Our Blog

Would the following Be Considered a Violation of User Access Agreement

University of Maryland IFSM 201 Week 6 Quiz Trial Result: 4.4/5 – 88% Overall rating (last attempt): Red highlighted wrong answers 4.4/5 – 88% Question 1 (0.2 points) What is an advantage associated with membership in a professional association? Question 1 Options: A) Your employer knows that you have signed and complied with the Group`s Code of Ethics. B) You have a plan to behave ethically in all areas of your life. C) You can claim to be an expert in the field supported by the association. Register __________ B) Clarify if a business practice violates the Code of Ethics. C) Find out about the fines that will be imposed for violations of the Code of Ethics. D) Find out how to become a member of the professional organization. Save question 3 (0.2 points) (Yes/No). Is this statement correct: professional associations develop a code of conduct for members to guide and regulate members` professional behavior? Question 3 Options: a) Yes B) No Save __ B) One whose hostile online behavior is intended to harm others or another. C) A person whose hostile online behavior avoids confronting the victim face to face. D) A person who acts alone and anonymously when targeting others with continuous and unwanted communications. Save _______ This is one of your original creations, so can you use it outside of work and even sell it to others? Question 5 Options: A) Yes B) No Save __ The download agreement states that you are free to download and share the download link with others to try it out for 30 days.

Since you are an experienced programmer, you decide to change the mechanism that will make the program stop working unless it is paid after the 30-day trial, just in case you do not use it enough during the trial period to decide if you want to buy it. Are you violating copyright? Question 6 Options: A) Yes B) No Save __ They are both guilty of inappropriate use of digital content sharing. Question 7 Options: True False Record Question 8 (0.2 points) Would the following be considered a goal of the Digital Millennium Copyright Act? Select Yes or No. To prevent ISPs from allowing file transfers. Question 8 Options: A) Yes B) No Save __ Question 9 Options: A) A User Access Contract B) An Employee Code of Conduct C) A Code of Conduct for Professional Associations Except Question 10 (0.2 points) Would the following activity likely be a violation of an employee code of conduct or not: Joshua applies for a position with the Local Parents and Teachers Association (PTA). To reinforce his credentials for the position, he uses stationery from the college where he is employed. Question 10 Options: A) Probably a violation B) Probably no violation Except __ Question 12 Options: A) True B) Save incorrectly __ Question 13 Options: A) Yes B) No C) More information is required. Register _______ It sends a request to all employees of the company who apply for sponsorship. Is this a violation of a typical user access agreement? Question 14 options: A) Yes B) No Save Question 15 (0.2 points) (Yes/No).

Is the following considered a violation of the User Access Terms? Visit social networking sites during lunch breaks. Question 15 Options: a) yes b) no c) maybe __ Question 17 Options: A) An increase in spam delivery to your email account. B) An increase in the fees of the social network provider. C) Increase the likelihood of personal information being disclosed. D) An increase in the ability to connect with others online. Save __ Question 18 Options: A) Confidentiality B) Integrity C) Availability Beyond question 19 (0.2 points) In the following scenario, identify which of the three dimensions is primarily threatened or compromised. A virus begins to record Alfonso`s keystrokes and captures the user ID and password of his bank`s website. Question 19 Options: A) Confidentiality B) Integrity C) Availability Save _______ Question 20 (0.2 points) (True/False). The risk assessment should cover both personnel and technical support, such as firewalls, operating systems and secure networks, as well as virus protection. Question 20 Options: A) True B) False Record __ Question 21 Options: A) Best Practices B) Save Bad Practices __ You will receive an email from the local police department asking you to update your information so that alerts can be sent to you. The information requested includes your driver`s license number and phone number.

Question 22 Options: A) Yes B) No Save __ Question 23 Options: A) Virus B) Worm Record Question 24 (0.2 points) You have a long list of websites (more than 20) that you visit frequently, all of which require a username and password to access the website and/or the files stored on it. What would be a risk-free way to remember user IDs and passwords for all these websites? Question 24 Options: A) Use the same username and password for everyone and change them frequently (every 30 days). B) Use the same username but a different password for everyone. C) Confuse logins and passwords between websites and keep a secure record somewhere. D) Create a basic word/phrase and edit the same 2-3 characters in that word/phrase for each website. _________ Question 25 Options: A) Your driver`s license number B) Your username and password C) Your Social Security number F: For questions 4 and 5, use the following order for the rows of your truth tables. P Q T T T F F T F. (Yes/No). Is the following considered a violation of the User Access Terms? Visit social networking sites during lunch breaks. .

Posted in Uncategorized
-->

Websites Built to Give your Business a Rocket Boost

Services

  • Link 1
  • Link 2
  • Link 3
  • Link 4

Contact Info

Chat Support