question archive Question 1) Which of the following statements would be most likely to appear in a professional association's code of ethics for its members? Question 2 What might members of a professional organization be doing when they refer to the organization's code of ethics? Question 3 What is a benefit implied by holding membership in a professional association? Question 4   Saved You are the owner of a small business

Question 1) Which of the following statements would be most likely to appear in a professional association's code of ethics for its members? Question 2 What might members of a professional organization be doing when they refer to the organization's code of ethics? Question 3 What is a benefit implied by holding membership in a professional association? Question 4   Saved You are the owner of a small business

Subject:Computer SciencePrice: Bought3

Question 1) Which of the following statements would be most likely to appear in a professional

association's code of ethics for its members?

Question 2

What might members of a professional organization be doing when they refer to the

organization's code of ethics?

Question 3

What is a benefit implied by holding membership in a professional association?

Question 4

 

Saved You are the owner of a small business. In the last year, you have started to hire employees

and you now have 5 employees. Each has his or her own personal computer and you have

hired a consultant to establish a local area network for your business. You realize that you

should draw up a user access agreement and a code of conduct for your employees. Which of

the three documents listed below should you create first?

Question 5

Of the choices below, which is the best definition of a cyberstalker?

Question 6

Which of the following statements is true?

Question 7

 

 

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select

Yes or No.

To discourage internet service providers from allowing file transfers.

Question 8

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select

Yes or No.

To outline penalties for bypassing or providing tools to bypass protection mechanisms built

into copyrighted software.

Question 9

(Yes/No). Using company-owned equipment and software, you

write a software program as part of your job requirements. This

is an original creation of yours, so are you free to use it outside

of work and even sell it to others?

Question 10

 

You make a copy of a software application CD or DVD to lend to

a friend. Is this legal?

Question 11

"While employed at this company, no information obtained in the course of employment may

be used to advance personal gain, including financial reward." In which of the documents

below would this statement likely be found?

 

 

 

 

Question 12 Which of the following issues would most likely not be addressed in an employee code of

conduct?

Question 13 (True/False) An employee code of conduct will list illegal behaviors, but it will not list

unethical behaviors.

Question 14

Jason has a part time job in the office of a construction company and is also a student at a

community college. He often works on his homework during times when he is not busy at

work because the office computer contains the software he needs to do his assignments and

he hasn't been able to afford to purchase the software for his own personal computer. Which

of these unacceptable uses typically included in a user access policy might he most likely be

engaging in?

Question 15

Which of the following is usually one of the purposes of a user access agreement?

Question 16 (True/False). Social networking through such services as Facebook, Twitter, LinkedIn, and

YouTube have made significant changes to the way people gather and share information and

experiences. Downloads from these services are safe from data theft and viruses.

Question 17

Which of the following is the biggest risk of using social networking?

Question 18

In the scenario below, identify which of the three dimensions is primarily threatened or

compromised.

The constant popups on his computer are making it difficult for Alfonso to accomplish work

that involves being on the internet.

 

 

Question 19

 

Saved (True/False). Making data secure means keeping it secret.

Question 20

 

Saved (True/False). In terms of database access, risk assessments should address those who have

legitimate credentials for viewing, entering, updating, or removing data from the database

and those who are restricted from accessing the database or who have limited rights.

Question 21

 

Saved For the following scenario, indicate whether the action is a good practice or bad practice to

safeguard your personally identifiable information.

Marina's personal computer requires a password to get access.

Question 22

 

Saved Which of the following measures is more likely to help you protect your PII?

Question 23

 

Saved Your computer shuts down every time you try to access the internet with your browser.

Which of the following is the most likely cause?

Question 24

 

 

 

Saved A computer is completely compromised when it won't turn on or operate. What is the best

way to fix it?

Question 25

 

Saved Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder,

etc.) someone has found your name and address. What other information would be needed in

order for them to access your ONLINE bank account or credit card account records?

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE