0% found this document useful (0 votes)
551 views9 pages

AMA Answers

This document provides answers to ethics questions related to the subject of system administration. It discusses the responsibilities of system administrators, issues around hackers discovering vulnerabilities, the concept of full disclosure of vulnerabilities, the importance of audits, networking involving computer systems, the powers of system administrators within companies, and policies around disclosing vulnerabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
551 views9 pages

AMA Answers

This document provides answers to ethics questions related to the subject of system administration. It discusses the responsibilities of system administrators, issues around hackers discovering vulnerabilities, the concept of full disclosure of vulnerabilities, the importance of audits, networking involving computer systems, the powers of system administrators within companies, and policies around disclosing vulnerabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

2/26/2021 AMA Answers

Higit Pa Gumawa ng Blog Mag-sign in

AMA Answers
AMAOED Answers 95-100% correct with proof. Better than Brainly.ph and coursehero because this is free and tested

THURSDAY, FEBRUARY 18, 2021 FIND BY COURSE NAME


Calculus 1 (11)
Part 2 GE6107 - Ethics (BS IT and BS CS Only) Computer Programming 1 (5)
Database Management System 1 (18)
ENGL6100 (21)
ENGL6100 - Purposive Communication 2
The daily responsibilities of the administrator such as monitoring the system, managing users and (21)
passwords, allocating system resources and installations. Ethics (2)
GE6101 (1)
Answer: GE6101 - Readings in Philippine History (1)
System administration GE6102 (4)
GE6102 - The Contemporary World (4)
GE6106 (1)
GE6106 - Purposive Communication (1)
GE6107 (2)
GE6107 Ethics (2)
They are responsible for finding vulnerabilities. They also have their own set of moral issues to General Mathematics (3)
address when reversing engineering products for the protection purposes of discovering GMAT111 (3)
vulnerabilities.
GMAT111 - General Mathematics (3)
IT6202 (18)
Select one:
IT6202 - Database Management System 1
a. Black hat hackers (18)
b. Auditor ITE6102 (5)

c. System administrator ITE6102 - Computer Programming 1 (5)


MATH6100 (11)
d. White hat hackers
MATH6100 - Calculus 1 (11)
Practical Research 1 (3)
Purposive Communication (1)
Purposive Communication 2 (21)
Readings in Philippine History (1)
The process of broadly disseminating as much information as possible regarding product or system RSCH -110 (3)
vulnerabilities so that potential victims possess the same information as the potential hackers. RSCH -110 - Practical Research 1 (3)
The Contemporary World (4)
Select one:
a. Full disclosure
b. Nondisclosure policy
c. Ethical duty to warn
d. Limited disclosure

Performing shortcuts when implementing a new system is not always a good idea, but
unfortunately, sometimes it is necessary in order to meet aggressive time constraints.

Select one:

https://amauoed.blogspot.com 1/9
2/26/2021 AMA Answers

True
False

A crucial process for determining system integrity and business practice integrity.

Answer:
Audits

This involves controlling an integrated computer system and maximizing performance and
productivity of that system.

Answer:
Networking

They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats, POPULAR AMA COURSES

view data on personal computers connected to the corporate network and much more. GE6101 - Readings in Philippine History
The history or story of a society or group of
Select one: people is rooted from their ________,
EXCEPT. Select one: a. Legends and Arts b.
a. Auditor Fol...
b. White hat hackers
RSCH -110 - Practical Research 1 - Learning
c. System administrator Activities
Question 1 Correct Marked out of 1.00 Flag
d. Black hat hackers question Question text True or False. If the
statement is true, write the word True. If
False,...

RSCH -110 - Practical Research 1 - Long


Quizzes
Which of the following is not included in the
research experience? Select one: a. Identity
Having this policy within a company means that whomever signs the nondisclosure agreement of the researcher b. Social class of the
agrees to keep the vulnerability information within that organization tightly contained so that no one research...
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities. GE6102 - The Contemporary World
also have a look at - Contemporary
World Prelims answers - Contemporary World
Select one: Midterm answers - Contemporary World all
a. Limited disclosure short quizes answe...

b. Nondisclosure policy GMAT111 - General Mathematics


Solve for the value of x: 1. 7 x+4 = 49 2x-1
c. Ethical duty to warn
x = Answer 1. 4 x+2 = 8 2x x=
d. Full disclosure Answer Complete the ...

When a patch is not aptly tested, problems arise.

Select one:
True
False

https://amauoed.blogspot.com 2/9
2/26/2021 AMA Answers

Disclosing referral fees to the client is up to the executive's decision.

Select one:
True
False

The step in implementing a code wherein a procedure is conducted for managers and supervisors
regularly to state that they and their staff understand and apply the provisions of the code.

Answer:
Affirmation

An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.

Select one:
BLOG ARCHIVE
a. Assurance, reporting and reviews
▼ 2021 (31)
b. Shareholders ▼ February (8)
c. Society or the wider community Part 2 GE6107 - Ethics (BS IT and BS
CS Only)
d. Customer Relations
Part 1 GE6107 - Ethics (BS IT and BS
CS Only)
Short Quiz 007 - IT6202 - Database
Management Syst...
Assignment 009 - IT6202 - Database
Management Syst...
The Code of Ethics would be effective if distributed as an executive mandate. Assignment 008 - IT6202 - Database
Management Syst...
Select one: Assignment 007 - IT6202 - Database
Management Syst...
True
Assignment 006 - IT6202 - Database
False Management Syst...
Long Quiz 002 - IT6202 - Database
Management System 1

► January (23)

► 2020 (38)
A copy of the code must be inserted in the Annual Report for the shareholders and the public to
know about the company's position regarding ethical matters.

Select one:
True
False

In developing a code of ethics, always disregard anonymous reports.

Select one:

https://amauoed.blogspot.com 3/9
2/26/2021 AMA Answers

True
False

The step in implementing a code wherein a procedure is conducted for managers and supervisors
regularly to state that they and their staff understand and apply the provisions of the code. 駐在3年目。英語の
Answer: 会議が苦手
Affirmation

ビジネス英語スピーキング
教材の決定版!優秀な
An area in the Code of Ethics that emphasizes the importance of customer satisfaction and good
faith in all agreements, quality, fair pricing and after-sales service.
ビジネスパーソンが選ぶ【60
日返金保証】
Select one:
a. Assurance, reporting and reviews
b. Shareholders
c. Society or the wider community
d. Customer Relations

The Code of Ethics would be effective if distributed as an executive mandate.

Select one:
True
False

A copy of the code must be inserted in the Annual Report for the shareholders and the public to
know about the company's position regarding ethical matters.

Select one:
True
False

In developing a code of ethics, always disregard anonymous reports.

Select one:
True
False

https://amauoed.blogspot.com 4/9
2/26/2021 AMA Answers

The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.

Select one:
True
False

Allowing the destruction of discoverable evidence is legal if approved by a higher official.

Select one:
True
False

A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.

Select one:
a. Monetary Gain
b. Chain Letter
c. Identity theft

This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.

Answer:
Traffic Analysis

A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?

Select one:
a. Account Verification or "Phisher" exams
b. Con Artists and Email Questionnaires
c. "Find Out Everything on Anyone" Scams

The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.

Select one:

https://amauoed.blogspot.com 5/9
2/26/2021 AMA Answers

a. Data Forecasting
b. Data Modelling
c. Using Back Doors
d. Domain Hijacking

What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?

Select one:
a. Redoing Code Due to Management Changes
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources

This type of coding is done to have minimum reworking to do at the testing phase.

Select one:
a. Code Design
b. Database Administrator
c. Code Review
d. Data Forecasting

This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.

Select one:
a. Pseudo Code
b. Correct Use of Memory
c. Staying Current with Coding Practices
d. Ethical Use of System Resources

These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.

Select one:
a. Database Administrator
b. Data Forecasting
c. Data Modelling
d. Using Back Doors

https://amauoed.blogspot.com 6/9
2/26/2021 AMA Answers

The process of creating an architecture diagram that represents the entities and their
corresponding relationship within a corporate database.

Select one:
a. Data Modelling
b. Domain Hijacking
c. Using Back Doors
d. Data Forecasting

What type of coding practice should be done when operating systems are upgraded?

Select one:
a. Redoing Code Due to Management Changes
b. Staying Current with Coding Practices
c. Ethical Use of System Resources
d. Correct Use of Memory

A key player in information technology who is responsible for all of the data within a corporation.

Select one:
a. Database Administrator
b. Social Audit
c. Computer Programmer
d. Coder

The process of stealing a domain name from another entity.

Select one:
a. Trojan horses
b. Cable modem hacking
c. Domain hijacking
d. Computer virus

This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.

Select one:
a. Code Design
b. Code Review
c. Data Forecasting
d. Database Administrator

https://amauoed.blogspot.com 7/9
2/26/2021 AMA Answers

Write TRUE or FALSE in the space provided.


Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.

Answer:
FALSE

The process of collecting data about a person using false pretenses.

Answer:
Pretexting

Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases
and rentals. This is an example of what kind of ethical dilemma in privacy?

Answer:
Parental Surveillance

This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.

Answer:
Penetration testing

Write TRUE or FALSE in the space provided.


National security and individual privacy are both critical and important to consider.

Answer:
TRUE

- February 18, 2021 2 comments:

Labels: Ethics, GE6107, GE6107 Ethics

Home Older Posts

Subscribe to: Posts (Atom)

https://amauoed.blogspot.com 8/9
2/26/2021 AMA Answers

駐在3年目。英語の
会議が苦手
ビジネス英語スピーキング教材の
決定版!優秀なビジネスパーソン
パタプライングリッシュ が選ぶ【60日返金保証】
COURSES

ENGL6100 ENGL6100 - Purposive Communication 2 Purposive Communication 2 Database


Management System 1 IT6202 IT6202 - Database Management System 1 Calculus 1 MATH6100 MATH6100 -
Calculus 1 Computer Programming 1 ITE6102 ITE6102 - Computer Programming 1 GE6102 GE6102 - The Contemporary World The Contemporary World GMAT111
GMAT111 - General Mathematics General Mathematics Practical Research 1 RSCH -110 RSCH -110 - Practical Research 1 Ethics GE6107 GE6107 Ethics GE6101 GE6101 - Readings in
Philippine History GE6106 GE6106 - Purposive Communication Purposive Communication Readings in Philippine History

Powered by Blogger.

https://amauoed.blogspot.com 9/9

You might also like