BCIS Ch 4 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

Assign responsibility.

Which of the following is the most common source of business system failure?

Data quality

Which of the following statements about Flash cookies is not true?

Flash cookies are installed only at the user's request.

Which of the five moral dimensions of the information age do the central business activities of DoubleClick raise?

Information rights and obligations

What percent of global Internet users use Google Search and other Google services?

Nearly 80 percent

The NAI is an industry association formed to help with which of the following?

Online privacy issues

TRUSTe is an example of which of the following?

Online seal program

Which of the following is not a file-sharing service?

Pandora

Which of the following statements about spam is not true?

Spamming is less regulated in Europe than in the United States.

Which of the following is not a difficulty in establishing patent protection?

The requirement that the work must be a secret

The FIP principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

In today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

false

The rate of global piracy is approximately 20%.

false

All of the following are current key technology trends raising ethical issues except:

increase in data quality.

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

FIP principles are based on the notion of the:

mutuality of interest between the record holder and the individual.

All of the following laws apply to actions by the federal government except:

the Children's Online Privacy Protection Act.

A drawback to copyright protection is that the ideas underlying the work are not protected, only their manifestation in the work.

true

Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.

true

Spyware is software that comes hidden in downloaded applications and can track your online movements.

true


संबंधित स्टडी सेट्स

Macroeconomics 4.1c The Benefits and Costs of Economic Growth

View Set

EURO AND INTERNATIONAL FINANCE QUIZ NO.1

View Set

Sociology Lesson 9 Religion (Textbook Question)

View Set

Chapter 13 Managing Your Own Portfolios & Chapter 15 Commodities and Financial Futures

View Set

Federal Tax Considerations for Accident & Health Insurance

View Set