Filters
Question type

Study Flashcards

In today's legal environment,managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not an example of the potential dark side of big data?


A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future.
B) Use of a device installed in a car to analyze driving habits.
C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories.
D) Use of computerized systems to filter and hire job applicants.
E) Analyzing data from sensors installed in local parks to monitor soil moisture.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Some experts believe that exposure to computers reduces intelligence and makes people dumb.

A) True
B) False

Correct Answer

verifed

verified

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?


A) Property rights and obligations
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Quality of life

F) None of the above
G) A) and D)

Correct Answer

verifed

verified

Because of their special claims to knowledge,wisdom,and respect,professionals take on special rights and obligations.

A) True
B) False

Correct Answer

verifed

verified

Which of the following were involved in what has been called the patent trial of the century?


A) Apple and Microsoft
B) Apple and Hewlett-Packard
C) Microsoft and Symantec
D) Microsoft and Facebook
E) Apple and Samsung

F) None of the above
G) A) and D)

Correct Answer

verifed

verified

All of the following are steps in the process for analyzing an ethical issue except:


A) assigning responsibility.
B) identifying the stakeholders.
C) identifying the options you can reasonably take.
D) identifying and clearly describing the facts.
E) identifying the potential consequences of your options.

F) None of the above
G) B) and D)

Correct Answer

verifed

verified

The U.S.Department of Commerce developed a ________ framework in order to enable U.S.businesses to legally use personal data from EU countries.


A) COPPA
B) P3P
C) PGP
D) FIP
E) safe harbor

F) A) and E)
G) All of the above

Correct Answer

verifed

verified

What are the steps in conducting an ethical analysis?

Correct Answer

verifed

verified

The steps are: (1)Identify and describe ...

View Answer

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?


A) Family and home
B) Property rights and obligations
C) System quality
D) Accountability and control
E) Quality of life

F) B) and C)
G) All of the above

Correct Answer

verifed

verified

________ are not held liable for the messages they transmit.


A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs

F) B) and D)
G) All of the above

Correct Answer

verifed

verified

A Facebook user's visit to a website can be tracked even if they do not click a Like button.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements about Flash cookies is not true?


A) Flash cookies are installed only at the user's request.
B) Flash cookies are stored on the user's computer.
C) Flash cookies cannot be easily detected or deleted.
D) Flash cookies are sometimes called super cookies.
E) Flash cookies can be installed whenever a person clicks a Flash video.

F) A) and E)
G) C) and D)

Correct Answer

verifed

verified

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

A) True
B) False

Correct Answer

verifed

verified

Which ethical rule states that if an action cannot be taken repeatedly,it is not right to take at all?


A) Slippery-slope rule
B) Lemming rule
C) High-failure cost rule
D) Utilitarian principle
E) Golden Rule

F) None of the above
G) All of the above

Correct Answer

verifed

verified

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?


A) Profiling
B) Phishing
C) Spamming
D) Targeting
E) Spyware

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

Discuss the history of Apple's and Samsung's patent battle against each other.

Correct Answer

verifed

verified

In 2011,Apple sued Samsung for violating...

View Answer

Define the basic concepts of responsibility,accountability,and liability as applied to ethical decisions.How are these concepts related?

Correct Answer

verifed

verified

Responsibility is the first key element ...

View Answer

One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names.Is anonymity the same thing as privacy,and should it be a right? What ethical issues are raised by increased anonymity?

Correct Answer

verifed

verified

Student answers will vary,but should inc...

View Answer

Which of the following is the most common reason that business systems fail?


A) Software bugs
B) Software errors
C) Hardware failures
D) Facilities failures
E) Data quality

F) B) and E)
G) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 100

Related Exams

Show Answer