Filters
Question type

Study Flashcards

Information cannot delete or preserve itself.Therefore,responsibility falls on those who own the information to develop ethical guidelines about how to manage it.

A) True
B) False

Correct Answer

verifed

verified

Many countries,especially those in the _________ _________,may view trans-border data flows as a violation of their privacy legislation since,in many cases,data about individuals is being moved out of the country without stringent privacy safeguards.

Correct Answer

verifed

verified

Why should companies give considerable thought to managing their social media?

Correct Answer

verifed

verified

Companies need not just a management pol...

View Answer

____________refers to the principles and standards that guide our behaviour towards other people.

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Ethics,privacy and security are fundamen...

View Answer

What type of internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was,what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behaviour?


A) Information technology code
B) Techie policy
C) Ethical computer use policy
D) Information systems

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information ethics

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

The Internet is one of the primary tools enabling our global economy.As of June 2014,approximately how many Internet users were there across the globe?


A) More than 367 million
B) More than 8 billion
C) More than 2 billion
D) More than 3 billion

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

The main purpose of Australia's Privacy Act (Cwth.1988) is to make provision to protect the privacy of individuals with respect to how their personal information is collected,used and disclosed by an organisation.

A) True
B) False

Correct Answer

verifed

verified

As the president of a local trade company,Kristin is faced with leadership,ethical and operational decisions on a daily basis.Kristen's responsibilities include examining the organisational resource of information and regulating its definitions,uses,value and distribution ensuring it has the types of data/information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

An employee monitoring policy is a policy which states explicitly how,when,and where the company monitors its employees.Ideally,what should the employee monitoring policy do?

Correct Answer

verifed

verified

β€’Be as specific as possible.
β€’Always be ...

View Answer

The__________________ _________,a phrase used to describe the interconnectedness of devices,is having a growing impact.

Correct Answer

verifed

verified

There are variations in how organisations expect their employees to use computers but,in any approach,the overriding principle when seeking appropriate computer use should be informed _________.

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss,Mike Jones,is responsible for developing a new software game for the Wii.After completion of the project,Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.


A) counterfeit software
B) pirated software
C) ethical software
D) governance software

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

New pharmaceuticals and medical technologies are making it possible to prevent and cure diseases that would have been fatal to past generations.This development is one reason that each generation lives longer and remains healthier than the previous generation.Which of the following is not a potential business impact of greater life expectancy?


A) Global demand for products and services for the elderly is set to grow more slowly in the coming decades
B) The cost of health care is set to skyrocket
C) Pharmaceutical companies are going to be pushed for advances in geriatric medicine
D) A growing market for home monitoring systems

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Business practitioners should consider the security measures of cloud service providers,including which of the following?


A) Encryption levels
B) Data segregation
C) Data destruction
D) All of the answers are correct

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Those organisations that most effectively grasp the deep currents of technological evolution are using their knowledge to protect themselves against which of the following?


A) Bankruptcy
B) Sudden and fatal technological obsolescence
C) Having excessive inventory write-offs arising from obsolescence
D) None of the answers is correct

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

An acceptable use policy (AUP) requires a user to agree to follow the policy to be provided access to corporate email,information systems and the Internet.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 80

Related Exams

Show Answer