Deck 4: Personal, Legal, Ethical, and Organizational Issues

Full screen (f)
exit full mode
Question
To minimize the invasion of privacy, users should be barred from reviewing their records.
Use Space or
up arrow
down arrow
to flip the card.
Question
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
Question
Green computing helps an organization save on energy costs.
Question
With employee-monitoring systems, managers can supervise employees' work speeds.
Question
Under the GDPR, users must be notified regarding any types of data breaches within 12 hours of learning of the breach.
Question
According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
Question
Under the GDPR individuals can easily transfer their personal data between service providers.
Question
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
Question
Private information on the Web-what is posted by a person-is subject to censorship.
Question
Copyright laws cover online materials that can be printed or saved on a storage device.
Question
Information technologies have led to job deskilling.
Question
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
Question
Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.
Question
A company that sells products or services to EU residents must be aware of the General Data Protection Regulation (GDPR)and its consequences only if the company is located in the EU.
Question
The goal of the General Data Protection Regulation (GDPR)is to create more consistent protection of consumer and personal data across EU nations.
Question
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
Question
A patent protects product names and identifying marks.
Question
As a knowledge worker, while making a work-related decision, it is unnecessary to check if the decision complies with the organization's values.
Question
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
Question
The General Data Protection Regulation (GDPR)only applies to select EU member states.
Question
To minimize the invasion of privacy, users and organizations should:

A)provide wrong data to unauthorized users.
B)use verification procedures to ensure data accuracy.
C)keep collected information even after the stated purpose is over.
D)provide access to one's personal information to all interested parties.
Question
To minimize the invasion of privacy, _____.

A)organizations should not delete data even when it is not needed
B)users should be able to review their records and correct any inaccuracies
C)organizations should not modify data once it is entered into an information system
D)users should provide unlimited access to personal information to those who have authorization
Question
Misuse of an individual's medical records will not prevent them from obtaining employment.
Question
A supercookie tracks a user's browsing activities even in a privacy mode.
Question
_____, which are generated by Web server software, record a user's actions on a Web site.

A)Viruses
B)Junk e-mails
C)Worms
D)Log files
Question
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.

A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
Question
Under the GDPR, businesses that deal with US citizens must designate a data protection officer that will build a data protection program to meet GDPR requirements.
Question
To minimize the invasion of privacy, organizations should:

A)not delete data even when it is not needed.
B)not modify data once it is entered into an information system.
C)collect only the data that is necessary for the stated purpose.
D)provide unlimited access to personal information to those who have authorization.
Question
In the context of Web and network privacy, an acceptable use policy is a:

A)legal document that protects an organization from embezzlement of money by its service providers.
B)set of rules to govern the electronic fund transfers between an organization and its clients.
C)legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D)set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Question
Only a few organizations have policies stating that e-mail sent on company-owned computers are the organization's property.
Question
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

A)Safeguarding patients' billing information
B)Protecting patients' computer records
C)Protecting patients' credit information
D)Safeguarding conversations between patients and their families
Question
E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.

A)applets
B)cookies
C)kernels
D)log files
Question
To ensure privacy and accuracy, organizations should allow users to review and correct collected data.
Question
In the context of information privacy, which is true of cookies?

A)They record users' actions on a Web site.
B)They get saved on a computers' primary memory.
C)They provide information about users' location.
D)They make it impossible for Web sites to customize pages for users.
Question
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.

A)credit cards
B)e-checks
C)debit cards
D)e-wallets
Question
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.

A)ethical, but illegal
B)unethical, but legal
C)illegal and unethical
D)legal and ethical
Question
The goal of the Health Insurance Portability and Accountability Act (HIPAA)includes:

A)safeguarding health insurers' credit information.
B)protecting medical providers' notes and records.
C)protecting patients' bank information.
D)safeguarding conversations between patients and their families.
Question
In the context of information privacy, junk e-mail is also known as _____.

