WK2 - CH8-final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Ethical understanding and reasoning 22) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? A) the Golden Rule B) the Slippery Slope C) the Social Contract rule D) No Free Lunch

D Page Ref: 494 Difficulty: Moderate

Application of knowledge 56) Disputes over federal trademarks involve establishing: A) underlying ideas. B) intent. C) piracy. D) infringement.

D Page Ref: 531 Difficulty: Moderate

Application of knowledge 34) The sharing of a user's stored cookie information between Web sites and without the user's knowledge is: A) legal in the United States but illegal in Europe. B) illegal in the United States but legal in Europe. C) legal in both the United States and Europe. D) illegal in both the United States and Europe.

A Page Ref: 514 Difficulty: Difficult

Application of knowledge 44) What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? A) the ability to make perfect copies of digital works at little cost B) the anonymous nature of the Internet C) the support for instant peer-to-peer communication D) the use of standards for file formats

A Page Ref: 518 Difficulty: Moderate

Application of knowledge 32) Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks? A) the CAS B) FIP C) Surfright D) the Open Internet Order

A Page Ref: 524 Difficulty: Moderate

Application of knowledge 57) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging.

A Page Ref: 532 Difficulty: Easy

Application of knowledge 54) Which case was instrumental in paving the way for Internet business methods patents? A) Brown Bag v. Symantec B) State Street Bank & Trust Co. v. Signature Financial Group, Inc. C) Alice Corporation Pty. Ltd. v. CLS Bank International D) Ticketmaster Corp. v. Tickets.com

B Page Ref: 529 Difficulty: Difficult

Application of knowledge 65) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? A) used an anonymous Web browsing service B) encrypted their communications C) cleared Web browser history and cookies D) posted comments online anonymously

C Page Ref: 500 Difficulty: Difficult

Application of knowledge 58) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures? A) ICANN B) FTC C) WIPO D) USPTO

C Page Ref: 531 Difficulty: Moderate

Ethical understanding and reasoning 24) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? A) the Golden Rule B) Risk Aversion C) the Slippery Slope D) the Social Contract rule

D Page Ref: 494 Difficulty: Moderate

Ethical understanding and reasoning 28) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge? A) the USA PATRIOT Act B) the Homeland Security Act C) the Communications Assistance for Law Enforcement Act D) the E-Government Act

D Page Ref: 503, 507 Difficulty: Moderate

Application of knowledge 75) ________ copyright infringement lawsuits are concerned with the distinction between an idea and its expression.

Look and feel Page Ref: 520 Difficulty: Moderate

Application of knowledge 46) How long does copyright protection extend for corporate-owned works? A) 25 years B) 50 years C) 75 years D) 95 years

D Page Ref: 519 Difficulty: Moderate

Application of knowledge 66) The ________ of Internet and Web technology can result in work and shopping invading family life.

ubiquity Page Ref: 489 Difficulty: Moderate

Ethical understanding and reasoning 25) Which ethical principle tells you that it is wise to assume perfect information markets? A) the Golden Rule B) the New York Times test C) the Social Contract rule D) the Collective Utilitarian principle

B Page Ref: 494 Difficulty: Moderate

Application of knowledge 35) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? A) Freedom of Information Act B) Gramm-Leach-Bliley Act C) COPPA D) HIPAA

B Page Ref: 507 Difficulty: Difficult

Application of knowledge 39) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security

B Page Ref: 509 Difficulty: Moderate

Application of knowledge 41) "Do Not Track" falls under which of the following principles in the FTC's new privacy framework? A) Privacy by Design B) Simplified Choice C) Greater Transparency D) Scope

B Page Ref: 511 Difficulty: Moderate

Application of knowledge 37) Which of the following is a core Fair Information Practices (FIP) principle? A) Choice/Consent B) Access/Participation C) Security D) Enforcement

A Page Ref: 509 Difficulty: Difficult

Application of knowledge 38) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security

A Page Ref: 509 Difficulty: Moderate

Application of knowledge 40) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? A) Require firms to have consumers affirmatively opt-in before PII is collected. B) Require firms to allow consumers to opt-out before PII is collected. C) Make collection of PII illegal. D) Require robust notice only before PII is collected.

A Page Ref: 510 Difficulty: Difficult

Application of knowledge 53) All of the following statements about patents are true except: A) it is more difficult to obtain a copyright than it is to obtain a patent. B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. C) computer programs can be patented. D) in order to be patented, an invention must be nonobvious.

A Page Ref: 524-525 Difficulty: Moderate

Ethical understanding and reasoning 20) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule

C Page Ref: 494 Difficulty: Moderate

Application of knowledge 47) Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A) A professor clips a newspaper article just before class and distributes copies of it to his class. B) A journalist quotes a paragraph from a book in a review of the book. C) A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site. D) Google posts thumbnail images of books in the Google Book Search Project.

C Page Ref: 520-521 Difficulty: Difficult

Application of knowledge 52) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A) copyright law B) trade secret law C) patent law D) trademark law

C Page Ref: 524 Difficulty: Moderate

Application of knowledge 61) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented? A) State Street Bank & Trust v. Signature Financial Group, Inc. B) Bilski et al. v. Kappos C) Alice Corporation Pty. Ltd. v. CLS Bank International D) Brown Bag Software v. Symantec Corp.

C Page Ref: 529 Difficulty: Moderate

Application of knowledge 55) Amazon has a patent on: A) download-based sales. B) display of third-party advertisements in floating windows. C) one-click purchasing. D) hyperlinks.

C Page Ref: 530 Difficulty: Moderate

Ethical understanding and reasoning 27) Which of the following basic ethical concepts plays an important role in defining privacy? A) responsibility B) accountability C) liability D) due process

D Page Ref: 495 Difficulty: Difficult

Analytical thinking 48) All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: A) nature of the work used. B) amount of the work used. C) market effect of the use. D) free availability of the work on the Web.

D Page Ref: 521 Difficulty: Moderate

Application of knowledge 64) Comcast's proposed merger with which of the following would make it the high-speed Internet provider for close to 40% of American homes? A) Cablevision B) AT&T C) Verizon D) Time Warner Cable

D Page Ref: 544 Difficulty: Moderate

Ethical understanding and reasoning 2) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

FALSE Page Ref: 492 Difficulty: Moderate

Application of knowledge 5) Most adult social network participants do not have any expectation of personal privacy when using a social network.

FALSE Page Ref: 498 Difficulty: Moderate

Application of knowledge 6) The opt-out model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

FALSE Page Ref: 506 Difficulty: Moderate

Application of knowledge 11) The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of copyright protection.

FALSE Page Ref: 531 Difficulty: Moderate

Application of knowledge 7) The Children's Internet Protection Act (CIPA) prohibits Web sites from collecting information on children under the age of 13.

FALSE Page Ref: 545-546 Difficulty: Moderate

Application of knowledge 49) Downloading music tracks owned by record companies without paying for them is an example of a violation of: A) patent law. B) copyright law. C) trademark law. D) privacy law.

B Page Ref: 491 Difficulty: Moderate

Ethical understanding and reasoning 23) Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all? A) Universalism B) the Slippery Slope C) the Social Contract rule D) the Golden Rule

B Page Ref: 494 Difficulty: Moderate

Ethical understanding and reasoning 26) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? A) the Slippery Slope B) Risk Aversion C) No Free Lunch D) the Collective Utilitarian principle

B Page Ref: 494 Difficulty: Moderate

Information technology 30) Which of the following can be used to record all keyboard activity of a user? A) shopping carts B) trusted computing environments C) spyware D) DRM

C Page Ref: 497 Difficulty: Easy

Application of knowledge 29) Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums? A) cookies B) digital wallets C) search engines D) shopping carts

C Page Ref: 497 Difficulty: Moderate

Application of knowledge 17) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? A) richness B) interactivity C) information density D) global reach

D Page Ref: 489 Difficulty: Moderate

Application of knowledge 10) Copyright protection protects against others copying the underlying ideas in a work.

FALSE Page Ref: 519 Difficulty: Moderate

1) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

TRUE Page Ref: 492 Difficulty: Moderate

Ethical understanding and reasoning 3) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

TRUE Page Ref: 494 Difficulty: Moderate

Ethical understanding and reasoning 21) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule

A Page Ref: 494 Difficulty: Moderate

Application of knowledge 45) Which of the following protects original forms of expression in a tangible medium? A) trade secret law B) copyright law C) patent law D) trademark law

B Page Ref: 519 Difficulty: Moderate

Ethical understanding and reasoning 4) In the United States, Google is required to remove results from its search engine if requested.

FALSE Page Ref: 485-487 Difficulty: Moderate

Application of knowledge 8) The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.

TRUE Page Ref: 514 Difficulty: Moderate

Application of knowledge 9) The AdChoices program is an industry-sponsored initiative to encourage Web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

TRUE Page Ref: 515 Difficulty: Moderate

Application of knowledge 77) In trademark law, ________ is defined as any behavior that would weaken the connection between the trademark and the product.

dilution Page Ref: 531 Difficulty: Moderate

Application of knowledge 76) The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.

fair use Page Ref: 521 Difficulty: Difficult

Application of knowledge 67) The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.

governance Page Ref: 490-491 Difficulty: Moderate

Application of knowledge 80) The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies that would like to charge differentiated prices based on bandwidth and fees paid.

net neutrality, Open Internet Page Ref: 542 Difficulty: Moderate

Application of knowledge 78) Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.

trademark Page Ref: 531 Difficulty: Moderate

Application of knowledge 16) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? A) richness B) interactivity C) social technology D) ubiquity

C Page Ref: 489 Difficulty: Moderate

Application of knowledge 68) ________ is another name for net neutrality.

Open Internet Page Ref: 542 Difficulty: Moderate

Application of knowledge 69) Demographic and behavioral information that does not include any personal identifiers is referred to as ________ information.

anonymous Page Ref: 496 Difficulty: Easy

Application of knowledge 12) Net neutrality refers to Internet backbone owners treating all Internet traffic equally.

TRUE Page Ref: 542 Difficulty: Moderate

Application of knowledge 15) Google defended its Library Project on the grounds of fair use.

TRUE Page Ref: 552 Difficulty: Moderate


Ensembles d'études connexes

Chapter 21 Antidepressant Agents

View Set

EMT Chapter 32: Orthopedic Injuries

View Set

Chapter 5 Temporomandibular Joint

View Set

Chapter 2 Financial Statements and Cash Flow

View Set

Glucose Practice Questions - Metabolism

View Set