SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Social And Ethical Issues
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 35 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. As an instrument of __ - information technology improves reliability - accuracy - and speed of systems - but it can also be used to manipulate people.
Authenticity
Control
Authentication
Policies
2. Example: A national policy on information technology security would need to define what constitutes unlawful access to networks and how to treat transgression.
Intellectual property
Cultural diversity
People and machines
Policies
3. Refers to the establishment of the user's identity beyond reasonable doubt.
Authenticity
Privacy
Intellectual property
Reliability
4. Example: Medical records that become dissociated from the patient they refer to are considered ___.
Policies
Standards
Authentication
Reliability
5. Enforceable measures intended to promote appropriate use - often developed by governments - businesses - and private groups or individuals.
Equality of access
Authenticity
Policies
Equality of access
6. The diminishing importance of geographical - political - economic - and cultural boundaries - often caused by information technology.
Cultural diversity
Reliability
Reliability
Globalization
7. Example: communication protocols used on the internet - the ASCII representation for characters - or the design of the printer port on a personal computer are all governed by standards.
Privacy
Globalization
Integrity
Standards
8. A complex example of __ is the use of encrypted digital signatures in a business transaction.
Authentication
Integrity
Integrity
Policies
9. Example: __ affect the exchange of information by making it subject to copyright laws.
Security
Globalization
Reliability
Policies
10. Example: White telelearning brings previously unavailable opportunities to everyone's doorstep - the cost of hardware - software - or course fees might place the learning beyond the reach of the average person.
Reliability
Control
Equality of access
Intellectual property
11. Refers to the protection of hardware - software - machines - and networks from unauthorized access - alteration - or destruction.
Intellectual property
Equality of access
Security
Privacy and anonymity
12. Example: discussion of a delicate subject might require __ - or at least __. However - the extreme could also conceal the perpetrators of criminal - terrorist - or computer hacking acts.
Authenticity
Privacy and anonymity
Policies
Anonymity
13. Social or technical and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components.
Authentication
Integrity
Standards
Intellectual property
14. The new global village provides a worldwide cultural awareness - but may also lead to less diversity.
Standards
Cultural diversity
Privacy and anonymity
Security
15. Example: Employer surveillance of employees represents a new kind of __ imposed on people.
Authenticity
Policies
Control
Reliability
16. __ is legally protected by copyrights - trademarks - and patents - but easy and accurate duplication methods made available by information technology can undermine such protections. However - the same methods can create opportunities for inexpensive
Policies
Intellectual property
Reliability
Privacy and anonymity
17. Includes ideas - discoveries - writings - works of art - software - collections and presentations of data.
Integrity
Equality of access
Intellectual property
People and machines
18. The extreme form of privacy; Might be called for in some use but is dangerous in others
Anonymity
Cultural diversity
Standards
Policies
19. The __ of machines - software - and data determines our confidence in their value.
Authentication
Globalization
Privacy and anonymity
Reliability
20. Data lacks __ when it has been changed accidentally or tampered with.
Authentication
Integrity
Cultural diversity
Reliability
21. Example: An automatic aircraft landing system provides an example of increased reliability resulting from IT __.
Standards
Control
Reliability
Privacy
22. Measures include restricted access to machines and networks and encryption of information
Security
Policies
Intellectual property
Anonymity
23. __ of the user is crucial in many situations - particularly in business and legal matters.
Reliability
Policies
Authentication
Reliability
24. Definition: Information technology has the potential to offer universal access to information - regardless of distance - age - race - gender or other personal characteristics. However - the above characteristics - and cost - can also bar individuals
Security
Privacy
Equality of access
Anonymity
25. The degree of __ of information systems determines society's confidence in the information contained in the systems.
Globalization
Control
People and machines
Security
26. Consist of rules governing access to - or use of - information - hardware - and software.
Security
Privacy and anonymity
Policies
Intellectual property
27. The operation of hardware - the design of software - the accuracy of data or the correspondence of data with the real world. Data is not as useful if entered incorrectly or if it becomes outdated.
Policies
Intellectual property
Standards
Reliability
28. Refers to the correspondence of data with itself at its creation.
Standards
Integrity
Control
People and machines
29. Example: Any dramatic event anywhere in the world can be broadcast almost instantly by television or on the internet. However - it is feared that easier communication can lead to cultural homogeneity.
Policies
Integrity
Globalization
Equality of access
30. The interaction of humans with information technology hardware raises all the issues encountered in the social and ethical issues section - as well as additional ones
Integrity
Policies
People and machines
Authentication
31. __ can promote or restrict access - modify behavior or require the fulfillment of certain conditions prior to or during use.
Security
Security
Privacy and anonymity
Policies
32. A simple example of __ is user login onto a network.
Authentication
Anonymity
Policies
Intellectual property
33. The ability of individuals and groups to determine for themselves when - how - and to what extent the information about themselves is shared with others.
Security
Authentication
Privacy
Globalization
34. Example: A hacker might change drivers' license data - resulting in the arrests of innocent people.
People and machines
Integrity
Authentication
Control
35. Govern the design and use of hardware - software - and information.
Standards
Control
Intellectual property
Security