Module Assessment - Ethics and Privacy Concerns

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Insurance companies use big data in actuarial analysis in order to better understand their customers' needs.

False

The Act that requires that public schools and libraries must comply with Internet safety policies imposed by the government under this legislation and specifically requires all pornographic sites to include some sort of age verification is The Children's Internet Privacy Act of 2000 (CIPA).

False

The Children's Internet Protection Act of 2000 (CIPA) seeks to keep children off the Internet.

False

Victims of a data breach should consider purchasing antivirus software.

False

Which of the following is true of structured data? More than one answer may be selected

It has a defined length, type, and format. It can include numbers and dates. It is designed for input into databases.

It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of

Distributive Justice.

In a five-step ethical analysis, the second step is to determine whom will be affected by a decision.

True

Living a virtuous life involves acting with high morals that are logically defined or shaped by

ethics

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

One concern that falls under the ethical dimension of quality of life is the fact that the more time teens spend on social media, the more likely they are to suffer from depression.

true

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?

The USA PATRIOT Act/USA Freedom Act

Monitoring your credit, creating strong passwords, using antivirus protection, and practicing safe browsing techniques are methods of protecting your personal identity while browsing the Internet.

True

Which browser settings should you consider adjusting? More than one answer may be correct.

deleting cookies blocking or customizing your cookie settings deciding from which sites you want to allow cookies

What is the fourth step in a five-step ethical analysis?

listing options

The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the

USA PATRIOT Act/USA Freedom Act.

The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the

Utilitarian Principle

The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the

Wiretap Act

Which situation involves a computer ethics violation that you should report to your employer?

You pass a coworker's computer screen and see him surfing through child pornography.

From the following list, select the activities that are both violations of workplace computer ethics and illegal.

computer scams launched from work computers software piracy using an employer's computer network

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a patent.

false

A password is a biometric measure used to prevent unauthorized access to data and user accounts.

false

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies.

false

Data that is traditionally used in commercially available relational databases, where the data resides in a fixed field and can easily be queried is called big data.

false

The Universalist Principle advocates for the greatest good for greatest number of people.

false

Your right to have your personal information protected online is covered by your property rights.

false

Which of the following is a step in an ethical analysis? More than one answer may be correct.

getting all the pertinent facts determining who is affected searching for precedents

What does the Wiretap Act aim to protect against?

identity theft and unlawful access to stored communications

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which of the following?

keystrokes account numbers passwords

When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?

listing options

Deepfake technology raises questions about the ethics of

modifying images or video by replacing one person's likeness with another's.

Cookies that are stored on the hard drive and are not lost when the web browser is closed are called

persistent cookies

Keystroke loggers and packet analyzers (sniffers) are two common types of

spyware

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?

the Principle of Virtue

A form of spyware that records all actions typed on a keyboard is called a keystroke logger.

true

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use big data.

true


Set pelajaran terkait

Security + Full Study Guide Qs (CompTIA )

View Set

2: Traditional and Contemporary Management Perspectives

View Set

Pharmacology Made Easy 4.0 Introduction to Pharmacology

View Set

Chapter 2: Scarcity and the World of Trade-Offs

View Set

Chapter 3: Attitudes and job satisfaction

View Set

Chapter 13- Viruses Test Questions

View Set

Chapter 13 and 14 Fruits and Veggies

View Set

Retirement Plan Final - Online Ch 10

View Set