Filters
Question type

Study Flashcards

Identify a true statement about copyright laws.


A) They protect new processes.
B) They protect product names.
C) They protect tangible material, such as books.
D) They protect product identifying marks, such as logos.

Correct Answer

verifed

verified

The General Data Protection Regulation (GDPR)only applies to select EU member states.

Correct Answer

verifed

verified

In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _____ .


A) a virus
B) a bug
C) spam
D) a cookie

Correct Answer

verifed

verified

Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.


A) illegal and unethical
B) legal, but unethical
C) illegal, but ethical
D) legal and ethical

Correct Answer

verifed

verified

Job deskilling occurs when:


A) experienced labor is eliminated by high technology.
B) a worker is promoted from a semiskilled to a skilled position.
C) a job is carried out manually.
D) fragmented jobs are combined as a whole.

Correct Answer

verifed

verified

Discuss the concept of typosquatting.

Correct Answer

verifed

verified

Answers will vary. A variation of cybers...

View Answer

A virtual organization needs an organizational hierarchy for participants to contribute their expertise.

Correct Answer

verifed

verified

Which of the following is not a key component of the General Data Protection Regulation (GDPR) ?


A) User consent must be given for processing of personal information.
B) Collected data must be anonymized to protect privacy.
C) Ease of use.
D) Safe data transfer across borders.

Correct Answer

verifed

verified

Under the GDPR, the ability for a user to transfer personal data between service providers is called _________. ​


A) "the right to portability"
B) "the right to switch"
C) "the data transfer protocol"
D) "the service provider switch"

Correct Answer

verifed

verified

Identify a true statement about data collected on the Web.


A) It must be used and interpreted with caution.
B) It must be sold to telemarketing firms.
C) Users supply truthful answers to online surveys.
D) Personal information is never used without the user's consent.

Correct Answer

verifed

verified

List five advantages of virtual organizations.

Correct Answer

verifed

verified

Answers will vary. Advantages of virtual...

View Answer

Which is true of virtual organizations?


A) They need central offices for participants to contribute their expertise.
B) They are networks of dependent companies and manufacturers connected via information technologies.
C) They let independent suppliers share skills and have access to each other's markets via information technologies.
D) They need an organizational hierarchy for participants to contribute their expertise.

Correct Answer

verifed

verified

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.


A) ethical, but illegal
B) unethical, but legal
C) illegal and unethical
D) legal and ethical

Correct Answer

verifed

verified

To minimize the invasion of privacy, users and organizations should:


A) provide wrong data to unauthorized users.
B) use verification procedures to ensure data accuracy.
C) keep collected information even after the stated purpose is over.
D) provide access to one's personal information to all interested parties.

Correct Answer

verifed

verified

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.


A) credit cards
B) e-checks
C) debit cards
D) e-wallets

Correct Answer

verifed

verified

To ensure privacy and accuracy, organizations should allow users to review and correct collected data.

Correct Answer

verifed

verified

The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:


A) safeguarding health insurers' credit information.
B) protecting medical providers' notes and records.
C) protecting patients' bank information.
D) safeguarding conversations between patients and their families.

Correct Answer

verifed

verified

Which can help offset the digital divide?


A) Increasing the speed of the Internet for the information rich
B) Increasing the number of computers in public places
C) Reducing the number of computer equipment at schools
D) Reducing the Internet bandwidth for the information poor

Correct Answer

verifed

verified

Identify a true statement about the General Data Protection Regulation (GDPR) .


A)
If any organization's Web site collects any of the regulated data from EU users, it is liable to comply to GDPR.
B)
If any EU organization's Web site collects any of the regulated data from US users, it is liable to comply to GDPR.
C)
If any US organization's Web site collects any of the regulated data from US users, it is liable to comply to GDPR.
D)
If any organization's Web site collects any of the regulated data from users worldwide, it is liable to comply to GDPR.

Correct Answer

verifed

verified

What kind of computing promotes a sustainable environment and consumes the least amount of energy?


A) Digital computing
B) Soft computing
C) Green computing
D) Cyber computing

Correct Answer

verifed

verified

Showing 81 - 100 of 124

Related Exams

Show Answer