1.
_______ is a system of rules that tells us what we can and cannot do.
Correct Answer
A. Law
Explanation
Law is a system of rules that governs and regulates the behavior of individuals and societies. It provides a framework that outlines what actions are permissible and those that are not. Laws are enforced by the government and failure to comply with them can result in legal consequences. This distinguishes law from ethics, which are moral principles that guide individual behavior but are not necessarily enforceable by law. Morals, on the other hand, are personal beliefs about what is right and wrong. Policies are guidelines or principles adopted by organizations or institutions to achieve specific goals.
2.
Which of the following is true about why fostering good business ethics is important?
Correct Answer(s)
A. Gaining the goodwill of the community
D. Avoiding unfavorable publicity
Explanation
Fostering good business ethics is important because it helps in gaining the goodwill of the community. When a company operates ethically, it builds a positive reputation and trust among the community members, which can lead to increased customer loyalty and support. Additionally, it also helps in avoiding unfavorable publicity. Unethical practices can damage a company's reputation and lead to negative publicity, which can have long-term consequences for the business. By prioritizing good business ethics, a company can maintain a positive image and avoid potential backlash from the public.
3.
Which of the following is an activity on how companies gain goodwill in society?
Correct Answer(s)
B. Donating computers to public schools
C. Giving scholarship grants to potential students
Explanation
Donating computers to public schools and giving scholarship grants to potential students are activities that contribute to the betterment of society and enhance a company's reputation. These actions demonstrate corporate social responsibility by investing in education and supporting the development of individuals. On the other hand, improper waste disposal and giving jobs to farmers to cut trees for supply can have negative impacts on the environment and society, which would not contribute to gaining goodwill.
4.
Dell was at one time the largest personal manufacturer in the world. But in 2007, a judge found that Dell failed to provide the time-on-site technical support that customers were entitled to, which frustrated customers seeking support through long wait times and frequent transfers. Dell failed to deliver the promise of quality support. Which of the following reasons for fostering good business ethics best describes the story?
Correct Answer
C. Fostering good business practices
Explanation
The story of Dell failing to provide quality support to its customers highlights the importance of fostering good business practices. By failing to deliver on their promise of quality support, Dell not only frustrated its customers but also damaged its reputation. Fostering good business practices involves ensuring that customers' needs are met, providing reliable and consistent services, and upholding ethical standards. This helps to build trust and loyalty among customers and avoids unfavorable publicity, ultimately contributing to the success and sustainability of the organization.
5.
Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest.
Correct Answer
B. False
Explanation
Reporting a trade secret is not an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest. Trade secrets are confidential information that provide a company with a competitive advantage and disclosing them can be illegal and harmful to the company. Therefore, reporting a trade secret would not be considered a way to address unethical or dangerous acts by a company.
6.
What is expected of professionals to act in society?
Correct Answer
D. All of the above
Explanation
Professionals are expected to act in society in a way that causes no harm, provides significant benefits, and establishes and maintains professional standards that protect the public. This means that professionals should not engage in actions that could negatively impact society, but instead should contribute positively by offering valuable services or expertise. Additionally, they have a responsibility to adhere to ethical guidelines and standards that ensure the safety and well-being of the public they serve. Therefore, the correct answer is "all of the above."
7.
A professional is someone who:
Correct Answer
D. All of the above
Explanation
A professional is someone who requires advanced training and experience, as they need to possess specialized knowledge and skills in their field. They must also exercise discretion and judgment in their work, as they often have to make important decisions and solve complex problems. Additionally, professionals typically perform work that cannot be standardized, meaning that it requires individual expertise and tailored approaches. Therefore, the correct answer is "all of the above" as all the given statements accurately describe the characteristics of a professional.
8.
____________ is a process that oneundertakes voluntarily to prove competency is a set of skills.
Correct Answer
B. Certification
Explanation
Certification is a process that one undertakes voluntarily to prove competency in a set of skills. Unlike licensing, which is typically required by law and regulated by a government agency, certification is usually optional and administered by a professional organization or association. Registering, on the other hand, refers to the act of entering one's name or information on an official list or record. Therefore, the correct answer is certification, as it aligns with the voluntary nature of the process described in the question.
