Cyberattacks, Cybersecurity, Privacy, Freedom of Expression, Intellectual Property

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

5. Cyberstalking differs from cyberharassment in that it is aimed at tormenting an individual but does not involve a credible threat of physical harm.

False

4. Computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans.

False

4. Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.

False

4. The first release of a software product typically meets all its users' expectations.

False

4. The goal of viral marketing is to spread rumors and innuendo about a rival's product that will hurt its image.

False

6. Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites? Choices: A. Live telemedicine B. Electronic consultation C. Store-and-forward telemedicine D. Remote monitoring

A. Live telemedicine

6. Which of the following is true of strategies for engineering quality software? Choices: A. The first release of any software rarely meets all its users' expectations. B. Developers develop high-quality software instantaneously without a set of principles. C. Software defects never lead to injury. D. High-quality software systems are tough to learn and use because they perform slowly.

A. The first release of any software rarely meets all its users' expectations.

If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has: Choices: A. created a hostile work environment B. encouraged defamation of the character of its employees C. engaged in racial discrimination D. violated the employee's First Amendment rights

A. created a hostile work environment

10. A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following? Choices: A. decision support system B. executive information system C. upgrade management system D. data information system

A. decision support system

10. Which process can reduce expensive redundant tests that are ordered because one provider does not have access to the clinical information stored at another provider's location? Choices: A. health information exchange B. telehealth C. electronic medical records processing D. clinical decision support

A. health information exchange

8. What type of artificial intelligence involves computer programs that can learn some task and improve performance with experience? Choices: A. machine learning B. natural language processing C. robotics D. electronic medial record

A. machine learning

9. Which of the following are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output? Choices: A. Data information systems B. Business information systems C. Management information systems D. Decision support systems

B. Business information systems

12. Which of the following can be oral, written, or inferred from the seller's conduct? Choices: A. Indemnity B. Express warranties C. Warranty tolling D. Strict liabilities

B. Express warranties

13. Which of the following is true of software testing? A. White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. B. Static testing involves software programs called static analyzers which are run against new code. C. Integration testing involves independent testing that is performed by trained end users to ensure that the system operates as they expect. D. Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in whitebox testing, are known.

B. Static testing involves software programs called static analyzers which are run against new code.

11. In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent? Choices: A. Contributory negligence B. Strict liability C. Breach of warranty D. Misrepresentation

B. Strict liability

8. Products, such as statements of requirements, flowcharts, and user documentation, are known as which of the following? Choices: A. objects B. deliverables C. information systems D. project systems

B. deliverables

13. Remote monitoring is also known as which of the following? Choices: A. live telemedicine B. home monitoring C. real-time telehealth D. telenursing

B. home monitoring

11. Which aspect of artificial intelligence involves technology that allows computers to understand, analyze, manipulate, and/or generate English? Choices: A. robotics B. natural language processing C. electronic medial record D. machine learning

B. natural language processing

A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?

Bring your own device (BYOD)

Which of the following terms is defined as the control or suppression of the publishing or accessing of information on the Internet? Choices: A. Anonymous expression B. Internet filtering C. Internet censorship D. Slander

C. Internet censorship

Which act became law in 1996 with the purpose of allowing freer competition among phone, cable, and TV companies? Choices: A. Communications Opportunity, Promotion and Enhancement Bill B. Child Online Protection Act C. Telecommunications Act D. Telecommunications Deregulation and Reform Act

C. Telecommunications Act

7. Which of the following systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that simulate human intelligence processes? Choices: A. clinical decision support systems B. automated machine system C. artificial intelligence systems D. natural language systems

C. artificial intelligence systems

11. A social networking platform: Choices: A. can generate revenue only through member fee B. is limited within the barriers of time C. can be used for business purposes D. prohibits interactions between unknown people

C. can be used for business purposes

The Supreme Court has held that obscene speech and which of the following are not protected by the First Amendment and may be forbidden by the government? Choices: A. audition B. demarcation C. defamation D. declamation

C. defamation

12. An example of robotics can be found in which of the following examples? Choices: A. website product recommendations B. detecting fraud C. device used to move heavy pallets D. pattern recognition

C. device used to move heavy pallets

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is: Choices: A. no royalties must be paid on trade secrets B. the time limitation for a trade secret is longer than for patents and copyrights C. there is no need to file an application or disclose a trade secret to gain protection D. trade secrets can become part of the prior art and be used to protect patents and copyrights

C. there is no need to file an application or disclose a trade secret to gain protection

Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity? Choices: A. 18 USC 875(c) B. 18 USC 2261A C. 47 USC 223 D. 18 USC 2425

D. 18 USC 2425

7. Which of the following is currently the most popular social network destination worldwide? Choices: A. Twitter B. Meetup C. LinkedIn D. Facebook

D. Facebook

9. Which of the following is NOT one of the three major components of machine learning systems? Choices: A. parameters B. a model C. the learner D. a function

D. a function

7. In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels? Choices: A. defined B. quantitatively managed C. managed D. initial

D. initial

9. While using social networks as part of the hiring process, employers can: Choices: A. legally violate federal laws B. screen applicants based on race or ethnicity C. post messages on behalf of a candidate D. look at the profiles of potential candidates

D. look at the profiles of potential candidates

10. The National Center for Victims of Crime advises victims to: Choices: A. not consider getting law enforcement officers involved until the stalker threatens violence. B. destroy all evidence of any contact with the cyberstalker. C. meet in a public place with the cyberstalker to talk things out before involving any law enforcement officers. D. send the stalker a written notice that their contact is unwanted and that further contact should cease

D. send the stalker a written notice that their contact is unwanted and that further contact should cease

3. When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.

False

1. The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.

False

1. The impact of software defects is always trivial.

False

12. Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online.

False

13. MySpace is the most popular social network destination worldwide.

False

2. Formulas, inventions, and processes are not considered forms of intellectual property.

False

2. In the early days of IT in the 1960s, productivity improvements were difficult to measure.

False

2. Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.

False

3. Industrial espionage and competitive intelligence are essentially the same.

False

3. Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.

False

5. Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.

False

5. In integration testing, special software programs called static analyzers are run against the new code.

False

7. A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.

False

8. Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.

False

A National Security Letter is subject to judicial review and oversight.

False

A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country.

False

A pen register is a device that records the originating number of incoming calls for a particular phone number.

False

A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.

False

American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy.

False

An oral defamatory statement is libel.

False

Anonymity on the Internet is practically guaranteed.

False

Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

False

Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.

False

The Fifth Amendment protects American's rights to freedom of religion and freedom of expression.

False

The Fifth Amendment regulates the collection of the content of wire and electronic communications.

False

The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.

False

Title III of the Wiretap Act allows state and federal law enforcement officials to use wiretapping without requiring them to obtain warrants.

False

Trojan horse has become an umbrella term for many types of malicious code.

False

Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.

False

Which act enables the public to gain access to certain government records?

Freedom of Information Act

Which of the following rules requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data?

Safeguards Rule

1. Different types of social media are blogs, discussion forums, media-sharing networks, wikis, social bookmarking tools, social messaging apps, and social networking, news, and shopping platforms.

True

1. The standard of living varies greatly among groups within a country as well as from nation to nation.

True

2. A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.

True

3. Twitter enables an organization to share short text updates, images, links, polls, and videos.

True

5. The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement.

True

6. Cyberstalking can escalate into physical stalking and even physical assault.

True

6. The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members.

True

A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.

True

Anonymous political expression played an important role in the early formation of the United States.

True

Anti-SLAPP laws can identify whether there are any merits to a lawsuit.

True

Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.

True

Electronically stored information includes any form of digital information stored on any form of electronic storage device.

True

In general, the closer an Internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will apply.

True

Private schools may prohibit students, instructors, and other employees from engaging in offensive speech.

True

Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.

True

Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.

True

The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.

True

The Foreign Intelligence Surveillance Act describes procedures for the electronic surveillance of communications between foreign powers and the agents of foreign powers.

True

The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.

True

The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.

True

The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.

True

The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional.

True

Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?

USA Patriot Act

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following? Choice: A. prior art B. trade secrets C. industrial espionage D. competitive intelligence

competitive intelligence

In the context of tenets of The European Union Data Protection Directive, which of the following terms refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights?

enforcement

9. Patent law protects which of the following? Choices: A. books B. inventions C. art and film D. information critical to an organization's success

inventions

Firefox and OpenOffice are all examples of which of the following? Choices: A. Web browsers B. products developed through re-engineering C. utility software D. open source software

open source software

How many classes of items did the U.S. Supreme Court rule could not be patented? Choices: A. four B. two C. three D. five

three


Ensembles d'études connexes

CST Chapter 9 The principles and practice of aseptic technique

View Set

English File Upper Int 5B: Feeling Adjective Forms

View Set

Humanistic psychology: Key terms

View Set

Salesforce AI Associate Study Set

View Set