SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 5 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 12 Oct 2017 My Price 10.00

In terms of specific rules and regulations, which of these choices lists the documents in order from most specific to most general?

Question 1 (0.2 points)

 

In terms of specific rules and regulations, which of these choices lists the documents in order from most specific to most general?

Question 1 options:

A) Employee code of conduct, user access agreement, professional association code of conduct.

B) Professional association code of conduct, user access agreement, employee code of conduct.

C) User access agreement, employee code of conduct, professional association code of conduct.

SaveQuestion 2 (0.2 points)

 

(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.

Question 2 options:

A) Yes

B) No

SaveQuestion 3 (0.2 points)

 

What might members of a professional organization be doing when they refer to the organization's code of ethics?

Question 3 options:

A) Finding out whether a business practice is legal.

B) Clarifying whether a business practice violates the code of ethics.

C) Finding out what fines are imposed for violating the code of ethics.

D) Finding out how one becomes a member of the professional organization.

SaveQuestion 4 (0.2 points)

 

Who is a cyberstalker?

Question 4 options:

A) The intended victim of repeated continuous, unwanted communication.

B) One whose online hostile behavior is intended to harm another or others.

C) A person whose online hostile behavior avoids confronting the victim face-to-face.

D) A person who acts alone and anonymously when targeting others with continuous, unwanted communications.

SaveQuestion 5 (0.2 points)

 

You make a copy of a software application CD or DVD to lend to a friend. Is this legal?

Question 5 options:

A) Yes

B) No

SaveQuestion 6 (0.2 points)

 

(Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?

Question 6 options:

A) Yes

B) No

SaveQuestion 7 (0.2 points)

 

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

To provide scenarios that define when it is legal to copy and sell copyrighted software.

Question 7 options:

A) Yes

B) No

SaveQuestion 8 (0.2 points)

 

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

To discourage internet service providers from allowing file transfers.

Question 8 options:

A) Yes

B) No

SaveQuestion 9 (0.2 points)

 

Would the following activity likely be or not be a violation of an employee code of conduct:

 

Tracey accepts two tickets from a supplier for a professional basketball game being played in his area.

Question 9 options:

A) Likely a violation

B) Likely not a violation

SaveQuestion 10 (0.2 points)

 

"While employed at this company, no information obtained in the course of employment may be used to advance personal gain, including financial reward." In which of the documents below would this statement likely be found?

Question 10 options:

A) A user access agreement

B) An employee code of conduct

C) A professional association code of conduct

SaveQuestion 11 (0.2 points)

 

Would the following activity likely be or not be a violation of an employee code of conduct: Nora charges her personal cell phone in her cubicle at work.

Question 11 options:

A) Likely a violation

B) Likely not a violation

SaveQuestion 12 (0.2 points)

 

(True/False) An employee code of conduct will list illegal behaviors, but it will not list unethical behaviors.

Question 12 options:

A) True

B) False

SaveQuestion 13 (0.2 points)

 

Would the following behavior most likely be a violation of an employee code of conduct?

Using your work computer to invite friends and co-workers to a party at your home.

Question 13 options:

A) Yes

B) No

C) More information is needed.

SaveQuestion 14 (0.2 points)

 

(Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?

Question 14 options:

A) Yes

B) No

C) Maybe

SaveQuestion 15 (0.2 points)

 

Language that outlines acceptable and unacceptable use of IT resources and defines sanctions to be applied if a violation occurs is typically found in a/an __________.

Question 15 options:

A) employee code of conduct

B) professional code of ethics

C) security risk assessment

D) user access agreement

SaveQuestion 16 (0.2 points)

 

In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?

Question 16 options:

A) Posting tips, project photos, and ideas on a hobby-related forum

B) Posting your resume on a job-seeking or job-posting site

C) Posting photos of oneself that might be considered risque or offensive

D) Posting vacation photos after you have returned home

SaveQuestion 17 (0.2 points)

 

True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world.

Question 17 options:

A) True

B) False

SaveQuestion 18 (0.2 points)

 

In the scenario below, identify which of the three dimensions is primarily threatened or compromised.

A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website.

Question 18 options:

A) Confidentiality

B) Integrity

C) Availability

SaveQuestion 19 (0.2 points)

 

A small company that keeps identical lists of employees in different departments runs the risk of a compromise to which aspect of that data?

Question 19 options:

A) Confidentiality

B) Integrity

C) Availability

SaveQuestion 20 (0.2 points)

 

(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.

Question 20 options:

A) True

B) False

SaveQuestion 21 (0.2 points)

 

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.

Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.

Question 21 options:

A) Good practice

B) Bad practice

SaveQuestion 22 (0.2 points)

 

(Yes/No). You log into your legitimate online classroom site with your existing ID and password and are alerted that your password will expire in 14 days. You are directed to go to a Change Password site via a link on the login page. Is it safe to continue to the link and change your password?

Question 22 options:

A) No

B) Yes

SaveQuestion 23 (0.2 points)

 

Lately, Sylvia's home computer is super slow, and it restarts and shuts down without warning. The computer probably has a __________.

Question 23 options:

A) virus

B) worm

SaveQuestion 24 (0.2 points)

 

Sam's bank advised him that his account was overdrawn. But Sam's records show he has $900 in his account. Sam learns from the bank that someone's been withdrawing money from his account online with his user ID and password. What did the cyber criminal likely use to steal Sam's account information?

Question 24 options:

A) Spyware

B) Viruses

SaveQuestion 25 (0.2 points)

 

Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?

Question 25 options:

A) Your driver's license number

B) Your user ID and password

C) Your social security number

Save

Answers

(5)
Status NEW Posted 12 Oct 2017 09:10 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)