9.
Choose the letters the fills the blanks of the following question.
The corporate ethics officer provides the organization with __________ and _________ in the area of business conduct.
Correct Answer(s)
A. Vision
B. Leadership
Explanation
The corporate ethics officer plays a crucial role in providing the organization with guidance and direction in terms of business conduct. They are responsible for setting the vision and goals for ethical behavior within the company, ensuring that all employees understand and adhere to these standards. Additionally, they provide leadership by serving as a role model for ethical behavior and promoting a culture of integrity throughout the organization. Overall, the corporate ethics officer helps to establish trust and respect within the company by ensuring that ethical principles are at the forefront of decision-making and actions.
10.
A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected websites.
Correct Answer
A. True
Explanation
This statement is true because viruses cannot spread on their own. They need a medium to spread, such as infected email attachments, programs, or websites. Without any of these mediums, a virus cannot infect other computers.
11.
_________ forces unwanted and often objectionable materials into e-mail boxes that detracts the ability of internet users to communicate effectively.
Correct Answer
A. Spam
Explanation
Spam refers to the act of sending unsolicited and often irrelevant or objectionable emails to a large number of recipients. This practice hampers the ability of internet users to communicate effectively as it overwhelms their email boxes with unwanted messages, making it difficult to find and prioritize important emails. Therefore, spam fits the description provided in the question and is the correct answer.
12.
A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called _______.
Correct Answer
C. Rootkit
Explanation
A rootkit is a set of programs that allows a hacker to gain unauthorized access to a computer system without the knowledge or consent of the user. It is designed to hide its presence and provide administrative-level access, enabling the hacker to perform malicious activities without being detected. Unlike other options like a Trojan horse, logic bomb, or worm, a rootkit specifically focuses on covertly gaining control over a system and maintaining persistent access.
13.
A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is called cyberterrorism.
Correct Answer
B. False
Explanation
The given statement is false. A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is not called cyberterrorism. Cyberterrorism refers to the use of cyber attacks by individuals or groups to create fear, panic, or disrupt society for political, ideological, or religious reasons. The scenario described in the statement is more aligned with cyber espionage or cybercrime rather than cyberterrorism.
14.
To date, there are no documented cases of cyberterrorism.
Correct Answer
B. False
Explanation
The statement suggests that there have been no recorded instances of cyberterrorism up until now. However, this is not true. There have been several documented cases of cyberterrorism, where individuals or groups have used cyber attacks to cause harm, disruption, or fear for political or ideological reasons. These attacks have targeted various sectors such as government, infrastructure, and financial systems. Therefore, the correct answer is false, as there have indeed been documented cases of cyberterrorism.
15.
The written statement that defines an organization's security requirements, as well as the controls and sanctions used to meet those requirements, is known as ____.
Correct Answer
B. Security policy
Explanation
A security policy is a written statement that defines an organization's security requirements, as well as the controls and sanctions used to meet those requirements. It outlines the guidelines and procedures that need to be followed to ensure the security of an organization's assets, systems, and information. It helps in establishing a framework for managing and mitigating security risks and ensures that everyone within the organization understands their responsibilities in maintaining a secure environment.
16.
A device that works to prevent an attack by blocking viruses, malformed packets and other threats from getting into the company network is called a _______.
Correct Answer
C. Intrusion prevention system
Explanation
An intrusion prevention system is a device that actively works to prevent attacks by blocking viruses, malformed packets, and other threats from entering the company network. Unlike an intrusion detection system, which only detects and alerts about potential attacks, an intrusion prevention system takes proactive measures to stop these threats from infiltrating the network. This helps to ensure the security and integrity of the company's network by actively blocking and mitigating potential attacks.
17.
______________ is the practice of illegally making copies of software of enabling others to access without authority.
Correct Answer
A. Software piracy
Explanation
Software piracy refers to the illegal act of making unauthorized copies of software or enabling others to access software without proper authorization. This can involve activities such as downloading or sharing copyrighted software without permission, cracking or bypassing software licensing protections, or selling counterfeit copies of software. Software piracy is a serious issue that can result in financial losses for software developers and can also lead to security risks for users who unknowingly download compromised or counterfeit software.
18.
___________ provides an organization with vision and leadership in the area of business conduct.
Correct Answer
A. Corporate ethics officer
Explanation
A corporate ethics officer is responsible for providing an organization with vision and leadership in the area of business conduct. They ensure that the organization operates ethically and in compliance with laws and regulations. They develop and implement policies and procedures to promote ethical behavior, conduct training programs, and monitor and enforce ethical standards. By taking on this role, the corporate ethics officer helps to create a culture of integrity and accountability within the organization.
19.
_________ is a set of beliefs about right and wrong behavior within a society.
Correct Answer
B. Ethics
Explanation
Ethics refers to a set of beliefs about right and wrong behavior within a society. It encompasses the principles and values that guide individuals and organizations in making moral decisions and conducting themselves ethically. Ethics helps individuals distinguish between what is morally acceptable and what is not, and it provides a framework for evaluating the consequences and implications of their actions. It is a fundamental aspect of human behavior and plays a crucial role in shaping social norms and promoting a just and fair society.
20.
________ is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
Correct Answer
A. Code of Ethics
Explanation
A Code of Ethics is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making. It serves as a guide for employees and stakeholders to understand the moral standards and conduct expected within the organization. It outlines the organization's commitment to integrity, honesty, fairness, and responsibility in its operations and interactions with others. The Code of Ethics helps establish a strong ethical culture within the organization and provides a framework for ethical decision making in various situations.
21.
_______ refers to the social conventions about right and wrong.
Correct Answer
A. Morality
Explanation
Morality refers to the social conventions about right and wrong. It encompasses the principles and values that guide individuals and societies in determining what is considered morally acceptable behavior. It involves distinguishing between good and bad actions, and making decisions based on ethical standards and the impact on others. Morality is a fundamental aspect of human behavior and plays a crucial role in shaping individual and collective actions.
22.
The policies of our school such as attendance and grades policies are examples of ________.
Correct Answer
A. Laws
Explanation
The policies of our school, such as attendance and grades policies, are examples of laws. Laws are a set of rules and regulations that are enforced by an authority to maintain order and ensure compliance. In the context of a school, these policies are put in place to govern the behavior and performance of students, similar to how laws govern the behavior of citizens in a society.
23.
A person who acts with _______ acts in accordance with a personal code of principles.
Correct Answer
A. Integrity
Explanation
A person who acts with integrity acts in accordance with a personal code of principles. Integrity refers to the quality of being honest, having strong moral principles, and adhering to a set of values. It involves consistently behaving in a trustworthy and ethical manner, regardless of external circumstances or pressures. Acting with integrity means staying true to one's beliefs and values, even when faced with difficult decisions or temptations. It is a reflection of one's character and a fundamental aspect of personal and professional behavior.
24.
In a __________, an organization reviews how well it is meeting its ethical and social responsibility goals and communicates its new goals for the upcoming year.
Correct Answer
A. Social Audit
Explanation
A social audit is a process where an organization assesses its performance in terms of ethical and social responsibility goals. It allows the organization to evaluate its actions and impact on society, identify areas for improvement, and communicate its new goals for the upcoming year. This helps the organization to be accountable to its stakeholders and ensure transparency in its operations.
25.
Which of the following holds true about Ethics Tranining?
Correct Answer
A. It makes employees aware about a company's code of ethics.
Explanation
Ethics training is designed to make employees aware of a company's code of ethics. It helps employees understand the ethical standards and guidelines that they are expected to follow in the workplace. This training aims to promote ethical behavior and integrity among employees, ensuring that they are aware of the company's values and principles. It is an important step in creating a positive work environment and preventing unethical practices.
26.
__________ is responsible for the careful and responsible management of an organization.
Correct Answer
B. Board of Directors
Explanation
The Board of Directors is responsible for the careful and responsible management of an organization. They are a group of individuals elected or appointed to represent the shareholders and make important decisions on behalf of the organization. The board sets the overall strategic direction, monitors the performance of the organization, and ensures that it operates in the best interest of its stakeholders. They also hire and evaluate the CEO and other top executives, ensuring that the organization is led by competent and effective leaders.
27.
Which of the following statements is true about creating an ethical work environment?
Correct Answer
A. It creates a space for employees to work efficiently
Explanation
Creating an ethical work environment is important because it fosters a positive and supportive atmosphere for employees to work efficiently. When employees feel that they are working in an ethical environment, they are more likely to feel valued and motivated, leading to increased productivity and job satisfaction. In such an environment, employees are encouraged to uphold high moral and ethical standards, which promotes teamwork, trust, and respect among colleagues. This ultimately contributes to the overall success and well-being of both the employees and the organization.
28.
____________ is a clear, concise description of the issue that needs to be addressed.
Correct Answer
C. Problem statement
Explanation
The correct answer is problem statement because it is a clear and concise description of the issue that needs to be addressed. A problem statement helps to define the problem and provide a focus for finding a solution. It identifies the gap between the current state and the desired state, allowing organizations to prioritize and allocate resources effectively. By clearly articulating the problem, it becomes easier to develop strategies and action plans to resolve it.
29.
What makes a good problem statement?
Correct Answer
B. It makes people think about the impact of a certain problem
Explanation
A good problem statement is one that prompts individuals to consider the consequences and significance of a specific problem. It encourages critical thinking and analysis, pushing individuals to delve deeper into the issue at hand. By emphasizing the importance of understanding the impact of a problem, a good problem statement can motivate individuals to work towards finding effective solutions.
30.
A ______ is a moral habit that inclines people to do what is considered acceptable.
Correct Answer
A. Virtue
Explanation
A virtue is a moral habit that inclines people to do what is considered acceptable. It is a positive character trait or quality that guides individuals to act morally and ethically. Virtues are seen as desirable and admirable qualities that promote good behavior and contribute to a harmonious society. By possessing virtues, individuals are more likely to make choices that align with accepted moral standards and principles.
31.
_________ means that employees know what is expected of them, and they can employ the organizational values to help them in their decision making.
Correct Answer
C. Consistency
Explanation
Consistency means that employees have a clear understanding of their roles and responsibilities within the organization. They are aware of what is expected of them and can use the organization's values as a guide in their decision-making processes. This ensures that employees are aligned with the organization's goals and can make consistent choices that are in line with its values.
32.
Statements about how people should behave fit together to form the ___________ by which a society lives.
Correct Answer
B. Moral code
Explanation
Ethical standards and moral code both refer to a set of principles or beliefs that guide individual behavior. However, "moral code" specifically emphasizes the social aspect, suggesting that these principles are collectively shared and agreed upon by a society. This term implies a broader and more comprehensive framework of values and norms that shape the way people should behave in order to maintain a harmonious and functioning society. "Rules and regulations" may also play a role in governing behavior, but they are more specific and often enforced by external authorities, whereas a moral code is internalized and upheld by individuals within a society.
33.
Although end-users often get the blame when it comes to using illegal copies of commercial software, software piracy is a corporate setting is sometimes directly traceable to _______.
Correct Answer
C. IT Staff
Explanation
Software piracy in a corporate setting can sometimes be directly traceable to the IT staff. IT staff members have access to the company's software systems and can easily make unauthorized copies or distribute illegal copies of commercial software. They may do this for personal gain or to meet the demands of other employees. It is important for companies to have strict policies and security measures in place to prevent such activities and ensure that software is used legally.
34.
What is the mission of the Business Software Alliance?
Correct Answer
B. Stop the illegal copying of software to its members
Explanation
The mission of the Business Software Alliance is to stop the illegal copying of software to its members. This means that the organization aims to prevent the unauthorized duplication and distribution of software, protecting the rights and intellectual property of software creators and vendors.
35.
The crime of obtaining goods, services or property through deception and trickery is __________.
Correct Answer
C. Fraud
Explanation
The correct answer is "Fraud." Fraud refers to the act of obtaining goods, services, or property through deception and trickery. It involves intentionally deceiving others for personal gain, typically involving financial or material benefits. Fraud can take various forms, such as identity theft, insurance fraud, or credit card fraud. It is considered a criminal offense and is punishable by law.
36.
______________ has been defined as not doing something that a reasonable person would do or something that a reasonable person would not do.
Correct Answer
B. Negligence
Explanation
Negligence refers to the failure to take reasonable care or do something that a reasonable person would do, or doing something that a reasonable person would not do. It implies a lack of responsibility or attention, resulting in harm or damage to others. Negligence can occur in various contexts, such as personal injury cases, medical malpractice, or even in everyday situations where someone's actions or inactions cause harm to others. It is a legal concept that holds individuals accountable for their actions or lack thereof when they fail to meet the standard of care expected of them.
37.
The principles and core values that are essential to the work of a particular occupational group is known as ____________.
Correct Answer
A. Code of ethics
Explanation
A code of ethics refers to the principles and core values that guide the behavior and decision-making of individuals within a specific occupational group. It outlines the moral responsibilities and standards of conduct that members of the group are expected to adhere to in their professional practice. This code serves as a framework for promoting ethical behavior, maintaining professional integrity, and ensuring the well-being of clients or stakeholders. It helps to establish trust and credibility within the profession and provides a basis for resolving ethical dilemmas or conflicts that may arise in the course of work.
38.
A bid was done to select contractors to create a government building in the city. in order to get a favorable stance to win the bid, a participating contractor gave a million peso cash gift to the bidding officers. What form of trickery that the contractor have done?
Correct Answer
B. Bribery
Explanation
The contractor engaged in bribery by giving a million peso cash gift to the bidding officers in order to gain a favorable stance and increase their chances of winning the bid for the government building project. This act of offering a bribe is a form of trickery and unethical behavior, as it involves the exchange of money to influence the decision-making process in one's favor.
39.
The process of generating a number of alternative solutions to a problem.
Correct Answer
A. Brainstorming
Explanation
Brainstorming is a process that involves generating a number of alternative solutions to a problem. It is a technique used to encourage creativity and innovation by allowing individuals or a group to freely express their ideas and suggestions without judgment or criticism. During brainstorming, participants are encouraged to think outside the box and come up with as many ideas as possible, which can then be evaluated and refined to find the best solution to the problem at hand.
40.
___________ makes employees more aware of the company's code of ethics and how to apply it, as well as demonstrates that the company intends to operate in an ethical manner.
Correct Answer
C. Problem definition
Explanation
The correct answer is problem definition. Problem definition is a process that helps employees understand the ethical standards and guidelines set by the company. It also demonstrates the company's commitment to operating in an ethical manner. By defining the problems and challenges faced by the organization, employees become more aware of the code of ethics and how to apply it in their work. This promotes a culture of ethics within the company and ensures that employees understand the importance of ethical behavior in their day-to-day activities.
41.
__________ highlights an organization's key ethical issues and identifies overarching values and principles that are important to the organization and its decision-making process.
Correct Answer
B. Code of ethics
Explanation
A code of ethics is a set of guidelines or principles that outline the moral and ethical standards and behaviors expected from individuals within an organization. It serves as a framework for decision-making and helps identify and address key ethical issues that may arise. By highlighting an organization's key ethical issues and identifying overarching values and principles, a code of ethics plays a crucial role in guiding the organization's decision-making process and ensuring that it operates in an ethical and responsible manner.
42.
After the solution of the problem is implemented, monitor the results to see if the desired effect was achieved. This step in the decision-making process is referred to as _______.
Correct Answer
B. Evaluate Results
Explanation
After implementing the solution to a problem, it is important to monitor the results to determine if the desired effect was achieved. This step in the decision-making process is known as "Evaluate Results." It involves assessing the outcomes of the decision and comparing them to the intended goals or objectives. By evaluating the results, one can determine the effectiveness of the decision and make any necessary adjustments or improvements.
43.
Once the alternative is selected, it should be implemented in an efficient, effective, and timely manner. This step in decision-making process is referred to as ________.
Correct Answer
C. Implement Decision
Explanation
The step in the decision-making process referred to as "Implement Decision" involves putting the chosen alternative into action. It requires executing the decision in a manner that is efficient, effective, and timely. This step is crucial as it ensures that the decision is not only made but also implemented successfully, leading to the desired outcome.
44.
During this stage in decision making, it is ideal to enlist th help of others, including stakeholders to identify several alternatives. This decision making step is known as ________.
Correct Answer
A. Identify Alternatives
Explanation
During the stage of decision making where it is ideal to enlist the help of others, including stakeholders, to identify several alternatives, it is referred to as "Identify Alternatives." This step involves brainstorming and considering different options that could potentially solve the problem or achieve the desired outcome. By involving others, a wider range of perspectives and ideas can be gathered, leading to a more comprehensive list of alternatives to evaluate and choose from.
45.
An attack on an information system that takes advantage of a vulnerability is called an _______.
Correct Answer
C. Exploit
Explanation
An attack on an information system that takes advantage of a vulnerability is called an exploit. Exploits are a type of cyber attack where attackers identify and target weaknesses or vulnerabilities in a system, such as software bugs or misconfigurations, to gain unauthorized access or control over the system. Exploits can be used to steal sensitive information, disrupt system functionality, or launch further attacks. They are often used by hackers to exploit known vulnerabilities in order to infiltrate and compromise computer systems or networks.
46.
A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is __________.
Correct Answer
B. Botnet
Explanation
A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is referred to as a botnet. In a botnet, the computers are infected with malicious software that allows the hackers to control them and use them for various purposes, such as sending spam emails, launching DDoS attacks, or stealing sensitive information. This centralized control gives the hackers significant power and control over the compromised computers, making botnets a serious threat to cybersecurity.
47.
Software that generates and grades test that humans can pass but that all but the most sophisticated computer programs cannot call _________.
Correct Answer
C. CAPTCHA
Explanation
A CAPTCHA is a type of software that generates and grades tests that humans can pass but most computer programs cannot. It is designed to distinguish between humans and automated bots. CAPTCHAs typically involve visual or auditory challenges that require human perception and understanding, such as identifying distorted letters or solving simple puzzles. This helps prevent automated programs from accessing certain websites or services, ensuring the security and integrity of online systems.
48.
A type of attacker that is extremely difficult to detect or stop because he or she is often authorized to access the very systems besing abused is called a ___________.
Correct Answer
C. Malicious insider
Explanation
A malicious insider refers to an attacker who is authorized to access the systems being abused. This individual is difficult to detect or stop because they have legitimate access to the systems, making it challenging to distinguish their malicious activities from regular usage. They can exploit their authorized privileges to carry out attacks, potentially causing significant damage or data breaches.
49.
__________ is a method of computing that delivers secure, private, and reliable computing experiences.
Correct Answer
B. Trustworthy computing
Explanation
Trustworthy computing is a method of computing that focuses on delivering secure, private, and reliable computing experiences. This approach ensures that users can trust the technology they are using, as it prioritizes security and privacy measures. Trustworthy computing involves implementing robust security protocols, protecting user data, and ensuring the reliability of the systems and services provided. By prioritizing trustworthiness, this method aims to enhance user confidence and overall computing experiences.
50.
The process of assessing security-related risks from both internal and external threats to an organization's computers and networks is called ________
Correct Answer
C. Risk assessment
Explanation
Risk assessment is the process of evaluating and analyzing potential security-related risks that can affect an organization's computers and networks. It involves identifying and assessing both internal and external threats to determine the likelihood and impact of these risks. By conducting a risk assessment, organizations can identify vulnerabilities, prioritize risks, and implement appropriate controls and mitigation strategies to protect their systems and data.