Business and Ethics Exam 5

Ace your homework & exams now with Quizwiz!

Which of these specializations was/were spurred by the rapid changes in technology over the past few decades?

A. Smart manufacturing. B. Wireless networks. C. Processing of enormous amounts of data. D. All of the above.

Another name for unsolicited commercial emails is:

A. spam. B. junk e-mail C. UCE D. all of the above

Cyber security experts recommend including which essential elements for an incident-response plan for cyber attacks?

A.Focus on how to respond to a breach. B.Involvement by all functional departments. C.Support from executive leadership. (D. all of the above)

The use of robotics in the workplace has increased recently because:

A.New collaborative machines have been invented. B.The cost of robots has decreased. C.Robots are more reliable than people. All of the above

MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:

A.Uniquely identify an individual's shopping habits and preferences. B. Collect individual social security numbers. C.Identify an individual shopper using only four bits of secondary information. D. (Both A and C, but not B.)

A pain or numbness in your thumbs caused by constant e-mailing, messaging, or Internet surfing on hand-held devices is called:

BlackBerry thumb.

Which of these steps has the U.S recently taken to counter cyber crime

Both A and B, but not C

Which of the following statements is (are) true about the group known as Anonymous?

Both B and C, but not A

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts are collectively referred to as

Cybercrime

The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called:

Cyberspace

This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:

Data Privacy Day.

This Act makes it a crime to circumvent anti piracy measures built into most commercial software agreements between the manufactures and their users:

Digital Millennium Copyright Act.

Supporters of digitized medical records claim that:

Electronic alerts prevented dangerous drug combinations from being prescribed.

In 2013, North Korea opened Internet access to which group of people?

Foreigners using mobile devices or laptops

Software privacy is a major problem in which part of the world?

Globally

Which website received a favorable review because they limited the ability of hackers to take advantage of one another?

Hacker's list

These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

Hacktivists

Over time the role of the CIO:

Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.

The digital divide describes the gap between those:

Individuals who have technology and those who do not.

The phase of technology that focuses on building material goods and manual labor is:

Industrial

The information phase of technology primarily requires

Intellectual and electronic skills.

Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"?

Iran

M-Commerce is facilitated primarily by:

Mobile or cell phones

Which of the following is not a role of the CIO

Monitoring the appropriate level of employee headcount

How has the increase in information technology affected criminal activities globally

New mechanisms for stealing data, trafficking contraband and laundering money have emerged

The idea that every distribution channel must work together to deliver a unified and consistent customer experience

Omnichannel

Which sales channel is projected to top $450 billion within the next several years?

Online

The practice of using fake business emails in order to trick users into divulging personal data, such as usernames and passwords, is called:

Phishing

Which condition below accurately describes a "web-junkie"?

Plays video games for hours on end without a break

We are currently in which phase in the development of technology?

Semantic.

Which of the following countries is not one of the top 15 Internet users?

Singapore

The self-reinforcing feature of technology means that:

Technology acts as a multiplier to encourage is own faster development.

Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones:

United Kingdom.

In some economically developed countries and most developing countries around the world genetically modified food was

Welcomed as a way to increase crop yields

which of the following is true about the US government's PRISM program?

critics of the program called it an unwarranted intrusion by Big Brother

Hackers who intent to profit from their actions are motivated by

financial incentives

The purpose of the right to be forgotten is to

increase protection of privacy and personal information

Which of these actions have western nations taken to fight cyber crime

some nations protected personal privacy and others accessed private information for the public good


Related study sets

Neurology 400 - Special Senses: Taste

View Set

Chapter 31 PrepU Pharmacology (m)

View Set

Analyzing Career Information from the Bureau of Labor Statistics Website Assignment and Quiz 100%

View Set