Deck 12: Ethical, legal, and Social Issues of Information Technology

ملء الشاشة (f)
exit full mode
سؤال
The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy."

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is true of stingray?

A)It supports operations that require aerial surveillance.
B)It is a national security agency surveillance program that collects Internet data including search histories.
C)It impersonates a cell tower and forces all mobile phones within range to connect to it.
D)It is an airline passenger prescreening program that checks travelers' personal information.
سؤال
The Fourth Amendment to the U.S.Constitution was adopted to _____.

A)guarantee fair trial and other rights of an accused
B)prohibit excessive bail as well as cruel and unusual punishment
C)protect people from unreasonable searches and seizures of properties
D)guarantee the rights to freedom of religion,freedom of expression,and freedom to assemble
سؤال
Which of the following is true of the First Amendment to the U.S.Constitution?

A)It was adopted to protect Americans from unreasonable searches and seizures of properties.
B)It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.
C)It was adopted to guarantee fair trial and other rights of the accused.
D)It was adopted to guarantee Americans' rights to freedom of religion,freedom of expression,and freedom to assemble.
سؤال
Which of the following amendments to the U.S.Constitution comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people,as this could threaten their right to assemble or gather peacefully?

A)The First Amendment
B)The Second Amendment
C)The Third Amendment
D)The Fourth Amendment
سؤال
Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.

A)Customer relationship management
B)Business intelligence management
C)Access information management
D)Enterprise resource management
سؤال
ZoomMe is a company that accumulates data on people from various sources such as online product registration forms,credit card purchases,and other public records.It then uses these data to create profiles on people and sell them to advertisers.ZoomMe comes under the category of _____.

A)data brokers
B)data miners
C)privacy analysts
D)privacy brokers
سؤال
_____ is a set of beliefs about right and wrong behavior.

A)Moral
B)Law
C)Ethics
D)Value
سؤال
Which of the following defines law?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It is a set of principles and core values that are essential to ethical work and governs a practitioner's behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do.
سؤال
David collects pieces of information about individuals garnered from data brokers.He then uses this information to threaten the individuals to publicly uncover their personal details until a monetary ransom is paid to him.Identify the tactic used by David to gather the information.

A)Doxing
B)Spamming
C)Hacking
D)Cracking
سؤال
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.

A)Hacking
B)Spamming
C)Doxing
D)Cracking
سؤال
Which of the following is a national security agency surveillance program that collects Internet data including search histories?

A)Stingray
B)PRISM
C)Secure flight program
D)Backscatter imaging scanners
سؤال
_____ identify and reference people in photos and videos posted on Facebook.

A)Facebook shares
B)Facebook notifications
C)Facebook messages
D)Facebook tags
سؤال
Which of the following best describes morals?

A)They are an individual's beliefs about right and wrong.
B)They are a set of beliefs about right and wrong behavior that are universally accepted.
C)They consist of principles and core values that are essential to behavior.
D)They are a system of rules enforced by a set of institutions that states what a person can and cannot do.
سؤال
Which of the following is true of a cookie?

A)It saves shortcuts to Web sites and navigates to them within a few seconds.
B)It helps users to browse incognito by hiding their browsing data.
C)It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request.
D)It captures browsing history for Web site customization and personalization purposes.
سؤال
Which of the following is true of a code of ethics?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It states the principles and core values that are essential to any professional's work and that govern their behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do .
سؤال
Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?

A)Dashboard recognizer
B)Stingray
C)Automatic license plate reader
D)Secure flight program
سؤال
Which of the following acts as a reference point to determine what is legal and what is ethical?

A)Code of laws
B)Code of ethics
C)Code of conduct
D)Code of practice
سؤال
John,a lawyer,defends his client,who is accused of murder,to the best of his ability while conforming to the _____ of his profession.

A)ethics
B)morals
C)laws
D)values
سؤال
_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.

A)Data brokers
B)Yellow pagers
C)Data miners
D)Drill-down analysts
سؤال
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?

A)A wiki
B)A cookie
C)An antivirus
D)A bookmark
سؤال
_____ is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment of the victim.

A)Hacking
B)Doxing
C)Phishing
D)Distributed denial-of-service
سؤال
A _____ is charged with the responsibility of ensuring that an organization does not violate state and federal government regulations.

A)Data Security Officer (DSO)
B)Chief Operations Officer (COO)
C)Database Privacy Officer (DPO)
D)Chief Privacy Officer (CPO)
سؤال
A company based in Houston wants to expand its business to Rome.The human resources department will run background checks from Houston.Identify the condition that must be satisfied to make this possible.

A)A "safe harbor" framework must be developed.
B)The US Patriot Act must be implemented.
C)A doxing framework must be developed.
D)The Digital Millennium Copyright Act must be implemented.
سؤال
PindCart,an online retailer,places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site.The company uses this file to generate a personalized welcome message to its visitors.This small file is called a _____.

A)cookie
B)metadata
C)data dictionary
D)popup
سؤال
Identify a drawback of the Fourth Amendment of the U.S.Constitution.

A)It does not benefit government employees.
B)It does not benefit private employees.
C)It benefits only voluntary organizations.
D)It benefits only nonprofit organizations.
سؤال
A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email,Internet,and phone usage were not private and that their use might be monitored.

A)public
B)nonprofit
C)voluntary
D)private
سؤال
Who should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data?

A)Editor-in-chief
B)Chief Privacy Officer
C)Chief mentor
D)Chief Underwriting Officer
سؤال
Who is appointed by an organization to define,implement,and oversee a set of data privacy policies?

A)A Chief Privacy Officer (CPO)
B)A Chief Operations Officer (COO)
C)A Database Privacy Officer (DPO)
D)A Data warehouse Officer (DWO)
سؤال
Who creates personal profiles using the data collected through the use of cookies?

A)A chief privacy officer
B)A data warehouse officer
C)A data broker
D)A public administrative broker
سؤال
Which of the following statements is true of a cookie?

A)A cookie can create copies of itself and spread to other networks to execute and replicate again.
B)The one time password of a transaction is captured and stored under a cookie on a company's Web server.
C)A cookie pulls data from disparate data sources to populate and maintain a data warehouse.
D)Data about user preferences and activity is captured and stored under a cookie on a company's Web server.
سؤال
The _____ represent the international consensus regarding the collection and management of personal information.

A)Code of Fair Information Practices
B)1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
C)European Union Data Protection Directives
D)1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
سؤال
Conducting a thorough assessment to document what sensitive information an organization is collecting,where it is stored,how long it is kept,who has access to it,and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.

A)data piracy
B)data privacy
C)data recovery
D)data structuring
سؤال
The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection.

A)Code of Fair Information Practices
B)European Data Transfer Act
C)Organization for Economic Cooperation and Development privacy guideline
D)European Union Data Protection Directive
سؤال
Which of the following must be adopted by a company to treat its customers' data responsibly?

A)The Code of Fair Information Practices
B)The European Union Data Protection Directives
C)The 1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
D)The 1957 Organization for Economic Cooperation and Development (OECD)privacy guidelines
سؤال
The Fourth Amendment of the U.S.Constitution _____.

A)protects the privacy of intermediate school students
B)protects the privacy of college students
C)protects the privacy of private employees
D)protects the privacy of government employees
سؤال
Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.

A)Increased legal liabilities
B)Increased productivity
C)Decreased leisure hours
D)Increased peer discussion
سؤال
Identify the framework developed by the U.S.Department of Commerce and the European Commission to ensure that U.S.companies don't experience interruptions in their dealings with countries in the European Union.

A)Net neutrality
B)Terms of Use
C)Safe harbor
D)Struts
سؤال
Mapua Corp.,a multinational corporation based in Germany,has decided to relocate its business to Japan.It faces difficulties in transferring the personal data of its employees from Germany to Japan.Which of the following is causing this difficulty?

A)The 1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
B)The European Union Data Protection Directive
C)The Code of Fair Information Practices
D)The Code of Fair Transportation Security
سؤال
The _____ of a Web site states what sort of information about customers is captured and how that information may be used by the capturing organization.

A)extension
B)privacy policy
C)browser certificate
D)developer console
سؤال
_____ is the control of the publishing of information on the Internet.

A)Internet graying
B)Internet flagship
C)Internet catalysis
D)Internet censorship
سؤال
When does the support for open access to Internet grow in a country?

A)When only private-sector organizations gain online access
B)When only government officials gain online access
C)When more people gain online access
D)When online access is limited to schools and colleges
سؤال
Which of the following policies should be agreed by a user before joining a social networking page?

A)Terms of Use policy
B)Privacy policy
C)Information technology usage policy
D)Profile update policy
سؤال
_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.

A)Net neutrality
B)Internet of Things
C)Cloud computing
D)Cryptography
سؤال
Which of the following is true of the Communications Act of 1934?

A)It created the Education Rate (E-Rate)program's Terms of Use policy to oversee all interstate and foreign communications.
B)It created the Federal Communications Commission to oversee all interstate and foreign communications.
C)It created the decision support program to oversee all interstate and foreign communications.
D)It created the Universal Service Fund (USF)to oversee all interstate and foreign communications.
سؤال
Consider a country with a law stating that citizens below the age of 25 must not have access to the Internet.This type of law creates a _____.

A)net neutrality
B)digital divide
C)net equality
D)social divide
سؤال
Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology.

A)The change management continuum model
B)Net neutrality
C)The digital divide
D)Internet traffic
سؤال
In 2002,the Federal Communications Commission decided that most broadband Internet services qualified as _____ services.

A)investment
B)technology
C)information
D)commercial
سؤال
Social networking users are prone to _____.

A)cyberethics
B)advanced persistent threat
C)identity theft
D)cyberterrorism
سؤال
Linc Corp.,a software firm,decides to ban social networking sites for its employees at the workplace.However,the employees are able to access other Web sites.Identify the strategy adopted by the firm.

A)Cyberespionage
B)Internet censorship
C)Internet rootkit
D)Spear phishing
سؤال
Which program was designed to eliminate the digital divide in the United States?

A)The Internet traffic program
B)Net neutrality program
C)Workplace monitoring program
D)The Education Rate program
سؤال
Identify the objective of the Communications Act of 1934.

A)To provide dial-up Internet services to schools and libraries
B)To protect users from online threats such as cracking and identity theft
C)To restrict the use of social networking Web sites
D)To ensure broad access to affordable communications services
سؤال
Which of the following is a feature of Internet censorship?

A)Monitoring the Internet activity of individuals
B)Storing user credentials such as name and address
C)Selling user data to third parties
D)Pilfering credit card information from online shoppers
سؤال
What is the debate over net neutrality?

A)To decrease the incentives of Internet Service Providers
B)To support only the existing services and cancel the new services
C)To keep the Internet open and impartial
D)To reduce the network of Internet Service Providers
سؤال
Which of the following programs was created through the Telecommunications Act of 1996?

A)Education Rate (E-Rate)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Network (E-Net)program
سؤال
The digital divide must be bridged to _____.

A)solve emergency issues
B)support net neutrality
C)prevent online threats
D)promote Internet censorship
سؤال
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?

A)Terms of Trade policy
B)Terms of Use policy
C)Terms of Endearment policy
D)Terms of Retention policy
سؤال
Which of the following is true of the Education Rate (E-Rate)program?

A)It provides dial-up Internet services to multinational companies.
B)It provides broadband Internet services to schools and libraries.
C)It provides broadband Internet services to multinational companies.
D)It provides dial-up Internet services to schools and libraries.
سؤال
The Schools and Libraries Program of the Universal Service Fund (USF)is the full name of the _____.

A)Education Network (E-Net)program
B)Education Rate (E-Rate)program
C)Internet Mate (I-Mate)program
D)Mobile Network (M-Net)program
سؤال
The _____ reimburses telecommunications,Internet access,and internal connections providers for discounts on eligible services provided to schools and libraries.

A)Education Network (E-Net)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Rate (E-Rate)program
سؤال
The First Amendment to the U.S.Constitution was adopted to protect people from unreasonable searches and seizures of properties.
سؤال
Morals is a set of beliefs about right and wrong behavior.
سؤال
Which of the following encompasses machine-to-machine,people-to-people,and people-to-machine connections?

A)The Internet of Things
B)The Internet of Digital divide
C)The Internet of Regulations
D)The Internet of Everything
سؤال
The Internet of Things enables people to connect to any device with an on/off switch to a network.
سؤال
Which of the following is a reason for the rapid growth of the Internet of Everything?

A)Limited availability of network services
B)Increased availability of expensive smart devices
C)Increased availability of network access
D)Limited availability of inexpensive smart devices
سؤال
The Fourth Amendment to the U.S.Constitution is used to protect the privacy of private employees.
سؤال
In the context of workplace monitoring,explain the requirements of privacy advocates.
سؤال
Why do practitioners in many professions subscribe to a code of ethics rather than simply following law?
سؤال
Fly thermostat,an automatic temperature controller for homes,learns the patterns for raising and lowering the temperature in a house after a week of use.It then adjusts the temperature automatically based on the observed patterns.This is an application of _____.

A)the Internet of Things
B)Net neutrality
C)the Education Rate (E-Rate)program
D)Net censorship
سؤال
Explain the purpose of net neutrality.
سؤال
Internet censorship limits access to certain Web sites.
سؤال
_____ is a network of physical objects embedded with sensors,processors,software,and network connectivity capability to enable them to exchange data with the manufacturer,operator,and other connected devices.

A)The Internet of Digital divide
B)The Internet of Things
C)The Internet of Data
D)The Internet of Regulations
سؤال
What are the various tasks carried out by a Chief Privacy Officer to establish an effective data privacy program?
سؤال
Ethics is one's personal beliefs about right and wrong.
سؤال
Laws are enforced by a set of institutions such as the police,courts,and law-making bodies.
سؤال
The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet.When connected to a Huya wireless bridge,the bulbs can be programmed to emit different tones of white light,from warm,yellow white to vibrant,blue white-any color on the spectrum.The bulbs can also be programmed to blink if they sense an intruder.This is an application of _____.

A)Net censorship
B)Net neutrality
C)the Education Rate (E-Rate)program
D)the Internet of Things
سؤال
Net neutrality favors Internet traffic from some specific sources than the others.
سؤال
The state privacy statutes tend to favor private-sector employees over employers.
سؤال
Define Internet of Everything (IoE).
سؤال
Digital divide helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Ethical, legal, and Social Issues of Information Technology
1
The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy."

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
D
2
Which of the following is true of stingray?

A)It supports operations that require aerial surveillance.
B)It is a national security agency surveillance program that collects Internet data including search histories.
C)It impersonates a cell tower and forces all mobile phones within range to connect to it.
D)It is an airline passenger prescreening program that checks travelers' personal information.
C
3
The Fourth Amendment to the U.S.Constitution was adopted to _____.

A)guarantee fair trial and other rights of an accused
B)prohibit excessive bail as well as cruel and unusual punishment
C)protect people from unreasonable searches and seizures of properties
D)guarantee the rights to freedom of religion,freedom of expression,and freedom to assemble
C
4
Which of the following is true of the First Amendment to the U.S.Constitution?

A)It was adopted to protect Americans from unreasonable searches and seizures of properties.
B)It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.
C)It was adopted to guarantee fair trial and other rights of the accused.
D)It was adopted to guarantee Americans' rights to freedom of religion,freedom of expression,and freedom to assemble.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following amendments to the U.S.Constitution comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people,as this could threaten their right to assemble or gather peacefully?

A)The First Amendment
B)The Second Amendment
C)The Third Amendment
D)The Fourth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.

A)Customer relationship management
B)Business intelligence management
C)Access information management
D)Enterprise resource management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
ZoomMe is a company that accumulates data on people from various sources such as online product registration forms,credit card purchases,and other public records.It then uses these data to create profiles on people and sell them to advertisers.ZoomMe comes under the category of _____.

A)data brokers
B)data miners
C)privacy analysts
D)privacy brokers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
_____ is a set of beliefs about right and wrong behavior.

A)Moral
B)Law
C)Ethics
D)Value
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following defines law?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It is a set of principles and core values that are essential to ethical work and governs a practitioner's behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
David collects pieces of information about individuals garnered from data brokers.He then uses this information to threaten the individuals to publicly uncover their personal details until a monetary ransom is paid to him.Identify the tactic used by David to gather the information.

A)Doxing
B)Spamming
C)Hacking
D)Cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.

A)Hacking
B)Spamming
C)Doxing
D)Cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is a national security agency surveillance program that collects Internet data including search histories?

A)Stingray
B)PRISM
C)Secure flight program
D)Backscatter imaging scanners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
_____ identify and reference people in photos and videos posted on Facebook.

A)Facebook shares
B)Facebook notifications
C)Facebook messages
D)Facebook tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following best describes morals?

A)They are an individual's beliefs about right and wrong.
B)They are a set of beliefs about right and wrong behavior that are universally accepted.
C)They consist of principles and core values that are essential to behavior.
D)They are a system of rules enforced by a set of institutions that states what a person can and cannot do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is true of a cookie?

A)It saves shortcuts to Web sites and navigates to them within a few seconds.
B)It helps users to browse incognito by hiding their browsing data.
C)It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request.
D)It captures browsing history for Web site customization and personalization purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is true of a code of ethics?

A)It is an individual's beliefs about right and wrong.
B)It is a set of beliefs about right and wrong behavior that are universally accepted.
C)It states the principles and core values that are essential to any professional's work and that govern their behavior.
D)It is a system of rules enforced by a set of institutions that states what a person can and cannot do .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?

A)Dashboard recognizer
B)Stingray
C)Automatic license plate reader
D)Secure flight program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following acts as a reference point to determine what is legal and what is ethical?

A)Code of laws
B)Code of ethics
C)Code of conduct
D)Code of practice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
John,a lawyer,defends his client,who is accused of murder,to the best of his ability while conforming to the _____ of his profession.

A)ethics
B)morals
C)laws
D)values
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.

A)Data brokers
B)Yellow pagers
C)Data miners
D)Drill-down analysts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?

A)A wiki
B)A cookie
C)An antivirus
D)A bookmark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
_____ is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment of the victim.

A)Hacking
B)Doxing
C)Phishing
D)Distributed denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
A _____ is charged with the responsibility of ensuring that an organization does not violate state and federal government regulations.

A)Data Security Officer (DSO)
B)Chief Operations Officer (COO)
C)Database Privacy Officer (DPO)
D)Chief Privacy Officer (CPO)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
A company based in Houston wants to expand its business to Rome.The human resources department will run background checks from Houston.Identify the condition that must be satisfied to make this possible.

A)A "safe harbor" framework must be developed.
B)The US Patriot Act must be implemented.
C)A doxing framework must be developed.
D)The Digital Millennium Copyright Act must be implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
PindCart,an online retailer,places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site.The company uses this file to generate a personalized welcome message to its visitors.This small file is called a _____.

A)cookie
B)metadata
C)data dictionary
D)popup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
Identify a drawback of the Fourth Amendment of the U.S.Constitution.

A)It does not benefit government employees.
B)It does not benefit private employees.
C)It benefits only voluntary organizations.
D)It benefits only nonprofit organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email,Internet,and phone usage were not private and that their use might be monitored.

A)public
B)nonprofit
C)voluntary
D)private
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
Who should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data?

A)Editor-in-chief
B)Chief Privacy Officer
C)Chief mentor
D)Chief Underwriting Officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
Who is appointed by an organization to define,implement,and oversee a set of data privacy policies?

A)A Chief Privacy Officer (CPO)
B)A Chief Operations Officer (COO)
C)A Database Privacy Officer (DPO)
D)A Data warehouse Officer (DWO)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
Who creates personal profiles using the data collected through the use of cookies?

A)A chief privacy officer
B)A data warehouse officer
C)A data broker
D)A public administrative broker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following statements is true of a cookie?

A)A cookie can create copies of itself and spread to other networks to execute and replicate again.
B)The one time password of a transaction is captured and stored under a cookie on a company's Web server.
C)A cookie pulls data from disparate data sources to populate and maintain a data warehouse.
D)Data about user preferences and activity is captured and stored under a cookie on a company's Web server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
The _____ represent the international consensus regarding the collection and management of personal information.

A)Code of Fair Information Practices
B)1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
C)European Union Data Protection Directives
D)1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
Conducting a thorough assessment to document what sensitive information an organization is collecting,where it is stored,how long it is kept,who has access to it,and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.

A)data piracy
B)data privacy
C)data recovery
D)data structuring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection.

A)Code of Fair Information Practices
B)European Data Transfer Act
C)Organization for Economic Cooperation and Development privacy guideline
D)European Union Data Protection Directive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following must be adopted by a company to treat its customers' data responsibly?

A)The Code of Fair Information Practices
B)The European Union Data Protection Directives
C)The 1965 Organization for Data Brokering and Doxing (ODBD)privacy guidelines
D)The 1957 Organization for Economic Cooperation and Development (OECD)privacy guidelines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
The Fourth Amendment of the U.S.Constitution _____.

A)protects the privacy of intermediate school students
B)protects the privacy of college students
C)protects the privacy of private employees
D)protects the privacy of government employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.

A)Increased legal liabilities
B)Increased productivity
C)Decreased leisure hours
D)Increased peer discussion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
Identify the framework developed by the U.S.Department of Commerce and the European Commission to ensure that U.S.companies don't experience interruptions in their dealings with countries in the European Union.

A)Net neutrality
B)Terms of Use
C)Safe harbor
D)Struts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
Mapua Corp.,a multinational corporation based in Germany,has decided to relocate its business to Japan.It faces difficulties in transferring the personal data of its employees from Germany to Japan.Which of the following is causing this difficulty?

A)The 1980 Organization for Economic Cooperation and Development (OECD)privacy guidelines
B)The European Union Data Protection Directive
C)The Code of Fair Information Practices
D)The Code of Fair Transportation Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
The _____ of a Web site states what sort of information about customers is captured and how that information may be used by the capturing organization.

A)extension
B)privacy policy
C)browser certificate
D)developer console
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
_____ is the control of the publishing of information on the Internet.

A)Internet graying
B)Internet flagship
C)Internet catalysis
D)Internet censorship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
When does the support for open access to Internet grow in a country?

A)When only private-sector organizations gain online access
B)When only government officials gain online access
C)When more people gain online access
D)When online access is limited to schools and colleges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following policies should be agreed by a user before joining a social networking page?

A)Terms of Use policy
B)Privacy policy
C)Information technology usage policy
D)Profile update policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.

A)Net neutrality
B)Internet of Things
C)Cloud computing
D)Cryptography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following is true of the Communications Act of 1934?

A)It created the Education Rate (E-Rate)program's Terms of Use policy to oversee all interstate and foreign communications.
B)It created the Federal Communications Commission to oversee all interstate and foreign communications.
C)It created the decision support program to oversee all interstate and foreign communications.
D)It created the Universal Service Fund (USF)to oversee all interstate and foreign communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
Consider a country with a law stating that citizens below the age of 25 must not have access to the Internet.This type of law creates a _____.

A)net neutrality
B)digital divide
C)net equality
D)social divide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology.

A)The change management continuum model
B)Net neutrality
C)The digital divide
D)Internet traffic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
In 2002,the Federal Communications Commission decided that most broadband Internet services qualified as _____ services.

A)investment
B)technology
C)information
D)commercial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
Social networking users are prone to _____.

A)cyberethics
B)advanced persistent threat
C)identity theft
D)cyberterrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
Linc Corp.,a software firm,decides to ban social networking sites for its employees at the workplace.However,the employees are able to access other Web sites.Identify the strategy adopted by the firm.

A)Cyberespionage
B)Internet censorship
C)Internet rootkit
D)Spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which program was designed to eliminate the digital divide in the United States?

A)The Internet traffic program
B)Net neutrality program
C)Workplace monitoring program
D)The Education Rate program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
Identify the objective of the Communications Act of 1934.

