MIS - Chapter 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of following statements about Flash cookies is not true?

Flash cookies are installed only at a user's request.

Which of the following is a primary drawback of the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

What percent of global Internet users use Google Search and other Google services?

Nearly 80 percent

TRUSTe is an example of which of the following?

Online seal program

______________ can be induced by tens of thousands of repetitions under low-impact loads.

RSI

_____________ are not held liable for the messages they transmit.

Regulated common carriers

_____________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

Which of the following is not a difficulty in establishing patent protection?

The requirement that the work must be a secret

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

NORA is:

a data analysis technology that finds hidden connections between data in disparate sources.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

accountability.

Advertisers use ____________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

All of the following are technical solutions to protecting user privacy except:

data use policies.

Immanuel Kant's categorical imperative states that:

if an action is not right for everyone to take, it is not right for anyone to take.

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer

The use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called:

profiling.

The U.S. CAN-SPAM Act:

requires commercial email senders to identify themselves.

The U.S. Department of Commerce developed a(n) ______________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe harbor

According to the ____________ rule, if an action cannot be taken repeatedly, it is not right to take at all.

slippery-slope


Set pelajaran terkait

PN VATI NURSING CARE OF CHILDREN 2020 completed

View Set

Think 3 Unit 3 What's in a name?

View Set

Research in Public Elementary and Secondary Schools - SBE

View Set

Praxis 5089 Middle School Social Studies, Social Studies Praxis Practice Test, Middle School Social Studies Praxis Study Guide 2

View Set

NCSU ST370 Chapters 1-8 Important Content

View Set