SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Social And Ethical Issues
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 35 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Example: Employer surveillance of employees represents a new kind of __ imposed on people.
Intellectual property
Policies
Control
Policies
2. Definition: Information technology has the potential to offer universal access to information - regardless of distance - age - race - gender or other personal characteristics. However - the above characteristics - and cost - can also bar individuals
Equality of access
Authentication
Intellectual property
People and machines
3. The operation of hardware - the design of software - the accuracy of data or the correspondence of data with the real world. Data is not as useful if entered incorrectly or if it becomes outdated.
Policies
Integrity
People and machines
Reliability
4. Example: Medical records that become dissociated from the patient they refer to are considered ___.
Reliability
Policies
Policies
Authentication
5. The interaction of humans with information technology hardware raises all the issues encountered in the social and ethical issues section - as well as additional ones
People and machines
Cultural diversity
Equality of access
Privacy
6. Example: White telelearning brings previously unavailable opportunities to everyone's doorstep - the cost of hardware - software - or course fees might place the learning beyond the reach of the average person.
People and machines
Authentication
Standards
Equality of access
7. __ can promote or restrict access - modify behavior or require the fulfillment of certain conditions prior to or during use.
Anonymity
Control
Policies
Intellectual property
8. The __ of machines - software - and data determines our confidence in their value.
Authentication
Equality of access
Reliability
Control
9. Example: A hacker might change drivers' license data - resulting in the arrests of innocent people.
Security
Integrity
Anonymity
Policies
10. Social or technical and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components.
Control
Control
Standards
Anonymity
11. Includes ideas - discoveries - writings - works of art - software - collections and presentations of data.
Authentication
Intellectual property
Standards
Standards
12. Enforceable measures intended to promote appropriate use - often developed by governments - businesses - and private groups or individuals.
Security
Policies
Reliability
Authentication
13. The new global village provides a worldwide cultural awareness - but may also lead to less diversity.
Cultural diversity
Intellectual property
Integrity
Policies
14. As an instrument of __ - information technology improves reliability - accuracy - and speed of systems - but it can also be used to manipulate people.
Privacy and anonymity
Control
Globalization
Standards
15. __ is legally protected by copyrights - trademarks - and patents - but easy and accurate duplication methods made available by information technology can undermine such protections. However - the same methods can create opportunities for inexpensive
Intellectual property
Policies
Standards
Policies
16. Data lacks __ when it has been changed accidentally or tampered with.
Integrity
Policies
Intellectual property
Privacy and anonymity
17. Example: Any dramatic event anywhere in the world can be broadcast almost instantly by television or on the internet. However - it is feared that easier communication can lead to cultural homogeneity.
Authenticity
Authentication
Policies
Globalization
18. Example: An automatic aircraft landing system provides an example of increased reliability resulting from IT __.
Control
Policies
Standards
Security
19. The degree of __ of information systems determines society's confidence in the information contained in the systems.
Control
Integrity
Security
People and machines
20. Example: __ affect the exchange of information by making it subject to copyright laws.
Equality of access
Standards
Equality of access
Policies
21. Consist of rules governing access to - or use of - information - hardware - and software.
Globalization
Authentication
Intellectual property
Policies
22. A simple example of __ is user login onto a network.
Control
Authenticity
Policies
Authentication
23. Refers to the correspondence of data with itself at its creation.
Cultural diversity
Privacy and anonymity
Equality of access
Integrity
24. Example: communication protocols used on the internet - the ASCII representation for characters - or the design of the printer port on a personal computer are all governed by standards.
Security
Standards
Reliability
Equality of access
25. Govern the design and use of hardware - software - and information.
People and machines
Standards
Policies
Control
26. Refers to the establishment of the user's identity beyond reasonable doubt.
Intellectual property
Intellectual property
Control
Authenticity
27. Example: A national policy on information technology security would need to define what constitutes unlawful access to networks and how to treat transgression.
Standards
Reliability
Globalization
Policies
28. Measures include restricted access to machines and networks and encryption of information
Authentication
People and machines
Reliability
Security
29. The ability of individuals and groups to determine for themselves when - how - and to what extent the information about themselves is shared with others.
Privacy
Integrity
Control
Privacy and anonymity
30. Example: discussion of a delicate subject might require __ - or at least __. However - the extreme could also conceal the perpetrators of criminal - terrorist - or computer hacking acts.
Privacy and anonymity
Security
Equality of access
Equality of access
31. The extreme form of privacy; Might be called for in some use but is dangerous in others
Anonymity
Policies
Privacy
Authentication
32. The diminishing importance of geographical - political - economic - and cultural boundaries - often caused by information technology.
Globalization
Control
Authentication
Authenticity
33. Refers to the protection of hardware - software - machines - and networks from unauthorized access - alteration - or destruction.
Control
Policies
Authentication
Security
34. __ of the user is crucial in many situations - particularly in business and legal matters.
Policies
Authentication
Standards
Globalization
35. A complex example of __ is the use of encrypted digital signatures in a business transaction.
Authentication
Policies
Privacy
Security
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests