Deck 13: Managing Technology and Innovation

ملء الشاشة (f)
exit full mode
سؤال
Recent technological advances have decreased the number of way that privacy violations may occur.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most Americans mistakenly believe that if a website has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
سؤال
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
سؤال
The corporate nemesis responsible for creating and spreading computer attacks is called a:

A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
سؤال
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
سؤال
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
سؤال
Software piracy is a spreading and global problem.
سؤال
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
سؤال
In 2005,this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

A) Harvard.
B) Dartmouth.
C) Princeton.
D) Notre Dame.
سؤال
A "Trojan Horse" is a hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands.
سؤال
In a survey of 583 U.S.companies,how many were breached at least once by hackers over the past year?

A) 15 percent.
B) 40 percent.
C) 68 percent.
D) 90 percent.
سؤال
This term describes sensors and actuators that are embedded in physical objects - from roadways to pacemakers - and are linked through wired and wireless networks.

A) Internet of Things.
B) Information Super Highway.
C) Mapping Network.
D) Smartgrid.
سؤال
Cloning of humans was beyond the focus of the United Nations 2005 declaration on cloning.
سؤال
The human genome is the application of engineering to create materials on a molecular or atomic scale.
سؤال
Honeypots are systems used by security professionals to lure hackers to a fabricated Web site where the hacker's every move can be tracked.
سؤال
The U.S.government launched a program to detect cyber assaults on private U.S.companies called "Hold-off the Hacktivists."
سؤال
Human error by employees is a major factor of security breaches in the healthcare industry.
سؤال
Many experts have raised ethical questions about the ways RFID technology enables businesses,governments,and criminals to gather information about presale,sales,and post-sale activities.
سؤال
Cell phone technology has sometimes aided law enforcement in capturing criminals who were caught breaking into an automobile or store.
سؤال
Thanks to advancement in technology the number of instances of identity theft has been decreasing since 2006.
سؤال
According to Bill Joy,Sun Microsystems' chief scientist,the 21st century technologies:

A) Are the safest and most human friendly know to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
سؤال
This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyberattacks:

A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks.
D) Data Privacy Day.
سؤال
The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by:

A) Minority households.
B) Single-woman households.
C) Men between the age of 30 and 50.
D) College students and recent graduates.
سؤال
The "Perfect Citizen" program,monitored by the National Security Agency,is designed to protect against cyber assaults focused on?

A) Websites for children.
B) University and hospital records.
C) Electricity grids and nuclear power plants.
D) Personal home computers of U.S. citizens.
سؤال
The Children's Online Privacy Protection Act of 1998 requires:

A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
سؤال
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
سؤال
In 2011 this region contained the highest commercial value of unlicensed (pirated)software:

A) Asia Pacific.
B) Latin America.
C) North America.
D) Western Europe.
سؤال
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

A) Zombies.
B) Comodohackers.
C) Hacktivists.
D) Cyberattackers.
سؤال
The practice of downloading copyrighted songs was challenged because it:

A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
سؤال
In the United Kingdom offenders of software piracy and those who breach intellectual property rights face:

A) No penalty because there are no laws protecting software or intellectual property.
B) Fines up to ≤75,000 (nearly $100,000).
C) Fines of up to ≤50,000 (nearly $80,000) and/or a prison sentence of up to 10 years.
D) Mandatory prison sentence of 15 years.
سؤال
Nanotechnology has aided in the development of the following products.

A) Under Armour.
B) Stain-resistant chinos.
C) Flying quadrobots.
D) All of the above.
سؤال
The application of engineering to create materials on a molecular or atomic scale is:

A) Micro-biology.
B) Nanotechnology.
C) Micro-engineering.
D) Nano-atomic science.
سؤال
Loss of annual sales due to software piracy by software companies was estimated to be:

A) $120.3 million.
B) $25.8 billion.
C) $63.5 billion.
D) Impossible to calculate.
سؤال
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:

A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
سؤال
Piracy was most severe in this country where the illegal software market was worth nearly $9 billion in 2011:

A) China.
B) India.
C) South Africa.
D) Japan.
سؤال
Intellectual property refers to:

A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
سؤال
The number of Americans who actively use mobile-banking services in 2009 and thus were increasingly vulnerable to hacking was:

A) 12 million.
B) 25 million.
C) 71 million.
D) Impossible to count.
سؤال
A CIO is the company's:

A) Chief intelligence oracle.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
سؤال
Over time the role of the CIO:

A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
سؤال
According to The International Federation of the Phonographic Industry (IFPI),worldwide sales of music fell by how much in 2009?

