Chapter 4
Which of the following is not a principal cause of poor system performance?
Computer abuse
Which of the following is by far the most common source of business system failure?
Data quality
Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?
Digital divide
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
False
Software can never be considered to be a trade secret.
False
Software programs were unprotected by copyright law until the early 1990s.
False
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time.
Which of the following statements about spam is not true?
Spamming is more tightly regulated in the United States than in Europe.
CVS refers to:
eyestrain related to computer display screen use.
Redesigning and automating business processes can be seen as a double-edged sword because:
increases in efficiency may be accompanied by job losses.
The U.S. CAN-SPAM Act:
requires commercial email senders to identify themselves.
Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?
Quality of life
Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?
RSI
Big Tech firms are facing increasing scrutiny with respect to alleged anticompetitive and unfair practices.
True
Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.
True
Malicious software that can secretly install itself on an Internet user's computer by piggybacking on other applications and then report the user's movements on the internet to other computers. is called spyware.
True
Most Internet businesses do very little to protect the privacy of their customers.
True
Oligopolies and monopolies dominate the Web and mobile platform.
True
One of the key concepts in patent law is originality.
True
Privacy protection in Europe has historically been much stronger than in the United States.
True
Some experts believe that exposure to computers reduces intelligence and cognitive abilites.
True
Some forms of illegal sharing of music files have declined as legitimate online music stores and streaming services have expanded.
True
The DMCA requires ISPs to take down sites of copyright infringers they are hosting when the ISPs are notified of the problem.
True
The European Parliament has banned unsolicited commercial messaging.
True
The claim to privacy is protected by the U.S. Constitution.
True
Trade secret laws grant a monopoly on the ideas behind a work product.
True
Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.
True
Websites using cookie technology cannot directly obtain visitors' names and addresses from the cookie.
True
Advertising networks such as Microsoft Advertising, Yahoo, and Google's Marketing Platform are capable of tracking personal browsing behavior across thousands of websites.
True