Filters
Question type

Study Flashcards

The _____ was partially overturned in the 1997 Reno v.ACLU case,in which the U.S.Supreme Court unanimously voted to strike down the act's anti-obscenity provisions,finding they violated the freedom of speech provisions of the First Amendment.


A) Telecommunications Act
B) Communications Decency Act
C) Copyright Act
D) Sarbanes-Oxley Act

Correct Answer

verifed

verified

To minimize the invasion of privacy,the existence of record-keeping systems storing personal data should not:


A) be kept secret.
B) have a stated purpose.
C) be up-to-date.
D) be restricted.

Correct Answer

verifed

verified

Organizations should keep collected information only as long as:


A) it can be reproduced.
B) it is needed for the stated purpose.
C) it can be manipulated.
D) it is abstract and incoherent.

Correct Answer

verifed

verified

_____ involves the design,manufacture,use,and disposal of computers and servers in such a way that there is minimal impact on the environment.


A) Sniffing
B) Soft computing
C) Green computing
D) Cybersquatting

Correct Answer

verifed

verified

Aaron bought a photo-editing software package.He makes two copies of the software and keeps it with himself in case the original software fails and he needs a backup.In this scenario,Aaron's actions are considered _____.


A) illegal and unethical
B) legal but unethical
C) illegal but ethical
D) legal and ethical

Correct Answer

verifed

verified

In the context of intellectual property,which of the following is categorized as industrial property?


A) Copyrights
B) Artistic works
C) Literary works
D) Trademarks

Correct Answer

verifed

verified

When can public information be censored?

Correct Answer

verifed

verified

Public information,posted by an organiza...

View Answer

Describe ways to solve health problems related to computer equipment.

Correct Answer

verifed

verified

Ergonomics experts believe that using be...

View Answer

A patent protects product names and identifying marks.

Correct Answer

verifed

verified

_____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.

Correct Answer

verifed

verified

Information technology and the Internet have,in essence,resulted in two societal groups: the information rich and the information poor.This is called the _____.


A) digital dashboard
B) cyber squat
C) digital act
D) digital divide

Correct Answer

verifed

verified

_____ is computing that promotes a sustainable environment and consumes the least amount of energy.

Correct Answer

verifed

verified

Alfred,a software programmer at Gamma Inc.,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.


A) illegal and unethical
B) legal but unethical
C) illegal but ethical
D) legal and ethical

Correct Answer

verifed

verified

To minimize the invasion of privacy,users and organizations should:


A) enable access to one's personal information to all interested parties.
B) keep collected information even after the stated purpose is over.
C) use verification procedures to ensure data accuracy.
D) collect both necessary and unnecessary data.

Correct Answer

verifed

verified

One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.

Correct Answer

verifed

verified

Define the two categories of intellectual property.

Correct Answer

verifed

verified

Intellectual property can be divided int...

View Answer

What are some of the causes of health issues related to information technology?

Correct Answer

verifed

verified

Work habits can cause some physical prob...

View Answer

In the context of Web and network privacy,_____ refers to issues involving both the user's and the organization's responsibilities and liabilities.


A) phishing
B) nonrepudiation
C) spoofing
D) accountability

Correct Answer

verifed

verified

What is the length of copyright and patents in the United States?

Correct Answer

verifed

verified

The length of copyright varies based on ...

View Answer

Clement applies for home loan at Global Bank Inc.As part of the process,he is required to provide personal details.The banker uses Clements's personal information to sell him insurance policies.In this scenario,the banker's action is considered _____.


A) illegal and unethical
B) ethical but illegal
C) legal but unethical
D) legal and ethical

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer