Deck 9: Information Technology and Ethics

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not TRUE regarding social media?

A)Web 1.0 is usually user-generated allowing individuals to interact
B)Social media is the popular term referring to advanced information technology and applications that have allowed collaboration among internet users
C)Social media sites all form part of the Web 2.0 phenomena
D)An importatnt aspect of social media is online social networks
E)All of the above are true
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
E-commerce security refers to

A)The number of stakeholders online.
B)The number of firewalls in one's computer
C)The degree to which stakeholders trust hardware such as computers
D)The degree to which stakeholders feel that the data collected online by companies is safe
E)None of the above
سؤال
E-trust refers to the confidence that… that an online transaction will occur according to expectations.

A)A vendor has
B)A buyer has
C)Third party user has
D)A stakeholder has
E)None of the above
سؤال
Wurtz (2005) finds that McDonald's websites in high context cultures tend to

A)Have much more animation.
B)Have less animation
C)No animation at all
D)Have less embedded links
E)All of the above are false
سؤال
The "gap between the more privileged who have access and the less privileged who do not have access to information and communication technology"

A)The digital differentiation
B)The digital divide
C)The digital divide
D)The digital gap
E)E-commerce security
سؤال
The ability of individuals to control or restrict access to information about them is defined as

A)E-trust
B)E-commerce security
C)Information transparency
D)E-commerce piracy
E)Privacy
سؤال
Social media sites all form part of the new

A)Web 1.0 phenomena
B)Web 3.0 phenomena
C)Web 1.2 phenomena
D)Web 2.0 phenomena
E)None of the above
سؤال
Which of the following regarding E-commerce is NOT true?

A)E-Commerce refers to the selling of goods and services over the internet
B)Selling among businesses over the internet is refered to as B2C
C)E-commerce can also take place fully online when customers buy software
D)Most online transactions occur either through B2B or B2C
E)All of the above are true
سؤال
Common technique(s) used by companies to experiments the ways to reduce their IT- related energy use is (are).

A)Virtualization
B)Cloud computing
C)PC power management software
D)All of the above
E)None of the above
سؤال
Which of the following regarding information gathering and storing is NOT true?

A)Data can now be collected and stored on a large scale
B)Data storing is extremely cheap
C)The types of data collected has changed from the past
D)Companies can easily scan customers emails to gather data
E)Companies cannot easily share data
سؤال
The popular term that refers to the advanced Internet technology and applications that have largely enabled collaboration among Internet users is

A)Social media
B)Networking
C)Virtualization
D)Web 1.0
E)None of the above
سؤال
Mr. Jones just bought the iPad 2 and he is expecting a week from now from this eBay seller. This is an example of

A)E-trust.
B)Privacy
C)Integrity
D)Authentication
E)None of the above
سؤال
One key aspect of e-commerce security is non-repudiation. This refers to

A)Making sure that private information is not made available to non-authorized users
B)Making sure that the collected data is reliable and accurate
C)Making sure that collected data is made available in a timely manner
D)Ensuring that those who are using the data are really who they claim to be
E)Making sure that authorized users are not denied access to their data
سؤال
Ensuring that those who are using the data are really who they claim to be represents which aspect of e-commerce security?

A)Confidentiality
B)Availability
C)Authentication
D)Non-repudiation
E)Integrity
سؤال
Protecting and ensuring that collected data is accurate, reliable and truthful represents which aspect of e-commerce security?

A)Confidentiality
B)Availability
C)Authentication
D)Non-repudiation
E)None of the above
سؤال
Trust in other parties such as third parties certifying that a vendor has pledged integrity and honesty is one the main components of

A)E-commerce
B)E-trust
C)E-commerce security
D)Information transparency
E)Information privacy
سؤال
Which of following activities involves placing data on the web as opposed to on in-house servers?

A)Cloud computing
B)Networking
C)Virtualization
D)Data integrity
E)None of the above
سؤال
Running multiple computers on a single computer is known as

A)Virtualization
B)Cloud computing
C)Networking
D)Data integrity
E)All of the above
سؤال
Virtualization

A)Reduces the need for hardware while also reducing the need for energy
B)Increases the need for hardware while reducing the need for energy
C)Reduces the need for hardware while increasing the need for energy
D)Increase the need for hardware while increasing the need for energy
E)None of the above
سؤال
The form(s) of information distinguished by Mooradian to appreciate the issue of privacy with regards to social media is (are)

A)Institution specific information such as financial information
B)Socially sensitive information such as embarassing information
C)Biographical information
D)All of the above
E)None of the above
سؤال
The process of making information explicitly and openly available to concerned stakeholders is known as

A)E-commerce
B)E-trust
C)Information transparency
D)Authentication
E)Non-repudiation
سؤال
Which of the following statements regarding growth of e-commerce activity worldwide is FALSE?

A)Online retailing growth is predicted to be in double digits over the next few years
B)Western European nations will see significant growth in e-commerce activity
C)Chinese e-commerce activity will grow dramatically
D)Latin America will see tremendous growth in e-commerce activity
E)Africa will experience a steady decline in e-commerce activity
سؤال
Which of the following regarding e-trust is FALSE?

A)E-trust refers to the confidence that a buyer has that an online transaction will occur according to expectations
B)E-trust includes trust in the Internet
C)E-Trust includes trust in the vendor
D)E-trust includes trust in other parties
E)All of the above
سؤال
Which of the following represent changes brought about by new information technologies

A)Massive amounts of data collection
B)Multinationals are under increased pressure to safeguard data
C)The damaging effect of misused company information
D)All of the above
E)None of the above
سؤال
Which of the following are components of E-commerce?

A)Confidentiality
B)Availability
C)Integrity
D)Authentication
E)All of the above
سؤال
… refers to existing customers providing feedback encouraging new customers to trust the website

A)Online confirmation
B)Reputable website affiliation
C)Peer endorsement
D)E-commerce trust
E)None of the above
سؤال
… refers to unknown website affiliating itself with a more reputable website to build online trust

A)Online confirmation
B)Reputable website affiliation
C)Peer endorsement
D)E-commerce trust
E)None of the above
سؤال
Digital divide is defined as:

A)Gap between the more privleged who have access, and the less privileged, who do not have access, to information and communication technology
B)Waste stream that occurs as a result of a company's use of information technology
C)Ability of individuals to control or restrict acess to information about them
D)The internet and new forms of social media
E)None of the above
سؤال
What is social media? What are the key components of social media?
سؤال
What is privacy? Why is privacy important? Discuss some of the ways companies can protect their customers' privacy.
سؤال
What is e-commerce security? Discuss some of the key elements of e-commerce security. How can companies ensure e-commerce secuirty?
سؤال
What is etrust? What are the main components of e-trust?
سؤال
What is electronic waste? What can companies do to help reduce electronic waste?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Information Technology and Ethics
1
Which of the following is not TRUE regarding social media?

A)Web 1.0 is usually user-generated allowing individuals to interact
B)Social media is the popular term referring to advanced information technology and applications that have allowed collaboration among internet users
C)Social media sites all form part of the Web 2.0 phenomena
D)An importatnt aspect of social media is online social networks
E)All of the above are true
A
2
E-commerce security refers to

A)The number of stakeholders online.
B)The number of firewalls in one's computer
C)The degree to which stakeholders trust hardware such as computers
D)The degree to which stakeholders feel that the data collected online by companies is safe
E)None of the above
D
3
E-trust refers to the confidence that… that an online transaction will occur according to expectations.

A)A vendor has
B)A buyer has
C)Third party user has
D)A stakeholder has
E)None of the above
B
4
Wurtz (2005) finds that McDonald's websites in high context cultures tend to

A)Have much more animation.
B)Have less animation
C)No animation at all
D)Have less embedded links
E)All of the above are false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
5
The "gap between the more privileged who have access and the less privileged who do not have access to information and communication technology"

A)The digital differentiation
B)The digital divide
C)The digital divide
D)The digital gap
E)E-commerce security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
6
The ability of individuals to control or restrict access to information about them is defined as

A)E-trust
B)E-commerce security
C)Information transparency
D)E-commerce piracy
E)Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
7
Social media sites all form part of the new

A)Web 1.0 phenomena
B)Web 3.0 phenomena
C)Web 1.2 phenomena
D)Web 2.0 phenomena
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following regarding E-commerce is NOT true?

A)E-Commerce refers to the selling of goods and services over the internet
B)Selling among businesses over the internet is refered to as B2C
C)E-commerce can also take place fully online when customers buy software
D)Most online transactions occur either through B2B or B2C
E)All of the above are true
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
9
Common technique(s) used by companies to experiments the ways to reduce their IT- related energy use is (are).

A)Virtualization
B)Cloud computing
C)PC power management software
D)All of the above
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following regarding information gathering and storing is NOT true?

A)Data can now be collected and stored on a large scale
B)Data storing is extremely cheap
C)The types of data collected has changed from the past
D)Companies can easily scan customers emails to gather data
E)Companies cannot easily share data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
11
The popular term that refers to the advanced Internet technology and applications that have largely enabled collaboration among Internet users is

A)Social media
B)Networking
C)Virtualization
D)Web 1.0
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
12
Mr. Jones just bought the iPad 2 and he is expecting a week from now from this eBay seller. This is an example of

A)E-trust.
B)Privacy
C)Integrity
D)Authentication
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
13
One key aspect of e-commerce security is non-repudiation. This refers to

A)Making sure that private information is not made available to non-authorized users
B)Making sure that the collected data is reliable and accurate
C)Making sure that collected data is made available in a timely manner
D)Ensuring that those who are using the data are really who they claim to be
E)Making sure that authorized users are not denied access to their data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
14
Ensuring that those who are using the data are really who they claim to be represents which aspect of e-commerce security?

A)Confidentiality
B)Availability
C)Authentication
D)Non-repudiation
E)Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
15
Protecting and ensuring that collected data is accurate, reliable and truthful represents which aspect of e-commerce security?

A)Confidentiality
B)Availability
C)Authentication
D)Non-repudiation
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
16
Trust in other parties such as third parties certifying that a vendor has pledged integrity and honesty is one the main components of

A)E-commerce
B)E-trust
C)E-commerce security
D)Information transparency
E)Information privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of following activities involves placing data on the web as opposed to on in-house servers?

A)Cloud computing
B)Networking
C)Virtualization
D)Data integrity
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
18
Running multiple computers on a single computer is known as

A)Virtualization
B)Cloud computing
C)Networking
D)Data integrity
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
19
Virtualization

A)Reduces the need for hardware while also reducing the need for energy
B)Increases the need for hardware while reducing the need for energy
C)Reduces the need for hardware while increasing the need for energy
D)Increase the need for hardware while increasing the need for energy
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
20
The form(s) of information distinguished by Mooradian to appreciate the issue of privacy with regards to social media is (are)

A)Institution specific information such as financial information
B)Socially sensitive information such as embarassing information
C)Biographical information
D)All of the above
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
21
The process of making information explicitly and openly available to concerned stakeholders is known as

A)E-commerce
B)E-trust
C)Information transparency
D)Authentication
E)Non-repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following statements regarding growth of e-commerce activity worldwide is FALSE?

A)Online retailing growth is predicted to be in double digits over the next few years
B)Western European nations will see significant growth in e-commerce activity
C)Chinese e-commerce activity will grow dramatically
D)Latin America will see tremendous growth in e-commerce activity
E)Africa will experience a steady decline in e-commerce activity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following regarding e-trust is FALSE?

A)E-trust refers to the confidence that a buyer has that an online transaction will occur according to expectations
B)E-trust includes trust in the Internet
C)E-Trust includes trust in the vendor
D)E-trust includes trust in other parties
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following represent changes brought about by new information technologies

A)Massive amounts of data collection
B)Multinationals are under increased pressure to safeguard data
C)The damaging effect of misused company information
D)All of the above
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following are components of E-commerce?

A)Confidentiality
B)Availability
C)Integrity
D)Authentication
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
26
… refers to existing customers providing feedback encouraging new customers to trust the website

A)Online confirmation
B)Reputable website affiliation
C)Peer endorsement
D)E-commerce trust
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
27
… refers to unknown website affiliating itself with a more reputable website to build online trust

A)Online confirmation
B)Reputable website affiliation
C)Peer endorsement
D)E-commerce trust
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
28
Digital divide is defined as:

A)Gap between the more privleged who have access, and the less privileged, who do not have access, to information and communication technology
B)Waste stream that occurs as a result of a company's use of information technology
C)Ability of individuals to control or restrict acess to information about them
D)The internet and new forms of social media
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is social media? What are the key components of social media?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is privacy? Why is privacy important? Discuss some of the ways companies can protect their customers' privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
31
What is e-commerce security? Discuss some of the key elements of e-commerce security. How can companies ensure e-commerce secuirty?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is etrust? What are the main components of e-trust?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is electronic waste? What can companies do to help reduce electronic waste?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.