You are on page 1of 9

2/26/2021 AMA Answers: Ethics

Higit Pa Gumawa ng Blog Mag-sign in

AMA Answers
AMAOED Answers 95-100% correct with proof. Better than Brainly.ph and coursehero because this is free and tested

FIND BY COURSE NAME


Showing posts with label Ethics. Show all posts
Calculus 1 (11)
THURSDAY, FEBRUARY 18, 2021 Computer Programming 1 (5)
Database Management System 1 (18)
Part 2 GE6107 - Ethics (BS IT and BS CS Only) ENGL6100 (21)
ENGL6100 - Purposive Communication 2
(21)
Ethics (2)
The daily responsibilities of the administrator such as monitoring the system, managing users and GE6101 (1)
passwords, allocating system resources and installations. GE6101 - Readings in Philippine History (1)
GE6102 (4)
Answer: GE6102 - The Contemporary World (4)
System administration GE6106 (1)
GE6106 - Purposive Communication (1)
GE6107 (2)
GE6107 Ethics (2)
General Mathematics (3)
GMAT111 (3)
They are responsible for finding vulnerabilities. They also have their own set of moral issues to GMAT111 - General Mathematics (3)
address when reversing engineering products for the protection purposes of discovering
IT6202 (18)
vulnerabilities.
IT6202 - Database Management System 1
(18)
Select one:
ITE6102 (5)
a. Black hat hackers
ITE6102 - Computer Programming 1 (5)
b. Auditor MATH6100 (11)
c. System administrator MATH6100 - Calculus 1 (11)
Practical Research 1 (3)
d. White hat hackers
Purposive Communication (1)
Purposive Communication 2 (21)
Readings in Philippine History (1)
RSCH -110 (3)
RSCH -110 - Practical Research 1 (3)
The process of broadly disseminating as much information as possible regarding product or system The Contemporary World (4)
vulnerabilities so that potential victims possess the same information as the potential hackers.

Select one:
a. Full disclosure
b. Nondisclosure policy
c. Ethical duty to warn
d. Limited disclosure

Performing shortcuts when implementing a new system is not always a good idea, but
unfortunately, sometimes it is necessary in order to meet aggressive time constraints.

https://amauoed.blogspot.com/search/label/Ethics 1/9
2/26/2021 AMA Answers: Ethics
Select one:
True
False

A crucial process for determining system integrity and business practice integrity. 駐在3年目。自分
Answer: の英語が幼稚
Audits
【60日返金保証】
パターンプラクティス
×チャンクで
スピーキング上達 。
ビジネス英語デジタル
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
教材
Answer: パタプライングリッシュ
Networking

開く

They possess great power in the corporate world. They have the ability to spy on fellow employees POPULAR AMA COURSES

as they can see the websites employees are visiting, monitor employee emails and online chats, GE6101 - Readings in Philippine History
view data on personal computers connected to the corporate network and much more. The history or story of a society or group of
people is rooted from their ________,
Select one: EXCEPT. Select one: a. Legends and Arts b.
Fol...
a. Auditor
RSCH -110 - Practical Research 1 - Learning
b. White hat hackers
Activities
c. System administrator Question 1 Correct Marked out of 1.00 Flag
question Question text True or False. If the
d. Black hat hackers statement is true, write the word True. If
False,...

RSCH -110 - Practical Research 1 - Long


Quizzes
Which of the following is not included in the
research experience? Select one: a. Identity
of the researcher b. Social class of the
Having this policy within a company means that whomever signs the nondisclosure agreement research...
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product GE6102 - The Contemporary World
vulnerabilities. also have a look at - Contemporary
World Prelims answers - Contemporary World
Midterm answers - Contemporary World all
Select one: short quizes answe...
a. Limited disclosure
GMAT111 - General Mathematics
b. Nondisclosure policy Solve for the value of x: 1. 7 x+4 = 49 2x-1
x = Answer 1. 4 x+2 = 8 2x x=
c. Ethical duty to warn Answer Complete the ...
d. Full disclosure

When a patch is not aptly tested, problems arise.

Select one:
True
False
https://amauoed.blogspot.com/search/label/Ethics 2/9
2/26/2021 AMA Answers: Ethics

Disclosing referral fees to the client is up to the executive's decision.

駐在3年目。自分
Select one:
True
False
の英語が幼稚
【60日返金保証】
パターンプラクティス
×チャンクで
The step in implementing a code wherein a procedure is conducted for managers and supervisors
スピーキング上達 。
ビジネス英語デジタル
regularly to state that they and their staff understand and apply the provisions of the code.

Answer: 教材
Affirmation
パタプライングリッシュ

開く
An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.

BLOG ARCHIVE
Select one:
▼ 2021 (31)
a. Assurance, reporting and reviews
▼ February (8)
b. Shareholders Part 2 GE6107 - Ethics (BS IT and BS
CS Only)
c. Society or the wider community
Part 1 GE6107 - Ethics (BS IT and BS
d. Customer Relations CS Only)
Short Quiz 007 - IT6202 - Database
Management Syst...
Assignment 009 - IT6202 - Database
Management Syst...
Assignment 008 - IT6202 - Database
The Code of Ethics would be effective if distributed as an executive mandate. Management Syst...
Assignment 007 - IT6202 - Database
Select one: Management Syst...

True Assignment 006 - IT6202 - Database


Management Syst...
False
Long Quiz 002 - IT6202 - Database
Management System 1

► January (23)

► 2020 (38)

A copy of the code must be inserted in the Annual Report for the shareholders and the public to
know about the company's position regarding ethical matters.

Select one:
True
False

In developing a code of ethics, always disregard anonymous reports.

https://amauoed.blogspot.com/search/label/Ethics 3/9
2/26/2021 AMA Answers: Ethics
Select one:
True
False

The step in implementing a code wherein a procedure is conducted for managers and supervisors
regularly to state that they and their staff understand and apply the provisions of the code.

Answer:
Affirmation

An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.

Select one:
a. Assurance, reporting and reviews
b. Shareholders
c. Society or the wider community
d. Customer Relations

The Code of Ethics would be effective if distributed as an executive mandate.

Select one:
True
False

A copy of the code must be inserted in the Annual Report for the shareholders and the public to
know about the company's position regarding ethical matters.

Select one:
True
False

In developing a code of ethics, always disregard anonymous reports.

Select one:
True
False

https://amauoed.blogspot.com/search/label/Ethics 4/9
2/26/2021 AMA Answers: Ethics

The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.

Select one:
True
False

Allowing the destruction of discoverable evidence is legal if approved by a higher official.

Select one:
True
False

A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.

Select one:
a. Monetary Gain
b. Chain Letter
c. Identity theft

This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.

Answer:
Traffic Analysis

A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?

Select one:
a. Account Verification or "Phisher" exams
b. Con Artists and Email Questionnaires
c. "Find Out Everything on Anyone" Scams

The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.

Select one:

https://amauoed.blogspot.com/search/label/Ethics 5/9
2/26/2021 AMA Answers: Ethics

a. Data Forecasting
b. Data Modelling
c. Using Back Doors
d. Domain Hijacking

What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?

Select one:
a. Redoing Code Due to Management Changes
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources

This type of coding is done to have minimum reworking to do at the testing phase.

Select one:
a. Code Design
b. Database Administrator
c. Code Review
d. Data Forecasting

This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.

Select one:
a. Pseudo Code
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources

These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.

Select one:
a. Database Administrator
b. Data Forecasting
c. Data Modelling
d. Using Back Doors

https://amauoed.blogspot.com/search/label/Ethics 6/9
2/26/2021 AMA Answers: Ethics

The process of creating an architecture diagram that represents the entities and their
corresponding relationship within a corporate database.

Select one:
a. Data Modelling
b. Domain Hijacking
c. Using Back Doors
d. Data Forecasting

What type of coding practice should be done when operating systems are upgraded?

Select one:
a. Redoing Code Due to Management Changes
b. Staying Current with Coding Practices
c. Ethical Use of System Resources
d. Correct Use of Memory

A key player in information technology who is responsible for all of the data within a corporation.

Select one:
a. Database Administrator
b. Social Audit
c. Computer Programmer
d. Coder

The process of stealing a domain name from another entity.

Select one:
a. Trojan horses
b. Cable modem hacking
c. Domain hijacking
d. Computer virus

This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.

Select one:
a. Code Design
b. Code Review
c. Data Forecasting
d. Database Administrator

https://amauoed.blogspot.com/search/label/Ethics 7/9
2/26/2021 AMA Answers: Ethics

Write TRUE or FALSE in the space provided.


Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.

Answer:
FALSE

The process of collecting data about a person using false pretenses.

Answer:
Pretexting

Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases
and rentals. This is an example of what kind of ethical dilemma in privacy?

Answer:
Parental Surveillance

This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.

Answer:
Penetration testing

Write TRUE or FALSE in the space provided.


National security and individual privacy are both critical and important to consider.

Answer:
TRUE

- February 18, 2021 2 comments:

Labels: Ethics, GE6107, GE6107 Ethics

Home Older Posts

Subscribe to: Posts (Atom)

https://amauoed.blogspot.com/search/label/Ethics 8/9
2/26/2021 AMA Answers: Ethics

COURSES

ENGL6100 ENGL6100 - Purposive Communication 2 Purposive Communication 2 Database


Management System 1 IT6202 IT6202 - Database Management System 1 Calculus 1 MATH6100 MATH6100 -
Calculus 1 Computer Programming 1 ITE6102 ITE6102 - Computer Programming 1 GE6102 GE6102 - The Contemporary World The Contemporary World GMAT111
GMAT111 - General Mathematics General Mathematics Practical Research 1 RSCH -110 RSCH -110 - Practical Research 1 Ethics GE6107 GE6107 Ethics GE6101 GE6101 - Readings in
Philippine History GE6106 GE6106 - Purposive Communication Purposive Communication Readings in Philippine History

Powered by Blogger.

https://amauoed.blogspot.com/search/label/Ethics 9/9

You might also like