Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____. a. unethical and illegal b. legal, but unethical c. ethical, but illegal d. legal and ethical
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____. a. unethical and illegal b. legal, but unethical c. ethical, but illegal d. legal and ethical
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
Related questions
Question
QUESTION 1
- Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____.
|
a. |
unethical and illegal |
|
b. |
legal, but unethical |
|
c. |
ethical, but illegal |
|
d. |
legal and ethical |
QUESTION 2
- In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
|
a. |
encapsulation |
|
b. |
cybersquatting |
|
c. |
phishing |
|
d. |
nonrepudiation |
QUESTION 3
- In the context of information technology in workplaces, which allows adding new tasks to employees’ responsibilities?
|
a. |
Job rotation |
|
b. |
Job virtualization |
|
c. |
Job upgrading |
|
d. |
Job deskilling |
QUESTION 4
- A _____ consists of self-propagating program code that is triggered by a specified time or event.
|
a. |
virus |
|
b. |
cable shield |
|
c. |
backdoor |
|
d. |
mirror disk |
QUESTION 5
- When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.
|
a. |
spamming |
|
b. |
typosquatting |
|
c. |
cyberstalking |
|
d. |
phishing |
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, management and related others by exploring similar questions and additional content below.Recommended textbooks for you
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON