CIS3345:
Management Information Systems

Spring, 2015

Chapter 13 On-Line Quiz C

Complete the form below ONLY if your Pseudonym begins with the Alphabetic Characters "N" through "Z" (uppercase or lower Case)

If you choose this Quiz and you do not meet the criteria above, you will receive a zero (0)

Enter Your PSEUDONYM:               

Question 1:    Which of the following groups of issues represents some of the major areas of ethical controversy in information technology?

                       
 Intellectual property, cybercrime, hacking
                          Customer and employee privacy, workplace safety
                          Employer privacy, intellectual property rights, workplace safety
                          Employer privacy, customer and employee privacy, workplace safety
 

Question 2:    Your text outlines three theories managers use when making decisions - stockholder, social contract, and stakeholder theory. Social contract theory states:

                         That managers are agents of the stockholders, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
                          That companies have ethical responsibility to all members of society that allow corporations to exist based on a social contract.
                          That managers have an ethical responsibility to manage a firm for the benefit of all of its stakeholders who are all individuals and groups that have a stake in or claim on a company
                          None of the above
 

Question 3:    There are four major principles of technology ethics: proportionality, informed consent, justice, and minimized risk. Which of the following best describes informed consent?

                       
 The good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk.
                          Those affected by the technology should understand and accept the risks.
                          The benefits and burdens of the technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk.
                          Even if judged acceptable by the other guidelines, the technology must be implemented so as to avoid all unnecessary risks.
 

Question 4:    Many computer crimes involve the theft of money. In the majority of cases, they are:

                       
 Inside jobs' that involve authorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
                          Outside jobs' that involve authorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
                         Inside jobs' that involve unauthorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
                          Outside jobs' that involve unauthorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
 

Question 5:    Which of the following is a method to defend against denial of service attacks?

                       
 Set security policies.
                          Monitor employee emails.
                          Coordinate security with network providers.
                          Monitor unused ports.
 

Question 6:    What is a back door?

                       
 A point hidden point of entry to be used in case the original entry point has been detected or blocked
                          Tiny programs that misuse your computer’s resources, modify files on the hard disk, send fake e-mail, or steal passwords
                          A tactic used to gain access to computer systems by talking unsuspecting company employees out of valuable information such as passwords
                          A technique for crashing or gaining control of a computer by sending too much data to the buffer in a computer’s memory
 

Question 7:    Hacking, in computerese, is the obsessive use of computers, or the unauthorized access and use of networked computer systems. There are many common hacking tactics to assault companies through the Internet and other networks. A back door is one such tactic. A back door is described as:

                       
 A program that automatically dials thousands of telephone numbers in search of a way in through a modem connection
                          A tiny program that misuse your computer's resources, modify files on the hard disk, send fake e-mail, or steal passwords.
                          A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software
                          Having a few hidden ways back so that re-entry to a computer system is easy and difficult to detect.
 

Question 8:    People who sit at PC workstations or visual display terminals in fast-paced, repetitive keystroke jobs can suffer a variety of health problems known collectively as:

                       
 Ergonomics
                          Cumulative trauma disorders
                          Carpel tunnel syndromes
                          Computer matching
 

Question 9:    What is the purpose of external firewalls?

                       
 To prevent users from access sensitive human resource or financial data.
                          To limit access of intranet resources to specific users.
                          To keep out unauthorized Internet users from intranet networks
                          To avoid creating security holes to back-end resources
 

Question 10:   The unauthorized use of private and confidential personal information has seriously damaged the privacy of individuals. Which of the following is an example of using the Internet to violate a person's privacy?

                       
 Accessing individuals' private e-mail conversations and computer records, and collecting and sharing information about individuals gained from their visits to Internet websites and newsgroups.
                          Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places
                          Using customer information gained from many sources to market additional business services
                          Collecting telephone numbers, e-mail addresses, credit card numbers, and other personal information to build individual customer profiles."
 


This page was last updated on 04/15/07.