CIS 761 Test 4

question

Cookies created during Web site visits are stored
answer

on your computer
question

The Online Privacy Alliance
answer

encourages self-regulation to develop a set of privacy guidelines for its members.
question

________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.
answer

Privacy Act of 1974
question

A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
answer

Kant’s Categorical Imperative
question

The ethical “no free lunch” rule states that
answer

Assumption that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensation for this work.
question

The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.
answer

False
question

The strength of patent protection is that it
answer

grants a monopoly on underlying concepts and ideas.
question

In 2010, the FTC added all of the following recommendations to its privacy guidelines except
answer

Firms should limit the length of time that any personal data is stored to six months or less
question

Which of the following best describes how new information systems result in legal gray areas?
answer

hey result in new situations that are not covered by old laws
question

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
answer

opt-in
question

Re-designing and automating business processes can be seen as a double-edged sword because
answer

increases in efficiency may be accompanied by job losses
question

________ protects the creators of intellectual property from having their work copied by others.
answer

copyright
question

________ means that you accept the potential costs and obligations for the decisions you make.
answer

responsibility
question

Gaining unapproved access to a computer is not a federal crime.
answer

false
question

Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user’s online behavior.
answer

True
question

Which of the following best describes intellectual property?
answer

intangible property created by individuals or corporations.
question

U.S. businesses are allowed to use personal data from EU countries if they
answer

develop equivalent privacy protection policies.
question

Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?
answer

Patent
question

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
answer

quality of life
question

As per the ________, if an action cannot be taken repeatedly, it is not right to take at all. high-failure cost rule utilitarian principle lemming rule slippery-slope rule Golden Rule
answer

lemming???
question

________ are not held liable for the messages they transmit.
answer

Regulated common carriers
question

Spamming raises the moral dimension of
answer

Quality of Life??
question

The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.
answer

property rights and obligations
question

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when
answer

the software is widely distributed
question

The most common reason business systems fail is
answer

data quality
question

The European Parliament has yet to ban unsolicited commercial messaging.
answer

False
question

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
answer

True
question

The symptoms of technostress include aggravation and hostility toward humans.
answer

True
question

The U.S. CAN-SPAM Act of 2003
answer

Requires spammers to identify themselves
question

Companies can’t realistically create error-free software because
answer

It is too expensive to create perfect software
question

In today’s legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.
answer

False
question

________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.
answer

profiling
question

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.
answer

Accountability
question

Which of the following is not one of the types of information gathered by Web site tracking tools?
answer

birthplace
question

________ enables advertisers to display more relevant ads based on user’s search and browsing history.
answer

behavioral targeting
question

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?
answer

-acceptable, because the higher value is the survial of the family
question

The Federal Trade Commission FIP principle of Notice/Awareness states that
answer

Websites must disclose their information practices before collecting data.
question

The rate of global piracy is approximately 42%.
answer

True
question

According to several court findings, the general functional features of software are protected by copyright law.
answer

False
question

A Facebook users’ visit to a Web site can be tracked even if they do not click a Like button.
answer

True
question

The routine violation of individual privacy is made more difficult by advances in data storage.
answer

False
question

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.
answer

True
question

When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product.
answer

similar to books
question

As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except
answer

Assigning Responsibility
question

Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?
answer

RSI
question

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can’t be tied to a specific person.
answer

False
question

Any intellectual work product that isn’t based on public knowledge can be classed as a trade secret.
answer

True
question

Which of the following best describes the effect that new information technology has on society?
answer

ripple effect raising new ethical, social, and political issues.?
question

“Look and feel” copyright infringement lawsuits are concerned with
answer

the distinction between an idea and its expression.
question

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
answer

opt-out
question

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.
answer

False
question

CVS refers to
answer

eyestrain related to computer display screen use
question

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
answer

False
question

Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps.
answer

True
question

Spam is legally defined as any e-mail that is unsolicited.
answer

False
question

Which of the following is the primary reason that the practice of spamming has grown exponentially?
answer

it is inexpensive and can reach a lot of people
question

Privacy protection in the United States is ________ in Europe.
answer

less stringent
question

Software programs were unprotected by copyright law until the early 1990s.
answer

False
question

Flash Cookies
answer

cannot be deleted through the browser’s normal configuration settings as regular cookies can
question

Taking the action that produces the least harm best describes the
answer

Risk Aversion
question

The problem with Web browsers’ Do Not Track options is that Web sites aren’t obligated to honor these settings.
answer

True
question

________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
answer

Due Process
question

The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.
answer

digital
question

Which of the following best describes the basis for the FIP principles?
answer

the mutuality of interest between the record holder and the individual
question

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
answer

HIPPA
question

Which of the following is not one of the current key technology trends that raises ethical issues?
answer

Improved multimedia quality
question

Which of the following is a primary drawback to the “do anything anywhere” computing environment?
answer

blur the traditional boundaries between work and family time`
question

Liability is a feature of political systems and allows individuals to recover damages done to them by others.
answer

True
question

Most Internet businesses do very little to protect the privacy of their customers.
answer

True
question

The drawback to patent protection
answer

the years of waiting to receive it.
question

The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials.
answer

Digital Millennium Copyright Act
question

Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.
answer

True
question

Key differences between software and books include all of the following except
answer

Software products are more easily compared to each other than books.
question

The ________ framework developed by the U.S. Department of Commerce allows U.S. businesses to legally use personal data from EU countries.
answer

Safe Harbor

Get instant access to
all materials

Become a Member