Assignment 1 REVISION Flashcards
(40 cards)
Which of the following statements best describes a reason why organizations develop and abide by values to create an organizational culture and to define a consistent approach for dealing with the needs of their stakeholders, i.e. shareholders, employees, customers, suppliers, and the community?
A. Avoiding unfavourable and favourable publicity.
B. Gaining the goodwill of the community and society.
C. Creating an organization that operates consistently.
D. Protecting the organization from legal action
C. Creating an organization that operates consistently.
The specific responsibilities of the ethics officer is trying to establish an environment that encourages ethical decision making are:
A. Ensuring compliance with ethical procedures as well as creating and maintaining the ethics culture envisioned by the lowest level of corporate authority.
B. Creating and maintaining the ethics culture envisioned by the lowest level of corporate authority and serving as the key contact person for ethics issues.
C. Ensuring compliance with ethical procedures as well as serving as the key contact person for ethics issues.
D. A, B, and C are correct.
C. Ensuring compliance with ethical procedures as well as serving as the key contact person for ethics issues.
Expanding and changing systems introduce new risks: IT organizations must:
A. Keep up with technological change and implement approaches for dealing with new risks.
B. Perform ongoing security assessments and implement approaches for dealing with new risks.
C. Keep up with technological change and perform ongoing security assessments.
D. Keep up with technological change, perform ongoing security assessments and implement approaches for dealing with new risks.
D. Keep up with technological change, perform ongoing security assessments, and implement approaches for dealing with new risks
An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems.
Malicious insider
Someone who attempts to destroy government infrastructure, financial institutions, and other corporations, utilities, and emergency response units.
Cyberterrorist
An individual who captures trade secrets to gain an unfair competitive advantage.
Industrial spy
Someone who violates computer or Internet security maliciously or for illegal personal gain.
Black hat hacker
Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?
A. The Communications Decency Act (CDA) uses a vague definition of indecency.
B. The Communications Decency Act (CDA) is not applicable to social networking sites.
C. Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.
D. Section 230 of the Communications Decency Act (CDA) does not provide immunity to an Internet service provider (ISP)
C. Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.
Which of the following statements is/are true of Children’s Internet Protection Act (CIPA)?
A. CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
B. In case of CIPA, Congress specifically defined what content or Web sites should be forbidden and the measures to be used.
C. In June 2004, the Supreme Court ruling in the case of Ashcroft v. American Civil Liberties Union made it clear that CIPA was unconstitutional.
D. CIPA requires the tracking of Internet use by minors or adults.
A. CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit, and processes are often abandoned during times of crisis in which of the following maturity levels?
A. quantitatively managed
B. managed
C. defined
D. initial
D. Initial
The advantages of the Agile development methodology are:
A. It is an intense process that takes considerable time and effort on the part of project members and can result in burnout for system developers and other project participants.
B. Forces teamwork and lots of interaction between users and project stakeholders so that users are more likely to get a system that meets their needs.
C. For appropriate projects, this approach puts an application into production sooner.
D. Both B and C are correct.
D. Both B and C are correct.
Which of the following is/are an advantage(s) of social network advertising over traditional advertising media?
A. ads can be targeted to reach people with the desired demographic characteristics and a cost-effective, when compared to traditional advertising media.
B. ads can be targeted to reach people with the desired demographic characteristics and ad viewers can easily identify useful contacts.
C. it is cost-effective when compared to traditional advertising media and ad viewers can easily identify useful contacts.
D. ads can be targeted to reach people with the desired demographic characteristics.
D.ads can be targeted to reach people with the desired demographic characteristics.
The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?
A. tailor a particular social media platform.
B. raise brand awareness.
C. create a conversation with viewers.
D reach people with desired characteristics.
B. raise brand awareness
Important business-technology decisions with strong ethical implications are too often left to the technical experts to decide.
True
Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.
False
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
False
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
True
Messages whose primary purpose is to communicate information about a specific transaction are subject to the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act.
False
The plaintiff in a strategic lawsuit against public participation (SLAPP) can present themselves to the court admitting that their intent is to censor their critics.
False
A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.
True
Software suppliers attempt to limit their liability by specifying that although software is warranted to run on a given machine configuration, no assurance is given as to what that software will do.
True
Different types of social media are blogs, discussion forums, media-sharing networks, wikis, social bookmarking tools, social messaging apps, and social networking, news, and shopping platforms.
True
Organic media marketing involves the use of social networks to communicate and promote the benefits of products and services.
False
A(n) _____ is a statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
Code of ethics