Ovido
Idioma
  • Inglés
  • Español
  • Francés
  • Portuguesa
  • Alemán
  • Italiana
  • Holandés
  • Sueco
Texto
  • Mayúsculas

Usuario

  • Iniciar sesión
  • Crear cuenta
  • Actualizar a Premium
Ovido
  • Inicio
  • Iniciar sesión
  • Crear cuenta

info systems final

The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

Utilitarian

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

Rights

The _________ approach states that ethical actions treat all human beings equally, or, if unequally, then fairly.

Fairness

The _________ approach highlights the interlocking relationships that underlie all societies.

Common good

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under rules, regardless of consequences.

Deontology

_________ is the first step in the general framework for ethics.

Recognize issue

“Do I have sufficient information to make a decision?” is asked in the _________ step of the general ethics framework.

Getting facts

Choosing between the five ethical approaches occurs in the _________ step of the general ethics framework.

Valuate alternate actions

_________ is the final step in the general framework for ethics.

Act and reflect on outcome

_________ is a legal concept that gives individuals the right to recover damages done to them.

Liability

Machine learning is sometimes better than humans at ___________.

Recognizing patterns and relationships

_________ are AI-enabled crimes of high concern to experts.

Deepfakes

The technological advancement that has NOT enhanced AI is _________.

Qr codes

___________ require human experts; _____ must be formally structured as rules.

Expert systems, expert systems

A _________ is a result indicating that a condition exists when it does not.

False positive

___________ is a subset of machine learning using artificial neural networks trained on large data.

Deep learning

A(n) _______________ is a set of nodes that work in parallel to simulate the human brain.

Neural network

____________ is the ability of information systems to work with text the way humans do.

Natural language processing

___________ focuses on automatically and accurately transcribing human speech.

Speech recognition

A(n) _________________ agent is a software program that assists users or acts on their behalf.

Intelligent

Companies predict customer churn using ____ systems.

Machine learning

A(n) ___________ factory is a digitized operation that continuously collects and shares data.

Smart

A _________ to an information resource is any danger to which a system may be exposed.

Threat

The _________ of an information resource is the harm, loss, or damage that can result from a threat.

Exposure

A system’s ___________ is the possibility that it will be harmed by a threat.

Vulnerability

A(n) ___________ network is internal; a(n) ___________ network is external.

Trusted, untrusted

A major category of unintentional threats is ____.

Human error

Careless Internet surfing is _________ and an ___________ mistake.

Human error, unintentional

Opening a suspicious e-mail from a friend is _________ and an ___________ mistake.

Social engineering, unintentional

___________ is an attack where someone tricks employees into giving confidential information.

Social engineering

Holding the door open for someone without a badge is ___________ and an ___________ threat.

Tailgating, unintentional

___________ occurs when an unauthorized individual attempts illegal access to organizational information.

Espianoge

___________ occur when attackers steal or threaten to steal information and demand payment.

Information extortion

Intellectual property is NOT protected under _________ laws.

IP

A ___________ is an intellectual work not based on public information.

Trade secrets

___________ targets high-value individuals to steal sensitive information.

Whaling

Hackers use a botnet to perform a ___________.

Ddos attack

___________ causes pop-up advertisements to appear.

Adware

Keystroke loggers and screen scrapers are examples of ___________.

Spyware

Taking control of equipment like power grids is a ___________ attack.

Scada

___________ refers to malicious acts using computer systems to cause physical harm for political motives.

Cyber terrorism

Accepting risk and continuing operations without controls is risk ___________.

Risk acceptance

Using insurance to shift risk is risk __________.

Risk transfer

___________ is a physical control.

Walls, doors, fencing, gates security guards, locks, alarm systems

___________ is a communications control.

Firewall

___________ controls prevent unauthorized individuals from entering facilities.

Physical controls

___________ controls secure the movement of data across networks.

Communications

A ___________ site is fully configured with all services, communication links, and operations.

hotsite

Cuestionario
Finance Publique
instrutor
PP Parti 1 du cours
Rethorik
Politique Publique
Project Management
perception (8)
ISAD
Global City
okulär immunologi
approaches and methods in language teaching
Revisão de Gestão e Empreendedorismo - 2025.2 online
psykologu
engelska glosor v 50
Muskler
Kap 16 Harry's family
Cold War Key Facts, Dates and People
Childbirth
Histora, medeltiden
vocabulario inglés T.2
Quizz sur les sortilèges
Revisão de Direito do Trabalho - N2 2025.2 Luiza Márcia
vittring
muscles of the wrist and fingers
Esp Euc
RDE
Fluviala
narrativa
Quizz Harry Potter et la Chambre des Secrets FILM
mer massrörelser
Teoremi Analisi III
massrörelser
Eoliska processer
Glaciala processer
Periglaciala processer
Kontinenter and shit
Berg och skit
Vittring
Haemoglobin and oxygen transport
final huma
HP svenska ord
Te duele algo
Le dieta mediterranea
SNU Korean 3B 13-15과 단어
hej
kemi
gestion chapitre 1
gestion
Rizal
SNU Korean 3B 10-12과 단어