AMA Answers - Ethics
AMA Answers - Ethics
AMA Answers - Ethics
AMA Answers
AMAOED Answers 95-100% correct with proof. Better than Brainly.ph and coursehero because this is free and tested
Select one:
a. Full disclosure
b. Nondisclosure policy
c. Ethical duty to warn
d. Limited disclosure
Performing shortcuts when implementing a new system is not always a good idea, but
unfortunately, sometimes it is necessary in order to meet aggressive time constraints.
https://amauoed.blogspot.com/search/label/Ethics 1/9
2/26/2021 AMA Answers: Ethics
Select one:
True
False
A crucial process for determining system integrity and business practice integrity. 駐在3年目。自分
Answer: の英語が幼稚
Audits
【60日返金保証】
パターンプラクティス
×チャンクで
スピーキング上達 。
ビジネス英語デジタル
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
教材
Answer: パタプライングリッシュ
Networking
開く
They possess great power in the corporate world. They have the ability to spy on fellow employees POPULAR AMA COURSES
as they can see the websites employees are visiting, monitor employee emails and online chats, GE6101 - Readings in Philippine History
view data on personal computers connected to the corporate network and much more. The history or story of a society or group of
people is rooted from their ________,
Select one: EXCEPT. Select one: a. Legends and Arts b.
Fol...
a. Auditor
RSCH -110 - Practical Research 1 - Learning
b. White hat hackers
Activities
c. System administrator Question 1 Correct Marked out of 1.00 Flag
question Question text True or False. If the
d. Black hat hackers statement is true, write the word True. If
False,...
Select one:
True
False
https://amauoed.blogspot.com/search/label/Ethics 2/9
2/26/2021 AMA Answers: Ethics
駐在3年目。自分
Select one:
True
False
の英語が幼稚
【60日返金保証】
パターンプラクティス
×チャンクで
The step in implementing a code wherein a procedure is conducted for managers and supervisors
スピーキング上達 。
ビジネス英語デジタル
regularly to state that they and their staff understand and apply the provisions of the code.
Answer: 教材
Affirmation
パタプライングリッシュ
開く
An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.
BLOG ARCHIVE
Select one:
▼ 2021 (31)
a. Assurance, reporting and reviews
▼ February (8)
b. Shareholders Part 2 GE6107 - Ethics (BS IT and BS
CS Only)
c. Society or the wider community
Part 1 GE6107 - Ethics (BS IT and BS
d. Customer Relations CS Only)
Short Quiz 007 - IT6202 - Database
Management Syst...
Assignment 009 - IT6202 - Database
Management Syst...
Assignment 008 - IT6202 - Database
The Code of Ethics would be effective if distributed as an executive mandate. Management Syst...
Assignment 007 - IT6202 - Database
Select one: Management Syst...
► January (23)
► 2020 (38)
A copy of the code must be inserted in the Annual Report for the shareholders and the public to
know about the company's position regarding ethical matters.
Select one:
True
False
https://amauoed.blogspot.com/search/label/Ethics 3/9
2/26/2021 AMA Answers: Ethics
Select one:
True
False
The step in implementing a code wherein a procedure is conducted for managers and supervisors
regularly to state that they and their staff understand and apply the provisions of the code.
Answer:
Affirmation
An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.
Select one:
a. Assurance, reporting and reviews
b. Shareholders
c. Society or the wider community
d. Customer Relations
Select one:
True
False
A copy of the code must be inserted in the Annual Report for the shareholders and the public to
know about the company's position regarding ethical matters.
Select one:
True
False
Select one:
True
False
https://amauoed.blogspot.com/search/label/Ethics 4/9
2/26/2021 AMA Answers: Ethics
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
Select one:
True
False
Select one:
True
False
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Select one:
a. Monetary Gain
b. Chain Letter
c. Identity theft
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Answer:
Traffic Analysis
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Select one:
a. Account Verification or "Phisher" exams
b. Con Artists and Email Questionnaires
c. "Find Out Everything on Anyone" Scams
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Select one:
https://amauoed.blogspot.com/search/label/Ethics 5/9
2/26/2021 AMA Answers: Ethics
a. Data Forecasting
b. Data Modelling
c. Using Back Doors
d. Domain Hijacking
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Select one:
a. Redoing Code Due to Management Changes
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources
This type of coding is done to have minimum reworking to do at the testing phase.
Select one:
a. Code Design
b. Database Administrator
c. Code Review
d. Data Forecasting
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Select one:
a. Pseudo Code
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Select one:
a. Database Administrator
b. Data Forecasting
c. Data Modelling
d. Using Back Doors
https://amauoed.blogspot.com/search/label/Ethics 6/9
2/26/2021 AMA Answers: Ethics
The process of creating an architecture diagram that represents the entities and their
corresponding relationship within a corporate database.
Select one:
a. Data Modelling
b. Domain Hijacking
c. Using Back Doors
d. Data Forecasting
What type of coding practice should be done when operating systems are upgraded?
Select one:
a. Redoing Code Due to Management Changes
b. Staying Current with Coding Practices
c. Ethical Use of System Resources
d. Correct Use of Memory
A key player in information technology who is responsible for all of the data within a corporation.
Select one:
a. Database Administrator
b. Social Audit
c. Computer Programmer
d. Coder
Select one:
a. Trojan horses
b. Cable modem hacking
c. Domain hijacking
d. Computer virus
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Select one:
a. Code Design
b. Code Review
c. Data Forecasting
d. Database Administrator
https://amauoed.blogspot.com/search/label/Ethics 7/9
2/26/2021 AMA Answers: Ethics
Answer:
FALSE
Answer:
Pretexting
Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases
and rentals. This is an example of what kind of ethical dilemma in privacy?
Answer:
Parental Surveillance
This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.
Answer:
Penetration testing
Answer:
TRUE
https://amauoed.blogspot.com/search/label/Ethics 8/9
2/26/2021 AMA Answers: Ethics
COURSES
Powered by Blogger.
https://amauoed.blogspot.com/search/label/Ethics 9/9