Filters
Question type

Study Flashcards

The ethical "no free lunch" rule states that:


A) if an action cannot be taken repeatedly,then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if something someone else has created is useful to you,it has value,and you should assume the creator wants compensation for this work.
E) if an action is not right for everyone to take,it is not right for anyone to take.

Correct Answer

verifed

verified

The ________ is a feature of the GDPR that allows individuals to have their personal information removed from social network and search sites.


A) right to opt-out of data collection
B) right to a safe harbor
C) right to be forgotten
D) right to do not track
E) right to opt-in to data collection

Correct Answer

verifed

verified

What are Fair Information Practices (FIP)established by the Federal Trade Commission (FTC)?

Correct Answer

verifed

verified

1.Notice/awareness (core principle).Webs...

View Answer

The FIP principle of Notice/Awareness states that:


A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C) there must be a mechanism in place to enforce FIP principles.
D) consumers should be able to review the data collected about them.
E) websites must disclose their information practices before collecting data.

Correct Answer

verifed

verified

Which of the following is not an example of the moral dimensions of the information age identified in the text?


A) Information rights and obligations
B) The emergence of giant tech firms that dominate their markets
C) Accountability and control
D) System quality
E) Quality of life

Correct Answer

verifed

verified

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

Correct Answer

verifed

verified

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?


A) Profiling
B) Phishing
C) Spamming
D) Targeting
E) Spyware

Correct Answer

verifed

verified

What is not a feature of the General Data Protection Regulation (GDPR) ?


A) It applies to all firms doing business in the EU.
B) It requires unambiguous consent for using personal data to construct profiles.
C) It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue.
D) It creates a single EU privacy policy.
E) It prevents firms from using cookies.

Correct Answer

verifed

verified

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

Correct Answer

verifed

verified

Most Internet businesses do very little to protect the privacy of their customers.

Correct Answer

verifed

verified

Which ethical rule states that if an action cannot be taken repeatedly,it is not right to take at all?


A) Slippery-slope rule
B) Lemming rule
C) High-failure cost rule
D) Utilitarian principle
E) Golden Rule

Correct Answer

verifed

verified

Which of the following statements about spam is not true?


A) Most spam originates from bot networks.
B) Cell phone spam usually comes in the form of SMS text messages.
C) Spam costs for business are very high.
D) Spamming has mushroomed because it is so inexpensive and can reach so many people.
E) Spamming is more tightly regulated in the United States than in Europe.

Correct Answer

verifed

verified

What are the steps in conducting an ethical analysis?

Correct Answer

verifed

verified

The steps are: (1)Identify and describe ...

View Answer

Describe how a cookie works.

Correct Answer

verifed

verified

A cookie works as follows: A user opens ...

View Answer

Which of the following best describes how new information systems can result in legal gray areas?


A) They work with networked,digital data,which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.
E) They are little understood by politicians or lawyers.

Correct Answer

verifed

verified

Web beacons are tiny,invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.

Correct Answer

verifed

verified

The European Parliament has banned unsolicited commercial messaging.

Correct Answer

verifed

verified

Which of the following ethical guidelines suggests that you put yourself in the place of others,and think of yourself as the object of the decision?


A) Kant's categorical imperative
B) the risk aversion principle
C) the utilitarian principle
D) the Golden Rule
E) the "no free lunch" rule

Correct Answer

verifed

verified

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.


A) Copyright law
B) Trademark law
C) Patent law
D) Trade secret protection
E) Privacy law

Correct Answer

verifed

verified

The U.S.CAN-SPAM Act:


A) makes spamming illegal.
B) requires commercial email senders to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.
E) does not outlaw the use of fake return addresses.

Correct Answer

verifed

verified

Showing 81 - 100 of 101

Related Exams

Show Answer