100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ETHICS Straighterline IT101 Information Technology Fundamentals Graded Topic Test (New Version August 2024)

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
21-08-2024
Written in
2024/2025

ETHICS Straighterline IT101 Information Technology Fundamentals Graded Topic Test (New Version August 2024) We are a team of experts offering course/class attendance (including final proctored exams!!) for all Straighterline, Online ATI, HESI, NCLEX, Portage Learning, Sophia, Nursing, Business etc courses. We also write essays, discussion posts, research papers and school assignments. Should you need any of these services, Contact us via email: or : +1 (540) 753-5914. Guaranteed Passing! Step 1 of 1 Question 1 of 16 "Fill in the blank" question: select the correct answer. - Question 1 The input and select elements may be inline with important contextual information. This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. privacy privacy can be defined as the state of being free from intrusion or disturbance in one’s personal life or affairs. Response for: undefined Correct. Question 2 of 16 Question 2 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. During his regular maintenance and troubleshooting activities, an IT administrator comes into possession of classified company information about new business plans. Which of the following would not be considered an unethical action for him to take based on this information?offer a competitor the information in return for a large sum of money or a lucrative position in the company casually discuss the business plans with friends and colleagues in an informal setting delete the classified information from the source where he found it so that nobody else finds it who is not supposed to all of the above are considered unethical actions Correct. Question 3 of 16 Question 3 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Douglas manages a large number of employees at his company. A sales representative for a local automobile dealer contacts him and explains that a certain individual listed Douglas as his supervisor in a credit application for a car. He asks if Douglas could confirm this fact. What should Douglas do? he should affirm that the individual is his employee he should confirm that he is the employee’s supervisor and provide additional information such as salary in an effort to help the employee get the credit she needs he should not disclose this information in order to protect the privacy of the employee he should immediately report the incident to the proper authorities as an instance of the violation of privacy Correct. Question 4 of 16 Question 4 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully.A company is struggling financially and has decided that they must lay off a few employees. As part of a severance package they are offering them, the employees are being allowed to keep the company laptops that they had used while working there. What security issue might be posed by this decision? the laptops might have information that belongs to the company and should not be spread publicly the laptops could be construed as taxable income that the employees would not think to report the laptops are configured for the company’s network access, and there would be no way to prevent the former employees from continuing to log on even after they were laid off there might be a confidentiality or integrity issue involved in this situation, but no security issue Correct. Question 5 of 16 Question 5 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. A project plan that an organization will keep secret is which of the following types of information? sensitive information private information personal information confidential information Correct. Question 6 of 16Question 6 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following correctly describes the concern of data availability? while it is very easy to process data and create data, technology struggles to make data readily available in the way that would be desired it is important that security restrictions do not prevent authorized parties from accessing needed information while data should be available to all onsite users, remote access to data should be strictly guarded against there is a security risk if data is too easily available Correct. Question 7 of 16 Question 7 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Jasmine was working on a financial report for her supervisor using recent records in the company database. While she was working with those records, another employee opened the same records and made a few updates based on more recent official company calculations. Jasmine’s report did not include those updates, but she did make a few minor corrections (such as spelling corrections) to the file that she noticed before saving it. What security issue is in play in this scenario? two employees altering data at the same time could lead to data corruption Jasmine should not be able to make such unofficial alterations to the data the company should not try to update old records, but instead should simply create new records and save both files separatelythere is no security issue here so long as Jasmine does not try to track her changes Correct. Question 8 of 16 Question 8 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Paula was on a business trip in another region of the country and tried to log on remotely from her laptop to the company network back home. When she did so, however, she received a message informing her that her device was not recognized. When she communicated with the IT department, she was told that a new policy had been implemented and that all laptops and mobile devices had to be physically inspected by IT before being granted network access. What is the data security problem in this scenario? confidentiality integrity there is no security problem in this scenario; security is being adequately addressed availability Correct. Question 9 of 16 Question 9 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What is stipulated by the Drivers Privacy Protection Act of 1994? states are prohibited from selling data gathered in the process of registering drivers with drivers’ licenses drivers are not required to show personal identification to law enforcement officers unless they are being given an actual citationdrivers do not have to give personal information to the government in order to register for a driver’s license if they do not wish to all of the above Correct. Question 10 of 16 Question 10 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Many acts of legislation have been updated in recent decades to account for changes in technology. As technology had advanced so rapidly, legislation had at times not yet taken into account this advance, leading to acts that are now clearly illegal not being classified as such for a time. Which of the following is a reasonable observation based upon this fact? not everything that is legal according to the letter of the law should be considered ethically acceptable IT professionals, as well as users, ought to be informed about the law, but not use it as their exclusive guide there very possibly are IT activities that are not illegal today that will be classified as such in the future all of the above Correct. Question 11 of 16 Question 11 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which approach to IT policies and ethics is the single right one for an organization to take?all laws and ethical norms must be observed to the letter of the law, but as much freedom as possible should be given to the user after that so long as no harm comes to any user and the general letter of the law is observed, the complex details of the law do not need to be closely observed not only will all laws and regulations be observed as well as ethical considerations, but additional restrictions and safeguards will be added to provide even greater protection and security to the user none of the above is the single right approach Correct. Question 12 of 16 Question 12 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a common area of IT ethics that company policies should address? security and privacy of data role of IT in the company whether social security numbers of employees will be openly publicized how the company handles copyright protection issues Correct. Question 13 of 16 Question 13 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following may a company adopt as their IT ethical policy?all data sent over the network will be encrypted users should not share private personal information in business emails IT administrators will not open private files of users without necessary cause all of the above Correct. Question 14 of 16 Question 14 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following organizations does not provide a professional association code of ethics? ISACA AITP ACM all of these provide suggested codes of ethics Correct. Question 15 of 16 Question 15 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. According to professional codes of ethics, whose trust do IT professionals hold first and foremost? For this reason, the professional is responsible to protect this party’s interests. his employerthe public the professional association to which he belongs none of the above Correct. Question 16 of 16 Question 16 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. According to ISACA, IT professionals should only undertake what kind of projects? those they are competent to perform those that provide no risk of failure those that match their enthusiasm and areas of greatest interest those they are well remunerated for

Show more Read less
Course
IT101









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 21, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ETHICS
Straighterline IT101 Information Technology Fundamentals Graded Topic Test
(New Version August 2024)
We are a team of experts offering course/class attendance (including final proctored exams!!) for all
Straighterline, Online ATI, HESI, NCLEX, Portage Learning, Sophia, Nursing, Business etc courses.
We also write essays, discussion posts, research papers and school assignments. Should you need any
of these services, Contact us via email: or WhatsApp: +1 (540) 753-5914.
Guaranteed Passing!




Step 1 of 1
Question 1 of 16
"Fill in the blank" question: select the correct
answer. - Question 1
The input and select elements may be inline with important contextual information.

This is not a form; we suggest that you use the browse mode and read all parts of

the question carefully.

privacy


privacy
can be defined as the state of being free from intrusion or disturbance in one’s
personal life or affairs.
Response for: undefined

Correct.
Question 2 of 16
Question 2
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
During his regular maintenance and troubleshooting activities, an IT administrator
comes into possession of classified company information about new business plans.
Which of the following would not be considered an unethical action for him to take
based on this information?

, offer a competitor the information in return for a large sum of money or a lucrative
position in the company

casually discuss the business plans with friends and colleagues in an informal setting

delete the classified information from the source where he found it so that nobody else
finds it who is not supposed to

all of the above are considered unethical actions
Correct.
Question 3 of 16
Question 3
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Douglas manages a large number of employees at his company. A sales representative
for a local automobile dealer contacts him and explains that a certain individual listed
Douglas as his supervisor in a credit application for a car. He asks if Douglas could
confirm this fact. What should Douglas do?

he should affirm that the individual is his employee

he should confirm that he is the employee’s supervisor and provide additional
information such as salary in an effort to help the employee get the credit she needs

he should not disclose this information in order to protect the privacy of the employee

he should immediately report the incident to the proper authorities as an instance of
the violation of privacy
Correct.
Question 4 of 16
Question 4
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AmazingGrace Western Governer\'s University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1655
Member since
3 year
Number of followers
1193
Documents
9304
Last sold
1 hour ago

4.1

381 reviews

5
224
4
57
3
49
2
13
1
38

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions