CSCI

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to an Oxford University study, what percentage of current jobs were expected to be overtaken by robots in the next two decades?

50%

As of 2016 what was the average cost of a data breach in the United States?

7 MILLION

The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.

TRUE

An example of a hacking job motivated by retaliation is:

A person hacks a government website to act against inaction by the government.

The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called:

A.I

In some nondemocratic or authoritarian societies such as China, Pakistan, Iran, and North Korea, why did the governments generally intervene to restrict their citizens' access to information and various Internet and social media sites?

Both of these answers are correct: "To impose religious or ideological views" and "To suppress political dissent."

MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:

Both to uniquely identify an individual's shopping habits and preferences and to identify an individual shopper using only four bits of secondary information.

A CIO is the company's:

CHIEF INFO OFFICER

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as:

CYBERCRIME

One major advantage of conducting business online is:

Cost-effective marketing and promotions

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufacturers and their users:

DIGITAL MILLENNIUM COPYRIGHT ACT

Buying and selling goods and services electronically is called:

E-business.

One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was:

Ensuring the vehicles were safer than driver-controlled automobiles.

A 2017 IBM study predicted that the use of cognitive computing would decline rapidly over the next decade.

FALSE

All countries have nearly identical intellectual property laws.

FALSE

Cybersecurity experts recommend that firms implement an incident-response plan for cyberattacks, which are strictly preventative in nature.

FALSE

Net neutrality refers to the principle that the wealthier users should pay higher rates for faster Internet speeds.

FALSE

The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.

FALSE

The stakeholders rarely targeted by companies for personal data collection are employees and consumers.

FALSE

Software piracy is a major problem in which part of the world?

GLOBALLY

The EU law passed in 2018 that required companies to promptly report personal data breaches was called:

General Data Protection Regulation.

Over time the role of the CIO:

Has becoming more integrated into the overall strategic direction of the firm.

The ideas, concepts, and other symbolic creations of the human mind are often referred to as:

INTELLECTUAL PROPERTY

Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"?

IRAN & CHINA

One ethical concern about businesses collecting vast amounts of stakeholder data is:

If the effort actually benefits the stakeholders.

The purpose of the right to be forgotten is to:

Increase protection of privacy and personal information.

The role of the CIO includes all of these tasks except:

Monitoring the appropriate level of employee productivity.

E-business refers to electronic exchanges from business to business and consumer to business.

TRUE

E-business revenues are expected to rise primarily due to consumers in emerging markets.

TRUE

In 2014, NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.

TRUE

In 2018 the European Union passed legislation to protect personal user data during collection, processing, and storage.

TRUE

One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.

TRUE

The primary reason that hackers hack is to make money.

TRUE

One argument in favor of net neutrality is:

To fairly compete, small, medium, and large firms should have the same Internet bandwidth.

The use of robotics in the workplace has increased recently because:

all answers

The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called:

omnichannel

According to McKinsey and Company, which position cannot be easily replaced with robots?

team managers

A critical characteristic of a successful CIO is:

A leader with the ability to speak the language of the business.

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks? -Focus on how to respond to a breach. -Involvement by all functional departments. -Support from executive leadership.

ALL ANSWERS

This annual international gathering on January 28 brought together leaders from the U.S. and dozens of European countries to address the global nature of cyberattacks:

DATA PRIVACY DAY

Robotic technology has advanced enough to generate many new business opportunities.

TRUE

Some experts believe that cybercrime can only be controlled through international government coordination.

TRUE

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:

WHITE HATTERS


Set pelajaran terkait

A2: Types of Private Insurers Quiz

View Set

HIV.AIDS Optional EAQ's + Clicker Questions

View Set

IF Lec 4: Optimal Currency Areas, Chinese ER regime

View Set