Deck 13: Managing Technology and Innovation

ملء الشاشة (f)
exit full mode
سؤال
The Children's Online Privacy Protection Act of 1998 requires:

A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Radio Frequency Identification (RFID) was featured in a TV commercial where "the packages knew the truck was lost" before the driver did.
سؤال
By the end of 2008, the number of attacks on information security reached:

A) 200,000.
B) 2 million.
C) 20 million.
D) 200 million.
سؤال
Many experts have raised ethical questions about the ways RFID technology enables businesses, governments, and criminals to gather information about presale, sales, and post-sale activities.
سؤال
In a 2008 survey from Columbia University, what percentage of American adults said they were uncomfortable when Web sites used personal information to tailor advertisements?

A) 20 percent.
B) 59 percent.
C) 70 percent
D) 89 percent.
سؤال
GetNetWise and the Child Online Protection Act of 1998 protect children in the United States against adult-oriented Web sites.
سؤال
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
سؤال
Many businesses have developed a privacy policy, which explains what use of the company's technology is permissible.
سؤال
Recent technological advances have decreased the number of way that privacy violations may occur.
سؤال
Children are the least vulnerable to invasions of privacy.
سؤال
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
سؤال
The human genome is the application of engineering to create materials on a molecular or atomic scale.
سؤال
Advocacy groups such as the Electronic Privacy Information Center criticized the P3P concept as too difficult for users to understand or use properly.
سؤال
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
سؤال
In 2002, this allowed Web sites to tell the user's Web browser about the site's data privacy policies:

A) Platform for Privacy Preference Project.
B) Electronic Privacy Information Center.
C) Defense to Protect Information.
D) Consumer Information Act.
سؤال
In response to employees' challenges that business practices were invasions of their privacy, many businesses:

A) Developed a privacy policy.
B) Banned sexual harassment.
C) Installed an 800-number.
D) Fired the disgruntled workers.
سؤال
Most Americans mistakenly believe that if a Web site has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
سؤال
Honeypots are systems used by security professionals to prevent hackers from entering a computer network.
سؤال
Software piracy is a spreading and global problem.
سؤال
Due to efforts by companies to help consumers feel more secure about their personal information, consumer mistrust has diminished.
سؤال
Honeypots are:

A) A series of Disney-created Web sites for children.
B) Adult Web sites offering fee-for-service information.
C) Government programs that profile computer hackers.
D) Systems used to lure hackers into a fabricated Web site.
سؤال
The Child Online Protection Act, passed in 1998,

A) Specifically applies to children under 13 years of age.
B) Has settled the debate over protecting children from adult-oriented Web sites.
C) Has been a model for many European countries' legislation.
D) Was vetoed by President Bush as too difficult and too costly to enforce.
سؤال
One of the most common protocols for sharing large files and enabling movies to be downloaded safely is:

A) GigaByte Violations.
B) PropertyAlliance, Inc.
C) BitTorrent.
D) Business Software Alliance.
سؤال
Spraying random packets of data in huge streams over the Internet are:

A) Botnets.
B) Worms.
C) Zombies.
D) Hackers.
سؤال
Loss of annual sales due to software piracy by software companies was estimated to be:

A) $120 million.
B) $25 billion.
C) $53 billion.
D) Impossible to calculate.
سؤال
In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

A) Harvard.
B) Dartmouth.
C) Princeton.
D) None of the above.
سؤال
The corporate nemesis responsible for creating and spreading computer attacks is called a:

A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
سؤال
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
سؤال
A CIO is the company's:

A) Chief intelligence overseer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
سؤال
Intellectual property refers to:

A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
سؤال
The Federal Trade Commission advocates which of the following for business security?

A) Take stock.
B) Scale down.
C) Pitch it.
D) All of the above.
سؤال
At Cisco Systems, the CIO:

A) Was credited with slashing $1.5 billion in costs by using Internet technologies.
B) Was responsible for moving $5 billion in goods and services through the Internet.
C) Discovered that online trading cost only 20 percent as much as conventional trading.
D) Was fired for failing to stop computer hackers from breaking into their systems.
سؤال
Two of the largest strongholds for software piracy are:

A) India and China.
B) Japan and India.
C) China and South Africa.
D) South Africa and India.
سؤال
Which of the following is not commercial software to block pornography on the Internet?

