Management Chapter 4 2 Why do contemporary information systems technology

subject Type Homework Help
subject Pages 9
subject Words 3238
subject Authors Jane P. Laudon, Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
45) Which of the following best describes intellectual property?
A) intangible property created by individuals or corporations
B) unique creative work or ideas
C) tangible or intangible property created from a unique idea
D) the expression of an intangible idea
E) any tangible or intangible property within the creative arts
46) ________ protects the creators of intellectual property from having their work copied by
others.
A) Patent protection
B) Intellectual property law
C) Copyright law
D) Fair Use Doctrine
E) Trade Secret law
47) "Look and feel" copyright infringement lawsuits are concerned with
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) preventing the use of another product's graphical user interface.
page-pf2
48) The strength of patent protection is that it
A) puts the strength of law behind copyright.
B) allows protection from Internet theft of ideas put forth publicly.
C) is easy to define.
D) provides a clear distinction between software and books.
E) grants a monopoly on underlying concepts and ideas.
49) One of the drawbacks of patent protection is
A) that only the underlying ideas are protected.
B) digital media cannot be patented.
C) preventing the ideas from falling into public domain.
D) the years of waiting to receive it.
E) the limited period of protection.
50) The ________ brought copyright law to the Internet age by outlawing the circumvention of
technology-based protections of copyrighted materials.
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
E) Computer Software Copyright Act
page-pf3
51) Unlike regular browser cookies, Flash cookies
A) are installed only at the user's request.
B) are not stored on the user's computer.
C) cannot be easily detected or deleted.
D) monitor the user's behavior at a Web site.
E) are able to track much more of the user's personal information
52) ________ enables advertisers to display more relevant ads based on user's search and
browsing history.
A) Behavioral targeting
B) A Web bug
C) NORA
D) An intelligent agent
E) FIP
53) ________ prohibits an organization from collecting any personal information unless the
individual specifically takes action to approve information collection and use.
A) A legal safe harbor
B) The opt-in model
C) The FIP set of guidelines
D) P3P
page-pf4
54) Which legal mechanism grants the owner exclusive ownership of the ideas behind an
invention for 20 years?
A) copyright
B) trademark
C) patent
D) trade secret protection
55) A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.
56) Malicious software that is installed secretly on your computer by other applications and that
tracks your online movements is called spyware.
57) Most Internet businesses do very little to protect the privacy of their customers.
page-pf5
58) The rate of global piracy is approximately 42%.
59) Any intellectual work product that isn't based on public knowledge can be classed as a trade
secret.
60) Copyright is the legal protection afforded intellectual property, including drawings, movies,
and maps.
61) Software programs were unprotected by copyright law until the early 1990s.
Answer: FALSE
62) The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to
honor these settings.
page-pf6
63) According to several court findings, the general functional features of software are protected
by copyright law.
64) One of the key concepts in patent law is novelty.
65) In recent years, the illegal sharing of music files has declined with the improvement of
technological prevention.
66) COPPA is a set of five principles developed by the FTC that most American and European
privacy law is based on.
page-pf7
67) Although online tracking gathers an enormous amount of information on individual users, it
is anonymous and can't be tied to a specific person.
68) Web beacons are tiny, invisible software programs hidden in e-mail messages and Web
pages that are used to track and report a user's online behavior.
69) What are the major issues concerning privacy in the information age? Do you believe the
need for homeland security should overrule some of the personal privacy and information rights
we have previously taken for granted? Why or why not?
page-pf8
22
70) Describe how a cookie works.
71) Key differences between software and books include all of the following except
A) software contains more information than a book.
B) software is less easily inspected than a book.
C) software products are more easily compared to each other than books.
D) software is understood to be more fallible than a book.
E) it is more difficult to inspect software for flaws.
72) When a software product is considered ________, it becomes difficult to hold software
producers liable for flaws in their product.
A) to be part of a machine
B) similar to books
C) a service
D) to be an artistic expression
E) a tangible product rather than a service
page-pf9
73) ________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs
74) Companies can't realistically create error-free software because
A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.
E) many errors are brought on by the user's operating system.
75) The most common reason business systems fail is
A) software bugs.
B) software errors.
C) hardware failures.
D) facilities failures.
E) data quality.
page-pfa
76) Which of the following is a primary drawback to the "do anything anywhere" computing
environment?
A) It makes work environments less pleasant.
B) It creates inequality between workers who have home computing power and those who don't.
C) It centralizes power at corporate headquarters.
D) It blurs the traditional boundaries between work and family time.
E) It leads to employees being paid less for the total amount of work performed.
77) Which of the following is the primary reason that the practice of spamming has grown
exponentially?
A) Telephone solicitation is no longer legal.
B) It is good advertising practice and brings in many new customers.
C) It helps pay for the Internet.
D) It is very inexpensive and can reach so many people.
E) There are no legal preventions against it.
78) The U.S. CAN-SPAM Act of 2003
A) makes spamming illegal.
B) requires spammers to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.
E) does not outlaw the use of fake return addresses.
page-pfb
79) Spamming raises the moral dimension of
A) quality of life.
B) system quality.
C) accountability and control.
D) information rights and obligations.
E) property rights and obligations.
80) Re-designing and automating business processes can be seen as a double-edged sword
because
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
E) senior executives may not approve the changes.
81) The extreme difference among different social groups regarding their access to computers
and the Internet is called the ________ divide.
A) computer
B) technology
C) digital
D) electronic
E) Internet
page-pfc
82) CVS refers to
A) eyestrain related to computer display screen use.
B) a business practice that attempts to evaluate the intangible values of computer systems.
C) carpal vision syndrome.
D) a type of antivirus protection software.
E) wrist injuries brought about by incorrect hand position when using a keyboard.
83) Which of the following ailments is caused by tens of thousands of repetitions under low-
impact loads?
A) CTS
B) CVS
C) RSI
D) technostress
E) RSS
84) Gaining unapproved access to a computer is not a federal crime.
85) Spam is legally defined as any e-mail that is unsolicited.
page-pfd
86) The symptoms of technostress include aggravation and hostility toward humans.
87) Computer abuse refers to acts involving the computer that may not be illegal but are
considered unethical.
88) One of the capabilities of Internet communication is the ability of the individual to appear
essentially anonymous by using made-up user names. Is anonymity the same thing as privacy,
and should it be a right? What ethical issues are raised by increased anonymity?
page-pfe
89) What do you consider to be the primary ethical, social, and political issues regarding the
quality of a software product?
90) How does the use of electronic voting machines act as a "double-edged sword?" What moral
dimensions are raised by this use of information technology?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.