Filters
Question type

Study Flashcards

Web beacons are tiny,invisible software programs hidden in e-mail messages and web pages that are used to track and report a user's online behavior.

Correct Answer

verifed

verified

Which of the following is not a difficulty in establishing patent protection?


A) Length of time required to receive protection
B) The requirement that the work reflect some special understanding and contribution
C) The requirement that the work must be original
D) The requirement that the work must be novel
E) The requirement that the work must be a secret

Correct Answer

verifed

verified

Which of the following best describes Immanuel Kant's categorical imperative?


A) If an action cannot be taken repeatedly,then it is not right to be taken at any time.
B) One should take the action that produces the least harm or incurs the least cost.
C) One can put values in rank order and understand the consequences of various courses of action.
D) If an action is not right for everyone to take,it is not right for anyone to take.
E) You should act towards others as you would like them to act towards you.

Correct Answer

verifed

verified

________ is a feature of law-governed society and involves having laws that are known and understood,along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.


A) Liability
B) Due process
C) Responsibility
D) Accountability
E) The judicial system

Correct Answer

verifed

verified

What do you consider to be the primary ethical,social,and political issues regarding the quality of a software product?

Correct Answer

verifed

verified

Student answers will vary,but should inc...

View Answer

CVS refers to:


A) eyestrain related to computer display screen use.
B) a business practice that attempts to evaluate the intangible values of computer systems.
C) carpal vision syndrome.
D) a type of antivirus protection software.
E) wrist injuries brought about by incorrect hand position when using a keyboard.

Correct Answer

verifed

verified

Which of the following best describes how new information systems can result in legal gray areas?


A) They work with networked,digital data,which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.
E) They are little understood by politicians or lawyers.

Correct Answer

verifed

verified

When a cookie is created during a website visit,it is stored:


A) on the website's server.
B) on the hard drive of the visitor's computer.
C) on the ISP's servers.
D) in the browser's application settings.
E) nowhere,because they are only used during a visit and are discarded once a visitor leaves the Web site.

Correct Answer

verifed

verified

A man steals from a grocery store in order to feed his starving family.Which of the following best expresses the utilitarian principle in evaluating this situation?


A) His action is acceptable,because the grocer suffers the least harm.
B) His action is acceptable,because the higher social value is the survival of the family.
C) His action is wrong,because the man would not want the grocer to steal from him.
D) His action is wrong,because if everyone were to do this,the concept of personal property is defeated.
E) His action is wrong,because the grocery store owner is harmed.

Correct Answer

verifed

verified

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?


A) CVS
B) Technostress
C) Digital divide
D) RSI
E) CTS

Correct Answer

verifed

verified

Copyright is a legal protection given to creators of certain types of intellectual property.

Correct Answer

verifed

verified

Software programs were unprotected by copyright law until the early 1990s.

Correct Answer

verifed

verified

Describe how a cookie works.

Correct Answer

verifed

verified

A cookie works as follows: A user opens ...

View Answer

The ethical "no free lunch" rule states that:


A) if an action cannot be taken repeatedly,then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if something someone else has created is useful to you,it has value,and you should assume the creator wants compensation for this work.
E) if an action is not right for everyone to take,it is not right for anyone to take.

Correct Answer

verifed

verified

Routine violations of individual privacy are made more difficult by advances in data storage.

Correct Answer

verifed

verified

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?


A) HIPAA
B) FIP
C) NORA
D) COPPA
E) Spyware

Correct Answer

verifed

verified

Identify the five moral dimensions that are involved in political,social,and ethical issues and briefly describe each.Of these,which do you think is the most difficult for society to deal with? Support your opinion.

Correct Answer

verifed

verified

The five moral dimensions are:
(1)Inform...

View Answer

Which of the following is not true about the changes to EU data protection rules proposed in 2012?


A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.
B) The new rules would require Internet companies to delete information at the user's request.
C) The new rules would require Internet companies to retain information only as long as absolutely necessary.
D) The new rules would reject the right to be forgotten.
E) The new rules would apply only to all companies providing services in Europe.

Correct Answer

verifed

verified

TRUSTe is an example of which of the following?


A) Web beacon
B) Behavioral targeting program
C) Opt-out program
D) Spyware
E) Online seal program

Correct Answer

verifed

verified

Which of the following is not a file-sharing service?


A) The Pirate Bay
B) Megaupload
C) Morpheus
D) Pandora
E) Grokster

Correct Answer

verifed

verified

Showing 41 - 60 of 100

Related Exams

Show Answer