Education > QUESTIONS and ANSWERS > IBA 1.14 Review (All)
Employers can monitor their employees' e-mail messages sent to and from the company network because: - ANSWER all information carried by the company's communication system in company property. Your... company has provided you with a desktop computer to use at work. You have configured your e-mail client on this work computer to include your personal e-mail account so that you can conveniently download messages and check your personal e-mail. Which of the following is true? - ANSWER The company can read your personal e-mail messages. Your company is about to release a proprietary product. Suddenly a competitor release a very similar product that uses design data exactly like that from you company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action? - ANSWER Monitoring employees' messages Which choice lists the basic elements of authorship, according to copyright law? - ANSWER Expression and originality You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the "Right to Be Forgotten" argument, which asks: - ANSWER whether people have the right to remove damaging information about themselves on the Internet. Which of the following is protected by copyright? - ANSWER The lessons explaining DNA concepts on the www.DNSftb.org Web site Which choice lists security-related ethical and legal issues that IT professional face? - ANSWER Privacy concerns, copyright an trademark issues, and encryption policies You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Web sites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer? - ANSWER Restrict this employee's access to the Internet. Your company's strength is marketing and sales. Your production team is assigned to rebrand the content obtained from an independent author so your sales team can sell it under your company's name. The author's original work is protected under her legal ownership. So your project manager obtains permission from the author to use her [Show More]
Last updated: 1 year ago
Preview 1 out of 3 pages
Connected school, study & course
About the document
Uploaded On
Sep 29, 2022
Number of pages
3
Written in
This document has been written for:
Uploaded
Sep 29, 2022
Downloads
0
Views
44
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·