Deck 13: Managing Technology and Innovation
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/52
Play
Full screen (f)
Deck 13: Managing Technology and Innovation
1
The Children's Online Privacy Protection Act of 1998 requires:
A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
D
2
Radio Frequency Identification (RFID) was featured in a TV commercial where "the packages knew the truck was lost" before the driver did.
True
3
By the end of 2008, the number of attacks on information security reached:
A) 200,000.
B) 2 million.
C) 20 million.
D) 200 million.
A) 200,000.
B) 2 million.
C) 20 million.
D) 200 million.
C
4
Many experts have raised ethical questions about the ways RFID technology enables businesses, governments, and criminals to gather information about presale, sales, and post-sale activities.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
5
In a 2008 survey from Columbia University, what percentage of American adults said they were uncomfortable when Web sites used personal information to tailor advertisements?
A) 20 percent.
B) 59 percent.
C) 70 percent
D) 89 percent.
A) 20 percent.
B) 59 percent.
C) 70 percent
D) 89 percent.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
6
GetNetWise and the Child Online Protection Act of 1998 protect children in the United States against adult-oriented Web sites.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
7
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
8
Many businesses have developed a privacy policy, which explains what use of the company's technology is permissible.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
9
Recent technological advances have decreased the number of way that privacy violations may occur.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
10
Children are the least vulnerable to invasions of privacy.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
11
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
12
The human genome is the application of engineering to create materials on a molecular or atomic scale.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
13
Advocacy groups such as the Electronic Privacy Information Center criticized the P3P concept as too difficult for users to understand or use properly.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
14
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
15
In 2002, this allowed Web sites to tell the user's Web browser about the site's data privacy policies:
A) Platform for Privacy Preference Project.
B) Electronic Privacy Information Center.
C) Defense to Protect Information.
D) Consumer Information Act.
A) Platform for Privacy Preference Project.
B) Electronic Privacy Information Center.
C) Defense to Protect Information.
D) Consumer Information Act.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
16
In response to employees' challenges that business practices were invasions of their privacy, many businesses:
A) Developed a privacy policy.
B) Banned sexual harassment.
C) Installed an 800-number.
D) Fired the disgruntled workers.
A) Developed a privacy policy.
B) Banned sexual harassment.
C) Installed an 800-number.
D) Fired the disgruntled workers.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
17
Most Americans mistakenly believe that if a Web site has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
18
Honeypots are systems used by security professionals to prevent hackers from entering a computer network.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
19
Software piracy is a spreading and global problem.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
20
Due to efforts by companies to help consumers feel more secure about their personal information, consumer mistrust has diminished.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
21
Honeypots are:
A) A series of Disney-created Web sites for children.
B) Adult Web sites offering fee-for-service information.
C) Government programs that profile computer hackers.
D) Systems used to lure hackers into a fabricated Web site.
A) A series of Disney-created Web sites for children.
B) Adult Web sites offering fee-for-service information.
C) Government programs that profile computer hackers.
D) Systems used to lure hackers into a fabricated Web site.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
22
The Child Online Protection Act, passed in 1998,
A) Specifically applies to children under 13 years of age.
B) Has settled the debate over protecting children from adult-oriented Web sites.
C) Has been a model for many European countries' legislation.
D) Was vetoed by President Bush as too difficult and too costly to enforce.
A) Specifically applies to children under 13 years of age.
B) Has settled the debate over protecting children from adult-oriented Web sites.
C) Has been a model for many European countries' legislation.
D) Was vetoed by President Bush as too difficult and too costly to enforce.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
23
One of the most common protocols for sharing large files and enabling movies to be downloaded safely is:
A) GigaByte Violations.
B) PropertyAlliance, Inc.
C) BitTorrent.
D) Business Software Alliance.
A) GigaByte Violations.
B) PropertyAlliance, Inc.
C) BitTorrent.
D) Business Software Alliance.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
24
Spraying random packets of data in huge streams over the Internet are:
A) Botnets.
B) Worms.
C) Zombies.
D) Hackers.
A) Botnets.
B) Worms.
C) Zombies.
D) Hackers.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
25
Loss of annual sales due to software piracy by software companies was estimated to be:
A) $120 million.
B) $25 billion.
C) $53 billion.
D) Impossible to calculate.
A) $120 million.
B) $25 billion.
C) $53 billion.
D) Impossible to calculate.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
26
In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:
A) Harvard.
B) Dartmouth.
C) Princeton.
D) None of the above.
A) Harvard.
B) Dartmouth.
C) Princeton.
