KXO101题库.doc

上传人:s****u 文档编号:12806886 上传时间:2020-05-25 格式:DOC 页数:317 大小:909.50KB
返回 下载 相关 举报
KXO101题库.doc_第1页
第1页 / 共317页
KXO101题库.doc_第2页
第2页 / 共317页
KXO101题库.doc_第3页
第3页 / 共317页
点击查看更多>>
资源描述
2. (10 point(s) The strength of patent protection is that it: a. puts the strength of law behind copyright. b. allows protection from Internet theft of ideas put forth publicly. c. is easy to define. d. grants a monopoly on the underlying concepts and ideas. Save Answer 3. (10 point(s) Look and feel copyright infringement lawsuits are concerned with: a. copying graphical elements of a product. b. the distinction between an idea and its expression. c. the distinction between tangible and intangible ideas. d. copying creative elements of a product. Save Answer 4. (10 point(s) The chapters case study on the effect of Internet use on school-age children associates a higher use of the Internet with: a. development of a wider variety of meaningful relationships. b. increased meaningful relationships. c. increased exposure to advertising. d. lower socialization and interpersonal communications. Save Answer 5. (10 point(s) European privacy protection is _ than in the United States. a. less far-reaching b. much more stringent c. much less stringent d. less liable to laws Save Answer 6. (10 point(s) The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that: a. Web sites must disclose their information practices before collecting data. b. there is a mechanism in place to enforce FIP principles. c. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. d. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. Save Answer 7. (10 point(s) The cases of Enron, Worldcom, Parmalat, and Bristol-Meyers Squibb are examples of failed ethical judgment by information systems managers.True False Save Answer 8. (10 point(s) The U.S. CAN-SPAM Act of 2003: a. makes spamming illegal. b. does not override state anti-spamming laws. c. requires spammers to identify themselves. d. has dramatically cut down spamming. Save Answer 9. (10 point(s) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as: a. accountability. b. responsibility. c. liability. d. due process. Save Answer 10. (10 point(s) Radiation from computer display screens has been proved to be a factor in CVS.True False 1. (10 point(s) The four key technical trends responsible for current ethical stresses related to information technology are: a. doubling of computer power every 18 months, declining data storage costs, data analysis advances, ease in file sharing and copying. b. doubling of computer power every 18 months, declining data storage costs, data analysis advances, lack of international standards for data protection. c. doubling of computer power every 18 months, declining data storage costs, data analysis advances, networking advances and the Internet. d. doubling of computer power every 18 months, data analysis advances, networking advances, the Internet. Save Answer 2. (10 point(s) Radiation from computer display screens has been proved to be a factor in CVS.True False Save Answer 3. (10 point(s) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If one used the Utilitarian Principle to evaluate this situation, you might argue that: a. stealing the food is wrong, because the man would not want the grocery to steal from him. b. stealing the food is acceptable, because the higher value is the survival of the family. c. stealing the food is wrong, because if everyone were to do this, the concept of personal property is defeated. d. stealing the food is acceptable, because the grocer suffers the least harm. Save Answer 4. (10 point(s) The moral dimensions of the information society: a. cut across individual, social, and political levels of actions. b. are primarily addressed by existing intellectual property rights laws. c. are predominantly quality-of-life issues. d. are geographically and politically biased. Save Answer 5. (10 point(s) Cookies are designed to directly obtain the names and addresses of Web site visitors.True False Save Answer 6. (10 point(s) The limitation of trade secret protection is that although virtually all software programs of any complexity contain unique elements of some sort, it is difficult to prevent the ideas in the work from falling into the public domain when:a. the software is widely distributed. b. a new version of the software is released. c. the software is open source. d. the software is released. Save Answer 7. (10 point(s) The European Parliament has passed a ban on unsolicited commercial messaging.True False Save Answer 8. (10 point(s) The ethical no free lunch rule states that:a. one should take the action that produces the least harm or incurs the least cost. b. everything is owned by someone else, and that the creator wants compensation for this work. c. one can put values in rank order and understand the consequences of various courses of action. d. if an action cannot be taken repeatedly, then it is not right to be taken at any time. Save Answer 9. (10 point(s) Information systems:a. raise new ethical questions. b. raise ethical questions primarily related to information rights and obligations. c. raise the same ethical questions created by the industrial revolution. d. pose traditional ethical situations in new manners. Save Answer 10. (10 point(s) The Online Privacy Alliance: a. is a government agency regulating the use of customer information. b. encourages self-regulation to develop a set of privacy guidelines for its members. c. has established technical guidelines for ensuring privacy. d. protects user privacy during interactions with Web sites.1. (10 point(s) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called: a. targeting. b. spyware. c. spamming. d. profiling. Save Answer 2. (10 point(s) FIP principles are based on the notion of: a. mutuality of interest. b. accountability. c. responsibility. d. ethical behavior. Save Answer 3. (10 point(s) European privacy protection is _ than in the United States. a. much more stringent b. less far-reaching c. much less stringent d. less liable to laws Save Answer 4. (10 point(s) The moral dimensions of the information society: a. are geographically and politically biased. b. are primarily addressed by existing intellectual property rights laws. c. are predominantly quality-of-life issues. d. cut across individual, social, and political levels of actions. Save Answer 5. (10 point(s) Which of the following is stress induced by computer use, and its symptoms include aggravation, hostility toward humans, impatience, and enervation? a. CVS b. Carpal tunnel syndrome c. Computer stress d. Technostress Save Answer 6. (10 point(s) The ethical no free lunch rule states that: a. everything is owned by someone else, and that the creator wants compensation for this work. b. one can put values in rank order and understand the consequences of various courses of action. c. if an action cannot be taken repeatedly, then it is not right to be taken at any time. d. one should take the action that produces the least harm or incurs the least cost. Save Answer 7. (10 point(s) Spyware is software that comes hidden in free downloadable software and can track your online movements.True False Save Answer 8. (10 point(s) Cookies are designed to directly obtain the names and addresses of Web site visitors.True False Save Answer 9. (10 point(s) Standards for ensuring the accuracy and reliability of any corporate information systems are enforced through the Gramm-Leach-Bliley Act.True False Save Answer 10. (10 point(s) A colleague of yours frequently takes small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? a. The No free lunch rule b. Kants Categorical Imperative c. The Golden Rule d. Descartes Rule of Change1. (10 point(s) The ethical rules discussed in the textbook: a. do not allow for competing values. b. do not always apply in an e-commerce situation. c. are based on political philosophies. d. cannot always be guides to actions. Save Answer 2. (10 point(s) Spyware is software that comes hidden in free downloadable software and can track your online movements.True False Save Answer 3. (10 point(s) The practice of spamming has been growing because: a. it is unregulated. b. it is so inexpensive and can reach so many people. c. it is good advertising practice and brings in many new customers. d. it helps pay for the Internet. Save Answer 4. (10 point(s) Immanuel Kants Categorical Imperative states that: a. if an action cannot be taken repeatedly, then it is not right to be taken at any time. b. if an action is not right for everyone to take, it is not right for anyone to take. c. one can put values in rank order and understand the consequences of various courses of action. d. one should take the action that produces the least harm or incurs the least cost. Save Answer 5. (10 point(s) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of: a. accountability and control. b. information rights and obligations. c. system quality. d. property rights and obligations. Save Answer 6. (10 point(s) When a cookie is created during a Web site visit, it is stored: a. on the visitors computer. b. on the Web site computer. c. in a Web directory. d. on the ISPs computer. Save Answer 7. (10 point(s) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: a. due process. b. courts of appeal. c. liability. d. FOI appeals. Save Answer 8. (10 point(s) Which of the following is stress induced by computer use, and its symptoms include aggravation, hostility toward humans, impatience, and enervation? a. Carpal tunnel syndrome b. Computer stress c. CVS d. Technostress Save Answer 9. (10 point(s) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.True False Save Answer 10. (10 point(s) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:a. spyware. b. targeting. c. profiling. d. spamming.1. (10 point(s) CVS refers to: a. computer virus syndrome. b. wrist injuries brought about by incorrect hand position when using a keyboard. c. cardiovascular stress induced by technology. d. eyestrain related to computer display screen use. Save Answer 2. (10 point(s) Standards for ensuring the accuracy and reliability of any corporate information systems are enforced through the Gramm-Leach-Bliley Act.True False Save Answer 3. (10 point(s) Which of the following refers to large disparities in access to computers and the Internet among different social groups and different locations? a. Computer divide b. Digital divide c. Information divide d. Technology divide Save Answer 4. (10 point(s) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.True False Save Answer 5. (10 point(s) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: a. FOI appeals. b. liability. c. due process. d. courts of appeal. Save Answer 6. (10 point(s) The P3P standard