it/is chapter4
Companies cant realistically create error-free software because a. Any programming code is susceptible to error b. It is too expensive to create perfect software c. Errors can be introduces in the maintenance stage of development d. Any software of any compelxity with you have errors
B.
Cookies created during website visit are stored a. On the website's server b. On the user's computer c. On servers on by advertising network d. In the browser's application setting e. Nowhere, because they are only used doing a visit and I discarded once a visitor leave the website
B.
Gaining unapproved access to a computer is not a federal crime. a. true b. false
B.
Identifying the stakeholders people who have a vested interest in the outcome of the decisions is the last step in analysing an ethical issues a. true b. false
B.
In the ______ model of informed consent, personal information can be collected until the consumer specifically request that his or her data not be collected a. opt-in b. opt-out c. P3P d. PGP e. IPA
B.
In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted. a. true b. false
B.
Software programs were unprotected by the copyright law until the early 1990s a. true b. false
B.
Spam is legally defined as any email that is unsolicited a. true b. false
B.
Taking the action that produce the least harm best described as the a. Categorical imperative b. Risk aversion principal c. utilitarian principle d. golden rule e. no free lunch rule
B.
The European Parliament has yet to Ban unsolicited commercial messaging a. true b. false
B.
The US CAN-SPAM act of 2003 a. Mixed spamming illegal b. Requires spammer to identify themselves c. Has dramatically cut down spamming d. Does not override state anti- spamming law e. Does not out of the use of fake return address
B.
The ethical guidelines that asked you to put yourself in a place of others, and think of yourself as the object of the decision, is called the utilitarian principle a. true b. false
B.
The routine violation of individual privacy is made more difficult by advances in data storage. a.true b.false
B.
When A software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product a. To be part of a machine b. Similar to books c. a service d. To be an artistic expression e. A tangible product rather than a service
B.
Which of the following best describes how new information systems result in legal grey areas? a. They work with networked, electronic data, which are more difficult to control than information stored manually. b. They result in new situations that are not covered by old laws. c. They are implemented by technicians rather than managers d. They are created from sets of logical and technological rules rather than social organisational mores
B.
Which of the following best describes the effect that new information technology has on society ? a. It has a dampening effect on the discourse of business ethics b. It has a ripple effect, raising new ethical, social, and political issues. c. It is beneficial for society as a whole, why are raising dilemma for consumers d. It has a waterfall effect in raising ever more complex ethical issues
B.
Which of the following is not one of the types of information gathered by website tracking tools? a. Health concerns. b. Birthplace c. Income d. purchases e. Marital status
B.
______ is a social practice of having laws that are known and understood , along with the ability to appeal to higher authorities that laws are applied correctly a. Liability b. Due process c. The courts of appeal d. Accountability e. The judicial system
B.
______ prohibits an organisation from collecting any personal information unless the individual specifically takes action to approve information collection and use a. Illegal safe harbour b. the opt-in model c. The FIP set of guidelines d. P3P
B.
_______ is a feature of social institution that means Mechanisms are in place today determine responsibility for an action a. due process b. accountability c. The courts of appeal d. The judicial system e. Liability
B.
Key difference between software and books include all of the following except a. Software contains more information than a book b. So there is less easily inspected than a book c. Software products are more easily compare to each other than books d. Software is understood to be more fallible than a book
C.
The extreme difference among different social group regarding their access to computers and the Internet is called the ________ divide a. Computer b. Technology c. Digital d. Electronic e. Internet
C.
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when: a. The courts become involved b. Hackers are able to break into the sort code c. The software is widely distributed d. Any version of the software is released e. The software's programming code is released
C.
U.S. businesses are allowed to use personal data from EU countries if they a. have informed consent b. create safe harbour c. develop equivalent privacy protection policies d. make their privacy protection policies publicly available e. register their activities with a central EU government databank
C.
Unlike regular browser cookies, flash cookies a. Are installed only at the user's request b. are not store on the user's computer c. Cannot be easily detected or deleted d. Monitor user's behaviour at the website e. Are able to track my smile after user's personal information
C.
Which are the following ailments is caused by tens of thousands of repetitions under low-impact loads a. CTS b. CVS c. RSI d. technostress e. RSS
C.
Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years a. Copyright b. Treadmark c. Patent d. Trade secret protection
C.
Which of the following best describes the basis for the FIP principles a. The accountability of the record holder b. The responsibility of the record holder c. The mutuality of interest between the recorder and the individual d. The privacy of the individual e. The difference between the interests of the individual and commercial organisations
C.
Which of the following is not one of the current key technology trends that raises ethical issues a. Data storage improvements b. Data analysis advancements c. Increase in multimedia quality d. Increasing use of mobile devices e. Advances in networking technology
C.
_____ is the new data analysis technology that's fine is hidden connection between data in disparate sources a. HIPAA b. FIP c. NORA d. COPPA e. spyware
C.
_______ protects the creators of intellectual property from having their work copied by others a. Patent protection b. Intellectual property law c. Copyright law d. Fair use doctrine e. Trade secret law
C.
In 2010, the FTC added all of the following recommendations to its privacy guidelines except a. Firms should build products and services that protect privacy b. Firms should increase the transparency of the data collection c. Firms should require consumer consent and provide clear option to opt out of data collection d. Firms should limit the length of time that any personal data is stored to 6 months or less e. Consumers should be able to review and contest the accuracy and completeness of data
D.
One of the drawbacks of Patent protection is a. That only the underlying ideas are protected b. Digital media cannot be patented c. Preventing the idea from failing to public domain d. The years of waiting to receive it e. The limited period of protection
D.
Privacy protection in the United States is __________ in Europe a. More far-reaching than b. More liable to law than c. Much more stringent than d. Much less stringent than
D.
The article" no free lunch" rules state that a. If an action cannot be taken repeatedly, then it is not right to be taking any time b. Once you take the action that produce the lease home or incurs the lease cost c. One can put values in wrong order and understand the consequences of various courses of action d. Everything is owned by someone else, and that the creator wants compensation for this work e. Anything of value should not be taken
D.
Which of the following describes Immanuel Kant's Categorical Imperative? a. If an action cannot be taken repeatedly, then it is not right to be taking any time b. Once you take the action that produce the lease home or incurs the lease cost c. One can put values in wrong order and understand the consequences of various courses of action d. If an action is not right for everyone to take, it is not right for anyone to take e. You should act towards others as you would like them to act towards you
D.
Which of the following is a primary drawback to the " do anything anywhere" computing environment ? a. It makes work environment less pleasant b. It creates inequality between workers who have home computing power and those who don't c. It's centralises power at corporate headquarters d. It blurs the traditional boundaries between work and family time e. It leads the employee being paid less for the total amount of work perform
D.
Which of the following is the primary reason that the practice of spamming has grown exponentially a. Telephone solicitation is no longer legal b. It is good advertising practice and brings in many new customers c. It helps pay for the Internet d. It is very expensive and can reach so many people e. There are no legal preventions against it
D.
In the information age, the applications that individuals and organisations have regarding the preservation of existing values and institutions fall within the the moral dimension of a. Family and home b. Property rights and obligations c. System quality d. Accountability and control e. quality of life
E.
The Federal Trade Commission FIP principle of Notice/ Awareness states that a. Customers must be allowed to choose how their information will be used for secondary purposes other than supporting transection b. Data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorised use c. There must be a mechanism in place to enforce FIP principles d. consumers should be able to review the data collected about them e. Websites must disclose their information practices before collecting data
E.
The ______ framework developed by the US Department of commerce allows US businesses to legally use personal data from EU countries a. COPPA b. P3P c. PGP d. bilateral e. safe-harbour
E.
The central business activities of choicepoint raise which of the five moral dimension a. Property rights and obligations b. System quality c. Accountability and control d. Quality of life e. Information rights and obligations
E.
The most common reason business system fail is a. Software bugs b. Software errors c. Hardware failures d. Facilities failures e. Data quality
E.
The strength of patent protection is that it: A) puts the strength of law behind copyright. B) allows protection from Internet theft of ideas put forth publicly. C) is easy to define. D) provides a clear distinction between software and book E) grants a monopoly on underlying concepts and ideas.
E.
The rate of global piracy is approximately 20%. a. true b. false
A.
The symptoms of technostress include aggravation and hostility toward humans. a. true b. false
A.
Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior. a. true b. false
A.
Which of the following US Laws gives patients access to personal medical records and right to authorise how this information can be used or disclosed a. HIPAA b. Gramm-Leach_bliley Act c. Privacy protection Act d. Freedom of information act e. COPPA
A.
Which of the following best describes intellectual property ? a. Intangible property created by individuals or corporations b. unique creative work or ideas c. Tangible or intangible property created from a unique idea d. The expression of an intangible idea
A.
____ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals a. Profiling b. Phishing c. Spamming d. Targeting e. Spyware
A.
______ restricts information that the US federal government can collect about an individual and regulate what it can do with the information a. The Privacy Act of 1074 b. The Gramm-Leach-Bliley Act of 1999 c. The freedom of information act d. The FIP set of principles e. COPPA
A.
_______ are not held liable for the messages they transmit a. Regulated common carriers b. Private individuals c. Organisations and businesses d. Elected officials e. European ISPs
A.
________ aenables advertisers to display more relevant ads based on user's search and browsing history a. behavioural targeting b. A web bug c. NORA d. An intelligent agent e. FIP
A.
________ means that you accept the potential cost and applications for the decisions you make a. Responsibility b. Accountability c. Liability d. Due process e. Duty
A.
as discussed in the chapter, all of the following the steps in the process for analysis in an ethical issue except a. Assigning responsibility b. Identifying the stakeholders c. Identifying the options you can reasonably take d. Identifying clearly describing the facts e. Identify the potential consequences of your options
A.
"look and feel" copyright infringement lawsuits are connected with a. The distinction between tangible and intangible ideas b. Distinction between an idea and its expression c. Using the graphical elements of another products d. Using the creative elements of another product e. Preventing the use of another product's graphical user interface
B.
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation? a. His action is acceptable , because the grocer suffer the least harm b. Is action acceptable, because the higher social value is the survival of the family c. His action is wrong, because the man would not want the grocer to steal from him d. His action is wrong, because if anyone were to do this, the concept of personal property is defeated
B.
According to several court findings, the general functional features of software are protected by copyright law a. true b. false
B.
Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person. a.true b.false
B.
COPPA is a set of five principles developed by the FTC that North American and European privacy law is based on a. true b. false
B.
A Facebook users' visit to a Web site can be tracked even if they do not click a Like button. a. true b. false
A.
A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle? a. Kant's categorial imperative b. Golden rule c. The risks aversion principle d. the no free lunch rule e. The slippery slope rule
A.
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret. a. true b. false
A.
As per the_____, if an action cannot be taken repeatedly, it is not right to take at all a. slippery-slope rule b. lemming rule c. high-failure cost rule d. utilitarian rule e. golden rule
A.
Because of their special claim to knowledge, wisdom, and respect, professionals take on special rights and obligations a. true b. false
A.
CVS refers to: A) eyestrain related to computer display screen use. B) carpal vision syndrome. C) wrist injuries brought about by incorrect hand position when using a keyboard. D) stress induced by technology.
A.
Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical a. true b. false
A.
Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps a. true b, false
A.
Ethics describe the principles of right and wrong that can be used by individuals to make choices to guide their behaviour a. true b. false
A.
In recent years, the ego sharing of music files has declined with the improvement of technological prevention a. true b. false
A.
Liability is a feature of political system and allows individuals to recover damages done to them by others a. true b. false
A.
Malicious software that is installed secretly on your computer by other applications and that tracks your online movement is called by spyware a. true b. false
A.
Most Internet businesses do very little to protect the privacy of their customers a. true b. false
A.
One of the key concepts in patent law is novelty. a. true b. false
A.
Re-designing and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge.
A.
Spamming raises the moral dimension of a. Quality of life b. System quality c. Accountability and control d. Information right and obligations e. Property rights and obligations
A.
The Online Privacy Alliance: A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with Web sites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information.
A.
The ______ Brad copyright law to the Internet aged by outlawing the circumvention of technology-based protections of copyrighted materials a. digital millennium copyright act b. privacy act c. freedom of information act d. Electronic communications privacy act e. Computer software copyright act
A.
The moral dimension of ________ can be described as the obligations that individuals and organisations have concerning rights to intellectual property a. Property rights and obligations b. System quality c. Accountability and control d. Information rights and obligations e. Equality of life
A.
The problem with web browsers' Do Not Track options is that website are not obligated to honour these setting a. true b. false
A.