Deck 4: Personal,legal,ethical,and Organizational Issues of Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 4: Personal,legal,ethical,and Organizational Issues of Information Systems
1
A potential benefit of telecommuting is that it increases interaction with coworkers.
False
2
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
False
3
Having a clear,specific policy can help prevent legal actions users might take against an organization,as in cases of termination.
True
4
Even a small response for a spam is worthwhile return on the investment because sending spam e-mails is very inexpensive.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Junk e-mail is also known as a cookie.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Information technology has eliminated more types of jobs than it has created.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Private information on the Web-what is posted by a person-is not subject to censorship because of the person's constitutional freedom of expression.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
A patent protects product names and identifying marks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Some "information paranoia" is valid,because information about almost every aspect of people's lives is now stored on various databases.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Spamming has created decency concerns,because these e-mails often contain explicit language or nudity and can be opened by children.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
In general,patents last the author's lifetime plus 70 years.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Copyright laws do not cover online materials.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Cookies can be considered an invasion of privacy.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
To minimize the invasion of privacy,users should be able to review their records and correct any inaccuracies.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
As a part of intellectual property,logos are a type of copyrighted material.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Log files make it possible for Web sites to customize pages for users.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Information technologies have a direct effect on the nature of jobs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Information in databases can now be cross-matched to create profiles of people and predict their behavior,based on their transactions with educational,financial,and government institutions.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Log files are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
An organization can generate revenue by licensing its patent to others.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Ergonomics experts believe that using better-designed furniture can solve many of the health problems arising from information technology.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is a commonly used technology for data collection?
A) Applets
B) Kernels
C) Cookies
D) Firewalls
A) Applets
B) Kernels
C) Cookies
D) Firewalls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.
A) phishing
B) nonrepudiation
C) cybersquatting
D) encapsulation
A) phishing
B) nonrepudiation
C) cybersquatting
D) encapsulation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
_____ provide information about a user's location and computer equipment,and this information can be used for unauthorized purposes,such as corporate espionage.
A) Cookies
B) Kernels
C) Applets
D) Firewalls
A) Cookies
B) Kernels
C) Applets
D) Firewalls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
A) phishing
B) nonrepudiation
C) spoofing
D) accountability
A) phishing
B) nonrepudiation
C) spoofing
D) accountability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
The cost of hiring additional employees is reduced because skills are shared among participating companies of a virtual organization.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Green computation helps an organization save on energy costs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
A disadvantage of a virtual organization is that it increases the time needed to develop new products.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Usually,junk e-mail or spam is:
A) a solicited e-mail sent for business purposes.
B) quite expensive to send out.
C) sent in bulk using automated mailing software.
D) used to increase the size of user in-boxes.
A) a solicited e-mail sent for business purposes.
B) quite expensive to send out.
C) sent in bulk using automated mailing software.
D) used to increase the size of user in-boxes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Organizations should keep collected information only as long as:
A) it can be reproduced.
B) it is needed for the stated purpose.
C) it can be manipulated.
D) it is abstract and incoherent.
A) it can be reproduced.
B) it is needed for the stated purpose.
C) it can be manipulated.
D) it is abstract and incoherent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
_____ has created decency concerns,because these e-mails often contain explicit language or nudity.
A) Phishing
B) Cybersquatting
C) Sniffing
D) Spamming
A) Phishing
B) Cybersquatting
C) Sniffing
D) Spamming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
To minimize the invasion of privacy,any organization creating,maintaining,using,or disseminating records of personal data must ensure the data's _____.
A) duplicability
B) reliability
C) abstractness
D) incoherence
A) duplicability
B) reliability
C) abstractness
D) incoherence
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
To minimize the invasion of privacy,the existence of record-keeping systems storing personal data should not:
A) be kept secret.
B) have a stated purpose.
C) be up-to-date.
D) be restricted.
A) be kept secret.
B) have a stated purpose.
C) be up-to-date.
D) be restricted.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
A virtual organization needs central offices and an organizational hierarchy for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
The increasing popularity of touchscreens on smartphones may result in more stress-related injuries of the users' hands,arms,back,and eyes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Information technologies have created job upgrading.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Green computing is one of the methods for combating global warming.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
To minimize the invasion of privacy,users and organizations should:
A) enable access to one's personal information to all interested parties.
B) keep collected information even after the stated purpose is over.
C) use verification procedures to ensure data accuracy.
D) collect both necessary and unnecessary data.
A) enable access to one's personal information to all interested parties.
B) keep collected information even after the stated purpose is over.
C) use verification procedures to ensure data accuracy.
D) collect both necessary and unnecessary data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Information technologies have led to "job deskilling."
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
According to the principle of _____,Internet service providers (ISPs) and government agencies should treat all data on the Internet equally.
A) Internet censorship
B) net neutrality
C) Internet security
D) cybersquatting
A) Internet censorship
B) net neutrality
C) Internet security
D) cybersquatting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
A credit card company sells its customers' mailing addresses to its competitors.In this scenario,the company's action is considered _____.
A) ethical but illegal
B) legal but unethical
C) illegal and unethical
D) legal and ethical
A) ethical but illegal
B) legal but unethical
C) illegal and unethical
D) legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
The _____ is an exception to copyright laws that means that a person can use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.
A) Communications Decency Act
B) Fair Use Doctrine
C) Digital Millennium Act
D) ACM Code of Ethics
A) Communications Decency Act
B) Fair Use Doctrine
C) Digital Millennium Act
D) ACM Code of Ethics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
According to the principle of Internet neutrality,Internet service providers (ISPs) and government agencies should:
A) not charge different rates on data.
B) treat data based on telecommunication providers.
C) block data traffic.
D) discriminate data based on user content.
A) not charge different rates on data.
B) treat data based on telecommunication providers.
C) block data traffic.
D) discriminate data based on user content.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is a potential drawback of telecommuting?
A) Lack of necessary supplies or equipment
B) Decreased productivity
C) Difficult work environment for employees with disabilities
D) Increased employee turnover and absenteeism
A) Lack of necessary supplies or equipment
B) Decreased productivity
C) Difficult work environment for employees with disabilities
D) Increased employee turnover and absenteeism
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Generally,_____ protect tangible material,such as books and drawings.
A) copyright laws
B) patents
C) trademarks
D) trade secrets
A) copyright laws
B) patents
C) trademarks
D) trade secrets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
In the context of intellectual property,which of the following is categorized as industrial property?
A) Copyrights
B) Artistic works
C) Literary works
D) Trademarks
A) Copyrights
B) Artistic works
C) Literary works
D) Trademarks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The 1980 revisions to the _____ of 1976 include computer programs,so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
A) Copyright Act
B) Digital Millennium Copyright Act
C) Copyright Term Extension Act
D) Telecommunications Act
A) Copyright Act
B) Digital Millennium Copyright Act
C) Copyright Term Extension Act
D) Telecommunications Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
Alfred,a software programmer at Gamma Inc.,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.
A) illegal and unethical
B) legal but unethical
C) illegal but ethical
D) legal and ethical
A) illegal and unethical
B) legal but unethical
C) illegal but ethical
D) legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
_____ laws give only the creator exclusive rights,meaning no one else can reproduce,distribute,or perform the literary and artistic work without permission.
A) Trademark
B) Trade secret
C) Patent
D) Copyright
A) Trademark
B) Trade secret
C) Patent
D) Copyright
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
_____,which are generated by Web server software,record a user's actions on a Web site.
A) Viruses
B) Spam mails
C) Image maps
D) Log files
A) Viruses
B) Spam mails
C) Image maps
D) Log files
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
_____ is registering,selling,or using a domain name to profit from someone else's trademark.
A) Sniffing
B) Phishing
C) Cybersquatting
D) Cyberbullying
A) Sniffing
B) Phishing
C) Cybersquatting
D) Cyberbullying
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
_____ information can be censored if the content is deemed offensive to a political,religious,or cultural group.
A) Public
B) Private
C) Secretive
D) Hidden
A) Public
B) Private
C) Secretive
D) Hidden
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
A potential benefit of telecommuting is that:
A) it regulates work routine.
B) it reduces employee turnover.
C) it increases interaction with coworkers.
D) it separates work and home life.
A) it regulates work routine.
B) it reduces employee turnover.
C) it increases interaction with coworkers.
