Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

PROF DEV

Summative 3 ( Modules 5 & 6 )

QuestionAnswer
Only a few computing professionals work for employers. False
How do you make every task achievable in computing profession? Teamwork
One moral responsibility in computing is role responsibility. True
Legal Responsibility is a responsibility of a computing professional. False
No task is made achievable with a team working beside you. False
Computing professionals share this exceptional obligation to ensure the safety of the public and to improve the quality of life of the individuals who use computers and information systems. True
Not only will others be greatly affected by the consequences of our doings, but our own image. True
The association could be obligated for harms in a common claim. True
We should be inclined and ____ in understanding the responsibilities that comes in pursuing the career as computing professionals. COGNIZANT
These professional standards incorporate not just consideration regarding specialized magnificence yet in addition concern for the social impacts of computers on administrators, clients, and general society. True
Learn to be a ___ player. Team
All are actions considered mischief to the general public, except: responsible viewing of private documents
There are specific roles that we must play that comes from this profession. True
The business relationship is ____ binding. LEGALLY
What states that “regardless of whether a computing professional fills in as an expert to an individual or as an employee in a large organization, the professional is obligated to perform assigned tasks properly”? Professional Standards
Computing presents a specific case for understanding the job of innovation in moral responsibility. True
What should we understand as an upcoming IT Professional? Responsibilities
As upcoming IT professionals, we should be inclined and cognizant in understanding the responsibilities that comes in pursuing the career as computing professionals. True
As an aspiring computer professional you need to have determination in order to complete every tasks that are up ahead. True
We play a proactive job in advancing social obligation in utilizing PCs and disheartening those activities that mischief our general public. True
Computing presents a broad case for understanding the job of innovation in moral responsibility. False
An individual could be ___ of wrong doings. Accused
How many moral responsibilities are there in computing? 3
In every action there are consequences. True
To be able to complete challenges that we face, being satisfied with your own work and the ____ you’re working with. PEOPLE
Know what specific career that relates to IT we should embark and give our full devotion to. False, computing not IT
Computing professionals, as a part of society, have social and ____ duties. Choose the best answer Moral
These rights may be enforced by a court via a_______________. LAWSUIT
Set of moral principles that guide a person's behavior. ETHICS
They are designed to damage its target computer by corrupting data, reformatting your hard disk, or completely shutting down your system. __________________ VIRUS
Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a _____________ time. Limited
It’s a way of skipping the registration and authentication steps when installing a software. True
A virus can’t copy itself and spread to other computers by attaching themselves to programs and executing code when a user runs the infected program. False
_______________________ defined as the application of classical ethical principles to the use of computer technology. COMPUTER ETHICS
Software License allows the use of digital material by following the license agreement. True
Ethics illustrate society’s views about what is right and what is wrong. True
Computer ethics s society’s views about the use of computers, both hardware and software. True
It is important to “think before you click”. True
What does “FAQ” means? FREQUENTLY ASKED QUESTION
What does it mean if you use all capital letters? SHOUTING
A hacker can acquire ___ access to other computers. UNAUTHORIZED
It is about the various risks related to using the Internet. ____________ NETIQUETTE
All are crimes in computer, except: Data Security
“fyi” means? FOR YOUR INFORMATION
Netiquette are about the various risks related to using the Internet. True
Using sarcasm and humor might be misinterpreted. True
Be careful when using sarcasm or humor. True
Ethics is a set of moral regulates the use of computer. False
Access to computing technology isn’t an ethical problem related to computer. False
Installed on your computer without your knowledge, it is designed to track your browsing habits and internet activity. Spyware
These rights can include copyrights, patents, trademarks, and trade secrets. True
What does ethos mean, aside from “way of living” and “habit”? CUSTOM
Only a few newsgroups and web pages has FAQ. False
You don’t need to read FAQ even when it’s there. False
participate in flame wars. False
Be _____________ of other’s mistakes. FORGIVING
The Golden Rule: “Treat others as you would like them to treat you” True
Netiquette is about proper ways in which to use a network. True
It is okay to use offensive language or words. False
It is the internet’s version of junk mail. ______________ SPAM
People do realize how vulnerable information stored on computers. False
Ethics are strictly implemented, and we should follow it. False
You should have proper _____________, to prevent plagiarism. CITATION
It’s like stealing someone else’s work and releasing it as your own work. PLAGIARISM
There are also ethical concerns on health and safety of employees getting sick from constant sitting, staring at computer screens and typing on the keyboard or clicking on the mouse. True
There are only positive effects when using the computer. False
In copyright, whatever idea the author created cannot be employed or disseminated by anyone else without the ______ of the author. Permission
The only way to stay protected or remove a malware infection is by using anti-malware software, or antivirus. True
Thou Shalt Not Appropriate Other People’s __ Output. INTELLECTUAL
Thou Shalt Not Use Other People’s Computer Resources Without ______________ Or Proper Compensation. AUTHORIZATION
Read someone’s private e-mail. False
Do not assume material is accurate or up-to-date. True
A message that reveals a solution to a game or ending to a movie or program. SPOILER
It is important to use proper grammar in e-mails and such things. True
An emoticon express a(n) __________. EMOTION
As soon as you install a Trojan, you are giving cyber ____ access to your system. CRIMINALS
A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. INTELLECTUAL PROPERTY RIGHT
A way of breaking into a system by getting past the security features of the system. CRACKING
Computers and the internet help people stay in touch with family and friends. True
The Golden Rule: "_________ others as you would like them to treat you." TREAT
Thou Shalt Not ____________ In Other People’s Computer Files. SNOOP AROUND
Accuracy of information stored is also an ethical problem related to computer. True
A form of intellectual property that gives proprietary publication, distribution and usage rights for the author. ________________________ COPYRIGHT
Spam is a(n) unsolicited e-mail message or newsgroup sent to many recipients at once. True
Do not read the message again before you send it. False
Created by: 143318101805823
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards