The Candid Test On Ch 8 MIS

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Olgerthasko
O
Olgerthasko
Community Contributor
Quizzes Created: 4 | Total Attempts: 2,756
Questions: 40 | Attempts: 131

SettingsSettingsSettings
The Candid Test On Ch 8 MIS - Quiz

Identity theft is one of the problems facing the world today as we try to move into a cashless economy where every payment can be done electronically. This is one of the topics that we got to extensively cover in chapter 8 of the management information system class. Do you think you properly understood the chapter and can adequately tackle the upcoming test? Take up the quiz below and get to find out!


Questions and Answers
  • 1. 

    _____ is a kind of identity theft where the victim knows the person who stole his/her identity.  

    • A.

      Friendly fraud

    • B.

      PayPal

    • C.

      Peer-to-peer computing

    • D.

      Pretexting

    Correct Answer
    A. Friendly fraud
    Explanation
    Friendly fraud refers to a type of identity theft where the victim is acquainted with the person who stole their identity. This means that the perpetrator may be a friend, family member, or someone known to the victim. In such cases, the fraudster may use the victim's personal information to commit fraudulent activities without their knowledge or consent. This form of identity theft can be particularly damaging as it involves a breach of trust within personal relationships.

    Rate this question:

  • 2. 

    _____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.  

    • A.

      Spear phishing

    • B.

      Vishing

    • C.

      Spy-phishing

    • D.

      Pharming

    Correct Answer
    A. Spear phishing
    Explanation
    Spear phishing is a technique used to gain personal information for identity theft, specifically targeting certain individuals. The creator of a fraudulent email already possesses some of the victim's personal information and aims to obtain more.

    Rate this question:

  • 3. 

    An assessment of what is right or wrong can be determined by considering ____, which can be understood as the benefit or harm that will come from a particular decision.  

    • A.

      The consequences

    • B.

      Society's opinion

    • C.

      The time till the consequences take effect

    • D.

      The reach of the result

    Correct Answer
    A. The consequences
    Explanation
    The correct answer is "the consequences." When assessing what is right or wrong, considering the consequences is important. This refers to the potential benefits or harms that will result from a particular decision. By evaluating the consequences, one can determine the ethical implications of their actions and make a more informed judgment about what is right or wrong.

    Rate this question:

  • 4. 

    _____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.  

    • A.

      Spamming

    • B.

      Whaling

    • C.

      Vishing

    • D.

      Keystroke logging

    Correct Answer
    B. Whaling
    Explanation
    Whaling is the correct answer because it refers to the use of phishing techniques specifically targeted at senior business executives, government leaders, and other high-profile individuals. This type of phishing attack aims to trick these individuals into revealing sensitive information or performing actions that could be detrimental to their organizations. It is called "whaling" because it focuses on "big fish" targets.

    Rate this question:

  • 5. 

    _____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.  

    • A.

      Zombies

    • B.

      White-hat hackers

    • C.

      Black-hat hackers

    • D.

      Drones

    Correct Answer
    C. Black-hat hackers
    Explanation
    Black-hat hackers are types of hackers who break into other people's computer systems and may engage in malicious activities such as stealing credit card numbers, destroying information, or causing damage. They do not have permission to access these systems and their actions are illegal and unethical.

    Rate this question:

  • 6. 

    _____ can be defined as the principles and standards that guide our behavior toward other people.  

    • A.

      Ethics

    • B.

      Models

    • C.

      Eugenics

    • D.

      Aesthetics

    Correct Answer
    A. Ethics
    Explanation
    Ethics refers to the principles and standards that govern our behavior towards other people. It involves determining what is morally right or wrong and making decisions based on those principles. Ethics helps individuals and societies establish guidelines for how to treat others fairly, honestly, and with respect. It guides our actions and interactions with others, ensuring that we consider the impact of our behavior on others and strive to act in a morally responsible manner.

    Rate this question:

  • 7. 

    _____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.  

    • A.

      Adware

    • B.

      Spyware

    • C.

      Pharming

    • D.

      Spam

    Correct Answer
    D. Spam
    Explanation
    Spam refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.

    Rate this question:

  • 8. 

    _____ refers to intangible creative work that is embodied in physical form.  

    • A.

      Real property

    • B.

      Public property

    • C.

      Intellectual property

    • D.

      Immovable property

    Correct Answer
    C. Intellectual property
    Explanation
    Intellectual property refers to intangible creative work that is embodied in physical form. This includes creations such as inventions, designs, artwork, music, and literature that are protected by copyright, trademarks, and patents. It is called intellectual property because it is the product of someone's intellect and creativity, and it is considered a form of property because it can be bought, sold, and protected by law.

