Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems

Full screen (f)
exit full mode
Question
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
Use Space or
up arrow
down arrow
to flip the card.
Question
Private information on the Web-what is posted by a person-is subject to censorship.
Question
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
Question
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
Question
According to the Children's Online Privacy Protection Act (COPPA),any information collected from children must have parental consent.
Question
To minimize the invasion of privacy,users should be barred from reviewing their records.
Question
With employee-monitoring systems,managers can supervise employees' work speeds.
Question
A patent protects product names and identifying marks.
Question
Copyright laws cover online materials that can be printed or saved on a storage device.
Question
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

A)phishing
B)nonrepudiation
C)spoofing
D)accountability
Question
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
Question
To minimize the invasion of privacy,organizations should:

A)not delete data even when it is not needed.
B)not modify data once it is entered into an information system.
C)collect only the data that is necessary for the stated purpose.
D)provide unlimited access to personal information to those who have authorization.
Question
As a knowledge worker,while making a work-related decision,it is unnecessary to check if the decision complies with the organization's values.
Question
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.

A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
Question
To minimize the invasion of privacy,_____.

A)organizations should not delete data even when it is not needed
B)users should be able to review their records and correct any inaccuracies
C)organizations should not modify data once it is entered into an information system
D)users should provide unlimited access to personal information to those who have authorization
Question
In the context of Web and network privacy,an acceptable use policy is a:

A)legal document that protects an organization from embezzlement of money by its service providers.
B)set of rules to govern the electronic fund transfers between an organization and its clients.
C)legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D)set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Question
Because sending spam is expensive,a small response-a fraction of a percent,for example-is an inadequate return on the investment.
Question
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
Question
Information technologies have led to job deskilling.
Question
Green computing helps an organization save on energy costs.
Question
Clement applies for a home loan at Global Bank Inc.As part of the process,he provides his personal details to the banker who is responsible for sanctioning loans.The banker uses Clement's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.

A)unethical and illegal
B)ethical,but illegal
C)legal and ethical
D)legal,but unethical
Question
E-commune,an e-commerce company,uses small text files with unique ID tags to collect users' data.These text files are embedded in a Web browser and saved on the user's hard drive.They make it possible for E-commune to customize its Web page for its customers.Given this information,it can be concluded that E-commune uses _____ to collect data.

A)applets
B)cookies
C)kernels
D)log files
Question
To minimize the invasion of privacy,users and organizations should:

A)provide wrong data to unauthorized users.
B)use verification procedures to ensure data accuracy.
C)keep collected information even after the stated purpose is over.
D)provide access to one's personal information to all interested parties.
Question
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua.In this scenario,Jared's actions are considered _____.

A)ethical,but illegal
B)unethical,but legal
C)illegal and unethical
D)legal and ethical
Question
In the context of ethical issues of information technologies,restricting access to the Web is a type of _____.

A)cybersquatting
B)censorship
C)copyright
D)spamming
Question
Which is a commonly used technology for data collection?

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Question
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form.John,the banker in charge,used Albert's information to sell him a credit card issued by Horizon Bank.In this scenario,John's action is considered _____.

A)illegal and unethical
B)illegal but ethical
C)legal but unethical
D)legal and ethical
Question
_____,which are generated by Web server software,record a user's actions on a Web site.

A)Viruses
B)Junk e-mails
C)Worms
D)Log files
Question
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.

A)ethical,but illegal
B)legal,but unethical
C)illegal and unethical
D)legal and ethical
Question
In order to overcome concerns about hackers getting access to the accounts of online shoppers,electronic payment systems such as _____ are being developed.

A)credit cards
B)e-checks
C)debit cards
D)e-wallets
Question
What information can be censored if the content is deemed offensive to a political,religious,or cultural group?

A)Public
B)Private
C)Secretive
D)Abstracted
Question
The goal of the Health Insurance Portability and Accountability Act (HIPAA)includes:

A)safeguarding health insurers' credit information.
B)protecting medical providers' notes and records.
C)protecting patients' bank information.
D)safeguarding conversations between patients and their families.
Question
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
Question
In the context of information privacy,which of the following is true of spam?

A)It is solicited e-mail sent for business purposes.
B)It can only be send to a small number of people.
C)It is sent in bulk using automated mailing software.
D)It can only be used to provide access to legitimate e-mails.
Question
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

A)Safeguarding patients' billing information
B)Protecting patients' computer records
C)Protecting patients' credit information
D)Safeguarding conversations between patients and their families
Question
In the context of information privacy,junk e-mail is also known as _____.

A)cookie
B)bookmark
C)spam
D)draft
Question
In the context of information privacy,which is true of cookies?

A)They record users' actions on a Web site.
B)They get saved on a computers' primary memory.
C)They provide information about users' location.
D)They make it impossible for Web sites to customize pages for users.
Question
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's action is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
Question
Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

A)Internet censorship
B)Net neutrality
C)Internet security
D)Free Basics
Question
According to the principle of Internet neutrality,Internet service providers (ISPs)and government agencies should _____.

A)cease charging different rates on data
B)treat data based on the types of application
C)start blocking data traffic to specific users
D)discriminate data based on content
Question
In the context of intellectual property,_____ are categorized as industrial property.

A)copyrights
B)music albums
C)novels
D)logos
Question
In the context of intellectual property,which is categorized as copyrighted material?

A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
Question
Which can help offset the digital divide?

A)Increasing the speed of the Internet for the information rich
B)Increasing the number of computers in public places
C)Reducing the number of computer equipment at schools
D)Reducing the Internet bandwidth for the information poor
Question
Identify a true statement about copyright laws.

A)They protect new processes.
B)They protect product names.
C)They protect tangible material,such as books.
D)They protect product identifying marks,such as logos.
Question
In the context of intellectual property,which of the following is categorized as industrial property?

A)Copyrights
B)Artistic works
C)Literary works
D)Trademarks
Question
Which protects contents of an HTML code?

A)Copyright laws
B)Patent laws
C)Laws governing trademarks
D)Industrial property laws
Question
Identify a true statement about information technology.

A)It has increased clerical jobs.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has eliminated more jobs than it has created.
Question
Identify a program used by parents to prevent their children's access to certain Web sites.

A)Hideman
B)Betternet
C)CYBERSitter
D)ZenMate
Question
In general,_____ last the author's lifetime plus 70 years and do not need to be renewed.

A)copyrights
B)patents
C)aero designs
D)industrial designs
Question
When a user accidentally enters an incorrect Web site address,he or she may be directed to an alternative Web site.This is an example of _____.

A)cyberstalking
B)typosquatting
C)phishing
D)spamming
Question
A potential benefit of telecommuting is that it _____.

A)regulates work routine
B)reduces employee turnover
C)separates work and home life
D)increases interaction with coworkers
Question
Organizations can benefit from patents as they can use patents:

A)for an unlimited period of time.
B)for contents derived from other processes.
C)to upgrade a pre-existing patented process.
D)to keep competitors from entering certain market segments.
Question
In the context of intellectual property,_____ is registering,selling,or using a domain name to profit from someone else's trademark.

A)sniffing
B)phishing
C)cybersquatting
D)spamming
Question
In the 1997 Reno v.ACLU case,the U.S.Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA)because they violated the:

A)freedom of speech provisions of the First Amendment.
B)self-defense provisions of the Second Amendment.
C)Fourth Amendment to the United States Constitution.
D)Fifth Amendment to the United States Constitution.
Question
Which is a potential drawback of telecommuting?

A)Increased interruptions from coworkers
B)Lack of necessary supplies or equipment
C)Increased employee turnover and absenteeism
D)Difficult work environment for employees with disabilities
Question
Information technology and the Internet have,in essence,resulted in two groups-the information rich and the information poor.This gap between the two groups is called _____.

A)information barrier
B)domain squat
C)data junction
D)digital divide
Question
Which is a potential benefit of telecommuting?

A)It increases productivity.
B)It regulates work routine.
C)It separates work and home life.
D)It increases the interaction with coworkers.
Question
_____ permits you to use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.

A)Uniform Civil Code
B)The Fair Use Doctrine
C)The Copyright Act of 1790
D)IT code of conduct
Question
_____ laws give only the creator exclusive privileges,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.

A)Trademark
B)Invention
C)Patent
D)Copyright
Question
According to the 1980 revisions to the Copyright Act of 1976,_____.

A)copyright holders can perform a copyrighted work by means of digital audio transmission
B)copyright protection extends to original works of authorship in architectural fields
C)both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D)the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
Question
In the context of information technology in workplaces,which allows adding new tasks to employees' responsibilities?

A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job rotation
Question
The cost of hiring additional employees in virtual organizations is reduced because:

A)there is less emphasis on hiring new talent.
B)skills are shared among the participating companies.
C)companies hire candidates with minimum experience.
D)training costs are reduced because of the absence of training programs.
Question
With virtual organizations,_____.

A)each participating company can focus on its subpar products as well
B)products can be customized more to respond to customers' needs
C)the cost of hiring new employees increases
D)the time needed to develop new products increases
Question
_____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Question
Identify a true statement about information and communications technology (ICT).

A)It generates approximately six percent of the world's greenhouse gases.
B)It generates approximately two percent of the world's carbon dioxide emissions.
C)It helps organizations save energy costs.
D)It improves the quality of the environment in which you work.
Question
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.

A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
Question
In the context of information technology in workplaces,clerical workers using computers for word-processing tasks is an example of _____.

A)job restraining
B)job upgrading
C)job deskilling
D)job sharing
Question
Job deskilling occurs when:

A)experienced labor is eliminated by high technology.
B)a worker is promoted from a semiskilled to a skilled position.
C)a job is carried out manually.
D)fragmented jobs are combined as a whole.
Question
_____ make it possible for Web sites to customize pages for users,such as an e-commerce Web site recommending items based on your past purchases.

A)Cookies
B)Trojans
C)Applets
D)Kernels
Question
In the context of intellectual property,inventions are categorized as _____ properties.

A)literary
B)copyrighted
C)industrial
D)artistic
Question
In the context of Web and network privacy issues,new employees in an organization have to sign a(n)_____before they access the network.

A)article ownership policy
B)standard data policy
C)acceptable use policy
D)user content policy
Question
A common way to index and link databases is by using _____.

A)key customer numbers
B)Virtual Account numbers
C)Social Security numbers
D)protected electronic numbers
Question
_____ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.

A)An identity log file
B)A virtual organization
C)Intellectual property
D)Information policy
Question
Using _____ is a way to solve health issues related to computer equipment.

A)correct lighting
B)wired keyboards
C)a high capacity RAM
D)a high speed Internet
Question
Green computing can be achieved by:

A)using computing devices that are nonbiodegradable.
B)replacing meetings over computer networks with actual face-to-face meetings.
C)replacing one large server with several underutilized smaller servers.
D)using video conferencing,electronic meeting systems,and groupware.
Question
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n)_____.

A)acceptable use policy
B)standard data policy
C)article ownership policy
D)user content policy
Question
A _____ is an intellectual property that protects product names and identifying marks.

A)registration
B)copyright
C)trademark
D)patent
Question
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _____.

A)a virus
B)abug
C)spam
D)a cookie
Question
Which is true of virtual organizations?

A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent suppliers share skills and have access to each other's markets via information technologies.
D)They need an organizational hierarchy for participants to contribute their expertise.
Question
A _____ is an intellectual property that protects new processes.

A)registration
B)copyright
C)trademark
D)patent
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/105
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
1
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
False
2
Private information on the Web-what is posted by a person-is subject to censorship.
False
3
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
False
4
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
5
According to the Children's Online Privacy Protection Act (COPPA),any information collected from children must have parental consent.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
6
To minimize the invasion of privacy,users should be barred from reviewing their records.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
7
With employee-monitoring systems,managers can supervise employees' work speeds.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
8
A patent protects product names and identifying marks.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
9
Copyright laws cover online materials that can be printed or saved on a storage device.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
10
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

A)phishing
B)nonrepudiation
C)spoofing
D)accountability
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
11
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
12
To minimize the invasion of privacy,organizations should:

A)not delete data even when it is not needed.
B)not modify data once it is entered into an information system.
C)collect only the data that is necessary for the stated purpose.
D)provide unlimited access to personal information to those who have authorization.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
13
As a knowledge worker,while making a work-related decision,it is unnecessary to check if the decision complies with the organization's values.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
14
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.

A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
15
To minimize the invasion of privacy,_____.

A)organizations should not delete data even when it is not needed
B)users should be able to review their records and correct any inaccuracies
C)organizations should not modify data once it is entered into an information system
D)users should provide unlimited access to personal information to those who have authorization
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
16
In the context of Web and network privacy,an acceptable use policy is a:

A)legal document that protects an organization from embezzlement of money by its service providers.
B)set of rules to govern the electronic fund transfers between an organization and its clients.
C)legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D)set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
17
Because sending spam is expensive,a small response-a fraction of a percent,for example-is an inadequate return on the investment.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
18
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
19
Information technologies have led to job deskilling.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
20
Green computing helps an organization save on energy costs.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
21
Clement applies for a home loan at Global Bank Inc.As part of the process,he provides his personal details to the banker who is responsible for sanctioning loans.The banker uses Clement's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.

A)unethical and illegal
B)ethical,but illegal
C)legal and ethical
D)legal,but unethical
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
22
E-commune,an e-commerce company,uses small text files with unique ID tags to collect users' data.These text files are embedded in a Web browser and saved on the user's hard drive.They make it possible for E-commune to customize its Web page for its customers.Given this information,it can be concluded that E-commune uses _____ to collect data.

A)applets
B)cookies
C)kernels
D)log files
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
23
To minimize the invasion of privacy,users and organizations should:

A)provide wrong data to unauthorized users.
B)use verification procedures to ensure data accuracy.
C)keep collected information even after the stated purpose is over.
D)provide access to one's personal information to all interested parties.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
24
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua.In this scenario,Jared's actions are considered _____.

A)ethical,but illegal
B)unethical,but legal
C)illegal and unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of ethical issues of information technologies,restricting access to the Web is a type of _____.

A)cybersquatting
B)censorship
C)copyright
D)spamming
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
26
Which is a commonly used technology for data collection?

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
27
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form.John,the banker in charge,used Albert's information to sell him a credit card issued by Horizon Bank.In this scenario,John's action is considered _____.

A)illegal and unethical
B)illegal but ethical
C)legal but unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
28
_____,which are generated by Web server software,record a user's actions on a Web site.

A)Viruses
B)Junk e-mails
C)Worms
D)Log files
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
29
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.

A)ethical,but illegal
B)legal,but unethical
C)illegal and unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
30
In order to overcome concerns about hackers getting access to the accounts of online shoppers,electronic payment systems such as _____ are being developed.

A)credit cards
B)e-checks
C)debit cards
D)e-wallets
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
31
What information can be censored if the content is deemed offensive to a political,religious,or cultural group?

A)Public
B)Private
C)Secretive
D)Abstracted
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
32
The goal of the Health Insurance Portability and Accountability Act (HIPAA)includes:

A)safeguarding health insurers' credit information.
B)protecting medical providers' notes and records.
C)protecting patients' bank information.
D)safeguarding conversations between patients and their families.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
33
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
34
In the context of information privacy,which of the following is true of spam?

A)It is solicited e-mail sent for business purposes.
B)It can only be send to a small number of people.
C)It is sent in bulk using automated mailing software.
D)It can only be used to provide access to legitimate e-mails.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
35
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

A)Safeguarding patients' billing information
B)Protecting patients' computer records
C)Protecting patients' credit information
D)Safeguarding conversations between patients and their families
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
36
In the context of information privacy,junk e-mail is also known as _____.

A)cookie
B)bookmark
C)spam
D)draft
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
37
In the context of information privacy,which is true of cookies?

A)They record users' actions on a Web site.
B)They get saved on a computers' primary memory.
C)They provide information about users' location.
D)They make it impossible for Web sites to customize pages for users.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
38
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's action is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
39
Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

A)Internet censorship
B)Net neutrality
C)Internet security
D)Free Basics
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
40
According to the principle of Internet neutrality,Internet service providers (ISPs)and government agencies should _____.

A)cease charging different rates on data
B)treat data based on the types of application
C)start blocking data traffic to specific users
D)discriminate data based on content
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
41
In the context of intellectual property,_____ are categorized as industrial property.

A)copyrights
B)music albums
C)novels
D)logos
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
42
In the context of intellectual property,which is categorized as copyrighted material?

A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
43
Which can help offset the digital divide?

A)Increasing the speed of the Internet for the information rich
B)Increasing the number of computers in public places
C)Reducing the number of computer equipment at schools
D)Reducing the Internet bandwidth for the information poor
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
44
Identify a true statement about copyright laws.

A)They protect new processes.
B)They protect product names.
C)They protect tangible material,such as books.
D)They protect product identifying marks,such as logos.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
45
In the context of intellectual property,which of the following is categorized as industrial property?

A)Copyrights
B)Artistic works
C)Literary works
D)Trademarks
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
46
Which protects contents of an HTML code?

A)Copyright laws
B)Patent laws
C)Laws governing trademarks
D)Industrial property laws
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
47
Identify a true statement about information technology.

A)It has increased clerical jobs.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has eliminated more jobs than it has created.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
48
Identify a program used by parents to prevent their children's access to certain Web sites.

A)Hideman
B)Betternet
C)CYBERSitter
D)ZenMate
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
49
In general,_____ last the author's lifetime plus 70 years and do not need to be renewed.

A)copyrights
B)patents
C)aero designs
D)industrial designs
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
50
When a user accidentally enters an incorrect Web site address,he or she may be directed to an alternative Web site.This is an example of _____.

A)cyberstalking
B)typosquatting
C)phishing
D)spamming
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
51
A potential benefit of telecommuting is that it _____.

A)regulates work routine
B)reduces employee turnover
C)separates work and home life
D)increases interaction with coworkers
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
52
Organizations can benefit from patents as they can use patents:

A)for an unlimited period of time.
B)for contents derived from other processes.
C)to upgrade a pre-existing patented process.
D)to keep competitors from entering certain market segments.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
53
In the context of intellectual property,_____ is registering,selling,or using a domain name to profit from someone else's trademark.

A)sniffing
B)phishing
C)cybersquatting
D)spamming
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
54
In the 1997 Reno v.ACLU case,the U.S.Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA)because they violated the:

A)freedom of speech provisions of the First Amendment.
B)self-defense provisions of the Second Amendment.
C)Fourth Amendment to the United States Constitution.
D)Fifth Amendment to the United States Constitution.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
55
Which is a potential drawback of telecommuting?

A)Increased interruptions from coworkers
B)Lack of necessary supplies or equipment
C)Increased employee turnover and absenteeism
D)Difficult work environment for employees with disabilities
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
56
Information technology and the Internet have,in essence,resulted in two groups-the information rich and the information poor.This gap between the two groups is called _____.

A)information barrier
B)domain squat
C)data junction
D)digital divide
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
57
Which is a potential benefit of telecommuting?

A)It increases productivity.
B)It regulates work routine.
C)It separates work and home life.
D)It increases the interaction with coworkers.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
58
_____ permits you to use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.

A)Uniform Civil Code
B)The Fair Use Doctrine
C)The Copyright Act of 1790
D)IT code of conduct
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
59
_____ laws give only the creator exclusive privileges,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.

A)Trademark
B)Invention
C)Patent
D)Copyright
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
60
According to the 1980 revisions to the Copyright Act of 1976,_____.

A)copyright holders can perform a copyrighted work by means of digital audio transmission
B)copyright protection extends to original works of authorship in architectural fields
C)both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D)the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
61
In the context of information technology in workplaces,which allows adding new tasks to employees' responsibilities?

A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job rotation
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
62
The cost of hiring additional employees in virtual organizations is reduced because:

A)there is less emphasis on hiring new talent.
B)skills are shared among the participating companies.
C)companies hire candidates with minimum experience.
D)training costs are reduced because of the absence of training programs.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
63
With virtual organizations,_____.

A)each participating company can focus on its subpar products as well
B)products can be customized more to respond to customers' needs
C)the cost of hiring new employees increases
D)the time needed to develop new products increases
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
64
_____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

A)Applets
B)Kernels
C)Cookies
D)Firewalls
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
65
Identify a true statement about information and communications technology (ICT).

A)It generates approximately six percent of the world's greenhouse gases.
B)It generates approximately two percent of the world's carbon dioxide emissions.
C)It helps organizations save energy costs.
D)It improves the quality of the environment in which you work.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
66
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.

A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
67
In the context of information technology in workplaces,clerical workers using computers for word-processing tasks is an example of _____.

A)job restraining
B)job upgrading
C)job deskilling
D)job sharing
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
68
Job deskilling occurs when:

A)experienced labor is eliminated by high technology.
B)a worker is promoted from a semiskilled to a skilled position.
C)a job is carried out manually.
D)fragmented jobs are combined as a whole.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
69
_____ make it possible for Web sites to customize pages for users,such as an e-commerce Web site recommending items based on your past purchases.

A)Cookies
B)Trojans
C)Applets
D)Kernels
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
70
In the context of intellectual property,inventions are categorized as _____ properties.

A)literary
B)copyrighted
C)industrial
D)artistic
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
71
In the context of Web and network privacy issues,new employees in an organization have to sign a(n)_____before they access the network.

A)article ownership policy
B)standard data policy
C)acceptable use policy
D)user content policy
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
72
A common way to index and link databases is by using _____.

A)key customer numbers
B)Virtual Account numbers
C)Social Security numbers
D)protected electronic numbers
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
73
_____ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.

A)An identity log file
B)A virtual organization
C)Intellectual property
D)Information policy
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
74
Using _____ is a way to solve health issues related to computer equipment.

A)correct lighting
B)wired keyboards
C)a high capacity RAM
D)a high speed Internet
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
75
Green computing can be achieved by:

A)using computing devices that are nonbiodegradable.
B)replacing meetings over computer networks with actual face-to-face meetings.
C)replacing one large server with several underutilized smaller servers.
D)using video conferencing,electronic meeting systems,and groupware.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
76
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n)_____.

A)acceptable use policy
B)standard data policy
C)article ownership policy
D)user content policy
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
77
A _____ is an intellectual property that protects product names and identifying marks.

A)registration
B)copyright
C)trademark
D)patent
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
78
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _____.

A)a virus
B)abug
C)spam
D)a cookie
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
79
Which is true of virtual organizations?

A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent suppliers share skills and have access to each other's markets via information technologies.
D)They need an organizational hierarchy for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
80
A _____ is an intellectual property that protects new processes.

A)registration
B)copyright
C)trademark
D)patent
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 105 flashcards in this deck.