Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems

ملء الشاشة (f)
exit full mode
سؤال
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Private information on the Web-what is posted by a person-is subject to censorship.
سؤال
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
سؤال
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
سؤال
According to the Children's Online Privacy Protection Act (COPPA),any information collected from children must have parental consent.
سؤال
To minimize the invasion of privacy,users should be barred from reviewing their records.
سؤال
With employee-monitoring systems,managers can supervise employees' work speeds.
سؤال
A patent protects product names and identifying marks.
سؤال
Copyright laws cover online materials that can be printed or saved on a storage device.
سؤال
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

A)phishing
B)nonrepudiation
C)spoofing
D)accountability
سؤال
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
سؤال
To minimize the invasion of privacy,organizations should:

A)not delete data even when it is not needed.
B)not modify data once it is entered into an information system.
C)collect only the data that is necessary for the stated purpose.
D)provide unlimited access to personal information to those who have authorization.
سؤال
As a knowledge worker,while making a work-related decision,it is unnecessary to check if the decision complies with the organization's values.
سؤال
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.

A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
سؤال
To minimize the invasion of privacy,_____.

A)organizations should not delete data even when it is not needed
B)users should be able to review their records and correct any inaccuracies
C)organizations should not modify data once it is entered into an information system
D)users should provide unlimited access to personal information to those who have authorization
سؤال
In the context of Web and network privacy,an acceptable use policy is a:

A)legal document that protects an organization from embezzlement of money by its service providers.
B)set of rules to govern the electronic fund transfers between an organization and its clients.
C)legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D)set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
سؤال
Because sending spam is expensive,a small response-a fraction of a percent,for example-is an inadequate return on the investment.
سؤال
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
سؤال
Information technologies have led to job deskilling.
سؤال
Green computing helps an organization save on energy costs.
سؤال
Clement applies for a home loan at Global Bank Inc.As part of the process,he provides his personal details to the banker who is responsible for sanctioning loans.The banker uses Clement's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.

A)unethical and illegal
B)ethical,but illegal
C)legal and ethical
D)legal,but unethical
سؤال
E-commune,an e-commerce company,uses small text files with unique ID tags to collect users' data.These text files are embedded in a Web browser and saved on the user's hard drive.They make it possible for E-commune to customize its Web page for its customers.Given this information,it can be concluded that E-commune uses _____ to collect data.

A)applets
B)cookies
C)kernels
D)log files
سؤال
To minimize the invasion of privacy,users and organizations should:

A)provide wrong data to unauthorized users.
B)use verification procedures to ensure data accuracy.
C)keep collected information even after the stated purpose is over.
D)provide access to one's personal information to all interested parties.
سؤال
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua.In this scenario,Jared's actions are considered _____.

A)ethical,but illegal
B)unethical,but legal
C)illegal and unethical
D)legal and ethical
سؤال
In the context of ethical issues of information technologies,restricting access to the Web is a type of _____.

A)cybersquatting
B)censorship
C)copyright
D)spamming
سؤال
Which is a commonly used technology for data collection?

A)Applets
B)Kernels
C)Cookies
D)Firewalls
سؤال
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form.John,the banker in charge,used Albert's information to sell him a credit card issued by Horizon Bank.In this scenario,John's action is considered _____.

A)illegal and unethical
B)illegal but ethical
C)legal but unethical
D)legal and ethical
سؤال
_____,which are generated by Web server software,record a user's actions on a Web site.

A)Viruses
B)Junk e-mails
C)Worms
D)Log files
سؤال
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.

A)ethical,but illegal
B)legal,but unethical
C)illegal and unethical
D)legal and ethical
سؤال
In order to overcome concerns about hackers getting access to the accounts of online shoppers,electronic payment systems such as _____ are being developed.

A)credit cards
B)e-checks
C)debit cards
D)e-wallets
سؤال
What information can be censored if the content is deemed offensive to a political,religious,or cultural group?

A)Public
B)Private
C)Secretive
D)Abstracted
سؤال
The goal of the Health Insurance Portability and Accountability Act (HIPAA)includes:

A)safeguarding health insurers' credit information.
B)protecting medical providers' notes and records.
C)protecting patients' bank information.
D)safeguarding conversations between patients and their families.
سؤال
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
سؤال
In the context of information privacy,which of the following is true of spam?

A)It is solicited e-mail sent for business purposes.
B)It can only be send to a small number of people.
C)It is sent in bulk using automated mailing software.
D)It can only be used to provide access to legitimate e-mails.
سؤال
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

A)Safeguarding patients' billing information
B)Protecting patients' computer records
C)Protecting patients' credit information
D)Safeguarding conversations between patients and their families
سؤال
In the context of information privacy,junk e-mail is also known as _____.

A)cookie
B)bookmark
C)spam
D)draft
سؤال
In the context of information privacy,which is true of cookies?

A)They record users' actions on a Web site.
B)They get saved on a computers' primary memory.
C)They provide information about users' location.
D)They make it impossible for Web sites to customize pages for users.
سؤال
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's action is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
سؤال
Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

A)Internet censorship
B)Net neutrality
C)Internet security
D)Free Basics
سؤال
According to the principle of Internet neutrality,Internet service providers (ISPs)and government agencies should _____.

A)cease charging different rates on data
B)treat data based on the types of application
C)start blocking data traffic to specific users
D)discriminate data based on content
سؤال
In the context of intellectual property,_____ are categorized as industrial property.

A)copyrights
B)music albums
C)novels
D)logos
سؤال
In the context of intellectual property,which is categorized as copyrighted material?

A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
سؤال
Which can help offset the digital divide?

A)Increasing the speed of the Internet for the information rich
B)Increasing the number of computers in public places
C)Reducing the number of computer equipment at schools
D)Reducing the Internet bandwidth for the information poor
سؤال
Identify a true statement about copyright laws.

A)They protect new processes.
B)They protect product names.
C)They protect tangible material,such as books.
D)They protect product identifying marks,such as logos.
سؤال
In the context of intellectual property,which of the following is categorized as industrial property?

A)Copyrights
B)Artistic works
C)Literary works
D)Trademarks
سؤال
Which protects contents of an HTML code?

A)Copyright laws
B)Patent laws
C)Laws governing trademarks
D)Industrial property laws
سؤال
Identify a true statement about information technology.

A)It has increased clerical jobs.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has eliminated more jobs than it has created.
سؤال
Identify a program used by parents to prevent their children's access to certain Web sites.

A)Hideman
B)Betternet
C)CYBERSitter
D)ZenMate
سؤال
In general,_____ last the author's lifetime plus 70 years and do not need to be renewed.

A)copyrights
B)patents
C)aero designs
D)industrial designs
سؤال
When a user accidentally enters an incorrect Web site address,he or she may be directed to an alternative Web site.This is an example of _____.

A)cyberstalking
B)typosquatting
C)phishing
D)spamming
سؤال
A potential benefit of telecommuting is that it _____.

A)regulates work routine
B)reduces employee turnover
C)separates work and home life
D)increases interaction with coworkers
سؤال
Organizations can benefit from patents as they can use patents:

A)for an unlimited period of time.
B)for contents derived from other processes.
C)to upgrade a pre-existing patented process.
D)to keep competitors from entering certain market segments.
سؤال
In the context of intellectual property,_____ is registering,selling,or using a domain name to profit from someone else's trademark.

A)sniffing
B)phishing
C)cybersquatting
D)spamming
سؤال
In the 1997 Reno v.ACLU case,the U.S.Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA)because they violated the:

A)freedom of speech provisions of the First Amendment.
B)self-defense provisions of the Second Amendment.
C)Fourth Amendment to the United States Constitution.
D)Fifth Amendment to the United States Constitution.
سؤال
Which is a potential drawback of telecommuting?

A)Increased interruptions from coworkers
B)Lack of necessary supplies or equipment
C)Increased employee turnover and absenteeism
D)Difficult work environment for employees with disabilities
سؤال
Information technology and the Internet have,in essence,resulted in two groups-the information rich and the information poor.This gap between the two groups is called _____.

A)information barrier
B)domain squat
C)data junction
D)digital divide
سؤال
Which is a potential benefit of telecommuting?

A)It increases productivity.
B)It regulates work routine.
C)It separates work and home life.
D)It increases the interaction with coworkers.
سؤال
_____ permits you to use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.

A)Uniform Civil Code
B)The Fair Use Doctrine
C)The Copyright Act of 1790
D)IT code of conduct
سؤال
_____ laws give only the creator exclusive privileges,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.

A)Trademark
B)Invention
C)Patent
D)Copyright
سؤال
According to the 1980 revisions to the Copyright Act of 1976,_____.

A)copyright holders can perform a copyrighted work by means of digital audio transmission
B)copyright protection extends to original works of authorship in architectural fields
C)both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D)the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
سؤال
In the context of information technology in workplaces,which allows adding new tasks to employees' responsibilities?

A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job rotation
سؤال
The cost of hiring additional employees in virtual organizations is reduced because:

A)there is less emphasis on hiring new talent.
B)skills are shared among the participating companies.
C)companies hire candidates with minimum experience.
D)training costs are reduced because of the absence of training programs.
سؤال
With virtual organizations,_____.

A)each participating company can focus on its subpar products as well
B)products can be customized more to respond to customers' needs
C)the cost of hiring new employees increases
D)the time needed to develop new products increases
سؤال
_____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

A)Applets
B)Kernels
C)Cookies
D)Firewalls
سؤال
Identify a true statement about information and communications technology (ICT).

A)It generates approximately six percent of the world's greenhouse gases.
B)It generates approximately two percent of the world's carbon dioxide emissions.
C)It helps organizations save energy costs.
D)It improves the quality of the environment in which you work.
سؤال
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.

A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
سؤال
In the context of information technology in workplaces,clerical workers using computers for word-processing tasks is an example of _____.

A)job restraining
B)job upgrading
C)job deskilling
D)job sharing
سؤال
Job deskilling occurs when:

A)experienced labor is eliminated by high technology.
B)a worker is promoted from a semiskilled to a skilled position.
C)a job is carried out manually.
D)fragmented jobs are combined as a whole.
سؤال
_____ make it possible for Web sites to customize pages for users,such as an e-commerce Web site recommending items based on your past purchases.

A)Cookies
B)Trojans
C)Applets
D)Kernels
سؤال
In the context of intellectual property,inventions are categorized as _____ properties.

A)literary
B)copyrighted
C)industrial
D)artistic
سؤال
In the context of Web and network privacy issues,new employees in an organization have to sign a(n)_____before they access the network.

A)article ownership policy
B)standard data policy
C)acceptable use policy
D)user content policy
سؤال
A common way to index and link databases is by using _____.

A)key customer numbers
B)Virtual Account numbers
C)Social Security numbers
D)protected electronic numbers
سؤال
_____ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.

A)An identity log file
B)A virtual organization
C)Intellectual property
D)Information policy
سؤال
Using _____ is a way to solve health issues related to computer equipment.

A)correct lighting
B)wired keyboards
C)a high capacity RAM
D)a high speed Internet
سؤال
Green computing can be achieved by:

A)using computing devices that are nonbiodegradable.
B)replacing meetings over computer networks with actual face-to-face meetings.
C)replacing one large server with several underutilized smaller servers.
D)using video conferencing,electronic meeting systems,and groupware.
سؤال
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n)_____.

A)acceptable use policy
B)standard data policy
C)article ownership policy
D)user content policy
سؤال
A _____ is an intellectual property that protects product names and identifying marks.

A)registration
B)copyright
C)trademark
D)patent
سؤال
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _____.

A)a virus
B)abug
C)spam
D)a cookie
سؤال
Which is true of virtual organizations?

A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent suppliers share skills and have access to each other's markets via information technologies.
D)They need an organizational hierarchy for participants to contribute their expertise.
سؤال
A _____ is an intellectual property that protects new processes.

A)registration
B)copyright
C)trademark
D)patent
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/105
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems
1
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
False
2
Private information on the Web-what is posted by a person-is subject to censorship.
False
3
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
False
4
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
5
According to the Children's Online Privacy Protection Act (COPPA),any information collected from children must have parental consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
6
To minimize the invasion of privacy,users should be barred from reviewing their records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
7
With employee-monitoring systems,managers can supervise employees' work speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
8
A patent protects product names and identifying marks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
9
Copyright laws cover online materials that can be printed or saved on a storage device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
10
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

A)phishing
B)nonrepudiation
C)spoofing
D)accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
11
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
12
To minimize the invasion of privacy,organizations should:

A)not delete data even when it is not needed.
B)not modify data once it is entered into an information system.
C)collect only the data that is necessary for the stated purpose.
D)provide unlimited access to personal information to those who have authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
13
As a knowledge worker,while making a work-related decision,it is unnecessary to check if the decision complies with the organization's values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
14
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.

A)phishing
B)nonrepudiation
C)cybersquatting
D)encapsulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
15
To minimize the invasion of privacy,_____.

A)organizations should not delete data even when it is not needed
B)users should be able to review their records and correct any inaccuracies
C)organizations should not modify data once it is entered into an information system
D)users should provide unlimited access to personal information to those who have authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
16
In the context of Web and network privacy,an acceptable use policy is a:

A)legal document that protects an organization from embezzlement of money by its service providers.
B)set of rules to govern the electronic fund transfers between an organization and its clients.
C)legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D)set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
17
Because sending spam is expensive,a small response-a fraction of a percent,for example-is an inadequate return on the investment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
18
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
19
Information technologies have led to job deskilling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
20
Green computing helps an organization save on energy costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
21
Clement applies for a home loan at Global Bank Inc.As part of the process,he provides his personal details to the banker who is responsible for sanctioning loans.The banker uses Clement's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.

A)unethical and illegal
B)ethical,but illegal
C)legal and ethical
D)legal,but unethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
22
E-commune,an e-commerce company,uses small text files with unique ID tags to collect users' data.These text files are embedded in a Web browser and saved on the user's hard drive.They make it possible for E-commune to customize its Web page for its customers.Given this information,it can be concluded that E-commune uses _____ to collect data.

A)applets
B)cookies
C)kernels
D)log files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
23
To minimize the invasion of privacy,users and organizations should:

A)provide wrong data to unauthorized users.
B)use verification procedures to ensure data accuracy.
C)keep collected information even after the stated purpose is over.
D)provide access to one's personal information to all interested parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
24
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua.In this scenario,Jared's actions are considered _____.

A)ethical,but illegal
B)unethical,but legal
C)illegal and unethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
25
In the context of ethical issues of information technologies,restricting access to the Web is a type of _____.

A)cybersquatting
B)censorship
C)copyright
D)spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which is a commonly used technology for data collection?

A)Applets
B)Kernels
C)Cookies
D)Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
27
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form.John,the banker in charge,used Albert's information to sell him a credit card issued by Horizon Bank.In this scenario,John's action is considered _____.

A)illegal and unethical
B)illegal but ethical
C)legal but unethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
28
_____,which are generated by Web server software,record a user's actions on a Web site.

A)Viruses
B)Junk e-mails
C)Worms
D)Log files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
29
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.

A)ethical,but illegal
B)legal,but unethical
C)illegal and unethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
30
In order to overcome concerns about hackers getting access to the accounts of online shoppers,electronic payment systems such as _____ are being developed.

A)credit cards
B)e-checks
C)debit cards
D)e-wallets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
31
What information can be censored if the content is deemed offensive to a political,religious,or cultural group?

A)Public
B)Private
C)Secretive
D)Abstracted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
32
The goal of the Health Insurance Portability and Accountability Act (HIPAA)includes:

A)safeguarding health insurers' credit information.
B)protecting medical providers' notes and records.
C)protecting patients' bank information.
D)safeguarding conversations between patients and their families.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
33
Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
34
In the context of information privacy,which of the following is true of spam?

A)It is solicited e-mail sent for business purposes.
B)It can only be send to a small number of people.
C)It is sent in bulk using automated mailing software.
D)It can only be used to provide access to legitimate e-mails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

A)Safeguarding patients' billing information
B)Protecting patients' computer records
C)Protecting patients' credit information
D)Safeguarding conversations between patients and their families
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
36
In the context of information privacy,junk e-mail is also known as _____.

A)cookie
B)bookmark
C)spam
D)draft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
37
In the context of information privacy,which is true of cookies?

A)They record users' actions on a Web site.
B)They get saved on a computers' primary memory.
C)They provide information about users' location.
D)They make it impossible for Web sites to customize pages for users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
38
Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's action is considered _____.

A)illegal and unethical
B)legal,but unethical
C)illegal,but ethical
D)legal and ethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

A)Internet censorship
B)Net neutrality
C)Internet security
D)Free Basics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
40
According to the principle of Internet neutrality,Internet service providers (ISPs)and government agencies should _____.

A)cease charging different rates on data
B)treat data based on the types of application
C)start blocking data traffic to specific users
D)discriminate data based on content
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
41
In the context of intellectual property,_____ are categorized as industrial property.

A)copyrights
B)music albums
C)novels
D)logos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
42
In the context of intellectual property,which is categorized as copyrighted material?

A)Trademarks
B)Industrial designs
C)Artistic works
D)Inventions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which can help offset the digital divide?

A)Increasing the speed of the Internet for the information rich
B)Increasing the number of computers in public places
C)Reducing the number of computer equipment at schools
D)Reducing the Internet bandwidth for the information poor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
44
Identify a true statement about copyright laws.

A)They protect new processes.
B)They protect product names.
C)They protect tangible material,such as books.
D)They protect product identifying marks,such as logos.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
45
In the context of intellectual property,which of the following is categorized as industrial property?

A)Copyrights
B)Artistic works
C)Literary works
D)Trademarks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which protects contents of an HTML code?

A)Copyright laws
B)Patent laws
C)Laws governing trademarks
D)Industrial property laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
47
Identify a true statement about information technology.

A)It has increased clerical jobs.
B)It has cut down production costs.
C)It has reduced consumers' purchasing power.
D)It has eliminated more jobs than it has created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
48
Identify a program used by parents to prevent their children's access to certain Web sites.

A)Hideman
B)Betternet
C)CYBERSitter
D)ZenMate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
49
In general,_____ last the author's lifetime plus 70 years and do not need to be renewed.

A)copyrights
B)patents
C)aero designs
D)industrial designs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
50
When a user accidentally enters an incorrect Web site address,he or she may be directed to an alternative Web site.This is an example of _____.

A)cyberstalking
B)typosquatting
C)phishing
D)spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
51
A potential benefit of telecommuting is that it _____.

A)regulates work routine
B)reduces employee turnover
C)separates work and home life
D)increases interaction with coworkers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
52
Organizations can benefit from patents as they can use patents:

A)for an unlimited period of time.
B)for contents derived from other processes.
C)to upgrade a pre-existing patented process.
D)to keep competitors from entering certain market segments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the context of intellectual property,_____ is registering,selling,or using a domain name to profit from someone else's trademark.

A)sniffing
B)phishing
C)cybersquatting
D)spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
54
In the 1997 Reno v.ACLU case,the U.S.Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA)because they violated the:

A)freedom of speech provisions of the First Amendment.
B)self-defense provisions of the Second Amendment.
C)Fourth Amendment to the United States Constitution.
D)Fifth Amendment to the United States Constitution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which is a potential drawback of telecommuting?

A)Increased interruptions from coworkers
B)Lack of necessary supplies or equipment
C)Increased employee turnover and absenteeism
D)Difficult work environment for employees with disabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
56
Information technology and the Internet have,in essence,resulted in two groups-the information rich and the information poor.This gap between the two groups is called _____.

A)information barrier
B)domain squat
C)data junction
D)digital divide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which is a potential benefit of telecommuting?

A)It increases productivity.
B)It regulates work routine.
C)It separates work and home life.
D)It increases the interaction with coworkers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
58
_____ permits you to use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.

A)Uniform Civil Code
B)The Fair Use Doctrine
C)The Copyright Act of 1790
D)IT code of conduct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
59
_____ laws give only the creator exclusive privileges,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.

A)Trademark
B)Invention
C)Patent
D)Copyright
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
60
According to the 1980 revisions to the Copyright Act of 1976,_____.

A)copyright holders can perform a copyrighted work by means of digital audio transmission
B)copyright protection extends to original works of authorship in architectural fields
C)both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
D)the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
61
In the context of information technology in workplaces,which allows adding new tasks to employees' responsibilities?

A)Job virtualization
B)Job upgrading
C)Job deskilling
D)Job rotation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
62
The cost of hiring additional employees in virtual organizations is reduced because:

A)there is less emphasis on hiring new talent.
B)skills are shared among the participating companies.
C)companies hire candidates with minimum experience.
D)training costs are reduced because of the absence of training programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
63
With virtual organizations,_____.

A)each participating company can focus on its subpar products as well
B)products can be customized more to respond to customers' needs
C)the cost of hiring new employees increases
D)the time needed to develop new products increases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
64
_____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

A)Applets
B)Kernels
C)Cookies
D)Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
65
Identify a true statement about information and communications technology (ICT).

A)It generates approximately six percent of the world's greenhouse gases.
B)It generates approximately two percent of the world's carbon dioxide emissions.
C)It helps organizations save energy costs.
D)It improves the quality of the environment in which you work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
66
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.

A)Cloud computing
B)Mobile computing
C)Green computing
D)Natural computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
67
In the context of information technology in workplaces,clerical workers using computers for word-processing tasks is an example of _____.

A)job restraining
B)job upgrading
C)job deskilling
D)job sharing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
68
Job deskilling occurs when:

A)experienced labor is eliminated by high technology.
B)a worker is promoted from a semiskilled to a skilled position.
C)a job is carried out manually.
D)fragmented jobs are combined as a whole.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
69
_____ make it possible for Web sites to customize pages for users,such as an e-commerce Web site recommending items based on your past purchases.

A)Cookies
B)Trojans
C)Applets
D)Kernels
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
70
In the context of intellectual property,inventions are categorized as _____ properties.

A)literary
B)copyrighted
C)industrial
D)artistic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
71
In the context of Web and network privacy issues,new employees in an organization have to sign a(n)_____before they access the network.

A)article ownership policy
B)standard data policy
C)acceptable use policy
D)user content policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
72
A common way to index and link databases is by using _____.

A)key customer numbers
B)Virtual Account numbers
C)Social Security numbers
D)protected electronic numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
73
_____ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.

A)An identity log file
B)A virtual organization
C)Intellectual property
D)Information policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
74
Using _____ is a way to solve health issues related to computer equipment.

A)correct lighting
B)wired keyboards
C)a high capacity RAM
D)a high speed Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
75
Green computing can be achieved by:

A)using computing devices that are nonbiodegradable.
B)replacing meetings over computer networks with actual face-to-face meetings.
C)replacing one large server with several underutilized smaller servers.
D)using video conferencing,electronic meeting systems,and groupware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
76
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n)_____.

A)acceptable use policy
B)standard data policy
C)article ownership policy
D)user content policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
77
A _____ is an intellectual property that protects product names and identifying marks.

A)registration
B)copyright
C)trademark
D)patent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
78
In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _____.

A)a virus
B)abug
C)spam
D)a cookie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which is true of virtual organizations?

A)They need central offices for participants to contribute their expertise.
B)They are networks of dependent companies and manufacturers connected via information technologies.
C)They let independent suppliers share skills and have access to each other's markets via information technologies.
D)They need an organizational hierarchy for participants to contribute their expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
80
A _____ is an intellectual property that protects new processes.

A)registration
B)copyright
C)trademark
D)patent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.