MIS 301 Quiz 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ cellular networks used digital signals primarily for voice communications and provided data communication up to 10 Kbps.

2G

_________ is an attack by a programmer developing a system.

A Trojan horse

________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of ________.

A wireless sensor; the IoT

_________ is the second step in the general framework for ethics.

Get the facts

Which of the following is an accuracy issue?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Increasing skills necessary to be a computer hacker

________ satellites are used to run the GPS system.

MEO

Which of the following is FALSE of QR codes?

QR codes are larger than bar codes because they store information both horizontally and vertically.

________ is a short-range wireless network.

UWB

________ marketing is word-of-mouth advertising.

Viral

If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is ________.

an evil twin attack

Social computing increases _________.

buyer power

The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.

fairness

Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab.

mobile and wireless

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.

piracy; illegal

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

rights

Keystroke loggers and screen scrapers are examples of _________.

spyware

A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization

trusted; untrusted

The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

________ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization.

Onboarding

Obamacare was created to address the _________ approach.

common good

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

deontology

________ occurs when the functions of many physical devices are included in one other physical device.

Dematerialization

Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site.

hot

________ allow users to place information in multiple, overlapping associations rather than in rigid categories.

Tags

Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions.

responsibility

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________.

tailgating; an unintentional threat to your organization

Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk _________.

transference

________ is a substitute for Bluetooth.

Wi-Fi Direct

You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.

a human error; unintentional

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

accuracy

________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content.

Folksonomies; tags

________ satellites are stationary relative to a point on the Earth.

GEO

_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.

Information extortion

________ is NOT an example of collaborative consumption.

Mass customization

________ marketing is when companies use social computing tools to obtain feedback from customers.

Conversational

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

Cyberterrorism

Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________.

CRM

________ transmission systems can have a large coverage area but are expensive.

Satellite


Set pelajaran terkait

Unit 2: The Market (Supply & Demand)

View Set

The Enlightenment & the American Revolution (Unit 1) The French Revolution & Napoleon (Unit 2)

View Set

Chapter 7: Survey of Windows Features and Support Tools

View Set