Sociology Chapter 10 What growing area of concern occurs when criminals obtain personal

subject Type Homework Help
subject Pages 6
subject Words 1622
subject Authors Debbie Thorne McAlister, Ferrell, O. C. Ferrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 10Technology Issues
MULTIPLE CHOICE
1. What is our economy primarily based on today?
a.
Agriculture
b.
Manufacturing
c.
Hunting-gathering
d.
Services
e.
Information technology and services
2. What does the saying "technology has a self-sustaining nature" mean?
a.
People begin to rely on technology and cannot function without it.
b.
Technology acts as a catalyst to spur even faster development.
c.
Technology helps companies meet stakeholders' needs more efficiently.
d.
The money received from new technologies will fund additional future advances.
e.
Technology has become an indispensable aspect of life and society.
3. Among the highest-return investments a nation can make are investments in
a.
research and development.
b.
other nations.
c.
corporations.
d.
nonprofit organizations.
e.
foreign stock markets.
4. ____ involves the sharing of business information, maintaining business relationships, and conducting
business transactions by means of telecommunications networks.
a.
Internet marketing
b.
Internet data interchange
c.
E-commerce
d.
Web-based relational approach
e.
Commerce online
5. To what time period can the origins of the Internet be traced back?
a.
1930s
b.
1950s
c.
1970s
d.
1980s
e.
1990s
page-pf2
6. Which of the following statements is true about credit-card fraud?
a.
Because of high-tech security, credit-card fraud online occurs less frequently than through
mail-order catalogs.
b.
Traditional storefront retailers have the worst problems with credit card fraud because
most allow you to swipe the credit card yourself.
c.
Credit-card fraud is not a major issue for consumers who shop online.
d.
Credit-card fraud is a major issue for businesses and consumers.
e.
Credit-card fraud is 100 percent preventable through increased security measures, but
companies have not used resources to prevent this type of fraud.
7. When sellers bid on their own items in order to heighten interest in an online auction, this is known as
____ bidding.
a.
competitive
b.
illegal
c.
shill
d.
fraudulent
e.
owner's
8. Which of the following is a positive effect associated with the ease of collecting personal data online?
a.
Because of the ease of access, unauthorized use of personal information may occur.
b.
Old or inaccurate data may misclassify a customer and in return, poorer customer service
is received.
c.
Customers may receive special offers based on their past purchases with companies that
are specifically tailored to their interests.
d.
Companies are able to sell information collected online to advertisers and others without
the consumer's consent.
e.
New technology makes it more difficult for law enforcement agents to catch criminals and
for banks to detect fraud.
9. Which of the following is not something that can be done with a cookie?
a.
Track how often a user visits a particular website
b.
Match Internet addresses with specific geographical locations
c.
Provide customized website content for a user
d.
Collect and store personal information about users
e.
Record the sequence in which a customer views pages of a website
10. What growing area of concern occurs when criminals obtain personal information that allows them to
impersonate someone else and use their credit to obtain financial accounts and make purchases?
a.
Illegal impersonation
b.
False pretenses
c.
Identity theft
d.
Consumer fraud
e.
Privacy violation
page-pf3
11. Which of the following statements best describes international initiatives on privacy?
a.
Although many other countries have regulations and restrictions on privacy and the
Internet, none are as stringent as those in the United States.
b.
Russia is at the forefront of privacy regulation and has taken drastic measures to protect
the privacy of its citizens within Russia and around the world.
c.
Japan has demonstrated relatively little concern about protecting the privacy of its citizens
and has few regulations about online privacy.
d.
In the international realm of privacy regulation, the United States is not the strictest but
does attempt to protect its citizens' privacy.
e.
In general, European privacy regulations are less stringent than those of the United States
and Japan.
12. What are the ideas and creative materials developed to solve problems, carry out applications, educate,
and entertain others collectively known as?
a.
Intellectual property
b.
Patents
c.
Copyrights
d.
Personal property
e.
Creative assets
13. What does the Federal Trademark Dilution Act of 1995 require?
a.
The law reinforces every person's right to use company trademarks for free.
b.
It requires individuals who registered web addresses with companies' names to relinquish
their rights to these URLs.
c.
It allows cybersquatters to retain sites related to trademarks since they made the first claim
to these particular URLs.
d.
It decreases companies' rights to protect and defend online actions that threaten their
copyrights.
e.
It prevents Internet users, both individuals and companies, from placing links containing
another company's trademark without express consent.
14. What is the study of ethical issues in the fields of medical treatment and research---including
medicine, nursing, law, philosophy, and theology---called?
a.
Medical ethics
b.
Genome project
c.
Bioethics
d.
Biotechnology
e.
Genetic ethics
page-pf4
15. Which of the following is one of the arguments for banning human cloning?
a.
Cloning has the potential to revolutionize the treatment of diseases and create replacement
organs.
b.
Cloning is unethical because it involves humans meddling with nature.
c.
When cloning is used to treat a patient, an actual human must be destroyed.
d.
Human cloning does not have the potential to enhance human life in any way and
therefore is not worth the money it costs.
e.
Banning human cloning could threaten important research, especially in the areas of
infertility and cancer treatment.
16. What is another name for a genetically modified crop?
a.
Transgenic crop
b.
Altered crop
c.
High-yield crop
d.
FlavSavr
e.
Improved crop
17. Which of the following statements best describes the current view on genetically modified foods?
a.
GM foods have gained wide acceptance throughout the world as people realize the
improvements that can be made from genetic modifications.
b.
Many important companies in the United States and abroad are requiring the suppliers of
their food to use genetic modification in order to decrease prices.
c.
Although a small group of consumers are boycotting GM foods, most countries have
widely adopted and encouraged their development.
d.
Several countries have opposed GM foods, and some large companies have stopped using
them in their products.
e.
Nearly all countries are banning the use of GM products.
18. Why is it difficult for the government to hire and retain forensic computer experts to control the
activities of cyber criminals?
a.
There are less than fifty high-caliber forensic computer experts in the country.
b.
The government is not concerned with these issues and leaves the control up to the private
sector.
c.
The government does not have the jurisdiction to seek out and punish those who commit
online crimes.
d.
The highly skilled experts are hired away by firms who pay much higher salaries than the
government.
e.
Crimes committed online seem mild and unimportant compared to other types of white-
collar crime.
page-pf5
19. What is the current trend concerning monitoring employee communications in the workplace?
a.
Few companies are monitoring unacceptable uses of technology by their employees
because these abuses are nearly impossible to detect.
b.
Many companies are now monitoring employee communications including phone calls, e-
mails, and Internet usage.
c.
The courts have ruled that monitoring employee communications, such as phone calls and
e-mails, is unconstitutional.
d.
Fewer companies are monitoring employee communications because its sends a message
of a lack of trust.
e.
Companies are cutting back on the number of employees having access to computers in
order to limit abuses of the Internet and e-mail.
20. A technology assessment will help a firm do all of the following except
a.
allow managers to estimate whether the benefits of adopting a specific technology
outweigh the costs to the firm and to society.
b.
help companies ensure compliance with government regulations related to technology.
c.
assist managers in evaluating their firm's performance and to chart strategic courses of
action to respond to new technologies.
d.
help the organization understand social and ethical issues relating to technology and
develop appropriate and responsible responses to them.
e.
meet all of the stakeholders' needs and desires concerning the technology used by the firm.
ESSAY
21. How could dramatic shifts in the acceleration and innovations derived from technology spur
imbalances in social existence?
22. Explain how access to high-speed broadband connections can create high-tech "haves" and "have-
nots."
23. How successful have privacy policies been in ensuring consumers that websites are safe?
page-pf6
24. What is TRUSTe and how does it work?
25. What is the future outlook for biotechnology?
26. What is cloning and what are its possible applications?
27. How has the Internet and other technology affected productivity and trust in the workplace?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.