D) None of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
27
The corporate nemesis responsible for creating and spreading computer attacks is called a:
A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
28
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:
A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
29
A CIO is the company's:
A) Chief intelligence overseer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
A) Chief intelligence overseer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
30
Intellectual property refers to:
A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
31
The Federal Trade Commission advocates which of the following for business security?
A) Take stock.
B) Scale down.
C) Pitch it.
D) All of the above.
A) Take stock.
B) Scale down.
C) Pitch it.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
32
At Cisco Systems, the CIO:
A) Was credited with slashing $1.5 billion in costs by using Internet technologies.
B) Was responsible for moving $5 billion in goods and services through the Internet.
C) Discovered that online trading cost only 20 percent as much as conventional trading.
D) Was fired for failing to stop computer hackers from breaking into their systems.
A) Was credited with slashing $1.5 billion in costs by using Internet technologies.
B) Was responsible for moving $5 billion in goods and services through the Internet.
C) Discovered that online trading cost only 20 percent as much as conventional trading.
D) Was fired for failing to stop computer hackers from breaking into their systems.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
33
Two of the largest strongholds for software piracy are:
A) India and China.
B) Japan and India.
C) China and South Africa.
D) South Africa and India.
A) India and China.
B) Japan and India.
C) China and South Africa.
D) South Africa and India.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is not commercial software to block pornography on the Internet?
A) Child Safe.
B) beTrusted.
C) Cyber Snoop.
D) Cyber Sitter.
A) Child Safe.
B) beTrusted.
C) Cyber Snoop.
D) Cyber Sitter.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
35
The practice of downloading copyrighted songs was challenged because it:
A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
36
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:
A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
37
In a 2007 survey of more than 800 North American privacy and security professionals, what percentage acknowledged having at least one reportable data breach of personally identifiable information with their organizations during the past 12 months?
A) 25 percent.
B) 40 percent.
C) 85 percent.
D) 99 percent.
A) 25 percent.
B) 40 percent.
C) 85 percent.
D) 99 percent.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
38
GetNetWise, launched by several major Internet companies, provided:
A) Online safety guides for parents.
B) Special browsers and other tools for families.
C) Web sites appropriate for children.
D) All of the above.
A) Online safety guides for parents.
B) Special browsers and other tools for families.
C) Web sites appropriate for children.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
39
Primarily, the CIO is expected to:
A) Increase costs through efficiency and productivity.
B) Reduce the company's competitive advantage.
C) Enable or drive business innovation.
D) Know how the rank-and-file are performing.
A) Increase costs through efficiency and productivity.
B) Reduce the company's competitive advantage.
C) Enable or drive business innovation.
D) Know how the rank-and-file are performing.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
40
According to Bill Joy, Sun Microsystems' chief scientist, the 21st century technologies:
A) Are the safest and most human friendly known to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
A) Are the safest and most human friendly known to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
41
What have businesses done to address the number, severity, and ease of hacker attacks on firms?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
42
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
43
How is the corporate Chief Information Officer a "coach" for the organization?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
44
The identification of human genes is critical to:
A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
45
Project BioShield was:
A) A $5.6 million global antiterrorism program.
B) A two-year government program to develop vaccines to combat bioterrorism.
C) Announced by President Bush in 2003 to spur pharmaceutical companies to combat bioterrorism.
D) All of the above.
A) A $5.6 million global antiterrorism program.
B) A two-year government program to develop vaccines to combat bioterrorism.
C) Announced by President Bush in 2003 to spur pharmaceutical companies to combat bioterrorism.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
46
Who should be entrusted with guarding against minors accessing adult-oriented Web sites?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
47
It is critical for businesses to maintain information in a secure location and guard this valuable resource. How secure is information in a free-access information society. Are digital certificates or other detection systems sufficient to protect information from hackers?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
48
In 2005, the United Nations approved a declaration that:
A) Prohibited all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
A) Prohibited all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
49
Who is to say that genetically modified foods are safe for human consumption?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
50
Is information on the Internet truly free, or should copyrighted music or software be protected?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
51
The global tone toward genetically modified food was one of:
A) Caution but progress was evitable.
B) Pursuing the lucrative economic opportunities.
C) Seek government approval of all products.
D) Extreme caution.
A) Caution but progress was evitable.
B) Pursuing the lucrative economic opportunities.
C) Seek government approval of all products.
D) Extreme caution.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
52
The safety of genetically modified foods:
A) Was challenged most noticeable in Europe but has spread to other countries.
B) Has been well documented since its beginning.
C) Is now in the hands of governments, ensuring its safety for human consumption.
D) Has never been questioned in the United States.
A) Was challenged most noticeable in Europe but has spread to other countries.
B) Has been well documented since its beginning.
C) Is now in the hands of governments, ensuring its safety for human consumption.
D) Has never been questioned in the United States.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck