Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
العب
ملء الشاشة (f)
Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
1
To minimize the invasion of privacy,users should be able to review their records and correct any inaccuracies.
True
2
Cybersquatting has created decency concerns,because these e-mails often contain explicit language or nudity and can be opened by children.
False
3
Copyright laws do not cover online materials.
False
4
Junk e-mail is also known as a cookie.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Ergonomics experts believe that using better-designed furniture can solve many of the health problems arising from information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Even a small response for a spam is a worthwhile return on the investment because sending spam e-mails is inexpensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
Green computing helps an organization save on energy costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
To minimize the invasion of privacy,any organization creating,maintaining,using,or disseminating records of personal data must ensure the data's _____.
A)duplicability
B)reliability
C)adaptability
D)instability
A)duplicability
B)reliability
C)adaptability
D)instability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Log files make it possible for Web sites to customize pages for users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
In the context of Web and network privacy,an acceptable use policy is _____.
A)a statement or legal document that discloses some or all the ways a party gathers,uses,discloses,and manages a client's data
B)a set of rules to govern the collection,use,and disclosure of personal information over the net by commercial organizations
C)a statement or legal document that contains an agreement of the issues documented by Health and Social Issues of Online Gaming
D)a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance
A)a statement or legal document that discloses some or all the ways a party gathers,uses,discloses,and manages a client's data
B)a set of rules to govern the collection,use,and disclosure of personal information over the net by commercial organizations
C)a statement or legal document that contains an agreement of the issues documented by Health and Social Issues of Online Gaming
D)a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
Information in databases can be cross-matched to create profiles of people and predict their behavior,based on their transactions with educational,financial,and government institutions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
Private information on the Web-what is posted by a person-is not subject to censorship because of the person's constitutional freedom of expression.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Information technologies have led to job deskilling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
A patent protects product names and identifying marks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
Log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
To minimize the invasion of privacy,organizations should keep collected information only as long as it is _____.
A)reproduced
B)needed for the stated purpose
C)manipulated
D)abstract and incoherent
A)reproduced
B)needed for the stated purpose
C)manipulated
D)abstract and incoherent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.
A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
A)Phishing
B)nonrepudiation
C)spoofing
D)accountability
A)Phishing
B)nonrepudiation
C)spoofing
D)accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
Clement applies for a home loan at Global Bank Inc.As part of the process,he provides his personal details to the bank.The banker uses Clement's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.
A)illegal and unethical
B)ethical but illegal
C)legal but unethical
D)legal and ethical
A)illegal and unethical
B)ethical but illegal
C)legal but unethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's actions are considered _____.
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
In the context of intellectual property,which of the following is categorized as industrial property?
A)Copyrights
B)Artistic works
C)Literatures
D)Trademarks
A)Copyrights
B)Artistic works
C)Literatures
D)Trademarks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
Identify a program used by parents to prevent their children's access to certain Web sites.
A)Hideman
B)Betternet
C)CyberSitter
D)ZenMate
A)Hideman
B)Betternet
C)CyberSitter
D)ZenMate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ can rise to an unmanageable level quickly,clogging users' in-boxes and preventing access to legitimate e-mails.
A)Sniffing
B)Cybersquatting
C)Spamming
D)Phishing
A)Sniffing
B)Cybersquatting
C)Spamming
D)Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua.In this scenario,Jared's actions are considered _____.
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
A)ethical but illegal
B)legal but unethical
C)illegal and unethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
In the context of privacy issues,identify a true statement about spam.
A)It is a solicited e-mail sent for business purposes.
B)It is quite expensive to send out such e-mails.
C)It is sent in bulk using automated mailing software.
D)It is used to increase the size of users' in-boxes.
A)It is a solicited e-mail sent for business purposes.
B)It is quite expensive to send out such e-mails.
C)It is sent in bulk using automated mailing software.
D)It is used to increase the size of users' in-boxes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
_____,which are generated by Web server software,record a user's actions on a Web site.
A)Viruses
B)Junk e-mails
C)Worms
D)Log files
A)Viruses
B)Junk e-mails
C)Worms
D)Log files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
To minimize the invasion of privacy,users and organizations should _____.
A)enable access to one's personal information to all interested parties
B)keep collected information even after the stated purpose is over
C)use verification procedures to ensure data accuracy
D)provide wrong data to unauthorized users
A)enable access to one's personal information to all interested parties
B)keep collected information even after the stated purpose is over
C)use verification procedures to ensure data accuracy
D)provide wrong data to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is a commonly used technology for data collection?
A)Applets
B)Kernels
C)Cookies
D)Firewalls
A)Applets
B)Kernels
C)Cookies
D)Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
_____ has created decency concerns,because these e-mails often contain explicit language or nudity.
A)Phishing
B)Cybersquatting
C)Sniffing
D)Spamming
A)Phishing
B)Cybersquatting
C)Sniffing
D)Spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
In the context of ethical issues of information technologies,restricting access to the Web is a type of _____.
A)cybersquatting
B)censorship
C)copyright
D)patent
A)cybersquatting
B)censorship
C)copyright
D)patent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
According to the principle of Internet neutrality,Internet service providers (ISPs)and government agencies should _____.
A)not charge different rates on data
B)treat data based on telecommunication providers
C)block data traffic to a specific users
D)discriminate data based on user content
A)not charge different rates on data
B)treat data based on telecommunication providers
C)block data traffic to a specific users
D)discriminate data based on user content
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
A)illegal and unethical
B)legal but unethical
C)illegal but ethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
Identify a true statement about copyrights.
A)Copyrights are used to protect new processes.
B)Copyrights have to be renewed every 70 years.
C)Copyrights protect product names and logos.
D)Copyrights' length vary based on the type of work.
A)Copyrights are used to protect new processes.
B)Copyrights have to be renewed every 70 years.
C)Copyrights protect product names and logos.
D)Copyrights' length vary based on the type of work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
_____ information can be censored if the content is deemed offensive to a political,religious,or cultural group.
A)Public
B)Private
C)Secretive
D)Abstracted
A)Public
B)Private
C)Secretive
D)Abstracted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
_____ provide information about a user's location and computer equipment,and this information can be used for unauthorized purposes,such as corporate espionage.
A)Cookies
B)Kernels
C)Applets
D)Firewalls
A)Cookies
B)Kernels
C)Applets
D)Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following principles states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?
A)Internet censorship
B)Net neutrality
C)Internet security
D)Cybersquatting
A)Internet censorship
B)Net neutrality
C)Internet security
D)Cybersquatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
In order to overcome concerns about hackers getting access to the accounts of online shoppers,electronic payment systems such as _____ cards are being developed.
A)credit
B)debit
C)smart
D)charge
A)credit
B)debit
C)smart
D)charge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
Identify a true statement about information technology.
A)It has eliminated more types of jobs than it has created.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has increased clerical jobs.
A)It has eliminated more types of jobs than it has created.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has increased clerical jobs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
In the context of intellectual property,which of the following is categorized as copyrighted material?
A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
Information technology and the Internet have,in essence,resulted in two societal groups: the information rich and the information poor.This is called the _____.
A)digital dashboard
B)digital squat
C)digital junction
D)digital divide
A)digital dashboard
B)digital squat
C)digital junction
D)digital divide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
The 1980 revisions to the _____ of 1976 include computer programs,so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
A)Copyright Act
B)Digital Millennium Copyright Act
C)Copyright Term Extension Act
D)Telecommunications Act
A)Copyright Act
B)Digital Millennium Copyright Act
C)Copyright Term Extension Act
D)Telecommunications Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
In the context of information technology in workplaces,which of the following is an advantage of virtual organizations?
A)Each participating company can focus on multiple fields.
B)Products are customized more to respond to customers' needs.
C)The cost at which additional employees are hired increases.
D)An organizational hierarchy exists for participants to contribute their expertise.
A)Each participating company can focus on multiple fields.
B)Products are customized more to respond to customers' needs.
C)The cost at which additional employees are hired increases.
D)An organizational hierarchy exists for participants to contribute their expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following protects tangible material,such as books and drawings?
A)Copyright laws
B)Patents
C)Trademarks
D)Inventions
A)Copyright laws
B)Patents
C)Trademarks
D)Inventions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
The _____ was partially overturned in the 1997 Reno v.ACLU case,in which the U.S.Supreme Court unanimously voted to strike down the act's anti-indecency provisions,finding they violated the freedom of speech provisions of the First Amendment.
A)Telecommunications Act
B)Communications Decency Act
C)Copyright Act
D)Sarbanes-Oxley Act
A)Telecommunications Act
B)Communications Decency Act
C)Copyright Act
D)Sarbanes-Oxley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
A potential benefit of telecommuting is that it _____.
A)regulates work routine
B)reduces employee turnover
C)increases interaction with coworkers
D)separates work and home life
A)regulates work routine
B)reduces employee turnover
C)increases interaction with coworkers
D)separates work and home life
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is a potential drawback of telecommuting?
A)Lack of necessary supplies or equipment
B)Increased interruptions from coworkers
C)Difficult work environment for employees with disabilities
D)Increased employee turnover and absenteeism
A)Lack of necessary supplies or equipment
B)Increased interruptions from coworkers
C)Difficult work environment for employees with disabilities
D)Increased employee turnover and absenteeism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
Identify a true statement about information technology in social divisions.
A)Students with access to a wide array of resources on the Web have more difficulties writing papers.
B)The speed of the Internet connection also plays a role in digital divide discussion.
C)A type of economic red-lining can occur when companies installing coaxial cables for Internet connections focus on lower-income communities.
D)Interactive and virtual reality educational games available on the Web can widen the gap between students who compete with each other.
A)Students with access to a wide array of resources on the Web have more difficulties writing papers.
B)The speed of the Internet connection also plays a role in digital divide discussion.
C)A type of economic red-lining can occur when companies installing coaxial cables for Internet connections focus on lower-income communities.
D)Interactive and virtual reality educational games available on the Web can widen the gap between students who compete with each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
_____ is registering,selling,or using a domain name to profit from someone else's trademark.
A)Sniffing
B)Phishing
C)Cybersquatting
D)Spamming
A)Sniffing
B)Phishing
C)Cybersquatting
D)Spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
When a user accidentally enters an incorrect Web site address,he or she may be directed to an alternative Web site.This is an example of _____.
A)cyberstalking
B)typosquatting
C)phishing
D)clickjacking
A)cyberstalking
B)typosquatting
C)phishing
D)clickjacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
The _____ is an exception to copyright laws that means that a person can use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.
A)Communication Principle
B)Fair Use Doctrine
C)Digital Millennium Rule
D)ACM Code of Ethics
A)Communication Principle
B)Fair Use Doctrine
C)Digital Millennium Rule
D)ACM Code of Ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is a benefit of using patents in organizations?
A)Organizations can use patents for an upgraded version of a pre-existing patented process.
B)Organizations can use patents for contents derived from other processes.
C)Organizations can use patents to keep competitors from entering certain market segments.
D)Organizations do not have a fixed period to patent a concept.
A)Organizations can use patents for an upgraded version of a pre-existing patented process.
B)Organizations can use patents for contents derived from other processes.
C)Organizations can use patents to keep competitors from entering certain market segments.
D)Organizations do not have a fixed period to patent a concept.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
_____ laws give only the creator exclusive privileges,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.
A)Trademark
B)Spam
C)Patent
D)Copyright
A)Trademark
B)Spam
C)Patent
D)Copyright
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
In the context of information technology in workplaces,which of the following allows adding new tasks to employees' responsibilities?
A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job restraining
A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job restraining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
In the context of information technology in workplaces,clerical workers using computers for word-processing tasks is an example of job _____.
A)restraining
B)upgrading
C)reskilling
D)sharing
A)restraining
B)upgrading
C)reskilling
D)sharing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
In the context of information technology in workplaces,when does job deskilling occur?
A)When experienced labor is eliminated by high technology
B)When a job is upgraded from a semiskilled to a skilled position
C)When a job is considered to be operated manually
D)When fragmented jobs are combined as a whole
A)When experienced labor is eliminated by high technology
B)When a job is upgraded from a semiskilled to a skilled position
C)When a job is considered to be operated manually
D)When fragmented jobs are combined as a whole
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is true about virtual organizations?
A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent customers share skills and have access to each other's markets via information technologies.
D)They need organizational hierarchy for participants to contribute their expertise.
A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent customers share skills and have access to each other's markets via information technologies.
D)They need organizational hierarchy for participants to contribute their expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
In general,_____ last the author's lifetime plus 70 years.
A)copyrights
B)patents
C)database rights
D)trade secrets
A)copyrights
B)patents
C)database rights
D)trade secrets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
In the context of intellectual properties,inventions are categorized as _________ properties.
A)literary
B)copyrighted
C)industrial
D)artistic
A)literary
B)copyrighted
C)industrial
D)artistic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
_________ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
A)URL opening
B)URL hijacking
C)URL parsing
D)URL decoding
A)URL opening
B)URL hijacking
C)URL parsing
D)URL decoding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
_________ are small text files with a unique ID tag that are embedded in a Web browser and saved on the user's hard drive.
A)Applets
B)Kernels
C)Cookies
D)Firewalls
A)Applets
B)Kernels
C)Cookies
D)Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
Identify a true statement about information and communications technologies (ICTs)in green computing.
A)They generate approximately 12 percent of the world's carbon dioxide emissions.
B)They generate approximately 2% of the world's carbon dioxide.
C)They help organizations to save energy costs.
D)They improve the quality of the environment in which you live and work.
A)They generate approximately 12 percent of the world's carbon dioxide emissions.
B)They generate approximately 2% of the world's carbon dioxide.
C)They help organizations to save energy costs.
D)They improve the quality of the environment in which you live and work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following statements is true of virtual organizations?
A)The time needed to develop new products increases.
B)The cost of hiring additional employees increases.
C)An organizational hierarchy exists for participants to contribute their expertise.
D)Companies respond to customers faster and more efficiently.
A)The time needed to develop new products increases.
B)The cost of hiring additional employees increases.
C)An organizational hierarchy exists for participants to contribute their expertise.
D)Companies respond to customers faster and more efficiently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
Whenever a user accesses the same domain,the browser sends saved information to the _________.
A)client server
B)Web server
C)proxy server
D)file server
A)client server
B)Web server
C)proxy server
D)file server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
_________ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.
A)Identity log
B)Virtual organization
C)Intellectual property
D)Information policy
A)Identity log
B)Virtual organization
C)Intellectual property
D)Information policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n)_________,which is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
_________,also known as virtual work,has enabled some people to perform their jobs from home.
A)Telecommuting
B)Urbanizing
C)Outsourcing
D)Nearshoring
A)Telecommuting
B)Urbanizing
C)Outsourcing
D)Nearshoring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
A _________ is an intellectual property that protects product names and identifying marks.
A)registration
B)copyright
C)trademark
D)patent
A)registration
B)copyright
C)trademark
D)patent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.
A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
In the context of privacy issues,in an organization,a new employees have to sign a(n)_________ before they access the network.
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
A)acceptable use policy?B.standard data policy?C.article ownership policy?D.user content policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
_________ is computing that promotes a sustainable environment and consumes the least amount of energy.
A)Digital computing
B)Soft computing
C)Green computing
D)Cyber computing
A)Digital computing
B)Soft computing
C)Green computing
D)Cyber computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
A _________ is an intellectual property that protects new processes.
A)registration
B)copyright
C)trademark
D)patent
A)registration
B)copyright
C)trademark
D)patent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
In the context of virtual organizations,the cost of hiring additional employees is reduced because _____.
A)companies hire candidates who have just completed their graduation
B)training is given to existing employees who,in turn,train the newly hired
C)skills are shared among participating companies of a virtual organization
D)employees are given incentives that are received by suppliers
A)companies hire candidates who have just completed their graduation
B)training is given to existing employees who,in turn,train the newly hired
C)skills are shared among participating companies of a virtual organization
D)employees are given incentives that are received by suppliers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _________.
A)virus
B)bug
C)spam
D)worm
A)virus
B)bug
C)spam
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
A common way to index and link databases is by using _________.?A.key customer numbers?B.Virtual Account numbers?C.Social Security numbers?D.protected electronic numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
In which of the following ways can green computing be achieved?
A)By using computing devices that are nonbiodegradable
B)By replacing meetings over computer networks with actual face-to-face meetings
C)By replacing one large server with several underutilized smaller servers
D)By using video conferencing,electronic meeting systems,and groupware
A)By using computing devices that are nonbiodegradable
B)By replacing meetings over computer networks with actual face-to-face meetings
C)By replacing one large server with several underutilized smaller servers
D)By using video conferencing,electronic meeting systems,and groupware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
_________ organizations are networks of independent companies,suppliers,customers,and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
A)Legal
B)Ethical
C)Dynamic
D)Virtual
A)Legal
B)Ethical
C)Dynamic
D)Virtual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
Identify a way to solve health issues related to computer equipment.
A)Use correct lighting.
B)Use wired keyboards.
C)Use a high capacity RAM.
D)Use a high speed Internet.
A)Use correct lighting.
B)Use wired keyboards.
C)Use a high capacity RAM.
D)Use a high speed Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck

