Module-4-Ethics
Ethics Module
Schedule:
After deadline.Ended 09/29/2013 11:59 PM EDT
Started:09/29/2013 1:28 AM EDT
Submitted:09/29/2013 5:34 PM EDT
Score:75%
Points:90 out of 120
Question 1
Points: 10 out of 10
Would the following be considered a violation of a user access agreement?
knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of another’s computer
yes
no
maybe
Feedback
Correct. Any action which deliberately damages another’s computer is both illegal and a violation of any user access agreement.
Question 2
Points: 10 out of 10
Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.
Yes
No
Maybe
Feedback
Correct. Accepting system updates is part of keeping the company’s computer operating correctly and securely and is therefore NOT a violation of a user access agreement.
Question 3
Points: 0 out of 10
Would the following be considered a violation of user access agreement?
visiting social networking sites during lunch breaks
yes
no
maybe
Feedback
Incorrect. It depends on whether this activity is expressly forbidden by the user access agreement.
Question 4
Points: 10 out of 10
What is the purpose of a user access agreement?
to define all approved uses of the company’s IT resources
to define every sanction to be applied if a violation occurs
to outline in general the acceptable and unacceptable use of IT resources
to outline all acceptable and unacceptable behavior of all company employees
Feedback
Correct. The user access agreement gives sufficient detail for acceptable and unacceptable uses of IT resources, but it cannot identify every possible situation.
Question 5
Points: 10 out of 10
For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.
likely a violation
likely not a violation
Feedback
Correct. John is not using the color printer for his own personal fliers, but for ones to promote the company’s employee picnic.
Question 6
Points: 0 out of 10
An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.
True
False
Feedback
Incorrect. Both illegal and unethical behaviors can be and frequently are included in an employee Code of Conduct.
Question 7
Points: 10 out of 10
Which aspect of social networking poses the most risk?
Disclosure of personal information
Communicating with people who share common interests
The ability to read others’ posts
Installing software to enable social networking
Feedback
Correct. Failure to understand and monitor privacy settings in social networking settings poses a risk that too much personal information will be disclosed.
Question 8
Points: 10 out of 10
Which of the following factors determine whether a specific instance of file sharing is legal?
Is the material being shared copyrighted?
Is the sharing part of a business operation?
Does the sharing result in monetary gain for the person doing the sharing?
Is the site that is being used for the sharing primarily used for illegal sharing?
Feedback
Correct. This is the sole criterion: if the material is copyrighted, then sharing it is illegal.
Question 9
Points: 10 out of 10
The Digital Millennium Copyright Act…
ensures that Internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.
allows copying or distribution of copies of copyrighted software.
provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.
addresses only copyrighted software issues.
Feedback
Correct. The protection mechanisms that prevent a CD or DVD from being copied cannot be removed without penalty, and it is illegal to sell tools to accomplish this removal.
Question 10
Points: 10 out of 10
Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?
yes
no
Feedback
Correct. Typically, work done under company employment directives usually becomes the intellectual property of the company. Personal rights to copyright are ceded to the company.
Question 11
Points: 10 out of 10
In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?
Postings tips, project photos, and ideas on a hobby-related forum.
Posting your resume on a job-seeking or job-posting site.
Posting photos of oneself that might be considered risqué or offensive.
Posting vacation photos after you have returned home.
Feedback
Correct. What you post may be read by a current or future employer, endangering your current or future employability.
Question 12
Points: 0 out of 10
Which of the following statements is true?
Cyberbullies attack only minors.
Cyberstalking is the cyberbullying of an adult.
Cyberstalkers rarely request face-to-face meetings with their victims.
Feedback
Incorrect. This is the most dangerous outcome of cyberstalking or cyberharassment. The more vulnerable victims are minors.
Close
Leave a Reply
Want to join the discussion?Feel free to contribute!