IT Quiz 9

Card Set Information

Author:
maxkelly
ID:
51515
Filename:
IT Quiz 9
Updated:
2010-11-24 11:25:24
Tags:
IT Quiz
Folders:

Description:
IT Quiz 9
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user maxkelly on FreezingBlue Flashcards. What would you like to do?


  1. When a cookie is created during a Web site visit, it is stored:
    A. In a Web directory
    B. On the ISP's computer
    C. On the visitor's computer
    D. On the Web site computer
    C. On the visitor's computer
    (this multiple choice question has been scrambled)
  2. What states that you may use copyrighted material in certain situations - for example, in the creation of new work or, within certain limits, for teaching purposes?
    a. Ethics
    b. Intellectual property
    c. Copyright
    d. None of the above
    d. None of the above
  3. _______ define the rights that individuals and organizations have with respect to information that pertains to them.
    A. Information rights
    B. Patent
    C. Intellectual propert
    D. Privacy laws
    A. Information rights
    (this multiple choice question has been scrambled)
  4. ________ refers to the mechanisms for assessing responsibility for decisions made and actions taken
    A. Accountability
    B. Decision trees
    C. Responsibility structures
    D. Business processes
    A. Accountability
    (this multiple choice question has been scrambled)
  5. ________ is the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state
    A. Information rights
    B. HIPAA
    C. Anti-spyware
    D. Privacy
    D. Privacy
    (this multiple choice question has been scrambled)
  6. A(n) ________ program traces online user activities without the users' permission or knowledge
    a. Spyware
    b. Adware
    c. Key logging software
    d. Trojan horse
    e. All of the above
    e. All of the above
  7. ________ defines principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior
    A. Responsibility
    B. Accountability
    C. Ethics
    D. Morals
    C. Ethics
    (this multiple choice question has been scrambled)
  8. A(n) ________ is a tiny file deposited on a computer hard drive when an individual visits certain Web sites
    a. Spyware
    b. Adware
    c. Trojan horse
    d. None of the above
    d. None of the above
  9. What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
    A. Information security
    B. Privacy
    C. Ethics
    D. Copyright
    A. Information security
    (this multiple choice question has been scrambled)
  10. The main security problem for organizations is:
    A. Inadequate bandwidth
    B. Wireless transmission
    C. Microsoft
    D. People
    D. People
    (this multiple choice question has been scrambled)
  11. ________ is intangible property created by individuals or corporations that is subject to protections under the various laws of the country.
    A. Patent
    B. Intellectual Property
    C. Fair Use Doctrine
    D. Copyright
    B. Intellectual Property
    (this multiple choice question has been scrambled)
  12. ________ means accepting the potential costs, duties, and obligations for the decisions one makes
    A. Responsibility
    B. Fulfilling a promise
    C. Accountability
    D. Culpability
    A. Responsibility
    (this multiple choice question has been scrambled)
  13. Which of the following is an example of acting unethically?
    a. Individuals copy, use, and distribute software
    b. Employees search organizational databases for sensitive corporate and personal information
    c. Individuals hack into computer systems to steal proprietary information
    d. All of the above
    d. All of the above
  14. A(n) ________ is a rogue software program that attaches itself to other software programs or data files, destroying data or disrupting processing and memory systems
    A. Spyware
    B. a, b, and c
    C. Adware
    D. a and b
    E. Trojan Horse
    E. Trojan Horse
    (this multiple choice question has been scrambled)
  15. The major reason companies monitor employee time on the Internet is to:
    A. Prevent the spread of viruses
    B. Check their ethical decisions
    C. Prevent the waste of company resources
    D. See whom they contact in other businesses
    C. Prevent the waste of company resources
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview