Business Ethics ch 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

In 2008 the F.D.A. declared that food from cloned animals and their offspring was safe to eat, but: a. Imposed a voluntary ban on the sale of cloned animals. b. Challenged the ethical basis of cloning. c. Required vendors to label meat from cloned animals as "cloned." d. Outlawed the sale of cloned meat until further testing confirmed its safety.

a. Imposed a voluntary ban on the sale of cloned animals.

In 2005, the United Nations approved a declaration that: a. Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life." b. Called for the fate of therapeutic cloning to be determined by the individual nations. c. Encouraged all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life." d. Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.

a. Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."

A CIO is the company's: a. Chief intelligence oracle. b. Chief information officer. c. Coordinator of international operations. d. Controller of internal overhead.

b. Chief information officer.

The practice of downloading copyrighted songs was challenged because it: a. Created congestion and overloaded demands on the servers. b. Denied legitimate compensation to the recording artists. c. Favored major recording companies and selective artists over others. d. Resulted in bankruptcy for retail music outlets across the country.

b. Denied legitimate compensation to the recording artists.

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users: a. Software Business Piracy Act. b. Digital Millennium Copyright Act. c. Intellectual Property Millennium Act. d. Copyright Act of 1998.

b. Digital Millennium Copyright Act.

In some economically developed countries and most developing countries around the world genetically modified food was: a. Looked upon with caution but generally accepted. b. Welcomed as a way to increase crop yields. c. Rejected by most governments. d. Viewed with extreme caution.

b. Welcomed as a way to increase crop yields.

Intellectual property refers to: a. Protecting one's ideas, concepts, and symbolic creations. b. Special laws protecting copyrights, patents, and trademarks. c. Prohibiting the downloading of commercial software or video games. d. All of the above.

d. All of the above.

The Children's Online Privacy Protection Act of 1998 requires: a. Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13. b. Web site operators to post user privacy laws. c. Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States. d. All of the above.

d. All of the above.

The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by: a. Minority households. b. Single-woman households. c. Men between the age of 30 and 50. d. College students and recent graduates.

d. College students and recent graduates.

Over time the role of the CIO: a. Has remained the same. b. Has decreased in level of responsibility. c. Has changed dramatically, superseding the role of the chief executive officer. d. Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.

d. Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.


Conjuntos de estudio relacionados

Chapter 15: Aging and the Elderly

View Set

EBP final questions, EBP Data Collection, Reasearch EBP Data analysis

View Set

School Neuropsychology, Traumatic Brain Injury, and Other Concepts

View Set

CHAPTER 4: RESEARCH DESIGN/LOGIC OF CAUSATION

View Set

1,001 CCNA Questions Chapter 12: Troubleshooting Network Communication

View Set