Chapter 11 SOCIAL RESPONSIBILITY AND ETHICS IN MANAGEMENT

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is not a potential source of personal private data?

Broadcast radio.

The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called:

Cyberspace.

How did some authoritarian governments justify limiting citizens' access to the Internet?

Improved national security.

As of 2017 the volume of global spam email messages has declined primarily due to:

Increased anti-spam protections.

An argument in support of preventing government access to private cell phones, according to the case To lock or Unlock Your Phone: Personal Privacy or National Security, is:

Individuals have rights to privacy and safety.

In the 1980s, corn and soybeans were genetically modified, enabling farmers to spray for weeds without harming cultivated plants. At first, these changes were:

expected to increase crop yields per acre.

The digital divide describes the gap between those:

individuals who have Internet access through technology and those who do not.

The fastest growing region for Internet usage growth from 2000 to 2017, was:

Africa.

Many rapid changes in technology over the past few decades were facilitated by:

All of these answers are correct: Artificial intelligence; Wireless networks; Processing of enormous amounts of data;

Another name for unsolicited commercial emails is:

All of these answers are correct: Spam; Junk email; UCE.

Some argue that publishing personal DNA sequencing results is unethical because:

All of these answers are correct: The results could compromise one's employment situation; Life insurance could be denied; The cost of health insurance could rise.

What are the benefits of sequencing the human genome?

Both of these answers are correct: Helps early diagnosis of diseases; spurs new ways to prevent illnesses.

The practice of using fake business emails in order to trick users into divulging personal data, such as usernames and passwords, is called:

Phishing.

In 2017 mobile payment usage was largest for which type of purchase?

Physical goods.

This term refers to the practical applications of science and knowledge to commercial and organizational activities.

Technology.

Microsoft launched a program in 2017 to bring the Internet to more of rural America using:

Unused broadcast channels.

Invasion of privacy through technology is best exemplified by:

Your car's GPS tracking you at every location.

In 2017 about what percentage of people around the world had no access to the Internet?

52 percent.

A compulsion to engage in rewarding behaviors, despite negative consequences is called:

Behavioral addiction.

The phase of technology that focuses on building material goods and manual labor is:

Industrial.

The information phase of technology primarily requires:

Intellectual and electronic skills.

M-Commerce is facilitated primarily by:

Mobile or cell phones.

In 2017 which country had the most restrictive Internet censorship policies, completely blocking its citizens from conducting Internet searches and from using social media platforms?

North Korea.

A person's entitlement to protection from invasion of one's personal life is called the:

Right to privacy.

We are currently in which phase in the development of technology?

Semantic. Correct


Set pelajaran terkait

NCLEX RN Prep U Fluid & Electrolyte Balance

View Set

NCLEX Questions - Care of Patients with Inflammatory Intestinal Disorders

View Set

II Lecture Chapter 18 Short Answer: Diagnosis and Preparation for Surgery pp 398

View Set

Microsoft Excel Lesson 2 Knowledge Assessment

View Set

Genghis Khan and the Mongol Empire

View Set