{"id":53115,"date":"2024-04-26T23:33:23","date_gmt":"2024-04-26T23:33:23","guid":{"rendered":"http:\/\/localhost\/branding\/module-4-ethics\/"},"modified":"2024-04-26T23:33:23","modified_gmt":"2024-04-26T23:33:23","slug":"module-4-ethics","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/","title":{"rendered":"Module-4-Ethics"},"content":{"rendered":"<p>Ethics Module<\/p>\n<p>Schedule:<\/p>\n<p>After deadline.Ended 09\/29\/2013 11:59 PM EDT<\/p>\n<p>Started:09\/29\/2013 1:28 AM EDT<\/p>\n<p>Submitted:09\/29\/2013 5:34 PM EDT<\/p>\n<p>Score:75%<\/p>\n<p>Points:90\u00a0out of 120<\/p>\n<p>Question 1<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Would the following be considered a violation of a user access agreement?<\/p>\n<p>knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of another&#8217;s computer<\/p>\n<p>\u00a0yes<\/p>\n<p>\u00a0no<\/p>\n<p>\u00a0maybe<\/p>\n<p>Feedback<\/p>\n<p>Correct. Any action which deliberately damages another\u2019s computer is both illegal and a violation of any user access agreement.<\/p>\n<p>Question 2<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.<\/p>\n<p>\u00a0Yes<\/p>\n<p>\u00a0No<\/p>\n<p>\u00a0Maybe<\/p>\n<p>Feedback<\/p>\n<p>Correct. Accepting system updates is part of keeping the company\u2019s computer operating correctly and securely and is therefore NOT a violation of a user access agreement.<\/p>\n<p>Question 3<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>Would the following be considered a violation of user access agreement?<\/p>\n<p>visiting social networking sites during lunch breaks<\/p>\n<p>\u00a0yes<\/p>\n<p>\u00a0no<\/p>\n<p>\u00a0maybe<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. It depends on whether this activity is expressly forbidden by the user access agreement.<\/p>\n<p>Question 4<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>What is the purpose of a user access agreement?<\/p>\n<p>\u00a0to define all approved uses of the company\u2019s IT resources<\/p>\n<p>\u00a0to define every sanction to be applied if a violation occurs<\/p>\n<p>\u00a0to outline in general the acceptable and unacceptable use of IT resources<\/p>\n<p>\u00a0to outline all acceptable and unacceptable behavior of all company employees<\/p>\n<p>Feedback<\/p>\n<p>Correct. The user access agreement gives sufficient detail for acceptable and unacceptable uses of IT resources, but it cannot identify every possible situation.<\/p>\n<p>Question 5<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company\u2019s employee picnic.<\/p>\n<p>\u00a0likely a violation<\/p>\n<p>\u00a0likely not a violation<\/p>\n<p>Feedback<\/p>\n<p>Correct. John is not using the color printer for his own personal fliers, but for ones to promote the company\u2019s employee picnic.<\/p>\n<p>Question 6<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.<\/p>\n<p>\u00a0True<\/p>\n<p>\u00a0False<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. Both illegal and unethical behaviors can be and frequently are included in an employee Code of Conduct.<\/p>\n<p>Question 7<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Which aspect of social networking poses the most risk?<\/p>\n<p>\u00a0Disclosure of personal information<\/p>\n<p>\u00a0Communicating with people who share common interests<\/p>\n<p>\u00a0The ability to read others\u2019 posts<\/p>\n<p>\u00a0Installing software to enable social networking<\/p>\n<p>Feedback<\/p>\n<p>Correct. Failure to understand and monitor privacy settings in social networking settings poses a risk that too much personal information will be disclosed.<\/p>\n<p>Question 8<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Which of the following factors determine whether a specific instance of file sharing is legal?<\/p>\n<p>\u00a0Is the material being shared copyrighted?<\/p>\n<p>\u00a0Is the sharing part of a business operation?<\/p>\n<p>\u00a0Does the sharing result in monetary gain for the person doing the sharing?<\/p>\n<p>\u00a0Is the site that is being used for the sharing primarily used for illegal sharing?<\/p>\n<p>Feedback<\/p>\n<p>Correct. This is the sole criterion: if the material is copyrighted, then sharing it is illegal.<\/p>\n<p>Question 9<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>The Digital Millennium Copyright Act&#8230;<\/p>\n<p>\u00a0ensures that Internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.<\/p>\n<p>\u00a0allows copying or distribution of copies of copyrighted software.<\/p>\n<p>\u00a0provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.<\/p>\n<p>\u00a0addresses only copyrighted software issues.<\/p>\n<p>Feedback<\/p>\n<p>Correct. The protection mechanisms that prevent a CD or DVD from being copied cannot be removed without penalty, and it is illegal to sell tools to accomplish this removal.<\/p>\n<p>Question 10<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?<\/p>\n<p>\u00a0yes<\/p>\n<p>\u00a0no<\/p>\n<p>Feedback<\/p>\n<p>Correct. Typically, work done under company employment directives usually becomes the intellectual property of the company. Personal rights to copyright are ceded to the company.<\/p>\n<p>Question 11<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?<\/p>\n<p>\u00a0Postings tips, project photos, and ideas on a hobby-related forum.<\/p>\n<p>\u00a0Posting your resume on a job-seeking or job-posting site.<\/p>\n<p>\u00a0Posting photos of oneself that might be considered risqu\u00e9 or offensive.<\/p>\n<p>\u00a0Posting vacation photos after you have returned home.<\/p>\n<p>Feedback<\/p>\n<p>Correct. What you post may be read by a current or future employer, endangering your current or future employability.<\/p>\n<p>Question 12<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>Which of the following statements is true?<\/p>\n<p>\u00a0Cyberbullies attack only minors.<\/p>\n<p>\u00a0Cyberstalking is the cyberbullying of an adult.<\/p>\n<p>\u00a0Cyberstalkers rarely request face-to-face meetings with their victims.<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. This is the most dangerous outcome of cyberstalking or cyberharassment. The more vulnerable victims are minors.<\/p>\n<p>Close<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethics Module Schedule: After deadline.Ended 09\/29\/2013 11:59 PM EDT Started:09\/29\/2013 1:28 AM EDT Submitted:09\/29\/2013 5:34 PM EDT Score:75% Points:90\u00a0out of<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-53115","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Module-4-Ethics - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Module-4-Ethics - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Ethics Module Schedule: After deadline.Ended 09\/29\/2013 11:59 PM EDT Started:09\/29\/2013 1:28 AM EDT Submitted:09\/29\/2013 5:34 PM EDT Score:75% Points:90\u00a0out of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:33:23+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/\",\"name\":\"Module-4-Ethics - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:33:23+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Module-4-Ethics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Module-4-Ethics - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/","og_locale":"en_US","og_type":"article","og_title":"Module-4-Ethics - sheilathewriter","og_description":"Ethics Module Schedule: After deadline.Ended 09\/29\/2013 11:59 PM EDT Started:09\/29\/2013 1:28 AM EDT Submitted:09\/29\/2013 5:34 PM EDT Score:75% Points:90\u00a0out of","og_url":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:33:23+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/","url":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/","name":"Module-4-Ethics - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:33:23+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/module-4-ethics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Module-4-Ethics"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/53115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=53115"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/53115\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=53115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=53115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=53115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}