    Rate this question:

  • 9. 

    The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.  

    • A.

      USA Patriot Act

    • B.

      Homeland Security Act

    • C.

      Sarbanes-Oxley Act

    • D.

      Fair and Accurate Credit Transactions Act

    Correct Answer
    C. Sarbanes-Oxley Act
    Explanation
    The Sarbanes-Oxley Act sought to protect investors by improving the accuracy and reliability of corporate disclosures. It requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity. This act was passed in response to the accounting scandals of the early 2000s, such as Enron and WorldCom, and aims to increase transparency and accountability in the corporate sector.

    Rate this question:

  • 10. 

    An assessment of what is right or wrong can be determined by considering the ____, which may be defined as how long it will take for the benefit or harm to take effect.  

    • A.

      Likelihood of effect

    • B.

      Reach of result

    • C.

      Time to consequences

    • D.

      Consequences

    Correct Answer
    C. Time to consequences
    Explanation
    The correct answer is "time to consequences". This refers to the amount of time it will take for the benefit or harm to occur as a result of a certain action or decision. By considering the time to consequences, one can evaluate the potential impact and determine whether the action or decision is right or wrong.

    Rate this question:

  • 11. 

    Which of the following is an example of the unethical use of computers?  

    • A.

      Employees failing to answer a large number of e-mail messages due to network problems.

    • B.

      Employees searching organizational databases for information on celebrities and friends.

    • C.

      Employees sending messages without spell checking and proofreading them.

    • D.

      Employees updating their passwords at the end of every month.

    Correct Answer
    B. Employees searching organizational databases for information on celebrities and friends.
    Explanation
    Employees searching organizational databases for information on celebrities and friends is an example of the unethical use of computers because it violates privacy and security policies. Accessing confidential information without a legitimate reason and using it for personal purposes is a breach of trust and can lead to legal consequences.

    Rate this question:

  • 12. 

    _____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent.  

    • A.

      Non-disclosure

    • B.

      Intellectual property

    • C.

      Personalization

    • D.

      Privacy

    Correct Answer
    D. Privacy
    Explanation
    Privacy is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent. It refers to the ability to keep certain information or aspects of one's life private and to have the freedom to make choices about what is shared with others. Privacy is important for maintaining autonomy, personal security, and individuality. It allows individuals to establish boundaries and protect their personal space and possessions.

    Rate this question:

  • 13. 

    _____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.  

    • A.

      Encryption

    • B.

      Feature creep

    • C.

      Biometrics

    • D.

      Encapsulation

    Correct Answer
    A. Encryption
    Explanation
    Encryption is a method used to secure messages and files by altering the content in a way that it becomes unreadable without the correct key. It ensures that only authorized individuals can access and understand the information, providing confidentiality and protection against unauthorized access.

    Rate this question:

  • 14. 

    An assessment of what is right or wrong can be determined by considering ____, which refers to the probability that the harm or benefit will occur if one undertakes an action.  

    • A.

      The likelihood of effect

    • B.

      Society's opinion

    • C.

      The time to consequences

    • D.

      Relatedness

    Correct Answer
    A. The likelihood of effect
    Explanation
    The correct answer is "the likelihood of effect". When assessing what is right or wrong, considering the likelihood of effect refers to evaluating the probability that harm or benefit will occur if a particular action is taken. This means analyzing the chances of the intended consequences of an action actually happening. By considering the likelihood of effect, one can make more informed decisions about the potential outcomes and determine the ethical implications of their actions.

    Rate this question:

  • 15. 

    _____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.  

    • A.

      Zombies

    • B.

      White-hat hackers

    • C.

      Hacktivists

    • D.

      Screenagers

    Correct Answer
    C. Hacktivists
    Explanation
    Hacktivists are individuals who engage in hacking activities for philosophical and political reasons. They break into systems and deface websites as a form of protest, using their hacking skills to make a statement or raise awareness about certain issues. This distinguishes them from other groups like zombies or screenagers, who may not have the same motivations or objectives when it comes to hacking. White-hat hackers, on the other hand, are ethical hackers who use their skills to identify vulnerabilities and help improve security systems, rather than engaging in illegal activities like hacktivists.

    Rate this question:

  • 16. 

    Which of the following is part of the outermost level of an individual's ethical structure?  

    • A.

      Actions that are considered serious ethical violations by both society and oneself.

    • B.

      Behavior that causes extreme ethical discomfort to the person.

    • C.

      Behavior that calls for stringent measures against the person.

    • D.

      Actions that most people would not consider unacceptable or unethical.

    Correct Answer
    D. Actions that most people would not consider unacceptable or unethical.
    Explanation
    The outermost level of an individual's ethical structure refers to actions that are generally accepted by society and not considered unacceptable or unethical by most people. This level represents the basic standards of behavior that are widely recognized and followed by the majority.

    Rate this question:

  • 17. 

    An architectural firm's blueprints, sketches and other proprietary documents are examples of ____.  

    • A.

      Public property

    • B.

      Intellectual property

    • C.

      Real property

    • D.

      Immovable property

    Correct Answer
    B. Intellectual property
    Explanation
    The blueprints, sketches, and other proprietary documents of an architectural firm are considered intellectual property. Intellectual property refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names, that are protected by law. These documents are unique and original creations of the firm and are protected by copyright, allowing the firm to have exclusive rights over their use and distribution.

    Rate this question:

  • 18. 

    A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.  

    • A.

      Copyright

    • B.

      Key logger

    • C.

      Firewall

    • D.

      Clickstream

    Correct Answer
    D. Clickstream
    Explanation
    A clickstream is a type of data that records information about a user's online activity during a web surfing session. It includes details such as the websites visited, the duration of the visit, the advertisements viewed, and the purchases made. Clickstream data is often used for analyzing user behavior, improving website design, and targeting advertisements.

    Rate this question:

  • 19. 

    A _____ refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents.  

    • A.

      Copyright

    • B.

      Trademark

    • C.

      Patent

    • D.

      Fair use agreement

    Correct Answer
    A. Copyright
    Explanation
    Copyright refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents. It grants the creator of an original work exclusive rights to its use and distribution, preventing others from copying or using the work without permission. Trademark refers to the protection of unique symbols, names, or logos that distinguish a company or brand. Patent protects inventions or new processes. Fair use agreement is a legal doctrine that allows limited use of copyrighted material without permission.

    Rate this question:

  • 20. 

    _____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.  

    • A.

      Firmware

    • B.

      Spyware

    • C.

      Adware

    • D.

      Spam

    Correct Answer
    B. Spyware
    Explanation
    Spyware is a type of malicious software that secretly collects information about a person and their computer without their knowledge or consent. This information is then sent to someone else, usually for malicious purposes such as identity theft or unauthorized surveillance. Spyware can gather various types of data, including browsing history, keystrokes, passwords, and personal information. It can be installed on a computer through deceptive tactics such as email attachments, software downloads, or malicious websites. Once installed, spyware operates silently in the background, making it difficult for the user to detect or remove.

    Rate this question:

  • 21. 

    A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.  

    • A.

      Web log

    • B.

      Firewall

    • C.

      Cookie

    • D.

      Copyright

    Correct Answer
    A. Web log
    Explanation
    A web log, also known as a weblog or blog, consists of one line of information for every visitor to a website and is usually stored on a web server. It records details such as the visitor's IP address, the pages they accessed, the time of their visit, and other relevant information. This log is useful for analyzing website traffic, identifying trends, and troubleshooting any issues that may arise.

    Rate this question:

  • 22. 

    Which of the following is a program that, when installed on a computer, records every mouse click?  

    • A.

      Honeypot

    • B.

      Spear phishing

    • C.

      Clickstreaming

    • D.

      Key logger

    Correct Answer
    D. Key logger
    Explanation
    A key logger is a program that records every mouse click on a computer when installed. It is a type of surveillance software that can be used to monitor and track user activity. Unlike other options listed, such as honeypot, spear phishing, and clickstreaming, a key logger specifically focuses on capturing mouse clicks.

    Rate this question:

  • 23. 

    The _____ says that you may use copyrighted material in certain situations, for example, in the creation of new work or, within certain limits, for teaching purposes.  

    • A.

      Fair Use Doctrine

    • B.

      First-Sale Doctrine

    • C.

      Orphan work rule

    • D.

      Open-source rule

    Correct Answer
    A. Fair Use Doctrine
    Explanation
    The Fair Use Doctrine allows for the use of copyrighted material in certain situations, such as creating new work or for teaching purposes. It provides a legal framework for determining whether the use of copyrighted material is considered fair and does not infringe upon the rights of the copyright holder. This doctrine is important in balancing the rights of copyright holders with the need for creativity, education, and innovation.

    Rate this question:

  • 24. 

    The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.  

    • A.

      USA Patriot Act

    • B.

      Identity Theft and Assumption Deterrence Act

    • C.

      Homeland Security Act

    • D.

      CAN-Spam Act

    Correct Answer
    D. CAN-Spam Act
    Explanation
    The CAN-Spam Act sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers. This act was passed in 2003 and aimed to reduce the amount of spam emails being sent to consumers, as well as provide guidelines for legitimate businesses engaging in email marketing. The act requires businesses to include accurate header information, provide an opt-out mechanism for recipients, and prohibit deceptive subject lines and false header information. It also establishes penalties for violations of the act, including fines and imprisonment.

    Rate this question:

  • 25. 

    _____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.  

    • A.

      Greylisting

    • B.

      Phishing

    • C.

      Sniffing

    • D.

      Wire fraud

    Correct Answer
    B. Phishing
    Explanation
    Phishing is a technique used to gain personal information for the purpose of identity theft, typically through fraudulent emails. In phishing attacks, the attacker poses as a legitimate entity and tricks the recipient into providing sensitive information, such as passwords or credit card numbers. This information is then used for malicious purposes, such as accessing the victim's accounts or making unauthorized transactions. Phishing attacks are a common form of cybercrime and can have serious consequences for individuals and organizations.

    Rate this question:

  • 26. 

    A(n) ______ is hardware and/or software that protects a computer or a network from intruders.  

    • A.

      Web log

    • B.

      Worm

    • C.

      Firewall

    • D.

      Public key

    Correct Answer
    C. Firewall
    Explanation
    A firewall is a hardware and/or software that protects a computer or a network from intruders. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malicious attacks, and data breaches by filtering and blocking potentially harmful traffic.

    Rate this question:

  • 27. 

    The _____ provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.  

    • A.

      CAN-Spam Act

    • B.

      Sarbanes-Oxley Act

    • C.

      Homeland Security Act

    • D.

      USA Patriot Act

    Correct Answer
    C. Homeland Security Act
    Explanation
    The Homeland Security Act provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.

    Rate this question:

  • 28. 

    An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action.  

    • A.

      Society's opinion

    • B.

      The consequences

    • C.

      The likelihood of effect

    • D.

      The reach of result

    Correct Answer
    D. The reach of result
    Explanation
    The correct answer is "the reach of result." This is because considering the reach of the result means evaluating how many people will be affected by one's actions. This assessment helps determine what is right or wrong by taking into account the potential impact on others.

    Rate this question:

  • 29. 

    A _____ is a small file that contains information about a person and his/her Web activities, which a Web site one visits places on their computer.  

    • A.

      Cookie

    • B.

      Bot

    • C.

      Cache

    • D.

      Key logger

    Correct Answer
    A. Cookie
    Explanation
    A cookie is a small file that contains information about a person and his/her Web activities, which a website one visits places on their computer. Cookies are used by websites to remember user preferences, track user behavior, and provide personalized experiences. They can store information such as login credentials, shopping cart items, and browsing history.

    Rate this question:

  • 30. 

    Which of the following is true of an ethical dilemma?  

    • A.

      It is faced exclusively by unethical, immoral people.

    • B.

      It occurs when one's responsibilities seem to lead in opposite directions.

    • C.

      It is the choice of whether or not to act ethically.

    • D.

      It involves choosing between compatible good outcomes.

    Correct Answer
    B. It occurs when one's responsibilities seem to lead in opposite directions.
    Explanation
    An ethical dilemma refers to a situation where a person is faced with conflicting ethical responsibilities or obligations. In such a scenario, the individual may find it challenging to make a decision because their responsibilities seem to lead in opposite directions. This means that they are torn between two or more choices, each of which has ethical implications. It does not imply that only unethical or immoral people face ethical dilemmas, but rather that anyone can encounter such a situation where they have to navigate conflicting ethical responsibilities.

    Rate this question:

  • 31. 

    _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification.  

    • A.

      Pharming

    • B.

      Biometrics

    • C.

      Intellectual property

    • D.

      Whaling

    Correct Answer
    B. Biometrics
    Explanation
    Biometrics refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification. It involves the use of unique physical traits to verify and authenticate individuals.

    Rate this question:

  • 32. 

    _____ refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web.  

    • A.

      Antivirus software

    • B.

      Adware

    • C.

      Spyware

    • D.

      AdSense

    Correct Answer
    B. Adware
    Explanation
    Adware refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web. It is a type of malicious software that displays unwanted ads and can collect personal information without the user's consent. Unlike spyware, which is designed to gather information covertly, adware is more focused on generating revenue through advertising. Antivirus software, on the other hand, is designed to detect and remove various types of malicious software, including adware. AdSense is a program by Google that allows website owners to display targeted advertisements on their sites.

    Rate this question:

  • 33. 

    A _____ floods a server or network with so many requests for service that it slows down or crashes.  

    • A.

      Rootkit

    • B.

      Denial-of-service attack

    • C.

      Wiki

    • D.

      Trojan horse

    Correct Answer
    B. Denial-of-service attack
    Explanation
    A denial-of-service attack is a type of cyber attack where the attacker floods a server or network with an overwhelming amount of requests for service, causing it to slow down or crash. This is usually done by exploiting vulnerabilities in the target system or by using a botnet, a network of compromised computers. The intention behind such attacks can vary, ranging from causing disruption to a website or network, to extorting money from the target by threatening to continue the attack.

    Rate this question:

  • 34. 

    _____ refer(s) to devices on networks that connect computers to each other.  

    • A.

      Packet sniffers

    • B.

      Routers

    • C.

      Adware

    • D.

      Modems

    Correct Answer
    B. Routers
    Explanation
    Routers are devices on networks that connect computers to each other. They receive data packets from one network and forward them to another network, ensuring that the data reaches its intended destination. Routers are responsible for directing traffic and determining the most efficient path for data transmission. They play a crucial role in connecting multiple devices and networks together, allowing them to communicate and share resources.

    Rate this question:

  • 35. 

    _____ refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.  

    • A.

      Reach of result

    • B.

      Tangibility

    • C.

      Likelihood of effect

    • D.

      Relatedness

    Correct Answer
    D. Relatedness
    Explanation
    Relatedness refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision. It involves considering the connection and empathy one feels towards those who will be affected by the decision. This factor can influence the level of concern and consideration given to the potential impact on others, ultimately affecting the decision-making process.

    Rate this question:

  • 36. 

    _____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.  

    • A.

      Pirated software

    • B.

      File sharing

    • C.

      Torrent poisoning

    • D.

      Phishing

    Correct Answer
    A. Pirated software
    Explanation
    Pirated software refers to the unauthorized use, duplication, distribution, or sale of copyrighted software. This means that someone is using, copying, sharing, or selling software without the permission of the copyright holder. This is illegal and a violation of intellectual property rights.

    Rate this question:

  • 37. 

    Claytons and Sons, a finance firm in Manhattan, has a large number of employees who handle huge amounts of online transactions everyday. The management feels that it is crucial to monitor their online activities. Which of the following can the company use for this purpose?  

    • A.

      Snoopware

    • B.

      Sneakware

    • C.

      Spyware

    • D.

      Stealthware

    Correct Answer
    A. Snoopware
    Explanation
    The company can use snoopware to monitor the online activities of its employees. Snoopware refers to software that allows monitoring and recording of online activities without the user's knowledge. This would enable the management to track the online transactions and activities of the employees to ensure security and prevent any potential fraudulent or unauthorized activities.

    Rate this question:

  • 38. 

    The _____ allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities.  

    • A.

      USA Patriot Act

    • B.

      Sarbanes-Oxley Act

    • C.

      CAN-Spam Act

    • D.

      Homeland Security Act

    Correct Answer
    A. USA Patriot Act
    Explanation
    The USA Patriot Act allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities. This act was implemented in response to the 9/11 terrorist attacks in the United States and aimed to enhance the government's ability to prevent future attacks. It grants law enforcement agencies broader surveillance powers and the authority to collect and analyze data from various sources in order to track and combat potential threats to national security.

    Rate this question:

  • 39. 

    Which of the following is part of the innermost level of an individual's ethical structure?  

    • A.

      Ethical violations that one would consider extremely serious.

    • B.

      Ethical behavior that a society considers acceptable.

    • C.

      Behavior that does not call for action against the person.

    • D.

      Actions that seem acceptable to one's values and morals.

    Correct Answer
    A. Ethical violations that one would consider extremely serious.
    Explanation
    The innermost level of an individual's ethical structure refers to their personal beliefs and values. This answer choice suggests that it includes ethical violations that are considered extremely serious by the individual. This implies that the individual has a strong moral compass and holds certain actions as morally wrong. These violations would be at the core of their ethical framework, guiding their behavior and decision-making.

    Rate this question:

  • 40. 

    _____ refers to programs that Web sites offer to help people monitor what is happening on a computer.  

    • A.

      Abandonware

    • B.

      Snoopware

    • C.

      Freeware

    • D.

      Shareware

    Correct Answer
    B. Snoopware
    Explanation
    Snoopware refers to programs that Web sites offer to help people monitor what is happening on a computer. This type of software is often used for surveillance or tracking purposes, allowing users to monitor activities such as internet browsing, keystrokes, and online communication. Snoopware can be used for legitimate purposes, such as parental control or employee monitoring, but it can also be used maliciously for spying or invading someone's privacy.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2012
    Quiz Created by
    Olgerthasko
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.