Chapter 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the most common reason that business systems fail?

Data quality

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital divide

___is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

Software programs were unprotected by copyright law until the early 1990s.

False

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

Quality of life

___means that you accept the potential costs and obligations for the decisions you make.

Responsibility

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Advances in data storage and rapidly declining data storage costs have been responsible for multiplying databases on individuals maintained by private and public organizations.

True

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

True

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

True

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

True

Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.

True

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer.

All of the following laws apply to actions by the federal government except:

the Children's Online Privacy Protection Act.


Set pelajaran terkait

10 & 11 LS_Security & Securing TCP/IP

View Set

Grammar Quiz (from Review Sheet, it's a little confusing😂)

View Set

Critical Thinking (Chapters 17 and 18)

View Set