Exam 19: Legal and Ethical Aspects

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The first comprehensive privacy legislation adopted in the UnitedStates was the Privacy Act of 1974.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

True

Any intangible asset that consists of human knowledge and ideas is _______.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

Computers as targets is a form of crime that involves an attack on dataintegrity, system integrity, data confidentiality, privacy, or availability.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

True

The relative lack of success in bringing cybercriminals to justice hasled to an increase in their numbers, boldness, and the global scale of their operations.

(True/False)
4.9/5
(32)

A servicemark is the same as a trademark except that it identifies anddistinguishes the source of a service rather than a product.

(True/False)
4.9/5
(34)

_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

(Multiple Choice)
4.8/5
(36)

The successful use of law enforcement depends much more ontechnical skills than on people skills.

(True/False)
4.8/5
(34)

Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are _______.

(Multiple Choice)
4.9/5
(28)

________ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.

(Multiple Choice)
4.9/5
(31)

Computer attacks are considered crimes but do not carry criminalsanctions.

(True/False)
4.8/5
(29)

The invasion of the rights secured by patents, copyrights, and trademarks is ________.

(Short Answer)
4.8/5
(30)

The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.

(Short Answer)
4.8/5
(41)

________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

(Multiple Choice)
4.8/5
(25)

No cybercriminal databases exist that can point investigators tolikely suspects.

(True/False)
5.0/5
(36)

Computer technology has involved the creation of new types ofentities for which no agreed ethical rules have previously been formed.

(True/False)
4.8/5
(37)

Concerns about the extent to which personal privacy has been andmay be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.

(True/False)
4.7/5
(38)

_____ strengthens the protection of copyrighted materials in digital format.

(Multiple Choice)
4.7/5
(38)

A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.

(Short Answer)
4.7/5
(37)

Software is an example of real property.

(True/False)
4.8/5
(42)

A ________ provides distribution channels, such as an online shop or a Web retailer.

(Multiple Choice)
4.9/5
(46)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)