chapter 4 - 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

___ uses individual atoms and molecules to create computer chips and other devices.

. B. nanotechnology

what are the steps in conducting an ethical analysis?

1. ID and describe the facts clearly 2. define the conflict or answer 3. ID stakeholders 4. ID the options that you can reasonably take 5. ID the potential consequences of your options

which of the following statements about cookies is NOT true?

A. Cookies are installed only at the user's request

which of the following adjusts copyright laws to the internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

A. Digital Millennium Copyright Act

which of the following U.S. laws gives patients access to personal medical records and the right to authorize this information can be used to disclosed?

A. HIPPA

a colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. you tell her that if everyone were to take office supplies, then the loss would no longer be minimal. your rationale expresses which of the following ethical principles?

A. Kant's Categorical Imperative

____states that the value or power of a network grows exponentially as a function of the number of network members.

A. Metcalfe's

which of the following is a multitasking, multiuser, operating system developed by ell Laboratories that operates on a wide variety of computers from different manufacturers?

A. Unix

which of the following became the standard PC in the personal computer era?

A. Wintel PC

the introduction of the minicomputer:

A. allowed computers to be customized to the specific needs of departments or business units.

all of the following are steps in the process for analyzing an ethical issue except:

A. assigning responsibility

advertisers use ___ in order to display more relevant ads based on a user's search and browsing history.

A. behavioral targeting

the Network Advertising Initiative is an industry association that:

A. has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress from abuses

redesigning and automating business processes can be seen a double-edged sword because:

A. increases in efficiency may be accompanied by job losses

which of the following is not an IT infrastructure service component?

A. operating system software services

in the ____ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

A. opt-in

the use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

A. profiling

which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?

A. quality of life

_____ means that you accept the potential costs and obligations for the decisions you make.

A. responsibility

which ethical rule states that is an action cannot be taken repeatedly, it is not right to take all?

A. slippery-slope rule

which of the following regulates the U.S federal government collection, use, and disclosure of information?

A. the Privacy Act

CVS refers to:

A> eyestrain related to computer display screen use

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing era, 2. client/server, 3. enterprise era, 4. personal computer; and 5. mainframe and minicomputer.

B. 5,4,2,3,1

___ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

B. Accountability

___ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

B. Due process

Nanotubes are about 10,000 times thinner than:

B. a human hair

a man steals from a grocery store in order to feed his starving family. which of the following best expresses the utilitarian principle in evaluating this situation?

B. his action is acceptable, because the higher social value is the survival of the family

which of the following best describes the effect that new I.T has on society?

B. it has a ripple effect, raising new ethical, social, and political issues

when a cookie is created during a website visit, it is stored:

B. on the hard drive of the vistor's computer

The NAI is an industry association formed to help with which of the following?

B. online privacy issues

"look and feel" copyright infringement lawsuits are concerned with:

B. the distinction between an idea and it expression

in a multitiered network:

B. the work of the entire network is balanced over several levels of servers

which one of the following best describes how new I.S. can result in legal gray areas?

B. they work with networked, digital which are more difficult to control than information stored manually.

which of the following is a data analysis technology that finds obscure connections between data in disparate sources?

C. NORA

which of the following runs an antipiracy hotline for individuals to report piracy activities?

C. SIIA

the right to ___ is a feature of the GDPR that allows individuals to request that organizations delete their personal data.

C. be forgotten

which of the following is NOT a principle cause of poor system performance?

C. computer abuse

which of the following terms refers to significant disparities in access to computers and the internet among different social groups and different locations?

C. digital divide

which of the following is NOT one of the current key technology trends that raises ethical issues?

C. increase in data quality

FIP principles are based on a belief in which of the following?

C. mutuality of interest between the record holder and the individual

_____ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

C. patent law

all of the following are factors in U.S. federal sentencing guidelines with respect to business executives except:

C. the use of technology to commit the crime

what percent of global internet users use Google search and other Google services?

D. about 80 percent

A____ is used to communicate between a user and an organizations back-end systems.

D. application server

all of the following laws apply to actions by the federal government EXCEPT the:

D. children's online privacy protection act

all of the following are FTC privacy guidelines EXCEPT:

D. firms should limit the length of time that any personal data is stored to six months or less

which of the following best describes Immanuel Kant's categorical imperative?

D. if an action is not right for everyone to take, it is not right for anyone to take.

the ethical no-free-lunch rule states state:

D. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

D. it blurs the traditional boundaries between work and family time

which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

D. the golden rule

which of the following statements about trademarks is NOT true?

D. trademark laws are designed solely to protect consumers

a client computer networked to a server computer, with processing split between the two types of machines, is called a ___.

D. two-tiered client/server architecture

all of the following are, or were, file-sharing services EXCEPT:

D.pandora

which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?

E. Data Management

which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

E. Trade secret

which of the following were involved in what has been called the patent trial of the century?

E. apple and samsung

which of the following is NOT a U.S. federal law affecting private institutions?

E. computer matching and privacy protection act

interpretations of Moore's law assert that:

E. computing power doubles every 18 months

which of the following is by far the most common source of business system failure?

E. data quality

all of the following are technical solutions to protecting user privacy EXCEPT:

E. data use policies

which of the five moral dimensions of the information age do the central business activities of Google Marketing Platform involve?

E. information rights and obbligations

which of the following is NOT a feature of the General Data Protection Regulation (GDPR)?

E. it prevents firms from using cookies

which of the following allows the EU to enforce GDPR requirements with non-EU countries?

E. privacy shield agreement

the obligation that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

E. quality of life

which of the following statements about spam is NOT true?

E. spamming is more tightly regulated in the US than in Europe

____ allows an organization to collect personal information without the user's explicit consent.

E. the opt-out model

which of the following is NOT a difficulty in establishing patent protection?

E. the requirement that the work must be a secret

the FIP principle of Notice/Awareness states that:

E. websites must disclose their information practices before collecting data

which of the following is NOT a technology driver transforming IT infrastructure?

E. widespread rejection of technology standards

identifying the stakeholders- people who have a vested interest in the outcome of the decision- is the last step in analyzing an ethical issue. true or false?

False

in todays legal environment, managers who are convicted for the misuse of I.S. are unlikely to be given a prison sentence. True or False?

False

Big Tech firms are facing increasing scrutiny with respect to alleged anticompetitive and unfair practices. True or False?

True

Ethics describe the principles of right and wrong that can be used by individuals to make choices to guide their behavior. true or false?

True

because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. true or false?

True

malicious software that can secretly install itself on an internet users computer by piggybacking on other applications and then report the users movements on the internet to other computers, is called spyware. True or False?

True

one of the key concepts in patent law is originality. true or false?

True

routine violation of individual privacy are made easier by advances in data storage. True or False?

True

some forms of illegal sharing of music files have declined as legitimate online music stores and streaming services have expanded. true or false?

True

trade secret laws grant a monopoly on the idea behind a work product. True or false?

True

websites using cookie technology cannot directly obtain visitors names and addresses from the cookie. true or false?

True

the obligations that individuals and organizations have concerning rights to intellectual property involves which one of the following moral dimensions of the information age?

a. property right and obligations

The US CAN-SPAM act:

b. requires commercial email senders to identify themselves

according to ______, you should take the action that produces the least harm.

b. the risk aversion principle

which of the following occurs when muscles groups are forced through tens of thousands of repetitions under low-impact loads?

c. RSI

which of the following protects the author of a book from having their work copied by others?

c. copyright laws

digital media differs from a physical book in all of the following ways except:

e. ease of establishing uniqueness

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. true or false?

false

due process is a feature of political systems and allows individuals to recover damages done to them by others. true or false?

false

software can never be considered to be a trade secret. true or false ?

false

software programs were unprotected by copyright law until the early 1990s. true or false

false

Most internet businesses do very little to protect the privacy of their customers. true or false?

true

The DMCA requires ISP's to take down sites of copyright infringers they are hosting when the ISP's are notified of the problem. true or false?

true

The European Parliament has banned unsolicited commercial messaging. true or false?

true

advertising networks such as microsoft advertising, yahoo, and google's marketing platform are capable of tracking personal browsing behavior across thousands of websites. true or false?

true

computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. true or false?

true

oligopolies and monopolies dominate the Web and mobile platform. true or false?

true

privacy protection in Europe has historically been much stronger than in the US. True or False?

true

some experts believe that exposure to computers reduces intelligence and cognitive abilities. true or false?

true

the claim to privacy is protected by the US constitution. true or false?

true

web beacons are tiny, invisible software programs embedded in email messages and web pages that are used to track and report a user's online behavior. true or false?

true


Conjuntos de estudio relacionados

ACG Ch. 2 missed q's / confusing info

View Set

CCNA Introduction to Networks Chapter 6 Study Guide

View Set

UNIT 7 - Leading effective project teams

View Set

Agents to Control Blood Glucose Levels

View Set

Chapter 4 : OSI - Transport Layer

View Set

Parent-Child Nursing Set 2-2 (Chapters 25, 26, 27, 28, and 29)

View Set