A)cookie
B)bookmark
C)spam
D)draft
Question
In the context of information privacy, which of the following is true of spam?

A)It is solicited e-mail sent for business purposes.
B)It can only be send to a small number of people.
C)It is sent in bulk using automated mailing software.
D)It can only be used to provide access to legitimate e-mails.
Question
Which is a commonly used technology for data collection?

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Question
In the context of intellectual property, _____ are categorized as industrial property.

A)copyrights
B)music albums
C)novels
D)logos
Question
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.

A)illegal and unethical
B)legal, but unethical
C)illegal, but ethical
D)legal and ethical
Question
_____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.

A)Trademark
B)Invention
C)Patent
D)Copyright
Question
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA)because they violated the:

A)freedom of speech provisions of the First Amendment.
B)self-defense provisions of the Second Amendment.
C)Fourth Amendment to the United States Constitution.
D)Fifth Amendment to the United States Constitution.
Question
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

A)Uniform Civil Code
B)The Fair Use Doctrine
C)The Copyright Act of 1790
D)IT code of conduct
Question
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____.

A)illegal and unethical
B)illegal but ethical
C)legal but unethical
D)legal and ethical
Question
Identify a true statement about copyright laws.

A)They protect new processes.
B)They protect product names.
C)They protect tangible material, such as books.
D)They protect product identifying marks, such as logos.
Question
Organizations can benefit from patents as they can use patents:

A)for an unlimited period of time.
B)for contents derived from other processes.
C)to upgrade a pre-existing patented process.
D)to keep competitors from entering certain market segments.
Question
Identify a program used by parents to prevent their children's access to certain Web sites.

A)Hideman
B)Betternet
C)CYBERSitter
D)ZenMate
Question
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.

A)cyberstalking
B)typosquatting
C)phishing
D)spamming
Question
Which protects contents of an HTML code?

A)Copyright laws
B)Patent laws
C)Laws governing trademarks
D)Industrial property laws
Question
What information can be censored if the content is deemed offensive to a political, religious, or cultural group?

A)Public
B)Private
C)Secretive
D)Abstracted
Question
According to the 1980 revisions to the Copyright Act of 1976, _____.

A)copyright holders can perform a copyrighted work by means of digital audio transmission
B)copyright protection extends to original works of authorship in architectural fields
C)both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D)the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
Question
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.

A)unethical and illegal
B)ethical, but illegal
C)legal and ethical
D)legal, but unethical
Question
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.

A)ethical, but illegal
B)legal, but unethical
C)illegal and unethical
D)legal and ethical
Question
In the context of intellectual property, which is categorized as copyrighted material?

A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
Question
In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.

A)cybersquatting
B)censorship
C)copyright
D)spamming
Question
Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

A)Internet censorship
B)Net neutrality
C)Internet security
D)Free Basics
Question
In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.

A)copyrights
B)patents
C)aero designs
D)industrial designs
Question
In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.

A)sniffing
B)phishing
C)cybersquatting
D)spamming
Question
In the context of Web and network privacy issues, new employees in an organization have to sign a(n)_____ before they access the network.

A)article ownership policy
B)standard data policy
C)acceptable use policy
D)user content policy
Question
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n)_____ .

A)acceptable use policy
B)standard data policy
C)article ownership policy
D)user content policy
Question
Which is true of virtual organizations?

A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent suppliers share skills and have access to each other's markets via information technologies.
D)They need an organizational hierarchy for participants to contribute their expertise.
Question
In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _____ .

A)a virus
B)a bug
C)spam
D)a cookie
Question
Which is a potential benefit of telecommuting?

A)It increases productivity.
B)It regulates work routine.
C)It separates work and home life.
D)It increases the interaction with coworkers.
Question
The cost of hiring additional employees in virtual organizations is reduced because:

A)there is less emphasis on hiring new talent.
B)skills are shared among the participating companies.
C)companies hire candidates with minimum experience.
D)training costs are reduced because of the absence of training programs.
Question
Which is a potential drawback of telecommuting?

