100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C961 Ethics In Technology Glossary Terms Questions and Answers (Expert Solutions)

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
30-07-2025
Written in
2024/2025

C961 Ethics In Technology Glossary Terms Questions and Answers (Expert Solutions)

Institution
C961
Course
C961










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C961
Course
C961

Document information

Uploaded on
July 30, 2025
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | 1



C961 Ethics In Technology Glossary Terms
Questions and Answers (Expert Solutions)


Q: acceptable use policy (AUP), 🗹🗹: A document that stipulates restrictions and
practices that a user must agree in order to use organizational computing and network
resources.


Q: advanced persistent threat (APT), 🗹🗹: A network attack in which an intruder
gains access to a network and stays there—undetected— with the intention of stealing
data over a long period of time (weeks or even months).


Q: Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), 🗹🗹:
An agreement of the World Trade Organization that requires member governments to
ensure that intellectual property rights can be enforced under their laws and that
penalties for infringement are tough enough to deter further violations.


Q: anonymous expression, 🗹🗹: The expression of opinions by people who do not
reveal their identity.


Q: anonymous remailer service, 🗹🗹: A service that allows anonymity on the internet
by using a computer program that strips the originating header and/or IP address from
the message and then forwards the message to its intended recipient.


Q: anti-SLAPP laws, 🗹🗹: Laws designed to reduce frivolous SLAPPs (strategic
lawsuit against public participation [SLAPP], which is a lawsuit filed by corporations,
government officials, and others against citizens and community groups who oppose
them on matters of concern).


Q: antivirus software, 🗹🗹: Software that scans for a specific sequence of bytes,
known as a virus signature, that indicates the presence of a specific virus.

, Page | 2

Q: artificial intelligence systems, 🗹🗹: The people, procedures, hardware, software,
data, and knowledge needed to develop computer systems and machines that can
simulate human intelligence processes, including learning (the acquisition of
information and rules for using the information), reasoning (using rules to reach
conclusions), and self-correction (using the outcome from one scenario to improve its
performance on future scenarios).


Q: audit committee, 🗹🗹: A group that provides assistance to the board of directors
in fulfilling its responsibilities with respect to the oversight of the quality and integrity
of the organization's accounting and reporting practices and controls, including
financial statements and reports; the organization's compliance with legal and
regulatory requirements; the qualifications, independence, and performance of the
company's independent auditor; and the performance of the company's internal audit
team.


Q: Bathsheba syndrome, 🗹🗹: The moral corruption of people in power, which is
often facilitated by a tendency for people to look the other way when their leaders act
inappropriately.


Q: blended threat, 🗹🗹: A sophisticated threat that combines the features of a virus,
worm, Trojan horse, and other malicious code into a single payload.


Q: body of knowledge, 🗹🗹: An agreed-upon sets of skills and abilities that all
licensed professionals must possess.


Q: botnet, 🗹🗹: A large group of computers, which are controlled from one or more
remote locations by hackers, without the knowledge or consent of their owners.


Q: breach of contract, 🗹🗹: The failure of one party to meet the terms of a contract.


Q: breach of the duty of care, 🗹🗹: The failure to act as a reasonable person would
act.


Q: bribery, 🗹🗹: The act of providing money, property, or favors to someone in
business or government in order to obtain a business advantage.

, Page | 3

Q: bring your own device (BYOD), 🗹🗹: A business policy that permits, and in some
cases, encourages employees to use their own mobile devices (smartphones, tablets, or
laptops) to access company computing resources and applications, including email,
corporate databases, the corporate intranet, and the Internet.


Q: BSA | The Software Alliance (BSA), 🗹🗹: A trade group that represent the world's
largest software and hardware manufacturers.


Q: business continuity plan, 🗹🗹: A risk-based strategy that includes an occupant
emergency evacuation plan, a continuity of operations plan, and an incident
management plan with an active governance process to minimize the potential impact
of any security incident and to ensure business continuity in the event of a cyberattack
or some form of disaster.


Q: CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans
Apart), 🗹🗹: Software that generates and grades tests that humans can pass and all
but the most sophisticated computer programs cannot.


Q: certification, 🗹🗹: Indicates that a professional possesses a particular set of skills,
knowledge, or abilities, in the opinion of the certifying organization. Certification can
also apply to products (e.g., the Wi-Fi CERTIFIED logo assures that the product has met
rigorous interoperability testing to ensure that it will work with other Wi-Fi-certified
products) and is generally voluntary.


Q: Child Online Protection Act (COPA), 🗹🗹: An act signed into law in 1998 with the
aim of prohibiting the making of harmful material available to minors via the internet;
the law was ultimately ruled largely unconstitutional.


Q: Children's Internet Protection Act (CIPA), 🗹🗹: An act passed in 2000; it required
federally financed schools and libraries to use some form of technological protection
(such as an internet filter) to block computer access to obscene material, pornography,
and anything else considered harmful to minors.


Q: CIA security triad, 🗹🗹: Refers to confidentiality, integrity, and availability.
$13.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
StudyRM

Get to know the seller

Seller avatar
StudyRM University Of California - Los Angeles (UCLA)
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
6 months
Number of followers
0
Documents
4114
Last sold
5 days ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions