Deck 11: Systems Development and Project Management

ملء الشاشة (f)
exit full mode
سؤال
Confidential e-mail messages are seldom monitored,although other business communication routinely is.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Using office resources,such as networks and computers,to search for side jobs is generally not considered workplace Internet abuse.
سؤال
Many companies and organizations have established guidelines for ethical conduct,but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
سؤال
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage,and does not reveal them either to the general public or to the manufacturer for correction.
سؤال
The technical tools to steal credit card numbers and online bank account log-in data are often as valuable as the stolen good themselves.
سؤال
Most companies don't reveal that they have been targets or victims of computer crime.
سؤال
Cybercrime is becoming one of the Net's growth businesses.
سؤال
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
سؤال
According to the text case,about two-thirds of the companies surveyed monitor their Internet connections,but only two states require informing employees that they do so.
سؤال
A virus is a distinct program that can run unaided.
سؤال
Spyware is annoying,but generally no threat to your privacy.
سؤال
A malicious applet is an instruction in a computer program that triggers a malicious act.
سؤال
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
سؤال
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet,capturing passwords or content.
سؤال
According to one survey,90 percent of U.S.workers admit to surfing recreational sites during office hours.
سؤال
Electronic breaking and entering means getting access to a computer system,reading some files,but neither stealing nor damaging anything.
سؤال
There are underground websites where stolen data are swapped as easily as baseball cards on eBay.
سؤال
The music industry reports that illegal downloading of music and videos is a growing problem.
سؤال
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
سؤال
Russia has some of the strictest anti-spamming laws in the world.
سؤال
In the United States,opt-out is the default position,whereas in Europe consumers must opt-in or their personal information cannot be used.
سؤال
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints,voice,or other physical trait.
سؤال
People who sit at PC workstations or visual display terminals in fast-paced,repetitive-keystroke jobs can suffer from a variety of health problems,known collectively as computer trauma disorders (CTDs).
سؤال
Security monitors can control the use of the hardware,software,and data resources of a computer system.
سؤال
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
سؤال
According to the text case,ETrade is more concerned with the security of their information than with the costs of computer hardware.
سؤال
In some systems,the password to read the contents of a file is different from that required to write to a file (change its contents).
سؤال
According to the text case,monitoring employees use of email and the Internet has become commonplace.
سؤال
As a business professional,you have a responsibility to promote ethical uses of information technology in the workplace.This responsibility includes:

A)Performing your role as a vital business resource by participating on every development team
B)Using the Internet only during breaks and after-work hours
C)Performing your role as a vital human resource in the business systems you help develop and use in your organization
D)Documenting all employee electronic mail usage and Internet searches
سؤال
The most widely used encryption method uses a pair of public and private keys unique to each individual.
سؤال
Lawsuits by monitored workers against employers are increasing.
سؤال
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
سؤال
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
سؤال
When managers apply the _____________ theory of ethical decision making,they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.

A)social contract
B)stakeholder
C)stockholder
D)midas
سؤال
The use of information technologies is causing a significant reduction in some types of job opportunities.
سؤال
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in,gigabytes out (GIGO)syndrome.
سؤال
These days,corporate antivirus protection is a centralized function of information technology.
سؤال
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
سؤال
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
سؤال
Security suites integrate virus protection with firewalls,Web security,and encrypted e-mail.
سؤال
_______________ refers to sifting through a company's garbage to find information to help break into their computers.

A)Dumpster Diving
B)Password cracker
C)Back door
D)Sniffer
سؤال
One of the major principles of technology ethics is that the benefits and burdens of the technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk.This principle is:

A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
سؤال
According to the text,a hacker:

A)Maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage,not revealing them to either the general public or the manufacturer for correction.
B)Promotes individual freedom and accessibility over privacy and security.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
سؤال
All of the following are AITP standards of professional conduct related to a person's obligation to society except:

A)Protect the privacy and confidentiality of all information entrusted to me.
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain.
سؤال
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers.This is known as ________________.

A)sniffing
B)hacking
C)phishing
D)spoofing
سؤال
The stakeholder theory maintains that:

A)Companies have ethical responsibilities to all members of society,which allow corporations to exist based on a social contract
B)Managers are agents of the stockholders,and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C)Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a stake in or claim on a company
D)Managers are agents of the customer,and their only ethical responsibility is to increase the service of the business,without violating the law or engaging in fraudulent practices
سؤال
The text defines ________________ as the obsessive use of computers,or the unauthorized access and use of networked computer systems.

A)hacking
B)cyber-slacking
C)cracking
D)resource theft
سؤال
According to the textbook case,which statement is true?

A)Credibility is difficult to earn in business.
B)Credibility is earned slowly by conducting your business with integrity over time.
C)Credibility is earned by showing exceptional leadership in exceptional circumstances.
D)All of the choices are correct.
سؤال
According to the text,a cracker:

A)Maintains knowledge of the vulnerabilities he or she finds and reveals them to the general public and the manufacturer for correction.
B)Promotes privacy and security over individual freedom and accessibility.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
سؤال
All of the following are AITP standards of professional conduct related to a person's obligation to his employer except:

A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Never exploit the weakness of a computer system for personal gain or personal satisfaction.
سؤال
A _______________ is software that can guess passwords.

A)logic bomb
B)password cracker
C)back door
D)sniffer
سؤال
According to the text,all of the following statements are included in the definition of computer crime except:

A)Unauthorized modification of software,data,or network resources
B)Unauthorized release of information
C)Unauthorized copying of software
D)Unauthorized distribution of public domain software
سؤال
Which of the following are AITP standards of professional conduct related to a person's obligation to society?

A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Not exploit the weakness of a computer system for personal gain or personal satisfaction.
سؤال
Which of the following are AITP standards of professional conduct related to a person's obligation to his employer?

A)Protect the privacy and confidentiality of all information entrusted to me
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
سؤال
According to the text,companies are protecting themselves from computer crime by using:

A)Antivirus software
B)Intrusion-detection systems
C)Content filtering/monitoring
D)All of the choices are correct.
سؤال
Which of the following best describes the ethical principle of informed consent?

A)The good achieved by technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk
B)Those affected by technology should understand and accept the risks
C)The benefits and burdens of technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk
D)Even if judged acceptable by the other guidelines,the technology must be implemented so as to avoid all unnecessary risks
سؤال
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk.This principle is:

A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
سؤال
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines,the technology must be implemented so as to avoid all unnecessary risk.This principle is:

A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
سؤال
_______________ is/are the most commonly used security technology at large companies.

A)Intrusion-detection systems
B)Smart cards
C)Biometrics
D)Antivirus software
سؤال
According to the textbook case,which statement is true of Enron?

A)It showed scant interest in questions or doubts about its questionable,unethical,and even illegal business and accounting practices.
B)It could well have been a successful Fortune 1000 firm.
C)They are a textbook case of greed and mismanagement.
D)All of the choices are correct.
سؤال
All the following statements are true about encryption,except:

A)Encryption has become an important way to protect data,especially on the Internet.
B)Encryption has become an important method for storing data on hardware devices,such as large hard drives on the Internet.
C)Passwords and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users.
D)Encryption involves using mathematical algorithms to scramble digital data before they are transmitted,and then to decode the data when they are received.
سؤال
All of the following are common ways for a computer virus to enter a computer system except:

A)E-mail and file attachments
B)Running antivirus programs
C)Downloaded copies of shareware
D)Borrowed copies of software
سؤال
To use public domain software legally,a company:

A)Must purchase individual copies or a site license for a certain number of copies
B)Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C)Can make as many copies as desired because the software is not copyrighted
D)None of the choices are correct.
سؤال
According to the textbook case,many C-level executives do all the following regarding information security,except:

A)C-level executives recognize the importance of information security.
B)C-level executives actively support their IT organizations' efforts to protect corporate assets and reduce risk.
C)C-level executives are changing their attitudes about security in the face of rising costs of information breaches.
D)C-level executives are primarily interested in maintaining the stock prices of the firm.
سؤال
The practice of sending extremely critical,derogatory e-mail messages or newsgroup postings to other users on the Internet is called _______________.

A)flaming
B)spamming
C)spoofing
D)spying
سؤال
According to the text,all the following are goals of security management relating to information system processes and resources,except:

A)Speed.
B)Accuracy.
C)Integrity.
D)Safety.
سؤال
The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.

A)firewall
B)filtered portal
C)encoder
D)telecommunications line
سؤال
Individuals have been mistakenly arrested and jailed,and others have been denied credit because of their physical profiles or personal data.These are often the result of:

A)Computer profiling and computer matching
B)Unauthorized opt-in
C)Censorship
D)Adware
سؤال
The goal of ergonomics is to design:

A)Effective work environments that are conducive to fast-paced,repetitive jobs
B)Efficient work environments that are productive and promote high morale
C)Healthy work environments that are safe,comfortable,and pleasant for people to work in
D)Policies regarding work environment structures
سؤال
According to the Real World case,CIOs should look at _______________ as a supplemental tool to limit communication of sensitive data.

A)outbound content management
B)inbound content management
C)in-house content management
D)competitors' content management
سؤال
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.

A)flaming
B)spamming
C)spoofing
D)spying
سؤال
Which of the following is not a health issue commonly related to the use of information technology in the workplace?

A)Damaged arm and neck muscles
B)Eyestrain
C)Job stress
D)Hearing loss
سؤال
Governments around the world are debating privacy issues and considering various forms of legislation.One area central to the privacy debate is opt-in versus opt-out.Those preferring the opt-in standard do so because this standard would:

A)Make privacy the default for consumers
B)Make privacy the default,if a consumer calls in to request no data sharing
C)Make sharing private information the default
D)It would match the existing policy of most Internet-based companies
سؤال
Which of the following statements about adware and spyware is true?

A)Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B)Removal programs are 100% successful,although they are very expensive
C)Adware software removes spyware software from a user's computer
D)A user must approve the downloading of adware,even if tricked into doing so
سؤال
What is the purpose of external firewalls?

A)To prevent users from accessing sensitive human resource or financial data
B)To limit access of intranet resources to specific users
C)To avoid creating security holes to back-end resources
D)To keep out unauthorized Internet users from intranet networks
سؤال
According to the Real World case,which of the following is not a sensitive type of information that firms watch for when examining data leaving the organization?

A)Top secret government information
B)Personally identifiable information
C)Confidential company information
D)Inappropriate use of company resources
سؤال
All the following statements are true about encryption,except:

A)The most widely used encryption method uses a pair of public and private keys unique to each individual.
B)Encryption programs are sold as separate products or built into other software used for the encryption process.
C)An e-mail could be scrambled and encoded using a unique private key,then unscrambled using the recipient's secret public key.
D)There are several competing software encryption standards,but the top two are RSA and PGP.
سؤال
According to the text,which of the following statements is true of cyber law?

A)Cyber law is often controversial.
B)Cyber law regulates the Internet and intellectual property in all countries.
C)Cyber law regulates electronic data communications but not the Internet.
D)Cyber law affects legal issues but avoids political issues.
سؤال
According to the text,good ergonomic design considers the software,the computer,the workstation,and _______________.

A)the users
B)job design
C)psychological stress
D)previous injuries
سؤال
Firewall software has become an essential computer system component for individuals connecting to the Internet with DSL or cable modems because:

A)Their "always-on" connection status makes them particularly vulnerable.
B)Crackers dislike DSL connections for using too much band-width on the Internet.
C)DSL will not operate without a firewall.
D)Firewalls are the only security that works with cable modems.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/114
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Systems Development and Project Management
1
Confidential e-mail messages are seldom monitored,although other business communication routinely is.
False
2
Using office resources,such as networks and computers,to search for side jobs is generally not considered workplace Internet abuse.
False
3
Many companies and organizations have established guidelines for ethical conduct,but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
False
4
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage,and does not reveal them either to the general public or to the manufacturer for correction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
5
The technical tools to steal credit card numbers and online bank account log-in data are often as valuable as the stolen good themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
6
Most companies don't reveal that they have been targets or victims of computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
7
Cybercrime is becoming one of the Net's growth businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
8
As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to the text case,about two-thirds of the companies surveyed monitor their Internet connections,but only two states require informing employees that they do so.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
10
A virus is a distinct program that can run unaided.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
11
Spyware is annoying,but generally no threat to your privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
12
A malicious applet is an instruction in a computer program that triggers a malicious act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
13
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
14
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet,capturing passwords or content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
15
According to one survey,90 percent of U.S.workers admit to surfing recreational sites during office hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
16
Electronic breaking and entering means getting access to a computer system,reading some files,but neither stealing nor damaging anything.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
17
There are underground websites where stolen data are swapped as easily as baseball cards on eBay.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
18
The music industry reports that illegal downloading of music and videos is a growing problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
19
Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
20
Russia has some of the strictest anti-spamming laws in the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
21
In the United States,opt-out is the default position,whereas in Europe consumers must opt-in or their personal information cannot be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
22
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints,voice,or other physical trait.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
23
People who sit at PC workstations or visual display terminals in fast-paced,repetitive-keystroke jobs can suffer from a variety of health problems,known collectively as computer trauma disorders (CTDs).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
24
Security monitors can control the use of the hardware,software,and data resources of a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
25
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
26
According to the text case,ETrade is more concerned with the security of their information than with the costs of computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
27
In some systems,the password to read the contents of a file is different from that required to write to a file (change its contents).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
28
According to the text case,monitoring employees use of email and the Internet has become commonplace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
29
As a business professional,you have a responsibility to promote ethical uses of information technology in the workplace.This responsibility includes:

A)Performing your role as a vital business resource by participating on every development team
B)Using the Internet only during breaks and after-work hours
C)Performing your role as a vital human resource in the business systems you help develop and use in your organization
D)Documenting all employee electronic mail usage and Internet searches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
30
The most widely used encryption method uses a pair of public and private keys unique to each individual.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
31
Lawsuits by monitored workers against employers are increasing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
32
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
33
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
34
When managers apply the _____________ theory of ethical decision making,they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.

A)social contract
B)stakeholder
C)stockholder
D)midas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
35
The use of information technologies is causing a significant reduction in some types of job opportunities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
36
IS controls are needed to ensure the proper entry of data into a business system and thus avoid the gigabytes in,gigabytes out (GIGO)syndrome.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
37
These days,corporate antivirus protection is a centralized function of information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
38
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
39
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
40
Security suites integrate virus protection with firewalls,Web security,and encrypted e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
41
_______________ refers to sifting through a company's garbage to find information to help break into their computers.

A)Dumpster Diving
B)Password cracker
C)Back door
D)Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
42
One of the major principles of technology ethics is that the benefits and burdens of the technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk.This principle is:

A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
43
According to the text,a hacker:

A)Maintains knowledge of the vulnerabilities he or she finds and exploits them for private advantage,not revealing them to either the general public or the manufacturer for correction.
B)Promotes individual freedom and accessibility over privacy and security.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
44
All of the following are AITP standards of professional conduct related to a person's obligation to society except:

A)Protect the privacy and confidentiality of all information entrusted to me.
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
45
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers.This is known as ________________.

A)sniffing
B)hacking
C)phishing
D)spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
46
The stakeholder theory maintains that:

A)Companies have ethical responsibilities to all members of society,which allow corporations to exist based on a social contract
B)Managers are agents of the stockholders,and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
C)Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a stake in or claim on a company
D)Managers are agents of the customer,and their only ethical responsibility is to increase the service of the business,without violating the law or engaging in fraudulent practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
47
The text defines ________________ as the obsessive use of computers,or the unauthorized access and use of networked computer systems.

