MIS Quiz 4

27 August 2023
5 (189 reviews)
60 test answers

Unlock all answers in this set

Unlock answers (56)
question
All of the following are technical solutions to protecting user privacy except: anonymous email. preventing client computers from accepting cookies. e-mail encryption. data use policies. anonymous surfing.
answer
data use policies
question
Which of the five moral dimensions of the information age does spamming involve? Quality of life Accountability and control Information rights and obligations Property rights and obligations System quality
answer
Quality of life
question
CVS refers to: eyestrain related to computer display screen use. a type of antivirus protection software. a business practice that attempts to evaluate the intangible values of computer systems. wrist injuries brought about by incorrect hand position when using a keyboard. carpal vision syndrome.
answer
eyestrain related to computer display screen use.
question
Which of the following is a primary drawback to the "do anything anywhere" computing environment? It leads to employees being paid less for the total amount of work performed. It makes work environments less pleasant. It centralizes power at corporate headquarters. It blurs the traditional boundaries between work and family time. It creates a digital divide.
answer
It blurs the traditional boundaries between work and family time.
question
Which of the following statements about Flash cookies is not true? Flash cookies are installed only at the user's request. Flash cookies can be installed whenever a person clicks a Flash video. Flash cookies cannot be easily detected or deleted. Flash cookies are stored on the user's computer. Flash cookies are sometimes called super cookies.
answer
Flash cookies are installed only at the user's request.
question
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. FIP safe harbor COPPA PGP P3P
answer
safe harbor
question
Which of the following is not a file-sharing service? Pandora Morpheus The Pirate Bay Megaupload Grokster
answer
Pandora
question
Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? CVS RSI RSS Technostress CTS
answer
RSI
question
The U.S. CAN-SPAM Act: requires commercial email senders to identify themselves. does not outlaw the use of fake return addresses. has dramatically cut down spamming. does not override state anti-spamming laws. makes spamming illegal.
answer
requires commercial email senders to identify themselves.
question
true or false? Routine violations of individual privacy are made more difficult by advances in data storage.
answer
false
question
Which of the following is the most common reason that business systems fail? Software errors Data quality Software bugs Facilities failures Hardware failures
answer
Data quality
question
In 2010, the FTC added all of the following recommendations to its privacy guidelines except: consumers should be able to review and contest the accuracy and completeness of data. firms should build products and services that protect privacy. firms should limit the length of time that any personal data is stored to six months or less. firms should require consumer consent and provide clear options to opt out of data collection. firms should increase the transparency of their data collection.
answer
firms should limit the length of time that any personal data is stored to six months or less.
question
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? The Gramm-Leach-Bliley Act The Privacy Act The Freedom of Information Act HIPPA COPPA
answer
The Privacy Act
question
Which of the following statements about spam is not true? Spamming is more tightly regulated in Europe than in the United States. Spam costs for business are very high. Most spam originates from bot networks. Spamming has mushroomed because it is so inexpensive and can reach so many people. Cell phone spam usually comes in the form of SMS text messages.
answer
Spamming is more tightly regulated in Europe than in the United States.
question
true or false? Liability is a feature of political systems and allows individuals to recover damages done to them by others.
answer
true
question
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Property rights and obligations Information rights and obligations Accountability and control Quality of life System quality
answer
Information rights and obligations
question
All of the following laws apply to actions by the federal government except the: Privacy Act. E-Government Act. Freedom of Information Act. Children's Online Privacy Protection Act. Computer Security Act.
answer
Children's Online Privacy Protection Act.
question
true or false? Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
answer
true
question
Which of the following best describes Immanuel Kant's categorical imperative? One should take the action that produces the least harm or incurs the least cost. If an action is not right for everyone to take, it is not right for anyone to take. You should act towards others as you would like them to act towards you. One can put values in rank order and understand the consequences of various courses of action. If an action cannot be taken repeatedly, then it is not right to be taken at any time.
answer
If an action is not right for everyone to take, it is not right for anyone to take.
question
true or false? Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.
answer
true
question
true or false? COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
answer
false
question
true or false? European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
answer
true
question
What percent of global Internet users use Google Search and other Google services? Less than 10 percent About 50 percent Around 25 percent Nearly 80 percent Over 90 percent
answer
Nearly 80 percent
question
Which of the following protects the authors of a book from having their work copied by others? Fair Use Doctrine Copyright law Trade Secret law Patent protection Due process
answer
Copyright law
question
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Trademark Trade secret Copyright Patent All forms of intellectual property protection
answer
Trade secret
question
true or false? The European Parliament has banned unsolicited commercial messaging.
answer
true
question
Which of the following is not true about the changes to EU data protection rules proposed in 2012? The new rules would require Internet companies to delete information at the user's request. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules would require Internet companies to retain information only as long as absolutely necessary. The new rules would apply only to all companies providing services in Europe. The new rules would reject the right to be forgotten.
answer
The new rules would reject the right to be forgotten.
question
true or false? One of the key concepts in patent law is novelty.
answer
true
question
