Chapter 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is not a principal cause of poor system performance?

Computer abuse

Which of the following is by far the most common source of business system failure?

Data quality

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital divide

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

False

Software can never be considered to be a trade secret.

False

Software programs were unprotected by copyright law until the early 1990s.

False

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

Which of the following statements about spam is not true?

Spamming is more tightly regulated in the United States than in Europe.

CVS refers to:

eyestrain related to computer display screen use.

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

The U.S. CAN-SPAM Act:

requires commercial email senders to identify themselves.

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?

Quality of life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?

RSI

Big Tech firms are facing increasing scrutiny with respect to alleged anticompetitive and unfair practices.

True

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

True

Malicious software that can secretly install itself on an Internet user's computer by piggybacking on other applications and then report the user's movements on the internet to other computers. is called spyware.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

Oligopolies and monopolies dominate the Web and mobile platform.

True

One of the key concepts in patent law is originality.

True

Privacy protection in Europe has historically been much stronger than in the United States.

True

Some experts believe that exposure to computers reduces intelligence and cognitive abilites.

True

Some forms of illegal sharing of music files have declined as legitimate online music stores and streaming services have expanded.

True

The DMCA requires ISPs to take down sites of copyright infringers they are hosting when the ISPs are notified of the problem.

True

The European Parliament has banned unsolicited commercial messaging.

True

The claim to privacy is protected by the U.S. Constitution.

True

Trade secret laws grant a monopoly on the ideas behind a work product.

True

Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.

True

Websites using cookie technology cannot directly obtain visitors' names and addresses from the cookie.

True

Advertising networks such as Microsoft Advertising, Yahoo, and Google's Marketing Platform are capable of tracking personal browsing behavior across thousands of websites.

True


Kaugnay na mga set ng pag-aaral

TEAS 6 practice test NEED TO KNOW,,, stay on this CLS

View Set

BusAd 2900 - Ch. 10 (Agency) Legal Environment of Business (text: Melvin, Guerra-Pujol)

View Set

Соціологія. модуль

View Set

AP Art History 250 Notecards Period One

View Set

Business ethics exam to chapter 7 global corporate citizenship

View Set