A)Increased interruptions from coworkers
B)Lack of necessary supplies or equipment
C)Increased employee turnover and absenteeism
D)Difficult work environment for employees with disabilities
Question
_____  are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Question
Identify a true statement about information technology.

A)It has increased clerical jobs.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has eliminated more jobs than it has created.
Question
Job deskilling occurs when:

A)experienced labor is eliminated by high technology.
B)a worker is promoted from a semiskilled to a skilled position.
C)a job is carried out manually.
D)fragmented jobs are combined as a whole.
Question
Using _____ is a way to solve health issues related to computer equipment.

A)correct lighting
B)wired keyboards
C)a high capacity RAM
D)a high speed Internet
Question
In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.

A)job restraining
B)job upgrading
C)job deskilling
D)job sharing
Question
Which can help offset the digital divide?

A)Increasing the speed of the Internet for the information rich
B)Increasing the number of computers in public places
C)Reducing the number of computer equipment at schools
D)Reducing the Internet bandwidth for the information poor
Question
_____  make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.

A)Cookies
B)Trojans
C)Applets
D)Kernels
Question
A potential benefit of telecommuting is that it _____.

A)regulates work routine
B)reduces employee turnover
C)separates work and home life
D)increases interaction with coworkers
Question
In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?

A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job rotation
Question
Which is a true statement about information and communications technology (ICT)?

A)It generates approximately six percent of the world's greenhouse gases.
B)It generates approximately two percent of the world's carbon dioxide emissions.
C)It generates more carbon dioxide emissions than the aviation industry.
D)It degrades the quality of the environment in which you work.
Question
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
Question
Green computing can be achieved by:

A)using computing devices that are nonbiodegradable.
B)replacing meetings over computer networks with actual face-to-face meetings.
C)replacing one large server with several underutilized smaller servers.
D)using video conferencing, electronic meeting systems, and groupware.
Question
A common way to index and link databases is by using _____ .

A)key customer numbers
B)Virtual Account numbers
C)Social Security numbers
D)protected electronic numbers
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/124
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Personal, Legal, Ethical, and Organizational Issues
1
To minimize the invasion of privacy, users should be barred from reviewing their records.
False
2
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
False
3
Green computing helps an organization save on energy costs.
True
4
With employee-monitoring systems, managers can supervise employees' work speeds.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
5
Under the GDPR, users must be notified regarding any types of data breaches within 12 hours of learning of the breach.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
6
According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
7
Under the GDPR individuals can easily transfer their personal data between service providers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
8
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
9
Private information on the Web-what is posted by a person-is subject to censorship.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
10
Copyright laws cover online materials that can be printed or saved on a storage device.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
11
Information technologies have led to job deskilling.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
12
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
13
Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
14
A company that sells products or services to EU residents must be aware of the General Data Protection Regulation (GDPR)and its consequences only if the company is located in the EU.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
15
The goal of the General Data Protection Regulation (GDPR)is to create more consistent protection of consumer and personal data across EU nations.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
16
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
17
A patent protects product names and identifying marks.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
18
As a knowledge worker, while making a work-related decision, it is unnecessary to check if the decision complies with the organization's values.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
19
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
20
The General Data Protection Regulation (GDPR)only applies to select EU member states.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
21
To minimize the invasion of privacy, users and organizations should:

A)provide wrong data to unauthorized users.
B)use verification procedures to ensure data accuracy.
C)keep collected information even after the stated purpose is over.
D)provide access to one's personal information to all interested parties.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
22
To minimize the invasion of privacy, _____.

A)organizations should not delete data even when it is not needed
B)users should be able to review their records and correct any inaccuracies
C)organizations should not modify data once it is entered into an information system
D)users should provide unlimited access to personal information to those who have authorization
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
23
Misuse of an individual's medical records will not prevent them from obtaining employment.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
24
A supercookie tracks a user's browsing activities even in a privacy mode.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
25
_____, which are generated by Web server software, record a user's actions on a Web site.

A)Viruses
B)Junk e-mails
C)Worms
D)Log files
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
26
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.

A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
27
Under the GDPR, businesses that deal with US citizens must designate a data protection officer that will build a data protection program to meet GDPR requirements.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
28
To minimize the invasion of privacy, organizations should:

A)not delete data even when it is not needed.
B)not modify data once it is entered into an information system.
C)collect only the data that is necessary for the stated purpose.
D)provide unlimited access to personal information to those who have authorization.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
29
In the context of Web and network privacy, an acceptable use policy is a:

A)legal document that protects an organization from embezzlement of money by its service providers.
B)set of rules to govern the electronic fund transfers between an organization and its clients.
C)legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D)set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
30
Only a few organizations have policies stating that e-mail sent on company-owned computers are the organization's property.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
31
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

A)Safeguarding patients' billing information
B)Protecting patients' computer records
C)Protecting patients' credit information
D)Safeguarding conversations between patients and their families
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
32
E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.

A)applets
B)cookies
C)kernels
D)log files
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
33
To ensure privacy and accuracy, organizations should allow users to review and correct collected data.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
34
In the context of information privacy, which is true of cookies?

A)They record users' actions on a Web site.
B)They get saved on a computers' primary memory.
C)They provide information about users' location.
D)They make it impossible for Web sites to customize pages for users.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
35
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.

A)credit cards
B)e-checks
C)debit cards
D)e-wallets
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
36
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.

A)ethical, but illegal
B)unethical, but legal
C)illegal and unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
37
The goal of the Health Insurance Portability and Accountability Act (HIPAA)includes:

A)safeguarding health insurers' credit information.
B)protecting medical providers' notes and records.
C)protecting patients' bank information.
D)safeguarding conversations between patients and their families.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
38
In the context of information privacy, junk e-mail is also known as _____.

A)cookie
B)bookmark
C)spam
D)draft
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
39
In the context of information privacy, which of the following is true of spam?

A)It is solicited e-mail sent for business purposes.
B)It can only be send to a small number of people.
C)It is sent in bulk using automated mailing software.
D)It can only be used to provide access to legitimate e-mails.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
40
Which is a commonly used technology for data collection?

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
41
In the context of intellectual property, _____ are categorized as industrial property.

A)copyrights
B)music albums
C)novels
D)logos
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
42
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.

A)illegal and unethical
B)legal, but unethical
C)illegal, but ethical
D)legal and ethical
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
43
_____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.

A)Trademark
B)Invention
C)Patent
D)Copyright
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
44
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA)because they violated the:

A)freedom of speech provisions of the First Amendment.
B)self-defense provisions of the Second Amendment.
C)Fourth Amendment to the United States Constitution.
D)Fifth Amendment to the United States Constitution.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
45
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

A)Uniform Civil Code
B)The Fair Use Doctrine
C)The Copyright Act of 1790
D)IT code of conduct
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
46
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____.

A)illegal and unethical
B)illegal but ethical
C)legal but unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
47
Identify a true statement about copyright laws.

A)They protect new processes.
B)They protect product names.
C)They protect tangible material, such as books.
D)They protect product identifying marks, such as logos.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
48
Organizations can benefit from patents as they can use patents:

A)for an unlimited period of time.
B)for contents derived from other processes.
C)to upgrade a pre-existing patented process.
D)to keep competitors from entering certain market segments.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
49
Identify a program used by parents to prevent their children's access to certain Web sites.

A)Hideman
B)Betternet
C)CYBERSitter
D)ZenMate
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
50
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.

A)cyberstalking
B)typosquatting
C)phishing
D)spamming
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
51
Which protects contents of an HTML code?

A)Copyright laws
B)Patent laws
C)Laws governing trademarks
D)Industrial property laws
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
52
What information can be censored if the content is deemed offensive to a political, religious, or cultural group?

A)Public
B)Private
C)Secretive
D)Abstracted
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
53
According to the 1980 revisions to the Copyright Act of 1976, _____.

A)copyright holders can perform a copyrighted work by means of digital audio transmission
B)copyright protection extends to original works of authorship in architectural fields
C)both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D)the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
54
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.

A)unethical and illegal
B)ethical, but illegal
C)legal and ethical
D)legal, but unethical
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
55
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.

A)ethical, but illegal
B)legal, but unethical
C)illegal and unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
56
In the context of intellectual property, which is categorized as copyrighted material?

A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
57
In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.

A)cybersquatting
B)censorship
C)copyright
D)spamming
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
58
Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

A)Internet censorship
B)Net neutrality
C)Internet security
D)Free Basics
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
59
In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.

A)copyrights
B)patents
C)aero designs
D)industrial designs
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
60
In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.

A)sniffing
B)phishing
C)cybersquatting
D)spamming
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
61
In the context of Web and network privacy issues, new employees in an organization have to sign a(n)_____ before they access the network.

A)article ownership policy
B)standard data policy
C)acceptable use policy
D)user content policy
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
62
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n)_____ .

A)acceptable use policy
B)standard data policy
C)article ownership policy
D)user content policy
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
63
Which is true of virtual organizations?

A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent suppliers share skills and have access to each other's markets via information technologies.
D)They need an organizational hierarchy for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
64
In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _____ .

A)a virus
B)a bug
C)spam
D)a cookie
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
65
Which is a potential benefit of telecommuting?

A)It increases productivity.
B)It regulates work routine.
C)It separates work and home life.
D)It increases the interaction with coworkers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
66
The cost of hiring additional employees in virtual organizations is reduced because:

A)there is less emphasis on hiring new talent.
B)skills are shared among the participating companies.
C)companies hire candidates with minimum experience.
D)training costs are reduced because of the absence of training programs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
67
Which is a potential drawback of telecommuting?

A)Increased interruptions from coworkers
B)Lack of necessary supplies or equipment
C)Increased employee turnover and absenteeism
D)Difficult work environment for employees with disabilities
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
68
_____  are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
69
Identify a true statement about information technology.

A)It has increased clerical jobs.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has eliminated more jobs than it has created.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
70
Job deskilling occurs when:

A)experienced labor is eliminated by high technology.
B)a worker is promoted from a semiskilled to a skilled position.
C)a job is carried out manually.
D)fragmented jobs are combined as a whole.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
71
Using _____ is a way to solve health issues related to computer equipment.

A)correct lighting
B)wired keyboards
C)a high capacity RAM
D)a high speed Internet
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
72
In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.

A)job restraining
B)job upgrading
C)job deskilling
D)job sharing
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
73
Which can help offset the digital divide?

A)Increasing the speed of the Internet for the information rich
B)Increasing the number of computers in public places
C)Reducing the number of computer equipment at schools
D)Reducing the Internet bandwidth for the information poor
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
74
_____  make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.

A)Cookies
B)Trojans
C)Applets
D)Kernels
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
75
A potential benefit of telecommuting is that it _____.

A)regulates work routine
B)reduces employee turnover
C)separates work and home life
D)increases interaction with coworkers
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
76
In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?

A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job rotation
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
77
Which is a true statement about information and communications technology (ICT)?

A)It generates approximately six percent of the world's greenhouse gases.
B)It generates approximately two percent of the world's carbon dioxide emissions.
C)It generates more carbon dioxide emissions than the aviation industry.
D)It degrades the quality of the environment in which you work.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
78
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
79
Green computing can be achieved by:

A)using computing devices that are nonbiodegradable.
B)replacing meetings over computer networks with actual face-to-face meetings.
C)replacing one large server with several underutilized smaller servers.
D)using video conferencing, electronic meeting systems, and groupware.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
80
A common way to index and link databases is by using _____ .

A)key customer numbers
B)Virtual Account numbers
C)Social Security numbers
D)protected electronic numbers
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 124 flashcards in this deck.