0% found this document useful (0 votes)
175 views

AMA Answers - Ethics

______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs__________

Uploaded by

Jorell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views

AMA Answers - Ethics

______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs______________are kinds of texts that often uses adjectives or adverbs__________

Uploaded by

Jorell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

10/2/21, 11:19 AM AMA Answers: Ethics

More
[email protected]
Dashboard
Sign Out

AMA Answers
AMAOED Answers 95-100% correct with proof. Better than Brainly.ph and coursehero because this is free and tested

TOTAL PAGEVIEWS
Showing posts with label Ethics. Show all posts

348,777
THURSDAY, FEBRUARY 18, 2021

Part 2 GE6107 - Ethics (BS IT and BS CS Only) FIND BY COURSE NAME

Calculus 1
(11)
  Computer Programming 1
(5)
Data Communications and Networking 1
(1)

The daily responsibilities of the administrator such as monitoring the system, managing users and Data Communications and Networking 2
(3)
passwords, allocating system resources and installations. Data Structures and Algorithm Analysis
(3)
Database Management System 1
(18)
Answer:  ENGL6100
(21)

System administration Ethics


(2)
GE6101
(1)
GE6102
(4)
GE6106
(1)
GE6107
(2)
General Mathematics
(3)
They are responsible for finding vulnerabilities. They also have their own set of moral issues to GMAT111
(3)
address when reversing engineering products for the protection purposes of discovering Introduction to Human Computer Interaction
vulnerabilities. (8)
IT6200
(8)
Select one: IT6201
(1)
a. Black hat hackers IT6202
(18)
b. Auditor IT6223
(3)

c. System administrator ITE6102


(5)
ITE6201
(3)
d. White hat hackers
MATH6100
(11)
Practical Research 1
(3)
Purposive Communication
(1)
Purposive Communication 2
(21)
Readings in Philippine History
(1)

The process of broadly disseminating as much information as possible regarding product or system RSCH -110
(3)
vulnerabilities so that potential victims possess the same information as the potential hackers.  The Contemporary World
(4)

Select one:
a. Full disclosure
b. Nondisclosure policy
c. Ethical duty to warn
d. Limited disclosure

Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.

https://amauoed.blogspot.com/search/label/Ethics 1/9
10/2/21, 11:19 AM AMA Answers: Ethics
Select one:
True
False

A crucial process for determining system integrity and business practice integrity.

Answer: 

Audits

This involves controlling an integrated computer system and maximizing performance and
productivity of that system.

Answer: 

Networking

They possess great power in the corporate world. They have the ability to spy on fellow employees POPULAR AMA COURSES
as they can see the websites employees are visiting, monitor employee emails and online chats, GE6106 - Purposive Communication
view data on personal computers connected to the corporate network and much more. This communication principle says
messages should be uniform, mixed
Select one: message should be avoided. Once this is
achieved, this strengthens the...
a. Auditor
b. White hat hackers GE6101 - Readings in Philippine History
The history or story of a society or group of
c. System administrator people is rooted from their ________,
EXCEPT. Select one: a. Legends and Arts
d. Black hat hackers b. Fol...

GE6102 - The Contemporary World


also have a look at  -  Contemporary
World Prelims answers - Contemporary
World Midterm answers -  Contemporary
World all short quizes answe...

Having this policy within a company means that whomever signs the nondisclosure agreement GE6102 - The Contemporary World Prelims
agrees to keep the vulnerability information within that organization tightly contained so that no one The level of personal or family income
outside of the organization, especially the general public, ever learns of the existence of product below which one is classified as poor
vulnerabilities.  according to governmental standards:
Select one: a. Income matr...

Select one: MATH6100 - Calculus 1 - Assignment 001


a. Limited disclosure This page contains the answers of
AMA MATH6100 - Calculus 1 - Assignment
b. Nondisclosure policy 001 You cannot search by text because
they are photos SEE MORE CALC...
c. Ethical duty to warn
d. Full disclosure

When a patch is not aptly tested, problems arise.

Select one:
True
False
https://amauoed.blogspot.com/search/label/Ethics 2/9
10/2/21, 11:19 AM AMA Answers: Ethics

Disclosing referral fees to the client is up to the executive's decision.

Select one:
True
False

The step in implementing a code wherein a procedure is conducted for managers and supervisors
regularly to state that they and their staff understand and apply the provisions of the code.

Answer: 

Affirmation

An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.

BLOG ARCHIVE
Select one:
▼ 
2021
(46)
a. Assurance, reporting and reviews
▼ 
September
(6)
b. Shareholders Week 9-12 Answers - IT6200 -
c. Society or the wider community Introduction to Human...

Long Quiz 002 Answers - Introduction


d. Customer Relations
to Human Comp...
Week 6-7 Answers - IT6200 -
Introduction to Human ...
Weeks 10-13 Answers Data
Communications and Networ...
Weeks 6-9 Answers Data
The Code of Ethics would be effective if distributed as an executive mandate. Communications and Networki...
Weeks 1-5 Answers Data
Select one: Communications and Networki...
True ► 
July
(5)
False ► 
March
(4)
► 
February
(8)
► 
January
(23)

► 
2020
(38)

A copy of the code must be inserted in the Annual Report for the shareholders and the public to know
about the company's position regarding ethical matters.

Select one:
True
False

In developing a code of ethics, always disregard anonymous reports.

https://amauoed.blogspot.com/search/label/Ethics 3/9
10/2/21, 11:19 AM AMA Answers: Ethics
Select one:
True
False

The step in implementing a code wherein a procedure is conducted for managers and supervisors A beautiful
regularly to state that they and their staff understand and apply the provisions of the code.
blend of life
Answer: 

Affirmation

One-tower
development:

An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good amenities are exclusive

faith in all agreements, quality, fair pricing and after-sales service. to 140 residents only.

Select one:
a. Assurance, reporting and reviews
b. Shareholders
c. Society or the wider community
d. Customer Relations

The Code of Ethics would be effective if distributed as an executive mandate.

Select one:
True
False

A copy of the code must be inserted in the Annual Report for the shareholders and the public to know
about the company's position regarding ethical matters.

Select one:
True
False

In developing a code of ethics, always disregard anonymous reports.

Select one:
True
False

https://amauoed.blogspot.com/search/label/Ethics 4/9
10/2/21, 11:19 AM AMA Answers: Ethics

The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.

Select one:
True
False

Allowing the destruction of discoverable evidence is legal if approved by a higher official.

Select one:
True
False

A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.

Select one:
a. Monetary Gain
b. Chain Letter
c. Identity theft

This reveals surprisingly detailed information that is significantly private. It is suggested that you keep
this practice limited to authorized investigations and legitimate troubleshooting in order to preserve
the users' expectation of privacy, as defined by company policy.

Answer: 

Traffic Analysis

A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?

Select one:
a. Account Verification or "Phisher" exams
b. Con Artists and Email Questionnaires
c. "Find Out Everything on Anyone" Scams

The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.

Select one:

https://amauoed.blogspot.com/search/label/Ethics 5/9
10/2/21, 11:19 AM AMA Answers: Ethics
a. Data Forecasting
b. Data Modelling
c. Using Back Doors
d. Domain Hijacking

What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?

Select one:
a. Redoing Code Due to Management Changes
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources

This type of coding is done to have minimum reworking to do at the testing phase. 

Select one:
a. Code Design
b. Database Administrator
c. Code Review
d. Data Forecasting

This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.

Select one:
a. Pseudo Code
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources

These are considered significant security risk, but not being able to get into an application is a serious
development issue when a problem arises.

Select one:
a. Database Administrator
b. Data Forecasting
c. Data Modelling
d. Using Back Doors

https://amauoed.blogspot.com/search/label/Ethics 6/9
10/2/21, 11:19 AM AMA Answers: Ethics

The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.

Select one:
a. Data Modelling
b. Domain Hijacking
c. Using Back Doors
d. Data Forecasting

What type of coding practice should be done when operating systems are upgraded?

Select one:
a. Redoing Code Due to Management Changes
b. Staying Current with Coding Practices
c. Ethical Use of System Resources
d. Correct Use of Memory

A key player in information technology who is responsible for all of the data within a corporation.

Select one:
a. Database Administrator
b. Social Audit
c. Computer Programmer
d. Coder

The process of stealing a domain name from another entity.

Select one:
a. Trojan horses
b. Cable modem hacking
c. Domain hijacking
d. Computer virus

This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.

Select one:
a. Code Design
b. Code Review
c. Data Forecasting
d. Database Administrator

https://amauoed.blogspot.com/search/label/Ethics 7/9
10/2/21, 11:19 AM AMA Answers: Ethics

Write TRUE or FALSE in the space provided.


Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.

Answer: 

FALSE

The process of collecting data about a person using false pretenses.

Answer: 

Pretexting

Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases and
rentals. This is an example of what kind of ethical dilemma in privacy?

Answer: 

Parental Surveillance

This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.

Answer: 

Penetration testing

Write TRUE or FALSE in the space provided.


National security and individual privacy are both critical and important to consider.

Answer: 

TRUE

-
February 18, 2021
4 comments:

Labels:
Ethics,
GE6107

Home Older Posts

Subscribe to:
Posts (Atom)

https://amauoed.blogspot.com/search/label/Ethics 8/9
10/2/21, 11:19 AM AMA Answers: Ethics

Ad globe.com.ph M ore ▼

COURSES

ENGL6100
Purposive Communication 2
Database Management System 1
IT6202
Calculus 1
MATH6100
IT6200
Introduction to Human Computer Interaction
Computer Programming 1
ITE6102
GE6102
The Contemporary World
Data Communications and Networking 2
Data
Structures and Algorithm Analysis
GMAT111
General Mathematics
IT6223
ITE6201
Practical Research 1
RSCH -110
Ethics
GE6107
Data Communications and Netw orking 1
GE6101
GE6106
IT6201
Purposive Communication
Readings in Philippine History

Powered by Blogger.

https://amauoed.blogspot.com/search/label/Ethics 9/9

You might also like