Filters
Question type

Study Flashcards

What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?

Correct Answer

verifed

verified

One answer might be that we should depen...

View Answer

What is the digital divide and how does it impact society?

Correct Answer

verifed

verified

The digital divide relates to the fact t...

View Answer

Digital media differs from a physical book in all of the following ways except:


A) ease of replication.
B) ease of alteration.
C) ease of transmission.
D) ease of global distribution.
E) ease of establishing uniqueness.

F) A) and E)
G) A) and D)

Correct Answer

verifed

verified

E

According to ________,you should take the action that produces the least harm.


A) Kant's categorical imperative
B) the risk aversion principle
C) the utilitarian principle
D) the Golden Rule
E) the "no free lunch" rule

F) A) and C)
G) A) and B)

Correct Answer

verifed

verified

B

The Online Privacy Alliance:


A) encourages self-regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with websites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.
E) is a safe harbor program established by the U.S.government.

F) A) and B)
G) C) and D)

Correct Answer

verifed

verified

FIP principles are based on a belief in which of the following?


A) Accountability of the record holder
B) Responsibility of the record holder
C) Mutuality of interest between the record holder and the individual
D) Privacy of the individual
E) Difference between the interests of the individual and commercial organizations

F) None of the above
G) B) and E)

Correct Answer

verifed

verified

The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings.

A) True
B) False

Correct Answer

verifed

verified

How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology?

Correct Answer

verifed

verified

Electronic voting machines can be seen as beneficial by making voting easy to accomplish and tabulate.However,it may be easier to tamper with electronic voting machines than with countable paper ballots.In terms of information rights,it seems possible that methods could be set up to determine how an individual has voted and to store and disseminate this knowledge.Manufacturers of voting machines claim property rights to the voting software,which means that if the software is protected from inspection,there is no regulation in how the software operates or how accurate it is.In terms of accountability and control,if an electronic voting system malfunctions,will it be the responsibility of the government,of the company manufacturing the machines or software,or the programmers who programmed the software? The dimension of system quality raises questions of how the level of accuracy of the machines is to be judged and what level is acceptable? In terms of quality of life,while it may make voting easier and quicker,does the vulnerability to abuse of these systems pose a threat to the democratic principle of one person,one vote?

What percent of global Internet users use Google Search and other Google services?


A) Less than 10 percent
B) Around 25 percent
C) About 50 percent
D) Nearly 80 percent
E) Over 90 percent

F) C) and D)
G) A) and C)

Correct Answer

verifed

verified

Which of the five moral dimensions of the information age does spamming involve?


A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Property rights and obligations

F) A) and C)
G) B) and D)

Correct Answer

verifed

verified

Which of the following U.S.laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?


A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
E) COPPA

F) B) and E)
G) All of the above

Correct Answer

verifed

verified

Which of the following is not a U.S.federal law affecting private institutions?


A) COPPA
B) HIPAA
C) Gramm-Leach-Bliley Act
D) Video Privacy Protection Act
E) Computer Matching and Privacy Protection Act

F) B) and C)
G) A) and B)

Correct Answer

verifed

verified

Although online tracking gathers an enormous amount of information on individual users,it is anonymous and can't be tied to a specific person.

A) True
B) False

Correct Answer

verifed

verified

Redesigning and automating business processes can be seen as a double-edged sword because:


A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
E) it can concentrate power in the hands of senior executives.

F) All of the above
G) D) and E)

Correct Answer

verifed

verified

All of the following laws apply to actions by the federal government except the:


A) Freedom of Information Act.
B) Privacy Act.
C) Computer Security Act.
D) Children's Online Privacy Protection Act.
E) E-Government Act.

F) C) and D)
G) A) and E)

Correct Answer

verifed

verified

In the ________ model of informed consent,personal information can be collected until the consumer specifically requests that his or her data not be collected.


A) opt-in
B) opt-out
C) P3P
D) PGP
E) safe harbor

F) A) and D)
G) All of the above

Correct Answer

verifed

verified

One of the key concepts in patent law is novelty.

A) True
B) False

Correct Answer

verifed

verified

What are some of the potential health risks associated with use of computers?

Correct Answer

verifed

verified

A common occupational disease today is r...

View Answer

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?


A) CTS
B) CVS
C) RSI
D) Technostress
E) RSS

F) A) and E)
G) A) and D)

Correct Answer

verifed

verified

Gaining unapproved access to a computer is not a federal crime.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 100

Related Exams

Show Answer