Filters
Question type

Study Flashcards

Which of the following is not protected by copyright law?


A) Musical compositions
B) Motion pictures
C) Maps
D) Artwork
E) Machines

F) A) and B)
G) B) and E)

Correct Answer

verifed

verified

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

A) True
B) False

Correct Answer

verifed

verified

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.


A) Due process
B) Accountability
C) The courts of appeal
D) The judicial system
E) Liability

F) C) and D)
G) D) and E)

Correct Answer

verifed

verified

Which of the five moral dimensions of the information age does spamming involve?


A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Property rights and obligations

F) A) and D)
G) A) and B)

Correct Answer

verifed

verified

The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings.

A) True
B) False

Correct Answer

verifed

verified

When a cookie is created during a website visit, it is stored:


A) on the website's server.
B) on the hard drive of the visitor's computer.
C) on the ISP's servers.
D) in the browser's application settings.
E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.

F) D) and E)
G) All of the above

Correct Answer

verifed

verified

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?


A) Copyright
B) Patent
C) All forms of intellectual property protection
D) Trademark
E) Trade secret

F) None of the above
G) D) and E)

Correct Answer

verifed

verified

In today's legal environment, managers who are convicted for the misuse of information systems are likely to be given a prison sentence.

A) True
B) False

Correct Answer

verifed

verified

Describe how a cookie works.

Correct Answer

verifed

verified

A cookie works as follows: A user opens ...

View Answer

All of the following laws apply to actions by the federal government except:


A) the Freedom of Information Act.
B) the Privacy Act.
C) the Computer Security Act.
D) the Children's Online Privacy Protection Act.
E) the E-Government Act.

F) C) and E)
G) A) and E)

Correct Answer

verifed

verified

What do you consider to be the primary ethical, social, and political issues regarding the quality of a software product?

Correct Answer

verifed

verified

Student answers will vary, but should in...

View Answer

Describe three technology trends that pose ethical issues, giving an example for each of its ethical or moral impact.

Correct Answer

verifed

verified

Key technology trends include the follow...

View Answer

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.


A) behavioral targeting
B) Web bugs
C) NORA
D) intelligent agents
E) FIP principles

F) B) and D)
G) A) and D)

Correct Answer

verifed

verified

Which of the following is not true about the GDPR?


A) The GDPR requires Internet companies to obtain explicit consent from consumers for the use of their personal data.
B) The GDPR requires Internet companies to delete information at the user's request.
C) The GDPR requires Internet companies to retain information only as long as absolutely necessary.
D) The GDPR rejects the right to be forgotten.
E) The GDPR applies only to all companies providing services in Europe.

F) None of the above
G) B) and E)

Correct Answer

verifed

verified

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

A) True
B) False

Correct Answer

verifed

verified

Due process is a feature of political systems and allows individuals to recover damages done to them by others.

A) True
B) False

Correct Answer

verifed

verified

The FIP principle of Notice/Awareness states that:


A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C) there must be a mechanism in place to enforce FIP principles.
D) consumers should be able to review the data collected about them.
E) websites must disclose their information practices before collecting data.

F) A) and C)
G) None of the above

Correct Answer

verifed

verified

Which of the following is considered the most important U.S. federal statute setting forth conditions for handling information about individuals?


A) The Privacy Act
B) The Gramm-Leach-Bliley Act
C) The Freedom of Information Act
D) COPPA
E) HIPAA

F) A) and C)
G) None of the above

Correct Answer

verifed

verified

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

A) True
B) False

Correct Answer

verifed

verified

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?


A) Kant's categorical imperative
B) the risk aversion principle
C) the utilitarian principle
D) the Golden Rule
E) the "no free lunch" rule

F) C) and D)
G) B) and E)

Correct Answer

verifed

verified

Showing 61 - 80 of 100

Related Exams

Show Answer