Business and Ethics Exam 5
Which of these specializations was/were spurred by the rapid changes in technology over the past few decades?
A. Smart manufacturing. B. Wireless networks. C. Processing of enormous amounts of data. D. All of the above.
Another name for unsolicited commercial emails is:
A. spam. B. junk e-mail C. UCE D. all of the above
Cyber security experts recommend including which essential elements for an incident-response plan for cyber attacks?
A.Focus on how to respond to a breach. B.Involvement by all functional departments. C.Support from executive leadership. (D. all of the above)
The use of robotics in the workplace has increased recently because:
A.New collaborative machines have been invented. B.The cost of robots has decreased. C.Robots are more reliable than people. All of the above
MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:
A.Uniquely identify an individual's shopping habits and preferences. B. Collect individual social security numbers. C.Identify an individual shopper using only four bits of secondary information. D. (Both A and C, but not B.)
A pain or numbness in your thumbs caused by constant e-mailing, messaging, or Internet surfing on hand-held devices is called:
BlackBerry thumb.
Which of these steps has the U.S recently taken to counter cyber crime
Both A and B, but not C
Which of the following statements is (are) true about the group known as Anonymous?
Both B and C, but not A
Downloading illegal files, spreading computer viruses, and stealing from online bank accounts are collectively referred to as
Cybercrime
The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called:
Cyberspace
This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:
Data Privacy Day.
This Act makes it a crime to circumvent anti piracy measures built into most commercial software agreements between the manufactures and their users:
Digital Millennium Copyright Act.
Supporters of digitized medical records claim that:
Electronic alerts prevented dangerous drug combinations from being prescribed.
In 2013, North Korea opened Internet access to which group of people?
Foreigners using mobile devices or laptops
Software privacy is a major problem in which part of the world?
Globally
Which website received a favorable review because they limited the ability of hackers to take advantage of one another?
Hacker's list
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:
Hacktivists
Over time the role of the CIO:
Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
The digital divide describes the gap between those:
Individuals who have technology and those who do not.
The phase of technology that focuses on building material goods and manual labor is:
Industrial
The information phase of technology primarily requires
Intellectual and electronic skills.
Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"?
Iran
M-Commerce is facilitated primarily by:
Mobile or cell phones
Which of the following is not a role of the CIO
Monitoring the appropriate level of employee headcount
How has the increase in information technology affected criminal activities globally
New mechanisms for stealing data, trafficking contraband and laundering money have emerged
The idea that every distribution channel must work together to deliver a unified and consistent customer experience
Omnichannel
Which sales channel is projected to top $450 billion within the next several years?
Online
The practice of using fake business emails in order to trick users into divulging personal data, such as usernames and passwords, is called:
Phishing
Which condition below accurately describes a "web-junkie"?
Plays video games for hours on end without a break
We are currently in which phase in the development of technology?
Semantic.
Which of the following countries is not one of the top 15 Internet users?
Singapore
The self-reinforcing feature of technology means that:
Technology acts as a multiplier to encourage is own faster development.
Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones:
United Kingdom.
In some economically developed countries and most developing countries around the world genetically modified food was
Welcomed as a way to increase crop yields
which of the following is true about the US government's PRISM program?
critics of the program called it an unwarranted intrusion by Big Brother
Hackers who intent to profit from their actions are motivated by
financial incentives
The purpose of the right to be forgotten is to
increase protection of privacy and personal information
Which of these actions have western nations taken to fight cyber crime
some nations protected personal privacy and others accessed private information for the public good