Question: A. When a firm charges different prices to different groups of customers, it may be accused of 4.1[01] a. Cultural Relativism b. Money Laundering c.

 A. When a firm charges different prices to different groups ofcustomers, it may be accused of 4.1[01] a. Cultural Relativism b. Money

A. When a firm charges different prices to different groups of customers, it may be accused of 4.1[01] a. Cultural Relativism b. Money Laundering c. Facilitating Payments d. Price Discrimination Answer: B. Criminal activity within the information technology infrastructure. 4.2 [01] a. Cybercrime b. Digital crime c. Intellectual property d. All of them Answer: C. What are computer ethics? 4.1[01] a) An honest, moral code that should be followed when on the computer. b) A computer program about honesty. c) A computer that fits on or under a desk. d) A list of commandments in the holy book. Answer: D. Which of the following ethical precepts can be used in media? 4.1 [01] a) The Golden Rule: do unto others as you would have them do unto you. b) The Golden Mean: finding a middle way is better than an extreme. c) The categorical imperative: rules or laws should only be used that would always apply to everyone. d) All of the above can be used. Answer: E. Ethical issues in entertainment media would not include which of the following? 4.1 [01] a) Actors portraying characters in stereotypical roles in TV shows or movies. b) Gratuitous depictions of sex or violence in TV shows or movies. c) Product placements in children's programs on TV. d) All of the above. Answer: F. What is NOT an example of cyberbullying? 4.1 [01] a) Bullying someone in the hallway. b) Threatening someone in an instant message. c) Sending someone a mean text. d) Creating an embarrassing picture of your classmate and forwarding it to your friend's email addresses. Answer: 6. A malicious program that copies itself from computer to computer is called a: [O4,2] [Marks: 01] a) Virus. b) Worm. c) Trojan horse. d) None of the above. Answer: 7. The group that is most likely to be behind a computer security breach is: [O-4.2] [Marks: 01] a) Employees. b) Outside hackers/crackers. c) Competitors. d) None of the above. Answer: Q3. Distinguish between law and ethics. Q5. Discuss any five (5) illegal and unethical (crimes) activities people do with the computers. Q6. Summarize the six (6) ways to improve computer security as a professional. Q7. Explain four reasons why computer incidents are so prevalent. Q8. Explain any four types of exploits available in computer and how to protect. Q9. Discuss some common security issues and find the best way to solve security issues. Q10. Discuss Privacy Threat \& Control. Q11. Outline how patent has helped inventions globally. Q12. Examine the significance impact of trademark to companies

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!