Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.______ are habits of unacceptable behavior a)Vices b)Moral code c)Virtues d)Globalization 2._______ Establishes boundaries of generally accepted behaviour a)Vices b)Moral code c)Virtues d)Globalization 3.People with

1.______ are habits of unacceptable behavior

a)Vices

b)Moral code

c)Virtues

d)Globalization

2._______ Establishes boundaries of generally accepted behaviour

a)Vices

b)Moral code

c)Virtues

d)Globalization

3.People with _______ apply the same moral standards in all situations

a)Ethic

b)Simplicity

c)Rigid

d)Integrity

4.____ are standards or codes of behavior expected of an individual by a group

a)Ethics

b)Simplicity

c)Rigid

d)Integrity

5.U.S. Supreme Court established that an employer can be held responsible for the acts of its employees. This principle is called______

a)Ethical act

b)Respondent superior

c)Employee act

d)Globalization

6.A trade group representing the world's largest software and hardware manufacturers with a mission is to stop the unauthorized copying of software is called ______

a)Business Software Alliance

b)Software Manufacturing Alliance

c)Software Hardware Organization

d)Software Hardware Mission

7.Crime of obtaining goods, services, or property through deception or trickery is best called _________

a)Denial of service

b)Piracy

c)Spyware

d)Fraud

8.Which of the following is not true about professionals?

a)Require advanced training and experience

b)Must exercise discretion and judgment in their work

c)Their work can be standardized

d)Contribute to society, participate in lifelong training, assist other professionals

9.Software piracy involves:

a)Act of legally making copies of software or enabling access to software to which they are not entitled

b)Act of making legal copies of software or enabling access to software

c)Act of illegally making copies of software or enabling access to software to which they are not entitled

d)Act of hacking other computers

10.Social audit involves:

a)Reviews how well organization is meeting ethical and social responsibility goals

b)Reviews how well organization is gaining more profits

c)Oversees the organization's business expansion

d)Make decisions based on CEO interest

choose the ONE best answer from the table to fill in the blank

Phishing

Integrity

Morals

Risk assessment

Privacy

Denial of service

Bribery

Ethics

Security policy

Malware

Business Software Alliance

Spyware

Hacker

Phishing

Vulnerability

Freedom of Information

Social audit

Rootkits

Fraud

Spam

_________________ is a crime of obtaining goods, services, or property through deception or trickery.

Providing money, property, or favors to obtain a business advantage is known as _______________.

________________ are set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.

A _____________ is an organization's review of potential threats to its computers and network and the probability of those threats occurring.

Abuse of email systems to send unsolicited email to large numbers of people is called a_______________.

The _____________ Act provides the public with the means to gain access to certain government records.

The security requirements of an organization and the controls and sanctions used to meet those requirements are known as ___________

_________________is stealing personal identity data by tricking users into entering information on a counterfeit Web site.

_______ is the right to be left alone, the most comprehensive of rights, and the right most valued by a free people.

_______________ is a cornerstone of ethical behaviour and is the practice of acting in accordance with one's own code of principles.

  1. Many ethical dilemmas are not as simple as right versus wrong. (True / False)
  2. Morality do not vary by religion or gender (True / False)
  3. Ethics are standards or codes of behavior expected of an individual by a group.(True / False)
  4. Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company. (True / False)
  5. Software piracy can be defined as the act of legally making copies of software or enabling access to software.(True / False)
  6. Anonymous expression, which allows people to state opinions without revealing their identity, has been found unconstitutional.(True / False)
  7. The right to freedom of expression has been broadened to include nonverbal, visual, and symbolic forms of expressions.(True / False)
  8. Ethical problems arise if a company recommends its own products and services to remedy problems they have detected.(True / False)
  9. Number of IT-related security incidents is decreasing around the world.(True / False)
  10. E-discovery is complicated and requires extensive time to collect, prepare, and review data. (True / False)

Answer each of the following with in the space provided

  1. What is Whistle-blowing?
  2. What is meant by compliance?
  3. What is Reverse Engineering?
  4. What is Open Source Code?
  5. What is cybersquatting?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials Of Business Law

Authors: Anthony Liuzzo, Ruth Calhoun Hughes

11th Edition

ISBN: 1260734544, 978-1260734546

More Books

Students also viewed these Law questions