Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
A__________ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
a. spam
b. rootkit
c. logic bomb
d. distributed denial-of-service
Q:
Division of labor plays no role in modern production.
Q:
The business environment in current times, the first decade of the 21st century, can best be described as turbulent.
Q:
__________ is an annual gathering in Las Vegas of computer hackers.
a. Woodstock
b. DEFCON
c. Computer Security Institute convention
d. CAPTCHA
Q:
Profit does not motivate production.
Q:
An antivirus software scans for a specific sequence of bytes, known as a__________, that indicates the presence of specific malware.
a. script kiddie
b. virus signature
c. CAPTCHA
d. Trojan horse
Q:
Business can do just about anything it wants because we do not live in a socially conscious environment.
Q:
Barter preceded monetary commerce.
Q:
Utilize the knowledge you have gained to respond to the following essay questions. Your answers should state your position and use logical arguments and content from this and other chapters in the textbook to support it.
Using the managerial approach discussed in the textbook, discuss the topic of ecological damage and sustainability as they relate to business.
Q:
In computing, a(n) __________ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
a. exploit
b. patch
c. firewall
d. security audit
Q:
John Locke believed one's own efforts can "privatize" property.
Q:
A__________ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date.
a. denial-of-service attack
b. logic bomb
c. botnet
d. rootkit
Q:
Utilize the knowledge you have gained to respond to the following essay questions. Your answers should state your position and use logical arguments and content from this and other chapters in the textbook to support it.
Choose a particular corporation and describe the power it wields in different spheres.
Q:
Private property can be justified.
Q:
Utilize the knowledge you have gained to respond to the following essay questions. Your answers should state your position and use logical arguments and content from this and other chapters in the textbook to support it.
The textbook says that when power gets out of balance, other forces are brought to bear so that balance is restored. Name some of the other forces that are used to balance business power. Describe how effective each of those other forces is in combating business power.
Q:
A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is a(n) __________.
a. anti-virus device
b. intrusion prevention system
c. intrusion detection system
d. virtual private network
Q:
Blood plasma has no value.
Q:
Utilize the knowledge you have gained to respond to the following essay questions. Your answers should state your position and use logical arguments and content from this and other chapters in the textbook to support it.
If "rights" are the entitlement to certain life chances and freedom from certain limitations that are accorded to persons simply because they have been born and are alive, what else does the existence of rights imply?
Q:
A(n) __________ is a type of computer crime perpetrator whose primary motive is to achieve financial gain.
a. industrial spy
b. hacktivist
c. script kiddie
d. cybercriminal
Q:
Thalidomide is a new drug.
Q:
__________ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.
a. Industrial spies
b. Hackers
c. Cyberterrorists
d. Hacktivists
Q:
Utilize the knowledge you have gained to respond to the following essay questions. Your answers should state your position and use logical arguments and content from this and other chapters in the textbook to support it.
The key elements of a pluralistic society are decentralization and diversity of power. Using what you know about American society, do you consider it to be a pluralistic society? Why or why not?
Q:
New cancer drugs tend to sell for high prices.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
What is the difference between internal and external stakeholders?
Q:
__________ have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript.a. Macro viruses b. Logic bombs c. Trojan horses d. Zombies
Q:
Andrew Carnegie was not ____ .A) the scion of a wealthy familyB) a philanthropistC) a steel magnateD) a believer in competition
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Describe what the authors mean by the managerial approach taken in the textbook.
Q:
The__________ is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists.a. USA Patriot Actb. Computer Fraud and Abuse Actc. Stored Wire and Electronic Communications and Transactional Records Access Statutes d. Identity Theft and Assumption Deterrence Act
Q:
Andrew Carnegie _____ .A) believed in communismB) was the first performer at Carnegie HallC) was an immigrantD) believed in indiscriminate charity
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Explain the rationale that is the foundation of The Iron Law of Responsibility.
Q:
According to Marx, alienated labor does not alienate _____ .A) nature from man B) man from himself C) men from womenD) the worker from the species
Q:
The concept of__________ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
a. competitive intelligence
b. reasonable assurance
c. separation of duties
d. risk assessment
Q:
Karl Marx is considered to be _____ .A) a capitalistB) a founding partner of the Marx brothersC) RussianD) The father of modern communism
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Explain what is meant by spheres of power.
Q:
The__________ code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
a. logic bomb
b. zombie
c. dropper
d. loader
Q:
People naturally tend toward _____ .A) exchanging things for other things they needB) hording foodC) being asocialD) communist societies
Q:
The__________ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.a. Carnegie Mellon's Computer Response Teamb. U.S. Computer Emergency Readiness Teamc. The National Institute of Standards and Technologyd. The Science and Technology Directorate of Homeland Security
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
The authors state, "the philosophy of victimization is intimately related to and sometimes inseparable from the rights movement and the entitlement mentality." Explain how these three concepts are related.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
The authors discuss the rights movement as a contributing factor in the climate that is critical of business. What are "rights?"
Q:
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a__________ to eliminate the problem.
a. patch
b. bot
c. rootkit
d. Trojan horse
Q:
Division of labor helps _____ .A) work to become more interestingB) production increaseC) each person feel a sense of the final productD) scarcity
Q:
Money came about as a _____ .A) memorial to rulersB) type of jewelryC) means of exchangeD) useful commodity
Q:
Competitive intelligence combines elements of law and computer science to identify, collect, examine, and preserve data so that it is admissible in a court of law.
a. True
b. False
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Explain the role that television plays in creating a climate critical of business.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Describe the virtues of a pluralistic society.
Q:
Locke's philosophy holds that:A) Slavery can sometimes be justified.B) Every man has a property in his own person. C) Scarcity has no effect on resources.D) Utility is the highest value.
Q:
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.
a. True
b. False
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Why does discussion of the institution of business tend to focus on big business?
Q:
Hacktivism involves using illegal means to obtain trade secrets from competitors.
a. True
b. False
Q:
Private property _____ .A) is a component of modern society B) belongs to everyone in common C) first existed in EnglandD) requires manufacture
Q:
The use of cloud computing and virtualization software has significantly reduced computer security concerns.
a. True
b. False
Q:
Products increase in value if they _____ .A) become more commonB) are manufactured by CelgeneC) come from other continentsD) become unique in some respect
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
The authors of the textbook say that, at a general level, they will be discussing the role of business in society. What do they mean by "the role of business in society?"
Q:
In a security incident, the primary goal must be to regain control and limit damage, and not to attempt to monitor or catch an intruder.
a. True
b. False
Q:
Sustainability, at a simple level, is about business's:
A.ability to survive and thrive over the long term
B.approach to only the natural environment
C.preservation of the environment in the present generation
D.ability to meet the needs of the present while compromising future generations
Q:
Trust is an unconditional value.
Q:
When a business affects the life of a member of the surrounding community without meaning to, the company has wielded
A.coercive power.
B.deliberate power.
C.hidden power.
D.unintentional power.
Q:
Trust can sometimes serve immoral purposes.
Q:
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
a. True
b. False
Q:
The most important stakeholders of a business are typically its
A.employees.
B.government.
C.consumers.
D.owners.
Q:
Trustworthiness is an attitude.
Q:
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
a. True
b. False
Q:
The examination of business and its relationship to society typically focuses on
A.big business and highly visible industries.
B.all business and all industries.
C.small business and highly visible industries.
D.none of these.
Q:
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
a. True
b. False
Q:
Trust cannot be considered important to international business ethics.
Q:
"In the long run, those who do not use power in a manner which society considers responsible will tend to lose it" is the description of
A.The Iron Law of Oligarchy.
B.The Iron Cage of Rationality.
C.The Iron Law of Responsibility.
D.The Peter Principle.
Q:
The expanding globalization of business has brought with it the increased importance of an international business ethics.
Q:
As a safeguard against attacks by malicious insiders, organizations must define employee roles so that a single employee can input as well as approve purchase orders.
a. True
b. False
Q:
The government, consumers, and members of the community are examples of
A.stockholders.
B.the technological environment.
C.external stakeholders.
D.primary stakeholders.
Q:
Kant believes equivocation is never justified.
Q:
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
a. True
b. False
Q:
An internal stakeholder is a person or group who
A.exist outside the boundaries of the firm.
B.is located in the same country in which the firm in located.
C.is defined as an "insider" in laws regulating financial markets.
D.is "inside" the company, such as employees and owners.
Q:
Computer forensics is such a new field that there is little training or certification processes available to practioners.
a. True
b. False
Q:
Stakeholders include all of the following groups except
A.owners.
B.employees.
C.customers.
D.none of these.
Q:
Kant believes the exchange of our sentiments is the principal factor in social intercourse.
Q:
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
a. True
b. False
Q:
Bernie Ebbers, one-time Worldcom CEO, wound up in jail.
Q:
Which of the following is not an element of the social contract?
A.laws
B.employment contracts
C.regulations
D.shared understandings
Q:
Whenever possible, automated system rules should mirror an organization's written policies.
a. True
b. False
Q:
SEC stands for "Securities and Exchange Commission."