HBCL Unit 4 Test – Flashcards

Unlock all answers in this set

Unlock answers
question
Both manufacturers and online retailers—often called _____ —can sell directly to customers via their Web sites.
answer
e-tailers (or e-retailers)
question
Banner ad _____ facilitate displaying banner ads for your site on other Web sites, in return for you displaying other banner ads on your site.
answer
exchanges
question
Many _____ are available to gather prices, shipping, and delivery information from multiple sites for a particular product and summarize the results to help locate the best buys from potential vendors.
answer
shopping bots (used by comparison shopping Web sites)
question
A(n) _____ exchange site is designed to help match organizations with goods or services to sell with potential buyers who desire those resources.
answer
market
question
_____ is the process of making changes to Web pages, as needed, to increase their visibility in search site results.
answer
Search engine optimization
question
An important promotional strategy is regularly _____ your site with new content.
answer
updating
question
Each time an online credit card transaction is made, the bank obtains the money from the issuing credit card company and transfers it to the _____.
answer
merchant account
question
Widely-used _____ services that an e-commerce Web site might include are online order tracking, online versions of product instruction manuals, and customer service via e-mail or live chat. These are used to support customers and increase their satisfaction and loyalty.
answer
eCRM (electronic customer relationship management)
question
Dynamic multimedia ads are also called _____ ads.
answer
rich media
question
A market exchange site is sometimes referred to as a(n) _____.
answer
e-marketplace
question
Instead of selling an actual physical or electronic product to customers, _____ sites sell access to online services.
answer
subscription
question
The _____ model includes any type of e-commerce transaction taking place between two businesses.
answer
B2B (business-to-business)
question
_____ credit cards are credit cards that are preloaded with a specific amount of money, which becomes the total liability of the card.
answer
Prepaid
question
Many businesses have both brick-and-mortar stores and an online store. These businesses are sometimes referred to as _____ stores.
answer
click-and-mortar (or bricks-and-clicks)
question
_____ sites facilitate the exchange of financial items (such as stocks, bonds, futures, and options) between buyers and sellers.
answer
Financial brokerage
question
Secure Web sites use _____ to safely transfer sensitive data over the Internet.
answer
encryption
question
Explain the consumer-to-consumer (C2C) e-commerce business model.
answer
The consumer-to-consumer (C2C)—sometimes referred to as the person-to-person (P2P)—model involves individuals selling directly to other individuals. Typically, C2C transactions are carried out via intermediary Web sites set up to facilitate this, such as online auction sites like eBay and online classified ad sites like Craigslist. In fact, with millions of products up for auction at any time, eBay is one of the largest C2C e-commerce sites today.
question
What are electronic gift certificates, gift cards, and coupons?
answer
Digital gift certificates and gift cards are convenient methods of allowing a gift recipient to select the items he or she wantstobuyatanonlinestore.Theyworksimilarlytoconventionalgiftcertificatesandgiftcardsbuta serial number or other identifying number is entered during the checkout process to verify the certificate or card. Some gift certificates and gift cards that are redeemed electronically are purchased in physical form; others are entirely electronic. Digital coupons consist of codes—typically called coupon codes—that are entered into the appropriate box on a checkout page in order to deduct the coupon amount from a purchase total.Manysitesspecializein gatheringandsummarizingcouponcodesforavarietyofonlinemerchants.Ifan invalidcouponcodeisenteredor ifacouponcodehasexpired,thecoupondiscountwillnotbeapplied.
question
What is storefront software?
answer
Storefront software is a type of software that can be used to create an online store. Storefront software varies widely in capabilities and some programs have multiple versions available in order to create different types of e- commerce businesses. For instance, some programs are most appropriate for a small business owner who wants to begin selling a limited number of products online; others are designed for large businesses that require real-time inventory capabilities, multiple pricing structures, the ability for salespeople to place orders from the field, and other more complex features. Virtually all storefront software programs support credit card sales and secure checkout pages; some have wizards and other tools to help create the storefront quickly and easily.
question
Discuss click fraud.
answer
Click fraud occurs when sponsored links-such as on a search site results page-are clicked when there is no interest in the product or service associated with the sponsored link. The links can be clicked by a person or by an automated clicking program (sometimes referred to as a clickbot and often performed by botnets). The motive for click fraud is usually financial. For instance, although viewed as unethical in the business world, a company might click on a competitor's sponsored links in order to deplete that company's advertising budget. In addition,some companiesorindividualscreateWebpagesconsistingprimarilyofsponsoredlinks(usually sponsoredlinksfrom Google,Yahoo!,orothersearchsitesthatareplacedonothersitesviaadnetworks)for the purpose of click fraud. Web sites hosting a sponsored link get a fee each time the link on that page is clicked,sothesecompaniesor individualsmanuallyorautomatically(viasoftwareorbotnets)clicktheadson their sites to fraudulently generate revenue. In fact, the independent click fraud monitoring and reporting service Click Forensics estimates that more than 60% of all ad traffic coming from these types of sites is fraudulent.
question
Discuss how costs are reduced for businesses using e-commerce.
answer
Many of the cost reductions result from the need for smaller facilities and fewer staff. In particular, stores with only an online (not a physical) presence experience lower costs because they do not have the expenses associated with maintaining a physical storefront, like conventional brick-and-mortar stores do. Even though a dot-com store may need a company headquarters and possibly one or more inventory warehouses, these types of facilities are much less expensive to operate than a retail store that may need to have a physical presence in multiple prime locations in order to reach potential customers. Other potential areas of cost reductions associated with e- commerce include the ability to sell directly to customers (and, therefore, save the cost associated with using retailersorother middlemen),usingelectronicmarketingresources(suchase-mailpromotionsandWebsite ads) instead of printed materials to save on marketing and advertising costs, and increased accuracy in order processing and pricing.
question
Web sites such Amazon.com, Walmart.com, Overstock.com, and BestBuy.com are examples of _____ sites. a. B2B b. B2C c. B2G d. C2C
answer
b (B2C)
question
In order to accept credit cards, a business typically opens an e-commerce merchant account, also called a(n) _____. a. Internet merchant account b. Net merchant account c. Internet business account d. Web card account
answer
a (Internet merchant account)
question
The collection of hardware, software, people, policies, and strategies used to perform and support e-commerce is referred to as a(n) _____. a. Net-commerce system b. Internet B-platform c. e-commerce system d. EB-platform
answer
c (e-commerce system)
question
The C2C model is also known as the _____ model. a. B2B b. P2P c. B2G d. B2C
answer
b (P2P)
question
_____ bring buyers and sellers together to facilitate transactions between the two parties. a. M-Brokers b. E-tailers c. Shop carts d. Brokerage sites
answer
d (brokerage sites)
question
With the _____, businesses sell goods or services to individual consumers. a. business-to-consumer (B2C) model b. business-to-government (B2G) model c. business-to-business (B2B) model d. consumer-to-consumer (C2C) model
answer
a (B2C)
question
_____ seals are issued by the Certificate Authority issuing the site's SSL or EV SSL certificate and are designed to remind shoppers that the site is protected by that certificate. a. Privacy b. Protection c. Warranty d. Security
answer
d (security)
question
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. He wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) _____. a. order-fulfillment company b. electronic storefront c. brick-and-mortar store d. smart card
answer
a (order-fulfillment company)
question
_____ is an online payment service that allows individuals to transfer money easily from their online payment account to someone else's. a. SimpleTech b. PayPal c. Wal-Mart d. eBay
answer
b (PayPal)
question
The goal of _____ is for your Web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a Web search using keywords related to your site or business. a. VOD b. SEO c. OTP d. URLP
answer
b (SEO)
question
Although B2C was initially expected to be the most prominent type of e-commerce business model, revenues from the _____ model are now expected to far surpass the B2C marketplace. a. C2C b. B2G c. B2B d. B2E
answer
c (B2B)
question
_____ businesses sell products and services to local, state, and federal government buyers. a. B2B b. C2C c. B2C d. B2G
answer
d (B2G)
question
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. He recently received a contract to print T-shirts for the US Department of Justice. This is an example of a _____ transaction. a. B2C b. B2B c. B2G d. C2C
answer
c (B2G)
question
_____ store checkout information in the customer's account for use with purchases on that site only. a. Site-specific smart cards b. Site-specific electronic check accounts c. Site-specific online payment accounts d. Site-specific digital wallets
answer
d (site-specific digital wallets)
question
Companies that follow the _____ do not sell goods or services directly to others, but instead bring buyers and sellers together within a specific industry or business process. a. business-to-government (B2G) model b. person-to-person (P2P) model c. business-to-business (B2B) model d. intermediary hub model
answer
d (intermediary hub model)
question
To reassure customers, all e-commerce sites should develop and display a _____ policy stating how collected customer information will be used. a. business model b. customer c. privacy d. database
answer
c (privacy)
question
Comparison shopping Web sites are sometimes called _____. a. shopping bots b. shopping bags c. shopping carts d. e-shopping
answer
a (shopping bots)
question
Perhaps the biggest disadvantage of e-commerce from a customer standpoint is the _____. a. inability to return items b. difficulty of using credit cards c. risk of fraud d. inability to see merchandise
answer
c (risk of fraud)
question
Many e-commerce sites require shoppers to enter the _____ printed on the back of the credit card to prove they have possession of the card. a. Virtual Credit card number b. Card Verification Code (CVC) c. OTP code d. eWallet code
answer
b (CVC)
question
For businesses that already have an existing Web site and just need to add ordering capabilities and checkout procedures to that site, _____ can be used. a. e-order software b. shopping robot software c. shopping cart software d. online order software
answer
c (shopping cart software)
question
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet. Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a _____ to authenticate the validity of any contracts she signs electronically. a. digital certificate b. banner ad c. digital wallet d. permission-based ad
answer
a (digital certificate)
question
_____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site. a. Web site planning b. Web site design c. Web site deployment d. Web site development
answer
d (web site development)
question
Common _____ activities include providing online order status information, links for tracking delivery shipments, a. C2C c. eCMS downloadable product manuals, and online technical support, such as via e-mail or live chat. b. eCRM d. CBT
answer
b (eCRM)
question
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. Some of John's customers want to buy Christmas presents for their friends, but are unsure of what to select. John should encourage these customers to purchase _____ that the recipients can redeem at a later date. a. digital wallets b. digital gift certificates c. smart cards d. electronic storefronts
answer
b (digital gift certificates)
question
One of the most recognized privacy seals is the _____ trustmark. a. PayPal b. TRUSTe c. SimpleTech d. Peer Impact
answer
b (TRUSTe)
question
Instead of selling an actual physical or electronic product to customers, _____ sell access to online services. a. subscription sites b. video-on-disk sites c. online auction sites d. B2G sites
answer
a (subscription sites)
question
____ tags are used by many (but not all) search engines to classify the Web page when it is added to a search database. a. Page b. Search c. Site d. Meta
answer
d (Meta)
question
Because of the low overhead costs associated with _____, new e-commerce businesses can enter the marketplace relatively inexpensively. a. shopping carts b. online stores c. shopping bags d. storebots
answer
b (online stores)
question
Instead of a formal auction with a specific ending time and an automatic winner, dynamic pricing sites— such as _____ —allow buyers to bid on items or services listed for sale, and then the seller decides whether or not to accept each offer on an individual basis. a. PriceGrabber.com b. eBay c. Priceline.com d. PayPal
answer
c (Priceline.com)
question
If you own the trademark to your business name, the _____ Consumer Protection Act protects your trademark in cyberspace. a. Anticybersquatting b. Online c. Cyberbusiness d. Trademark
answer
a (Anticybersquating)
question
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet. Sharon has a different password for each Web site that she uses. However, she is afraid of forgetting some of these passwords and being unable to access her records. The best solution is for her to use _____. a. shopping cart software b. storefront software c. banner ads d. a digital wallet
answer
d (digital wallet)
question
When intermediary hubs specialize in a specific industry (such as healthcare), they are sometimes called _____ hubs. a. vertical b. horizontal c. centered d. subscription
answer
a (vertical)
question
_____ is the term used to describe conducting business transactions—generally financial transactions—via communications technology. a. Internet-transaction b. E-commerce c. Net-commerce d. Net-business
answer
b (e-commerce)
question
Banner ads can be _____ —that is, ads that are targeted to individuals based on their preferences, buying habits, or interests. a. behavioral targets b. behavioral ads c. preference ads d. ad mining
answer
b (behavioral ads)
question
Law enforcement agencies contend that _____ systems and public video surveillance are no different than the many private video surveillance systems in place today.
answer
face recognition
question
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer _____ software.
answer
tracking
question
_____ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.
answer
Opting out
question
A(n) _____ app can lock and unlock your computer automatically as your iPhone moves in and out of range.
answer
proximity
question
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge _____ with a computer whenever it is plugged into a power outlet.
answer
suppressor
question
By _____ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
answer
educating
question
_____ procedures, such as making copies of important documents and storing them in a safe location, also apply to important non-electronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
answer
Backup
question
A growing illegal use of computer monitoring software is for a hacker to use a(n) _____ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
answer
keystroke logging
question
_____, the unauthorized copying of a computer program, is illegal in the United States and many other—but not all—countries.
answer
Software piracy
question
The U.S. _____ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
answer
SAFE WEB
question
One antipiracy tool is requiring a unique _____ code.
answer
Activation (or registration)
question
_____ occurs when hardware is stolen from an individual or from a business, school, or other organization.
answer
Hardware theft
question
Heat, dust, static and _____ fluctuations can all damage computer hardware
answer
power
question
_____ labels change their appearance if someone (such as a thief) tries to remove them.
answer
Tamper evident
question
Discuss the proper disposal of hardware containing sensitive information.
answer
CDs, DVDs, and other media containing sensitive data should be shredded, and the hard drives of computers to be disposed of should be wiped—overwritten several times using special disk-wiping or disk-erasing software— before they are sold or recycled. Unlike the data on a drive that has merely been erased or even reformatted (which can still be recovered), data on a properly wiped drive is very difficult or impossible to recover. Wiping is typically viewed as an acceptable precaution for deleting sensitive data (such as Web site passwords and tax returns) from hard drives and other storage media belonging to individuals, as well as for storage media to be reusedwithinan organization.However,beforedisposingofstoragemediacontainingsensitivedata,businesses shouldconsider physicallydestroyingthemedia,suchasbyshreddingormeltingthehardware.Tohelpwith this process, data destruction services can be used. To ensure that all hardware containing business data is properlydisposedof,itis importantforallbusinessestodaytodevelopandimplementapolicy(oftencalleda mediasanitizationordata destructionpolicy)fordestroyingdatathatisnolongerneeded.
question
Describe e-mail filters.
answer
Custom e-mail filters are used to route messages automatically to particular folders based on stated criteria. For example, you can specify that e-mail messages with keywords frequently used in spam subject lines (such as free, porn,opportunity,lastchance,weight,pharmacy,andsimilarterms)beroutedintoafoldernamedPossible Spam, and you can specify that all e-mail messages from your boss's e-mail address be routed into an Urgent folder. Filtering can help you find important messages in your Inbox by preventing it from becoming cluttered with spam. However, you need to be sure to check your Possible Spam or Junk E-mail folder periodically to locate any e-mail messages mistakenly filed there—especially before you permanently delete those messages.
question
Discuss the features and benefits of continuous data protection.
answer
For an even higher level of security than a scheduled backup, continuous data protection (CDP) can be used. A CDP backup system backs up data in real time as it changes so that data can be recovered from any point in time (even just a few minutes ago) with no data loss, and recovery can be as fast as five minutes after a failure. Although expensive when used with large quantities of data, it is one of the best ways to ensure that company data is protected. In addition to business data, CDP is beginning to be used by individuals to safeguard their data. For extra protection against data loss due to a natural disaster or other geographic-specific risk, businesses should use cloud providers that are in a physical location that is different from the company's location.
question
Why should you be concerned about computer security?
answer
Today, there are a number of security concerns surrounding computers and related technology that all individuals should be concerned about, including having your computer stolen, losing a term paper because the storage medium your paper was stored on becomes unreadable, losing your mobile phone containing your entire contact listand calendar,orrunningtheriskofbuyingpiratedordigitallycounterfeitedproducts.
question
What do surge suppressors do?
answer
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge suppressor; the surge suppressor should be used to connect a computer and other hardware whenever they are plugged into a power outlet. When electrical power spikes occur, the surge suppressor prevents them from harming your devices. For the best protection, surge suppressors should be used with all the powered components that have a wired connection to the computer (such as a monitor or printer). There are small surge suppressors designed for use while on the go, and others designed for business and industrial use.
question
_____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities. a. Computer monitoring b. Computer surveillance c. Multimedia surveillance d. Video surveillance
answer
d (video surveillance)
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews fromotherbuyersbeforebuyingaproduct.However,Samuelisalsoconcernedaboutprotectinghis personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's _____. a. protection history b. consumer policy c. privacy record d. privacy policy
answer
d (privacy policy)
question
_____ are small programs that take care of software-specific problems, or bugs, such as security holes. a. Backups b. Applets c. Scripts d. Patches
answer
d (patches)
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or _____. a. junkie e-mail address b. throw-away e-mail address c. one-use e-mail address d. second-hand e-mail address
answer
b (throw-away email address)
question
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its _____. a. recycle b. recovery c. repair d. running
answer
b (recovery)
question
Creating a _____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy. a. mirror b. hotspot c. hot file d. backup
answer
d (backup)
question
Although many of us may prefer not to think about it, _____ —the complete malfunction of a computer system—and other types of computer-related disasters do happen. a. software piracy b. interrupted power c. spikes d. system failure
answer
d (system failure)
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach _____ to these devices. a. kill switches b. surge suppressors c. asset tags d. keyloggers
answer
c (asset tags)
question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly _____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes. a. 50 feet b. 1,000 feet c. 100 feet d. 2 miles
answer
b (1,000)
question
One common way to deal with spam that makes it to your computer is to use a(n) _____. a. e-mail filter b. spam e-mail address c. encryption scheme d. hot site
answer
a (email filter)
question
Most businesses and Web sites that collect personal information have a(n) _____ that discloses how the personal information you provide will be used. a. piracy policy b. security policy c. identity policy d. privacy policy
answer
d (privacy policy)
question
_____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software. a. Antivirus software b. Antispyware software c. Antispoof software d. Antiphish software
answer
b (antispyware software)
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case? a. kill switch hard drives b. surge suppressors c. DataDots d. keylogging software
answer
a (kill switch hard drive)
question
When spam is sent via IM it is called _____. a. spoof b. phish c. spim d. junk
answer
c (spim)
question
_____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object. a. Surge suppressors b. Password locks c. Spike suppressors d. Cable locks
answer
d (cable lock)
question
_____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction. a. USB b. RFID c. IDC d. FDE
answer
d (FDE)
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of _____. a. proximity cards b. presence technology c. face recognition d. video cards
