CSCI
According to an Oxford University study, what percentage of current jobs were expected to be overtaken by robots in the next two decades?
50%
As of 2016 what was the average cost of a data breach in the United States?
7 MILLION
The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.
TRUE
An example of a hacking job motivated by retaliation is:
A person hacks a government website to act against inaction by the government.
The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called:
A.I
In some nondemocratic or authoritarian societies such as China, Pakistan, Iran, and North Korea, why did the governments generally intervene to restrict their citizens' access to information and various Internet and social media sites?
Both of these answers are correct: "To impose religious or ideological views" and "To suppress political dissent."
MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:
Both to uniquely identify an individual's shopping habits and preferences and to identify an individual shopper using only four bits of secondary information.
A CIO is the company's:
CHIEF INFO OFFICER
Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as:
CYBERCRIME
One major advantage of conducting business online is:
Cost-effective marketing and promotions
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufacturers and their users:
DIGITAL MILLENNIUM COPYRIGHT ACT
Buying and selling goods and services electronically is called:
E-business.
One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was:
Ensuring the vehicles were safer than driver-controlled automobiles.
A 2017 IBM study predicted that the use of cognitive computing would decline rapidly over the next decade.
FALSE
All countries have nearly identical intellectual property laws.
FALSE
Cybersecurity experts recommend that firms implement an incident-response plan for cyberattacks, which are strictly preventative in nature.
FALSE
Net neutrality refers to the principle that the wealthier users should pay higher rates for faster Internet speeds.
FALSE
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.
FALSE
The stakeholders rarely targeted by companies for personal data collection are employees and consumers.
FALSE
Software piracy is a major problem in which part of the world?
GLOBALLY
The EU law passed in 2018 that required companies to promptly report personal data breaches was called:
General Data Protection Regulation.
Over time the role of the CIO:
Has becoming more integrated into the overall strategic direction of the firm.
The ideas, concepts, and other symbolic creations of the human mind are often referred to as:
INTELLECTUAL PROPERTY
Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"?
IRAN & CHINA
One ethical concern about businesses collecting vast amounts of stakeholder data is:
If the effort actually benefits the stakeholders.
The purpose of the right to be forgotten is to:
Increase protection of privacy and personal information.
The role of the CIO includes all of these tasks except:
Monitoring the appropriate level of employee productivity.
E-business refers to electronic exchanges from business to business and consumer to business.
TRUE
E-business revenues are expected to rise primarily due to consumers in emerging markets.
TRUE
In 2014, NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.
TRUE
In 2018 the European Union passed legislation to protect personal user data during collection, processing, and storage.
TRUE
One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.
TRUE
The primary reason that hackers hack is to make money.
TRUE
One argument in favor of net neutrality is:
To fairly compete, small, medium, and large firms should have the same Internet bandwidth.
The use of robotics in the workplace has increased recently because:
all answers
The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called:
omnichannel
According to McKinsey and Company, which position cannot be easily replaced with robots?
team managers
A critical characteristic of a successful CIO is:
A leader with the ability to speak the language of the business.
Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks? -Focus on how to respond to a breach. -Involvement by all functional departments. -Support from executive leadership.
ALL ANSWERS
This annual international gathering on January 28 brought together leaders from the U.S. and dozens of European countries to address the global nature of cyberattacks:
DATA PRIVACY DAY
Robotic technology has advanced enough to generate many new business opportunities.
TRUE
Some experts believe that cybercrime can only be controlled through international government coordination.
TRUE
Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:
WHITE HATTERS