Question
1.______ are habits of unacceptable behavior a)Vices b)Moral code c)Virtues d)Globalization 2._______ Establishes boundaries of generally accepted behaviour a)Vices b)Moral code c)Virtues d)Globalization 3.People with
1.______ are habits of unacceptable behavior
a)Vices
b)Moral code
c)Virtues
d)Globalization
2._______ Establishes boundaries of generally accepted behaviour
a)Vices
b)Moral code
c)Virtues
d)Globalization
3.People with _______ apply the same moral standards in all situations
a)Ethic
b)Simplicity
c)Rigid
d)Integrity
4.____ are standards or codes of behavior expected of an individual by a group
a)Ethics
b)Simplicity
c)Rigid
d)Integrity
5.U.S. Supreme Court established that an employer can be held responsible for the acts of its employees. This principle is called______
a)Ethical act
b)Respondent superior
c)Employee act
d)Globalization
6.A trade group representing the world's largest software and hardware manufacturers with a mission is to stop the unauthorized copying of software is called ______
a)Business Software Alliance
b)Software Manufacturing Alliance
c)Software Hardware Organization
d)Software Hardware Mission
7.Crime of obtaining goods, services, or property through deception or trickery is best called _________
a)Denial of service
b)Piracy
c)Spyware
d)Fraud
8.Which of the following is not true about professionals?
a)Require advanced training and experience
b)Must exercise discretion and judgment in their work
c)Their work can be standardized
d)Contribute to society, participate in lifelong training, assist other professionals
9.Software piracy involves:
a)Act of legally making copies of software or enabling access to software to which they are not entitled
b)Act of making legal copies of software or enabling access to software
c)Act of illegally making copies of software or enabling access to software to which they are not entitled
d)Act of hacking other computers
10.Social audit involves:
a)Reviews how well organization is meeting ethical and social responsibility goals
b)Reviews how well organization is gaining more profits
c)Oversees the organization's business expansion
d)Make decisions based on CEO interest
choose the ONE best answer from the table to fill in the blank
Phishing
Integrity
Morals
Risk assessment
Privacy
Denial of service
Bribery
Ethics
Security policy
Malware
Business Software Alliance
Spyware
Hacker
Phishing
Vulnerability
Freedom of Information
Social audit
Rootkits
Fraud
Spam
_________________ is a crime of obtaining goods, services, or property through deception or trickery.
Providing money, property, or favors to obtain a business advantage is known as _______________.
________________ are set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
A _____________ is an organization's review of potential threats to its computers and network and the probability of those threats occurring.
Abuse of email systems to send unsolicited email to large numbers of people is called a_______________.
The _____________ Act provides the public with the means to gain access to certain government records.
The security requirements of an organization and the controls and sanctions used to meet those requirements are known as ___________
_________________is stealing personal identity data by tricking users into entering information on a counterfeit Web site.
_______ is the right to be left alone, the most comprehensive of rights, and the right most valued by a free people.
_______________ is a cornerstone of ethical behaviour and is the practice of acting in accordance with one's own code of principles.
- Many ethical dilemmas are not as simple as right versus wrong. (True / False)
- Morality do not vary by religion or gender (True / False)
- Ethics are standards or codes of behavior expected of an individual by a group.(True / False)
- Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company. (True / False)
- Software piracy can be defined as the act of legally making copies of software or enabling access to software.(True / False)
- Anonymous expression, which allows people to state opinions without revealing their identity, has been found unconstitutional.(True / False)
- The right to freedom of expression has been broadened to include nonverbal, visual, and symbolic forms of expressions.(True / False)
- Ethical problems arise if a company recommends its own products and services to remedy problems they have detected.(True / False)
- Number of IT-related security incidents is decreasing around the world.(True / False)
- E-discovery is complicated and requires extensive time to collect, prepare, and review data. (True / False)
Answer each of the following with in the space provided
- What is Whistle-blowing?
- What is meant by compliance?
- What is Reverse Engineering?
- What is Open Source Code?
- What is cybersquatting?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started