What can be done to encourge the professionalism of IT workers? 6. A(An) __________ states the principles and core values that are essential to the work of a particular occupational group? Professional code of ethics or code fo ethics 7. Unlike certification, which applies only to people and is required by law, licensing, can also apply to products. FALSE 8. To become licensed as a software engineer in the United States, one must pass the Fundamental of Engineering exam and a software engineering __________ exam. Principles and Practices 9. The core ___________ for any profession outlines agreed-upon sets of skills and abilities that all licensed professionals must possess. Body of knowledge 10. Professionals who breach the duty of care are liable for injuries that their negligence causes. This liability is commonly referred to as ______________. B. Professional malpractice 11. Senior management (including members of the audit committee) must always follow the recommendations of the internal audit committee. TRUE How can you include ethical considerations in your decision making?
12. ____________ is the process established by an organization’s board of directors, managers, and IT systems people to provide reasonable assurance for the effectiveness and IT systems people to provide reasonable assurance for the effectiveness and efficiency of operations, the reliability of financial reporting, and compliance with applicable laws and regulations. Internal control What ethical issues do IT users face, and what can be done to encourage their ethical behavior? 13. The software piracy rates in Albania, Kazakhstan, Libya, Panama, and Zimbabwe ____________. C. Exceed 70 percent 14. Which of the following is not one of the five key elements of an acceptable use policy (AUP)? B. Background and make-up of the infosec organization that enforces the AUP. 15. A ___________ is hardware or software (or a combination of both) that serves as the first line of defense between an organization’s network and the internet; it also limits access to the company’s network based on the organization’s Internet-usage policy. Firewall
You've reached the end of your free preview.
Want to read both pages?