Deck 13: Managing Technology and Innovation

Full screen (f)
exit full mode
Question
Recent technological advances have decreased the number of way that privacy violations may occur.
Use Space or
up arrow
down arrow
to flip the card.
Question
Most Americans mistakenly believe that if a website has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
Question
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
Question
The corporate nemesis responsible for creating and spreading computer attacks is called a:

A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
Question
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
Question
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
Question
Software piracy is a spreading and global problem.
Question
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
Question
In 2005,this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

A) Harvard.
B) Dartmouth.
C) Princeton.
D) Notre Dame.
Question
A "Trojan Horse" is a hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands.
Question
In a survey of 583 U.S.companies,how many were breached at least once by hackers over the past year?

A) 15 percent.
B) 40 percent.
C) 68 percent.
D) 90 percent.
Question
This term describes sensors and actuators that are embedded in physical objects - from roadways to pacemakers - and are linked through wired and wireless networks.

A) Internet of Things.
B) Information Super Highway.
C) Mapping Network.
D) Smartgrid.
Question
Cloning of humans was beyond the focus of the United Nations 2005 declaration on cloning.
Question
The human genome is the application of engineering to create materials on a molecular or atomic scale.
Question
Honeypots are systems used by security professionals to lure hackers to a fabricated Web site where the hacker's every move can be tracked.
Question
The U.S.government launched a program to detect cyber assaults on private U.S.companies called "Hold-off the Hacktivists."
Question
Human error by employees is a major factor of security breaches in the healthcare industry.
Question
Many experts have raised ethical questions about the ways RFID technology enables businesses,governments,and criminals to gather information about presale,sales,and post-sale activities.
Question
Cell phone technology has sometimes aided law enforcement in capturing criminals who were caught breaking into an automobile or store.
Question
Thanks to advancement in technology the number of instances of identity theft has been decreasing since 2006.
Question
According to Bill Joy,Sun Microsystems' chief scientist,the 21st century technologies:

A) Are the safest and most human friendly know to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
Question
This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyberattacks:

A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks.
D) Data Privacy Day.
Question
The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by:

A) Minority households.
B) Single-woman households.
C) Men between the age of 30 and 50.
D) College students and recent graduates.
Question
The "Perfect Citizen" program,monitored by the National Security Agency,is designed to protect against cyber assaults focused on?

A) Websites for children.
B) University and hospital records.
C) Electricity grids and nuclear power plants.
D) Personal home computers of U.S. citizens.
Question
The Children's Online Privacy Protection Act of 1998 requires:

A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
Question
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
Question
In 2011 this region contained the highest commercial value of unlicensed (pirated)software:

A) Asia Pacific.
B) Latin America.
C) North America.
D) Western Europe.
Question
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

A) Zombies.
B) Comodohackers.
C) Hacktivists.
D) Cyberattackers.
Question
The practice of downloading copyrighted songs was challenged because it:

A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
Question
In the United Kingdom offenders of software piracy and those who breach intellectual property rights face:

A) No penalty because there are no laws protecting software or intellectual property.
B) Fines up to ≤75,000 (nearly $100,000).
C) Fines of up to ≤50,000 (nearly $80,000) and/or a prison sentence of up to 10 years.
D) Mandatory prison sentence of 15 years.
Question
Nanotechnology has aided in the development of the following products.

A) Under Armour.
B) Stain-resistant chinos.
C) Flying quadrobots.
D) All of the above.
Question
The application of engineering to create materials on a molecular or atomic scale is:

A) Micro-biology.
B) Nanotechnology.
C) Micro-engineering.
D) Nano-atomic science.
Question
Loss of annual sales due to software piracy by software companies was estimated to be:

A) $120.3 million.
B) $25.8 billion.
C) $63.5 billion.
D) Impossible to calculate.
Question
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:

A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
Question
Piracy was most severe in this country where the illegal software market was worth nearly $9 billion in 2011:

A) China.
B) India.
C) South Africa.
D) Japan.
Question
Intellectual property refers to:

A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
Question
The number of Americans who actively use mobile-banking services in 2009 and thus were increasingly vulnerable to hacking was:

A) 12 million.
B) 25 million.
C) 71 million.
D) Impossible to count.
Question
A CIO is the company's:

A) Chief intelligence oracle.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
Question
Over time the role of the CIO:

A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
Question
According to The International Federation of the Phonographic Industry (IFPI),worldwide sales of music fell by how much in 2009?

