Deck 12: Ethical, legal, and Social Issues of Information Technology

Full screen (f)
exit full mode
Question
The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy."

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is true of stingray?

A)It supports operations that require aerial surveillance.
B)It is a national security agency surveillance program that collects Internet data including search histories.
C)It impersonates a cell tower and forces all mobile phones within range to connect to it.
D)It is an airline passenger prescreening program that checks travelers' personal information.
Question
The Fourth Amendment to the U.S.Constitution was adopted to _____.

A)guarantee fair trial and other rights of an accused
B)prohibit excessive bail as well as cruel and unusual punishment
C)protect people from unreasonable searches and seizures of properties
D)guarantee the rights to freedom of religion,freedom of expression,and freedom to assemble
Question
Which of the following is true of the First Amendment to the U.S.Constitution?

A)It was adopted to protect Americans from unreasonable searches and seizures of properties.
B)It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.
C)It was adopted to guarantee fair trial and other rights of the accused.
D)It was adopted to guarantee Americans' rights to freedom of religion,freedom of expression,and freedom to assemble.
Question
Which of the following amendments to the U.S.Constitution comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people,as this could threaten their right to assemble or gather peacefully?

A)The First Amendment
B)The Second Amendment
C)The Third Amendment
D)The Fourth Amendment
Question
Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.

A)Customer relationship management
B)Business intelligence management
C)Access information management
D)Enterprise resource management
Question
ZoomMe is a company that accumulates data on people from various sources such as online product registration forms,credit card purchases,and other public records.It then uses these data to create profiles on people and sell them to advertisers.ZoomMe comes under the category of _____.

A)data brokers
B)data miners
C)privacy analysts
D)privacy brokers
Question
_____ is a set of beliefs about right and wrong behavior.

A)Moral
B)Law
C)Ethics
D)Value
Question
Which of the following defines law?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It is a set of principles and core values that are essential to ethical work and governs a practitioner's behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do.
Question
David collects pieces of information about individuals garnered from data brokers.He then uses this information to threaten the individuals to publicly uncover their personal details until a monetary ransom is paid to him.Identify the tactic used by David to gather the information.

A)Doxing
B)Spamming
C)Hacking
D)Cracking
Question
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.

A)Hacking
B)Spamming
C)Doxing
D)Cracking
Question
Which of the following is a national security agency surveillance program that collects Internet data including search histories?

A)Stingray
B)PRISM
C)Secure flight program
D)Backscatter imaging scanners
Question
_____ identify and reference people in photos and videos posted on Facebook.

A)Facebook shares
B)Facebook notifications
C)Facebook messages
D)Facebook tags
Question
Which of the following best describes morals?

A)They are an individual's beliefs about right and wrong.
B)They are a set of beliefs about right and wrong behavior that are universally accepted.
C)They consist of principles and core values that are essential to behavior.
D)They are a system of rules enforced by a set of institutions that states what a person can and cannot do.
Question
Which of the following is true of a cookie?

A)It saves shortcuts to Web sites and navigates to them within a few seconds.
B)It helps users to browse incognito by hiding their browsing data.
C)It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request.
D)It captures browsing history for Web site customization and personalization purposes.
Question
Which of the following is true of a code of ethics?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It states the principles and core values that are essential to any professional's work and that govern their behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do .
Question
Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?

A)Dashboard recognizer
B)Stingray
C)Automatic license plate reader
D)Secure flight program
Question
Which of the following acts as a reference point to determine what is legal and what is ethical?

A)Code of laws
B)Code of ethics
C)Code of conduct
D)Code of practice
Question
John,a lawyer,defends his client,who is accused of murder,to the best of his ability while conforming to the _____ of his profession.

A)ethics
B)morals
C)laws
D)values
Question
_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.

A)Data brokers
B)Yellow pagers
C)Data miners
D)Drill-down analysts
Question
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?

A)A wiki
B)A cookie
C)An antivirus
D)A bookmark
Question
_____ is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment of the victim.

A)Hacking
B)Doxing
C)Phishing
D)Distributed denial-of-service
Question
A _____ is charged with the responsibility of ensuring that an organization does not violate state and federal government regulations.

A)Data Security Officer (DSO)
B)Chief Operations Officer (COO)
C)Database Privacy Officer (DPO)
D)Chief Privacy Officer (CPO)
Question
A company based in Houston wants to expand its business to Rome.The human resources department will run background checks from Houston.Identify the condition that must be satisfied to make this possible.

A)A "safe harbor" framework must be developed.
B)The US Patriot Act must be implemented.
C)A doxing framework must be developed.
D)The Digital Millennium Copyright Act must be implemented.
Question
PindCart,an online retailer,places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site.The company uses this file to generate a personalized welcome message to its visitors.This small file is called a _____.

A)cookie
B)metadata
C)data dictionary
D)popup
Question
Identify a drawback of the Fourth Amendment of the U.S.Constitution.

A)It does not benefit government employees.
B)It does not benefit private employees.
C)It benefits only voluntary organizations.
D)It benefits only nonprofit organizations.
Question
A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email,Internet,and phone usage were not private and that their use might be monitored.

A)public
B)nonprofit
C)voluntary
D)private
Question
Who should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data?

A)Editor-in-chief
B)Chief Privacy Officer
C)Chief mentor
D)Chief Underwriting Officer
Question
Who is appointed by an organization to define,implement,and oversee a set of data privacy policies?

A)A Chief Privacy Officer (CPO)
B)A Chief Operations Officer (COO)
C)A Database Privacy Officer (DPO)
D)A Data warehouse Officer (DWO)
Question
Who creates personal profiles using the data collected through the use of cookies?

A)A chief privacy officer
B)A data warehouse officer
C)A data broker
D)A public administrative broker
Question
Which of the following statements is true of a cookie?

A)A cookie can create copies of itself and spread to other networks to execute and replicate again.
B)The one time password of a transaction is captured and stored under a cookie on a company's Web server.
C)A cookie pulls data from disparate data sources to populate and maintain a data warehouse.
D)Data about user preferences and activity is captured and stored under a cookie on a company's Web server.
Question
The _____ represent the international consensus regarding the collection and management of personal information.

A)Code of Fair Information Practices
B)1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
C)European Union Data Protection Directives
D)1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
Question
Conducting a thorough assessment to document what sensitive information an organization is collecting,where it is stored,how long it is kept,who has access to it,and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.

A)data piracy
B)data privacy
C)data recovery
D)data structuring
Question
The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection.

A)Code of Fair Information Practices
B)European Data Transfer Act
C)Organization for Economic Cooperation and Development privacy guideline
D)European Union Data Protection Directive
Question
Which of the following must be adopted by a company to treat its customers' data responsibly?

A)The Code of Fair Information Practices
B)The European Union Data Protection Directives
C)The 1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
D)The 1957 Organization for Economic Cooperation and Development (OECD)privacy guidelines
Question
The Fourth Amendment of the U.S.Constitution _____.

A)protects the privacy of intermediate school students
B)protects the privacy of college students
C)protects the privacy of private employees
D)protects the privacy of government employees
Question
Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.

A)Increased legal liabilities
B)Increased productivity
C)Decreased leisure hours
D)Increased peer discussion
Question
Identify the framework developed by the U.S.Department of Commerce and the European Commission to ensure that U.S.companies don't experience interruptions in their dealings with countries in the European Union.

A)Net neutrality
B)Terms of Use
C)Safe harbor
D)Struts
Question
Mapua Corp.,a multinational corporation based in Germany,has decided to relocate its business to Japan.It faces difficulties in transferring the personal data of its employees from Germany to Japan.Which of the following is causing this difficulty?

A)The 1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
B)The European Union Data Protection Directive
C)The Code of Fair Information Practices
D)The Code of Fair Transportation Security
Question
The _____ of a Web site states what sort of information about customers is captured and how that information may be used by the capturing organization.

A)extension
B)privacy policy
C)browser certificate
D)developer console
Question
_____ is the control of the publishing of information on the Internet.

A)Internet graying
B)Internet flagship
C)Internet catalysis
D)Internet censorship
Question
When does the support for open access to Internet grow in a country?

A)When only private-sector organizations gain online access
B)When only government officials gain online access
C)When more people gain online access
D)When online access is limited to schools and colleges
Question
Which of the following policies should be agreed by a user before joining a social networking page?

A)Terms of Use policy
B)Privacy policy
C)Information technology usage policy
D)Profile update policy
Question
_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.

A)Net neutrality
B)Internet of Things
C)Cloud computing
D)Cryptography
Question
Which of the following is true of the Communications Act of 1934?

A)It created the Education Rate (E-Rate)program's Terms of Use policy to oversee all interstate and foreign communications.
B)It created the Federal Communications Commission to oversee all interstate and foreign communications.
C)It created the decision support program to oversee all interstate and foreign communications.
D)It created the Universal Service Fund (USF)to oversee all interstate and foreign communications.
Question
Consider a country with a law stating that citizens below the age of 25 must not have access to the Internet.This type of law creates a _____.

A)net neutrality
B)digital divide
C)net equality
D)social divide
Question
Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology.

A)The change management continuum model
B)Net neutrality
C)The digital divide
D)Internet traffic
Question
In 2002,the Federal Communications Commission decided that most broadband Internet services qualified as _____ services.

A)investment
B)technology
C)information
D)commercial
Question
Social networking users are prone to _____.

A)cyberethics
B)advanced persistent threat
C)identity theft
D)cyberterrorism
Question
Linc Corp.,a software firm,decides to ban social networking sites for its employees at the workplace.However,the employees are able to access other Web sites.Identify the strategy adopted by the firm.

A)Cyberespionage
B)Internet censorship
C)Internet rootkit
D)Spear phishing
Question
Which program was designed to eliminate the digital divide in the United States?

A)The Internet traffic program
B)Net neutrality program
C)Workplace monitoring program
D)The Education Rate program
Question
Identify the objective of the Communications Act of 1934.

A)To provide dial-up Internet services to schools and libraries
B)To protect users from online threats such as cracking and identity theft
C)To restrict the use of social networking Web sites
D)To ensure broad access to affordable communications services
Question
Which of the following is a feature of Internet censorship?

A)Monitoring the Internet activity of individuals
B)Storing user credentials such as name and address
C)Selling user data to third parties
D)Pilfering credit card information from online shoppers
Question
What is the debate over net neutrality?

A)To decrease the incentives of Internet Service Providers
B)To support only the existing services and cancel the new services
C)To keep the Internet open and impartial
D)To reduce the network of Internet Service Providers
Question
Which of the following programs was created through the Telecommunications Act of 1996?

A)Education Rate (E-Rate)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Network (E-Net)program
Question
The digital divide must be bridged to _____.

A)solve emergency issues
B)support net neutrality
C)prevent online threats
D)promote Internet censorship
Question
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?

A)Terms of Trade policy
B)Terms of Use policy
C)Terms of Endearment policy
D)Terms of Retention policy
Question
Which of the following is true of the Education Rate (E-Rate)program?

A)It provides dial-up Internet services to multinational companies.
B)It provides broadband Internet services to schools and libraries.
C)It provides broadband Internet services to multinational companies.
D)It provides dial-up Internet services to schools and libraries.
Question
The Schools and Libraries Program of the Universal Service Fund (USF)is the full name of the _____.

A)Education Network (E-Net)program
B)Education Rate (E-Rate)program
C)Internet Mate (I-Mate)program
D)Mobile Network (M-Net)program
Question
The _____ reimburses telecommunications,Internet access,and internal connections providers for discounts on eligible services provided to schools and libraries.

A)Education Network (E-Net)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Rate (E-Rate)program
Question
The First Amendment to the U.S.Constitution was adopted to protect people from unreasonable searches and seizures of properties.
Question
Morals is a set of beliefs about right and wrong behavior.
Question
Which of the following encompasses machine-to-machine,people-to-people,and people-to-machine connections?

A)The Internet of Things
B)The Internet of Digital divide
C)The Internet of Regulations
D)The Internet of Everything
Question
The Internet of Things enables people to connect to any device with an on/off switch to a network.
Question
Which of the following is a reason for the rapid growth of the Internet of Everything?

A)Limited availability of network services
B)Increased availability of expensive smart devices
C)Increased availability of network access
D)Limited availability of inexpensive smart devices
Question
The Fourth Amendment to the U.S.Constitution is used to protect the privacy of private employees.
Question
In the context of workplace monitoring,explain the requirements of privacy advocates.
Question
Why do practitioners in many professions subscribe to a code of ethics rather than simply following law?
Question
Fly thermostat,an automatic temperature controller for homes,learns the patterns for raising and lowering the temperature in a house after a week of use.It then adjusts the temperature automatically based on the observed patterns.This is an application of _____.

A)the Internet of Things
B)Net neutrality
C)the Education Rate (E-Rate)program
D)Net censorship
Question
Explain the purpose of net neutrality.
Question
Internet censorship limits access to certain Web sites.
Question
_____ is a network of physical objects embedded with sensors,processors,software,and network connectivity capability to enable them to exchange data with the manufacturer,operator,and other connected devices.

A)The Internet of Digital divide
B)The Internet of Things
C)The Internet of Data
D)The Internet of Regulations
Question
What are the various tasks carried out by a Chief Privacy Officer to establish an effective data privacy program?
Question
Ethics is one's personal beliefs about right and wrong.
Question
Laws are enforced by a set of institutions such as the police,courts,and law-making bodies.
Question
The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet.When connected to a Huya wireless bridge,the bulbs can be programmed to emit different tones of white light,from warm,yellow white to vibrant,blue white-any color on the spectrum.The bulbs can also be programmed to blink if they sense an intruder.This is an application of _____.

A)Net censorship
B)Net neutrality
C)the Education Rate (E-Rate)program
D)the Internet of Things
Question
Net neutrality favors Internet traffic from some specific sources than the others.
Question
The state privacy statutes tend to favor private-sector employees over employers.
Question
Define Internet of Everything (IoE).
Question
Digital divide helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Ethical, legal, and Social Issues of Information Technology
1
The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy."

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
D
2
Which of the following is true of stingray?

A)It supports operations that require aerial surveillance.
B)It is a national security agency surveillance program that collects Internet data including search histories.
C)It impersonates a cell tower and forces all mobile phones within range to connect to it.
D)It is an airline passenger prescreening program that checks travelers' personal information.
C
3
The Fourth Amendment to the U.S.Constitution was adopted to _____.

A)guarantee fair trial and other rights of an accused
B)prohibit excessive bail as well as cruel and unusual punishment
C)protect people from unreasonable searches and seizures of properties
D)guarantee the rights to freedom of religion,freedom of expression,and freedom to assemble
C
4
Which of the following is true of the First Amendment to the U.S.Constitution?

A)It was adopted to protect Americans from unreasonable searches and seizures of properties.
B)It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.
C)It was adopted to guarantee fair trial and other rights of the accused.
D)It was adopted to guarantee Americans' rights to freedom of religion,freedom of expression,and freedom to assemble.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following amendments to the U.S.Constitution comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people,as this could threaten their right to assemble or gather peacefully?

A)The First Amendment
B)The Second Amendment
C)The Third Amendment
D)The Fourth Amendment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.

A)Customer relationship management
B)Business intelligence management
C)Access information management
D)Enterprise resource management
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
ZoomMe is a company that accumulates data on people from various sources such as online product registration forms,credit card purchases,and other public records.It then uses these data to create profiles on people and sell them to advertisers.ZoomMe comes under the category of _____.

A)data brokers
B)data miners
C)privacy analysts
D)privacy brokers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
_____ is a set of beliefs about right and wrong behavior.

A)Moral
B)Law
C)Ethics
D)Value
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following defines law?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It is a set of principles and core values that are essential to ethical work and governs a practitioner's behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
David collects pieces of information about individuals garnered from data brokers.He then uses this information to threaten the individuals to publicly uncover their personal details until a monetary ransom is paid to him.Identify the tactic used by David to gather the information.

A)Doxing
B)Spamming
C)Hacking
D)Cracking
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.

A)Hacking
B)Spamming
C)Doxing
D)Cracking
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is a national security agency surveillance program that collects Internet data including search histories?

A)Stingray
B)PRISM
C)Secure flight program
D)Backscatter imaging scanners
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
_____ identify and reference people in photos and videos posted on Facebook.

A)Facebook shares
B)Facebook notifications
C)Facebook messages
D)Facebook tags
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following best describes morals?

A)They are an individual's beliefs about right and wrong.
B)They are a set of beliefs about right and wrong behavior that are universally accepted.
C)They consist of principles and core values that are essential to behavior.
D)They are a system of rules enforced by a set of institutions that states what a person can and cannot do.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is true of a cookie?

A)It saves shortcuts to Web sites and navigates to them within a few seconds.
B)It helps users to browse incognito by hiding their browsing data.
C)It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request.
D)It captures browsing history for Web site customization and personalization purposes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is true of a code of ethics?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It states the principles and core values that are essential to any professional's work and that govern their behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do .
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?

A)Dashboard recognizer
B)Stingray
C)Automatic license plate reader
D)Secure flight program
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following acts as a reference point to determine what is legal and what is ethical?

A)Code of laws
B)Code of ethics
C)Code of conduct
D)Code of practice
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
John,a lawyer,defends his client,who is accused of murder,to the best of his ability while conforming to the _____ of his profession.

A)ethics
B)morals
C)laws
D)values
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.

A)Data brokers
B)Yellow pagers
C)Data miners
D)Drill-down analysts
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?

A)A wiki
B)A cookie
C)An antivirus
D)A bookmark
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
_____ is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment of the victim.

A)Hacking
B)Doxing
C)Phishing
D)Distributed denial-of-service
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
A _____ is charged with the responsibility of ensuring that an organization does not violate state and federal government regulations.

A)Data Security Officer (DSO)
B)Chief Operations Officer (COO)
C)Database Privacy Officer (DPO)
D)Chief Privacy Officer (CPO)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
A company based in Houston wants to expand its business to Rome.The human resources department will run background checks from Houston.Identify the condition that must be satisfied to make this possible.

A)A "safe harbor" framework must be developed.
B)The US Patriot Act must be implemented.
C)A doxing framework must be developed.
D)The Digital Millennium Copyright Act must be implemented.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
PindCart,an online retailer,places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site.The company uses this file to generate a personalized welcome message to its visitors.This small file is called a _____.

A)cookie
B)metadata
C)data dictionary
D)popup
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
Identify a drawback of the Fourth Amendment of the U.S.Constitution.

A)It does not benefit government employees.
B)It does not benefit private employees.
C)It benefits only voluntary organizations.
D)It benefits only nonprofit organizations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email,Internet,and phone usage were not private and that their use might be monitored.

A)public
B)nonprofit
C)voluntary
D)private
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Who should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data?

A)Editor-in-chief
B)Chief Privacy Officer
C)Chief mentor
D)Chief Underwriting Officer
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
Who is appointed by an organization to define,implement,and oversee a set of data privacy policies?

A)A Chief Privacy Officer (CPO)
B)A Chief Operations Officer (COO)
C)A Database Privacy Officer (DPO)
D)A Data warehouse Officer (DWO)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Who creates personal profiles using the data collected through the use of cookies?

A)A chief privacy officer
B)A data warehouse officer
C)A data broker
D)A public administrative broker
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following statements is true of a cookie?

A)A cookie can create copies of itself and spread to other networks to execute and replicate again.
B)The one time password of a transaction is captured and stored under a cookie on a company's Web server.
C)A cookie pulls data from disparate data sources to populate and maintain a data warehouse.
D)Data about user preferences and activity is captured and stored under a cookie on a company's Web server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
The _____ represent the international consensus regarding the collection and management of personal information.

A)Code of Fair Information Practices
B)1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
C)European Union Data Protection Directives
D)1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Conducting a thorough assessment to document what sensitive information an organization is collecting,where it is stored,how long it is kept,who has access to it,and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.

A)data piracy
B)data privacy
C)data recovery
D)data structuring
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection.

A)Code of Fair Information Practices
B)European Data Transfer Act
C)Organization for Economic Cooperation and Development privacy guideline
D)European Union Data Protection Directive
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following must be adopted by a company to treat its customers' data responsibly?

A)The Code of Fair Information Practices
B)The European Union Data Protection Directives
C)The 1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
D)The 1957 Organization for Economic Cooperation and Development (OECD)privacy guidelines
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
The Fourth Amendment of the U.S.Constitution _____.

A)protects the privacy of intermediate school students
B)protects the privacy of college students
C)protects the privacy of private employees
D)protects the privacy of government employees
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.

A)Increased legal liabilities
B)Increased productivity
C)Decreased leisure hours
D)Increased peer discussion
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Identify the framework developed by the U.S.Department of Commerce and the European Commission to ensure that U.S.companies don't experience interruptions in their dealings with countries in the European Union.

A)Net neutrality
B)Terms of Use
C)Safe harbor
D)Struts
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
Mapua Corp.,a multinational corporation based in Germany,has decided to relocate its business to Japan.It faces difficulties in transferring the personal data of its employees from Germany to Japan.Which of the following is causing this difficulty?

A)The 1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
B)The European Union Data Protection Directive
C)The Code of Fair Information Practices
D)The Code of Fair Transportation Security
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
The _____ of a Web site states what sort of information about customers is captured and how that information may be used by the capturing organization.

A)extension
B)privacy policy
C)browser certificate
D)developer console
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
_____ is the control of the publishing of information on the Internet.

A)Internet graying
B)Internet flagship
C)Internet catalysis
D)Internet censorship
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
When does the support for open access to Internet grow in a country?

A)When only private-sector organizations gain online access
B)When only government officials gain online access
C)When more people gain online access
D)When online access is limited to schools and colleges
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following policies should be agreed by a user before joining a social networking page?

A)Terms of Use policy
B)Privacy policy
C)Information technology usage policy
D)Profile update policy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.

A)Net neutrality
B)Internet of Things
C)Cloud computing
D)Cryptography
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is true of the Communications Act of 1934?

A)It created the Education Rate (E-Rate)program's Terms of Use policy to oversee all interstate and foreign communications.
B)It created the Federal Communications Commission to oversee all interstate and foreign communications.
C)It created the decision support program to oversee all interstate and foreign communications.
D)It created the Universal Service Fund (USF)to oversee all interstate and foreign communications.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Consider a country with a law stating that citizens below the age of 25 must not have access to the Internet.This type of law creates a _____.

A)net neutrality
B)digital divide
C)net equality
D)social divide
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology.

A)The change management continuum model
B)Net neutrality
C)The digital divide
D)Internet traffic
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
In 2002,the Federal Communications Commission decided that most broadband Internet services qualified as _____ services.

A)investment
B)technology
C)information
D)commercial
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Social networking users are prone to _____.

A)cyberethics
B)advanced persistent threat
C)identity theft
D)cyberterrorism
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Linc Corp.,a software firm,decides to ban social networking sites for its employees at the workplace.However,the employees are able to access other Web sites.Identify the strategy adopted by the firm.

A)Cyberespionage
B)Internet censorship
C)Internet rootkit
D)Spear phishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Which program was designed to eliminate the digital divide in the United States?

A)The Internet traffic program
B)Net neutrality program
C)Workplace monitoring program
D)The Education Rate program
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Identify the objective of the Communications Act of 1934.

A)To provide dial-up Internet services to schools and libraries
B)To protect users from online threats such as cracking and identity theft
C)To restrict the use of social networking Web sites
D)To ensure broad access to affordable communications services
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is a feature of Internet censorship?

A)Monitoring the Internet activity of individuals
B)Storing user credentials such as name and address
C)Selling user data to third parties
D)Pilfering credit card information from online shoppers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
What is the debate over net neutrality?

A)To decrease the incentives of Internet Service Providers
B)To support only the existing services and cancel the new services
C)To keep the Internet open and impartial
D)To reduce the network of Internet Service Providers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following programs was created through the Telecommunications Act of 1996?

A)Education Rate (E-Rate)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Network (E-Net)program
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The digital divide must be bridged to _____.

A)solve emergency issues
B)support net neutrality
C)prevent online threats
D)promote Internet censorship
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?

A)Terms of Trade policy
B)Terms of Use policy
C)Terms of Endearment policy
D)Terms of Retention policy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is true of the Education Rate (E-Rate)program?

A)It provides dial-up Internet services to multinational companies.
B)It provides broadband Internet services to schools and libraries.
C)It provides broadband Internet services to multinational companies.
D)It provides dial-up Internet services to schools and libraries.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The Schools and Libraries Program of the Universal Service Fund (USF)is the full name of the _____.

A)Education Network (E-Net)program
B)Education Rate (E-Rate)program
C)Internet Mate (I-Mate)program
D)Mobile Network (M-Net)program
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
The _____ reimburses telecommunications,Internet access,and internal connections providers for discounts on eligible services provided to schools and libraries.

A)Education Network (E-Net)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Rate (E-Rate)program
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
The First Amendment to the U.S.Constitution was adopted to protect people from unreasonable searches and seizures of properties.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Morals is a set of beliefs about right and wrong behavior.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following encompasses machine-to-machine,people-to-people,and people-to-machine connections?

A)The Internet of Things
B)The Internet of Digital divide
C)The Internet of Regulations
D)The Internet of Everything
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
The Internet of Things enables people to connect to any device with an on/off switch to a network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following is a reason for the rapid growth of the Internet of Everything?

A)Limited availability of network services
B)Increased availability of expensive smart devices
C)Increased availability of network access
D)Limited availability of inexpensive smart devices
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
The Fourth Amendment to the U.S.Constitution is used to protect the privacy of private employees.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
In the context of workplace monitoring,explain the requirements of privacy advocates.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Why do practitioners in many professions subscribe to a code of ethics rather than simply following law?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Fly thermostat,an automatic temperature controller for homes,learns the patterns for raising and lowering the temperature in a house after a week of use.It then adjusts the temperature automatically based on the observed patterns.This is an application of _____.

A)the Internet of Things
B)Net neutrality
C)the Education Rate (E-Rate)program
D)Net censorship
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Explain the purpose of net neutrality.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Internet censorship limits access to certain Web sites.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
_____ is a network of physical objects embedded with sensors,processors,software,and network connectivity capability to enable them to exchange data with the manufacturer,operator,and other connected devices.

A)The Internet of Digital divide
B)The Internet of Things
C)The Internet of Data
D)The Internet of Regulations
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
What are the various tasks carried out by a Chief Privacy Officer to establish an effective data privacy program?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Ethics is one's personal beliefs about right and wrong.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Laws are enforced by a set of institutions such as the police,courts,and law-making bodies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet.When connected to a Huya wireless bridge,the bulbs can be programmed to emit different tones of white light,from warm,yellow white to vibrant,blue white-any color on the spectrum.The bulbs can also be programmed to blink if they sense an intruder.This is an application of _____.

A)Net censorship
B)Net neutrality
C)the Education Rate (E-Rate)program
D)the Internet of Things
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Net neutrality favors Internet traffic from some specific sources than the others.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
The state privacy statutes tend to favor private-sector employees over employers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
Define Internet of Everything (IoE).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
Digital divide helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.