answer
a (proximity cards)
question
The _____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry. a. Sarbanes-Oxley Act b. USA Patriot Act c. CAN-SPAM act d. Junk Fax Prevention Act
answer
c (CAN-SPAM act)
question
By _____, you instruct companies you do business with that they cannot share your personal data with third parties. a. signing piracy agreements b. opting out c. contracting legal help d. e-mailing them
answer
b (opting out)
question
The term _____ refers to the rights of individuals and companies to control how information about them is collected and used. a. information privacy b. information security c. information piracy d. digital Counterfeiting
answer
a (information privacy)
question
_____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service. a. Government databases b. Marketing databases c. Educational databases d. Research databases
answer
b (Marketing databases)
question
_____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity. a. Surveillance software b. Video software c. Computer monitoring software d. Audio software
answer
c (computer monitoring software)
question
A marketing activity that can be considered a privacy risk is _____. a. security threads b. watermarking c. electronic profiling d. microprinting
answer
c (electronic profiling)
question
To supplement backup procedures, businesses and other organizations should have a(n) _____. a. insurance plan b. continuation rule c. disaster recovery plan d. survival guide
answer
c (disaster recovery plan)
question
A(n) _____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going. a. buddy site b. alternate pad c. hot site d. white room
answer
c (hot site)
question
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) _____. a. UPS b. surge suppressor c. voltage controller d. voltage meter
answer
a (UPS)
question
_____ devices are designed to withstand much more physical abuse than conventional devices. a. Secured b. Ruggedized c. Malleable d. Flexible
answer
b (ruggedized)
question
_____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status. a. Presence technology b. Computer monitoring c. Digital surveillance d. Detection technology
answer
a (presence)
question
DeQuervain's _____ is a condition in which the tendons on the thumb side of the wrists are swollen and irritated.
answer
tendonitis
question
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing _____.
answer
plagiarism
question
The 1976 _____ extended copyright protection to nonpublished works, so, immediately after creating a work in some type of material form, the creator automatically owns the copyright of that work.
answer
Copyright Act
question
If the current _____ holder has a legitimate reason for using that name and does not appear to be a cybersquatter, WIPO may allow the holder to continue to use that domain name.
answer
domain name
question
Some _____ centers will accept computer equipment, but many charge a fee for this service.
answer
recycling
question
The term _____ refers to standards of moral conduct.
answer
ethics
question
A(n) _____ is a policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.
answer
code of ethics
question
A trademark used to identify a service is also called a(n) _____.
answer
service mark
question
Carpal Tunnel Syndrome is an example of a(n) _____ injury.
answer
repetitive stress (RSI)
question
_____ are written with the purpose of being circulated to as many people as possible.
answer
hoaxes (e-mail hoaxes)
question
_____ are the standards of conduct that guide a business's policies, decisions, and actions.
answer
Business ethics
question
Sometimes a different lens prescription or special computer _____ can be used to reduce eyestrain while working on a PC.
answer
glasses
question
View your _____ as a temporary location only; after reading an e-mail message, immediately delete it, flag it, or file it in an e-mail folder.
answer
e-mail Inbox
question
The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as _____, is both dishonest and unethical.
answer
resume padding
question
A(n) _____ is designed primarily to elevate the display screen of a notebook or tablet computer to the proper height.
answer
notebook stand (or docking station)
question
_____ are the legal rights to which the creators of intellectual property—original creative works—are entitled.
answer
Intellectual property rights
question
To help identify and prosecute a "cammer," most movie studios now embed invisible _____ in each print released to a theater.
answer
digital watermarks
question
It now appears that the so-called _____ office that many visionaries predicted would arrive is largely a myth. Instead, research indicates that global paper use has grown more than six-fold since 1950, and one-fifth of all wood harvested in the world today ends up as paper.
answer
paperless
question
The _____ makes it illegal to circumvent antipiracy measures built into digital media and devices.
answer
Digital Millennium Copyright Act (DMCA)
question
What is a computer hoax?
answer
A computer hoax is an inaccurate statement or story—such as the "fact" that flesh-eating bacteria have been found in banana shipments or that Applebee's will send you a gift certificate for forwarding on an e-mail—spread through the use of computers. These hoaxes are sometimes published on Web pages, but they are more commonly spread via e-mail. Common computer hoax subjects include nonexistent computer viruses, serious health risks, impending terrorist attacks, chain letters, and free prizes or giveaways. Inaccurate information posted on a Web site or wiki just to be misleading can also be considered a computer hoax. E-mail hoaxes are written with the purpose of being circulated to as many people as possible.
question
Give some examples of ethically questionable business practices that have been in the news.
answer
One ethical issue a business may run into is whether or not to implement a business process or decision that is ethically questionable. For example, Google and Microsoft are in an ongoing battle about Microsoft's decision to offer its own YouTube app (which Google blocked shortly after its release because the app violated Google's terms of service), and Microsoft is facing a possible $7 billion fine for its decision not to display a screen that would enable European Union Windows users to choose between Internet Explorer and other browsers. Other ethically questionable business decisions relate to customer privacy. For example, several plastic surgeons have been sued recently for posting pre-op and postop photos of patients on their Web sites; in one current case, the photos were posted even though the patient signed a statement that she did not give consent to use her photos for promotional purposes.
question
Explain how patents work.
answer
Unlike copyrights (which protect artistic and literary works) and trademarks (which protect a company's logo and brand names), a patent protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. A patented invention is typically a unique product, but it can also be a process or procedure that provides a new way of doing something or that offers a new technical solution to a problem. Like trademarks, U.S. patents are issued by the U.S. Patent and Trademark Office (USPTO).
question
What is ergonomics?
answer
Ergonomics is the science of fitting a work environment to the people who work there. It typically focuses on making products and workspaces more comfortable and safe to use. With respect to computer use, it involves designinga safeandeffectiveworkspace,whichincludesproperlyadjustingfurnitureandhardwareandusing ergonomic hardware when needed. A proper work environment—used in conjunction with good user habits and procedures— can prevent many physical problems caused by computer use. A proper work environment is importantforanyone whoworksonacomputer,includingemployeesusingacomputeronthejob,individuals usingacomputerathome, andchildrendoingcomputeractivitiesathomeoratschool.
question
What is a trademark? How long do trademarks last?
answer
trademark is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. A trademark used to identify a service is also called a service mark. Trademarks that are claimed but not registered with the U.S. Patent and Trademark Office (USPTO) can use the mark TM; nonregistered service marks can use the symbol SM. The symbol ¼ is reserved for registered trademarks and service marks. Trademarks for products usually appear on the product packaging with the appropriate trademark symbol; service marks are typically used in the advertising of a service because there is no product on which the mark can be printed. Trademarked words and phrases—such as iPod¼, Chicken McNuggets¼, Google DocsTM, and FedEx OfficeSM—are widely used today. Trademarked logos are also common. Trademarks last 10 years, but they can be renewed as many times as desired, as long as they are being used in commerce.
question
_____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties. a. WIPO b. DRM c. OLPC d. USPTO
answer
a (WIPO)
question
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. In order to prevent others from stealing her logo, Jill should get a _____. a. patent b. trademark c. copyright d. digital watermark
answer
b (trademark)
question
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is _____. a. copyright law b. religion c. vaporware d. corporate missions
answer
a (copyright law)
question
The term _____ refers to the gap between those who have access to information and communications technology and those who do not. a. digital have not b. digital divide c. Internet divide d. bit divide
answer
b (digital divide)
question
Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then _____ and resold. a. reprogrammed b. refurbished c. recharged d. recycled
answer
c (recharged)
question
The goal of _____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self- expression. a. OX b. Simputer c. OLPC d. InternetWorld
answer
c (OLPC)
question
A teacher sharing a poem with a class, leading the class to believe the poem was his original work constitutes _____. a. bad manners b. plagiarism c. trademark theft d. patent infringement
answer
b (plagiarism)
question
To prevent sore or stiff neck, _____. a. use a footrest, if needed, to keep your feet flat b. cover windows or adjust lighting to eliminate glare c. rest and gently stretch your fingers and arms every 15 minutes or so d. place the monitor directly in front of you
answer
d (position the monitor)
question
_____ is an example of assistive output devices. a. One-handed keyboard b. Head-pointing system with puff switch c. Voice input system d. Screen reader software
answer
d (screen reader software)
question
A _____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. a. trademark b. watermark c. patent d. copyright
answer
c (patent)
question
To catch people who are sharing movies illegally on the Internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and then identifies the responsible individual by using the _____ of the computer being used to share the movie. a. IP address b. broadcast flag c. RAM d. serial port
answer
a (IP address)
question
A condition known as _____ has been linked to the repetitive finger movements made when using a keyboard. a. ergonomics b. carpal tunnel syndrome (CTS) c. burnout d. computer hand syndrome (CHS)
answer
b (carpal tunnel syndrome)
question
A _____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment. a. code of security b. code of conduct c. privacy policy d. piracy policy
answer
b (code of conduct)
question
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of _____. a. DRM b. AACSB c. patents d. RSI
answer
a (DRM)
question
A(n) _____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting. a. trademark b. copyright c. patent d. intellectual ownership right
answer
b (copyright)
question
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to _____ —a state of fatigue or frustration brought about by overwork. a. burnout b. CTS c. CVS d. RSI
answer
a (burnout)
question
n addition to being a copyright concern, _____ can be used to misquote individuals, repeat comments out of context, retouch photographs—even create false or misleading photographs. a. digital counterfeiting b. identity theft c. plagiarism d. digital manipulation
answer
d (digital manipulation)
question
To combat his backache, Jack's doctor advised him to _____. a. use a footrest b. use a lower screen resolution c. turn down the volume when using headphones d. use a light touch on the keyboard
answer
a (footrest)
question
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as _____. a. cyberinvasion b. cyberintrusion c. digital invasion d. cybersquatting
answer
d (cybersquatting)
question
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require _____ to personally vouch for the truth and fairness of their company's disclosures. a. CEOs and CIOs b. CEOs and CFOs c. SOAs and DRMs d. CCVs and DRMs
answer
b (CEOs and CFOs)
question
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the _____ (ADA). a. American Data Act b. Assistive Data Act c. American Democracy Act d. Americans with Disabilities Act
answer
d (Americans with Disabilities Act)
question
One controversial patent granted to Google in 2013 is for "_____" advertising—a business model for charging advertisers according to the number of views an ad receives via a "head mounted gaze tracking device" (speculated to be Google Glass). a. pay-to-look b. pay-for-play c. pay-for-gaze d. pay-to-view
answer
c (pay-for-gaze)
question
Copyrights apply to both published and unpublished works and remain in effect until _____. a. 10 years after the creation of the work b. 70 years after the creation of the work c. 10 years after the creator's death d. 70 years after the creator's death
answer
d (70 years after creator's death)
question
In 1992, the U.S. Environmental Protection Agency (EPA) introduced _____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions. a. ENERGY STAR b. Eco-Label c. VeriChip d. the Green Power Initiative
answer
a (Energy Star)
question
A _____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder. a. digital patent b. digital trademark c. digital watermark d. digital copyright
answer
c (digital watermark)
question
ill plans to publish a book based on her experiences in order to help young entrepreneurs. To help protect her publishing rights, she should register a _____. a. patent b. trademark c. copyright d. digital watermark
answer
c (copyright)
question
With more than 78% of its population online, _____ is the leading world region in Internet users. a. Middle East b. Europe c. Africa d. North America
answer
d (North America)
question
In addition to being annoying and a waste of time, _____ bog(s) down e-mail systems and clog users' Inboxes. a. computer worms b. Trojan horses c. e-mail hoaxes d. digital manipulation
answer
c (e-mail hoaxes)
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New