978-0134238241 Chapter 4 Part 3

subject Type Homework Help
subject Pages 9
subject Words 3395
subject Authors Jane P. Laudon, Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
21
Copyright © 2017 Pearson Education, Inc.
70) A drawback to copyright protection is that the ideas underlying the work are not protected,
only their manifestation in the work.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
71) European countries do not allow businesses to use personally identifiable information
without consumers' prior consent.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
72) The key concepts in patent law are originality, novelty, and value.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
73) Most American and European privacy law is based on a set of five principles called COPPA.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
74) A safe harbor is informal permission to reuse data, given with knowledge of all the facts
needed to make a rational decision.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
75) A web beacon is a tiny object embedded in email messages and web pages that is designed to
monitor online Internet user behavior.
AACSB: Information Technology
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf2
22
76) One of the capabilities of Internet communication is the ability of the individual to appear
essentially anonymous by using made-up user names. Is anonymity the same thing as privacy,
and should it be a right? What ethical issues are raised by increased anonymity?
AACSB: Ethical Understanding and Reasoning; Written and Oral Communication
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
77) Do you believe the need for homeland security should overrule some of the personal privacy
and information rights we have previously taken for granted? Why or why not?
AACSB: Ethical Understanding and Reasoning; Written and Oral Communication
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
78) How does a cookie work?
AACSB: Information Technology; Written and Oral Communication
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf3
23
79) How does protection of privacy in Europe differ from the United States?
AACSB: Application of Knowledge; Written and Oral Communication
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf4
24
80) Discuss the history of Apple's and Samsung's patent battle against each other.
AACSB: Application of Knowledge; Written and Oral Communication
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
81) Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?
A) A failure of Amazon's cloud computing service
B) A failure of Netflix's recommendation engine software
C) A blackout at Netflix's primary data center
D) A hacking attack
E) A bug in Netflix's credit card processing system
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
82) Which of the following is the most common source of business system failure?
A) Software bugs
B) Software errors
C) Hardware failures
D) Data quality
E) Facility catastrophes
AACSB: Information Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
page-pf5
25
83) Which of the following is a primary drawback of the "do anything anywhere" computing
environment?
A) It makes work environments less pleasant.
B) It creates a digital divide.
C) It centralizes power at corporate headquarters.
D) It blurs the traditional boundaries between work and family time.
E) It leads to employees being paid less.
AACSB: Information Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
84) Which of the following statements about spam is not true?
A) Most spam originates from bot networks.
B) Cell phone spam usually comes in the form of SMS text messages.
C) Spam costs for business are very high.
D) Spamming has mushroomed because it is so inexpensive and can reach so many people.
E) Spamming is less regulated in Europe than in the United States.
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
85) The U.S. CAN-SPAM Act:
A) makes spamming illegal.
B) requires commercial email senders to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.
E) has not yet gone into effect.
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
page-pf6
26
86) Which of the five moral dimensions of the information age does spamming involve?
A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Property rights and obligations
AACSB: Ethical Understanding and Reasoning
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
87) Redesigning and automating business processes can be seen as a double-edged sword
because:
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
E) it can concentrate power in the hands of senior executives.
AACSB: Ethical Understanding and Reasoning; Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
88) The term "________" refers to large disparities in access to computers and the Internet
among different social groups and different locations.
A) CVS
B) technostress
C) digital divide
D) RSI
E) CTS
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
page-pf7
27
89) CVS refers to:
A) eyestrain related to computer display screen use.
B) carpal vision syndrome.
C) wrist injuries brought about by incorrect hand position when using a keyboard.
D) cognitive decline induced by technology.
E) complacency created by computers.
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
90) ________ can be induced by tens of thousands of repetitions under low-impact loads.
A) CTS
B) CVS
C) RSI
D) Cognitive decline
E) Bias
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
91) Despite the passage of several laws defining and addressing computer crime, accessing a
computer system without authorization is not yet a federal crime.
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
92) Any unsolicited email is legally considered spam.
AACSB: Information Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
93) The European Parliament has passed a ban on unsolicited commercial messaging.
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
page-pf8
28
94) The most common type of computer-related RSI is CTS.
AACSB: Information Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
95) Some experts believe exposure to computers makes people dumb.
AACSB: Information Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
96) Computer abuse involves the commission of acts involving the computer that may not be
illegal but are considered unethical.
AACSB: Application of Knowledge
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
97) What do you consider to be the primary ethical, social, and political issues regarding the
quality of a software product?
AACSB: Ethical Understanding and Reasoning; Written and Oral Communication
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
page-pf9
29
98) How does the use of electronic voting machines act as a "double-edged sword"? What moral
dimensions are raised by this use of information technology?
AACSB: Ethical Understanding and Reasoning; Written and Oral Communication; Information
Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
99) What is the digital divide and how does it impact society?
AACSB: Ethical Understanding and Reasoning; Written and Oral Communication; Information
Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
page-pfa
30
100) What are some of the potential health risks associated with use of computers?
AACSB: Ethical Understanding and Reasoning; Written and Oral Communication; Information
Technology
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.