Deck 9: Ethics and Information Technology

ملء الشاشة (f)
exit full mode
سؤال
Which of the following types of analysis focuses on an evaluation of whether the options available to the manager impact any of the fundamental ethical duties of the manager?

A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT one of the six questions that help determine whether an invasion of privacy is justifiable by an employer?

A) For what purpose is the undocumented personal knowledge sought?
B) Is this purpose a profitable and important one?
C) Is the knowledge sought through invasion of privacy relevant to its justifying purpose?
D) Is invasion of privacy the only or the least offensive means of obtaining the knowledge?
سؤال
What percentage of managers considered the right of employees to send and receive personal e-mails during working hours seriously unethical?

A) 39%
B) 50%
C) 56%
D) 58%
سؤال
In the opening case, on what date did Sony Pictures announce that "The Interview" would be available to view on national cable and satellite systems ______.

A) December, 17 2014
B) December, 19 2014
C) January 1, 2015
D) February 5, 2015
سؤال
In the opening case, the hacking into Sony Pictures databases was instigated by a group from ______.

A) FBI
B) Sony insiders
C) North Korea
D) Anonymous
سؤال
All financial institutions, according to the Federal Trade Commission Safeguards Rule, must develop a security plan that does all of the following except

A) Designates one or more employees to coordinate the safeguard efforts
B) Partner with the Federal Trade Commission to access confidential data when needed
C) Designs and implements a safeguards program and regularly monitors and tests it
D) Selects appropriate service providers and makes them implement safeguards
سؤال
Under the ______________, employers can consider individual's e-mails corporate property.

A) Foreign Corrupt Practices Act
B) Sydney Principles
C) Kyoto Treaty
D) Electronic Communications Privacy Act
سؤال
An effective data policy needs to address issues of all of the following except

A) Privacy
B) Accuracy
C) Ownership
D) Profitability
سؤال
________________ is one of the costs of using e-mail.

A) Frivolous use
B) Access to resources
C) Monitoring
D) Data protection
سؤال
______________ sell laptops that use fingerprint readers as part of their security systems.

A) Aladdin Knowledge Systems
B) Biometric Security Systems
C) Lenovo and Fujitsu
D) Privacy Rights Clearinghouse
سؤال
The ______________ is used to help managers determine a decision that will produce the greatest good to the greatest number of stakeholders.

A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
سؤال
Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, companies reported that they had dismissed ______of workers for misusing the Internet.

A) 9%
B) 30%
C) 48%
D) 73%
سؤال
Which of the following is not one of the consumer protection tools recommended by the Federal Trade Commission?

A) Protect your private information
B) Pay attention
C) Use your common sense
D) Share passwords
سؤال
One of the most common ways of monitoring customers and potential customers is by using ____________.

A) Computer viruses
B) Spyware
C) Cookies
D) Hardware
سؤال
Which of the following is NOT a question that managers should ask of themselves before they collect, store, and release potentially private information?

A) What is the nature of the data?
B) Who should have access to the information?
C) Who is responsible for screening potential users to ensure they have a valid reason to request access to the information?
D) What is the financial value of the data being collected?
سؤال
All of the following are mentioned in the text as types of critical analysis to assist managers with their decision-making process except

A) Stakeholder analysis
B) Rights-based analysis
C) Government-based analysis
D) Duty-based analysis
سؤال
___________________ allows unannounced monitoring of business-related calls.

A) The California Public Utilities Commission
B) The Privacy Rights Clearinghouse
C) The Electronics Communications Privacy Act d: Federal Trades Commission
سؤال
Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, what percentage of companies notified their employees that they were monitoring phone use?

A) 7%
B) 16%
C) 73%
D) 84%
سؤال
Business analytics is a key tool to analyze big data so that firms can customize their strategic focus on customers. What is not a big risk in data analysis?

A) Loss of anonymity
B) Data patterns versus reality
C) Discrimination-based customer segmentation
D) Growth in market share and sales
سؤال
An effective workers' rights policy needs to address issues of all of the following except

A) Type of monitoring taking place
B) Type of information being collected
C) Accuracy of information being collected
D) Identification of what information is private or public
سؤال
One of the provisions of the USA PATRIOT Act is ensure that every designated firm creates the position of compliance officer. Which of the items below is not one of the key duties?

A) Approve a written antimoney laundering program
B) Written policies, procedures, and controls to prevent and detect money laundering
C) Administering the firm's computer monitoring program
D) An ongoing employee training program
سؤال
Information overload is a positive benefit of e-mail communication channels in organizations.
سؤال
An effective data policy needs to address issues of privacy, control, accuracy, and security.
سؤال
______ is software that can be loaded onto a computer so an outside party can monitor the computer operations without the consent of the computer user.

A) Hardware
B) Skyware
C) Spyware
D) Cyberware
سؤال
________________ is a common attitude toward the illegal download of music.

A) It benefits artists
B) It is on the Internet, so I can copy it for free
C) It is my right
D) Intellectual property rights are not relevant
سؤال
_____________ is the use of computer technology to commit terrorism crimes.

A) Virtualterrorism
B) Techterrorism
C) Cyberterrorism
D) Retroterrorism
سؤال
As access and accumulation of information become easier within a firm, so does the probability that information becomes more accurate.
سؤال
Issues that need to be addressed in the workers' rights policy include the type of monitoring that can take place within the firm, the type of information that may be collected pertaining to the employee, and the identification of what information would be considered private versus public.
سؤال
Bush, Venables, and Bush identified a series of ethical issues facing internet usage. Which of the following is not one?

A) Privacy
B) Pornography
C) Security transactions
D) Validity
سؤال
_____________ has two treaties that protect the copyrights of intellectual property worldwide on properties such as books, songs, films, and pirated CDs and DVDs.

A) The European Union's Electronic Commerce Directive
B) Millennium Development Summit
C) The World Intellectual Property Organization
D) USA Patriot Act
سؤال
The Northumberland National Park Authority Information technology policies are established to optimize managers' power over employees and their use of IT equipment and tools.
سؤال
An initiative by the Federal Bureau of Investigation, in conjunction with other government agencies, called ______________ was developed to help target and convict cybercriminals.

A) Operation Web Collect
B) Operation Web Find
C) Operation Web Snare
D) Operation Web Catch
سؤال
In direct response to the terrorist attacks on September 11, 2001, President George W. Bush signed into law the ________________.

A) Robinson-Patman Act
B) USA PATRIOT Act
C) Sarbanes-Oxley Act
D) Sherman Antitrust Act
سؤال
____________ is the use of e-mail to try to mimic a legal, legitimate company to access personal or financial information from individuals.

A) Phishing
B) Skyping
C) Snaring
D) Surfing
سؤال
The American Management Association/ePolicy Institute survey examined the relationship between ethics and technology. One finding stated that 45% of firms monitored the time spent and numbers called on the phone.
سؤال
In general, most employees can assume that their e-mail messages are not private.
سؤال
In The Interview hacking case, North Korea instigated a computer outage on Sony for 10 hours on December 22, 2014.
سؤال
Stakeholder analysis treats all stakeholders equally in the critical analysis of information technology management issues.
سؤال
Which of the following is not a guideline dealing with information security compliance?

A) Maintain stable information security controls even when business changes occur
B) Design information systems to permit later auditing
C) Hold third party service providers to high standards
D) Monitor personnel to prevent information misuse or loss
سؤال
Operation Web Snare was an initiative by the Federal Bureau of Investigation to help target and convict cybercriminals. In 150 investigations the value of money lost by the victims was ______.

A) $21m
B) $210m
C) $870,000
D) $87m
سؤال
In a short essay, list and discuss any three of the five issues that managers have to consider when deriving an ethical policy for information technology.
سؤال
Biometric Security Systems identifies users based on a combination of PINS and passwords.
سؤال
In a short essay discuss how the use of e-mail impacts on the privacy of employees.
سؤال
The ultimate goal of phishing is to acquire personal information pertaining to an individual that could be used in the future for illegal activities.
سؤال
In a short essay, describe the World Intellectual Property Organization and the European Union's Electronic Commerce Directive in the context of the role of government regulations.
سؤال
In a short essay, explain the USA PATRIOT Act.
سؤال
The Privacy Rights Clearinghouse suggests that privacy of personal calls made at work may be increased through using cell phones, pay phones, or separate phones that employers have designated for personal calls.
سؤال
Cookies are a form of monitoring customers and potential customers.
سؤال
In a short essay, list four of the six measures that can be used to protect businesses from cyberterrorism.
سؤال
The European Union's Electronic Commerce Directive has two treaties that protect the copyrights of intellectual property worldwide on properties such as books, songs, films, and pirated CDs and DVDs.
سؤال
The FTC Safeguards Rule applies only to firms listed on the NYSE.
سؤال
Downloading of music and movies has become a large problem as more and more Internet users develop attitudes that if the music is there, it is for entertainment purposes and it is free.
سؤال
Software that can be loaded onto a computer so the computer operations can be monitored by an outside party without the consent of the computer user is called spyware.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/53
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Ethics and Information Technology
1
Which of the following types of analysis focuses on an evaluation of whether the options available to the manager impact any of the fundamental ethical duties of the manager?

A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
D
2
Which of the following is NOT one of the six questions that help determine whether an invasion of privacy is justifiable by an employer?

A) For what purpose is the undocumented personal knowledge sought?
B) Is this purpose a profitable and important one?
C) Is the knowledge sought through invasion of privacy relevant to its justifying purpose?
D) Is invasion of privacy the only or the least offensive means of obtaining the knowledge?
D
3
What percentage of managers considered the right of employees to send and receive personal e-mails during working hours seriously unethical?

A) 39%
B) 50%
C) 56%
D) 58%
B
4
In the opening case, on what date did Sony Pictures announce that "The Interview" would be available to view on national cable and satellite systems ______.

A) December, 17 2014
B) December, 19 2014
C) January 1, 2015
D) February 5, 2015
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
5
In the opening case, the hacking into Sony Pictures databases was instigated by a group from ______.

A) FBI
B) Sony insiders
C) North Korea
D) Anonymous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
6
All financial institutions, according to the Federal Trade Commission Safeguards Rule, must develop a security plan that does all of the following except

A) Designates one or more employees to coordinate the safeguard efforts
B) Partner with the Federal Trade Commission to access confidential data when needed
C) Designs and implements a safeguards program and regularly monitors and tests it
D) Selects appropriate service providers and makes them implement safeguards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
7
Under the ______________, employers can consider individual's e-mails corporate property.

A) Foreign Corrupt Practices Act
B) Sydney Principles
C) Kyoto Treaty
D) Electronic Communications Privacy Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
8
An effective data policy needs to address issues of all of the following except

A) Privacy
B) Accuracy
C) Ownership
D) Profitability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
9
________________ is one of the costs of using e-mail.

A) Frivolous use
B) Access to resources
C) Monitoring
D) Data protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
10
______________ sell laptops that use fingerprint readers as part of their security systems.

A) Aladdin Knowledge Systems
B) Biometric Security Systems
C) Lenovo and Fujitsu
D) Privacy Rights Clearinghouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ______________ is used to help managers determine a decision that will produce the greatest good to the greatest number of stakeholders.

A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
12
Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, companies reported that they had dismissed ______of workers for misusing the Internet.

A) 9%
B) 30%
C) 48%
D) 73%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is not one of the consumer protection tools recommended by the Federal Trade Commission?

A) Protect your private information
B) Pay attention
C) Use your common sense
D) Share passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
14
One of the most common ways of monitoring customers and potential customers is by using ____________.

A) Computer viruses
B) Spyware
C) Cookies
D) Hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is NOT a question that managers should ask of themselves before they collect, store, and release potentially private information?

A) What is the nature of the data?
B) Who should have access to the information?
C) Who is responsible for screening potential users to ensure they have a valid reason to request access to the information?
D) What is the financial value of the data being collected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following are mentioned in the text as types of critical analysis to assist managers with their decision-making process except

A) Stakeholder analysis
B) Rights-based analysis
C) Government-based analysis
D) Duty-based analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
17
___________________ allows unannounced monitoring of business-related calls.

A) The California Public Utilities Commission
B) The Privacy Rights Clearinghouse
C) The Electronics Communications Privacy Act d: Federal Trades Commission
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
18
Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, what percentage of companies notified their employees that they were monitoring phone use?

A) 7%
B) 16%
C) 73%
D) 84%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
19
Business analytics is a key tool to analyze big data so that firms can customize their strategic focus on customers. What is not a big risk in data analysis?

A) Loss of anonymity
B) Data patterns versus reality
C) Discrimination-based customer segmentation
D) Growth in market share and sales
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
20
An effective workers' rights policy needs to address issues of all of the following except

A) Type of monitoring taking place
B) Type of information being collected
C) Accuracy of information being collected
D) Identification of what information is private or public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
21
One of the provisions of the USA PATRIOT Act is ensure that every designated firm creates the position of compliance officer. Which of the items below is not one of the key duties?

A) Approve a written antimoney laundering program
B) Written policies, procedures, and controls to prevent and detect money laundering
C) Administering the firm's computer monitoring program
D) An ongoing employee training program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
22
Information overload is a positive benefit of e-mail communication channels in organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
23
An effective data policy needs to address issues of privacy, control, accuracy, and security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
24
______ is software that can be loaded onto a computer so an outside party can monitor the computer operations without the consent of the computer user.

A) Hardware
B) Skyware
C) Spyware
D) Cyberware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
25
________________ is a common attitude toward the illegal download of music.

A) It benefits artists
B) It is on the Internet, so I can copy it for free
C) It is my right
D) Intellectual property rights are not relevant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
26
_____________ is the use of computer technology to commit terrorism crimes.

A) Virtualterrorism
B) Techterrorism
C) Cyberterrorism
D) Retroterrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
27
As access and accumulation of information become easier within a firm, so does the probability that information becomes more accurate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
28
Issues that need to be addressed in the workers' rights policy include the type of monitoring that can take place within the firm, the type of information that may be collected pertaining to the employee, and the identification of what information would be considered private versus public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
29
Bush, Venables, and Bush identified a series of ethical issues facing internet usage. Which of the following is not one?

A) Privacy
B) Pornography
C) Security transactions
D) Validity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
30
_____________ has two treaties that protect the copyrights of intellectual property worldwide on properties such as books, songs, films, and pirated CDs and DVDs.

A) The European Union's Electronic Commerce Directive
B) Millennium Development Summit
C) The World Intellectual Property Organization
D) USA Patriot Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
31
The Northumberland National Park Authority Information technology policies are established to optimize managers' power over employees and their use of IT equipment and tools.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
32
An initiative by the Federal Bureau of Investigation, in conjunction with other government agencies, called ______________ was developed to help target and convict cybercriminals.

A) Operation Web Collect
B) Operation Web Find
C) Operation Web Snare
D) Operation Web Catch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
33
In direct response to the terrorist attacks on September 11, 2001, President George W. Bush signed into law the ________________.

A) Robinson-Patman Act
B) USA PATRIOT Act
C) Sarbanes-Oxley Act
D) Sherman Antitrust Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
34
____________ is the use of e-mail to try to mimic a legal, legitimate company to access personal or financial information from individuals.

A) Phishing
B) Skyping
C) Snaring
D) Surfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
35
The American Management Association/ePolicy Institute survey examined the relationship between ethics and technology. One finding stated that 45% of firms monitored the time spent and numbers called on the phone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
36
In general, most employees can assume that their e-mail messages are not private.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
37
In The Interview hacking case, North Korea instigated a computer outage on Sony for 10 hours on December 22, 2014.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
38
Stakeholder analysis treats all stakeholders equally in the critical analysis of information technology management issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is not a guideline dealing with information security compliance?

A) Maintain stable information security controls even when business changes occur
B) Design information systems to permit later auditing
C) Hold third party service providers to high standards
D) Monitor personnel to prevent information misuse or loss
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
40
Operation Web Snare was an initiative by the Federal Bureau of Investigation to help target and convict cybercriminals. In 150 investigations the value of money lost by the victims was ______.

A) $21m
B) $210m
C) $870,000
D) $87m
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
41
In a short essay, list and discuss any three of the five issues that managers have to consider when deriving an ethical policy for information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
42
Biometric Security Systems identifies users based on a combination of PINS and passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
43
In a short essay discuss how the use of e-mail impacts on the privacy of employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ultimate goal of phishing is to acquire personal information pertaining to an individual that could be used in the future for illegal activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
45
In a short essay, describe the World Intellectual Property Organization and the European Union's Electronic Commerce Directive in the context of the role of government regulations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
46
In a short essay, explain the USA PATRIOT Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
47
The Privacy Rights Clearinghouse suggests that privacy of personal calls made at work may be increased through using cell phones, pay phones, or separate phones that employers have designated for personal calls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
48
Cookies are a form of monitoring customers and potential customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
49
In a short essay, list four of the six measures that can be used to protect businesses from cyberterrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
50
The European Union's Electronic Commerce Directive has two treaties that protect the copyrights of intellectual property worldwide on properties such as books, songs, films, and pirated CDs and DVDs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
51
The FTC Safeguards Rule applies only to firms listed on the NYSE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
52
Downloading of music and movies has become a large problem as more and more Internet users develop attitudes that if the music is there, it is for entertainment purposes and it is free.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
53
Software that can be loaded onto a computer so the computer operations can be monitored by an outside party without the consent of the computer user is called spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 53 في هذه المجموعة.