A) Child Safe.
B) beTrusted.
C) Cyber Snoop.
D) Cyber Sitter.
سؤال
The practice of downloading copyrighted songs was challenged because it:

A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
سؤال
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
سؤال
In a 2007 survey of more than 800 North American privacy and security professionals, what percentage acknowledged having at least one reportable data breach of personally identifiable information with their organizations during the past 12 months?

A) 25 percent.
B) 40 percent.
C) 85 percent.
D) 99 percent.
سؤال
GetNetWise, launched by several major Internet companies, provided:

A) Online safety guides for parents.
B) Special browsers and other tools for families.
C) Web sites appropriate for children.
D) All of the above.
سؤال
Primarily, the CIO is expected to:

A) Increase costs through efficiency and productivity.
B) Reduce the company's competitive advantage.
C) Enable or drive business innovation.
D) Know how the rank-and-file are performing.
سؤال
According to Bill Joy, Sun Microsystems' chief scientist, the 21st century technologies:

A) Are the safest and most human friendly known to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
سؤال
What have businesses done to address the number, severity, and ease of hacker attacks on firms?
سؤال
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
سؤال
How is the corporate Chief Information Officer a "coach" for the organization?
سؤال
The identification of human genes is critical to:

A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
سؤال
Project BioShield was:

A) A $5.6 million global antiterrorism program.
B) A two-year government program to develop vaccines to combat bioterrorism.
C) Announced by President Bush in 2003 to spur pharmaceutical companies to combat bioterrorism.
D) All of the above.
سؤال
Who should be entrusted with guarding against minors accessing adult-oriented Web sites?
سؤال
It is critical for businesses to maintain information in a secure location and guard this valuable resource. How secure is information in a free-access information society. Are digital certificates or other detection systems sufficient to protect information from hackers?
سؤال
In 2005, the United Nations approved a declaration that:

A) Prohibited all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
سؤال
Who is to say that genetically modified foods are safe for human consumption?
سؤال
Is information on the Internet truly free, or should copyrighted music or software be protected?
سؤال
The global tone toward genetically modified food was one of:

A) Caution but progress was evitable.
B) Pursuing the lucrative economic opportunities.
C) Seek government approval of all products.
D) Extreme caution.
سؤال
The safety of genetically modified foods:

A) Was challenged most noticeable in Europe but has spread to other countries.
B) Has been well documented since its beginning.
C) Is now in the hands of governments, ensuring its safety for human consumption.
D) Has never been questioned in the United States.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/52
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Managing Technology and Innovation
1
The Children's Online Privacy Protection Act of 1998 requires:

A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
D
2
Radio Frequency Identification (RFID) was featured in a TV commercial where "the packages knew the truck was lost" before the driver did.
True
3
By the end of 2008, the number of attacks on information security reached:

A) 200,000.
B) 2 million.
C) 20 million.
D) 200 million.
C
4
Many experts have raised ethical questions about the ways RFID technology enables businesses, governments, and criminals to gather information about presale, sales, and post-sale activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
5
In a 2008 survey from Columbia University, what percentage of American adults said they were uncomfortable when Web sites used personal information to tailor advertisements?

A) 20 percent.
B) 59 percent.
C) 70 percent
D) 89 percent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
6
GetNetWise and the Child Online Protection Act of 1998 protect children in the United States against adult-oriented Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
7
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
8
Many businesses have developed a privacy policy, which explains what use of the company's technology is permissible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
9
Recent technological advances have decreased the number of way that privacy violations may occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
10
Children are the least vulnerable to invasions of privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
11
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
12
The human genome is the application of engineering to create materials on a molecular or atomic scale.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
13
Advocacy groups such as the Electronic Privacy Information Center criticized the P3P concept as too difficult for users to understand or use properly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
14
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
15
In 2002, this allowed Web sites to tell the user's Web browser about the site's data privacy policies:

A) Platform for Privacy Preference Project.
B) Electronic Privacy Information Center.
C) Defense to Protect Information.
D) Consumer Information Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
16
In response to employees' challenges that business practices were invasions of their privacy, many businesses:

A) Developed a privacy policy.
B) Banned sexual harassment.
C) Installed an 800-number.
D) Fired the disgruntled workers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
17
Most Americans mistakenly believe that if a Web site has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
18
Honeypots are systems used by security professionals to prevent hackers from entering a computer network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
19
Software piracy is a spreading and global problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
20
Due to efforts by companies to help consumers feel more secure about their personal information, consumer mistrust has diminished.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
21
Honeypots are:

A) A series of Disney-created Web sites for children.
B) Adult Web sites offering fee-for-service information.
C) Government programs that profile computer hackers.
D) Systems used to lure hackers into a fabricated Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
22
The Child Online Protection Act, passed in 1998,

A) Specifically applies to children under 13 years of age.
B) Has settled the debate over protecting children from adult-oriented Web sites.
C) Has been a model for many European countries' legislation.
D) Was vetoed by President Bush as too difficult and too costly to enforce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
23
One of the most common protocols for sharing large files and enabling movies to be downloaded safely is:

A) GigaByte Violations.
B) PropertyAlliance, Inc.
C) BitTorrent.
D) Business Software Alliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
24
Spraying random packets of data in huge streams over the Internet are:

A) Botnets.
B) Worms.
C) Zombies.
D) Hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
25
Loss of annual sales due to software piracy by software companies was estimated to be:

A) $120 million.
B) $25 billion.
C) $53 billion.
D) Impossible to calculate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
26
In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

A) Harvard.
B) Dartmouth.
C) Princeton.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
27
The corporate nemesis responsible for creating and spreading computer attacks is called a:

A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
28
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
29
A CIO is the company's:

A) Chief intelligence overseer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
30
Intellectual property refers to:

A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
31
The Federal Trade Commission advocates which of the following for business security?

A) Take stock.
B) Scale down.
C) Pitch it.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
32
At Cisco Systems, the CIO:

A) Was credited with slashing $1.5 billion in costs by using Internet technologies.
B) Was responsible for moving $5 billion in goods and services through the Internet.
C) Discovered that online trading cost only 20 percent as much as conventional trading.
D) Was fired for failing to stop computer hackers from breaking into their systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
33
Two of the largest strongholds for software piracy are:

A) India and China.
B) Japan and India.
C) China and South Africa.
D) South Africa and India.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is not commercial software to block pornography on the Internet?

A) Child Safe.
B) beTrusted.
C) Cyber Snoop.
D) Cyber Sitter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
35
The practice of downloading copyrighted songs was challenged because it:

A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
36
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
37
In a 2007 survey of more than 800 North American privacy and security professionals, what percentage acknowledged having at least one reportable data breach of personally identifiable information with their organizations during the past 12 months?

A) 25 percent.
B) 40 percent.
C) 85 percent.
D) 99 percent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
38
GetNetWise, launched by several major Internet companies, provided:

A) Online safety guides for parents.
B) Special browsers and other tools for families.
C) Web sites appropriate for children.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
39
Primarily, the CIO is expected to:

A) Increase costs through efficiency and productivity.
B) Reduce the company's competitive advantage.
C) Enable or drive business innovation.
D) Know how the rank-and-file are performing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
40
According to Bill Joy, Sun Microsystems' chief scientist, the 21st century technologies:

A) Are the safest and most human friendly known to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
41
What have businesses done to address the number, severity, and ease of hacker attacks on firms?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
43
How is the corporate Chief Information Officer a "coach" for the organization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
44
The identification of human genes is critical to:

A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
45
Project BioShield was:

A) A $5.6 million global antiterrorism program.
B) A two-year government program to develop vaccines to combat bioterrorism.
C) Announced by President Bush in 2003 to spur pharmaceutical companies to combat bioterrorism.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
46
Who should be entrusted with guarding against minors accessing adult-oriented Web sites?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
47
It is critical for businesses to maintain information in a secure location and guard this valuable resource. How secure is information in a free-access information society. Are digital certificates or other detection systems sufficient to protect information from hackers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
48
In 2005, the United Nations approved a declaration that:

A) Prohibited all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "inasmuch as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
49
Who is to say that genetically modified foods are safe for human consumption?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
50
Is information on the Internet truly free, or should copyrighted music or software be protected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
51
The global tone toward genetically modified food was one of:

A) Caution but progress was evitable.
B) Pursuing the lucrative economic opportunities.
C) Seek government approval of all products.
D) Extreme caution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
52
The safety of genetically modified foods:

A) Was challenged most noticeable in Europe but has spread to other countries.
B) Has been well documented since its beginning.
C) Is now in the hands of governments, ensuring its safety for human consumption.
D) Has never been questioned in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.