🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Understanding Various Relationships in Chapter 2
30 Questions
0 Views

Understanding Various Relationships in Chapter 2

Created by
@AdoredSanAntonio

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Zynga is known for offline console games like ChefVille and CityVille.

False

The general manager of CityVille left Zynga to join a competitor called Kixeye.

True

Zynga accused the former employee of stealing files containing non-critical information.

False

Whistleblowing involves attracting attention to acts that benefit the company.

<p>False</p> Signup and view all the answers

Whistleblowers usually have special information based on their personal biases.

<p>False</p> Signup and view all the answers

A conscientious employee would not try to correct internal problems within the company.

<p>False</p> Signup and view all the answers

IT workers and employers have a simple relationship that does not require ongoing effort.

<p>False</p> Signup and view all the answers

An IT worker and an employer typically agree on fundamental aspects of their relationship after the worker accepts an employment offer.

<p>False</p> Signup and view all the answers

Job title, general performance expectations, and salary are aspects that IT workers and employers may agree upon before the worker accepts an employment offer.

<p>True</p> Signup and view all the answers

The relationship between IT workers and employers does not involve any agreement on specific work responsibilities.

<p>False</p> Signup and view all the answers

The company's code of conduct is not a document where aspects of the relationship between IT workers and employers may be addressed.

<p>False</p> Signup and view all the answers

IT workers and employers do not need to make any agreements regarding work hours and company benefits before the worker accepts an employment offer.

<p>False</p> Signup and view all the answers

The policy addresses protection of the data privacy rights of employees, customers, suppliers, and others.

<p>True</p> Signup and view all the answers

Employee monitoring includes wiretapping and eavesdropping on phone conversations.

<p>False</p> Signup and view all the answers

The policy addresses the inappropriate use of IT resources, such as Web surfing and personal emailing.

<p>True</p> Signup and view all the answers

Disciplinary actions for IT-related abuses are not defined in the policy.

<p>False</p> Signup and view all the answers

There is a process in place for communicating the policy to employees.

<p>True</p> Signup and view all the answers

The corporate firewall is not required according to the policy.

<p>False</p> Signup and view all the answers

Strong codes of ethics are common in the IT arena.

<p>False</p> Signup and view all the answers

Public trust in professionals is based on the expectation of ethical behavior.

<p>True</p> Signup and view all the answers

Professionals can use a code of ethics for self-assessment.

<p>True</p> Signup and view all the answers

Peers cannot use a code of ethics for recognition or censure.

<p>False</p> Signup and view all the answers

There is a universal code of ethics for IT workers.

<p>False</p> Signup and view all the answers

Penalties for serious violations can include loss of the right to practice.

<p>True</p> Signup and view all the answers

Viewing sexually explicit material at work could lead to lawsuits and allegations of creating a harassment-friendly environment.

<p>True</p> Signup and view all the answers

One in four men admit to viewing porn at work according to the Fawcett Society's survey.

<p>False</p> Signup and view all the answers

Organizations rarely take disciplinary action against employees who view pornography at work.

<p>False</p> Signup and view all the answers

The executive director of the Pentagon's Missile Defense Agency issued a memo warning employees to stop using work computers to access Internet porn sites.

<p>True</p> Signup and view all the answers

Pornography sites are never used by criminals or foreign intelligence agencies as a means to access government and corporate computer networks.

<p>False</p> Signup and view all the answers

Private data in organizations includes information like individual employees' salary, health records, and performance ratings.

<p>True</p> Signup and view all the answers

More Quizzes Like This

Human Relationship Chapter 2
29 questions
Biochemistry Chapter 2: Water
27 questions

Biochemistry Chapter 2: Water

EffectualBlackTourmaline5910 avatar
EffectualBlackTourmaline5910
Use Quizgecko on...
Browser
Browser