Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Mathematic
Q:
Why do businesses store personal information on employees?
A.Avoid lawsuits
B.Ensure appropriate conduct
C.Compliance with laws
D.To avoid lawsuits, ensure proper conduct, and comply with laws
Q:
What software hides itself from the operating system so that you don't know that it's running; it conceals processes, files, or system data?
A.AdAware
B.Rootkits
C.AntiVirus
D.AdAware, Rootkits, and AntiVirus
Q:
How do business monitor email?
A.Through software that looks for specific words and phrases
B.Searching for high-activity and then reading the associated email
C.Hardware key logger
D.Software, processes, and hardware
Q:
What type of legislation keeps patient information confidential?
A.Fair Use Doctrine
B.Identify Teft, Medical Information, and Assumption Deterrence Act
C.Sarbanes-Oxley Act
D.Health Insurance Portability and Accountability Act
Q:
What hardware device captures keystrokes moving from the keyboard to the motherboard?
A.Hardware key logger
B.Clickstream device
C.Keyboard monitoring systems (KMS)
D.Hardware loggers, clickstream devices, and KMSs
Q:
Who commits most of the computer crime made against companies?
A.Employees
B.Competitors
C.Terrorists
D.Hackers
Q:
What law forbids the interception of wired and electronic communication but allows for business surveillance of employee computer activity?
A.Electronic Communications Privacy Act of 1986
B.Fair Use Doctrine
C.Public Safety and Privacy Act of 2000
D.Telecommunications Act of 1989
Q:
Due to the massive amounts of information gathered about customers, what type of software is one of the fastest growing?
A.CRM
B.ARM
C.Adware, Sneakware, and Cookie management
D.Anonymous Web browsing
Q:
Which of the following is a small file that contains information about you and your Web activities?
A.Software logger
B.Cookies
C.Web log
D.Web threads
Q:
How can you block a business' attempt to store information about your Web activities?
A.Avoid the Internet and purchasing products and services on it
B.Block cookies
C.Install and use SpamWare
D.Install and use SpyWare and SpamWare
Q:
What type of device can be installed on a vehicle that collects information about a person's reckless driving?
A.Event data recorder (EDR)
B.Traffic Safety Monitor (TSM)
C.Mom's Offsite Monitor for Automobiles (MOMA)
D.Parents Against Reckless Driving (PARD)
Q:
If an auto insurance company wanted to determine actions of the driver during an accident, what device could they examine during their investigation?
A.The car's black box
B.The odometer, speedometer, RPMs and other measuring devices
C.The car's online computer systems
D.The EDR
Q:
Which of the following protects expressions of ideas, literary and dramatic works, musical and theatrical compositions, and works of art?
A.Intellectual property
B.Pirating laws
C.Fair Use Doctrine
D.Copyright
Q:
If you received repeated bills for a credit card that you didn't own, what would you probably be a victim of?
A.Phishing
B.Wrongful actions
C.Service fraud
D.Identity theft
Q:
If you were to create a computer game for a homework assignment in programming, what type of law provides you with some protection against people selling your game without your consent?
A.Intellectual property
B.Copyright
C.Fair Use Doctrine
D.Pirating laws
Q:
What is a common Web activity that is geared towards stealing your identity?
A.Phishing
B.Trojan horse
C.Denial of service attack
D.Phishing, Trojan horses, and denial of service attacks are all geared stealing your identity
Q:
Which type of law allows people to use copyrighted material in teaching environments without obtaining the consent of the owner of this material?
A.Copyright
B.Patent
C.Fair Use Doctrine
D.Intellectual property
Q:
What is phishing?
A.An investigative Web service
B.A type of Internet game that allows subscribers to find out information about you and others living in its "virtual city"
C.Information bots that surf the Web for you searching for specific information that you need
D.Email and other online techniques that attempt to gain personal information from you
Q:
Is copyright infringement illegal?
A.Yes
B.Yes, outside of a fair use situation
C.No, not unless the material is patented
D.If the material is not patented and on the Internet it is not illegal, otherwise it is
Q:
What techniques do "phishers" use?
A.Search online database, financial institutions, and archives from MySpace, Facebook, and other social networking websites
B.Social networking services
C.Pretend to be legitimate businesses
D.Artificial intelligence
Q:
Can you make a copy of software that you buy?
A.No
B.You can make one copy
C.Yes
D.Only if the software vendor grants you the right to copy it
Q:
Which of the following is not a phising technique?
A.Installing cookies on your computer
B.Sending fraudulent emails
C.Creating fraudulent Web sites
D.Hijacking and rerouting Web traffic
Q:
Which of the following is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A.Pirated software
B.Spam
C.Phishing
D.Sneakware
Q:
If you were to download a computer game from the Internet and then sell this game to your friends, what would you be doing to the person who developed the game?
A.Spamming them
B.Phishing their software
C.Pirating their software
D.Stealing their profits
Q:
What county experiences the greatest revenue losses from pirated software?
A.China
B.United Kingdom
C.Japan
D.United States
Q:
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
A.Ethics
B.Personal safety laws
C.Identity theft laws
D.Privacy
Q:
What privacy rights should you possess?
A.The right to be left alone
B.The right to have control over your own personal possessions
C.The right not to be observed without your consent
D.You should have all these listed rights
Q:
What program records every keystroke and mouse click executed on a computer?
A.Keyboard recorder
B.Trojan horse
C.Virus
D.Key logger
Q:
What is identity theft?
A.When a person losses that sense of self because of their heightened activities on the Web
B.When a person, or group of people, take on another person's identify and then send email and other online communications under the fraudulent name
C.When one person changes their features and dress to resemble another person
D.When a person, or group of people, forge someone's identity for the purpose of fraud
Q:
What computer feature was requested by the Secret Service of hardware manufacturers to be implemented in modern computer equipment to help the Secret Service fight crime?
A.The printing of serial numbers and date information on all printouts
B.The installation of microchips that analyzes your communications and sends anonymous warnings to the Secret Service
C.Systems software that sends ownership information and your computer's serial numbers to Secrete Service
D.Unique serial numbers for all hardware devices that can be traced back to you
Q:
What happens to a CD when you burn images, videos, and music to it?
A.Information about the software and hardware that you used are stored on the CD
B.Personal and identifying information about you is stored on the CD
C.Cookies that are stored on your computer are also transferred to your CD
D.A distinct signature from the CD drive is left on your CD
Q:
A(n) _____ is a network in which one or more computers are servers and provide services to the other computers which are called clients.
Q:
Which of the following protects the intangible creative work that is embodied in physical form?
A.Copyright
B.Intellectual property
C.Fair Use Doctrine
D.Pirating laws
Q:
A(n) _____ is a set of conditions used to measure how well a product or system functions.
Q:
If you were to create a self portrait and you place this portrait on your Web site, what type of law protects your work from anyone downloading and using it?
A.Copyright
B.Patent law
C.Fair Use Doctrine
D.Pirating laws
Q:
_____ measures how quickly an IT system performs a certain process.
Q:
The _____ infrastructure is basically client/server.
Q:
A(n) _____ simply means that a company rents space and telecommunications equipment from another company, or a collocation vendor.
Q:
Whether an employee can look at information and even make changes refers to _____.
Q:
Supporting global customers with 24/7 operation deals with _____ of information.
Q:
_____ is the blueprint for translating a business strategy into a plan.
Q:
Hardware, _____, _____ and information need to be addressed when building an IT infrastructure.
Q:
A _____ infrastructure makes it difficult to compare information between applications.
Q:
If a company is still using a mainframe for business processing, they most likely have a _____ infrastructure.
Q:
A _____ infrastructure involves sharing the information and application of all locations via a network.
Q:
The primary advantage of the _____ infrastructure is it "off-loads" applications and information from the server.
Q:
A(n) _____ is a separate and fully equipped facility where the company can move immediately after the disaster and resume business.
Q:
The purpose of building a(n) _____ is to enable sharing of information and expensive resources.
Q:
_____ is the process of reinstalling the backup information in the event the information was lost.
Q:
Are ethical dilemmas easy to understand?
A.Yes, if you have a strong sense of self
B.Yes, if you are well educated
C.Yes, if you have a strong sense of self and are well educated
D.No, they usually arise from a clash between competing goals, responsibilities, and loyalties
Q:
The disaster recovery cost curve charts (1) the _____ to your organization of the unavailability of information and technology and (2) the _____ to your organization of recovering from a disaster over time.
Q:
Your decisions regarding ethics are influenced by a number of factors. Which is not one of these factors?
A.Magnitude of the outcome
B.Your estimate of the importance of the situation
C.Your age, gender, education, and socio-economic status
D.Your perceptions of conflicting "right reactions"
Q:
The IT architecture is the implementation of the IT infrastructure.
Q:
The IT infrastructure deals with details of hardware and software requirements.
Q:
Since the IT infrastructure rarely changes it only needs to be reviewed about every 5 years.
Q:
A 3-tier infrastructure is the most common approach for Web applications.
Q:
An n-tier infrastructure starts with the 2-tier basic model adding applications as needed.
Q:
In a tiered infrastructure each layer duplicates another layer for backup and recovery.
Q:
Benchmarking is used to improve an IT system performance.
Q:
A distributed infrastructure involves little or no sharing of information systems.
Q:
The current generation of ERP often includes CRM and SCM.
Q:
A(n) _____ includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
Q:
The necessity for a common database was the main difference between ERP and MRP systems.
Q:
A(n) _____ specifies a process for recovering information or an IT system following a disaster.
Q:
Backup is the process of reinstalling emergency copies of information.
Q:
A(n) _____ is a separate facility that does not include computer equipment but can be occupied by knowledge workers following a disaster.
Q:
Backing up is not necessary.
Q:
_____ refers to how well your IT system can adapt to increased demands.
Q:
Disaster recovery plans specify how an IT system or information can be recovered in the event of a catastrophe.
Q:
_____ is a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved.
Q:
A disaster recovery plan should consider the location of the backup information.
Q:
Hot sites and cold sites should be located as close to the main facility as possible for convenience and cost.
Q:
The IT architecture is the blueprint for translating a business strategy into a plan.
Q:
The IT infrastructure includes hardware but not software.
Q:
Flexibility is how well your system can adapt to increased demands.
Q:
Accessibility determines when your IT system will be available for users to access.
Q:
What type of analysis considers each threat and builds a worst-case scenario for each?
A.Impact scenario analysis
B.Threat analysis
C.Impact analysis
D.Requirements recovery analysis
Q:
Performance measures how many ways a single system can be designed to perform exactly the same function.
Q:
In what phase of business continuity planning, would you create a disaster recovery plan?
A.Design
B.Analysis
C.Requirements
D.Implementation
Q:
ERP systems provide integration among operations, sales, human resources, and financial areas.