The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 5 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Question 1Â (0.2 points)
Â
In terms of specific rules and regulations, which of these choices lists the documents in order from most specific to most general?
Question 1 options:
A)Â Employee code of conduct, user access agreement, professional association code of conduct.
B)Â Professional association code of conduct, user access agreement, employee code of conduct.
C)Â User access agreement, employee code of conduct, professional association code of conduct.
SaveQuestion 2Â (0.2 points)
Â
(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.
Question 2 options:
A)Â Yes
B)Â No
SaveQuestion 3Â (0.2 points)
Â
What might members of a professional organization be doing when they refer to the organization's code of ethics?
Question 3 options:
A)Â Finding out whether a business practice is legal.
B)Â Clarifying whether a business practice violates the code of ethics.
C)Â Finding out what fines are imposed for violating the code of ethics.
D)Â Finding out how one becomes a member of the professional organization.
SaveQuestion 4Â (0.2 points)
Â
Who is a cyberstalker?
Question 4 options:
A)Â The intended victim of repeated continuous, unwanted communication.
B)Â One whose online hostile behavior is intended to harm another or others.
C)Â A person whose online hostile behavior avoids confronting the victim face-to-face.
D)Â A person who acts alone and anonymously when targeting others with continuous, unwanted communications.
SaveQuestion 5Â (0.2 points)
Â
You make a copy of a software application CD or DVD to lend to a friend. Is this legal?
Question 5 options:
A)Â Yes
B)Â No
SaveQuestion 6Â (0.2 points)
Â
(Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?
Question 6 options:
A)Â Yes
B)Â No
SaveQuestion 7Â (0.2 points)
Â
Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.
To provide scenarios that define when it is legal to copy and sell copyrighted software.
Question 7 options:
A)Â Yes
B)Â No
SaveQuestion 8Â (0.2 points)
Â
Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.
To discourage internet service providers from allowing file transfers.
Question 8 options:
A)Â Yes
B)Â No
SaveQuestion 9Â (0.2 points)
Â
Would the following activity likely be or not be a violation of an employee code of conduct:
Â
Tracey accepts two tickets from a supplier for a professional basketball game being played in his area.
Question 9 options:
A)Â Likely a violation
B)Â Likely not a violation
SaveQuestion 10Â (0.2 points)
Â
"While employed at this company, no information obtained in the course of employment may be used to advance personal gain, including financial reward." In which of the documents below would this statement likely be found?
Question 10 options:
A)Â A user access agreement
B)Â An employee code of conduct
C)Â A professional association code of conduct
SaveQuestion 11Â (0.2 points)
Â
Would the following activity likely be or not be a violation of an employee code of conduct:Â Nora charges her personal cell phone in her cubicle at work.
Question 11 options:
A)Â Likely a violation
B)Â Likely not a violation
SaveQuestion 12Â (0.2 points)
Â
(True/False) An employee code of conduct will list illegal behaviors, but it will not list unethical behaviors.
Question 12 options:
A) True
B) False
SaveQuestion 13Â (0.2 points)
Â
Would the following behavior most likely be a violation of an employee code of conduct?
Using your work computer to invite friends and co-workers to a party at your home.
Question 13 options:
A)Â Yes
B)Â No
C)Â More information is needed.
SaveQuestion 14Â (0.2 points)
Â
(Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?
Question 14 options:
A)Â Yes
B)Â No
C)Â Maybe
SaveQuestion 15Â (0.2 points)
Â
Language that outlines acceptable and unacceptable use of IT resources and defines sanctions to be applied if a violation occurs is typically found in a/an __________.
Question 15 options:
A)Â employee code of conduct
B)Â professional code of ethics
C)Â security risk assessment
D)Â user access agreement
SaveQuestion 16Â (0.2 points)
Â
In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?
Question 16 options:
A)Â Posting tips, project photos, and ideas on a hobby-related forum
B)Â Posting your resume on a job-seeking or job-posting site
C)Â Posting photos of oneself that might be considered risque or offensive
D)Â Posting vacation photos after you have returned home
SaveQuestion 17Â (0.2 points)
Â
True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world.
Question 17 options:
A) True
B) False
SaveQuestion 18Â (0.2 points)
Â
In the scenario below, identify which of the three dimensions is primarily threatened or compromised.
A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website.
Question 18 options:
A)Â Confidentiality
B)Â Integrity
C)Â Availability
SaveQuestion 19Â (0.2 points)
Â
A small company that keeps identical lists of employees in different departments runs the risk of a compromise to which aspect of that data?
Question 19 options:
A)Â Confidentiality
B)Â Integrity
C)Â Availability
SaveQuestion 20Â (0.2 points)
Â
(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.
Question 20 options:
A) True
B) False
SaveQuestion 21Â (0.2 points)
Â
For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.
Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Question 21 options:
A)Â Good practice
B)Â Bad practice
SaveQuestion 22Â (0.2 points)
Â
(Yes/No). You log into your legitimate online classroom site with your existing ID and password and are alerted that your password will expire in 14 days. You are directed to go to a Change Password site via a link on the login page. Is it safe to continue to the link and change your password?
Question 22 options:
A)Â No
B)Â Yes
SaveQuestion 23Â (0.2 points)
Â
Lately, Sylvia's home computer is super slow, and it restarts and shuts down without warning. The computer probably has a __________.
Question 23 options:
A)Â virus
B)Â worm
SaveQuestion 24Â (0.2 points)
Â
Sam's bank advised him that his account was overdrawn. But Sam's records show he has $900 in his account. Sam learns from the bank that someone's been withdrawing money from his account online with his user ID and password. What did the cyber criminal likely use to steal Sam's account information?
Question 24 options:
A)Â Spyware
B)Â Viruses
SaveQuestion 25Â (0.2 points)
Â
Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?
Question 25 options:
A)Â Your driver's license number
B)Â Your user ID and password
C)Â Your social security number
Save
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly