Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
Kant believes which pair follows one another? A) conversation, fellowship
B) truth, wealth
C) value, providence
D) reserve, loquaciousness
Q:
Exemptions to the Freedom of Information Act bar disclosure of information that could compromise national security or interfere with an active law enforcement investigation.a. Trueb. False
Q:
Courageous followers work behind the scenes to support their leaders. This is the
a. Courage to assume responsibility
b. Courage to challenge
c. Courage to serve
d. Courage to participate in transformation
Q:
Ethical imperialism holds that ethical standards should be .A) absoluteB) amorphousC) relativeD) non-existent
Q:
Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees.a. Trueb. False
Q:
Which is an effective strategy for avoiding toxic followership?
a. Don't let a few people choose themselves for leadership positions
b. Spread leadership duties to several people
c. Acknowledge that change is scary
d. All of the above
Q:
Kant believes which of the following is a guiding principle of society?
A) Lies
B) Truth
C) Fellowship
D) Conversation
Q:
The pretexting rule addresses attempts by people to access personal information without proper authority by such means as impersonating an account holder or phishing.a. Trueb. False
Q:
Exercising courageous followership requires both challenge and _____________.
a. friendship
b. vision
c. support
d. None of the above
Q:
A U.S. manager in Saudi Arabia asking Saudi training participants about a hypothetical case in which a manager makes sexually explicit remarks to a new employee of the same gender in a bar is likely to face:A) ShockB) SilenceC) A lack of understanding about what a "bar" isD) All of the above
Q:
The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.a. Trueb. False
Q:
Which group of followers is MOST engaged with their leaders?
a. Activists
b. Diehards
c. Participants
d. Bystanders
Q:
Kant believes which of the following is a condition of society?
A) Lies
B) Truth
C) Fellowship
D) Conversation
Q:
There is virtually no way to limit the deposit of cookies on a user's hard drive.a. Trueb. False
Q:
Research suggests that _____________ is the least effective way to express dissent.
a. Circumvention
b. Repetition
c. Direct-factual appeal
d. Threatening resignation
Q:
Host country and home country often have _____ .A) no ethical differenceB) different ethical standardsC) committees to decide what is mutually ethicalD) clearly similar understandings of the same cultural events
Q:
The Privacy Act of 1974 extends to the actions of the CIA, U.S. law enforcement agencies, and the private industry.a. Trueb. False
Q:
Which of the following is good advice for encouraging employees to blow the whistle internally?
a. Investigate all reports
b. Create anti-retaliation policies
c. Concentrate on the wrongdoing, not the whistleblower
d. All of the above
Q:
Worldcom grew mostly through _____ .A) price increasesB) acquisitionsC) layoffsD) new customers
Q:
Through the use of cookies, a Web site is able to identify visitors on subsequent visits.a. Trueb. False
Q:
Adele has to decide whether or not to protest a new work policy she thinks is unfair. She is facing which challenge of followership?
a. Challenge of Cynicism
b. Challenge of Obligation
c. Challenge of Dissent
d. Challenge of Obedience
Q:
We must stop using all resources and save everything for future generations.
Q:
The European Union Data Protection Directive requires member countries to ensure that data transferred to non- European Union countries is protected.a. Trueb. False
Q:
"Privity of contract" remains the only recognized relationship that an individual can have with a business.
Q:
All of the following are elements of authentic followership EXCEPT:
a. Personal strength
b. Trust
c. Transparency
d. Psychological ownership
Q:
Electronically stored information includes any form of digital information stored on any form of electronic storage device.a. Trueb. False
Q:
Steven Kelman believes that in areas of health regulations there may be instances where a decision might be right even though its benefits do not outweigh its costs.
Q:
Donna decides to blow the whistle on corruption in her organization, believing that doing so will benefit the public. Donna is addressing which component of whistle-blowing?
a. Accusation
b. Dissent
c. Loyalty
d. Timeliness
Q:
The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.a. Trueb. False
Q:
Modern business is no more complex than in the past.
Q:
"Whistle-blowers" are referred to as:
a. People who like to look for problems and report them as much as possible
b. Employees who express their concerns within the organization
c. People who take valid organizational concerns to outsiders in hopes the problem will be corrected
d. People who see a problem within the organization and rely on others to report the issue
Q:
Information privacy is the combination of communications privacy and data privacy.a. Trueb. False
Q:
Political and economic freedom lead to the expansion of resource availability.
Q:
Which is NOT a characteristic of Managing Up/Leading Up?
a. Understand yourself, understand your boss, understand your organization
b. Blend your work styles with your boss and co-workers as best as possible
c. Clarify any expectations with your supervisor and colleagues
d. Always be sure your opinion is what matters most
Q:
American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy.a. Trueb. False
Q:
R. Edward Freeman is a proponent of "managing for stakeholders."
Q:
Ruth has observed the teacher's aide frequently demeaning some of the students in the class. The lead teacher is not aware of the teacher aide's behavior. What would be the next best way for Ruth to exercise courageous followership?a. Unite all the students to retaliate against the teacher's aideb. Go by herself or with another student to talk to the lead teacher and mention the poor behavior she has seen in the teacher's aidec. Talk immediately with the administrator over the lead teacher and recommend that the lead teacher and teacher's aide be dismissedd. Let the situation work itself out over time
Q:
The U.S. has a single, overarching national data privacy policy.a. Trueb. False
Q:
Carlos knew the restaurant kitchen was violating state codes. If Carlos reported the conditions to the health department, there is a chance the restaurant would have to close or that he could receive backlash from co-workers. What type of challenge was Carlos facing as a follower?
a. Challenge of Bad News
b. Challenge of Obligation
c. Challenge of Obedience
d. Challenge of Dissent
Q:
Although there may be less farmland now, existing farmland is more productive than ever before.
Q:
Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.a. Trueb. False
Q:
Stakeholders are the same as Stockholders.
Q:
A vehicle event data recorder (EDR) is a device that records vehicle and occupant data for a few seconds before, during, and after any vehicle crash that is severe enough to deploy the vehicle's air bags.a. Trueb. False
Q:
The non-profit relied heavily on its volunteers. Amanda had volunteered with them for 10 years and found the responsibilities to be increasingly time consuming which affected her regular commitments to family and work. Which of the challenges does Amanda face as a follower?
a. Challenge of Bad News
b. Challenge of Obligation
c. Challenge of Obedience
d. Challenge of Cynicism
Q:
Length of human life has dramatically increased since 1700.
Q:
The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.a. Trueb. False
Q:
The staff felt very skeptical of their boss. Frequently, they would complain and critique new policies as though they were tabloid magazines. A new employee, Jessica, found that the staff struggled with the:
a. Challenge of Bad News
b. Challenge of Obligation
c. Challenge of Obedience
d. Challenge of Cynicism
Q:
Present a brief argument both for and against the use of advanced surveillance technology.
Q:
Roger always had to be told what to do and he never sought to take his own initiative on a project. He typically went with whatever he was asked, and he was glad to help however he could. Roger is what type of follower?
a. Passive follower
b. Alienated follower
c. Conformist follower
d. Pragmatic follower
Q:
Milton Friedman believed the doctrine of "social responsibility" involved the acceptance of a socialist view.
Q:
ExxonMobil has an environmental policy.
Q:
Identify three key rules of the Gramm-Leach-Bliley Act that affect personal privacy.
Q:
This type of follower might choose to fight the leader of the group or organization rather than give their energy to reaching organizational goals.
a. Pragmatic follower
b. Conformist follower
c. Exemplary follower
d. Alienated follower
Q:
Milton Friedman is a free market economist.
Q:
This type of follower is often seen as an individual who takes initiative and can think for him or herself.
a. Pragmatic follower
b. Conformist follower
c. Exemplary follower
d. Alienated follower
Q:
Briefly describe how society is struggling to define the extent to which employers should be able to monitor the work-related activities of employees.
Q:
How do followers benefit from authentic leadership?
Q:
Chad is a rich country.
Q:
The__________ code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
a. logic bomb
b. zombie
c. dropper
d. loader
Q:
Resistol is marketed as an inhalant.
Q:
Outline the differences between authentic transformational and pseudo-transformational leaders.
Q:
The__________ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.a. Carnegie Mellon's Computer Response Teamb. U.S. Computer Emergency Readiness Teamc. The National Institute of Standards and Technologyd. The Science and Technology Directorate of Homeland Security
Q:
The environment has to be everyone's top concern at all times.
Q:
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a__________ to eliminate the problem.
a. patch
b. bot
c. rootkit
d. Trojan horse
Q:
What can you do to curb the selfish tendencies of your leaders?
Q:
H.B. Fuller is a Honduran company.
Q:
Competitive intelligence combines elements of law and computer science to identify, collect, examine, and preserve data so that it is admissible in a court of law.
a. True
b. False
Q:
Name and explain the factors that make up transformational leadership.
Q:
McDonough describes our use of resources without regard to effect on future generations as _____ .A) self-relianceB) intergenerational remote tyrannyC) belief in later generational superiorityD) a natural right
Q:
Explain what trigger events are and how they promote authentic leader development.
Q:
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.
a. True
b. False
Q:
H. B. Fuller is best described as a company _____ .A) that believed it was an ethical companyB) that was only concerned with making moneyC) that made shoes in Central AmericaD) headquartered in Europe
Q:
Hacktivism involves using illegal means to obtain trade secrets from competitors.
a. True
b. False
Q:
What does it mean for organizational leaders to act as moral managers?
Q:
Cost-benefit calculations require _____ .A) ethical benefitsB) a common measureC) a supercomputerD) trade in all things being measured
Q:
The use of cloud computing and virtualization software has significantly reduced computer security concerns.
a. True
b. False
Q:
Benevolent paternalism shares much in common with servant leadership.
a. True
b. False
Q:
When did the modern business corporation emerge as one of the most important innovations in human history?A) in the 21stCentury B) in the 20thCentury C) in the 19thCentury D) in the 18thCentury
Q:
In a security incident, the primary goal must be to regain control and limit damage, and not to attempt to monitor or catch an intruder.
a. True
b. False
Q:
Followers can become too dependent on their transformational leaders.
a. True
b. False