Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Identify a true statement about information technology.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

B

In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

D

_____are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets. ​

Free
(Multiple Choice)
5.0/5
(33)
Correct Answer:
Verified

A

E-wallets and smart cards increase the risks of exposing consumers' information on the Web.

(True/False)
4.7/5
(35)

To minimize the invasion of privacy, users should be barred from reviewing their records.

(True/False)
4.8/5
(27)

A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.

(Multiple Choice)
4.9/5
(42)

In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.

(Multiple Choice)
4.8/5
(40)

In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the:

(Multiple Choice)
4.8/5
(34)

A common way to index and link databases is by using _____. ​

(Multiple Choice)
4.9/5
(47)

According to the 1980 revisions to the Copyright Act of 1976, _____.

(Multiple Choice)
4.8/5
(32)

_____is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser. ​

(Multiple Choice)
4.9/5
(31)

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.

(Multiple Choice)
4.8/5
(34)

Which of the following can help offset the digital divide?

(Multiple Choice)
4.9/5
(39)

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.

(Multiple Choice)
4.8/5
(37)

Provide an example of how information technology has created concerns about privacy in the workplace.

(Essay)
4.7/5
(31)

To minimize the invasion of privacy, organizations should:

(Multiple Choice)
4.7/5
(33)

Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____.

(Multiple Choice)
4.8/5
(27)

To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____. ​

(Multiple Choice)
4.8/5
(39)

Provide an example of job deskilling.

(Essay)
4.7/5
(39)

In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.

(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)