ECON 139 Chapter 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is not true about the evolution of Facebook's privacy policies between 2005 and 2015? A) The amount of information gathered and monitored by Facebook increased B) Facebook's privacy policies improved from 2005-2009 C) Facebook's privacy policy became easier to understand D) Facebook's privacy policies have steadily declined since 2009

C) Facebook's privacy policy became easier to understand

________ allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years. A) Copyright law B) Trade secret law C) Patent law D) Trademark law

C) Patent law

____________ can be used to record all keyboard activity of a user. A) Shopping carts B) trusted computing environments C) Spyware D) DRM

C) Spyware

Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures? A) ICANN B) FTC C) WIPO D) USPTO

C) WIPO

Which of the following situations would not qualify for the fair use exception to US copyright law? A) a professor clips a newspaper article just before class and distributes copies of it to his class B) a journalist quotes a paragraph from a book in a review of the book C) a student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website D) Google posts thumbnail images of books in the Google Book Search Project

C) a student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? A) used an anonymous web browsing service B) encrypted their communications C) cleared web browser history and cookies D) posted comments online anonymously

C) cleared web browser history and cookies

The display of a third-party's website or page within your own website is called: A) cybersquatting. B) metatagging. C) framing. D) deep linking

C) framing.

All of the following are required in order for information to be considered a trade secret except: A) it must have commercial value to its owner B) the owner must have taken steps to protect it C) it must be unique D) it must be something that others do not know

C) it must be unique

Amazon has a patent on: A) download-based sales. B) display of third-party advertisements in floating windows. C) one-click purchasing. D) hyperlinks.

C) one-click purchasing

Which of the following tools can companies use to trace user statements and views on newsgroups, chat groups, and other public forums? A) cookies B) digital wallets C) search engines D) shopping carts

C) search engines

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? A) information density B) interactivity C) social technology D) ubiquity

C) social technology

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? A) the Golden Rule B) Risk Aversion C) the Collective Utilitarian principle D) the Social Contract rule

C) the Collective Utilitarian principle

Which of the following statements about the EU General Data Protection Regulation (GDPR) is not true? A) the GDPR replaces the EU's existing Data Protection Directive B) the GDPR applies to any firm operating in an EU country C) the GDPR eliminates the right to be forgotten D) the GDPR limits the ability of companies to use data for purposes other than those for which it was collected

C) the GDPR eliminates the right to be forgotten

A social consequence of the richness of Internet information is: A) an increase in shallowness B) an increase in the ease of creating misleading information C) very persuasive messages might reduce the need for multiple independent sources of information D) an increase in vulnerability to hacking attacks

C) very persuasive messages might reduce the need for multiple independent sources of information

How long does copyright protection extend for corporate-owned works? A) 25 years B) 50 years C) 75 years D) 95 years

D) 95 years

What is the first step in analyzing an ethical dilemma? A) Define the conflict or dilemma and identify the higher-order values involved B) Identify the potential consequences of your opinions C) Identify the options you can reasonably take D) Identify and describe the facts

D) Identify and describe the facts

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? A) the Golden Rule B) the Slippery Slope C) the Social Contract rule D) No Free Lunch

D) No Free Lunch

Which of the following statements about industry self-regulation regarding privacy is not true? A) OPA members are required to implement the OPA'S privacy guideline B) the primary focus of industry efforts has been the use of online "seals" that attest to the site's policies C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion D) The NAI's privacy policies have established the TRUSTe seal

D) The NAI's privacy policies have established the TRUSTe SEAL.

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge? A) USA Patriot Act B) Homeland Security Act C) Communications Assistance for Law Enforcement Act D) USA Freedom Act

D) USA Freedom Act

Which of the following involves bypassing the target site's home page and going directly to a content page? A) cybersquatting B) metatagging C) framing D) deep linking

D) deep linking

Which of the following basic ethical concepts plays an important role in defining privacy? A) responsibility B) accountability C) liability D) due process

D) due process

All of the following are factors that will considered in determining whether use of copyrighted material is "fair use" except the: A) nature of the work used B) amount of the work used C) market effect of the use D) free availability of the work on the Web

D) free availability of the work on he Web

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? A) ubiquity B) interactivity C) information density D) global reach

D) global reach

Disputes over federal trademarks involve establishing: A) underlying ideas. B) intent. C) piracy. D) infringement.

D) infringement.

Which of the following is not a major e-commerce public safety and welfare issue? A) regulation of gambling B) regulation of cigarette sales C) regulation of pornography D) regulation of taxation

D) regulation of taxation

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision an organizing principle of the entire society? A) the Golden Rule B) Risk Aversion C) the Slippery Slope D) the Social Contract rule

D) the Social Contract rule

The Spokeo case involved a claim for damages based on which of the following? A) Fair Credit Reporting Act B) Digital Millenium Copyright Act C) Anti-cybersquatting Consumer Protection Act D) Defined Trade Secrets Act

A) Fair Credit Reporting Act

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security

A) Notice/Awareness

Which of the following is a core Fair Information Practives (FIP) principle? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security

A) Notice/Awareness

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? A) Require firms to have consumers affirmatively opt-in before PII is collected. B) Require firms to allow consumers to opt-out before PII is collected. C) Make collection of PII illegal. D) Require robust notice only before PII is collected.

A) Require firms to have consumers affirmatively opt-in before PII is collected.

Which of the following is not one of the issues complicating the taxation of e-commerce sales? A) Taxes raised are used for different government purposes. B) Sales taxes and policies vary by state and country. C) Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer. D) Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.

A) Taxes raised are used for different government purposes.

Which of the following statements about net neutrality is not true? A) The FCC now regulates ISP pricing. B) The FCC ruled that Internet broadband service providers should be viewed as public utilities similar to telephone companies. C) The FCC overruled state laws that made it difficult for cities to operate their own broadband networks. D) ISPs can no longer discriminate against users on the basis of protocol or amount of usage.

A) The FCC now regulates ISP pricing.

Which of the following statements about the patent battle between Apple and Samsung is not true? A) The courts have decided that Apple does not have a valid patent on the iPhone's user interface. B) The courts have ruled that Samsung has infringed on some of Apple's patents. C) Analysts believe the cost to Apple of this litigation is at least equal to the damage award it may ultimately be paid. D) Over the last five years of litigation, Samsung has changed its interface and functionality to greatly reduce its infringement.

A) The courts have decided that Apple does not have a valid patent on the iPhone's user interface.

Megaupload's founder, Kim Dotcom, was arrested in connection with which of the following? A) copyright infringement B) patent infringement C) trademark infringement D) privacy violation

A) copyright infringement

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging.

A) cybersquatting.

All of the following statements about patents are true except: A) it is more difficult to obtain a copyright than it is to obtain a patent. B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. C) computer programs can be patented. D) to be patented, an invention must be nonobvious.

A) it is more difficult to obtain a copyright than it is to obtain a patent.

___________ is a tiered notice and response system aimed at reducing copyright infringement over P2P networks A) the CAS B) FIP C) Surfright D) The Open Internet Order

A) the CAS

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule

A) the Golden Rule

What is the major reason the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? A) the ability to make perfect copies of digital works at little cost B) the anonymous nature of the Internet C) the support for instant peer-to-peer communication D) the use of standards for file formats

A) the ability to make perfect copies of digital works at little cost

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: A) up to ten years' imprisonment for a first offense B) fines up to %500,000 for a first offense C) fines up to $1 million for a repeat offense D) restitution to the injured parties for any losses due to infringement

A) up to ten years' imprisonment for a first offense

______________ operates the largest private personal database in the world. A) Experian B) Acxiom C) TransUnion Corporation D) Apple

B) Acxiom

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? A) Freedom of Information Act B) Gramm-Leach-Biley Act C) COPPA D) HIPAA

B) Gramm-Leach-Biley Act

____________ is not a privacy advocacy group A) EPIC B) Reputation.com C) CDT D) EFF

B) Reputation.com

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? A) the Slippery Slope B) Risk Aversion C) No Free Lunch D) the Collective Utilitarian Principle

B) Risk Aversion

"Do Not Track" falls under which of the following principles in the FTC's new privacy framework? A) Privacy by Design B) Simplified Choice C) Greater Transparency D) Scope

B) Simplified Choice

Which case was instrumental in paving the way for Internet business methods patents? A) Brown Bag v. Symantec B) State Street Bank & Trust Co. v. Signature Financial Group, Inc. C) Alice Corporation Pty. Ltd. v. CLS Bank International D) Ticketmaster Corp. v. Tickets.com

B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.

Downloading a music track owned by a record company without paying for it is an example of a violation of : A) patent law B) copyright law C) trademark law D) privacy law

B) copyright law

___________ protects original forms of expression in a tangible medium. A) trade secret law B) copyright law C) patent law D) trademark law

B) copyright law

Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging.

B) cyberpiracy.

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A) accountability B) privacy C) responsibility D) liability

B) privacy

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except: A) the DMCA makes it illegal to circumvent technological measures to protect works B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement C) the DMCA requires searhc engines to block access to infringing sites D) the DMCA allows libraries to make digital copies of works for internal use only

B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement

Which ethical principle tells you it's wise to assume perfect information markets? A) the Golden Rule B) the New York Times test C) the Social Contract rule D) the Collective Utilitarian principle

B) the New York Times test

Which ethical principle states that cannot be taken repeatedly, then it is not right to take at all? A) Universalism B) the Slippery Slope C) the Social Contract rule D) the Golden Rule

B) the Slippery Slope

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of: A) cybersquatting. B) typosquatting. C) metatagging. D) linking.

B) typosquatting

Which of the following features of e-commerce technology can result in work and shopping invading family life? A) interactivity B) ubiquity C) information density D) global reach

B) ubiquity

______________ allow(s) you to send email without a trace A) Anonymous surfing B) P3P C) Anonymous remailers D) Public key encryption

C) Anonymous remailers


Set pelajaran terkait

Chapter 27: Condominiums and Cooperatives

View Set

Top 200 Drug Interactions/Contraindications (1-200)

View Set

US History Unit 1 Indigenous Roots - Reconstruction

View Set

5. Life Insurance Policy Provisions, Options and Riders

View Set

Prep U for Brunner and Suddarth's Textbook of Medical Surgical Nursing, 13th Edition Chapter 37: Management of Patients With HIV Infection and AIDS

View Set

Nursing I: Fundamentals 2 Practice Test

View Set

200 Plays Every Theater Major Should Know

View Set

Chapter 3: The Manager's Changing Work Environment

View Set