Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Business Ethics » Page 97

Business Ethics

Q: One thing that is common to all techniques used for identification of issues is A.news clipping services. B.environmental scanning. C.subscription to forecasting services. D.a formal, organized effort to gather information on emerging social trends.

Q: An analogy between the analysis of the moral justifiability of the American system and of the international situation falters because of which of the following? A. There is no developed international system. B. There is no developed American system. C. Other nations view America as distinct from the rest of the world. D. America's legacy of isolationism has isolated it from the rest of the world.

Q: As a result of the lack of consistent quality in software, many organizations avoid buying the__________ release of a major software product.

Q: The implementation phase of the issues management process does not include A.formulation of responses. B.putting the plan into action. C.evaluating the results of the response. D.monitoring the results.

Q: A(n) __________ assures buyers or lessees that a product meets certain standards of quality.

Q: What makes spam particularly more problematic for receivers than bulk mailed advertisements? A. It is a nuisance to have an inbox clogged by considerable numbers of spam email. B. The cost of bulk mailing is borne by the advertiser. C. Junk mail and spam are roughly equivalent. D. Bulk junk mail is a relatively small phenomenon.

Q: Planning aspects of the issues management process include all of the following except A.identification. B.analysis. C.ranking. D.monitoring.

Q: __________ focuses on how to define, measure, and refine the quality of the development process and the products developed during its various stages.

Q: Which of the following can be true or false and tends to obscure the issue and location of truth? A. facts B. information C. data D. mistakes

Q: The issues management process contains two basic functions, A.planning and implementation. B.identification and resolution. C.planning and controlling. D.leadership and followership.

Q: The Y2K problem is an example of which sort of problem that arises from the extensive introduction of computers into business? A. Computer crime B. Computers and corporate responsibility C. Computers and privacy D. The changing nature of work

Q: Which of the following is not an assumption we make when we use issues management? A.Issues can be identified earlier and more completely than in the past. B.Early anticipation of issues gives the firm more options. C.Issues are so complex that firms have little chance to resolve them favorably. D.The firm will be able to identify stakeholders earlier than in the past.

Q: Defendants in a(n) __________ action may use several legal defenses, including the doctrine of supervening event, the government contractor defense, and an expired statute of limitations.

Q: The issue of the availability of personal information is a problem of which of the following? A. Computer crime B. Computers and corporate responsibility C. Computers and privacy D. The changing nature of work

Q: A(n) __________ is any error that, if not removed, could cause a software system to fail to meet its users' needs.

Q: When managers consider issues that affect their firm, they often ignore A.ethical considerations. B.financial concerns. C.personnel matters. D.personal stakes.

Q: The introduction of the computer into business raises new problems. Of which of those new problems is the use of viruses, worms, and spam? A. Computer crime B. Computers and corporate responsibility C. Computers and privacy D. The changing nature of work

Q: Emerging issues have all of the following characteristics except A.the terms of the debate are not clearly defined. B.the issue deals with matters of conflicting values and interests. C.trade-offs are not yet needed. D.the issue does not lend itself to resolution by expert knowledge.

Q: The use of software introduces__________ that concern many executives.

Q: Which of the following is true about the right to privacy with relation to the Internet? A. The right to privacy is ethically covered, but not legally. B. The right to privacy is legally covered, but not ethically. C. The right to privacy is neither ethically nor legally covered. D. The right to privacy is both legally and ethically covered.

Q: __________ is an important technique used to develop ISO 9001-compliant quality systems.a. DO-178B/EUROCCAE ED-128b. N-version programmingc. Failure mode and effects analysis (FMEA)d. Capability Maturity Model Integration (CMMI)

Q: Once an issue becomes public and subject to debate and media exposure, it becomes more difficult to A.resolve. B.hide. C.identify. D.define.

Q: Accessing pornographic sites while at work can constitute sexual harassment for which of the following reasons? A. It can be offensive to coworkers. B. It can take too much time away from work activities. C. It can produce a sexually hostile environment. D. It can suggest a quid pro quo to coworkers.

Q: Any defect in__________ software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees.

Q: One of the benefits of the portfolio approach is that it helps A.identify issues. B.prioritize issues. C.resolve issues. D.spread authority among managers to deal with issues.

Q: To which of the following is email legally comparable? A. regular mail B. telephone use C. certified mail D. none of these

Q: __________ are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output.a. Management information systemsb. Decision support systemsc. Business information systemsd. Data information systems

Q: The approach to issues management in which each issue is viewed as separate from all others is the A.conventional approach. B.strategic management approach. C.portfolio approach. D.changing mix approach.

Q: Which of the following is an example of screening information that is provided for one purpose to see if new useful information can be derived about customers? A. Data mining B. Hacking C. Cracking D. Monitoring

Q: The__________ of software, its usability, and its timely development are critical to almost everything businesses do.

Q: The most dramatic growth in importance of issues has been in ____ issues. A.financial B.social, ethical, and political C.practical D.military

Q: Which of the following is not an instance of privileged communication? A. patient-doctor confidentiality B. teacher-student confidentiality C. priest-penitent confidentiality D. lawyer-client confidentiality

Q: Products, such as statements of requirements, flowcharts, and user documentation, are known as__________. a. project systemsb. information systemsc. objectsd. deliverables

Q: Which of the following issues has always been part of the business process? A.legislative B.ecological C.financial D.social welfare

Q: Which of the following is a problem with considering pharmaceuticals to be analogous to machines and software, with respect to patents? A. Pharmaceuticals tend to require much greater costs to develop than machines and software. B. Pharmaceuticals are easy to produce, once the drug is developed. C. Pharmaceuticals can be expensive to produce. D. Pharmaceuticals are fairly easy to reproduce.

Q: Microsoft's third major variation of its operating system is__________ .

Q: Which of the following is not a feature that distinguishes the conventional approach to issues management from the strategic management approach? A.how broadly issues are defined B.whether the function stands alone or is integrated with other functions C.who within the firm implements the system D.at what level of the firm issues identification takes place

Q: In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the__________ maturity level.a. quantitatively managedb. managedc. definedd. initial

Q: What of the following is an example of reverse engineering? A. Searching patents and developing a product that navigates between the already outstanding patents. B. Taking a particular product and, through analysis, deriving the formula for that product. C. Preparing a product from scratch that looks and feels like another popular product. D. Copying and distributing copyrighted material.

Q: The principal distinction between the conventional and strategic management approaches to issues management is A.how broadly the idea of issues in conceived to be. B.how broadly responsibility for issues management is spread. C.how broadly the firm defines who its stakeholders are. D.how many issues are being managed at one time.

Q: The__________standard serves many industries and organizations as a guide to quality products, services, and management. a. ISO 7498-4 b. ISO 9595/DAM 1 c. ISO 9596 d. ISO 9001

Q: Which of the following is not covered by the doctrine of fair use? A. Copying chapters of books B. Copying computer programs C. Copying television programs for later viewing D. Copying newspaper articles for class

Q: Which of the following is not a characteristic of the strategic management approach to issues management? A.Issues management is the responsibility of senior management. B.Issues identification is more important than in more narrowly focused approaches. C.Issues management helps anticipate and manage internal and external challenges. D.Issues management is narrowly focused on public policy issues.

Q: Which of the following is true of the International Organization for Standardization?a. It is an American organization founded in 2001. b. The ISO 9000:2007 provides a set of standardized requirements for a quality management system. c. It issued the 9000 series of business standards in 1987.d. It is a worldwide federation of national standards bodies from 161 countries.

Q: Which of the following is not covered by the doctrine of fair use? A. Scholarly criticism and scholarship B. Research C. News reporting D. Using copies instead of assigning a text

Q: The strategic management approach to issues management takes a ____ view of the process. A.narrow B.broad C.futuristic D.historical

Q: In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as__________. a. $5000 b. $7000 c. $2500 d. $9500

Q: What can ethical reflection tell us about the proper length of a copyright period? A. No particular length is justified. B. The period should vary with the quality of the work. C. Some length or other is justified and an indefinitely long period is too long. D. Whatever legal definition of the period's length is appropriate.

Q: The conventional approach to issues management includes all of the following characteristics except A.issues originate in social, political, regulatory, or judicial environments. B.issues fall in the domain of public affairs management. C.an issue is any trend or event that might affect the company. D.issues are legitimate and urgent stakeholder concerns.

Q: From an ethical perspective, which is the proper response with regards to the length of a copyright? A. Ethics cannot provide a specific period. B. The longer contemporary period is better than the shorter historical period. C. The shorter historical period is better than the longer contemporary period. D. Both the shorter historical period and the longer contemporary period are best for their time periods

Q: __________ is common in airplane and spacecraft control systems. a. Structured programming b. Triple version programming c. Object programming d. Root programming

Q: Which of the following is not an element of the issues management process? A.issues identification B.prioritizing issues C.eliminating issues D.monitoring results of responses to issues

Q: Which of the following is an example of intellectual property? A. Land, buildings, and additions on the land. B. Money, stocks, bonds, financial securities. C. Expressions of ideas, inventions, discoveries. D. Some physical item that we can touch, though not usually land and buildings.

Q: The ultimate objective of issues and crisis management is A.prevention of harm to the firm. B.avoidance of crises. C.to increase the organization's social responsiveness to stakeholders. D.understanding of stakeholders' interests.

Q: A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in __________ for file servers. a. high-volume data storage b. low-volume data storage c. unpredictable-volume data storage d. irregular-volume data storage

Q: Which of the following is an example of real property? A. Land, buildings, and additions on the land. B. Money, stocks, bonds, financial securities. C. Expressions of ideas, inventions, discoveries. D. Some physical item that we can touch, though not usually land and buildings.

Q: The issues management process and crisis management process are both focused on A.improving stakeholder management. B.improving sustainability. C.improving financial performance. D.improving management development.

Q: N-version programming is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements__________ times, where N could be 2, 3, 4, or more. a. N+1 b. N c. N+2 d. N+3

Q: In a crisis, the first communication should be with internal stakeholders.

Q: Which of the following is an example of intangible property? A. Land, buildings, and additions on the land. B. Money, stocks, bonds, financial securities. C. Expressions of ideas, inventions, discoveries. D. Some physical item that we can touch, though not usually land and buildings.

Q: __________ is the probability of an undesirable event occurring times the probability that the event would go undetected times the magnitude of the event's consequences if it does happen. a. Risk b. Redundancy c. Liability d. Certainty

Q: The safety engineer uses a logging and monitoring system to track__________ from a project's start to its finish. a. standards b. objectives c. hazards d. deliverables

Q: The most effective form of communication during a crisis is one that is reactive.

Q: Which of the following is an example of tangible property? A. Land, buildings, and additions on the land. B. Money, stocks, bonds, financial securities. C. Expressions of ideas, inventions, discoveries. D. Some physical item that we can touch, though not usually land and buildings.

Q: From a managerial point of view, a crisis is common in business.

Q: Which of the following can be derived from the right to work? A. The right to be free of sexual harassment B. The employment-at-will principle C. The right to employment D. The right to self-determine

Q: In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is__________ . a. 8 b. 7 c. 9 d. 1

Q: After an organization decides to adopt__________ , it must conduct an assessment of its software development practices to determine where they fit in the capability model. a. QA b. software development methodology c. software quality management d. CMMI-DEV

Q: A crisis is an extreme event that may threaten your very existence.

Q: Which of the following is an individual right of the "right to work"? A. Each person has a claim against his society to have the opportunity to work. B. Each person has the right to pursue work and should not be prevented by others from doing so. C. Work is important for the social dimension that it communicates. D. The person has a right to develop and express himself through productive labor.

Q: After successful unit testing, the subsystems are combined to test the entire system as a complete entity using __________ . a. system testing b. black-box testing c. integration testing d. static testing

Q: Which of the following is a positive right of the "right to work"? A. Each person has a claim against his society to have the opportunity to work. B. Each person has the right to pursue work and should not be prevented by others from doing so. C. Work is important for the social dimension that it communicates. D. The person has a right to develop and express himself through productive labor.

Q: The concept of crisis management is relatively new, arising out of the crises of the past two decades.

Q: __________ involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. a. Integration testing b. Black-box testing c. User acceptance testing d. Static testing

Q: Issues management can be viewed as a type of pre-crisis planning and post-crisis management.

Q: Which of the following is a negative or liberty right of the "right to work"? A. Each person has a claim against his society to have the opportunity to work. B. Each person has the right to pursue work and should not be prevented by others from doing so. C. Work is important for the social dimension that it communicates. D. The person has a right to develop and express himself through productive labor.

Q: One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process called__________. a. dynamic testing b. user acceptance testing c. integration testing d. static testing

Q: The minimal ethical obligation of employers is to respect the human rights of their workers, and in the case of migrant labor, this means to abide by the rules of which of the following? A. The UN Declaration on Human Rights B. The Migrant and Seasonal Agricultural Work Protection Act C. The International Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families D. The Illegal Immigration Act

Q: In most companies, issues management is done in isolation from other departments.

Q: __________ refers to methods within the development cycle that guarantee reliable operation of the product. a. Software quality assurance b. Software development methodology c. Software documentation d. Software project management

1 2 3 … 215 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved