Deck 12: Managing Ethical and Legal Issues

ملء الشاشة (f)
exit full mode
سؤال
A government approach used to encourage e-commerce adoption amongst consumers.

A) Increasing the penetration of access devices
B) Increasing skills and confidence of target groups
C) Establishing driving licences or qualifications
D) Building trust or allaying fears
E) Direct marketing campaigns
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Internet governance is:

A) the same as e-government
B) can be defined as: increasing the participation in Internet use by socially excluded groups
C) can be defined as: controlling the operation and use of the use
D) can be defined as:the application of e-commerce technologies to government and public services.
E) none of the above
سؤال
Data protection law and privacy law are identical in all countries.
سؤال
The person in each company who is responsible for data under data protection law is known as:

A) data subject
B) information commissioner
C) data controller
D) database administrator
E) none of the above
سؤال
Privacy law suggests that:

A) cookies should not be placed by company web servers on individuals' computers
B) individuals should be made aware where cookies are used
سؤال
The freedom of information act requires publication of:

A) all information held by all organizations
B) some types of information held by public organizations
سؤال
A method for controlling employee access to external web-based information.

A) An acceptable use policy
B) E-mail scanning software
C) Filtering or blocking software
D) An impact assessment
E) None of the above
سؤال
The impersonation of an another person for fraudulent purposes is commonly known as:

A) identify theft
B) digital impersonation
C) cyberpersonation
D) hacking
E) none of the above
سؤال
A form of online fraud where personal details are obtained through sites masquerading as well brands.

A) RFID (Radio frequency identification)
B) Biometric identification
C) Phishing
D) Hacking
E) None of the above
سؤال
Accessibility legislation is intended to:

A) make all web sites easier to use for visually impaired people
B) improve the usability of web sites
C) improve access to services for disabled people in both the physical and virtual world
D) protect intellectual property
E) none of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Managing Ethical and Legal Issues
1
A government approach used to encourage e-commerce adoption amongst consumers.

A) Increasing the penetration of access devices
B) Increasing skills and confidence of target groups
C) Establishing driving licences or qualifications
D) Building trust or allaying fears
E) Direct marketing campaigns
Building trust or allaying fears
2
Internet governance is:

A) the same as e-government
B) can be defined as: increasing the participation in Internet use by socially excluded groups
C) can be defined as: controlling the operation and use of the use
D) can be defined as:the application of e-commerce technologies to government and public services.
E) none of the above
can be defined as: controlling the operation and use of the use
3
Data protection law and privacy law are identical in all countries.
False
4
The person in each company who is responsible for data under data protection law is known as:

A) data subject
B) information commissioner
C) data controller
D) database administrator
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Privacy law suggests that:

A) cookies should not be placed by company web servers on individuals' computers
B) individuals should be made aware where cookies are used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
The freedom of information act requires publication of:

A) all information held by all organizations
B) some types of information held by public organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
A method for controlling employee access to external web-based information.

A) An acceptable use policy
B) E-mail scanning software
C) Filtering or blocking software
D) An impact assessment
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
The impersonation of an another person for fraudulent purposes is commonly known as:

A) identify theft
B) digital impersonation
C) cyberpersonation
D) hacking
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
A form of online fraud where personal details are obtained through sites masquerading as well brands.

A) RFID (Radio frequency identification)
B) Biometric identification
C) Phishing
D) Hacking
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Accessibility legislation is intended to:

A) make all web sites easier to use for visually impaired people
B) improve the usability of web sites
C) improve access to services for disabled people in both the physical and virtual world
D) protect intellectual property
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.