Employers can monitor their employees' e-mail messages sent to and from the company network because: - ANSWER all information carried by the company's communication system in company property.
Your company has provide
...
Employers can monitor their employees' e-mail messages sent to and from the company network because: - ANSWER all information carried by the company's communication system in company property.
Your company has provided you with a desktop computer to use at work. You have configured your e-mail client on this work computer to include your personal e-mail account so that you can conveniently download messages and check your personal e-mail. Which of the following is true? - ANSWER The company can read your personal e-mail messages.
Your company is about to release a proprietary product. Suddenly a competitor release a very similar product that uses design data exactly like that from you company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action? - ANSWER Monitoring employees' messages
Which choice lists the basic elements of authorship, according to copyright law? - ANSWER Expression and originality
You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the "Right to Be Forgotten" argument, which asks: - ANSWER whether people have the right to remove damaging information about themselves on the Internet.
Which of the following is protected by copyright? - ANSWER The lessons explaining DNA concepts on the www.DNSftb.org Web site
Which choice lists security-related ethical and legal issues that IT professional face? - ANSWER Privacy concerns, copyright an trademark issues, and encryption policies
You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Web sites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer? - ANSWER Restrict this employee's access to the Internet.
Your company's strength is marketing and sales. Your production team is assigned to rebrand the content obtained from an independent author so your sales team can sell it under your company's name. The author's original work is protected under her legal ownership. So your project manager obtains permission from the author to use her
[Show More]