ITC 761 - Chapter 4

Ace your homework & exams now with Quizwiz!

7) The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

A) Profiling

CVS refers to: A) eyestrain related to computer display screen use. B) a business practice that attempts to evaluate the intangible values of computer systems. C) carpal vision syndrome. D) a type of antivirus protection software. E) wrist injuries brought about by incorrect hand position when using a keyboard.

A) eyestrain related to computer display screen use.

_______ means that you accept the potential costs and obligations for the decisions you make. A. Liability B. Due process C. Responsibility D. Accountability E. Duty

C. Responsibility

All of the following laws apply to actions by the federal government except the: Privacy Act. E-Government Act. Freedom of Information Act. Children's Online Privacy Protection Act. Computer Security Act.

Children's Online Privacy Protection Act.

26) Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

D) the Golden Rule

Which of the following were involved in what has been called the patent trial of the century? A) Apple and Microsoft B) Apple and Hewlett-Packard C) Microsoft and Symantec D) Microsoft and Facebook E) Apple and Samsung

E) Apple and Samsung

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) FIP E) safe harbor

E) safe harbor

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? Freedom of Information Act Gramm-Leach-Bliley Act Privacy Protection Act HIPAA COPPA

HIPAA

FIP principles are based on a belief in which of the following? Responsibility of the record holder Difference between the interests of the individual and commercial organizations Accountability of the record holder Privacy of the individual Mutuality of interest between the record holder and the individual

Mutuality of interest between the record holder and the individual

What percent of global Internet users use Google Search and other Google services such as YouTube? About 50 percent Less than 10 percent Over 90 percent Nearly 80 percent Around 25 percent

Nearly 80 percent

Which of the five moral dimensions of the information age does spamming involve? Quality of life Accountability and control Information rights and obligations Property rights and obligations System quality

Quality of life

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? The Privacy Act COPPA HIPPA The Freedom of Information Act The Gramm-Leach-Bliley Act

The Privacy Act

____ means that you accept the potential costs and obligations for the decisions you make. a) Responsibility b) Accountability c) Duty d) Due process e) Liability

a) Responsibility

Digital media differs from a physical book in all of the following ways except: a) ease of transmission b) ease of establishing uniqueness c) ease of alteration d) ease of replication e) ease of global distribution

b) ease of establishing uniqueness

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. NORA intelligent agents FIP principles behavioral targeting Web bugs

behavioral targeting

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? a) Lemming rule b) Utilitarian principle c) Slippery-slope rule d) High-failure cost rule e) Golden Rule

c) Slippery-slope rule

All of the following are technical solutions to protecting user privacy except: anonymous email. preventing client computers from accepting cookies. email encryption. data use policies. anonymous surfing.

data use policies.

When a cookie is created during a website visit, it is stored: a) on the ISP's servers b) in the browser's application settings c) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site d) on the website's server e) on the hard drive of the visitor's computer

e) on the hard drive of the visitor's computer

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: consumers should be able to review and contest the accuracy and completeness of data. firms should build products and services that protect privacy. firms should limit the length of time that any personal data is stored to six months or less. firms should require consumer consent and provide clear options to opt out of data collection.

firms should limit the length of time that any personal data is stored to six months or less.

Which of the following resulted in a Christmas Eve outage for millions of Netflix customers? A hacking attack A failure of Amazon's cloud computing service A bug in Netflix's credit card processing system A blackout at Netflix's primary data center A failure of Netflix's recommendation engine software

A failure of Amazon's cloud computing service

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act

A) Digital Millennium Copyright Act

52) Which of the following statements about Flash cookies is not true? A) Flash cookies are installed only at the user's request. B) Flash cookies are stored on the user's computer. C) Flash cookies cannot be easily detected or deleted. D) Flash cookies are sometimes called super cookies. E) Flash cookies can be installed whenever a person clicks a Flash video.

A) Flash cookies are installed only at the user's request.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule E) The slippery-slope rule

A) Kant's Categorical Imperative

17) ________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability

B) Accountability

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A) His action is acceptable, because the grocer suffers the least harm. B) His action is acceptable, because the higher social value is the survival of the family. C) His action is wrong, because the man would not want the grocer to steal from him. D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E) His action is wrong, because the grocery store owner is harmed.

B) His action is acceptable, because the higher social value is the survival of the family.

Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.

B) They result in new situations that are not covered by old laws.

86) The U.S. CAN-SPAM Act: A) makes spamming illegal. B) requires commercial email senders to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.

B) requires commercial email senders to identify themselves.

The FIP principle of​ Notice/Awareness states​ that: A. there must be a mechanism in place to enforce FIP principles. B. websites must disclose their information practices before collecting data. C. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. D. consumers should be able to review the data collected about them. E. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.

B. websites must disclose their information practices before collecting data.

5) Which of the following is not one of the current key technology trends that raises ethical issues? A) Data storage improvements B) Data analysis advancements C) Increase in data quality D) Increase in use of mobile devices E) Advances in networking technology

C) Increase in data quality

Which of the following protects the authors of a book from having their work copied by others? Patent protection Fair Use Doctrine Due process Trade Secret law Copyright law

Copyright law

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.

D) It blurs the traditional boundaries between work and family time.

Which of the following is the most common reason that business systems fail? Software bugs Facilities failures Software errors Data quality Hardware failures

Data quality

The NAI is an industry association formed to help with which of the following? Trade secret protection Copyright protection Patent protection Trademark protection Online privacy issues

Online privacy issues

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Quality of life Information rights and obligations Property rights and obligations System quality Accountability and control

Property rights and obligations

Which of the following statements about spam is not true? Spamming is more tightly regulated in Europe than in the United States. Spam costs for business are very high. Most spam originates from bot networks. Spamming has mushroomed because it is so inexpensive and can reach so many people. Cell phone spam usually comes in the form of SMS text messages.

Spamming is more tightly regulated in Europe than in the United States.

Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? The new rules require Internet companies to retain information only as long as absolutely necessary. The new rules strengthen the right to be forgotten. The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules require Internet companies to delete information at the user's request. The new rules do not allow consumers to have their data removed from company servers.

The new rules do not allow consumers to have their data removed from company servers.

________ allows an organization to collect personal information without the user's explicit consent. P3P FIP principles The opt-in model A safe harbor The opt-out model

The opt-out model

The ethical​ "no free​ lunch" rule states​ that: A. one should take the action that produces the least harm or incurs the least cost. B. if an action is not right for everyone to​ take, it is not right for anyone to take. C. if something someone else has created is useful to​ you, it has​ value, and you should assume the creator wants compensation for this work. D. one can put values in rank order and understand the consequences of various courses of action. E.

if something someone else has created is useful to​ you, it has​ value, and you should assume the creator wants compensation for this work.


Related study sets

Rights Legislation and the Civil Rights Act of 1991

View Set

Chapter 8 Health- Multiple Choice

View Set

Emperical Formula of Copper Oxide

View Set

PR Writing Quiz Questions/Answers

View Set

dbchapter 7: URINARY TRACT review questions

View Set