rated A+ 2025/2026
Advances in data storage have made routine violation of individual privacy more difficult. -
correct answer ✔✔False
The last step in analyzing an ethical issue should be to identify the stakeholders - people who
have a vested interest in the outcome of the decision. - correct answer ✔✔False
Professionals take on special rights and obligations because of their special claims to
knowledge, wisdom, and respect. - correct answer ✔✔True
Privacy is the right to be left alone when you want to be, without surveillance or interference
from other individuals or organizations. - correct answer ✔✔True
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors
investigating financial crimes at their firm. - correct answer ✔✔False
Spyware is software that comes hidden in downloaded applications and can track your online
movements. - correct answer ✔✔True
Most Internet businesses do very little to protect the privacy of their customers. - correct
answer ✔✔True
The rate of global piracy is approximately 20%. - correct answer ✔✔False
Trade secret law does not protect the actual ideas in a work product. - correct answer ✔✔False
, Copyright is the legal protection afforded intellectual property, such as a song, book, or video
game. - correct answer ✔✔True
The Copyright Office began registering software programs in the 1990s. - correct answer
✔✔False
The drawback to copyright protection is that the underlying ideas behind the work are not
protected, only their reproduction in a product. - correct answer ✔✔True
According to the courts, the creation of software, unique concepts, general functional features,
and even colors are protectable by copyright law. - correct answer ✔✔False
The key concepts in patent law are originality, novelty, and value. - correct answer ✔✔False
Despite the passage of several laws defining and addressing computer crime, accessing a
computer system without authorization is not yet a federal crime. - correct answer ✔✔False
Any unsolicited e-mail is legally considered spam. - correct answer ✔✔False
The European Parliament has passed a ban on unsolicited commercial messaging. - correct
answer ✔✔True
The most common type of computer-related RSI is CTS. - correct answer ✔✔True
Technostress is a computer-related malady whose symptoms include fatigue. - correct answer
✔✔True