A)To provide dial-up Internet services to schools and libraries
B)To protect users from online threats such as cracking and identity theft
C)To restrict the use of social networking Web sites
D)To ensure broad access to affordable communications services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is a feature of Internet censorship?

A)Monitoring the Internet activity of individuals
B)Storing user credentials such as name and address
C)Selling user data to third parties
D)Pilfering credit card information from online shoppers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
What is the debate over net neutrality?

A)To decrease the incentives of Internet Service Providers
B)To support only the existing services and cancel the new services
C)To keep the Internet open and impartial
D)To reduce the network of Internet Service Providers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following programs was created through the Telecommunications Act of 1996?

A)Education Rate (E-Rate)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Network (E-Net)program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
The digital divide must be bridged to _____.

A)solve emergency issues
B)support net neutrality
C)prevent online threats
D)promote Internet censorship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?

A)Terms of Trade policy
B)Terms of Use policy
C)Terms of Endearment policy
D)Terms of Retention policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is true of the Education Rate (E-Rate)program?

A)It provides dial-up Internet services to multinational companies.
B)It provides broadband Internet services to schools and libraries.
C)It provides broadband Internet services to multinational companies.
D)It provides dial-up Internet services to schools and libraries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
The Schools and Libraries Program of the Universal Service Fund (USF)is the full name of the _____.

A)Education Network (E-Net)program
B)Education Rate (E-Rate)program
C)Internet Mate (I-Mate)program
D)Mobile Network (M-Net)program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
The _____ reimburses telecommunications,Internet access,and internal connections providers for discounts on eligible services provided to schools and libraries.

A)Education Network (E-Net)program
B)Mobile Network (M-Net)program
C)Internet Mate (I-Mate)program
D)Education Rate (E-Rate)program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
The First Amendment to the U.S.Constitution was adopted to protect people from unreasonable searches and seizures of properties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
Morals is a set of beliefs about right and wrong behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following encompasses machine-to-machine,people-to-people,and people-to-machine connections?

A)The Internet of Things
B)The Internet of Digital divide
C)The Internet of Regulations
D)The Internet of Everything
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
The Internet of Things enables people to connect to any device with an on/off switch to a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following is a reason for the rapid growth of the Internet of Everything?

A)Limited availability of network services
B)Increased availability of expensive smart devices
C)Increased availability of network access
D)Limited availability of inexpensive smart devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
The Fourth Amendment to the U.S.Constitution is used to protect the privacy of private employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
In the context of workplace monitoring,explain the requirements of privacy advocates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
Why do practitioners in many professions subscribe to a code of ethics rather than simply following law?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
Fly thermostat,an automatic temperature controller for homes,learns the patterns for raising and lowering the temperature in a house after a week of use.It then adjusts the temperature automatically based on the observed patterns.This is an application of _____.

A)the Internet of Things
B)Net neutrality
C)the Education Rate (E-Rate)program
D)Net censorship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
Explain the purpose of net neutrality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
Internet censorship limits access to certain Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
_____ is a network of physical objects embedded with sensors,processors,software,and network connectivity capability to enable them to exchange data with the manufacturer,operator,and other connected devices.

A)The Internet of Digital divide
B)The Internet of Things
C)The Internet of Data
D)The Internet of Regulations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
What are the various tasks carried out by a Chief Privacy Officer to establish an effective data privacy program?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
Ethics is one's personal beliefs about right and wrong.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
Laws are enforced by a set of institutions such as the police,courts,and law-making bodies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet.When connected to a Huya wireless bridge,the bulbs can be programmed to emit different tones of white light,from warm,yellow white to vibrant,blue white-any color on the spectrum.The bulbs can also be programmed to blink if they sense an intruder.This is an application of _____.

A)Net censorship
B)Net neutrality
C)the Education Rate (E-Rate)program
D)the Internet of Things
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
Net neutrality favors Internet traffic from some specific sources than the others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
The state privacy statutes tend to favor private-sector employees over employers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
Define Internet of Everything (IoE).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
Digital divide helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.