Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
1
To minimize the invasion of privacy,users should be able to review their records and correct any inaccuracies.
True
2
Cybersquatting has created decency concerns,because these e-mails often contain explicit language or nudity and can be opened by children.
False
3
Copyright laws do not cover online materials.
False
4
Junk e-mail is also known as a cookie.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Ergonomics experts believe that using better-designed furniture can solve many of the health problems arising from information technology.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Even a small response for a spam is a worthwhile return on the investment because sending spam e-mails is inexpensive.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Green computing helps an organization save on energy costs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
To minimize the invasion of privacy,any organization creating,maintaining,using,or disseminating records of personal data must ensure the data's _____.
A)duplicability
B)reliability
C)adaptability
D)instability
A)duplicability
B)reliability
C)adaptability
D)instability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Log files make it possible for Web sites to customize pages for users.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
In the context of Web and network privacy,an acceptable use policy is _____.
A)a statement or legal document that discloses some or all the ways a party gathers,uses,discloses,and manages a client's data
B)a set of rules to govern the collection,use,and disclosure of personal information over the net by commercial organizations
C)a statement or legal document that contains an agreement of the issues documented by Health and Social Issues of Online Gaming
D)a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance
A)a statement or legal document that discloses some or all the ways a party gathers,uses,discloses,and manages a client's data
B)a set of rules to govern the collection,use,and disclosure of personal information over the net by commercial organizations
C)a statement or legal document that contains an agreement of the issues documented by Health and Social Issues of Online Gaming
D)a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Information in databases can be cross-matched to create profiles of people and predict their behavior,based on their transactions with educational,financial,and government institutions.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Private information on the Web-what is posted by a person-is not subject to censorship because of the person's constitutional freedom of expression.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Information technologies have led to job deskilling.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
A patent protects product names and identifying marks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
To minimize the invasion of privacy,organizations should keep collected information only as long as it is _____.
A)reproduced
B)needed for the stated purpose
C)manipulated
D)abstract and incoherent
A)reproduced
B)needed for the stated purpose
C)manipulated
D)abstract and incoherent
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.
A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
A)Phishing
B)nonrepudiation
C)spoofing
D)accountability
A)Phishing
B)nonrepudiation
C)spoofing
D)accountability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Clement applies for a home loan at Global Bank Inc.As part of the process,he provides his personal details to the bank.The banker uses Clement's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.
A)illegal and unethical
B)ethical but illegal
C)legal but unethical
D)legal and ethical
A)illegal and unethical
B)ethical but illegal
C)legal but unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's actions are considered _____.
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
In the context of intellectual property,which of the following is categorized as industrial property?
A)Copyrights
B)Artistic works
C)Literatures
D)Trademarks
A)Copyrights
B)Artistic works
C)Literatures
D)Trademarks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Identify a program used by parents to prevent their children's access to certain Web sites.
A)Hideman
B)Betternet
C)CyberSitter
D)ZenMate
A)Hideman
B)Betternet
C)CyberSitter
D)ZenMate
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
_____ can rise to an unmanageable level quickly,clogging users' in-boxes and preventing access to legitimate e-mails.
A)Sniffing
B)Cybersquatting
C)Spamming
D)Phishing
A)Sniffing
B)Cybersquatting
C)Spamming
D)Phishing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua.In this scenario,Jared's actions are considered _____.
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
In the context of privacy issues,identify a true statement about spam.
A)It is a solicited e-mail sent for business purposes.
B)It is quite expensive to send out such e-mails.
C)It is sent in bulk using automated mailing software.
D)It is used to increase the size of users' in-boxes.
A)It is a solicited e-mail sent for business purposes.
B)It is quite expensive to send out such e-mails.
C)It is sent in bulk using automated mailing software.
D)It is used to increase the size of users' in-boxes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
_____,which are generated by Web server software,record a user's actions on a Web site.
A)Viruses
B)Junk e-mails
C)Worms
D)Log files
A)Viruses
B)Junk e-mails
C)Worms
D)Log files
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
To minimize the invasion of privacy,users and organizations should _____.
A)enable access to one's personal information to all interested parties
B)keep collected information even after the stated purpose is over
C)use verification procedures to ensure data accuracy
D)provide wrong data to unauthorized users
A)enable access to one's personal information to all interested parties
B)keep collected information even after the stated purpose is over
C)use verification procedures to ensure data accuracy
D)provide wrong data to unauthorized users
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a commonly used technology for data collection?
A)Applets
B)Kernels
C)Cookies
D)Firewalls
A)Applets
B)Kernels
C)Cookies
D)Firewalls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
_____ has created decency concerns,because these e-mails often contain explicit language or nudity.
A)Phishing
B)Cybersquatting
C)Sniffing
D)Spamming
A)Phishing
B)Cybersquatting
C)Sniffing
D)Spamming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
In the context of ethical issues of information technologies,restricting access to the Web is a type of _____.
A)cybersquatting
B)censorship
C)copyright
D)patent
A)cybersquatting
B)censorship
C)copyright
D)patent
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
According to the principle of Internet neutrality,Internet service providers (ISPs)and government agencies should _____.
A)not charge different rates on data
B)treat data based on telecommunication providers
C)block data traffic to a specific users
D)discriminate data based on user content
A)not charge different rates on data
B)treat data based on telecommunication providers
C)block data traffic to a specific users
D)discriminate data based on user content
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Identify a true statement about copyrights.
A)Copyrights are used to protect new processes.
B)Copyrights have to be renewed every 70 years.
C)Copyrights protect product names and logos.
D)Copyrights' length vary based on the type of work.
A)Copyrights are used to protect new processes.
B)Copyrights have to be renewed every 70 years.
C)Copyrights protect product names and logos.
D)Copyrights' length vary based on the type of work.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
_____ information can be censored if the content is deemed offensive to a political,religious,or cultural group.
A)Public
B)Private
C)Secretive
D)Abstracted
A)Public
B)Private
C)Secretive
D)Abstracted
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
_____ provide information about a user's location and computer equipment,and this information can be used for unauthorized purposes,such as corporate espionage.
A)Cookies
B)Kernels
C)Applets
D)Firewalls
A)Cookies
B)Kernels
C)Applets
D)Firewalls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following principles states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?
A)Internet censorship
B)Net neutrality
C)Internet security
D)Cybersquatting
A)Internet censorship
B)Net neutrality
C)Internet security
D)Cybersquatting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
In order to overcome concerns about hackers getting access to the accounts of online shoppers,electronic payment systems such as _____ cards are being developed.
A)credit
B)debit
C)smart
D)charge
A)credit
B)debit
C)smart
D)charge
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Identify a true statement about information technology.
A)It has eliminated more types of jobs than it has created.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has increased clerical jobs.
A)It has eliminated more types of jobs than it has created.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has increased clerical jobs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
In the context of intellectual property,which of the following is categorized as copyrighted material?
A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Information technology and the Internet have,in essence,resulted in two societal groups: the information rich and the information poor.This is called the _____.
A)digital dashboard
B)digital squat
C)digital junction
D)digital divide
A)digital dashboard
B)digital squat
C)digital junction
D)digital divide
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
The 1980 revisions to the _____ of 1976 include computer programs,so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
A)Copyright Act
B)Digital Millennium Copyright Act
C)Copyright Term Extension Act
D)Telecommunications Act
A)Copyright Act
B)Digital Millennium Copyright Act
C)Copyright Term Extension Act
D)Telecommunications Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
In the context of information technology in workplaces,which of the following is an advantage of virtual organizations?
A)Each participating company can focus on multiple fields.
B)Products are customized more to respond to customers' needs.
C)The cost at which additional employees are hired increases.
D)An organizational hierarchy exists for participants to contribute their expertise.
A)Each participating company can focus on multiple fields.
B)Products are customized more to respond to customers' needs.
C)The cost at which additional employees are hired increases.
D)An organizational hierarchy exists for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following protects tangible material,such as books and drawings?
A)Copyright laws
B)Patents
C)Trademarks
D)Inventions
A)Copyright laws
B)Patents
C)Trademarks
D)Inventions
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
The _____ was partially overturned in the 1997 Reno v.ACLU case,in which the U.S.Supreme Court unanimously voted to strike down the act's anti-indecency provisions,finding they violated the freedom of speech provisions of the First Amendment.
A)Telecommunications Act
B)Communications Decency Act
C)Copyright Act
D)Sarbanes-Oxley Act
A)Telecommunications Act
B)Communications Decency Act
C)Copyright Act
D)Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
A potential benefit of telecommuting is that it _____.
A)regulates work routine
B)reduces employee turnover
C)increases interaction with coworkers
D)separates work and home life
A)regulates work routine
B)reduces employee turnover
C)increases interaction with coworkers
D)separates work and home life
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is a potential drawback of telecommuting?
A)Lack of necessary supplies or equipment
B)Increased interruptions from coworkers
C)Difficult work environment for employees with disabilities
D)Increased employee turnover and absenteeism
A)Lack of necessary supplies or equipment
B)Increased interruptions from coworkers
C)Difficult work environment for employees with disabilities
D)Increased employee turnover and absenteeism
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Identify a true statement about information technology in social divisions.
A)Students with access to a wide array of resources on the Web have more difficulties writing papers.
B)The speed of the Internet connection also plays a role in digital divide discussion.
C)A type of economic red-lining can occur when companies installing coaxial cables for Internet connections focus on lower-income communities.
D)Interactive and virtual reality educational games available on the Web can widen the gap between students who compete with each other.
A)Students with access to a wide array of resources on the Web have more difficulties writing papers.
B)The speed of the Internet connection also plays a role in digital divide discussion.
C)A type of economic red-lining can occur when companies installing coaxial cables for Internet connections focus on lower-income communities.
D)Interactive and virtual reality educational games available on the Web can widen the gap between students who compete with each other.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
_____ is registering,selling,or using a domain name to profit from someone else's trademark.
A)Sniffing
B)Phishing
C)Cybersquatting
D)Spamming
A)Sniffing
B)Phishing
C)Cybersquatting
D)Spamming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
When a user accidentally enters an incorrect Web site address,he or she may be directed to an alternative Web site.This is an example of _____.
A)cyberstalking
B)typosquatting
C)phishing
D)clickjacking
A)cyberstalking
B)typosquatting
C)phishing
D)clickjacking
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
The _____ is an exception to copyright laws that means that a person can use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.
A)Communication Principle
B)Fair Use Doctrine
C)Digital Millennium Rule
D)ACM Code of Ethics
A)Communication Principle
B)Fair Use Doctrine
C)Digital Millennium Rule
D)ACM Code of Ethics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a benefit of using patents in organizations?
A)Organizations can use patents for an upgraded version of a pre-existing patented process.
B)Organizations can use patents for contents derived from other processes.
C)Organizations can use patents to keep competitors from entering certain market segments.
D)Organizations do not have a fixed period to patent a concept.
A)Organizations can use patents for an upgraded version of a pre-existing patented process.
B)Organizations can use patents for contents derived from other processes.
C)Organizations can use patents to keep competitors from entering certain market segments.
D)Organizations do not have a fixed period to patent a concept.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
_____ laws give only the creator exclusive privileges,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.
A)Trademark
B)Spam
C)Patent
D)Copyright
A)Trademark
B)Spam
C)Patent
D)Copyright
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
In the context of information technology in workplaces,which of the following allows adding new tasks to employees' responsibilities?
A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job restraining
A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job restraining
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
In the context of information technology in workplaces,clerical workers using computers for word-processing tasks is an example of job _____.
A)restraining
B)upgrading
C)reskilling
D)sharing
A)restraining
B)upgrading
C)reskilling
D)sharing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
In the context of information technology in workplaces,when does job deskilling occur?
A)When experienced labor is eliminated by high technology
B)When a job is upgraded from a semiskilled to a skilled position
C)When a job is considered to be operated manually
D)When fragmented jobs are combined as a whole
A)When experienced labor is eliminated by high technology
B)When a job is upgraded from a semiskilled to a skilled position
C)When a job is considered to be operated manually
D)When fragmented jobs are combined as a whole
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is true about virtual organizations?
A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent customers share skills and have access to each other's markets via information technologies.
D)They need organizational hierarchy for participants to contribute their expertise.
A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent customers share skills and have access to each other's markets via information technologies.
D)They need organizational hierarchy for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
In general,_____ last the author's lifetime plus 70 years.
A)copyrights
B)patents
C)database rights
D)trade secrets
A)copyrights
B)patents
C)database rights
D)trade secrets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
In the context of intellectual properties,inventions are categorized as _________ properties.
A)literary
B)copyrighted
C)industrial
D)artistic
A)literary
B)copyrighted
C)industrial
D)artistic
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
_________ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
A)URL opening
B)URL hijacking
C)URL parsing
D)URL decoding
A)URL opening
B)URL hijacking
C)URL parsing
D)URL decoding
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
_________ are small text files with a unique ID tag that are embedded in a Web browser and saved on the user's hard drive.
A)Applets
B)Kernels
C)Cookies
D)Firewalls
A)Applets
B)Kernels
C)Cookies
D)Firewalls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Identify a true statement about information and communications technologies (ICTs)in green computing.
A)They generate approximately 12 percent of the world's carbon dioxide emissions.
B)They generate approximately 2% of the world's carbon dioxide.
C)They help organizations to save energy costs.
D)They improve the quality of the environment in which you live and work.
A)They generate approximately 12 percent of the world's carbon dioxide emissions.
B)They generate approximately 2% of the world's carbon dioxide.
C)They help organizations to save energy costs.
D)They improve the quality of the environment in which you live and work.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following statements is true of virtual organizations?
A)The time needed to develop new products increases.
B)The cost of hiring additional employees increases.
C)An organizational hierarchy exists for participants to contribute their expertise.
D)Companies respond to customers faster and more efficiently.
A)The time needed to develop new products increases.
B)The cost of hiring additional employees increases.
C)An organizational hierarchy exists for participants to contribute their expertise.
D)Companies respond to customers faster and more efficiently.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Whenever a user accesses the same domain,the browser sends saved information to the _________.
A)client server
B)Web server
C)proxy server
D)file server
A)client server
B)Web server
C)proxy server
D)file server
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
_________ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.
A)Identity log
B)Virtual organization
C)Intellectual property
D)Information policy
A)Identity log
B)Virtual organization
C)Intellectual property
D)Information policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n)_________,which is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
_________,also known as virtual work,has enabled some people to perform their jobs from home.
A)Telecommuting
B)Urbanizing
C)Outsourcing
D)Nearshoring
A)Telecommuting
B)Urbanizing
C)Outsourcing
D)Nearshoring
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
A _________ is an intellectual property that protects product names and identifying marks.
A)registration
B)copyright
C)trademark
D)patent
A)registration
B)copyright
C)trademark
D)patent
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.
A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
In the context of privacy issues,in an organization,a new employees have to sign a(n)_________ before they access the network.
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
_________ is computing that promotes a sustainable environment and consumes the least amount of energy.
A)Digital computing
B)Soft computing
C)Green computing
D)Cyber computing
A)Digital computing
B)Soft computing
C)Green computing
D)Cyber computing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
A _________ is an intellectual property that protects new processes.
A)registration
B)copyright
C)trademark
D)patent
A)registration
B)copyright
C)trademark
D)patent
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
In the context of virtual organizations,the cost of hiring additional employees is reduced because _____.
A)companies hire candidates who have just completed their graduation
B)training is given to existing employees who,in turn,train the newly hired
C)skills are shared among participating companies of a virtual organization
D)employees are given incentives that are received by suppliers
A)companies hire candidates who have just completed their graduation
B)training is given to existing employees who,in turn,train the newly hired
C)skills are shared among participating companies of a virtual organization
D)employees are given incentives that are received by suppliers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _________.
A)virus
B)bug
C)spam
D)worm
A)virus
B)bug
C)spam
D)worm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
A common way to index and link databases is by using _________.?A.key customer numbers?B.Virtual Account numbers?C.Social Security numbers?D.protected electronic numbers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
In which of the following ways can green computing be achieved?
A)By using computing devices that are nonbiodegradable
B)By replacing meetings over computer networks with actual face-to-face meetings
C)By replacing one large server with several underutilized smaller servers
D)By using video conferencing,electronic meeting systems,and groupware
A)By using computing devices that are nonbiodegradable
B)By replacing meetings over computer networks with actual face-to-face meetings
C)By replacing one large server with several underutilized smaller servers
D)By using video conferencing,electronic meeting systems,and groupware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
_________ organizations are networks of independent companies,suppliers,customers,and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
A)Legal
B)Ethical
C)Dynamic
D)Virtual
A)Legal
B)Ethical
C)Dynamic
D)Virtual
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Identify a way to solve health issues related to computer equipment.
A)Use correct lighting.
B)Use wired keyboards.
C)Use a high capacity RAM.
D)Use a high speed Internet.
A)Use correct lighting.
B)Use wired keyboards.
C)Use a high capacity RAM.
D)Use a high speed Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck