MIS Chapter 4

  1. Principles of right and wrong that you use to make choices are called​ _____________.

    A. beliefs

    B. options

    C. ethics

    D. responsibilities

    E. politics
    ethics
  2. Which technology trend that triggers ethical concerns is raised when a consumer receives coupons based on buying​ patterns?

    A. Mobile device growth impact

    B. Data storage costs rapidly decline

    C. Data analysis advances

    D. Networking advances

    E. Computing power doubles every 18 months
    Data analysis advances
  3. Tracking your movements without consent may be unethical and is most related to which technology​ trend?

    A. Data analysis advances

    B. Decline of data storage costs

    C. Mobile device growth

    D. Networking advances

    E. Computing power doubling every 18 months
    Mobile device growth
  4. In the information​ age, the obligations that individuals and organizations have concerning to intellectual property rights fall within the moral dimension of​ ________.

    A. information rights and obligations

    B. accountability and control

    C. privacy rights

    D. property rights and obligations

    E. system quality
    property rights and obligations
  5. ​____________________ involves determining who is responsible for actions taken.

    A. Quality

    B. Actionable behavior

    C. Privacy

    D. Accountability

    E. Control
    Accountability
  6. ____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

    A. Responsibility

    B. Accountability

    C. Quality

    D. Control

    E. Liability
    Liability
  7. The ethical principle that calls for hypothetically walking in the other​ person's shoes before making a decision is called the​ ______________.

    A. Golden Rule

    B. Golden Egg

    C. utilitarian principle

    D. Nest Egg

    E. Silver Arrow
    Golden Rule
  8. The ethical principle that calls for ranking alternatives before making a decision is called the​ ______________.

    A. Golden Rule

    B. alternative path principle

    C. Immanuel Kant categorical imperative

    D. utility principle

    E. utilitarian principle
    utilitarian principle
  9. When thinking about downloading and using a photo from the​ Internet, don't forget the ethical​ __________.

    A. utilitarian principle

    B. ​no-free-lunch rule

    C. categorical imperative

    D. slippery slope rule

    E. risk aversion principle
    no-free-lunch rule
  10. Which is NOT a way in which NORA technology can create a detailed dossier of a​ person?

    A. Customer transaction systems

    B. Human resources systems

    C. Medical records

    D. Telephone records

    E. Incident and arrest systems
    Medical records
  11. Which government act was enacted in 1996 to protect personal medical​ records?

    A. FERPA

    B. HRSA

    C. HIPA

    D. HIPAA

    E.TIO
    HIPAA
  12. If you want to collect data​ (i.e., photos) from someone and use the​ data, you must obtain​ _____________.

    A. a privacy release

    B. HIPAA authorization

    C. FERPA authorization

    D. implied consent

    E. informed consent
    informed consent
  13. United States privacy laws are largely based on the​ _________________ report.

    A.​ Mills-Pearson

    B. confidentiality

    C. exclusive privacy

    D.​ Sarbanes-Oxley

    E. Fair Information Practices
    Fair Information Practices
  14. Another common name for a web beacon is a​ ____________, which tracks user activities.

    A. worm

    B. web bug

    C. fire fly

    D. Trojan horse

    E. Internet mosquito
    web bug
  15. Where is a cookie that is created during a website visit​ stored?

    A. In a Web directory

    B. On the​ visitor's computer

    C. On the​ ISP's computer

    D. On the​ website's computer

    E. On the​ website's router
    On the​ visitor's computer
  16. Nearly 80 percent of the Internet searches conducted use​ ___________, which makes it the largest data repository in history.

    A. Netscape

    B. Google

    C. Bing

    D.​ Yahoo!

    E. Xfinity
    Google
  17. A photo you have taken of your family is considered​ ______________, and it is protected by law.

    A. fair use

    B. free use

    C. advertising

    D. intellectual property

    E. public domain
    intellectual property
  18. A copyright is protected throughout the life of the author plus an additional​ ______ years after the​ author's death.

    A. 50

    B. 70

    C. 20

    D. 100

    E. 99
    70
  19. Which of the following best describes intellectual​ property?

    A. The distinction between an idea and its expression

    B. Unique creative works or ideas

    C. Intangible property created by individuals or corporations

    D. The manifestation of an intangible idea

    E. Tangible property created from a unique idea
    Intangible property created by individuals or corporations
  20. Which of the following adjusts copyright laws to the Internet age by making it illegal to​ make, distribute, or use devices that circumvent​ technology-based protections of copyrighted​ materials?

    A. Freedom of Information Act

    B.​ Gramm-Leach-Bliley Act of 1999

    C. Digital Millennium Copyright Act

    D. Privacy Act

    E. Electronic Communications Privacy Act
    Digital Millennium Copyright Act
  21. All of the following are negative social consequence of information systems EXCEPT​ ________.

    A. computer crime and abuse

    B. reduction of repetitive stress injuries at work

    C. dependence and vulnerability

    D. challenges in maintaining​ family, work, and leisure boundaries

    E. reduced response time to competition
    reduction of repetitive stress injuries at work
  22. Which statement about the U.S.​ CAN-SPAM Act of 2003 is​ FALSE?

    A. It outlaws unsolicited commercial messaging.

    B. It prohibits the use of fake return addresses.

    C. It requires commercial email messages to identify the true senders.

    D. It requires commercial email messages to display accurate subject lines.

    E. It mandates that recipients be offered a way to remove their names from email lists.
    It outlaws unsolicited commercial messaging.
  23. Which statement about the digital divide in the U.S. is​ FALSE?

    A. It could lead to a society of information haves and​ have-nots.

    B. It is based only on having fair access to digital technology.

    C. Wealthier and more educated people are far more likely to take advantage of newer technologies then people from less fortunate socioeconomic groups.

    D. It is based on how technology is being used between different socioeconomic groups.

    E. Schools in high poverty areas are less likely to have computers for students.
    It is based only on having fair access to digital technology.
  24. Which U.S. act restricts the information the federal government can collect and regulates what it can do with the​ information?

    A. ​Gramm-Leach-Bliley Act of 1999

    B. Computer Security Act of 1987

    C. Privacy Act of 1974

    D. HIPAA of 1996

    E. Freedom of Information Act
    Privacy Act of 1974
  25. The Federal Trade Commission Fair Information Practice principle of​ notice/awareness states which of the​ following?

    A. Websites must disclose their information practices before collecting data.

    B. There is a mechanism in place to enforce FIP principles.

    C. Websites must have established technical guidelines for ensuring privacy.

    D. Data collectors must take responsible steps to ensure that consumer information is accurate and secure from unauthorized use.

    E. Customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
    Websites must disclose their information practices before collecting data.
Author
jbz345
ID
341177
Card Set
MIS Chapter 4
Description
MIS Chapter 4
Updated