Exam 2: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most organizations implement internal ____________________ to measure actual results against established goals, such as the percentage of end-user reports produced on time.

Free
(Short Answer)
4.7/5
(41)
Correct Answer:
Verified

audits

In Canada, PIPEDA requires individual's consent to collect personal information and it can then be used for any purpose.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

What is the essence of the PIPEDA Act (The Personal Information Protection and Electronic Documents Act) in Canada?

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

C

Which of the following should organizations do to protect their corporate computers from criminal hackers?

(Multiple Choice)
4.8/5
(38)

The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called ____________________.

(Short Answer)
4.8/5
(41)

People who enjoyed computer technology and spent time learning and using computer systems were originally referred to by what name?

(Multiple Choice)
4.9/5
(35)

Victor was working on his computer when suddenly someone took control and began installing and retrieving files.What is the term used to refer to this situation?

(Multiple Choice)
4.8/5
(27)

____________________ is involved in what is considered the largest copyright infringement case in history.

(Short Answer)
4.8/5
(43)

It has been clearly proven that increased use of cell phones can lead to an increased chance of brain cancer.

(True/False)
4.7/5
(34)

The hazardous activities associated with unfavourable working conditions are collectively referred to as ____________________.

(Short Answer)
4.8/5
(43)

Outline several useful policies to minimize computer-related waste and mistakes.

(Essay)
4.8/5
(30)

Which of the following is a useful policy for minimizing waste and mistake?

(Multiple Choice)
4.7/5
(30)

What type of malware is triggered by a set of preconditions?

(Multiple Choice)
4.8/5
(42)

Software is considered intellectual property and may be protected by copyright or ____________________ law.

(Short Answer)
4.8/5
(40)

What Canadian legislation protects businesses against anti-spam and malware law?

(Multiple Choice)
4.7/5
(34)

List at least three useful guidelines to protect computer users from criminal hackers.

(Essay)
4.8/5
(38)

The vast majority of computer-related crimes are reported to authorities.

(True/False)
4.8/5
(48)

Define the term "identity theft" and briefly describe how identity theft criminals use an individual's personal information.

(Essay)
4.7/5
(35)

What condition is an aggravation of the pathway for the nerves that travel through the wrist?

(Multiple Choice)
4.9/5
(40)

The Business Software Alliance (BSA) has become a prominent software antipiracy organization.It is estimated that in 2009 the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales.

(True/False)
4.8/5
(32)
Showing 1 - 20 of 92
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)