Exam 16: Managing Information Technology: Finding New Ways to Learn and Link
Elaborate on personal privacy and intellectual property, and discuss the ethical and legal challenges that information technology raises.
Answers will vary. Firms now have the ability to track customer behaviors. Companies have the ability to store email messages that an individual sends and receives from his or her company's system. For example, radio frequency identification (RFID) chips are embedded in U.S. passports and in many states' driver's licenses. Some privacy experts are concerned that such chips will make it easy for government organizations to track individuals.
Intellectual property refers to property that is the result of creative or intellectual effort, such as books, musical works, inventions, and computer software. Copyright laws give creators exclusive rights to produce, record, perform, and sell their work for a designated time.
Piracy occurs when someone reproduces and distributes copyrighted intellectual property without first obtaining permission or providing compensation to the owner of the copyrighted material. When piracy becomes widespread, creators of intellectual property receive much less income for their efforts.
The management of Vencura Inc. approves the purchase of a few computers for the sales team. The management wants only the most basic functions in the computers, such as managing the file system, reading programs and data into main memory, and allocating system memory among various tasks to avoid conflicts. In this scenario, which of the following categories of software does Vencura Inc. require?
A
In the context of the characteristics of good information, when information is timely, it means that:
A
In the context of reducing online fraud, _____ refers to the use of one-time purchase codes to reduce online credit card fraud.
Keith, with his three other friends, sends email messages to people that appear to come from a legitimate business, such as a bank, credit card company, or retailer. With these official looking emails, they trick people to disclose their personal information such as passwords, usernames, and account numbers. In this scenario, Keith and his friends are involved in _____.
The _____ requires senders of unwanted commercial email to label their messages as ads and to tell the recipient how to decline further messages.
Fatima enjoys online shopping as it allows her to buy things from a wide range of options from the convenience of her home. She recently bought a food processor online. In this scenario, Fatima is involved in _____.
Define computer hardware and software, and list each of its components.
_____ is an Internet marketing strategy that tries to involve customers and others not employed by the seller in activities that help promote the product.
Cloud computing allows users to access documents from anywhere via any computer without an Internet connection.
Zestincorp.com, an online clothes store, asks customers if they wish to receive promotional messages from the website when they checkout their orders. Customers can avail discount offers and receive notifications about new products in the future when they agree to receive promotional messages. In this scenario, zestincorp.com uses _____ as its advertising medium.
When using the cloud to store your documents, music, or photos, you only pay for the computer resources that you use.
In the context of security concerns arising from new technologies, malware is short for malignant hardware.
_____ is a technology that stores information on a microchip and transmits it to a reader when it is within range.
Candice is an entrepreneur who mostly communicates with her clients over emails. Lately, however, she has found it difficult to locate legitimate email messages in her inbox. This is because of the numerous unsolicited commercial emails that clutter her inbox. To prevent this from occurring in the future, Candice should _____.
Spedex, an on-rent cab provider company, launches a new feature on its website that can help its customers track their cabs online. The feature requires a sign-in process. Since the feature is new, many customers face problems in figuring out a way to access this feature. To solve this problem, Spedex creates a customer-support page on its website that will resolve the issues of its customers. In this scenario, the customer-support page on Spedex's website is an example of a(n) _____.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)