Management Chapter 04 Data storage costs rapidly decline

subject Type Homework Help
subject Pages 9
subject Words 2845
subject Authors Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
59) Which of the following adjusts copyright laws to the Internet age by making it illegal to
circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
60) In general, it is very difficult to hold software producers liable for their software products
when those products are considered to be
A) part of a machine.
B) similar to books.
C) services.
D) artistic expressions.
61) ________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
62) It is not feasible for companies to produce error-free software because
A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
page-pf2
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.
63) The most common source of business system failure is
A) software bugs.
B) software errors.
C) hardware or facilities failures.
D) data quality.
64) The "do anything anywhere" computing environment can
A) make work environments much more pleasant.
B) create economies of efficiency.
C) centralize power at corporate headquarters.
D) blur the traditional boundaries between work and family time.
65) The practice of spamming has been growing because
A) telephone solicitation is no longer legal.
B) it is good advertising practice and brings in many new customers.
C) it helps pay for the Internet.
D) it is so inexpensive and can reach so many people.
page-pf3
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
66) Which of the five moral dimensions of the information age does spamming raise?
A) quality of life
B) system quality
C) accountability and control
D) information rights and obligations
67) Re-designing and automating business processes can be seen as a double-edged sword
because
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
68) A tiny software object embedded in a Web page and used by tracking programs to monitor
online user behavior is called
A) spyware.
B) a super cookie.
C) a Web beacon.
D) a cookie.
page-pf4
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
69) ________ can be induced by tens of thousands of repetitions under low-impact loads.
A) CTS
B) CVS
C) RSI
D) Technostress
70) “More organizations depend on computer systems for critical operations”, this impact is the
result of what computing trend?
A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
71) “Organizations can easily maintain detailed databases on individuals”, this impact is the
result of what computing trend?
A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
page-pf5
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
72) “Companies can analyze vast quantities of data gathered on individuals to develop detailed
profiles of individual behaviour”, this impact is the result of what computing trend?
A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
73) Copying data from one location to another and accessing personal data from remote
locations are both much easier”, this impact is the result of what computing trend?
A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
74) ______________________in Canada is one of the principal means of protecting computer
software in Canada.
A) PIPEDA law
B) FOIP law
C) Patent law
D) Copyright law
75) ______________________ grants the owner an exclusive monopoly on the ideas behind an
invention for between 17 and 20 years.
page-pf6
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
A) The Fair Use Doctrine
B) FOIP
C) A patent
D) A copyright
76) ______________________ is the commission of illegal acts through the use of a computer
or against a computer system.
A) Computer misconduct
B) Computer crime
C) Computer abuse
D) Computer violence
77) ______________________ is the commission of acts involving a computer that may not be
illegal but that are considered unethical.
A) Computer misconduct
B) Computer crime
C) Computer abuse
D) Computer violence
78) Several studies, including at least two by Statistics Canada, have found that
_____________________in Canada are less likely to have computers or online Internet access.
A) old and minority groups
B) poor and majority groups
page-pf7
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
C) poor and main stream groups
D) poor and minority groups
79) ________________________ refers to any eyestrain condition related to display screen use
in desktop computers, laptops, e-readers, smartphones, and handheld video games.
A) Computer vision syndrome (CVS)
B) Technostress
C) Carpal tunnel syndrome (CTS)
D) Compustress
80) The newest computer-related malady is _________________________which is stress
induced by computer use. Its symptoms include aggravation, hostility toward humans,
impatience, and fatigue.
A) Computer vision syndrome (CVS)
B) Technostress
C) Carpal tunnel syndrome (CTS)
D) Compustress
81) _______________________ extends the concept of responsibility further to the area of
laws; it is a feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or organizations.
A) Due process
B) Liability
page-pf8
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
C) Responsibility
D) Accountability
82) The principles of right and wrong that can be used by individuals acting as free moral
agents to make choices to guide their behavior are called ________.
83) ________ refers to the existence of laws that permit individuals to recover damages done to
them by other actors, systems, or organizations.
84) The ethical principle called ________ asks you to put yourself in the place of others, and
think of yourself as the object of the decision.
85) Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take
at all, is also known as the ________ rule.
page-pf9
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
86) ________ is permission given with knowledge of all the facts needed to make a rational
decision.
87) A wide disparity in the ability of different social groups to access computers and the
Internet is referred to as ________.
88) Advertisers use ________ targeting in order to display more relevant ads based on user's
search and browsing history.
89) The ________ model prohibits an organization from collecting any personal information
unless the individual specifically takes action to approve information collection and use.
90) A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention
for 20 years.
page-pfa
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
91) The commission of acts involving the use of a computer that may not be illegal but are
considered unethical is called computer ________.
92) ____________________ means that you accept the potential costs, duties, and obligations
for the decisions you make.
93) The _______________________________________________ is Canada’s modern privacy
law.
94) _______________________ can be defined as consent given with knowledge of all the
facts needed to make a rational decision.
95) _______________________ are small text files deposited on a computer hard drive when a
user visits Web sites and identify the visitor’s Web browser software and track visits to the
Web site.
page-pfb
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
96) _______________________are tiny software programs that keep a record of users’ online
clickstream and report this data back to whoever owns the tracking file invisibly embedded
in e-mail messages and Web pages that are designed to monitor the behaviour of the user
visiting a Web site or sending e-mail.
97) _______________________ is considered to be intangible property created by individuals
or corporations.
98) One of the capabilities of Internet communication is the ability of the individual to appear
essentially anonymous by using made-up user names. Is anonymity the same thing as
privacy, and should it be a right? What ethical issues are raised by increased anonymity?
99) List and describe the five moral dimensions that are involved in political, social, and ethical
issues. Which do you think will be the most difficult for society to deal with? Support your
opinion.
page-pfc
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
100) Discuss at least three key technology trends that raise ethical issues. Give an example of an
ethical or moral impact connected to each one.
101) Define the basic concepts of responsibility, accountability, and liability as applied to ethical
decisions. How are these concepts related?
page-pfd
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
102) What are the steps in conducting an ethical analysis?
103) List and define the six ethical principles discussed in your text.
104) How does a cookie work?
page-pfe
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
105) What do you consider to be the primary ethical, social, and political issues regarding the
quality of a software product?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2024 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.