-
Principles of right and wrong that you use to make choices are called _____________.
A. beliefs
B. options
C. ethics
D. responsibilities
E. politics
ethics
-
Which technology trend that triggers ethical concerns is raised when a consumer receives coupons based on buying patterns?
A. Mobile device growth impact
B. Data storage costs rapidly decline
C. Data analysis advances
D. Networking advances
E. Computing power doubles every 18 months
Data analysis advances
-
Tracking your movements without consent may be unethical and is most related to which technology trend?
A. Data analysis advances
B. Decline of data storage costs
C. Mobile device growth
D. Networking advances
E. Computing power doubling every 18 months
Mobile device growth
-
In the information age, the obligations that individuals and organizations have concerning to intellectual property rights fall within the moral dimension of ________.
A. information rights and obligations
B. accountability and control
C. privacy rights
D. property rights and obligations
E. system quality
property rights and obligations
-
____________________ involves determining who is responsible for actions taken.
A. Quality
B. Actionable behavior
C. Privacy
D. Accountability
E. Control
Accountability
-
____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.
A. Responsibility
B. Accountability
C. Quality
D. Control
E. Liability
Liability
-
The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the ______________.
A. Golden Rule
B. Golden Egg
C. utilitarian principle
D. Nest Egg
E. Silver Arrow
Golden Rule
-
The ethical principle that calls for ranking alternatives before making a decision is called the ______________.
A. Golden Rule
B. alternative path principle
C. Immanuel Kant categorical imperative
D. utility principle
E. utilitarian principle
utilitarian principle
-
When thinking about downloading and using a photo from the Internet, don't forget the ethical __________.
A. utilitarian principle
B. no-free-lunch rule
C. categorical imperative
D. slippery slope rule
E. risk aversion principle
no-free-lunch rule
-
Which is NOT a way in which NORA technology can create a detailed dossier of a person?
A. Customer transaction systems
B. Human resources systems
C. Medical records
D. Telephone records
E. Incident and arrest systems
Medical records
-
Which government act was enacted in 1996 to protect personal medical records?
A. FERPA
B. HRSA
C. HIPA
D. HIPAA
E.TIO
HIPAA
-
If you want to collect data (i.e., photos) from someone and use the data, you must obtain _____________.
A. a privacy release
B. HIPAA authorization
C. FERPA authorization
D. implied consent
E. informed consent
informed consent
-
United States privacy laws are largely based on the _________________ report.
A. Mills-Pearson
B. confidentiality
C. exclusive privacy
D. Sarbanes-Oxley
E. Fair Information Practices
Fair Information Practices
-
Another common name for a web beacon is a ____________, which tracks user activities.
A. worm
B. web bug
C. fire fly
D. Trojan horse
E. Internet mosquito
web bug
-
Where is a cookie that is created during a website visit stored?
A. In a Web directory
B. On the visitor's computer
C. On the ISP's computer
D. On the website's computer
E. On the website's router
On the visitor's computer
-
Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.
A. Netscape
B. Google
C. Bing
D. Yahoo!
E. Xfinity
Google
-
A photo you have taken of your family is considered ______________, and it is protected by law.
A. fair use
B. free use
C. advertising
D. intellectual property
E. public domain
intellectual property
-
A copyright is protected throughout the life of the author plus an additional ______ years after the author's death.
A. 50
B. 70
C. 20
D. 100
E. 99
70
-
Which of the following best describes intellectual property?
A. The distinction between an idea and its expression
B. Unique creative works or ideas
C. Intangible property created by individuals or corporations
D. The manifestation of an intangible idea
E. Tangible property created from a unique idea
Intangible property created by individuals or corporations
-
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
A. Freedom of Information Act
B. Gramm-Leach-Bliley Act of 1999
C. Digital Millennium Copyright Act
D. Privacy Act
E. Electronic Communications Privacy Act
Digital Millennium Copyright Act
-
All of the following are negative social consequence of information systems EXCEPT ________.
A. computer crime and abuse
B. reduction of repetitive stress injuries at work
C. dependence and vulnerability
D. challenges in maintaining family, work, and leisure boundaries
E. reduced response time to competition
reduction of repetitive stress injuries at work
-
Which statement about the U.S. CAN-SPAM Act of 2003 is FALSE?
A. It outlaws unsolicited commercial messaging.
B. It prohibits the use of fake return addresses.
C. It requires commercial email messages to identify the true senders.
D. It requires commercial email messages to display accurate subject lines.
E. It mandates that recipients be offered a way to remove their names from email lists.
It outlaws unsolicited commercial messaging.
-
Which statement about the digital divide in the U.S. is FALSE?
A. It could lead to a society of information haves and have-nots.
B. It is based only on having fair access to digital technology.
C. Wealthier and more educated people are far more likely to take advantage of newer technologies then people from less fortunate socioeconomic groups.
D. It is based on how technology is being used between different socioeconomic groups.
E. Schools in high poverty areas are less likely to have computers for students.
It is based only on having fair access to digital technology.
-
Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?
A. Gramm-Leach-Bliley Act of 1999
B. Computer Security Act of 1987
C. Privacy Act of 1974
D. HIPAA of 1996
E. Freedom of Information Act
Privacy Act of 1974
-
The Federal Trade Commission Fair Information Practice principle of notice/awareness states which of the following?
A. Websites must disclose their information practices before collecting data.
B. There is a mechanism in place to enforce FIP principles.
C. Websites must have established technical guidelines for ensuring privacy.
D. Data collectors must take responsible steps to ensure that consumer information is accurate and secure from unauthorized use.
E. Customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
Websites must disclose their information practices before collecting data.
|
|