Filters
Question type

Study Flashcards

_____ can record information that has been typed into a computer using a keyboard even after the information has been deleted.

Correct Answer

verifed

verified

According to Adam Moore,the distinction between the two types of consent to employee-monitoring-thin and thick-is created by _____.


A) the state of the job market
B) cybersquatting
C) the organization's structure
D) wiretapping

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

_____ can be employed to capture every key pressed on a computer keyboard.

Correct Answer

verifed

verified

One of the ways in which multinational corporations lower their expenses is by shipping work to countries with lower labor costs.

A) True
B) False

Correct Answer

verifed

verified

Advances in technology make it harder for employers to assign employees work outside the workplace.

A) True
B) False

Correct Answer

verifed

verified

According to the legal concept of cyberliability,employers can be held liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.

A) True
B) False

Correct Answer

verifed

verified

_____ is a legal concept that means a party may be held responsible for injury or damage even when he or she was not actively involved in an incident.


A) Thin consent
B) Vicarious liability
C) Ratability
D) Thick consent

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a benefit of telecommuting?


A) Employers find it easy to keep track of the number of hours employees put into a project.
B) Employees cannot be contacted by employers after a company's work hours.
C) Employers cannot request employees to work after a company's work hours.
D) Employees have the flexibility of taking care of their personal needs during work hours.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is true of technological advances over the last two decades?


A) They have not changed the work environment.
B) They have increased employees' accessibility.
C) They have raised no new ethical issues.
D) They have limited the mobility of employees.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is true of the technology used to monitor employees at the workplace?


A) Keystroke loggers can track employees' location while they move through the workplace.
B) Packet-sniffing software can intercept and archive all communications on a network.
C) Cybersquatting software can automatically monitor breaks between receiving calls.
D) "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Keystroke loggers can only capture information that is not deleted.

A) True
B) False

Correct Answer

verifed

verified

The legal concept of _____ holds employers liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.


A) cyberliability
B) cybersquatting
C) hyper-networking
D) virtual-mirroring

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Information,once digitized,cannot be sent over a fiber-optic cable.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is true of keystroke loggers?


A) They can record typed-in information even if it is deleted.
B) They can videotape employees in public areas.
C) They can analyze and archive calls made on personal phones.
D) They can track the movement of employees in the workplace.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following explains why employers are in favor of monitoring and restricting the actions of their employees?


A) The implications of vicarious liability for employers
B) The federal restrictions placed upon wiretapping
C) The reluctance of employees to give thick consent
D) The federal restrictions placed on cybersquatting

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The implications of vicarious liability are that the party charged is responsible for the actions of his or her _____.

Correct Answer

verifed

verified

Which of the following is true of parties charged with vicarious liability?


A) They are held responsible for the actions of their subordinates.
B) They are seldom in supervisory or managerial roles.
C) They only comprise the individuals directly responsible for the damage.
D) They only comprise individuals who were the recipients of the damage.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Under federal law,video surveillance is legal only if:


A) the camera focuses on publicly accessible areas.
B) the camera is placed in employee rest areas.
C) the cameras aren't focused on customers.
D) the cameras aren't focused on employees.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Telecommuting allows employees a certain degree of flexibility in terms of their work hours.

A) True
B) False

Correct Answer

verifed

verified

Copying and distributing unpaid-for proprietary software is not a violation of computer ethics.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 100

Related Exams

Show Answer