Filters
Question type

Study Flashcards

With employee-monitoring systems, managers can supervise employees' work speeds.

A) True
B) False

Correct Answer

verifed

verified

In the context of intellectual property, which of the following is categorized as copyrighted material?


A) Trademarks
B) Industrial designs
C) Artistic works
D) Inventions

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.


A) information barrier
B) domain squat
C) data junction
D) digital divide

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.


A) phishing
B) nonrepudiation
C) spoofing
D) accountability

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Private information on the Web-what is posted by a person-is subject to censorship.

A) True
B) False

Correct Answer

verifed

verified

Green computing helps an organization save on energy costs.

A) True
B) False

Correct Answer

verifed

verified

In the context of information privacy, junk e-mail is also known as _____.


A) cookie
B) bookmark
C) spam
D) draft

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Identify a true statement about copyright laws.


A) They protect new processes.
B) They protect product names.
C) They protect tangible material, such as books.
D) They protect product identifying marks, such as logos.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.


A) cybersquatting
B) censorship
C) copyright
D) spamming

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.


A) Cloud computing
B) Mobile computing
C) Green computing
D) Natural computing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A common way to index and link databases is by using__________.


A) key customer numbers
B) Virtual Account numbers
C) Social Security numbers
D) protected electronic numbers
E) Select

F) A) and B)
G) D) and E)

Correct Answer

verifed

verified

To minimize the invasion of privacy, users and organizations should:


A) provide wrong data to unauthorized users.
B) use verification procedures to ensure data accuracy.
C) keep collected information even after the stated purpose is over.
D) provide access to one's personal information to all interested parties.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

In the context of Web and network privacy issues, new employees in an organization have to sign a(n) __________before they access the network.


A) acceptable use policy
B) standard data policy
C) article ownership policy
D) user content policy
E) Select

F) C) and D)
G) A) and C)

Correct Answer

verifed

verified

In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.


A) job restraining
B) job upgrading
C) job deskilling
D) job sharing

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Identify a true statement about information and communications technology (ICT) .


A) It generates approximately six percent of the world's greenhouse gases.
B) It generates approximately two percent of the world's carbon dioxide emissions.
C) It helps organizations save energy costs.
D) It improves the quality of the environment in which you work.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.

A) True
B) False

Correct Answer

verifed

verified

According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____.


A) cease charging different rates on data
B) treat data based on the types of application
C) start blocking data traffic to specific users
D) discriminate data based on content

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following is true of virtual organizations?


A) They need central offices for participants to contribute their expertise.
B) They are networks of dependent companies and manufacturers connected via information technologies.
C) They let independent suppliers share skills and have access to each other's markets via information technologies.
D) They need an organizational hierarchy for participants to contribute their expertise.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.


A) ethical, but illegal
B) unethical, but legal
C) illegal and unethical
D) legal and ethical

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

_____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.


A) Public
B) Private
C) Secretive
D) Abstracted

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 40 of 80

Related Exams

Show Answer