CIS3345:
Management Information Systems

Spring, 2015

Chapter 13 On-Line Quiz A

Complete the form below ONLY if your Pseudonym begins with a Non-Alphabetic Character (e.g., "0", "&") or the Alphabetic Characters "A" through "C" (uppercase or lower Case)

If you choose this Quiz and you do not meet the criteria above, you will receive a zero (0)

Enter Your PSEUDONYM:               

Question 1:    The use of information technologies in business has had major impacts on society, and thus raises ethical issues in the areas of:

                       
 Crime, poverty, finance, individuality, and health.
                          Crime, privacy, individuality, employment, health, and working conditions.
                          Poverty, individuality, unemployment, and online game playing
                          Privacy, unemployment, ergonomics, individuality, and crime

Question 2
:  
Ethical responsibility involves:

                       
 the assurance that information software can not be illegally duplicated
                          the insistance that information technology be ethically produced
                          the requirement that information be ethically stored
                          the promotion of ethical uses of information technology in the workplace
\

Question 3
:   
There are four major principles of technology ethics: proportionality, informed consent, justice, and minimized risk. Which of the following best describes proportionality?
                       
 The good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk.
                          The good achieved by the technology must outweigh the harm or risk.
                          The benefits and burdens of the technology should be distributed fairly
                          Even if judged acceptable by the other guidelines, the technology must be implemented so as to avoid all unnecessary risks.
 

Question 4:    Which of the following is NOT an ethical guideline?

                       
 Increasing professional competence
                          Accepting responsibility for one's own work
                          Acting with certainty in all situations
                          Setting high standards of personal performance

Question 5
:   
The Association of Information Technology Professionals (AITP) created standards of professional conduct that can serve as a model for ethical conduct by business end users as well as by information system professionals. Which of the following is NOT one of those standards?

                       
 In recognition of my obligation to my employer, I shall avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
                          In recognition of my obligation to my employer, I shall protect the privacy and confidentiality of all information entrusted to me.
                          In recognition of my obligation to my employer, I shall withhold information that is germane to the situation if it is possible for me or my direct supervisor to obtain personal gain.
                          In recognition of my obligation to my employer, I shall not exploit weaknesses of a computer system for personal gain or personal satisfaction.
 

Question 6:    Denial of service assaults via the Internet depends on three layers of networked computer systems. Which of the following is NOT one of those layers?

                       
 The victim's website
                          The victim's Internet service provider
                          The sites of zombie or slave computers that were commandeered by the cyber criminal.
                          The cyber criminal's Internet service provider.
 

Question 7:    What is a Trojan Horse?

                       
 An instruction in a computer program that triggers a malicious act
                          Software that can guess passwords
                          A program that contains instructions that exploit a known vulnerability in some software
                          Sifting through a company’s garbage to find information to help break into their computers
 

Question 8:    Hacking, in computerese, is the obsessive use of computers, or the unauthorized access and use of networked computer systems. There are many common hacking tactics to assault companies through the Internet and other networks. A trojan horse is one such tactic. A trojan horse is described as:

                       
 A program that automatically dials thousands of telephone numbers in search of a way in through a modem connection.
                          A tiny program that misuse your computer's resources, modify files on the hard disk, send fake e-mail, or steal passwords.
                          A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.
                          Having a few hidden ways back so that re-entry to a computer system is easy and difficult to detect.
 

Question 9:    The goal of ergonomics is:

                       
 To design healthy work environments that are safe, comfortable, and pleasant for people to work in.
                          To design efficient work environments that are productive and promote high morale.
                          To design effective work environments that are conducive to fast-paced, repetitive jobs
                          To design policies to provide structured work environments.
 

Question 10  What is a fuzzy logic?

                       
 Ergonomics
                          Cumulative trauma disorders
                          Carpel tunnel syndromes
                          Computer matching
 


This page was last updated on 04/15/07.