when more pollutants are emitted into the atmosphere than can be safely absorbed and diluted by natural processes.

21. Which ethical criterion is described by the idea that a company should strive for efficiency?

A. Egoism.

A company that builds stakeholder coalitions to influence government is using which strategy? A. Informational. B. Financial-incentives. C. Constituency-building. D. Friendly forces.

C. Constituency-building.

Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to? A. Suppress political dissent. B. Impose religious or ideological views. C. Increase bandwidth for government usage. D. A and B, but not C.

D. A and B, but not C.

What are the benefits of sequencing the human genome? A. Provides early diagnosis of diseases. B. Allows the development of generic drug-therapies. C. Spurs new ways to prevent illnesses. D. A and C only, not B.

D. A and C only, not B.

25. Intellectual property refers to: A. Protecting one's ideas, concepts, and symbolic creations. B. Special laws protecting copyrights, patents, and trademarks. C. Prohibiting the downloading of commercial software or videogames. D. All of the above.

D. All of the above.

36. The most effective ethics programs utilize which of the following? A. Written policy. B. Posters. C. Quick reference guides. D. All of the above.

D. All of the above.

To influence government policymakers' actions, an information strategy involves: A. Business leaders speaking before government policymakers. B. Government policymakers hiring special interest groups for fact-finding projects. C. Businesses listening to government policymakers in order to develop a corporate strategy. D. Gaining support from other affected organizations.

A. Business leaders speaking before government policymakers.

In a study of CIOs from around the world, McKinsey & Company found that most CIOs reported to their: A. Chief executive officer. B. Chief financial officer. C. Chief operating officer. D. Managing supervisor.

A. Chief executive officer.

21. Firms in the chemical industry, which must contend with frequently changing environmental regulations and the risk of dangerous accidents, usually have: A. No defined political strategy. B. A sophisticated political strategy. C. A political strategy focused on intellectual property rights. D. A political strategy focused on licensing rights.

B. A sophisticated political strategy.

The buying and selling of goods and services electronically is called: A. M-commerce. B. E-business. C. Telecommunications. D. Software piracy.

B. E-business.

When managers become personally involved in developing public policy, the firm is at what level of business political involvement? A. Limited organizational involvement. B. Moderate organizational involvement. C. Aggressive organizational involvement. D. Holistic organizational involvement.

C. Aggressive organizational involvement.

Some argue that publishing personal DNA sequencing results is unethical because: A. The results could compromise one's employment situation. B. Life insurance could be denied. C. The cost of health insurance could rise. D. All of the above.

D. All of the above.

24. A common tactic in a financial-incentive political strategy is: A. Lobbying. B. Legal challenges. C. Expert witness testimony. D. Political contributions.

D. Political contributions.


Set pelajaran terkait

Chapter 29 Introduction to the Autonomic Nervous System

View Set

Inheritence, Abstract Classes, Interfaces

View Set

Chapter 19, Chapter 19: Presenting Your Speech Online

View Set