CH4 test ITC

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following resulted in a Christmas Eve outage for millions of Netflix customers? A bug in Netflix's credit card processing system A hacking attack A blackout at Netflix's primary data center A failure of Amazon's cloud computing service A failure of Netflix's recommendation engine software

A failure of Amazon's cloud computing service

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. The judicial system Accountability The courts of appeal Due process Liability

Accountability

Which of the following were involved in what has been called the patent trial of the century? Apple and Hewlett-Packard Apple and Samsung Apple and Microsoft Microsoft and Symantec Microsoft and Facebook

Apple and Samsung

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. behavioral targeting intelligent agents NORA FIP principles Web bugs

Behavioral targeting

Which of the following is the most common reason that business systems fail? Data quality Hardware failures Software bugs Facilities failures Software errors

Data quality

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Computer Software Copyright Act Digital Millennium Copyright Act Freedom of Information Act Privacy Act Electronic Communications Privacy Act

Digital Millennium Copyright Act

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Liability Responsibility Due process Accountability The judicial system

Due process

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? Freedom of Information Act Privacy Protection Act COPPA HIPAA Gramm-Leach-Bliley Act

HIPPA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? His action is wrong, because the grocery store owner is harmed. His action is wrong, because the man would not want the grocer to steal from him. His action is acceptable, because the higher social value is the survival of the family. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. His action is acceptable, because the grocer suffers the least harm.

His action is acceptable, because the higher social value is the survival of the family.

Which of the following best describes Immanuel Kant's categorical imperative? One can put values in rank order and understand the consequences of various courses of action. You should act towards others as you would like them to act towards you. One should take the action that produces the least harm or incurs the least cost. If an action is not right for everyone to take, it is not right for anyone to take. If an action cannot be taken repeatedly, then it is not right to be taken at any time.

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is not one of the current key technology trends that raises ethical issues? Data storage improvements Advances in networking technology Increase in data quality Increase in use of mobile devices Data analysis advancements

Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Property rights and obligations Information rights and obligations Quality of life Accountability and control System quality

Information rights and obligations

Which of the following is a primary drawback to the "do anything anywhere" work environment? It blurs the traditional boundaries between work and family time. It creates a digital divide. It makes work environments less pleasant. It centralizes power at corporate headquarters. It leads to employees being paid less for the total amount of work performed.

It blurs the traditional boundaries between work and family time.

Which of the following best describes the effect that new information technology has on society? It has a magnifying effect, creating increasing numbers of ethical issues. It is beneficial for society as a whole, while raising dilemmas for consumers. It has a ripple effect, raising new ethical, social, and political issues. It has a waterfall effect in raising ever more complex ethical issues. It has a dampening effect on the discourse of business ethics.

It has a ripple effect, raising new ethical, social, and political issues.

What is not a feature of the General Data Protection Regulation (GDPR)? It requires unambiguous consent for using personal data to construct profiles. It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. It creates a single EU privacy policy. It applies to all firms doing business in the EU. It prevents firms from using cookies.

It prevent firms from using cookies?

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? The "No free lunch" rule Kant's Categorical Imperative The Risk Aversion Principle The Golden Rule The slippery-slope rule

Kant's Categorical imperative

Which of the following is not protected by copyright law? Maps Motion pictures Machines Musical compositions Artwork

Machines

FIP principles are based on a belief in which of the following? Mutuality of interest between the record holder and the individual Responsibility of the record holder Accountability of the record holder Difference between the interests of the individual and commercial organizations Privacy of the individual

Mutuality of interest between the record holder and the individual

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? HIPAA Spyware NORA COPPA FIP

NORA

What percent of global Internet users use Google Search and other Google services such as YouTube? Over 90 percent Around 25 percent Nearly 80 percent About 50 percent Less than 10 percent

Nearly 80 percent

The NAI is an industry association formed to help with which of the following? Trademark protection Patent protection Copyright protection Trade secret protection Online privacy issues

Online privacy issues

Which of the following is not a file-sharing service? Megaupload Grokster Pandora The Pirate Bay Morpheus

Pandora

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Profiling Phishing Spamming Spyware Targeting

Profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Quality of life Property rights and obligations Accountability and control System quality Information rights and obligations

Property rights and obligations

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Family and home Accountability and control Quality of life Property rights and obligations System quality

Quality of life

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? System quality Accountability and control Quality of life Property rights and obligations Information rights and obligations

Quality of life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? RSS CTS RSI Technostress CVS

RSI

________ are not held liable for the messages they transmit. Regulated common carriers Organizations and businesses Elected officials Private individuals European ISPs

Regulated common carriers

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? Lemming rule Slippery-slope rule High-failure cost rule Utilitarian principle Golden Rule

Slippery-slope rule

Which of the following statements about spam is not true? Spamming has mushroomed because it is so inexpensive and can reach so many people. Most spam originates from bot networks. Cell phone spam usually comes in the form of SMS text messages. Spamming is more tightly regulated in the United States than in Europe. Spam costs for business are very high.

Spamming is more tightly regulated in the United States than in Europe.

Which of the following is not an example of the moral dimensions of the information age identified in the text? Quality of life System quality Information rights and obligations The emergence of giant tech firms that dominate their markets Accountability and control

The emergence of giant tech firms that dominate their markets

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? the risk aversion principle the "no free lunch" rule the Golden Rule Kant's categorical imperative the utilitarian principle

The golden Rule

Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? The new rules require Internet companies to delete information at the user's request. The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules do not allow consumers to have their data removed from company servers. The new rules require Internet companies to retain information only as long as absolutely necessary. The new rules strengthen the right to be forgotten.

The new rules do not allow consumers to have their data removed from company servers.

_______ allows an organization to collect personal information without the user's explicit consent. The opt-out model The opt-in model A safe harbor P3P FIP principle

The opt-out model

Which of the following is not a difficulty in establishing patent protection? The requirement that the work must be original The requirement that the work must be novel Length of time required to receive protection The requirement that the work reflect some special understanding and contribution The requirement that the work must be a secret

The requirement that the work must be a secret

which of the following best describes how new information systems can result in legal gray areas? They are little understood by politicians or lawyers. They are created from sets of logical and technological rules rather than social or organizational mores. They are implemented by technicians rather than managers. They result in new situations that are not covered by old laws. They work with networked, digital data, which are more difficult to control than information stored manually.

They result in new situations that are not covered by old laws

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Trade secret All forms of intellectual property protection Patent Trademark Copyright

Trade secret

Which of the following statements about cookies is not true? Cookies cannot be easily detected or deleted. Cookies can be combined with other website data to develop detailed profiles of customers. Cookies are installed only at the user's request. Cookies are stored on the user's computer. Cookies are used to support the user experience on websites.

cookies are installed only at the users request

All of the following are technical solutions to protecting user privacy except: data use policies. preventing client computers from accepting cookies. email encryption. anonymous email. anonymous surfing.

data use policies

Digital media differs from a physical book in all of the following ways except: ease of replication. ease of transmission. ease of establishing uniqueness. ease of alteration. ease of global distribution.

ease of establishing uniquesness

The Network Advertising Initiative is an industry association that: has established technical guidelines for ensuring privacy. encourages self-regulation to develop a set of privacy guidelines for its members. regulates the use of customer information by firms. is a safe harbor program established by the U.S. government. protects user privacy during interactions with websites.

encourages self-regulation to develop a set of privacy guidelines for its members.

CVS refers to: a business practice that attempts to evaluate the intangible values of computer systems. eyestrain related to computer display screen use. carpal vision syndrome. wrist injuries brought about by incorrect hand position when using a keyboard. a type of antivirus protection software.

eyestrain related to computer display screen use

The ethical "no free lunch" rule states that: one can put values in rank order and understand the consequences of various courses of action. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. one should take the action that produces the least harm or incurs the least cost. if an action is not right for everyone to take, it is not right for anyone to take. if an action cannot be taken repeatedly, then it is not right to be taken at any time.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

Redesigning and automating business processes can be seen as a double-edged sword because: increases in efficiency may be accompanied by job losses. support for middle-management decision making may be offset by poor data quality. it can concentrate power in the hands of senior executives. increases in efficiency may be accompanied by poor data quality. reliance on technology results in the loss of hands-on knowledge.

increases in efficiency may be accompanied by job losses.

When a cookie is created during a website visit, it is stored: nowhere, because they are only used during a visit and are discarded once a visitor leaves the website. in the browser's application settings. on the website's server. on the ISP's servers. on the hard drive of the visitor's computer.

on the hard drive of the visitor's computer

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. opt-in safe harbor opt-out PGP P3P

opt-in

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Trademark law Copyright law Trade secret protection Patent law Privacy law

patent

The U.S. CAN-SPAM Act: does not override state anti-spamming laws. does not outlaw the use of fake return addresses. requires commercial email senders to identify themselves. makes spamming illegal. has dramatically cut down spamming

requires commercial email senders to identify themselves.

The ________ is a feature of the GDPR that allows individuals to have their personal information removed from social network and search sites. right to do not track right to opt-out of data collection right to be forgotten right to opt-in to data collection right to a safe harbor

right to be forgotten

According to ________, you should take the action that produces the least harm. the risk aversion principle the Golden Rule the "no free lunch" rule the utilitarian principle Kant's categorical imperative

risk aversion principle

"Look and feel" copyright infringement lawsuits are concerned with: using the creative elements of another product. using the graphical elements of another product. violation of a monopoly on the ideas behind a product. the distinction between tangible and intangible ideas. the distinction between an idea and its expression.

the distinction between an idea and its expression.

The FIP principle of Notice/Awareness states that: consumers should be able to review the data collected about them. websites must disclose their information practices before collecting data. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. there must be a mechanism in place to enforce FIP principles. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use

websites must disclose their information practices before collecting data.


Set pelajaran terkait

Troubleshooting the Digital Video Experience

View Set

Chapter 58: Care of Patients with Liver Problems

View Set