A)hacking
B)cyber-slacking
C)cracking
D)resource theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
48
According to the textbook case,which statement is true?

A)Credibility is difficult to earn in business.
B)Credibility is earned slowly by conducting your business with integrity over time.
C)Credibility is earned by showing exceptional leadership in exceptional circumstances.
D)All of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
49
According to the text,a cracker:

A)Maintains knowledge of the vulnerabilities he or she finds and reveals them to the general public and the manufacturer for correction.
B)Promotes privacy and security over individual freedom and accessibility.
C)Commits only electronic breaking and entering.
D)Is a malicious or criminal hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
50
All of the following are AITP standards of professional conduct related to a person's obligation to his employer except:

A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Never exploit the weakness of a computer system for personal gain or personal satisfaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
51
A _______________ is software that can guess passwords.

A)logic bomb
B)password cracker
C)back door
D)sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
52
According to the text,all of the following statements are included in the definition of computer crime except:

A)Unauthorized modification of software,data,or network resources
B)Unauthorized release of information
C)Unauthorized copying of software
D)Unauthorized distribution of public domain software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following are AITP standards of professional conduct related to a person's obligation to society?

A)Protect the privacy and confidentiality of all information entrusted to me.
B)Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern.
D)Not exploit the weakness of a computer system for personal gain or personal satisfaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following are AITP standards of professional conduct related to a person's obligation to his employer?

A)Protect the privacy and confidentiality of all information entrusted to me
B)To the best of my ability,ensure that the products of my work are used in a socially responsible way
C)Never misrepresent or withhold information that is germane to a problem or a situation of public concern
D)Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
55
According to the text,companies are protecting themselves from computer crime by using:

A)Antivirus software
B)Intrusion-detection systems
C)Content filtering/monitoring
D)All of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following best describes the ethical principle of informed consent?

A)The good achieved by technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk
B)Those affected by technology should understand and accept the risks
C)The benefits and burdens of technology should be distributed fairly.Those who benefit should bear their fair share of the risks,and those who do not benefit should not suffer a significant increase in risk
D)Even if judged acceptable by the other guidelines,the technology must be implemented so as to avoid all unnecessary risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
57
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk.Moreover,there must be no alternative that achieves the same or comparable benefits with less harm or risk.This principle is:

A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
58
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines,the technology must be implemented so as to avoid all unnecessary risk.This principle is:

A)Informed consent
B)Justice
C)Minimized risk
D)Proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
59
_______________ is/are the most commonly used security technology at large companies.

A)Intrusion-detection systems
B)Smart cards
C)Biometrics
D)Antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
60
According to the textbook case,which statement is true of Enron?

A)It showed scant interest in questions or doubts about its questionable,unethical,and even illegal business and accounting practices.
B)It could well have been a successful Fortune 1000 firm.
C)They are a textbook case of greed and mismanagement.
D)All of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
61
All the following statements are true about encryption,except:

A)Encryption has become an important way to protect data,especially on the Internet.
B)Encryption has become an important method for storing data on hardware devices,such as large hard drives on the Internet.
C)Passwords and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users.
D)Encryption involves using mathematical algorithms to scramble digital data before they are transmitted,and then to decode the data when they are received.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
62
All of the following are common ways for a computer virus to enter a computer system except:

A)E-mail and file attachments
B)Running antivirus programs
C)Downloaded copies of shareware
D)Borrowed copies of software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
63
To use public domain software legally,a company:

A)Must purchase individual copies or a site license for a certain number of copies
B)Can examine a single copy of the software for 30 days and then purchase as many copies as needed
C)Can make as many copies as desired because the software is not copyrighted
D)None of the choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
64
According to the textbook case,many C-level executives do all the following regarding information security,except:

A)C-level executives recognize the importance of information security.
B)C-level executives actively support their IT organizations' efforts to protect corporate assets and reduce risk.
C)C-level executives are changing their attitudes about security in the face of rising costs of information breaches.
D)C-level executives are primarily interested in maintaining the stock prices of the firm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
65
The practice of sending extremely critical,derogatory e-mail messages or newsgroup postings to other users on the Internet is called _______________.

A)flaming
B)spamming
C)spoofing
D)spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
66
According to the text,all the following are goals of security management relating to information system processes and resources,except:

A)Speed.
B)Accuracy.
C)Integrity.
D)Safety.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
67
The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.

A)firewall
B)filtered portal
C)encoder
D)telecommunications line
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
68
Individuals have been mistakenly arrested and jailed,and others have been denied credit because of their physical profiles or personal data.These are often the result of:

A)Computer profiling and computer matching
B)Unauthorized opt-in
C)Censorship
D)Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
69
The goal of ergonomics is to design:

A)Effective work environments that are conducive to fast-paced,repetitive jobs
B)Efficient work environments that are productive and promote high morale
C)Healthy work environments that are safe,comfortable,and pleasant for people to work in
D)Policies regarding work environment structures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
70
According to the Real World case,CIOs should look at _______________ as a supplemental tool to limit communication of sensitive data.

A)outbound content management
B)inbound content management
C)in-house content management
D)competitors' content management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
71
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.

A)flaming
B)spamming
C)spoofing
D)spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following is not a health issue commonly related to the use of information technology in the workplace?

A)Damaged arm and neck muscles
B)Eyestrain
C)Job stress
D)Hearing loss
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
73
Governments around the world are debating privacy issues and considering various forms of legislation.One area central to the privacy debate is opt-in versus opt-out.Those preferring the opt-in standard do so because this standard would:

A)Make privacy the default for consumers
B)Make privacy the default,if a consumer calls in to request no data sharing
C)Make sharing private information the default
D)It would match the existing policy of most Internet-based companies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following statements about adware and spyware is true?

A)Protecting against this software usually requires the purchase and installation of programs designed to prevent the software from being downloaded and installed
B)Removal programs are 100% successful,although they are very expensive
C)Adware software removes spyware software from a user's computer
D)A user must approve the downloading of adware,even if tricked into doing so
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is the purpose of external firewalls?

A)To prevent users from accessing sensitive human resource or financial data
B)To limit access of intranet resources to specific users
C)To avoid creating security holes to back-end resources
D)To keep out unauthorized Internet users from intranet networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
76
According to the Real World case,which of the following is not a sensitive type of information that firms watch for when examining data leaving the organization?

A)Top secret government information
B)Personally identifiable information
C)Confidential company information
D)Inappropriate use of company resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
77
All the following statements are true about encryption,except:

A)The most widely used encryption method uses a pair of public and private keys unique to each individual.
B)Encryption programs are sold as separate products or built into other software used for the encryption process.
C)An e-mail could be scrambled and encoded using a unique private key,then unscrambled using the recipient's secret public key.
D)There are several competing software encryption standards,but the top two are RSA and PGP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
78
According to the text,which of the following statements is true of cyber law?

A)Cyber law is often controversial.
B)Cyber law regulates the Internet and intellectual property in all countries.
C)Cyber law regulates electronic data communications but not the Internet.
D)Cyber law affects legal issues but avoids political issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
79
According to the text,good ergonomic design considers the software,the computer,the workstation,and _______________.

A)the users
B)job design
C)psychological stress
D)previous injuries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
80
Firewall software has become an essential computer system component for individuals connecting to the Internet with DSL or cable modems because:

A)Their "always-on" connection status makes them particularly vulnerable.
B)Crackers dislike DSL connections for using too much band-width on the Internet.
C)DSL will not operate without a firewall.
D)Firewalls are the only security that works with cable modems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.