M0084 – Sistem Informasi dalam Manajemen Multiple Choice – Individual Assignment

advertisement

M0084 – Sistem Informasi dalam Manajemen

Multiple Choice – Individual Assignment

Pertemuan – 22

Ethical Implications of Information

1.

Pirating software is an example of violating: a.

morals. b.

ethics. c.

laws. d.

character.

2.

A suite of guiding beliefs, standards, or ideals that pervades an individual, group, or community of people is: a.

ethics. b.

morals. c.

integrity. d.

laws.

3.

Which of the following federal laws restricted the federal government's right to match computer files for the purpose of determining eligibility for government programs or identifying debtors? a.

Electronic Communications Privacy Act b.

Computer Matching and Privacy Act c.

Small Business Computer Security and Education Act d.

Counterfeit Access Device and Computer Fraud and Abuse Act

4.

When an internal auditor meets with a manager in a several-hour session for the purpose of learning how the manager's unit is carrying out the corporate credo, it is referred to as an: a.

ethics orientation. b.

ethics audit. c.

ethics program. d.

ethics indoctrination.

5.

In the corporate credo for Security Pacific Corporation, that says, "We must be committed to promote a climate of mutual respect, integrity, and professional relationships, characterized by open and honest communication within and across all levels of the organization," who is the commitment to? a.

Commitment to employee b.

Commitment of employee to Security Pacific c.

Commitment of employee to employee d.

Commitment to stockholder

6.

Who is the person in the firm who is the most logical choice for implementing the firm's ethics program?

a.

CEO b.

President c.

CIO d.

End user

7.

The fact that e-mail has provided an entirely new means of communication is referred to as: a.

the transformation factor. b.

the invisibility factor. c.

logical malleability. d.

the communications factor.

8.

The type of audit that is not conducted to verify the accuracy of records but rather to validate the effectiveness of procedures is the: a.

financial audit. b.

operational audit. c.

concurrent audit. d.

external audit.

9.

The system feature that checks to see if the system is designed to prevent, detect, or correct errors, during an operational audit is referred to as: a.

adequacy of controls. b.

efficiency. c.

security. d.

compliance with company policy.

10.

The input subsystem for a financial information system that gathers environmental data is the: a.

internal audit subsystem. b.

transaction processing subsystem. c.

financial intelligence subsystem. d.

forecasting subsystem.

11.

Which output subsystem for a financial information system prepares long-term financial forecasts? a.

Transaction processing subsystem b.

Accounting information subsystem c.

Funds management subsystem d.

Forecasting subsystem

12.

Which of the following is not one of the four subdivisions of the ACM Code of Ethics and Professional Conduct? a.

Responsibility to Constituents b.

General Moral Imperatives c.

More Specific Professional Responsibilities d.

Organizational Leadership Imperatives

13.

The part of the ACM Code of Ethics and Professional Conduct that says the ACM member has a responsibility to support only legal use of computing resources is: a.

General Moral Imperatives. b.

More Specific Professional Responsibilities. c.

Organizational Leadership Imperatives. d.

Compliance with the Code.

14.

Which of the following is not a main responsibility of the Software Engineering Code of Ethics and Professional Practice? a.

Responsibility to constituents b.

Professional performance c.

Social responsibility d.

Self improvement

15.

Under which program heading should formal sessions be scheduled with the firm's executives to review the financial systems: transaction processing, financial information, and executive information? a.

Achieving a higher level of understanding of accounting principles. b.

Reviewing the information systems that accomplish financial reporting and taking remedial action. c.

Educating the firm's executives on financial systems. d.

Keeping tight control on money spent for information resources.

Download