Term
Jill waited until the night before a paper was due to begin writing the paper. She finds that a similar paper on her topic was written and shared on the Internet. She decides that in the interest of time, she will use this paper and change a few words to make it her own. Which of the following best describes her behavior? |
|
Definition
[image] There is no problem here because the Internet paper was shared voluntarily [image] Because ‘everyone else does it’, this is not a big deal [image] Jill has violated academic integrity and committed plagiarism [image] Since the instructor said Internet sources are allowed, Jill's behavior is acceptable |
|
|
Term
Organizations can ensure information integrity in a network by developing policies to: |
|
Definition
[image] Specify how data is actually inputted [image] Indicate who has the authorization to change such data [image] Track how and when data are changed and by whom [image] All of the above |
|
|
Term
A hardware security tool that helps protect an organization against security breaches by issuing masks to protect the identity of a corporation's employees who are accessing the World Wide Web is a ___________. |
|
Definition
[image] proxy server [image] firewall [image] anti-virus program [image] masking program |
|
|
Term
The same copyright laws that cover physical books, artwork, and other creative material are still applicable in the digital world. |
|
Definition
[image] TRUE [image] FALSE |
|
|