is concerned with protecting privacy by:a. scrambling data so that it cant be read. b. blocking or limiting cookies. c. controlling pop-up ads based on user profiles and preventing ads from collecting or sending information. d. allowing users to surf the Web anonymously. Save Answer 7. (10 point(s) _ are not held liable for the messages they transmit. a. Regulated common carriers b. Private individuals c. Congressional delegates d. Organizations and businesses Save Answer 8. (10 point(s) According to the courts, in the creation of unique software, similar concepts, general functional features, and even colors are protectable by copyright law.True False Save Answer 9. (10 point(s) Immanuel Kants Categorical Imperative states that: a. if an action is not right for everyone to take, it is not right for anyone to take. b. one should take the action that produces the least harm or incurs the least cost. c. if an action cannot be taken repeatedly, then it is not right to be taken at any time. d. one can put values in rank order and understand the consequences of various courses of action. Save Answer 10. (10 point(s) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If one used the Utilitarian Principle to evaluate this situation, you might argue that:a. stealing the food is wrong, because if everyone were to do this, the concept of personal property is defeated. b. stealing the food is wrong, because the man would not want the grocery to steal from him. c. stealing the food is acceptable, because the grocer suffers the least harm. d. stealing the food is acceptable, because the higher value is the survival of the family1. (10 point(s) Political institutions require time to develop new laws and often require the demonstration of real harm before they act.True False 8. (10 point(s) Protection for trade secrets is enforced at the federal level.True False 9. (10 point(s) Advances in data storage techniques and rapidly declining storage costs have: a. made universal access possible. b. doubled every 18 months. c. made routine violations of privacy cheap and effective. d. doubled humanitys knowledge.5. (10 point(s) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? a. Assign responsibility. b. Identify the stakeholders. c. Identify the options you can reasonably take. d. Identify and clearly describe the facts. Save Answer 6. (10 point(s) U.S. businesses are allowed to use personal data from EU countries if they: a. make their privacy protection policies publicly available. b. make sure they comply with U.S. data protection laws. c. develop privacy protection policies that meet EU standards. d. have informed consent.8. (10 point(s) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in a product.True False 1.(10 point(s) P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.True False Save Answer 3.(10 point(s) Which of the five moral dimensions of the information age did the D.C. school bus information system raise?a. Quality of lifeb. Information rights and obligationsc. Accountability and controld. System quality Save Answer4.(10 point(s) Advances in data storage have made routine violation of individual privacy more difficult.True False Save Answer7.(10 point(s) Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?a. Privacy Actb. Electronic Communications Privacy Actc. Digital Millennium Copyright Actd. Freedom of Information ActOne of the difficulties of patent protection is: a. the years of waiting to receive it. b. digital media cannot be patented. c. assuring protection against theft. d. that only the underlying ideas are protected. Save Answer 2. (10 point(s) The FIP principles direct Web sites to disclose their information practices before collecting data.True False Save Answer 3. (10 point(s) Firms that cooperate with prosecutors may receive reduced charges against the entire firm for obstructing investigations.True False Save Answer 4. (10 point(s) Computers and information technologies potentially can destroy valuable elements of our culture in society even while they bring us benefits.True False Save Answer 5. (10 point(s) Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? a. Gramm-Leach-Bliley Act of 1999 b. Freedom of Information Act c. HIPAA of 1996 d. Privacy Act of 1974Which ethical issues will be most central if your career is in finance and accounting? a. Responsibility regarding data accuracy and quality b. Privacy issues concerning customer data c. Protecting information systems from fraud and abuse d. Enforcing corporate ethics policies Save Answer 3. (10 point(s) The key concepts in patent law are originality, novelty, and invention.True False Save Answer 4. Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.True False5.NORA is: a. profiling technology used by the EU. b. sentencing guidelines adopted in 1987 mandating stiff sentences on business executives. c. federal privacy law protecting networked data. d. a new data analysis technology that finds hidden connections between data in disparate sources.6. As discussed in the chapter case, the National Security Agencys databasing of private U.S. citizens telephone calls and subsequent hearings and judicial reviews illustrates the complexity of: a. applying due process in regards to new types of information systems such as data mining. b. a
展开阅读全文
相关资源
相关搜索

当前位置:首页 > 图纸专区 > 考试试卷


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!