Filters
Question type

Study Flashcards

Discuss the history of Apple's and Samsung's patent battle against each other.

Correct Answer

verifed

verified

In 2011,Apple sued Samsung for violating...

View Answer

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?


A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Property rights and obligations

F) A) and B)
G) D) and E)

Correct Answer

verifed

verified

"Look and feel" copyright infringement lawsuits are concerned with:


A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) violation of a monopoly on the ideas behind a product.

F) A) and B)
G) D) and E)

Correct Answer

verifed

verified

B

Because of their special claims to knowledge,wisdom,and respect,professionals take on special rights and obligations.

A) True
B) False

Correct Answer

verifed

verified

________ means that you accept the potential costs and obligations for the decisions you make.


A) Responsibility
B) Accountability
C) Liability
D) Due process
E) Duty

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

According to ________,you should take the action that produces the least harm.


A) Kant's categorical imperative
B) the risk aversion principle
C) the utilitarian principle
D) the Golden Rule
E) the "no free lunch" rule

F) C) and E)
G) None of the above

Correct Answer

verifed

verified

B

________ are not held liable for the messages they transmit.


A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs

F) All of the above
G) A) and B)

Correct Answer

verifed

verified

European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

A) True
B) False

Correct Answer

verifed

verified

True

CVS refers to:


A) eyestrain related to computer display screen use.
B) a business practice that attempts to evaluate the intangible values of computer systems.
C) carpal vision syndrome.
D) a type of antivirus protection software.
E) wrist injuries brought about by incorrect hand position when using a keyboard.

F) B) and E)
G) B) and D)

Correct Answer

verifed

verified

All of the following laws apply to actions by the federal government except the:


A) Freedom of Information Act.
B) Privacy Act.
C) Computer Security Act.
D) Children's Online Privacy Protection Act.
E) E-Government Act.

F) None of the above
G) C) and D)

Correct Answer

verifed

verified

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

A) True
B) False

Correct Answer

verifed

verified

Identify and discuss the six ethical principles discussed in the chapter.

Correct Answer

verifed

verified

The six ethical principles are the Golde...

View Answer

Which of the following resulted in a Christmas Eve outage for millions of Netflix customers?


A) A failure of Amazon's cloud computing service
B) A failure of Netflix's recommendation engine software
C) A blackout at Netflix's primary data center
D) A hacking attack
E) A bug in Netflix's credit card processing system

F) C) and D)
G) B) and E)

Correct Answer

verifed

verified

Which of the following were involved in what has been called the patent trial of the century?


A) Apple and Microsoft
B) Apple and Hewlett-Packard
C) Microsoft and Symantec
D) Microsoft and Facebook
E) Apple and Samsung

F) D) and E)
G) B) and E)

Correct Answer

verifed

verified

How does protection of privacy in Europe differ from the United States?

Correct Answer

verifed

verified

In Europe,privacy protection is much mor...

View Answer

Gaining unapproved access to a computer is not a federal crime.

A) True
B) False

Correct Answer

verifed

verified

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?


A) Family and home
B) Property rights and obligations
C) System quality
D) Accountability and control
E) Quality of life

F) C) and E)
G) C) and D)

Correct Answer

verifed

verified

Routine violations of individual privacy are made easier by advances in data storage.

A) True
B) False

Correct Answer

verifed

verified

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.

A) True
B) False

Correct Answer

verifed

verified

All of the following are technical solutions to protecting user privacy except:


A) email encryption.
B) anonymous surfing.
C) anonymous email.
D) preventing client computers from accepting cookies.
E) data use policies.

F) B) and E)
G) B) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 101

Related Exams

Show Answer