Module 9 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?

protect government assets against cybersecurity events

________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.

remote desktop

It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of

distributive justice

What is a company that purchases consumer behavior information from other organizations engaged in?

third-party data purchase

Making an ethical decision will most likely result in ___

unintended consequences

When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?

The Principle of Virtue

In 1998, the Child Online Protection Act was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?

The law was later found unconstitutional for violating the First Amendment (freedom of speech).

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?

big data

A state requires all visitors to online cannabis shops to be at least 21 years old. However, it is unclear who should screen the website visitors and who should be responsible for any violations. Which dimension (category) of ethical behavior does this issue fall under?

control and accountability

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.

ethics

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

How many dimensions or categories can the ethical concerns of the digital age be divided into?

five

What does the Wiretap Act aim to protect against?

identity theft and unlawful access to stored communications

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

information privacy rights

What is the fourth step in a five-step ethical analysis?

listing options

What does the third step of a five-step ethical analysis involve?

making a physical list of all the options and the potential outcomes

The ________ step of an ethical analysis involves asking whether the decision will impact the privacy or property rights of any individuals or corporations.

second

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).


Set pelajaran terkait

NCLEX Questions ~ End of Life Care

View Set

Modules 8-10: Communicating Between Networks

View Set

accounting software applications

View Set