|
1 | | The use of information technologies in business raises ethical issues in such areas as privacy, individuality, employment, and working conditions. |
| | A) | True |
| | B) | False |
|
|
|
2 | | According to the text case, credibility can be gained quickly, as long as you conduct yourself with integrity or show exceptional leadership in exceptional circumstances. |
| | A) | True |
| | B) | False |
|
|
|
3 | | A cracker is also called a black hat or a darkside hacker. |
| | A) | True |
| | B) | False |
|
|
|
4 | | According to the text case, Xerox Corp. fired more than 40 workers for using their lunch hours to shop on the Web. |
| | A) | True |
| | B) | False |
|
|
|
5 | | If you are caught creating a worm or virus and then spreading it around the Internet or other networks, you risk prosecution and jail time. |
| | A) | True |
| | B) | False |
|
|
|
6 | | In an effort to comply with new privacy laws, the typical company will spend 3 to 4 percent of its IT budget on compliance applications and projects. |
| | A) | True |
| | B) | False |
|
|
|
7 | | Many of the detrimental effects of information technology are caused by individuals or organizations that do not accept the ethical responsibility for their actions. |
| | A) | True |
| | B) | False |
|
|
|
8 | | Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer networks. |
| | A) | True |
| | B) | False |
|
|
|
9 | | Locking cards, which contain microprocessors that generate random numbers to add to an end user's password, are used in some secure systems. |
| | A) | True |
| | B) | False |
|
|
|
10 | | According to the Real World case, weak technical universities, comparatively high incomes, and stable legal systems make certain countries outside the United States ideal breeding grounds for cyber scams. |
| | A) | True |
| | B) | False |
|
|