Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
Rawls believes society is characterized by conflict and _____ .A) an identity of interestsB) divergent interestsC) life interestsD) indifferent interests
Q:
The demographics, lifestyles, and social values of a society determine the firm's
A.social environment.
B.economic environment.
C.political environment.
D.technological environment.
Q:
To initiate a denialÂofÂservice attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, the botnet computers, called __________, go into action, each sending a simple request for access to the target site again and again.
Q:
Robert Nozick is critical of socialism based on which of the following?
A) Public economy view
B) Free choice view
C) His Marxist views
D) It provides people's needs
Q:
Segments of business's macroenvironment include all of the following except
A.the social environment.
B.the natural environment.
C.the economic environment.
D.the political environment.
Q:
__________ has become an umbrella term for many types of malicious code.
Q:
Rawls posits four branches of government; which of the following is not one?
A) Communication
B) Allocation
C) Stabilization
D) Distribution
Q:
A purposeful aggregation of people who represent a common cause or share common beliefs is called a(n)
A.special interest group.
B.general interest group.
C.interest group.
D.clique.
Q:
A(n) __________ is a security incident prevention tool that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Q:
Rawls believes that:A) Liberty precludes justice.B) Arbitrary inequalities are inevitable. C) Liberty and justice are related.D) Justice precludes liberty.
Q:
A community, nation, or broad grouping of people having common traditions, values, institutions, and collective activities and interests is a
A.society.
B.culture.
C.population.
D.network.
Q:
The use of voice mail to tell someone to call a phone number, or access a Web site, in an attempt to gain personal information about that person is called __________
Q:
Philosopher John Rawls is famous for his theory of _____ .A) remunerative justiceB) principled justice C) institutional justice D) distributive justice
Q:
Which of the following characteristics of an industry does not add to the creation of visible and controversial social problems?
A.intense advertising
B.creation of pollution
C.geographic location
D.products that affect health
Q:
Using text messaging (SMS) fraudulently to try to get the recipient to reveal personal data is called __________.
Q:
A monopsonist is a buyer that controls a market.
Q:
The collection of private, commercially oriented organizations, ranging in size from sole proprietorships to large corporations is referred to as
A.the third sector.
B.government.
C.business.
D.the free market economy.
Q:
The__________ Act went into effect in 2004 and states that it is legal to spam, provided the messages meet a few basic requirements.
Q:
Which of the following is not listed as a general issue involving social or ethical ramifications within the relationship between business and society?
A.downsizing pension programs
B.toxic waste disposal
C.insider trading
D.death penalties
Q:
TGI stands for Transaction Geared Information.
Q:
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of email accounts. A partial solution to this problem is the use of__________ to ensure that only humans obtain free accounts.
Q:
Skills and knowledge present a competitive advantage.
Q:
__________ detracts recipients from the ability of recipients to communicate effectively due to full mailboxes and relevant emails being hidden among many unsolicited messages.
Q:
The concept of sustainability is derived from the notion of management development.
Q:
Our current patent and trademark system was first designed more than 100 years ago.
Q:
Spheres of power describe the arenas in which power may be utilized.
Q:
__________ differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by email.
Q:
WTO stands for World Trade Organization.
Q:
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a(n) __________.
Q:
The principal internal stakeholders of a corporation are its customers and employees.
Q:
FET stands for Foundation on Environmental Trends.
Q:
Workers in many organizations operate in a(n) __________ environment in which software and data storage are services provided via the Internet.
Q:
A child's assumption that he or she will have a higher standard of living than the previous generation is called the revolution of rising expectations.
Q:
Neemix has never been patented.
Q:
A(n) __________ is a form of malware in which malicious code is hidden inside a seemingly harmless program.
Q:
Movies depict corporate life as amoral and possibly deadly.
Q:
The natural compound in neem is patented.
Q:
A(n) __________ is a harmful program that resides in the active memory of the computer and duplicates itself.
Q:
News shows are the only type of programming on television that has contributed to criticism of business.
Q:
The neem tree is useful only for its seeds.
Q:
__________ operates in a software layer that runs on top of the operating system.
Q:
The commercial insecticide Neemix is based on a natural compound.
Q:
The percentage of the U.S. population that has earned high school diplomas and college degrees has remained about the same over the last thirty years.
Q:
The __________regulates the collection of the content of wire and electronic communications.a. Fourth Amendment b. Fifth Amendmentc. Wiretap Act d. Pen Registers and Trap and Trace Devices Statute
Q:
The Iron Law of Responsibility states that people who use power wisely will be rewarded with more power.
Q:
The European Union requires that member states _____ .A) fairly process personal dataB) outlaw personal databasesC) allow each individual access to all their personal dataD) permanently store all personal data
Q:
Technically, a(n) __________ is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
a. virus
b. operating system
c. zombie
d. CAPTCHA
Q:
Ethics refers to issues of right and wrong, fairness, and justice.
Q:
The Code of Fair Information Practices _____ .A) was never adoptedB) is federal lawC) is law in 36 statesD) is effect only in California
Q:
The Privacy Act of 1974 _____ .A) allows individuals to delete their governmental recordsB) hampered the enforcement of some other lawsC) transferred individual privacy rights to the GovernmentD) restricted governmental data matching
Q:
Before the IT security group can begin an eradication effort, it must __________.
a. seek permission of the firm's legal counsel
b. collect and log all possible criminal evidence from the system
c. consider the potential for negative publicity
d. develop an estimate for the monetary damage caused
Q:
The social contract in the modern era is changing rapidly and dramatically.
Q:
A(n) __________ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.
a. firewall
b. social network
c. intrusion detection device
d. virtual private network
Q:
The social contract is the set of rights and duties imposed on citizens by their government.
Q:
Computers have led to _____ .A) less data being stored permanentlyB) less abuse of private informationC) information gathering on a much greater scaleD) decreased sale of information
Q:
__________ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.
a. Whistleblowers
b. Negligent insiders
c. Malicious insiders
d. Industrial spies
Q:
Data mining _____ .A) always involves creditB) can lead to potentially illegal activities such as redliningC) does not correlate raw dataD) is used only by mineral resource companies
Q:
Power is only manifest when it is used purposefully.
Q:
The common perception of business power is that there is too little of it to provide a balance with other social institutions.
Q:
__________ is the sending of fraudulent emails to an organization's employees designed to look like they came from highÂ
level executives from within the organization.
a. Spamdexing
b. Vishing
c. Smishing
d. Spear-phishing
Q:
Employer monitoring of employee computer use _____ .A) potentially can be an invasion of privacyB) is always innocuousC) is exactly the same as listening to employee phone callsD) becomes more difficult each year
Q:
__________ is the act of fraudulently using email to try to get the recipient to reveal personal data.
a. Pharming
b. Phishing
c. Spamdexing
d. Flyposting
Q:
The authors of the textbook lay the primary responsibility for business's problems on the media.
Q:
Internet information _____ .A) is innocuousB) is always accurateC) raises no privacy concernsD) is problematic
Q:
A__________ is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
a. logic bomb
b. DDoS attack
c. zero-day attack
d. rootkit
Q:
Affluence refers to the level of wealth, disposable income, and standard of living of a society.
Q:
In Lester C. Thurow's article arguing for a new system of intellectual property rights, he argues that:A) Patent law is a perfect solution to intellectual property rights. B) A global system of intellectual property rights is not needed. C) Laws must be enforceable or they should not be laws.D) Knowledge should not be patentable.
Q:
Installation of a corporate__________ is the most common computer security precaution taken by businesses.
a. emergency response team
b. rootkit
c. virtual private network
d. firewall
Q:
Business interacts with only a limited number of stakeholder groups.
Q:
If patent law did not exist, W.R. Grace likely would have _____ .A) Provided Neemix free of chargeB) Not spent its money researching neemC) Bought neem trees for transplant to the U.S. D) Developed Neemix any way
Q:
The__________ policy is a template available from the SANS Institute that defines the means to establish a culture of openness, trust, and integrity in business practices.
a. information sensitivity
b. risk assessment
c. ethics
d. voice-mail policy
Q:
Common Cause and the U.S. Chamber of Commerce are examples of general purpose interest groups.
Q:
Neemix is _____ .A) a pesticide patented by W.R. GraceB) an Indian treeC) a foreign formulation of a pesticideD) unprofitable
Q:
A strong security program begins by __________.
a. assessing the threats to an organization's computers and network
b. authorizing a large budget to pay for the necessary hardware and software
c. hiring a chief security officer
d. monitoring the network for potential intrusions
Q:
Stakeholders are the owners of shares in a corporation.
Q:
Andrew Carnegie believed in capitalism.
Q:
Pluralism is a condition in which there is a concentration of power among society's groups and organizations.
Q:
Karl Marx believed that modern production causes the alienation of labor.
Q:
__________ pledged to deliver on a trustworthy computing initiative and defined four pillars of trustworthy computing.
a. IBM
b. Microsoft
c. Oracle
d. Hewlett Packard
Q:
A__________ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
a. spam
b. rootkit
c. logic bomb
d. distributed denial-of-service