MIS 301 Quiz 3
________ cellular networks used digital signals primarily for voice communications and provided data communication up to 10 Kbps.
2G
_________ is an attack by a programmer developing a system.
A Trojan horse
________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of ________.
A wireless sensor; the IoT
_________ is the second step in the general framework for ethics.
Get the facts
Which of the following is an accuracy issue?
How can we ensure that the information will be processed properly and presented accurately to users?
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
________ satellites are used to run the GPS system.
MEO
Which of the following is FALSE of QR codes?
QR codes are larger than bar codes because they store information both horizontally and vertically.
________ is a short-range wireless network.
UWB
________ marketing is word-of-mouth advertising.
Viral
If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is ________.
an evil twin attack
Social computing increases _________.
buyer power
The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.
fairness
Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab.
mobile and wireless
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.
piracy; illegal
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
rights
Keystroke loggers and screen scrapers are examples of _________.
spyware
A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization
trusted; untrusted
The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
________ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization.
Onboarding
Obamacare was created to address the _________ approach.
common good
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
deontology
________ occurs when the functions of many physical devices are included in one other physical device.
Dematerialization
Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site.
hot
________ allow users to place information in multiple, overlapping associations rather than in rigid categories.
Tags
Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions.
responsibility
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________.
tailgating; an unintentional threat to your organization
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk _________.
transference
________ is a substitute for Bluetooth.
Wi-Fi Direct
You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.
a human error; unintentional
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
accuracy
________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content.
Folksonomies; tags
________ satellites are stationary relative to a point on the Earth.
GEO
_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.
Information extortion
________ is NOT an example of collaborative consumption.
Mass customization
________ marketing is when companies use social computing tools to obtain feedback from customers.
Conversational
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
Cyberterrorism
Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________.
CRM
________ transmission systems can have a large coverage area but are expensive.
Satellite