The Candid Test On Ch 8 MIS

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Olgerthasko
O
Olgerthasko
Community Contributor
Quizzes Created: 4 | Total Attempts: 3,107
| Attempts: 146 | Questions: 40
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. A _____ is a small file that contains information about a person and his/her Web activities, which a Web site one visits places on their computer.  

Explanation

A cookie is a small file that contains information about a person and his/her Web activities, which a website one visits places on their computer. Cookies are used by websites to remember user preferences, track user behavior, and provide personalized experiences. They can store information such as login credentials, shopping cart items, and browsing history.

Submit
Please wait...
About This Quiz
The Candid Test On Ch 8 MIS - Quiz

Identity theft is one of the problems facing the world today as we try to move into a cashless economy where every payment can be done electronically. This... see moreis one of the topics that we got to extensively cover in chapter 8 of the management information system class. Do you think you properly understood the chapter and can adequately tackle the upcoming test? Take up the quiz below and get to find out! see less

2. _____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.  

Explanation

Encryption is a method used to secure messages and files by altering the content in a way that it becomes unreadable without the correct key. It ensures that only authorized individuals can access and understand the information, providing confidentiality and protection against unauthorized access.

Submit
3. _____ can be defined as the principles and standards that guide our behavior toward other people.  

Explanation

Ethics refers to the principles and standards that govern our behavior towards other people. It involves determining what is morally right or wrong and making decisions based on those principles. Ethics helps individuals and societies establish guidelines for how to treat others fairly, honestly, and with respect. It guides our actions and interactions with others, ensuring that we consider the impact of our behavior on others and strive to act in a morally responsible manner.

Submit
4. Which of the following is an example of the unethical use of computers?  

Explanation

Employees searching organizational databases for information on celebrities and friends is an example of the unethical use of computers because it violates privacy and security policies. Accessing confidential information without a legitimate reason and using it for personal purposes is a breach of trust and can lead to legal consequences.

Submit
5. _____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.  

Explanation

Phishing is a technique used to gain personal information for the purpose of identity theft, typically through fraudulent emails. In phishing attacks, the attacker poses as a legitimate entity and tricks the recipient into providing sensitive information, such as passwords or credit card numbers. This information is then used for malicious purposes, such as accessing the victim's accounts or making unauthorized transactions. Phishing attacks are a common form of cybercrime and can have serious consequences for individuals and organizations.

Submit
6. A(n) ______ is hardware and/or software that protects a computer or a network from intruders.  

Explanation

A firewall is a hardware and/or software that protects a computer or a network from intruders. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malicious attacks, and data breaches by filtering and blocking potentially harmful traffic.

Submit
7. _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification.  

Explanation

Biometrics refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification. It involves the use of unique physical traits to verify and authenticate individuals.

Submit
8. _____ refers to intangible creative work that is embodied in physical form.  

Explanation

Intellectual property refers to intangible creative work that is embodied in physical form. This includes creations such as inventions, designs, artwork, music, and literature that are protected by copyright, trademarks, and patents. It is called intellectual property because it is the product of someone's intellect and creativity, and it is considered a form of property because it can be bought, sold, and protected by law.

Submit
9. _____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.  

Explanation

Pirated software refers to the unauthorized use, duplication, distribution, or sale of copyrighted software. This means that someone is using, copying, sharing, or selling software without the permission of the copyright holder. This is illegal and a violation of intellectual property rights.

Submit
10. _____ is a kind of identity theft where the victim knows the person who stole his/her identity.  

Explanation

Friendly fraud refers to a type of identity theft where the victim is acquainted with the person who stole their identity. This means that the perpetrator may be a friend, family member, or someone known to the victim. In such cases, the fraudster may use the victim's personal information to commit fraudulent activities without their knowledge or consent. This form of identity theft can be particularly damaging as it involves a breach of trust within personal relationships.

Submit
11. A _____ refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents.  

Explanation

Copyright refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents. It grants the creator of an original work exclusive rights to its use and distribution, preventing others from copying or using the work without permission. Trademark refers to the protection of unique symbols, names, or logos that distinguish a company or brand. Patent protects inventions or new processes. Fair use agreement is a legal doctrine that allows limited use of copyrighted material without permission.

Submit
12. The _____ says that you may use copyrighted material in certain situations, for example, in the creation of new work or, within certain limits, for teaching purposes.  

Explanation

The Fair Use Doctrine allows for the use of copyrighted material in certain situations, such as creating new work or for teaching purposes. It provides a legal framework for determining whether the use of copyrighted material is considered fair and does not infringe upon the rights of the copyright holder. This doctrine is important in balancing the rights of copyright holders with the need for creativity, education, and innovation.

Submit
13. _____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent.  

Explanation

Privacy is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent. It refers to the ability to keep certain information or aspects of one's life private and to have the freedom to make choices about what is shared with others. Privacy is important for maintaining autonomy, personal security, and individuality. It allows individuals to establish boundaries and protect their personal space and possessions.

Submit
14. _____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.  

Explanation

Spam refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.

Submit
15. _____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.  

Explanation

Spyware is a type of malicious software that secretly collects information about a person and their computer without their knowledge or consent. This information is then sent to someone else, usually for malicious purposes such as identity theft or unauthorized surveillance. Spyware can gather various types of data, including browsing history, keystrokes, passwords, and personal information. It can be installed on a computer through deceptive tactics such as email attachments, software downloads, or malicious websites. Once installed, spyware operates silently in the background, making it difficult for the user to detect or remove.

Submit
16. _____ refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web.  

Explanation

Adware refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web. It is a type of malicious software that displays unwanted ads and can collect personal information without the user's consent. Unlike spyware, which is designed to gather information covertly, adware is more focused on generating revenue through advertising. Antivirus software, on the other hand, is designed to detect and remove various types of malicious software, including adware. AdSense is a program by Google that allows website owners to display targeted advertisements on their sites.

Submit
17. _____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.  

Explanation

Whaling is the correct answer because it refers to the use of phishing techniques specifically targeted at senior business executives, government leaders, and other high-profile individuals. This type of phishing attack aims to trick these individuals into revealing sensitive information or performing actions that could be detrimental to their organizations. It is called "whaling" because it focuses on "big fish" targets.

Submit
18. An assessment of what is right or wrong can be determined by considering ____, which can be understood as the benefit or harm that will come from a particular decision.  

Explanation

The correct answer is "the consequences." When assessing what is right or wrong, considering the consequences is important. This refers to the potential benefits or harms that will result from a particular decision. By evaluating the consequences, one can determine the ethical implications of their actions and make a more informed judgment about what is right or wrong.

Submit
19. A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.  

Explanation

A web log, also known as a weblog or blog, consists of one line of information for every visitor to a website and is usually stored on a web server. It records details such as the visitor's IP address, the pages they accessed, the time of their visit, and other relevant information. This log is useful for analyzing website traffic, identifying trends, and troubleshooting any issues that may arise.

Submit
20. The _____ allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities.  

Explanation

The USA Patriot Act allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities. This act was implemented in response to the 9/11 terrorist attacks in the United States and aimed to enhance the government's ability to prevent future attacks. It grants law enforcement agencies broader surveillance powers and the authority to collect and analyze data from various sources in order to track and combat potential threats to national security.

Submit
21. _____ refers to programs that Web sites offer to help people monitor what is happening on a computer.  

Explanation

Snoopware refers to programs that Web sites offer to help people monitor what is happening on a computer. This type of software is often used for surveillance or tracking purposes, allowing users to monitor activities such as internet browsing, keystrokes, and online communication. Snoopware can be used for legitimate purposes, such as parental control or employee monitoring, but it can also be used maliciously for spying or invading someone's privacy.

Submit
22. _____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.  

Explanation

Spear phishing is a technique used to gain personal information for identity theft, specifically targeting certain individuals. The creator of a fraudulent email already possesses some of the victim's personal information and aims to obtain more.

Submit
23. _____ refer(s) to devices on networks that connect computers to each other.  

Explanation

Routers are devices on networks that connect computers to each other. They receive data packets from one network and forward them to another network, ensuring that the data reaches its intended destination. Routers are responsible for directing traffic and determining the most efficient path for data transmission. They play a crucial role in connecting multiple devices and networks together, allowing them to communicate and share resources.

Submit
24. An assessment of what is right or wrong can be determined by considering ____, which refers to the probability that the harm or benefit will occur if one undertakes an action.  

Explanation

The correct answer is "the likelihood of effect". When assessing what is right or wrong, considering the likelihood of effect refers to evaluating the probability that harm or benefit will occur if a particular action is taken. This means analyzing the chances of the intended consequences of an action actually happening. By considering the likelihood of effect, one can make more informed decisions about the potential outcomes and determine the ethical implications of their actions.

Submit
25. An architectural firm's blueprints, sketches and other proprietary documents are examples of ____.  

Explanation

The blueprints, sketches, and other proprietary documents of an architectural firm are considered intellectual property. Intellectual property refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names, that are protected by law. These documents are unique and original creations of the firm and are protected by copyright, allowing the firm to have exclusive rights over their use and distribution.

Submit
26. Which of the following is a program that, when installed on a computer, records every mouse click?  

Explanation

A key logger is a program that records every mouse click on a computer when installed. It is a type of surveillance software that can be used to monitor and track user activity. Unlike other options listed, such as honeypot, spear phishing, and clickstreaming, a key logger specifically focuses on capturing mouse clicks.

Submit
27. A _____ floods a server or network with so many requests for service that it slows down or crashes.  

Explanation

A denial-of-service attack is a type of cyber attack where the attacker floods a server or network with an overwhelming amount of requests for service, causing it to slow down or crash. This is usually done by exploiting vulnerabilities in the target system or by using a botnet, a network of compromised computers. The intention behind such attacks can vary, ranging from causing disruption to a website or network, to extorting money from the target by threatening to continue the attack.

Submit
28. Which of the following is part of the innermost level of an individual's ethical structure?  

Explanation

The innermost level of an individual's ethical structure refers to their personal beliefs and values. This answer choice suggests that it includes ethical violations that are considered extremely serious by the individual. This implies that the individual has a strong moral compass and holds certain actions as morally wrong. These violations would be at the core of their ethical framework, guiding their behavior and decision-making.

Submit
29. _____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.  

Explanation

Hacktivists are individuals who engage in hacking activities for philosophical and political reasons. They break into systems and deface websites as a form of protest, using their hacking skills to make a statement or raise awareness about certain issues. This distinguishes them from other groups like zombies or screenagers, who may not have the same motivations or objectives when it comes to hacking. White-hat hackers, on the other hand, are ethical hackers who use their skills to identify vulnerabilities and help improve security systems, rather than engaging in illegal activities like hacktivists.

Submit
30. _____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.  

Explanation

Black-hat hackers are types of hackers who break into other people's computer systems and may engage in malicious activities such as stealing credit card numbers, destroying information, or causing damage. They do not have permission to access these systems and their actions are illegal and unethical.

Submit
31. An assessment of what is right or wrong can be determined by considering the ____, which may be defined as how long it will take for the benefit or harm to take effect.  

Explanation

The correct answer is "time to consequences". This refers to the amount of time it will take for the benefit or harm to occur as a result of a certain action or decision. By considering the time to consequences, one can evaluate the potential impact and determine whether the action or decision is right or wrong.

Submit
32. A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.  

Explanation

A clickstream is a type of data that records information about a user's online activity during a web surfing session. It includes details such as the websites visited, the duration of the visit, the advertisements viewed, and the purchases made. Clickstream data is often used for analyzing user behavior, improving website design, and targeting advertisements.

Submit
33. Claytons and Sons, a finance firm in Manhattan, has a large number of employees who handle huge amounts of online transactions everyday. The management feels that it is crucial to monitor their online activities. Which of the following can the company use for this purpose?  

Explanation

The company can use snoopware to monitor the online activities of its employees. Snoopware refers to software that allows monitoring and recording of online activities without the user's knowledge. This would enable the management to track the online transactions and activities of the employees to ensure security and prevent any potential fraudulent or unauthorized activities.

Submit
34. The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.  

Explanation

The CAN-Spam Act sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers. This act was passed in 2003 and aimed to reduce the amount of spam emails being sent to consumers, as well as provide guidelines for legitimate businesses engaging in email marketing. The act requires businesses to include accurate header information, provide an opt-out mechanism for recipients, and prohibit deceptive subject lines and false header information. It also establishes penalties for violations of the act, including fines and imprisonment.

Submit
35. Which of the following is true of an ethical dilemma?  

Explanation

An ethical dilemma refers to a situation where a person is faced with conflicting ethical responsibilities or obligations. In such a scenario, the individual may find it challenging to make a decision because their responsibilities seem to lead in opposite directions. This means that they are torn between two or more choices, each of which has ethical implications. It does not imply that only unethical or immoral people face ethical dilemmas, but rather that anyone can encounter such a situation where they have to navigate conflicting ethical responsibilities.

Submit
36. Which of the following is part of the outermost level of an individual's ethical structure?  

Explanation

The outermost level of an individual's ethical structure refers to actions that are generally accepted by society and not considered unacceptable or unethical by most people. This level represents the basic standards of behavior that are widely recognized and followed by the majority.

Submit
37. The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.  

Explanation

The Sarbanes-Oxley Act sought to protect investors by improving the accuracy and reliability of corporate disclosures. It requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity. This act was passed in response to the accounting scandals of the early 2000s, such as Enron and WorldCom, and aims to increase transparency and accountability in the corporate sector.

Submit
38. _____ refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.  

Explanation

Relatedness refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision. It involves considering the connection and empathy one feels towards those who will be affected by the decision. This factor can influence the level of concern and consideration given to the potential impact on others, ultimately affecting the decision-making process.

Submit
39. An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action.  

Explanation

The correct answer is "the reach of result." This is because considering the reach of the result means evaluating how many people will be affected by one's actions. This assessment helps determine what is right or wrong by taking into account the potential impact on others.

Submit
40. The _____ provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.  

Explanation

The Homeland Security Act provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2012
    Quiz Created by
    Olgerthasko
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A _____ is a small file that contains information about a person and...
_____ is a way of protecting messages and files by scrambling the...
_____ can be defined as the principles and standards that guide our...
Which of the following is an example of the unethical use of...
_____ is a technique to gain personal information for the purpose of...
A(n) ______ is hardware and/or software that protects a computer or a...
_____ refers to the use of physiological characteristics such as...
_____ refers to intangible creative work that is embodied in physical...
_____ is the unauthorized use, duplication, distribution, or sale of...
_____ is a kind of identity theft where the victim knows the person...
A _____ refers to the legal protection offered for the expression of...
The _____ says that you may use copyrighted material in certain...
_____ is the right to be left alone when one wants to be, to have...
_____ refers to unsolicited e-mail (electronic junk mail) from...
_____ refers to malicious software that collects information about a...
_____ refers to software that generates advertisements and installs...
_____ is the use of phishing targeted at senior business executives,...
An assessment of what is right or wrong can be determined by...
A _____ consists of one line of information for every visitor to a Web...
The _____ allows law enforcement to get access to almost any...
_____ refers to programs that Web sites offer to help people monitor...
_____ is a technique to gain personal information for the purpose of...
_____ refer(s) to devices on networks that connect computers to each...
An assessment of what is right or wrong can be determined by...
An architectural firm's blueprints, sketches and other proprietary...
Which of the following is a program that, when installed on a...
A _____ floods a server or network with so many requests for service...
Which of the following is part of the innermost level of an...
_____ have philosophical and political reasons for breaking into...
_____ are types of hackers who break into other people's computer...
An assessment of what is right or wrong can be determined by...
A _____ records information about you during a Web surfing session...
Claytons and Sons, a finance firm in Manhattan, has a large number of...
The _____ sought to regulate interstate commerce by imposing...
Which of the following is true of an ethical dilemma?  
Which of the following is part of the outermost level of an...
The _____ sought to protect investors by improving the accuracy and...
_____ refers to the extent to which one identifies with the person or...
An assessment of what is right or wrong can be made by considering...
The _____ provided new authority to government agencies to mine data...
Alert!

Advertisement