D) it separates work and home life.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
Clement applies for home loan at Global Bank Inc.As part of the process,he is required to provide personal details.The banker uses Clements's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.
A) illegal and unethical
B) ethical but illegal
C) legal but unethical
D) legal and ethical
A) illegal and unethical
B) ethical but illegal
C) legal but unethical
D) legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
In the context of intellectual property,which of the following is categorized as copyrighted material?
A) Trademarks
B) Industrial designs
C) Artistic works
D) Inventions
A) Trademarks
B) Industrial designs
C) Artistic works
D) Inventions
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua.In this scenario,Jared's actions are considered _____.
A) ethical but illegal
B) legal but unethical
C) illegal and unethical
D) legal and ethical
A) ethical but illegal
B) legal but unethical
C) illegal and unethical
D) legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
The _____ was partially overturned in the 1997 Reno v.ACLU case,in which the U.S.Supreme Court unanimously voted to strike down the act's anti-obscenity provisions,finding they violated the freedom of speech provisions of the First Amendment.
A) Telecommunications Act
B) Communications Decency Act
C) Copyright Act
D) Sarbanes-Oxley Act
A) Telecommunications Act
B) Communications Decency Act
C) Copyright Act
D) Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Information technology and the Internet have,in essence,resulted in two societal groups: the information rich and the information poor.This is called the _____.
A) digital dashboard
B) cyber squat
C) digital act
D) digital divide
A) digital dashboard
B) cyber squat
C) digital act
D) digital divide
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Aaron bought a photo-editing software package.He makes two copies of the software and keeps it with himself in case the original software fails and he needs a backup.In this scenario,Aaron's actions are considered _____.
A) illegal and unethical
B) legal but unethical
C) illegal but ethical
D) legal and ethical
A) illegal and unethical
B) legal but unethical
C) illegal but ethical
D) legal and ethical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A(n) _____ is an intellectual property that protects new processes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Clerical workers using computers for word-processing tasks is an example of job _____.
A) restraining
B) upgrading
C) degrading
D) sharing
A) restraining
B) upgrading
C) degrading
D) sharing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
To guard against possible legal ramifications and the consequences of using the Web and networks,an organization usually establishes a(n) _____,which is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Job _____ occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position.
A) deskilling
B) reskilling
C) mobility
D) divide
A) deskilling
B) reskilling
C) mobility
D) divide
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.
A) Sniffing
B) Soft computing
C) Green computing
D) Cybersquatting
A) Sniffing
B) Soft computing
C) Green computing
D) Cybersquatting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
_____ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
_____ organizations are networks of independent companies,suppliers,customers,and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
_____,also known as virtual work,has enabled some people to perform their jobs from home.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) _____ is an intellectual property that protects product names and identifying marks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
_____ are small text files with a unique ID tag that are embedded in a Web browser and saved on the user's hard drive.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
_____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
_____ are small text files that make it possible for Web sites to customize pages for users.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
_____ is computing that promotes a sustainable environment and consumes the least amount of energy.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
An advantage of virtual organizations is that:
A) the time needed to develop new products increases.
B) products are customized more to respond to customers' needs.
C) the cost of hiring additional employees increases.
D) an organizational hierarchy exists for participants to contribute their expertise.
A) the time needed to develop new products increases.
B) products are customized more to respond to customers' needs.
C) the cost of hiring additional employees increases.
D) an organizational hierarchy exists for participants to contribute their expertise.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Unsolicited e-mail sent for advertising purposes is called _____.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
In which of the following ways can green computing be achieved?
A) Using computing devices that are non-biodegradable
B) Replacing meetings over computer networks with actual face-to-face meetings
C) Replacing one large server with several underutilized smaller servers
D) Using video conferencing, electronic meeting systems, and groupware
A) Using computing devices that are non-biodegradable
B) Replacing meetings over computer networks with actual face-to-face meetings
C) Replacing one large server with several underutilized smaller servers
D) Using video conferencing, electronic meeting systems, and groupware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
In the context of Web and network privacy,most organizations have new employees sign a(n) _____ before they can access the network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
The most common way to index and link databases is by using _____.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Whenever a user accesses a same domain,the browser sends saved information to the _____.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
In the context of intellectual properties,inventions are categorized as _____ properties.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck