Module-4-Ethics

Ethics Module

Schedule:

After deadline.Ended 09/29/2013 11:59 PM EDT

Started:09/29/2013 1:28 AM EDT

Submitted:09/29/2013 5:34 PM EDT

Score:75%

Points:90 out of 120

Question 1

Points: 10 out of 10

Would the following be considered a violation of a user access agreement?

knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of another’s computer

 yes

 no

 maybe

Feedback

Correct. Any action which deliberately damages another’s computer is both illegal and a violation of any user access agreement.

Question 2

Points: 10 out of 10

Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.

 Yes

 No

 Maybe

Feedback

Correct. Accepting system updates is part of keeping the company’s computer operating correctly and securely and is therefore NOT a violation of a user access agreement.

Question 3

Points: 0 out of 10

Would the following be considered a violation of user access agreement?

visiting social networking sites during lunch breaks

 yes

 no

 maybe

Feedback

Incorrect. It depends on whether this activity is expressly forbidden by the user access agreement.

Question 4

Points: 10 out of 10

What is the purpose of a user access agreement?

 to define all approved uses of the company’s IT resources

 to define every sanction to be applied if a violation occurs

 to outline in general the acceptable and unacceptable use of IT resources

 to outline all acceptable and unacceptable behavior of all company employees

Feedback

Correct. The user access agreement gives sufficient detail for acceptable and unacceptable uses of IT resources, but it cannot identify every possible situation.

Question 5

Points: 10 out of 10

For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.

 likely a violation

 likely not a violation

Feedback

Correct. John is not using the color printer for his own personal fliers, but for ones to promote the company’s employee picnic.

Question 6

Points: 0 out of 10

An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.

 True

 False

Feedback

Incorrect. Both illegal and unethical behaviors can be and frequently are included in an employee Code of Conduct.

Question 7

Points: 10 out of 10

Which aspect of social networking poses the most risk?

 Disclosure of personal information

 Communicating with people who share common interests

 The ability to read others’ posts

 Installing software to enable social networking

Feedback

Correct. Failure to understand and monitor privacy settings in social networking settings poses a risk that too much personal information will be disclosed.

Question 8

Points: 10 out of 10

Which of the following factors determine whether a specific instance of file sharing is legal?

 Is the material being shared copyrighted?

 Is the sharing part of a business operation?

 Does the sharing result in monetary gain for the person doing the sharing?

 Is the site that is being used for the sharing primarily used for illegal sharing?

Feedback

Correct. This is the sole criterion: if the material is copyrighted, then sharing it is illegal.

Question 9

Points: 10 out of 10

The Digital Millennium Copyright Act…

 ensures that Internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.

 allows copying or distribution of copies of copyrighted software.

 provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.

 addresses only copyrighted software issues.

Feedback

Correct. The protection mechanisms that prevent a CD or DVD from being copied cannot be removed without penalty, and it is illegal to sell tools to accomplish this removal.

Question 10

Points: 10 out of 10

Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?

 yes

 no

Feedback

Correct. Typically, work done under company employment directives usually becomes the intellectual property of the company. Personal rights to copyright are ceded to the company.

Question 11

Points: 10 out of 10

In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?

 Postings tips, project photos, and ideas on a hobby-related forum.

 Posting your resume on a job-seeking or job-posting site.

 Posting photos of oneself that might be considered risqué or offensive.

 Posting vacation photos after you have returned home.

Feedback

Correct. What you post may be read by a current or future employer, endangering your current or future employability.

Question 12

Points: 0 out of 10

Which of the following statements is true?

 Cyberbullies attack only minors.

 Cyberstalking is the cyberbullying of an adult.

 Cyberstalkers rarely request face-to-face meetings with their victims.

Feedback

Incorrect. This is the most dangerous outcome of cyberstalking or cyberharassment. The more vulnerable victims are minors.

Close

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply