Ethics Ch 4,5,6, Ethics Final- Ch 7-10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In one lawsuit in the early_______ , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems. a. 1990s b. 1980s c. 1970s d. 1960s

a. 1990s

The enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts: a. ACPA b. PRO-IP Act c. Economic Espionage Act d. CAN-SPAM Act

a. ACPA

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the__ Amendment: a. First b. Second c. Fourth d. Fifth

a. First

A(n) is software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material: a. Internet filter b. router c. bridge d. Web modem

a. Internet filter

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate,pornography, and other topics is a sufficient reason to justify: a. Internet filters b. spams c. compression d. encryption

a. Internet filters

_____is the act of stealing someone's ideas or words and passing them off as one's own: a. Plagiarism b. Cybersquatting c. Reverse engineering d. Patent trolling

a. Plagiarism

The requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data: a. Safeguards Rule b. Pretexting Rule c. Financial Privacy Rule d. Discovery Rule

a. Safeguards Rule

The requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations: a. TRIPS agreement b. DMCA c. PROIP Act d. WIPO Copyright Agreement

a. TRIPS agreement

The became law in 1996. Its purpose was to allow freer competition among phone, cable, and TV companies: a. Telecommunications Act b. Telecommunications Deregulation and Reform Act c. Child Online Protection Act d. Communications Opportunity, Promotion and Enhancement Bill

a. Telecommunications Act

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for______ . a. breach of warranty b. comparative negligence c. contributory negligence d. strict liability

a. breach of warranty

In the context of tenets of The European Union Data Protection Directive, refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights: a. enforcement b. notice c. choice d. security

a. enforcement

The concept that an idea cannot be copyrighted but the of an idea can be is key to understanding copyright protection: a. expression b. summary c. variation d. illustration

a. expression

A(n) prohibits a departing employee from working for any competitors for a period of time: a. noncompete agreement b. license agreement c. nondisclosure agreement d. union agreement

a. noncompete agreement

Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect product _________. a. quality b. delivery c. testing d. development

a. quality

The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to: a. subpoenas requesting the identity of anonymous Web posters b. determination of obscene material c. Internet filtering within public libraries d. identification of hate speech

a. subpoenas requesting the identity of anonymous Web posters

Software quality is defined as the degree to which a software product meets: a. the needs of its users. b. the standards of its competitors. c. sustainability and environmental protection needs. d. the minimum financial return standards.

a. the needs of its users.

A(n) is a device that records the originating number of incoming calls for a particular phone number: a. trap and trace b. pen register c. intercom d. phone switchboard

a. trap and trace

The Digital Millennium Copyright Act (DMCA) was signed into law in: a. 1992 b. 1998 c. 1990 d. 1996

b. 1998

A survey by the Nielsen found that of the workforce accessed pornography from their workplace computer: a. less than 15 percent b. 29 percent c. 50 percent d. nearly 75 percent

b. 29 percent

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?: a. Internet censorship b. A John Doe lawsuit c. Hate speech d. An anti-SLAPP law

b. A John Doe lawsuit

_____is a strategy employed by corporations, government officials, and others against citizens and community groups who oppose them on matters of public interest: a. A John Doe lawsuit b. A SLAPP c. Internet censorship d. Anonymous expression

b. A SLAPP

The included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trails and encryption, and provides rights of access for patients: a. Foreign Intelligence Surveillance Act b. American Recovery and Reinvestment Act c. Gramm-Leach-Bliley Act d. Electronic Communications Privacy Act

b. American Recovery and Reinvestment Act

_____allows people to state their opinions without revealing their identity: a. Defamation b. Anonymous expression c. Libel d. A John Doe lawsuit

b. Anonymous expression

Miller v. is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment: a. Brown b. California c. Stern d. Texas

b. California

Violation of the can cause a school or public library to lose funding to help pay for its Internet connections: a. Child Online Protection Act (COPA) b. Children's Internet Protection Act (CIPA) c. Children's Online Privacy Protection Act (COPPA) d. Communications Decency Act (CDA)

b. Children's Internet Protection Act (CIPA)

The restricted the government's ability to secretly intercept communications: a. Freedom of Information Act b. Communications Act of 1934 c. NSL gag provision d. USA PATRIOT Act of 2001

b. Communications Act of 1934

Under the , the Federal Communications Commission responded to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps: a. USA PATRIOT Act b. Communications Assistance for Law Enforcement Act c. Electronic Communications Privacy Act d. Foreign Intelligence Surveillance Act

b. Communications Assistance for Law Enforcement Act

Unlike traditional copyright law, the does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use: a. TRIPS Agreement b. Digital Millennium Copyright Act (DMCA) c. WIPO Copyright Treaty d. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

b. Digital Millennium Copyright Act (DMCA)

_____involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster: a. Remailing b. Doxing c. Slandering d. Libeling

b. Doxing

The prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites: a. Foreign Intelligence Surveillance Act b. Electronic Communications Privacy Act c. USA PATRIOT Act d. Communications Assistance for Law Enforcement Act

b. Electronic Communications Privacy Act

Title I of the extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet: a. Foreign Intelligence Surveillance Act b. Electronic Communications Privacy Act c. Communications Assistance for Law Enforcement Act d. USA PATRIOT Act

b. Electronic Communications Privacy Act

The outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data, and how long data is retained: a. Gramm-Leach-Bliley Act b. Fair Credit Reporting Act c. Credit CARD Act d. Federal Credit Union Act

b. Fair Credit Reporting Act

The allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies: a. Fair Credit Reporting Act b. Fair and Accurate Credit Transactions Act c. Right to Financial Privacy Act d. Gramm-Leach-Bliley Act

b. Fair and Accurate Credit Transactions Act

In 2008, the granted expanded authority to collect, without court-approved warrants, international communications as they flow through U.S. telecom network equipment and facilities: a. USA PATRIOT Act b. Foreign Intelligence Surveillance Act Amendments Act c. Electronic Communications Privacy Act d. Omnibus Crime Control and Safe Streets Act

b. Foreign Intelligence Surveillance Act Amendments Act

Proponents of the Children's Internet Protection Act (CIPA) argued that: a. schools can define what sites to block. b. Internet filters are highly flexible and customizable. c. the motives of private software companies who develop the Internet filters are clear. d. CIPA transfers power to education over private software companies who develop the Internet filters.

b. Internet filters are highly flexible and customizable.

_____was a legislator and former singer and entertainer who co-sponsored the Copyright Term Extension Act.: a. Frank Sinatra b. Sonny Bono c. Dean Martin d. Sammy Davis Jr.

b. Sonny Bono

A patent is a grant of a property right issued by the to an inventor: a. USPS b. USPTO c. FTC d. SEC

b. USPTO

The Organisation for Economic Co-operation and Development's requirement that personal data collected should be accurate, complete, current, and relevant to the purpose for which it is used is based on the principle of: a. individual participation b. data quality c. collection limitation d. purpose specification

b. data quality

A type of business system is the______ , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio. a. upgrade management system b. decision support system c. executive information system d. data information system

b. decision support system

The Supreme Court has held that obscene speech and are not protected by the First Amendment and may be forbidden by the government: a. audition b. defamation c. declamation d. demarcation

b. defamation

One purpose of a(n) is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash: a. cookie b. event data recorder c. spear-phishing device d. answering machine

b. event data recorder

The Organisation for Economic Cooperation and Development's , established in 1980, are often held up as the model of ethical treatment of consumer data: a. European Union Data Protection Directives b. fair information practices c. transborder data flow principles d. BBB online data protection guidelines

b. fair information practices

Possession of child pornography is a federal offense punishable by up to years in prison: a. two b. five c. seven d. ten

b. five

The redistribution of a program code with no copyright as a proprietary software can be avoided by using a(n) _____: a. nondisclosure clause b. open source license c. patent protection d. copyright term

b. open source license

Although they may implement a speech code, are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint: a. religious institutions b. public schools and universities c. Internet service providers d. communications providers

b. public schools and universities

Cybersquatters: a. frequently launch denial-of-service attacks against popular Web sites b. register domain names for famous trademarks or company names to which they have no connection c. remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service d. employ phishing tactics using the domain names of popular Web sites

b. register domain names for famous trademarks or company names to which they have no connection

A claims as its invention some feature or process embodied in instructions executed by a computer: a. trade secret b. software patent c. cross-licensing agreement d. patent infringement

b. software patent

The U.S. Supreme Court has ruled that there are classes of items that cannot be patented: a. two b. three c. four d. five

b. three

The of 1996 imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets: a. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act b. The Economic Espionage Act (EEA) c. Agreement on Trade-Related Aspects of Intellectual Property Rights d. The Lanham Act

c. Agreement on Trade-Related Aspects of Intellectual Property Rights

________are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output. a. Management information systems b. Decision support systems c. Business information systems d. Data information systems

c. Business information systems

_____allows portions of copyrighted materials to be used without permission under certain circumstances: a. Plagiarism b. Copyright infringement c. Fair use doctrine d. Use of prior art

c. Fair use doctrine

In Doe v. Holder, the courts ruled that the NSL gag provision violates the: a. Fair Information Practices Act b. USA PATRIOT Act c. First Amendment d. sunset provision

c. First Amendment

The protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees: a. USA PATRIOT Act b. Communications Assistance for Law Enforcement Act c. Fourth Amendment d. Freedom of Information Act

c. Fourth Amendment

The is an act that repealed a depression-era law known as Glass-Steagall: a. Fair Credit Reporting Act b. Health Insurance Portability and Accountability Act c. Gramm-Leach-Bliley Act d. Electronic Communications Privacy Act

c. Gramm-Leach-Bliley Act

Under the , financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected. a. Fair Credit Reporting Act b. Health Insurance Portability and Accountability Act c. Gramm-Leach-Bliley Act d. USA PATRIOT Act

c. Gramm-Leach-Bliley Act

_____is the control or suppression of the publishing or accessing of information on the Internet: a. Internet filtering b. Anonymous expression c. Internet censorship d. Slander

c. Internet censorship

The prohibits the government from concealing the existence of any personal data record-keeping systems: a. Fair Information Practices Act b. USA PATRIOT Act c. Privacy Act d. Freedom of Information Act

c. Privacy Act

_____is the process of taking something apart in order to understand it, build a copy of it, or improve it: a. Plagiarism b. Patent infringement c. Reverse engineering d. Decompiling

c. Reverse engineering

Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?: a. The Communications Decency Act (CDA) uses a vague definition of indecency. b. The Communications Decency Act (CDA) is not applicable to social networking sites. c. Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional. d. Section 230 of the Communications Decency Act (CDA) does not provide immunity to an Internet service provider (ISP).

c. Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.

Which of the following is true of software testing? a. White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. b. Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in whitebox testing, are known. c. Static testing involves software programs called static analyzers which are run against new code. d. Integration testing involves independent testing that is performed by trained end users to ensure that the system operates as they expect.

c. Static testing involves software programs called static analyzers which are run against new code.

Which of the following statements is true of Communications Decency Act (CDA)?: a. Title V of the CDA was the Telecommunications Act, aimed at protecting children from pornography. b. The CDA imposed a $150,000 fine and a prison term of up to five years for the transmission of "indecent" material over the Internet. c. The problem with the CDA was its broad language and vague definition of "indecency," a standard that was left to individual communities to determine. d. In June 2004, the ruling by the Supreme Court in the case of Ashcroft v. American Civil Liberties Union made it clear that CDA was unconstitutional.

c. The problem with the CDA was its broad language and vague definition of "indecency," a standard that was left to individual communities to determine.

The gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records: a. Health Insurance Portability and Accountability Act b. Communications Assistance for Law Enforcement Act c. USA PATRIOT Act d. Foreign Intelligence Surveillance Act

c. USA PATRIOT Act

Despite the importance of in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights: a. privacy b. freedom c. anonymity d. rights

c. anonymity

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called: a. prior art b. industrial espionage c. competitive intelligence d. trade secrets

c. competitive intelligence

In the context of tenets of the The European Union Data Protection Directive, refers to an individual's right to challenge the accuracy of the data and provide the corrected data: a. enforcement b. security c. correction d. use

c. correction

The Children's Online Privacy Protection Act: a. was found to be unconstitutional b. is meant to give Web masters control over the collection, use, and disclosure of children's personal information c. does not cover the dissemination of information to children d. requires the installation of Internet filters in public libraries

c. does not cover the dissemination of information to children

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain from the other party by various means: a. trade secrets b. competitive intelligence c. evidence d. patent royalties

c. evidence

U.S. laws do not allow a person to be for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country: a. imprisoned b. sued c. extradited d. judged

c. extradited

An oral defamatory statement is called: a. libel b. hate speech c. slander d. exaggeration

c. slander

Copyright and patent protection was established through: a. the Bill of Rights b. the U.S. Federal Codes and Statutes c. the U.S. Constitution d. various state laws

c. the U.S. Constitution

A(n) is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's: a. trade secret b. watermark c. trademark d. earmark

c. trademark

In the context of the Fourth Amendment, the courts have ruled that: a. recordings by the FBI of various telephone calls made by a U.S. citizen from a public phone booth do not violate an individual's privacy b. Federal agents can listen to phone conversations of U.S. citizens without a warrant c. without a reasonable expectation of privacy, there is no privacy right d. the Fourth Amendment is no longer valid

c. without a reasonable expectation of privacy, there is no privacy right

The established the minimum levels of protection that each country must provide to all WTO members: a. World Trade Organization (WTO) b. Digital Millennium Copyright Act (DMCA) c. The World Intellectual Property Organization (WIPO) d. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

d. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

Which of the following statements is true of Children's Internet Protection Act (CIPA)?: a. In case of CIPA, Congress specifically defined what content or Web sites should be forbidden and the measures to be used. b. CIPA requires the tracking of Internet use by minors or adults. c. In June 2004, the Supreme Court ruling in the case of Ashcroft v. American Civil Liberties Union made it clear that CIPA was unconstitutional. d. CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

d. CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

_____has the largest online population in the world and also perhaps the most rigorous Internet censorship: a. United States b. India c. Japan d. China

d. China

Section 230 of the provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider: a. Online Protection Act b. Online Privacy Protection Act c. Internet Freedom and Nondiscrimination Act d. Communications Decency Act

d. Communications Decency Act

Motion picture companies supported the development and worldwide licensing of the , which enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them: a. TimeWarner Cable system b. RIAA c. DeCSS d. Content Scramble System (CSS)

d. Content Scramble System (CSS)

The bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries: a. Fair Information Protection Act b. Fair Credit Reporting Act c. Freedom of Information Act d. European Union Data Protection Directive

d. European Union Data Protection Directive

The presumes that a student's records are private and not available to the public without the consent of the student: a. Health Insurance Portability and Accountability Act b. Children's Online Privacy Protection Act c. American Recovery and Reinvestment Act d. Family Educational Rights and Privacy Act

d. Family Educational Rights and Privacy Act

The enables the public to gain access to certain government records: a. Fair Information Practices Act b. USA PATRIOT Act c. Privacy Act d. Freedom of Information Act

d. Freedom of Information Act

A defining moment in the history of freedom of the press in the United States came in 1735 when jurors refused to convict for seditious libel: a. GeorgeWashington b. Ben Franklin c. Paul Revere d. John Zenger

d. John Zenger

Under the , the U.S. patent system changed from a "firsttoinvent" to a "firstinventortofile" system: a. Economic Espionage Act b. Lanham Act c. Uniform Trade Secrets Act d. Leahy-Smith America Invents Act

d. Leahy-Smith America Invents Act

_____is the existing body of knowledge available to a person of ordinary skill in the art: a. Prior experience b. Known facts c. Body of practice d. Prior art

d. Prior art

The of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement: a. Digital Millennium Copyright Act (DMCA) b. General Agreement on Tariffs and Trade c. Agreement on Trade-Related Aspects of Intellectual Property Rights d. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

d. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

Which of the following can provide a virtually untraceable level of anonymity to email messages?: a. Relay servers b. Podcasts c. Web mail servers d. Remailers

d. Remailers

Which of the following is true of strategies for engineering quality software? a. High-quality software systems are tough to learn and use because they perform slowly. b. Software defects never lead to injury. c. Developers develop high-quality software instantaneously without a set of principles. d. The first release of any software rarely meets all its users' expectations.

d. The first release of any software rarely meets all its users' expectations.

_______is an absolute defense against a charge of defamation: a. Libel b. Slander c. The First Amendment d. Truth

d. Truth

The Foreign Intelligence Surveillance Act: a. extends the protections offered under the Wiretap Act to electronic communications, such as email, fax, and messages sent over the Internet. b. was passed by Congress in 1994 and amended both the Wiretap Act and the Electronic Communications Privacy Act. c. requires any company doing business within the borders of the countries comprising the European Union to implement a set of privacy directives on the fair and appropriate use of information. d. allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

d. allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

One of the tests that an invention must pass to be eligible for a patent is that it must: a. be a machine b. not be economical to produce c. be capable of providing economic benefit d. be obvious to a person having ordinary skill in the same field

d. be obvious to a person having ordinary skill in the same field

If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has: a. encouraged defamation of the character of its employees b. engaged in racial discrimination c. violated the employee's First Amendment rights d. created a hostile work environment

d. created a hostile work environment

A(n) can read the machine language of a software program and produce the source code: a. compiler b. open source decoder c. re-engineering device d. decompiler

d. decompiler

Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of: a. Internet censorship b. doxing c. declamation d. defamation

d. defamation

Products, such as statements of requirements, flowcharts, and user documentation, are known as_______ . a. project systems b. information systems c. objects d. deliverables

d. deliverables

The courts have ruled in favor of using reverse engineering to: a. allow the domination of a particular software market by a single manufacturer b. provide access to protected elements of an original work c. circumvent restrictive trade secrets d. enable interoperability

d. enable interoperability

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the _______maturity level. a. quantitatively managed b. managed c. defined d. initial

d. initial

Patent law protects: a. art and film b. information critical to an organization's success c. books d. inventions

d. inventions

Firefox and OpenOffice are all examples of: a. Web browsers b. utility software c. products developed through re-engineering d. open source software

d. open source software

The concept of privacy is: a. defined in the U.S. constitution b. protected even when there is no reasonable expectation of privacy c. violated by the Fourth Amendment d. protected by the Bill of Rights

d. protected by the Bill of Rights

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is: a. the time limitation for a trade secret is longer than for patents and copyrights b. no royalties must be paid on trade secrets c. trade secrets can become part of the prior art and be used to protect patents and copyrights d. there is no need to file an application or disclose a trade secret to gain protection

d. there is no need to file an application or disclose a trade secret to gain protection

The Health Insurance Portability and Accountability Act requires healthcare providers to obtain from patients prior to disclosing any information in their medical records: a. payment for all services rendered b. a social security number c. a second opinion d. written consent

d. written consent


संबंधित स्टडी सेट्स

MKTG FINAL--- PR and Advertising

View Set