Management Chapter 10 Ethics explanation 35 Succinct Statement The Values That

subject Type Homework Help
subject Pages 9
subject Words 2387
subject Authors George Schell, Raymond McLeod

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Exam
Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1)
Which of the following laws was passed in the 1970s dealing with the handling of credit data?
1)
A)
Fair Credit Reporting Act
B)
Freedom of Information Act
C)
Computer Matching and Privacy Act
D)
Right to Federal Privacy Act
2)
Which part of the ACM Code of Ethics and Professional Conduct deals with moral behavior and
issues that are currently receiving legal attention?
2)
A)
Compliance with the Code
B)
Organizational Leadership Imperatives
C)
General Moral Imperatives
D)
More Specific Professional Responsibilities
3)
Which of the following is not a major area of expectation according to the ACM Software
Engineering Code of Ethics and Professional Practice?
3)
A)
environmental
B)
colleagues
C)
self
D)
client and employer
4)
The ability to program the computer to do practically anything you want it to do is called:
4)
A)
invisible programming values.
B)
the invisibility factor.
C)
logical malleability.
D)
the transformation factor.
page-pf2
5)
In an AMA 2002 Corporate Values Survey, what percent of the respondents’ firms adhered to
ethical and integrity guidelines only part of the time?
5)
A)
23%
B)
44%
C)
80%
D)
63%
6)
Which opportunity for invisible programming exists because of intentional programming acts that
cross legal as well as ethical boundaries?
6)
A)
invisible programming values
B)
invisible abuse
C)
invisible programming routines
D)
invisible complex calculations
7)
Which type of auditing activity verifies the accuracy of the firm’s records and is the type of activity
performed by external auditors?
7)
A)
internal control systems design
B)
financial audit
C)
operational audit
D)
concurrent audit
8)
A succinct statement of the values that the firm seeks to uphold is referred to as a(n):
8)
A)
ethical statement.
B)
code of ethics.
C)
corporate credo.
D)
corporate code.
9)
Traditions of belief about right and wrong conduct are:
9)
A)
laws.
B)
computer ethics.
C)
ethics.
D)
morals.
page-pf3
10)
Which of the following is not one of Mason’s categories of PAPA?
10)
A)
Right to Privacy
B)
Right to Access
C)
Right to Availability
D)
Right to Property
11)
The system feature that is audited to see if the system’s operations are carried out to achieve the
greatest productivity from available resources is referred to as:
11)
A)
efficiency.
B)
effectiveness.
C)
adequacy of controls.
D)
compliance with company policy.
12)
When top-level management imposes the ethics culture in a top-down manner, which step comes
first?
12)
A)
Conduct an ethics audit.
B)
Establish ethics programs.
C)
Establish a corporate ethics code.
D)
Establish a corporate credo.
13)
In the corporate credo for Security Pacific Corporation, who is the first commitment to?
13)
A)
commitment to communities
B)
commitment to employee
C)
commitment to customer
D)
commitment of employee to employee
14)
Formal educational programs in computer ethics are available from a variety of sources except for:
14)
A)
college courses.
B)
professional programs.
C)
law enforcement programs.
D)
private educational programs.
page-pf4
15)
The reason behind society’s high level of interest in computer ethics is that all of the computer’s
internal operations are hidden from view is referred to as:
15)
A)
the transformation factor.
B)
invisible abuse.
C)
the transformation factor.
D)
the invisibility factor.
16)
When top-level management leads by example, it is referred to as:
16)
A)
leading by example.
B)
ethical behavior.
C)
ethics culture.
D)
moral culture.
17)
Formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or
citizens are:
17)
A)
computer ethics.
B)
ethics.
C)
morals.
D)
laws.
18)
An effort consisting of multiple activities designed to provide employees with direction in carrying
out the corporate credo is referred to as an:
18)
A)
ethics audit.
B)
ethics indoctrination.
C)
ethics program.
D)
ethics orientation.
19)
Which of the following are the easiest to interpret?
19)
A)
computer ethics
B)
ethics
C)
laws
D)
morals
page-pf5
20)
The act that made it a federal felony for someone to gain unauthorized access to information
pertaining to national defense or foreign relations was the:
20)
A)
Counterfeit Access Device and Computer Fraud and Abuse Act.
B)
Right to Financial Privacy Act.
C)
Federal Privacy Act.
D)
Small Business Computer Security and Education Act.
21)
In the Software Engineering Code of Ethics and Professional Practice, which area falls under the
heading of professional performance?
21)
A)
management
B)
judgment
C)
profession
D)
public
22)
Which act was rewritten to include digital, data, and video communications and electronic mail?
22)
A)
Electronic Communications Privacy Act
B)
Freedom of Information Act
C)
Right to Federal Privacy Act
D)
Computer Matching and Privacy Act
23)
Under which program heading should the CIO work with the stockholder relations department to
identify the information to be included in stockholder reports?
23)
A)
Actively participating in the release of financial information to environmental elements
B)
Educating the firm’s executives on financial systems
C)
Keeping tight control on money spent for information resources
D)
Achieving a higher level of understanding of accounting principles
page-pf6
24)
Under which program heading should the CIO initiate projects to review transaction processing
systems and financial information systems to ensure that they are operating at maximum
effectiveness?
24)
A)
Educating the firm’s executives on financial systems
B)
Achieving a higher level of understanding of accounting principles
C)
Keeping tight control on money spent for information resources
D)
Reviewing the information systems that accomplish financial reporting and taking remedial
action
25)
The auditing activity that involves the internal auditors in system development is:
25)
A)
financial audit.
B)
internal control systems design.
C)
operational audit.
D)
concurrent audit.
26)
The right to be left alone falls under which category of Mason’s PAPA?
26)
A)
Right to Property
B)
Right to Access
C)
Right to Privacy
D)
Right to Accuracy
27)
Which opportunity for invisible programming exists because the routines that the programmer
codes into the program may or may not produce the processing that the user desires?
27)
A)
invisible complex calculations
B)
invisible programming values
C)
invisible models
D)
invisible abuse
28)
Regarding information auditing, who reports to the CEO or the CFO?
28)
A)
external auditors
B)
director of internal auditing
C)
internal auditors
D)
audit committee
page-pf7
29)
Which statement is false regarding internal auditors?
29)
A)
Internal auditors have no ties with any individuals or groups within the firm.
B)
Internal auditors’ only allegiance is to the systems development team.
C)
Internal auditors offer objectivity.
D)
Internal auditors operate independently of the firm’s business units.
30)
The analysis of the nature and social impact of computer technology as well as the corresponding
formulation and justification of policies for the ethical use of such technology is referred to as:
30)
A)
ethics.
B)
a corporate credo.
C)
an ethical code.
D)
computer ethics.
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
31)
________ includes intentional acts that cross legal as well as ethical boundaries.
31)
32)
An ________ is an effort consisting of multiple activities designed to provide employees
with direction in carrying out the corporate credo.
32)
33)
A ________ is the same as an operational audit except that this type is ongoing.
33)
34)
________ is a collection of guiding beliefs, standards, or ideals that pervades an individual
or a group or community of people.
34)
35)
A ________ is a succinct statement of the values that the firm seeks to uphold.
35)
36)
The ________ manages the internal auditing department and usually reports to the CEO or
the CFO.
36)
page-pf8
37)
Mason coined the acronym ________ to represent society’s four basic rights in terms of
information: privacy, accuracy, property, and accessibility.
37)
38)
________ is software that is illegally copied and then used or sold.
38)
39)
________ are those routines that the programmer codes into the program that may or may
not produce the processing that the user desires.
39)
40)
The mostly widely publicized classification of human rights in the computer area is
Richard O. Mason’s ________.
40)
41)
________ are formal rules of conduct that a sovereign authority, such as a government,
imposes on its subjects or citizens.
41)
42)
A ________ verifies the accuracy of the firm’s records and is the type of activity performed
by external auditors.
42)
43)
________ take the form of programs that are so complex that users do not understand
them.
43)
44)
________ deal with moral behavior and issues that are currently receiving legal attention.
44)
45)
An ________ is not conducted to verify the accuracy of records, but rather to validate the
effectiveness of procedures.
45)
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
46)
Computer-based systems are more accurate than manual systems.
46)
8
page-pf9
47)
An AMA 2002 Corporate Values Survey found that 45% of the respondents’ firms adhered to
ethical and integrity guidelines only part of the time.
47)
48)
The CIO should keep tight control on money spent for information resources.
48)
49)
The Counterfeit Access Device and Computer Fraud and Abuse Act made it a federal felony for
someone to gain unauthorized access to information pertaining to national defense or foreign
relations.
49)
50)
Software that is illegally copied and then used or sold is referred to as pirated.
50)
51)
The ethics culture is determined from the lower level of management to the top level.
51)
52)
Morals are a suite of guiding beliefs, standards, or ideals that pervades an individual or a group or
community of people.
52)
53)
An audit committee defines the responsibilities of the internal auditing department and receives
many of the audit reports.
53)
54)
A financial audit verifies the accuracy of the firm’s records and is the type of activity performed by
external auditors.
54)
55)
A concurrent audit is the same as a financial audit except that the concurrent audit is ongoing.
55)
56)
Internal auditors should participate in systems development because they can offer expertise that
can improve the quality of the system.
56)
page-pfa
57)
The Association for Computing Machinery is the oldest professional computer organization in the
world.
57)
58)
Richard Mason believes “the right to be let alone” is being threatened.
58)
59)
The first person charged with committing a computer crime was a programmer who put a patch in
a program so that it would not flag his bank account as being overdrawn.
59)
60)
The Software Engineering Code of Ethics and Professional Practice deals with responsibility to
constituents, professional performance, and self-improvement.
60)
61)
Invisible programming values are those routines that the programmer intentionally codes into the
program that do not produce the processing that the user desires.
61)
62)
James Moor believes that the two main reasons for society’s high level of interest in computer ethics
are logical malleability and the invisibility factor.
62)
63)
In an ethics audit, an internal auditor meets with a manager in a several-hour session to learn how
the manager’s unit is carrying out the corporate credo.
63)
64)
In meeting the control requirements imposed by NCR, the CIO must ensure that such controls are
built into systems during systems development.
64)
65)
One of SOX provisions is that CEOs and CFOs must certify the financial reports.
65)
66)
One way to have continuing education of the firm’s executives is to make sure that financial
managers are liberally represented on the MIS steering committee.
66)
page-pfb
67)
Morals are a social institution with a history and a list of rules.
67)
68)
Software vendors can guard against theft of their intellectual property by means of copyrights,
patents, and license agreements.
68)
69)
All acts of computer crime fall into the category of invisible abuse.
69)
70)
Today, public information is more accessible than the time prior to computerized databases.
70)
71)
A problem in the People’s Republic of China is that the term “privacy” often has a negative
connotation, being associated with someone who has something to hide.
71)
72)
James Moor has defined computer ethics as the analysis of the nature and social impact of
computer technology, as well as the corresponding formulation and justification of policies for the
ethical use of such technology.
72)
73)
As of August 11, 2002, CEOs, CFOs, and CIOs are required to sign off on the accuracy of their
financial statements.
73)
74)
The Electronic Communications Privacy Act of 1968 covered voice, digital, data, and video
communications, as well as electronic mail.
74)
75)
Laws are formal rules of conduct that a sovereign authority, such as a government, imposes on its
subject or citizens.
75)
ESSAY. Write your answer in the space provided or on a separate sheet of paper.
76)
What does the acronym PAPA refer to?
page-pfc
77)
Define morals, ethics, and laws.
78)
How can the CIO bring financial reporting up to expectations?
79)
What are the four parts of the current form of the ACM code of ethics?
80)
What are the three reasons for the importance of computer ethics as posed by James Moor?
12

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.