Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Human Resource » Page 436

Human Resource

Q: (p. 326) In 2005, the Securities and Exchange Commission approved new rules that for the first time required companies to include the cost of stock options in their earnings.

Q: (p. 298 - 299) How is the corporate Chief Information Officer a "coach" for the organization?

Q: (p. 319) In the mid- to late-1990s the stock market was a: A. Bull market. B. Market in which share prices fell overall. C. Bear market. D. None of the above.

Q: (p. 296 - 298) What have businesses done to address the number, severity, and ease of hacker attacks on firms?

Q: (p. 325) Stock options represent the right to buy a company's stock at a set price for a certain period.

Q: (p. 324) The Organization for Economic Cooperation and Development (OECD), representing 30 nations, issued a revised set of principles of corporate governance in 2004 to serve as a benchmark for companies and policymakers worldwide.

Q: (p. 295 - 296) It is critical for businesses to maintain information in a secure location and guard this valuable resource. How secure is information in a free-access information society. Are digital certificates or other detection systems sufficient to protect information from hackers?

Q: (p. 293 - 295) Discuss the steps businesses and governments have taken to better protect stakeholder privacy.

Q: (p. 323) Eighty-four percent of large company boards now have an independent lead director, a sharp decrease in the past decade.

Q: (p. 309) The safety of genetically modified foods: A. Was challenged most noticeable in Europe but has spread to other countries. B. Has been well documented since its beginning. C. Is now in the hands of governments, ensuring its safety for human consumption. D. Has never been questioned in the United States.

Q: (p. 322) It is the responsibility of the board of directors and its audit committee to engage an independent accounting firm to audit the financial statements prepared by management.

Q: (p. 309) The global tone toward genetically modified food was one of: A. Caution but progress was evitable. B. Pursuing the lucrative economic opportunities. C. Seek government approval of all products. D. Extreme caution.

Q: (p. 320) A corporation's stockholders have a right to inspect the company's books for any reason.

Q: (p. 319) Investors always choose to invest in the stock of companies that pay high dividends.

Q: (p. 309) Project BioShield was: A. A $5.6 million global antiterrorism program. B. A two-year government program to develop vaccines to combat bioterrorism. C. Announced by President Bush in 2003 to spur pharmaceutical companies to combat bioterrorism. D. All of the above.

Q: (p. 318) Since the 1960s, there has been phenomenal growth in the numbers of institutional investors in the United States.

Q: (p. 308) In 2005, the United Nations approved a declaration that: A. Prohibited all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life." B. Called for the fate of therapeutic cloning to be determined by the individual nations. C. Encouraged all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life." D. Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.

Q: (p. 317 - 318) The three types of stockholders that own shares of stock in U.S. corporations are individuals, institutions, and government.

Q: (p. 298) Primarily, the CIO is expected to: A. Increase costs through efficiency and productivity. B. Reduce the company's competitive advantage. C. Enable or drive business innovation. D. Know how the rank-and-file are performing.

Q: (p. 305) The identification of human genes is critical to: A. Early diagnosis of life-threatening diseases. B. New ways to prevent illnesses. C. Development of drug therapies. D. All of the above.

Q: (p. 309 - 311) Who is to say that genetically modified foods are safe for human consumption?

Q: (p. 298) A CIO is the company's: A. Chief intelligence overseer. B. Chief information officer. C. Coordinator of international operations. D. Controller of internal overhead.

Q: (p. 304) According to Bill Joy, Sun Microsystems' chief scientist, the 21st century technologies: A. Are the safest and most human friendly known to civilization. B. Must be controlled by the companies that invest in them to protect society. C. Can be used for good if government and business work together. D. Are so powerful they can spawn whole new classes of accidents and abuses.

Q: Is information on the Internet truly free, or should copyrighted music or software be protected?

Q: (p. 302) This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users: A. Software Business Piracy Act. B. Digital Millennium Copyright Act. C. Intellectual Property Millennium Act. D. Copyright Act of 1998.

Q: (p. 297) Honeypots are: A. A series of Disney-created Web sites for children. B. Adult Web sites offering fee-for-service information. C. Government programs that profile computer hackers. D. Systems used to lure hackers into a fabricated Web site.

Q: (p. 297) The Federal Trade Commission advocates which of the following for business security? A. Take stock. B. Scale down. C. Pitch it. D. All of the above.

Q: (p. 301) One of the most common protocols for sharing large files and enabling movies to be downloaded safely is: A. GigaByte Violations. B. PropertyAlliance, Inc. C. BitTorrent. D. Business Software Alliance.

Q: (p. 297) In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database: A. Harvard. B. Dartmouth. C. Princeton. D. None of the above.

Q: A. Created congestion and overloaded demands on the servers. B. Denied legitimate compensation to the recording artists. C. Favored major recording companies and selective artists over others. D. Resulted in bankruptcy for retail music outlets across the country.

Q: (p. 296) The corporate nemesis responsible for creating and spreading computer attacks is called a: A. Google. B. Zombie. C. Computer hacker. D. Platform.

Q: (p. 301) Two of the largest strongholds for software piracy are: A. India and China. B. Japan and India. C. China and South Africa. D. South Africa and India.

Q: (p. 301) Loss of annual sales due to software piracy by software companies was estimated to be: A. $120 million. B. $25 billion. C. $53 billion. D. Impossible to calculate.

Q: (p. 296) Spraying random packets of data in huge streams over the Internet are: A. Botnets. B. Worms. C. Zombies. D. Hackers.

Q: (p. 301) Intellectual property refers to:A. Protecting one's ideas, concepts, and symbolic creations.B. Special laws protecting copyrights, patents, and trademarks.C. Prohibiting the downloading of commercial software or videogames.D. All of the above.

Q: (p. 296) A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a: A. Hacker. B. Zombie. C. Worm. D. Ghost.

Q: (p. 300) The Child Online Protection Act, passed in 1998, A. Specifically applies to children under 13 years of age. B. Has settled the debate over protecting children from adult-oriented Web sites. C. Has been a model for many European countries' legislation. D. Was vetoed by President Bush as too difficult and too costly to enforce.

Q: (p. 295) In a 2007 survey of more than 800 North American privacy and security professionals, what percentage acknowledged having at least one reportable data breach of personally identifiable information with their organizations during the past 12 months? A. 25 percent. B. 40 percent. C. 85 percent. D. 99 percent.

Q: (p. 295) The Children's Online Privacy Protection Act of 1998 requires: A. Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13. B. Web site operators to post user privacy laws. C. Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States. D. All of the above.

Q: (p. 300) Which of the following is not commercial software to block pornography on the Internet? A. Child Safe. B. beTrusted. C. Cyber Snoop. D. Cyber Sitter.

Q: (p. 300) GetNetWise, launched by several major Internet companies, provided: A. Online safety guides for parents. B. Special browsers and other tools for families. C. Web sites appropriate for children. D. All of the above.

Q: (p. 295) Children are the least vulnerable to invasions of privacy.

Q: (p. 294) In 2002, this allowed Web sites to tell the user's Web browser about the site's data privacy policies: A. Platform for Privacy Preference Project. B. Electronic Privacy Information Center. C. Defense to Protect Information. D. Consumer Information Act.

Q: (p. 298) At Cisco Systems, the CIO: A. Was credited with slashing $1.5 billion in costs by using Internet technologies. B. Was responsible for moving $5 billion in goods and services through the Internet. C. Discovered that online trading cost only 20 percent as much as conventional trading. D. Was fired for failing to stop computer hackers from breaking into their systems.

Q: (p. 294) Advocacy groups such as the Electronic Privacy Information Center criticized the P3P concept as too difficult for users to understand or use properly.

Q: (p. 294) In a 2008 survey from Columbia University, what percentage of American adults said they were uncomfortable when Web sites used personal information to tailor advertisements? A. 20 percent. B. 59 percent. C. 70 percent D. 89 percent.

Q: (p. 293) By the end of 2008, the number of attacks on information security reached: A. 200,000. B. 2 million. C. 20 million. D. 200 million.

Q: (p. 294) Many experts have raised ethical questions about the ways RFID technology enables businesses, governments, and criminals to gather information about presale, sales, and post-sale activities.

Q: (p. 294) Radio Frequency Identification (RFID) was featured in a TV commercial where "the packages knew the truck was lost" before the driver did.

Q: (p. 293) In response to employees' challenges that business practices were invasions of their privacy, many businesses: A. Developed a privacy policy. B. Banned sexual harassment. C. Installed an 800-number. D. Fired the disgruntled workers.

Q: (p. 293) Recent technological advances have decreased the number of way that privacy violations may occur.

Q: (p. 310) Most genetically modified corn grown in the United States is made into animal feed or ethanol.

Q: (p. 305) The human genome is the application of engineering to create materials on a molecular or atomic scale.

Q: (p. 293) Due to efforts by companies to help consumers feel more secure about their personal information, consumer mistrust has diminished.

Q: (p. 293) Most Americans mistakenly believe that if a Web site has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.

Q: (p. 304) Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.

Q: (p. 301) Software piracy is a spreading and global problem.

Q: (p. 293) Many businesses have developed a privacy policy, which explains what use of the company's technology is permissible.

Q: (p. 285 - 287) Discuss the issue of digital divide. Is it lessening or widening with more technological innovation? How have businesses, government bodies, and nonprofit organizations met the digital divide challenge?

Q: (p. 298) The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.

Q: (p. 297) Honeypots are systems used by security professionals to prevent hackers from entering a computer network.

Q: (p. 284 - 285) Since surfing the Internet for medical information is widespread, how can the quality of information provided online be verified as accurate or reliable?

Q: (p. 284) A group of people who leap to the most dreadful conclusions while researching health matters online are called: A. Hypochondriac. B. Cyberchondriacs. C. Hyperchondriac. D. Internchondriac.

Q: (p. 295) GetNetWise and the Child Online Protection Act of 1998 protect children in the United States against adult-oriented Web sites.

Q: (p. 283) In 2006, the largest for-profit online education provider was: A. Apollo Group. B. Career Education Corporation. C. University of Phoenix. D. Hooked on Phonics.

Q: (p. 277 - 280) What is social networking? What are the ethical challenges faced by some of the more popular social networking sites?

Q: (p. 283) By 2008, the ratio of computers to students in the United States was: A. One to ten. B. One to five. C. One to two. D. One to one.

Q: (p. 275 - 276) Should all businesses venture into e-commerce, or is it better for only certain types of businesses?

Q: (p. 271 - 272) Discuss what factors have fueled technological growth and development.

Q: (p. 282) A hacking technique that redirects a user's computer from a legitimate Web site to another site by altering the user's computer or router is called: A. Phishing. B. Pharming. C. Tweeting. D. Censorship.

Q: (p. 271 - 271) Describe the activities and primary skills used in each of the six periods of technology development.

Q: (p. 281) The practice of duping computer users into revealing their passwords or other private data under false pretences is called: A. Phishing. B. Pharming. C. Tweeting. D. Censorship.

Q: (p. 269 - 270) Define technology and describe its three primary features.

Q: (p. 281) Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones? A. United States. B. Japan. C. United Kingdom. D. Germany.

Q: (p. 280) Another name for unsolicited commercial emails is: A. Spam. B. Junk e-mail. C. UCE. D. All of the above.

Q: (p. 287) The unmistakable economic and social force of technology is evident in A. Every part of the world. B. Every industry. C. Every aspect of our lives. D. All of the above.

Q: (p. 280) Laughpractice.blogspot.com is an example of a(n): A. Blog. B. Vlog. C. Spam. D. iTune.

Q: (p. 286) The United Nations' Human Settlements Program forecast that by the year 2020 what percent of the world's population would live in poverty? A. 25 percent. B. 35 percent. C. 45 percent. D. 55 percent.

Q: (p. 286) A program designed to build, and market ultralightweight, durable netbook computers for children aged 6 through 12 throughout the world is called: A. Computers without Boarders. B. One Laptop per Child. C. No Child Left Behind. D. Computers for Kids.

Q: (p. 279) A social network available only to IBM employees on the company's intranet is called: A. The hut. B. Beekeeper. C. Beehive. D. Hat and glove.

1 2 3 … 819 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved