Week 12 Digital Systems - Ethics and Privacy
It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of? - Property Rights. - Moral Rights. - Distributive Justice. - Virtue.
Distributive Justice.
When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a copyright? - TRUE - FALSE
False
Which Act outlines a plan to protect government information and assets against cyberthreats? - Electronic Communications Privacy Act - Digital Millennium Copyright Act - Federal Information Security Management Act (FISMA) - Children's Internet Protection Act
Federal Information Security Management Act (FISMA)
The Act that protects person-to-person wire, oral, and electronic communications is - the Wiretap Act. - the Federal Information Security Management Act. - the Electronic Communications Privacy Act.Incorrect - the Children's Internet Protection Act.
The Wiretap Act
One way to stay safe while browsing the Internet is to use a VPN. VPN stands for virtual private network? - TRUE - FALSE
True
Which situation involves a computer ethics violation that you should report to your employer? - You think you see an unauthorized gambling site on a coworker's screen before she closes the window. - A trusted colleague tells you that your coworker has stolen a company laptop. - You have heard that a colleague has been using a work computer to launch a computer scam. - You pass a coworker's computer screen and see him surfing through child pornography.
You pass a coworker's computer screen and see him surfing through child pornography.
Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries? - distributing company-owned software without authorization - playing a multiplayer game from a personal computer using the company's Wi-Fi - sending a personal email from a work computer - posting to personal social media sites from a company computer
distributing company-owned software without authorization
Data that is traditionally used in commercially available relational databases, where the data resides in a fixed field and can easily be queried is called big data? - TRUE - FALSE
false
It is impossible to prepare for the consequences of ethical decisions, because the ramifications will always be unknown? - TRUE - FALSE
false
The Universalist Principle advocates for the greatest good for greatest number of people. - TRUE - FALSE
false
When a manager thinks of someone they truly admire, whether a mentor or a historical figure, and asks how that person would decide, they are following the Universalist Principle. - TRUE - FALSE
false
A hiring manager wants to check job applicants' posts on social media before deciding whom to hire, to ensure the person will represent the company with professionalism and maturity. Which dimension of ethical behavior in the digital age does this situation represent? - quality of life - establishing quality standards - information privacy rights - control and accountability
information privacy rights
Cookies that are stored on the hard drive and are not lost when the web browser is closed are called? - zombie cookies. - session cookies. - authentication cookies. - persistent cookies.
persistent cookies
How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet? - privacy. - piracy. - security. - connection.
privacy
What type of cookie is stored in temporary memory and is lost when the web browser is closed? - standard - session - persistent - authentication
session
What are third-party cookies? - small text files that a user stores in the cloud - small text files created by websites other than those visited by web customers - small text files created by following links within a website - small text files that store shopping cart information on retail sites
small text files created by websites other than those visited by web customers
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies? - first-party - authentication - session - third-party
third-party
What is a company that purchases consumer behavior information from other organizations engaged in? - direct inquiry - appraisal analysis - third-party data purchase - indirect tracking
third-party data purchase
Listing the likely consequences of a decision is part of the fourth step in the process of making an ethical analysis? - TRUE - FALSE
true
Making an ethical decision will most likely result in? - fierce competitors. - unintended consequences. - confused employees. - questioning superiors.
unintended consequences