Filters
Question type

Study Flashcards

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

A) True
B) False

Correct Answer

verifed

verified

Which of the five moral dimensions of the information age does spamming raise?


A) quality of life
B) system quality
C) accountability and control
D) information rights and obligations

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?


A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A wide disparity in the ability of different social groups to access computers and the Internet is referred to as ________.

Correct Answer

verifed

verified

digital di...

View Answer

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called


A) profiling.
B) phishing.
C) spamming.
D) targeting.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

It is not feasible for companies to produce error-free software because


A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Technostress is a computer-related malady whose symptoms include fatigue.

A) True
B) False

Correct Answer

verifed

verified

Flash cookies are different from ordinary cookies in that they


A) are installed only at the user's request.
B) are not stored on the user's computer.
C) cannot be easily detected or deleted.
D) monitor the user's behavior at a Web site.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.


A) COPPA
B) P3P
C) PGP
D) safe-harbor

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

The Federal Trade Commission FIP principle of Notice/Awareness states that


A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C) there is a mechanism in place to enforce FIP principles.
D) Web sites must disclose their information practices before collecting data.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?


A) Kant's Categorical Imperative
B) the Golden Rule
C) the Risk Aversion Principle
D) the "No free lunch" rule

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except


A) mobile privacy.
B) phasing out of self-regulatory codes.
C) data brokers.
D) large platform providers.

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following statements about trade secrets is not true?


A) Trade secret protections vary from state to state.
B) Any intellectual product, regardless of its purpose, can be classified as a trade secret.
C) Software that contains unique elements can be claimed as a trade secret.
D) Trade secret law protects the actual ideas in a product.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

A) True
B) False

Correct Answer

verifed

verified

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called


A) due process.
B) accountability.
C) the courts of appeal.
D) the judicial system.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The practice of spamming has been growing because


A) telephone solicitation is no longer legal.
B) it is good advertising practice and brings in many new customers.
C) it helps pay for the Internet.
D) it is so inexpensive and can reach so many people.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.


A) opt-in
B) opt-out
C) P3P
D) PGP

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

A) True
B) False

Correct Answer

verifed

verified

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

Correct Answer

verifed

verified

Showing 21 - 40 of 90

Related Exams

Show Answer