Which of the following is not a U.S. federal law affecting private institutions? Computer Matching and Privacy Protection Act COPPA Gramm-Leach-Bliley Act Video Privacy Protection Act HIPAA
answer
Computer Matching and Privacy Protection Act
question
The NAI is an industry association formed to help with which of the following? Online privacy issues Trade secret protection copyright protection Patent protection Trademark protection
answer
Online privacy issues
question
true or false? The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings.
answer
true
question
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? the "no free lunch" rule the utilitarian principle Kant's categorical imperative the risk aversion principle the Golden Rule
answer
the Golden Rule
question
true or false? Web beacons are tiny, invisible software programs hidden in e-mail messages and web pages that are used to track and report a user's online behavior.
answer
true
question
According to ________, you should take the action that produces the least harm. the "no free lunch" rule Kant's categorical imperative the Golden Rule the risk aversion principle the utilitarian principle
answer
the risk aversion principle
question
FIP principles are based on a belief in which of the following? Responsibility of the record holder Difference between the interests of the individual and commercial organizations Accountability of the record holder Privacy of the individual Mutuality of interest between the record holder and the individual
answer
Mutuality of interest between the record holder and the individual
question
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Freedom of Information Act Electronic Communications Privacy Act Privacy Act Digital Millennium Copyright Act Computer Software Copyright Act
answer
Digital Millennium Copyright Act
question
true or false? In today's legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.
answer
false
question
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? Gramm-Leach-Bliley Act Freedom of Information Act HIPAA Privacy Protection Act COPPA
answer
HIPAA
question
true or false? Gaining unapproved access to a computer is not a federal crime.
answer
false
question
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Information rights and obligations Quality of life System quality Accountability and control Property rights and obligations
answer
Property rights and obligations
question
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? Slippery-slope rule Utilitarian principle High-failure cost rule Golden Rule Lemming rule
answer
Slippery-slope rule
question
_______ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Privacy law Patent law Copyright law Trademark law Trade secret protection
answer
Patent law
question
true or false? Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
answer
true
question
Which of the following is not an example of the potential dark side of big data? Analyzing data from sensors installed in local parks to monitor soil moisture. Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. Use of a device installed in a car to analyze driving habits. Use of computerized systems to filter and hire job applicants. Police visits to individuals whom a computer system identified as likely to commit a crime in the future.
answer
Analyzing data from sensors installed in local parks to monitor soil moisture.
question
true or false? Some experts believe that exposure to computers reduces intelligence and makes people dumb.
answer
true
question
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. NORA Web bugs FIP principles behavioral targeting intelligent agents
answer
behavioral targeting
question
true or false? Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
answer
true
question
Redesigning and automating business processes can be seen as a double-edged sword because: increases in efficiency may be accompanied by job losses. it can concentrate power in the hands of senior executives. support for middle-management decision making may be offset by poor data quality. increases in efficiency may be accompanied by poor data quality. reliance on technology results in the loss of hands-on knowledge.
answer
increases in efficiency may be accompanied by job losses.
question
"Look and feel" copyright infringement lawsuits are concerned with: the distinction between tangible and intangible ideas. using the creative elements of another product. the distinction between an idea and its expression. using the graphical elements of another product. violation of a monopoly on the ideas behind a product.
answer
the distinction between an idea and its expression.
question
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Phishing Spamming Profiling Targeting Spyware
answer
Profiling
question
All of the following are steps in the process for analyzing an ethical issue except: identifying the stakeholders. identifying the options you can reasonably take. identifying the potential consequences of your options. assigning responsibility. identifying and clearly describing the facts.
answer
assigning responsibility.
question
The ethical "no free lunch" rule states that: one can put values in rank order and understand the consequences of various courses of action. if an action is not right for everyone to take, it is not right for anyone to take. one should take the action that produces the least harm or incurs the least cost. if an action cannot be taken repeatedly, then it is not right to be taken at any time. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
answer
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
question
true or false? Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.
answer
true
question
true or false? Copyright is a legal protection given to creators of certain types of intellectual property.
answer
true
question
Which of the following is not protected by copyright law? Musical compositions Motion pictures Maps Machines Artwork
answer
Machines
question
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? The slippery-slope rule The Golden Rule The "No free lunch" rule The Risk Aversion Principle Kant's Categorical Imperative
answer
Kant's Categorical Imperative
question
_______ are not held liable for the messages they transmit. Elected officials Private individuals European ISPs Regulated common carriers Organizations and businesses
answer
Regulated common carriers
question
The Online Privacy Alliance: protects user privacy during interactions with websites. is a government agency regulating the use of customer information. has established technical guidelines for ensuring privacy. encourages self-regulation to develop a set of privacy guidelines for its members. is a safe harbor program established by the U.S. government.
answer
encourages self-regulation to develop a set of privacy guidelines for its members.
question
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. safe harbor PGP opt-out P3P opt-in
answer
opt-out
question
true or false? Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.
answer
false