Filters
Question type

Study Flashcards

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.


A) safe harbor
B) opt-in
C) FIP
D) P3P

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

It is not feasible for companies to produce error-free software because:


A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

According to the ________, you should take the action that produces the least harm.


A) Categorical Imperative
B) Risk Aversion Principle
C) Utilitarian Principle
D) Golden Rule

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

A) True
B) False

Correct Answer

verifed

verified

When a cookie is created during a Web site visit, it is stored:


A) on the Web site computer.
B) on the visitor's computer.
C) on the ISP's computer.
D) in a Web directory.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The ethical "no free lunch" rule states that:


A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) everything is owned by someone else, and that the creator wants compensation for this work.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following best describes how new information systems result in legal gray areas?


A) They work with networked, electronic data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Any unsolicited e-mail is legally considered spam.

A) True
B) False

Correct Answer

verifed

verified

The Copyright Office began registering software programs in the 1990s.

A) True
B) False

Correct Answer

verifed

verified

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 90 of 90

Related Exams

Show Answer