Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Study Set 6
Quiz 11: Systems Development and Project Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Confidential e-mail messages are seldom monitored,although other business communication routinely is.
Question 2
True/False
Using office resources,such as networks and computers,to search for side jobs is generally not considered workplace Internet abuse.
Question 3
True/False
Many companies and organizations have established guidelines for ethical conduct,but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
Question 4
True/False
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage,and does not reveal them either to the general public or to the manufacturer for correction.