Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems
Exam 1: Information Systems: An Overview208 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems, Data Warehouses and Data Marts105 Questions
Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication105 Questions
Exam 7: The Internet, Intranets, and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends, Technologies, and Applications105 Questions
Select questions type
Identify a true statement about information technology.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
D
_____are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
Free
(Multiple Choice)
5.0/5
(33)
Correct Answer:
A
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
(True/False)
4.7/5
(35)
To minimize the invasion of privacy, users should be barred from reviewing their records.
(True/False)
4.8/5
(27)
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.
(Multiple Choice)
4.9/5
(42)
In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.
(Multiple Choice)
4.8/5
(40)
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the:
(Multiple Choice)
4.8/5
(34)
A common way to index and link databases is by using _____.
(Multiple Choice)
4.9/5
(47)
According to the 1980 revisions to the Copyright Act of 1976, _____.
(Multiple Choice)
4.8/5
(32)
_____is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
(Multiple Choice)
4.9/5
(31)
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
(Multiple Choice)
4.8/5
(34)
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.
(Multiple Choice)
4.8/5
(37)
Provide an example of how information technology has created concerns about privacy in the workplace.
(Essay)
4.7/5
(31)
Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____.
(Multiple Choice)
4.8/5
(27)
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____.
(Multiple Choice)
4.8/5
(39)
In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.
(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 105
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)