55INFORMATION SYSTEMS - 54 Award 10.00 points Problems Adjust credit for all students UnderstandingSocial bookmarking bookmark Website tagging(SNA

55INFORMATION SYSTEMS - 54 Award 10.00 points Problems...

This preview shows page 1 - 20 out of 20 pages.

54.Award: 10.00 pointsProblems? Adjust creditfor all students. The practice of expanding your business and/or social contacts by constructing a personal network
1. Award: 10.00 points Intellectual property is ______________creative work that is embodied in physical form and includes copyrights, trademarks, and patents. intangible tangible legal ethical Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. References Multiple Choice Difficulty: 1 Easy
2. Award: 10.00 points 3. Award: 10.00 points Which of the following represents the fundamental building blocks that protect organizational information? (Check all that apply) sales human resources ethics click-fraud security threats The two fundamental building blocks to protecting any organization should include ethics and security. References Check All That Apply Difficulty: 1 Easy ___________ is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. Ediscovery Child Online Protection Act Digital rights management Pirated software Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. References Multiple Choice Difficulty: 1 Easy
4. Award: 10.00 points 5. Award: 10.00 points Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is ________ and ________. legal and confidential legal and ethical ethical and technical confidential and Secure When discussing information ethics, determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between legal and ethical. References Multiple Choice Difficulty: 2 Medium Which of the following is included in the four quadrants of ethical and legal behavior? (Check all that apply) legal behavior and ethical behavior illegal behavior but ethical behavior legal behavior but unethical behavior technical behavior and ethical behavior legal behavior and Technical behavior security behavior and Ethical behavior The four quadrants include legal but unethical, illegal and unethical, legal and unethical, and illegal but ethical. References Check All That Apply Difficulty: 2 Medium
6. Award: 10.00 points 7. Award: 10.00 points The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. Child Parent Legal Ethical The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet References Multiple Choice Difficulty: 1 Easy Which of the following are epolicies a business should implement to protect itself? (Check all that apply) information privacy policy acceptable use policy internet use policy anti-Spam policy technological privacy policy gaming use policy informing privacy policy home monitoring policy Information privacy policy, acceptable use policy, Internet use policy, and anti-spam policy are all epolicies a business should implement. References Check All That Apply Difficulty: 1 Easy
8. Award: 10.00 points 9. Award: 10.00 points The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the __________ computer use policy. ethical legal copyright social media The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the ethical computer use policy. References Multiple Choice Difficulty: 1 Easy An __________ policy contains general principles regarding information privacy. information privacy policy acceptable use policy Internet use policy anti-spam policy This is the definition of an information privacy policy. References Multiple Choice Difficulty: 1 Easy
10. Award: 10.00 points 11. Award: 10.00 points A(n) __________ clause is typically contained in an acceptable use policy. nonrepudiation repudiation confidentiality employee use An acceptable use policy usually contains a nonrepudiation clause, which is a contractual stipulation to ensure that ebusiness participants do not deny their online actions. References Multiple Choice Difficulty: 1 Easy What is the electronic defacing of an existing website? cyberbulling cybervandalism cookie BYOD Cybervandalism is the electronic defacing of an existing website. References Multiple Choice Difficulty: 1 Easy
12. Award: 10.00 points 13. Award: 10.00 points What is a problem that occurs when someone registers purposely misspelled variations of well- known domain names? typosquatting website name stealing Internet censorship teergrubing Typosquatting is a problem that occurs when someone registers purposely misspelled variations of well-known domain names. References Multiple Choice Difficulty: 1 Easy Internet ____________ is a government attempt to control Internet traffic, thus preventing some material from being viewed by a country’s citizens. censorship copyright governance monitoring Internet censorship is a government attempt to control Internet traffic, thus preventing some material from being viewed by a country’s citizens. References Multiple Choice Difficulty: 1 Easy
14. Award: 10.00 points 15. Award: 10.00 points What is unsolicited email that plagues employees at all levels and clogs email systems? spyware spam adware adwords This is the definition of spam. References Multiple Choice Difficulty: 1 Easy To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy. internet use social media information use employee monitoring YouTube, Facebook pages, and twitter are all sites included in social media. References Multiple Choice Difficulty: 2 Medium
16. Award: 10.00 points 17. Award: 10.00 points ___________ is the process of monitoring and responding to what is being said about a company, individual, product, or brand. Social media monitoring Social media managing Social media policy Anti-spam policy Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand. References Multiple Choice Difficulty: 1 Easy What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, or what ads were viewed and what was purchased? key logger stealthware clickstream web log This is the definition of the Internet monitoring technology called clickstream. References Multiple Choice Difficulty: 2 Medium
18. Award: 10.00 points Which of the following are types of Internet monitoring technology? (Check all that apply) key logger web log clickstream spyware adware mail bomb MIS monitoring anti-spam policy Key logger, web log, clickstream, spyware, and adware are all types of Internet monitoring policies. References

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture