Chapter 4 – True/False

Unlock all answers in this set

Unlock answers
question
Advances in data storage have made routine violation of individual privacy more difficult
answer
false
question
The last step in analyzing an ethical issue should be to identify the stakeholders, people who have a vested interest in the outcome of the decision
answer
false
question
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect
answer
true
question
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations
answer
true
question
Most American and European privacy law is based on a set of five principles called COPPA
answer
false
question
A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site
answer
true
question
Spyware is software that comes hidden in downloaded applications and can track your online movements
answer
true
question
Most Internet businesses do very little to protect the privacy of their customers
answer
true
question
P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly
answer
false
question
Protection for trade secrets is enforced at the federal level
answer
false
question
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game
answer
true
question
Trade secret law protects the actual ideas in a work product, not just their manifestations
answer
true
question
The drawback to copyright protection is passing stringent criteria of nonobviousness
answer
false
question
According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law
answer
false
question
The key concepts in patent law are originality, novelty, and value
answer
false
question
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime
answer
false
question
Insofar as software is essentially an intangible good, procedures of software cannot be held liable for any damages that their software unintentionally causes
answer
true
question
The European Parliament has passed a ban on unsolicited commercial messaging
answer
true
question
The most common type of computer-related RSI is CTS
answer
true
question
Technostress is a computer-related malady whose symptoms include fatigue
answer
true
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New