Deck 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
العب
ملء الشاشة (f)
Deck 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems
1
_____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
A) Trademark
B) Invention
C) Patent
D) Copyright
A) Trademark
B) Invention
C) Patent
D) Copyright
D
2
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
False
3
As a knowledge worker, while making a work-related decision, it is unnecessary to check if the decision complies with the organization's values.
False
4
Green computing helps an organization save on energy costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
A common way to index and link databases is by using__________.
A) key customer numbers
B) Virtual Account numbers
C) Social Security numbers
D) protected electronic numbers
E) Select
A) key customer numbers
B) Virtual Account numbers
C) Social Security numbers
D) protected electronic numbers
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
In the context of intellectual property, which of the following is categorized as copyrighted material?
A) Trademarks
B) Industrial designs
C) Artistic works
D) Inventions
A) Trademarks
B) Industrial designs
C) Artistic works
D) Inventions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
Copyright laws cover online materials that can be printed or saved on a storage device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
__________is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.
A) An identity log file
B) A virtual organization
C) Intellectual property
D) Information policy
E) Select
A) An identity log file
B) A virtual organization
C) Intellectual property
D) Information policy
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
A patent protects product names and identifying marks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
Information technologies have led to job deskilling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
To minimize the invasion of privacy, users should be barred from reviewing their records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
Private information on the Web-what is posted by a person-is subject to censorship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
_____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.
A) Public
B) Private
C) Secretive
D) Abstracted
A) Public
B) Private
C) Secretive
D) Abstracted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
With employee-monitoring systems, managers can supervise employees' work speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following can help offset the digital divide?
A) Increasing the speed of the Internet for the information rich
B) Increasing the number of computers in public places
C) Reducing the number of computer equipment at schools
D) Reducing the Internet bandwidth for the information poor
A) Increasing the speed of the Internet for the information rich
B) Increasing the number of computers in public places
C) Reducing the number of computer equipment at schools
D) Reducing the Internet bandwidth for the information poor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
In the context of information privacy, which of the following is true of spam?
A) It is solicited e-mail sent for business purposes.
B) It can only be send to a small number of people.
C) It is sent in bulk using automated mailing software.
D) It can only be used to provide access to legitimate e-mails.
A) It is solicited e-mail sent for business purposes.
B) It can only be send to a small number of people.
C) It is sent in bulk using automated mailing software.
D) It can only be used to provide access to legitimate e-mails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
In the context of information privacy, which of the following is true of cookies?
A) They record users' actions on a Web site.
B) They get saved on a computers' primary memory.
C) They provide information about users' location.
D) They make it impossible for Web sites to customize pages for users.
A) They record users' actions on a Web site.
B) They get saved on a computers' primary memory.
C) They provide information about users' location.
D) They make it impossible for Web sites to customize pages for users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
The principle of__________is the idea that several organizations working together can do what one organization cannot.
A) virtual organization
B) collated organization
C) merged organization
D) pool organization
E) Select
A) virtual organization
B) collated organization
C) merged organization
D) pool organization
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
A) phishing
B) nonrepudiation
C) cybersquatting
D) encapsulation
A) phishing
B) nonrepudiation
C) cybersquatting
D) encapsulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
To minimize the invasion of privacy, users and organizations should:
A) provide wrong data to unauthorized users.
B) use verification procedures to ensure data accuracy.
C) keep collected information even after the stated purpose is over.
D) provide access to one's personal information to all interested parties.
A) provide wrong data to unauthorized users.
B) use verification procedures to ensure data accuracy.
C) keep collected information even after the stated purpose is over.
D) provide access to one's personal information to all interested parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called__________.
A) virus
B) bug
C) spam
D) cookie
E) Select
A) virus
B) bug
C) spam
D) cookie
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.
A) copyrights
B) patents
C) aero designs
D) industrial designs
A) copyrights
B) patents
C) aero designs
D) industrial designs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
Identify a program used by parents to prevent their children's access to certain Web sites.
A) Hideman
B) Betternet
C) CyberSitter
D) ZenMate
A) Hideman
B) Betternet
C) CyberSitter
D) ZenMate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
A potential benefit of telecommuting is that it _____.
A) regulates work routine
B) reduces employee turnover
C) separates work and home life
D) increases interaction with coworkers
A) regulates work routine
B) reduces employee turnover
C) separates work and home life
D) increases interaction with coworkers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
With virtual organizations, _____.
A) each participating company can focus on its subpar products as well
B) products can be customized more to respond to customers' needs
C) the cost of hiring new employees increases
D) the time needed to develop new products increases
A) each participating company can focus on its subpar products as well
B) products can be customized more to respond to customers' needs
C) the cost of hiring new employees increases
D) the time needed to develop new products increases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is true of virtual organizations?
A) They need central offices for participants to contribute their expertise.
B) They are networks of dependent companies and manufacturers connected via information technologies.
C) They let independent suppliers share skills and have access to each other's markets via information technologies.
D) They need an organizational hierarchy for participants to contribute their expertise.
A) They need central offices for participants to contribute their expertise.
B) They are networks of dependent companies and manufacturers connected via information technologies.
C) They let independent suppliers share skills and have access to each other's markets via information technologies.
D) They need an organizational hierarchy for participants to contribute their expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
A) phishing
B) nonrepudiation
C) spoofing
D) accountability
A) phishing
B) nonrepudiation
C) spoofing
D) accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n)__________.
A) acceptable use policy
B) standard data policy
C) article ownership policy
D) user content policy
E) Select
A) acceptable use policy
B) standard data policy
C) article ownership policy
D) user content policy
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
Organizations can benefit from patents as they can use patents:
A) for an unlimited period of time.
B) for contents derived from other processes.
C) to upgrade a pre-existing patented process.
D) to keep competitors from entering certain market segments.
A) for an unlimited period of time.
B) for contents derived from other processes.
C) to upgrade a pre-existing patented process.
D) to keep competitors from entering certain market segments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the:
A) freedom of speech provisions of the First Amendment.
B) self-defense provisions of the Second Amendment.
C) Fourth Amendment to the United States Constitution.
D) Fifth Amendment to the United States Constitution.
A) freedom of speech provisions of the First Amendment.
B) self-defense provisions of the Second Amendment.
C) Fourth Amendment to the United States Constitution.
D) Fifth Amendment to the United States Constitution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
A) Cloud computing
B) Mobile computing
C) Green computing
D) Natural computing
A) Cloud computing
B) Mobile computing
C) Green computing
D) Natural computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.
A) cybersquatting
B) censorship
C) copyright
D) spamming
A) cybersquatting
B) censorship
C) copyright
D) spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is a potential drawback of telecommuting?
A) Increased interruptions from coworkers
B) Lack of necessary supplies or equipment
C) Increased employee turnover and absenteeism
D) Difficult work environment for employees with disabilities
A) Increased interruptions from coworkers
B) Lack of necessary supplies or equipment
C) Increased employee turnover and absenteeism
D) Difficult work environment for employees with disabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
In the context of information technology in workplaces, which of the following allows adding new tasks to employees' responsibilities?
A) Job virtualization
B) Job upgrading
C) Job deskilling
D) Job rotation
A) Job virtualization
B) Job upgrading
C) Job deskilling
D) Job rotation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
Identify a true statement about information technology.
A) It has increased clerical jobs.
B) It has cut down production costs.
C) It has reduced consumers' purchasing power.
D) It has eliminated more jobs than it has created.
A) It has increased clerical jobs.
B) It has cut down production costs.
C) It has reduced consumers' purchasing power.
D) It has eliminated more jobs than it has created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
In the context of information privacy, junk e-mail is also known as _____.
A) cookie
B) bookmark
C) spam
D) draft
A) cookie
B) bookmark
C) spam
D) draft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
__________is computing that promotes a sustainable environment and consumes the least amount of energy.
A) Digital computing
B) Soft computing
C) Green computing
D) Cyber computing
E) Select
A) Digital computing
B) Soft computing
C) Green computing
D) Cyber computing
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.
A) cyberstalking
B) typosquatting
C) phishing
D) spamming
A) cyberstalking
B) typosquatting
C) phishing
D) spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
A__________is an intellectual property that protects new processes.
A) registration
B) copyright
C) trademark
D) patent
E) Select
A) registration
B) copyright
C) trademark
D) patent
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
A__________is an intellectual property that protects product names and identifying marks.
A) registration
B) copyright
C) trademark
D) patent
E) Select
A) registration
B) copyright
C) trademark
D) patent
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.
A) ethical, but illegal
B) legal, but unethical
C) illegal and unethical
D) legal and ethical
A) ethical, but illegal
B) legal, but unethical
C) illegal and unethical
D) legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
__________, also known as virtual work, has enabled some people to perform their jobs from home.
A) Telecommuting
B) Urbanizing
C) Outsourcing
D) Offshoring
E) Select
A) Telecommuting
B) Urbanizing
C) Outsourcing
D) Offshoring
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.
A) job restraining
B) job upgrading
C) job deskilling
D) job sharing
A) job restraining
B) job upgrading
C) job deskilling
D) job sharing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
To minimize the invasion of privacy, _____.
A) organizations should not delete data even when it is not needed
B) users should be able to review their records and correct any inaccuracies
C) organizations should not modify data once it is entered into an information system
D) users should provide unlimited access to personal information to those who have authorization
A) organizations should not delete data even when it is not needed
B) users should be able to review their records and correct any inaccuracies
C) organizations should not modify data once it is entered into an information system
D) users should provide unlimited access to personal information to those who have authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
In the context of Web and network privacy, an acceptable use policy is a:
A) legal document that protects an organization from embezzlement of money by its service providers.
B) set of rules to govern the electronic fund transfers between an organization and its clients.
C) legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D) set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
A) legal document that protects an organization from embezzlement of money by its service providers.
B) set of rules to govern the electronic fund transfers between an organization and its clients.
C) legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D) set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
Identify a true statement about copyright laws.
A) They protect new processes.
B) They protect product names.
C) They protect tangible material, such as books.
D) They protect product identifying marks, such as logos.
A) They protect new processes.
B) They protect product names.
C) They protect tangible material, such as books.
D) They protect product identifying marks, such as logos.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.
A) credit cards
B) e-checks
C) debit cards
D) e-wallets
A) credit cards
B) e-checks
C) debit cards
D) e-wallets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
In the context of intellectual property, which of the following is categorized as industrial property?
A) Copyrights
B) Artistic works
C) Literary works
D) Trademarks
A) Copyrights
B) Artistic works
C) Literary works
D) Trademarks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
Green computing can be achieved by:
A) using computing devices that are nonbiodegradable.
B) replacing meetings over computer networks with actual face-to-face meetings.
C) replacing one large server with several underutilized smaller servers.
D) using video conferencing, electronic meeting systems, and groupware.
A) using computing devices that are nonbiodegradable.
B) replacing meetings over computer networks with actual face-to-face meetings.
C) replacing one large server with several underutilized smaller servers.
D) using video conferencing, electronic meeting systems, and groupware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
__________make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.
A) Cookies
B) Trojans
C) Applets
D) Kernels
E) Select
A) Cookies
B) Trojans
C) Applets
D) Kernels
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.
A) unethical and illegal
B) ethical, but illegal
C) legal and ethical
D) legal, but unethical
A) unethical and illegal
B) ethical, but illegal
C) legal and ethical
D) legal, but unethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Job deskilling occurs when:
A) experienced labor is eliminated by high technology.
B) a worker is promoted from a semiskilled to a skilled position.
C) a job is carried out manually.
D) fragmented jobs are combined as a whole.
A) experienced labor is eliminated by high technology.
B) a worker is promoted from a semiskilled to a skilled position.
C) a job is carried out manually.
D) fragmented jobs are combined as a whole.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
To minimize the invasion of privacy, organizations should:
A) not delete data even when it is not needed.
B) not modify data once it is entered into an information system.
C) collect only the data that is necessary for the stated purpose.
D) provide unlimited access to personal information to those who have authorization.
A) not delete data even when it is not needed.
B) not modify data once it is entered into an information system.
C) collect only the data that is necessary for the stated purpose.
D) provide unlimited access to personal information to those who have authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
The cost of hiring additional employees in virtual organizations is reduced because:
A) there is less emphasis on hiring new talent.
B) skills are shared among the participating companies.
C) companies hire candidates with minimum experience.
D) training costs are reduced because of the absence of training programs.
A) there is less emphasis on hiring new talent.
B) skills are shared among the participating companies.
C) companies hire candidates with minimum experience.
D) training costs are reduced because of the absence of training programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
Identify a true statement about information and communications technology (ICT).
A) It generates approximately six percent of the world's greenhouse gases.
B) It generates approximately two percent of the world's carbon dioxide emissions.
C) It helps organizations save energy costs.
D) It improves the quality of the environment in which you work.
A) It generates approximately six percent of the world's greenhouse gases.
B) It generates approximately two percent of the world's carbon dioxide emissions.
C) It helps organizations save energy costs.
D) It improves the quality of the environment in which you work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following protects contents of an HTML code that can be printed or saved on a storage device?
A) Copyright laws
B) Patent laws
C) Laws governing trademarks
D) Industrial property laws
A) Copyright laws
B) Patent laws
C) Laws governing trademarks
D) Industrial property laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
__________are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
A) Virtual organizations
B) Collated organizations
C) Merged organizations
D) Pool organizations
E) Select
A) Virtual organizations
B) Collated organizations
C) Merged organizations
D) Pool organizations
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
In the context of intellectual property, inventions are categorized as__________properties.
A) literary
B) copyrighted
C) industrial
D) artistic
E) Select
A) literary
B) copyrighted
C) industrial
D) artistic
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.
A) information barrier
B) domain squat
C) data junction
D) digital divide
A) information barrier
B) domain squat
C) data junction
D) digital divide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____.
A) illegal and unethical
B) legal, but unethical
C) illegal, but ethical
D) legal and ethical
A) illegal and unethical
B) legal, but unethical
C) illegal, but ethical
D) legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
A) Internet censorship
B) Net neutrality
C) Internet security
D) Free Basics
A) Internet censorship
B) Net neutrality
C) Internet security
D) Free Basics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following is a commonly used technology for data collection?
A) Applets
B) Kernels
C) Cookies
D) Firewalls
A) Applets
B) Kernels
C) Cookies
D) Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
In the context of Web and network privacy issues, new employees in an organization have to sign a(n)__________before they access the network.
A) acceptable use policy
B) standard data policy
C) article ownership policy
D) user content policy
E) Select
A) acceptable use policy
B) standard data policy
C) article ownership policy
D) user content policy
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?
A) Safeguarding patients' billing information
B) Protecting patients' computer records
C) Protecting patients' credit information
D) Safeguarding conversations between patients and their families
A) Safeguarding patients' billing information
B) Protecting patients' computer records
C) Protecting patients' credit information
D) Safeguarding conversations between patients and their families
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.
A) illegal and unethical
B) legal, but unethical
C) illegal, but ethical
D) legal and ethical
A) illegal and unethical
B) legal, but unethical
C) illegal, but ethical
D) legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
A) ethical, but illegal
B) unethical, but legal
C) illegal and unethical
D) legal and ethical
A) ethical, but illegal
B) unethical, but legal
C) illegal and unethical
D) legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
_____, which are generated by Web server software, record a user's actions on a Web site.
A) Viruses
B) Junk e-mails
C) Worms
D) Log files
A) Viruses
B) Junk e-mails
C) Worms
D) Log files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
__________are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
A) Applets
B) Kernels
C) Cookies
D) Firewalls
E) Select
A) Applets
B) Kernels
C) Cookies
D) Firewalls
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____.
A) cease charging different rates on data
B) treat data based on the types of application
C) start blocking data traffic to specific users
D) discriminate data based on content
A) cease charging different rates on data
B) treat data based on the types of application
C) start blocking data traffic to specific users
D) discriminate data based on content
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
__________is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
A) URL opening
B) URL hijacking
C) URL parsing
D) URL decoding
E) Select
A) URL opening
B) URL hijacking
C) URL parsing
D) URL decoding
E) Select
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.
A) sniffing
B) phishing
C) cybersquatting
D) spamming
A) sniffing
B) phishing
C) cybersquatting
D) spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
A) Uniform Civil Code
B) The Fair Use Doctrine
C) The Copyright Act of 1790
D) IT code of conduct
A) Uniform Civil Code
B) The Fair Use Doctrine
C) The Copyright Act of 1790
D) IT code of conduct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
Using _____ is a way to solve health issues related to computer equipment.
A) correct lighting
B) wired keyboards
C) a high capacity RAM
D) a high speed Internet
A) correct lighting
B) wired keyboards
C) a high capacity RAM
D) a high speed Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
According to the 1980 revisions to the Copyright Act of 1976, _____.
A) copyright holders can perform a copyrighted work by means of digital audio transmission
B) copyright protection extends to original works of authorship in architectural fields
C) both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D) the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
A) copyright holders can perform a copyrighted work by means of digital audio transmission
B) copyright protection extends to original works of authorship in architectural fields
C) both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D) the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck