BCIS Ch 4 Quiz
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Assign responsibility.
Which of the following is the most common source of business system failure?
Data quality
Which of the following statements about Flash cookies is not true?
Flash cookies are installed only at the user's request.
Which of the five moral dimensions of the information age do the central business activities of DoubleClick raise?
Information rights and obligations
What percent of global Internet users use Google Search and other Google services?
Nearly 80 percent
The NAI is an industry association formed to help with which of the following?
Online privacy issues
TRUSTe is an example of which of the following?
Online seal program
Which of the following is not a file-sharing service?
Pandora
Which of the following statements about spam is not true?
Spamming is less regulated in Europe than in the United States.
Which of the following is not a difficulty in establishing patent protection?
The requirement that the work must be a secret
The FIP principle of Notice/Awareness states that:
Websites must disclose their information practices before collecting data.
In today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
false
The rate of global piracy is approximately 20%.
false
All of the following are current key technology trends raising ethical issues except:
increase in data quality.
Redesigning and automating business processes can be seen as a double-edged sword because:
increases in efficiency may be accompanied by job losses.
FIP principles are based on the notion of the:
mutuality of interest between the record holder and the individual.
All of the following laws apply to actions by the federal government except:
the Children's Online Privacy Protection Act.
A drawback to copyright protection is that the ideas underlying the work are not protected, only their manifestation in the work.
true
Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.
true
Spyware is software that comes hidden in downloaded applications and can track your online movements.
true