Ethical, Security and Regulations in IS

Ethical, Security and Regulations in IS

University

10 Qs

quiz-placeholder

Similar activities

ICTICT418 - Contribute to Copyright Ethics and Privacy in an ICT environment

ICTICT418 - Contribute to Copyright Ethics and Privacy in an ICT environment

University - Professional Development

8 Qs

Lab Activity 6

Lab Activity 6

University

15 Qs

ITF+ Value of Data

ITF+ Value of Data

University

10 Qs

Legal Issues

Legal Issues

University

11 Qs

Web Development

Web Development

University

15 Qs

Chapter 1: Why Worry About Computer Security

Chapter 1: Why Worry About Computer Security

University

7 Qs

Ethics Jan8

Ethics Jan8

6th Grade - Professional Development

10 Qs

gogo yoyong

gogo yoyong

University

10 Qs

Ethical, Security and Regulations in IS

Ethical, Security and Regulations in IS

Assessment

Quiz

Computers

University

Medium

Created by

NORHAFEEZA (POLINILAI)

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ethics describes beliefs concerning right and wrong that can be used by individuals to guide behavior.

CORRECT

WRONG

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Code of conduct A code of conduct is a set of rules outlining the norms, rules, and responsibilities or proper practices of an individual party or an organization.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State the area of computer ethics:

 

Not eating in a computer lab according to the school rules.

Information privacy

code of conduct

intellectual property right

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student search an information for his college's assignment solely from the legit internet source.

Code of Conduct

Information Privacy

Information Accuracy

Intellectual Property

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State the area of computer ethics:

 

A link created in an e mail to request that customers to update their personal details , at the same time revealing their password/financial information.

Information Accessibility

Green Computing

Intellectual Property

Information Privacy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing, Malware, and hacker are the types of ___________ in security threats.

Natural Disaster

Human Actions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kaspersky, Symantec and McAfee are types of quarantine software.

False

True

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?