BUY HERE: IFSM 201 Quiz 4 (UMUC) – Homeworkmade
IFSM 201 Quiz 4 (UMUC)
Question 1
Points: 10 out of 10
Jason has a part time job in the office of a construction company and is also a student at a community college. He often works on his homework during times when he is not busy at work because the office computer contains the software he needs to do his assignments and he hasn’t been able to afford to purchase the software for his own personal computer. Which of these unacceptable uses typically included in a user access policy is he most likely engaging in?
1. Using the network to download software for personal use
2. Disclosing personal information about employees
3. Copying of copyrighted material
4. Using a network account for a purpose not specified by the owner’s job description
Question 2
Points: 10 out of 10
For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: Nora charges her personal cell phone in her cubicle at work.
1. Likely a violation
2. Likely not a violation
Question 3
Points: 0 out of 10
You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?
1. The professional association code of ethics
2. The code of conduct
3. The user access agreement
Question 4
Points: 10 out of 10
What does the Digital Millennium Copyright Act do?
1. Ensures that internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites
2. Allows copying or distribution of copies of copyrighted software
3. Provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software
4. Addresses only copyrighted software issues
Question 5
Points: 10 out of 10
True or false? Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses.
1. True
2. False
Question 6
Points: 0 out of 10
True or false? Although adults can be victims of cyberbullying, the term is most often referred to as online harassment directed toward minors.
1. True
2. False
No comments:
Post a Comment