A) 10 percent.
B) 35 percent.
C) 50 percent.
D) 75 percent.
سؤال
Who is to say that genetically modified foods are safe for human consumption?
سؤال
In 2005,the United Nations approved a declaration that:

A) Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
سؤال
How is the corporate Chief Information Officer a "coach" for the organization?
سؤال
According to the Center for Responsible Nanotechnology how many separate and severe risks are associated with nanotechnology.

A) Fifty.
B) Twenty-five.
C) Eleven.
D) Three.
سؤال
It is critical for businesses to maintain information in a secure location and guard this valuable resource.How secure is information in a free-access information society.Are digital certificates or other detection systems sufficient to protect information from hackers?
سؤال
In some economically developed countries and most developing countries around the world genetically modified food was:

A) Looked upon with caution but generally accepted.
B) Welcomed as a way to increase crop yields.
C) Rejected by most governments.
D) Viewed with extreme caution.
سؤال
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
سؤال
The identification of human genes is critical to:

A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
سؤال
In 2008 the F.D.A.declared that food from cloned animals and their offspring was safe to eat,but:

A) Imposed a voluntary ban on the sale of cloned animals.
B) Challenged the ethical basis of cloning.
C) Required vendors to label meat from cloned animals as "cloned."
D) Outlawed the sale of cloned meat until further testing confirmed its safety.
سؤال
What have businesses done to address the number,severity,and ease of hacker attacks on firms?
سؤال
Describe the ethical challenges regarding one of the following scientific breakthroughs: nanotechnology,human genome or stem cell research.Do the potential benefits of this breakthrough outweigh the potential costs?
سؤال
Is information on the Internet truly free,or should copyrighted music or software be protected?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/52
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Managing Technology and Innovation
1
Recent technological advances have decreased the number of way that privacy violations may occur.
False
2
Most Americans mistakenly believe that if a website has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
True
3
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
False
4
The corporate nemesis responsible for creating and spreading computer attacks is called a:

A) Google.
B) Zombie.
C) Computer hacker.
D) Platform.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
5
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
6
A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

A) Hacker.
B) Zombie.
C) Worm.
D) Ghost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
7
Software piracy is a spreading and global problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
8
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
9
In 2005,this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

A) Harvard.
B) Dartmouth.
C) Princeton.
D) Notre Dame.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
10
A "Trojan Horse" is a hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
11
In a survey of 583 U.S.companies,how many were breached at least once by hackers over the past year?

A) 15 percent.
B) 40 percent.
C) 68 percent.
D) 90 percent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
12
This term describes sensors and actuators that are embedded in physical objects - from roadways to pacemakers - and are linked through wired and wireless networks.

A) Internet of Things.
B) Information Super Highway.
C) Mapping Network.
D) Smartgrid.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cloning of humans was beyond the focus of the United Nations 2005 declaration on cloning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
14
The human genome is the application of engineering to create materials on a molecular or atomic scale.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
15
Honeypots are systems used by security professionals to lure hackers to a fabricated Web site where the hacker's every move can be tracked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
16
The U.S.government launched a program to detect cyber assaults on private U.S.companies called "Hold-off the Hacktivists."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
17
Human error by employees is a major factor of security breaches in the healthcare industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
18
Many experts have raised ethical questions about the ways RFID technology enables businesses,governments,and criminals to gather information about presale,sales,and post-sale activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
19
Cell phone technology has sometimes aided law enforcement in capturing criminals who were caught breaking into an automobile or store.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
20
Thanks to advancement in technology the number of instances of identity theft has been decreasing since 2006.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
21
According to Bill Joy,Sun Microsystems' chief scientist,the 21st century technologies:

A) Are the safest and most human friendly know to civilization.
B) Must be controlled by the companies that invest in them to protect society.
C) Can be used for good if government and business work together.
D) Are so powerful they can spawn whole new classes of accidents and abuses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
22
This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyberattacks:

A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks.
D) Data Privacy Day.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by:

A) Minority households.
B) Single-woman households.
C) Men between the age of 30 and 50.
D) College students and recent graduates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
24
The "Perfect Citizen" program,monitored by the National Security Agency,is designed to protect against cyber assaults focused on?

A) Websites for children.
B) University and hospital records.
C) Electricity grids and nuclear power plants.
D) Personal home computers of U.S. citizens.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Children's Online Privacy Protection Act of 1998 requires:

A) Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B) Web site operators to post user privacy laws.
C) Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
26
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
27
In 2011 this region contained the highest commercial value of unlicensed (pirated)software:

A) Asia Pacific.
B) Latin America.
C) North America.
D) Western Europe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
28
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

A) Zombies.
B) Comodohackers.
C) Hacktivists.
D) Cyberattackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
29
The practice of downloading copyrighted songs was challenged because it:

A) Created congestion and overloaded demands on the servers.
B) Denied legitimate compensation to the recording artists.
C) Favored major recording companies and selective artists over others.
D) Resulted in bankruptcy for retail music outlets across the country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
30
In the United Kingdom offenders of software piracy and those who breach intellectual property rights face:

A) No penalty because there are no laws protecting software or intellectual property.
B) Fines up to ≤75,000 (nearly $100,000).
C) Fines of up to ≤50,000 (nearly $80,000) and/or a prison sentence of up to 10 years.
D) Mandatory prison sentence of 15 years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
31
Nanotechnology has aided in the development of the following products.

A) Under Armour.
B) Stain-resistant chinos.
C) Flying quadrobots.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
32
The application of engineering to create materials on a molecular or atomic scale is:

A) Micro-biology.
B) Nanotechnology.
C) Micro-engineering.
D) Nano-atomic science.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
33
Loss of annual sales due to software piracy by software companies was estimated to be:

A) $120.3 million.
B) $25.8 billion.
C) $63.5 billion.
D) Impossible to calculate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
34
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:

A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
35
Piracy was most severe in this country where the illegal software market was worth nearly $9 billion in 2011:

A) China.
B) India.
C) South Africa.
D) Japan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
36
Intellectual property refers to:

A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
37
The number of Americans who actively use mobile-banking services in 2009 and thus were increasingly vulnerable to hacking was:

A) 12 million.
B) 25 million.
C) 71 million.
D) Impossible to count.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
38
A CIO is the company's:

A) Chief intelligence oracle.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
39
Over time the role of the CIO:

A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
40
According to The International Federation of the Phonographic Industry (IFPI),worldwide sales of music fell by how much in 2009?

A) 10 percent.
B) 35 percent.
C) 50 percent.
D) 75 percent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
41
Who is to say that genetically modified foods are safe for human consumption?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
42
In 2005,the United Nations approved a declaration that:

A) Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
B) Called for the fate of therapeutic cloning to be determined by the individual nations.
C) Encouraged all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."
D) Prohibited reproductive cloning and mandated that further discussion on the issue be deferred for a couple of years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
43
How is the corporate Chief Information Officer a "coach" for the organization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
44
According to the Center for Responsible Nanotechnology how many separate and severe risks are associated with nanotechnology.

A) Fifty.
B) Twenty-five.
C) Eleven.
D) Three.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
45
It is critical for businesses to maintain information in a secure location and guard this valuable resource.How secure is information in a free-access information society.Are digital certificates or other detection systems sufficient to protect information from hackers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
46
In some economically developed countries and most developing countries around the world genetically modified food was:

A) Looked upon with caution but generally accepted.
B) Welcomed as a way to increase crop yields.
C) Rejected by most governments.
D) Viewed with extreme caution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
47
Discuss the steps businesses and governments have taken to better protect stakeholder privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
48
The identification of human genes is critical to:

A) Early diagnosis of life-threatening diseases.
B) New ways to prevent illnesses.
C) Development of drug therapies.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
49
In 2008 the F.D.A.declared that food from cloned animals and their offspring was safe to eat,but:

A) Imposed a voluntary ban on the sale of cloned animals.
B) Challenged the ethical basis of cloning.
C) Required vendors to label meat from cloned animals as "cloned."
D) Outlawed the sale of cloned meat until further testing confirmed its safety.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
50
What have businesses done to address the number,severity,and ease of hacker attacks on firms?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
51
Describe the ethical challenges regarding one of the following scientific breakthroughs: nanotechnology,human genome or stem cell research.Do the potential benefits of this breakthrough outweigh the potential costs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
52
Is information on the Internet truly free,or should copyrighted music or software be protected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.