MIS Chapter 8 Quiz Questions

43 Questions | Total Attempts: 80

SettingsSettingsSettings
Please wait...
MIS Quizzes & Trivia

.


Questions and Answers
  • 1. 
    An ethical ______ is when one's responsibilites seem to lead in opposite directions.
    • A. 

      Dilemma

    • B. 

      Ethics

    • C. 

      Violations

    • D. 

      Consequences

  • 2. 
    ____- are the principles and standards that guide our behavior toward other people.
    • A. 

      Dilemma

    • B. 

      Ethics

    • C. 

      Violations

    • D. 

      Snoopware

  • 3. 
    At the innermost middle ring of your ethical structure you are faced with very serious ethical ________.
    • A. 

      Violations

    • B. 

      Reach of results

    • C. 

      Likeihood of effect

    • D. 

      Consequences

  • 4. 
    With respect to the circumstances that surround making an ethical decision, your preception of how many people will be affected by your intended action is called ______.
    • A. 

      Reach of results

    • B. 

      Likeihood of effect

    • C. 

      Time of consequences

    • D. 

      Relatedness

  • 5. 
    With respect to the circumstances that surround making an ethical decision, _____ refers to the probability of the harm or benefit that will occur if you take an action.
    • A. 

      Likeihood effect

    • B. 

      Reach of results

    • C. 

      Time of consequences

    • D. 

      Relatedness

  • 6. 
    With respect to the circumstances that surround making an ethical decision, _____ is the length of time it will take for the benefit or harm to take effect.
    • A. 

      Time of consequences

    • B. 

      Reach of results

    • C. 

      Likeihood of effect

    • D. 

      Relatedness

  • 7. 
    With respect to the circumstances that surround making an ethical decision, how much you identify with the person or persons who will receive the benefit or suffer the harm of your actions is termed _____.
    • A. 

      Relatedness

    • B. 

      Consequences

    • C. 

      Society opion

    • D. 

      Intellectual property

  • 8. 
    With respect to the circumstances that surround making an ethical decision, _____ refers to how much or how little benefit or harm will come from a particular decision.
    • A. 

      Consequences

    • B. 

      Society opinion

    • C. 

      Copyright

    • D. 

      Fair use doctrine

  • 9. 
    With respect to the circumstances that surround making an ethical decision, your perception of what society thinks of your intended action is called _____.
    • A. 

      Society opinion

    • B. 

      Intellectual property

    • C. 

      Copyright

    • D. 

      Fair use doctrine

  • 10. 
    _____ is intangible creative work that is embodied in physical form.
    • A. 

      Intellectual property

    • B. 

      Copy right

    • C. 

      Fair use doctrine

    • D. 

      Key logger

  • 11. 
    _____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents. 
    • A. 

      Copyright

    • B. 

      Patent

    • C. 

      Fair use doctrine

    • D. 

      Key logger

  • 12. 
    _____ law protects an idea. 
    • A. 

      Copy right

    • B. 

      Patent

    • C. 

      Fair use doctrine

    • D. 

      Security

  • 13. 
    The _____ says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes. 
    • A. 

      Fair use doctrine

    • B. 

      Pirated software

    • C. 

      Key logger

    • D. 

      Screen capture

  • 14. 
    _____ software is the unauthorized use, duplication, distribution or sale of copyrighted software. 
    • A. 

      Pirated

    • B. 

      Privacy

    • C. 

      Snoopware

    • D. 

      Key logger

  • 15. 
    _____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. 
    • A. 

      Privacy

    • B. 

      Pirated

    • C. 

      Key logger

    • D. 

      Snoopware

  • 16. 
    Many Web sites are offering programs, collectively referred to as _____, to help people monitor what's happening on a computer
    • A. 

      Snoopware

    • B. 

      Key logger

    • C. 

      Screeen capture

    • D. 

      Sniffers

  • 17. 
    _____ is a program, that when installed on a computer, records every keystroke and mouse click. 
    • A. 

      Key logger

    • B. 

      Screen capture

    • C. 

      Sniffers

    • D. 

      Identy theft

  • 18. 
    A(n) _____ program captures screen images
    • A. 

      Screen capture

    • B. 

      Sniffers

    • C. 

      Identy theft

    • D. 

      Fraud

  • 19. 
    A(n) _____ examines information passing through switches, hubs, or routers.
    • A. 

      Sniffers

    • B. 

      Snoopware

    • C. 

      Identy theft

    • D. 

      Fraud

  • 20. 
    _____ occurs when someone forges your identity for fraudulent purposes. 
    • A. 

      Identy theft

    • B. 

      Fraud

    • C. 

      Pharming

    • D. 

      Cookie

  • 21. 
    _____ is a technique used to gain personal information for the purpose of identity theft. 
    • A. 

      Fraud

    • B. 

      Identy theft

    • C. 

      Snoopware

    • D. 

      Pharming

  • 22. 
    _____ is a technique which reroutes your request for a legitimate Web site to a fake site that collects information from you. 
    • A. 

      Pharming

    • B. 

      Phising

    • C. 

      Hardware key logger

    • D. 

      Cookie

  • 23. 
    _____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard. 
    • A. 

      Hardware key logger

    • B. 

      Key logger

    • C. 

      Cookie

    • D. 

      Spam

  • 24. 
    A(n) _____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities. 
    • A. 

      Cookie

    • B. 

      Common cookie

    • C. 

      Thojan horse

    • D. 

      Hardwar key logger

  • 25. 
    _____ cookies start out as a unique cookie, but the original site sold access to it to a third party that can then change the cookie and track the surfer's activity across many sites. 
    • A. 

      Common

    • B. 

      Unique

    • C. 

      SPAM

    • D. 

      Adware