A) 10 percent.
B) 35 percent.
C) 50 percent.
D) 75 percent.
Question
Who is to say that genetically modified foods are safe for human consumption?
Question
In 2005,the United Nations approved a declaration that:

A) Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
Question
How is the corporate Chief Information Officer a "coach" for the organization?
Question
According to the Center for Responsible Nanotechnology how many separate and severe risks are associated with nanotechnology.

A) Fifty.
B) Twenty-five.
C) Eleven.
D) Three.
Question
It is critical for businesses to maintain information in a secure location and guard this valuable resource.How secure is information in a free-access information society.Are digital certificates or other detection systems sufficient to protect information from hackers?
Question
In some economically developed countries and most developing countries around the world genetically modified food was:

A) Looked upon with caution but generally accepted.
B) Welcomed as a way to increase crop yields.
C) Rejected by most governments.
D) Viewed with extreme caution.
Question
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
Question
The identification of human genes is critical to:

A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
Question
In 2008 the F.D.A.declared that food from cloned animals and their offspring was safe to eat,but:

A) Imposed a voluntary ban on the sale of cloned animals.
B) Challenged the ethical basis of cloning.
C) Required vendors to label meat from cloned animals as "cloned."
D) Outlawed the sale of cloned meat until further testing confirmed its safety.
Question
What have businesses done to address the number,severity,and ease of hacker attacks on firms?
Question
Describe the ethical challenges regarding one of the following scientific breakthroughs: nanotechnology,human genome or stem cell research.Do the potential benefits of this breakthrough outweigh the potential costs?
Question
Is information on the Internet truly free,or should copyrighted music or software be protected?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/52
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Managing Technology and Innovation
1
Recent technological advances have decreased the number of way that privacy violations may occur.
False
2
Most Americans mistakenly believe that if a website has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
True
3
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
False
4
The corporate nemesis responsible for creating and spreading computer attacks is called a:

A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
5
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
6
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
7
Software piracy is a spreading and global problem.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
8
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
9
In 2005,this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

A) Harvard.
B) Dartmouth.
C) Princeton.
D) Notre Dame.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
10
A "Trojan Horse" is a hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
11
In a survey of 583 U.S.companies,how many were breached at least once by hackers over the past year?

A) 15 percent.
B) 40 percent.
C) 68 percent.
D) 90 percent.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
12
This term describes sensors and actuators that are embedded in physical objects - from roadways to pacemakers - and are linked through wired and wireless networks.

A) Internet of Things.
B) Information Super Highway.
C) Mapping Network.
D) Smartgrid.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
13
Cloning of humans was beyond the focus of the United Nations 2005 declaration on cloning.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
14
The human genome is the application of engineering to create materials on a molecular or atomic scale.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
15
Honeypots are systems used by security professionals to lure hackers to a fabricated Web site where the hacker's every move can be tracked.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
16
The U.S.government launched a program to detect cyber assaults on private U.S.companies called "Hold-off the Hacktivists."
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
17
Human error by employees is a major factor of security breaches in the healthcare industry.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
18
Many experts have raised ethical questions about the ways RFID technology enables businesses,governments,and criminals to gather information about presale,sales,and post-sale activities.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
19
Cell phone technology has sometimes aided law enforcement in capturing criminals who were caught breaking into an automobile or store.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
20
Thanks to advancement in technology the number of instances of identity theft has been decreasing since 2006.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
21
According to Bill Joy,Sun Microsystems' chief scientist,the 21st century technologies:

A) Are the safest and most human friendly know to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
22
This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyberattacks:

A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks.
D) Data Privacy Day.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
23
The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by:

A) Minority households.
B) Single-woman households.
C) Men between the age of 30 and 50.
D) College students and recent graduates.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
24
The "Perfect Citizen" program,monitored by the National Security Agency,is designed to protect against cyber assaults focused on?

A) Websites for children.
B) University and hospital records.
C) Electricity grids and nuclear power plants.
D) Personal home computers of U.S. citizens.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
25
The Children's Online Privacy Protection Act of 1998 requires:

A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
26
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
27
In 2011 this region contained the highest commercial value of unlicensed (pirated)software:

A) Asia Pacific.
B) Latin America.
C) North America.
D) Western Europe.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
28
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

A) Zombies.
B) Comodohackers.
C) Hacktivists.
D) Cyberattackers.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
29
The practice of downloading copyrighted songs was challenged because it:

A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
30
In the United Kingdom offenders of software piracy and those who breach intellectual property rights face:

A) No penalty because there are no laws protecting software or intellectual property.
B) Fines up to ≤75,000 (nearly $100,000).
C) Fines of up to ≤50,000 (nearly $80,000) and/or a prison sentence of up to 10 years.
D) Mandatory prison sentence of 15 years.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
31
Nanotechnology has aided in the development of the following products.

A) Under Armour.
B) Stain-resistant chinos.
C) Flying quadrobots.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
32
The application of engineering to create materials on a molecular or atomic scale is:

A) Micro-biology.
B) Nanotechnology.
C) Micro-engineering.
D) Nano-atomic science.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
33
Loss of annual sales due to software piracy by software companies was estimated to be:

A) $120.3 million.
B) $25.8 billion.
C) $63.5 billion.
D) Impossible to calculate.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
34
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:

A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
35
Piracy was most severe in this country where the illegal software market was worth nearly $9 billion in 2011:

A) China.
B) India.
C) South Africa.
D) Japan.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
36
Intellectual property refers to:

A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
37
The number of Americans who actively use mobile-banking services in 2009 and thus were increasingly vulnerable to hacking was:

A) 12 million.
B) 25 million.
C) 71 million.
D) Impossible to count.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
38
A CIO is the company's:

A) Chief intelligence oracle.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
39
Over time the role of the CIO:

A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
40
According to The International Federation of the Phonographic Industry (IFPI),worldwide sales of music fell by how much in 2009?

A) 10 percent.
B) 35 percent.
C) 50 percent.
D) 75 percent.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
41
Who is to say that genetically modified foods are safe for human consumption?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
42
In 2005,the United Nations approved a declaration that:

A) Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
43
How is the corporate Chief Information Officer a "coach" for the organization?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
44
According to the Center for Responsible Nanotechnology how many separate and severe risks are associated with nanotechnology.

A) Fifty.
B) Twenty-five.
C) Eleven.
D) Three.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
45
It is critical for businesses to maintain information in a secure location and guard this valuable resource.How secure is information in a free-access information society.Are digital certificates or other detection systems sufficient to protect information from hackers?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
46
In some economically developed countries and most developing countries around the world genetically modified food was:

A) Looked upon with caution but generally accepted.
B) Welcomed as a way to increase crop yields.
C) Rejected by most governments.
D) Viewed with extreme caution.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
48
The identification of human genes is critical to:

A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
49
In 2008 the F.D.A.declared that food from cloned animals and their offspring was safe to eat,but:

A) Imposed a voluntary ban on the sale of cloned animals.
B) Challenged the ethical basis of cloning.
C) Required vendors to label meat from cloned animals as "cloned."
D) Outlawed the sale of cloned meat until further testing confirmed its safety.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
50
What have businesses done to address the number,severity,and ease of hacker attacks on firms?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
51
Describe the ethical challenges regarding one of the following scientific breakthroughs: nanotechnology,human genome or stem cell research.Do the potential benefits of this breakthrough outweigh the potential costs?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
52
Is information on the Internet truly free,or should copyrighted music or software be protected?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 52 flashcards in this deck.