The organization code of ethics

Assignment Help Basic Computer Science
Reference no: EM13534373

What might a member of a professional organization be doing when they refer to the organization's code of ethics?
Finding out whether a business practice is legal
Clarifying whether a business practice violates the code of ethics
Finding out what fines are imposed for violating the code of ethics
Finding out how one becomes a member of the professional organization
Question 2
Fill in the blanks by selecting one option from each menu.
Part 1: 10 points
Part 2: 10 points
20 points
Donnell backed up the information on his computer every week on a flash drive. Before copying the files to the flash drive, he always ran a virus scan against the files to ensure that no viruses were being copied to the flash drive. He bought a new computer and inserted the flash drive so that he could transfer his files onto the new computer. He got a message on the new computer that the flash drive was corrupted and unreadable; the information on the flash drive cannot be retrieved. Assuming that the flash drive is not carrying a virus, which of the following does this situation reflect? Select Yes or No for each option.

Compromise of the security of the information on the flash drive
Risk of a potential breach in the integrity of the data on the flash drive
Question 3
Select one answer.
10 points
What is a cyberstalker?
The intended victim of repeated continuous, unwanted communication
One whose online hostile behavior is intended to harm another or others
A person whose online hostile behavior avoids confronting the victim face-to-face
A person who acts alone and anonymously when targeting others with continuous, unwanted communications.
Question 4
Select one answer.
10 points
What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?
Your name and address
Your user ID and password
Your driver's license number and credit card number
Question 5
Select one answer.
10 points
The Digital Millennium Copyright Act __________.
increased penalties for copyright infringement
created a new definition of copyright
provided for internet service providers to be held harmless if copyright infringement occurs on their servers
made file sharing illegal
Question 6
Select one answer.
10 points
Would the following behavior most likely be a violation of an employee code of conduct?

Using your work computer to invite friends and co-workers to a party at your home.

Yes
No
More information is needed.
Question 7
Fill in the blanks by selecting one option from each menu.
Part 1: 10 points
Part 2: 10 points
Part 3: 10 points
30 points
You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario? Select Yes or No for each option.

The confidentiality of the data



The integrity of the data



The accessibility of the data



Question 8
Fill in the blanks by selecting one option from each menu.
10 points
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called .
Question 9
Select one answer.
10 points
Which of the following is good practice to ensure that you do not get malware on your computer from an online source?
Update your antivirus software either manually or automatically each time you connect to the internet.
Block all popups (activate the popup blocker for all sites).
Use only the latest version(s) of the browser(s) you normally use to access the internet.
Do not open email attachments.
Question 10
Fill in the blanks by selecting one option from each menu.
Part 1: 10 points
Part 2: 10 points
Part 3: 10 points
30 points
Which of the following statements are true regarding PII? Select True or False for each option.

PII is information that uniquely identifies you in records that can be obtained online.



PII is always used to illegally gain access to your online records.



PII is safe because only you have this combination of name, social security number, and bank account, credit card numbers, or driver's license number.



Question 11
Select one answer.
10 points
Which of the following describes what encrypting data means?
Information can be stored or transmitted via shared media without risking disclosure.
Secure websites that employ encryption at the site or between your computer and the website will start with "https://".
If you have lost the password for an encrypted file on your computer, you can still retrieve the data in that file.
Question 12
Select one answer.
10 points
Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the middle of placing an online order when friends arrive and she stops her work to visit. What is her best (and most convenient) way to protect the PII that she has already entered (she has only logged onto a site with her ID and password and put some items in her basket for purchase)?
Exit all programs and shut down the computer.
Close the lid on the laptop. In most cases this will put the computer in hibernate mode (closes programs and shuts down the computer. All the programs and web pages that were open will restart when the laptop is opened again.). Some information might be lost on the order page, but that is safer than exposing her PII.
It is okay to stop her work and leave the site open. Since she has not yet arrived at the Pay information, her credit card information or pay type has not been entered.
Question 13
Select one answer.
10 points
Which of the following is the biggest risk of using social networking?
An increase in spam delivered to your email account
An increase in likelihood of private information being disclosed
An increase in ability to connect with others online
An increase in charges from the social networking provider
Question 14
Select one answer.
10 points
When would an employee typically agree to a user access agreement?
When changing a password
Each time he or she logs on to the company network
Once by signing a formal document when hired
When new policies are adopted by the company

Reference no: EM13534373

Questions Cloud

Find the time for one revolution : In 1974, physicist Gerard K. O'Neil proposed a cylindrical space station that would rotate about its central axis to simulate gravity along the outer surfaces
Several problems in accessing sales data effectively : U.S. Sports Fanatics has several problems in accessing sales data effectively and in a timely fashion because of its very basic paper-based process, causing it to lose out to its competition.
Evaluate the satellites speed : A satellite is in a 95.0 min period circular orbit 380km above Earth's surface. Find the satellite's speed
Write a short structured design-using pseudocode : Write a short, structured design-using pseudocode only-that accomplishes this task.
The organization code of ethics : The organization  code of ethics?
Find the speed of the joined cars at the bottom of incline : A 890 kgcar is at the top of a 30m-long, 2.5degreeincline. Its parking brake fails and it starts rolling down the hill. find the speed of the joined cars at the bottom of the incline
Determine what power was exerted : A weightlifter lifts 50 kg a total vertical distance of 0.28 m at a constant speed in 1.00 seconds. What power was exerted
Find the work done on the man by the gravitational force : A 77.1 kg man is riding an escalator in a shopping mall. What is the work done on the man by the gravitational force
Describe how the system will identify and authenticate : Describe how the system will identify and authenticate all the users who attempt to access ABC Healthcare information resources

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the minimum required bandwidth of the channel

A digital signaling system is required to operate at 9600 b/s, If a signal element encodes a 4-bit word, what is the minimum required bandwidth of the channel?

  Should multiply a numeric variable named number

Code a while statement that will continue executing while a variable named multiplier is not equal to 1. The code within the while loop should start by subtracting 1 from the multiplier variable.

  Capacity as a systems analyst

In your capacity as a systems analyst, you may face situations in which you encounter an ethical dilemma. For example, you may be asked to design a system that supports an activity with which you personally disagree

  Create a program called tokens.java

Create a program called Tokens.java that will receive any text file name as a command line argument and display all the unique tokens (separated by space/s) there are in the given text file

  Methods to display the applets code base and document base

Write a java applet that uses the getCodeBase() and getDocumentBase() and methods to display the applets code base and document base, respectively. Hint: Use the toString() method of the URL class.

  Decide which of the following identifier forms

Decide which of the following identifier forms is most readable, and then support the decision. SumOfSales Sum_of_sales SUMOFSALES

  Which is the correct statement for constructor implemention

In a multifile, object-oriented C++ project, which is the correct statement for the constructor implementation, given that the constructor is correctly defined in the class definition file?

  Write a void function that takes a linked list of integers

Write a void function that takes a linked list of integers and reverses the order of its nodes.

  Describe how history shaped today''s networks

Describe how history shaped today's networks. Focus on the network technology involved and its evolution through to its current state.

  Differentiate tv production-film and theatre production

How does TV production use technology. Is there a basic difference between TV production vis-a-vis film and theatre production?

  Describe object management group-s purpose-influence on uml

Investigate the Object Management Group (OMG). Discuss your findings. Describe what it is, its purpose, and its influence on UML and the object approach to systems development.

  Data mining and privacy

Data Mining and Privacy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd