INFO 360 FINAL EXAM REVIEW QUESTIONS &
ANSWERS
They result in new situations that are not covered by old laws. - Answers - Which of
the following best describes how new information systems result in legal gray areas?
The introduction of new information technology has a: - Answers - ripple effect, raising
new ethical, social, and political issues.
In the information age, the obligations that individuals and organizations have
concerning rights to intellectual property fall within the moral dimension of: - Answers -
property rights and obligations.
In the information age, the obligations that individuals and organizations have regarding
the preservation of existing values and institutions fall within the moral dimension of: -
Answers - quality of life.
All of the following are current key technology trends raising ethical issues except: -
Answers - increase in multimedia quality.
The use of computers to combine data from multiple sources and create electronic
dossiers of detailed information on individuals is called: - Answers - profiling.
Which of the five moral dimensions of the information age do the central business
activities of ChoicePoint raise? - Answers - Information rights and obligations
NORA is a: - Answers - new data analysis technology that finds hidden connections
between data in disparate sources.
Accepting the potential costs, duties, and obligations for the decisions you make is
referred to as: - Answers - responsibility.
Which of the following is not one of the practices added in 2010 by the FTC to its
framework for privacy? - Answers - Firms should limit the length of time that any
personal data is stored to six months or less.
The feature of social institutions that means mechanisms are in place to determine
responsibility for an action is called: - Answers - accountability.
The practice in law-governed societies in which laws are known and understood, and
there is an ability to appeal to higher authorities to ensure that the laws are applied
correctly is called: - Answers - due process.
,Which of the following is not one of the five steps discussed in the chapter as a process
for analyzing an ethical issue? - Answers - Assign responsibility.
A colleague of yours frequently takes, for his own personal use, small amounts of office
supplies noting that the loss to the company is minimal. You counter that if everyone
were to take office supplies the loss would no longer be minimal. Your rationale
expresses which historical ethical principle? - Answers - Kant's Categorical Imperative
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store
in order to feed his starving family. If you used the Utilitarian Principle to evaluate this
situation, you might argue that stealing the food is: - Answers - acceptable, because
the higher value is the survival of the family.
Immanuel Kant's Categorical Imperative states that: - Answers - if an action is not right
for everyone to take, it is not right for anyone to take.
The ethical "no free lunch" rule states that: - Answers - everything is owned by
someone else, and that the creator wants compensation for this work.
According to the ________, you should take the action that produces the least harm. -
Answers - Risk Aversion Principle
Which U.S. act restricts the information the federal government can collect and
regulates what they can do with the information? - Answers - Privacy Act of 1974
FIP principles are based on the notion of the: - Answers - mutuality of interest between
the record holder and the individual.
The Federal Trade Commission FIP principle of Notice/Awareness states that: -
Answers - Web sites must disclose their information practices before collecting data.
Which of the following U.S. laws gives patients access to personal medical records and
the right to authorize how this information can be used or disclosed? - Answers -
HIPAA
European privacy protection is ________ than in the United States. - Answers - much
more stringent
U.S. businesses are allowed to use personal data from EU countries if they: - Answers
- develop equivalent privacy protection policies.
When a cookie is created during a Web site visit, it is stored: - Answers - on the
visitor's computer.
,The U.S. Department of Commerce developed a ________ framework in order to
enable U.S. businesses to legally use personal data from EU countries. - Answers -
safe-harbor
The Online Privacy Alliance: - Answers - encourages self regulation to develop a set of
privacy guidelines for its members.
A(n) ________ model of informed consent permits the collection of personal information
until the consumer specifically requests that the data not be collected. - Answers - opt-
out
Types of information gathered by Web site tracking tools include all of the following
except: - Answers - birthplace.
Which of the following statements does not describe a key difference between software
and books? - Answers - Software products are more easily compared to each other
than books.
The limitation of trade secret protection for software is that it is difficult to prevent the
ideas in the work from falling into the public domain when: - Answers - the software is
widely distributed.
Intellectual property can best be described as: - Answers - intangible property created
by individuals or corporations.
What legal mechanism protects the owners of intellectual property from having their
work copied by others? - Answers - Copyright law
"Look and feel" copyright infringement lawsuits are concerned with: - Answers - the
distinction between an idea and its expression.
The strength of patent protection is that it: - Answers - grants a monopoly on
underlying concepts and ideas.
One of the drawbacks of patent protection is: - Answers - the years of waiting to
receive it.
Which of the following adjusts copyright laws to the Internet age by making it illegal to
circumvent technology-based protections of copyrighted materials? - Answers - Digital
Millennium Copyright Act
In general, it is very difficult to hold software producers liable for their software products
when those products are considered to be: - Answers - similar to books.
________ are not held liable for the messages they transmit. - Answers - Regulated
common carriers
, It is not feasible for companies to produce error-free software because: - Answers - it
is too expensive to create perfect software.
The most common source of business system failure is: - Answers - data quality.
Flash cookies are different from ordinary cookies in that they: - Answers - cannot be
easily detected or deleted.
The "do anything anywhere" computing environment can: - Answers - blur the
traditional boundaries between work and family time.
The practice of spamming has been growing because: - Answers - it is so inexpensive
and can reach so many people.
The U.S. CAN-SPAM Act of 2003: - Answers - requires spammers to identify
themselves.
Which of the five moral dimensions of the information age does spamming raise? -
Answers - Quality of life
Re-designing and automating business processes can be seen as a double-edged
sword because: - Answers - increases in efficiency may be accompanied by job
losses.
The term "________ divide" refers to large disparities in access to computers and the
Internet among different social groups and different locations. - Answers - digital
CVS refers to: - Answers - eyestrain related to computer display screen use.
________ can be induced by tens of thousands of repetitions under low-impact loads. -
Answers - RSI
Advertisers use ________ in order to display more relevant ads based on user's search
and browsing history. - Answers - behavioral targeting
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to
take at all, is also known as: - Answers - the slippery-slope rule.
In a(n) ________ computing model, companies use their own infrastructure for essential
computing tasks and adopt public cloud computing for less critical operations or
additional processing during peak business periods. - Answers - hybrid cloud
Software that manages the resources of the computer is called: - Answers - system
software.
ANSWERS
They result in new situations that are not covered by old laws. - Answers - Which of
the following best describes how new information systems result in legal gray areas?
The introduction of new information technology has a: - Answers - ripple effect, raising
new ethical, social, and political issues.
In the information age, the obligations that individuals and organizations have
concerning rights to intellectual property fall within the moral dimension of: - Answers -
property rights and obligations.
In the information age, the obligations that individuals and organizations have regarding
the preservation of existing values and institutions fall within the moral dimension of: -
Answers - quality of life.
All of the following are current key technology trends raising ethical issues except: -
Answers - increase in multimedia quality.
The use of computers to combine data from multiple sources and create electronic
dossiers of detailed information on individuals is called: - Answers - profiling.
Which of the five moral dimensions of the information age do the central business
activities of ChoicePoint raise? - Answers - Information rights and obligations
NORA is a: - Answers - new data analysis technology that finds hidden connections
between data in disparate sources.
Accepting the potential costs, duties, and obligations for the decisions you make is
referred to as: - Answers - responsibility.
Which of the following is not one of the practices added in 2010 by the FTC to its
framework for privacy? - Answers - Firms should limit the length of time that any
personal data is stored to six months or less.
The feature of social institutions that means mechanisms are in place to determine
responsibility for an action is called: - Answers - accountability.
The practice in law-governed societies in which laws are known and understood, and
there is an ability to appeal to higher authorities to ensure that the laws are applied
correctly is called: - Answers - due process.
,Which of the following is not one of the five steps discussed in the chapter as a process
for analyzing an ethical issue? - Answers - Assign responsibility.
A colleague of yours frequently takes, for his own personal use, small amounts of office
supplies noting that the loss to the company is minimal. You counter that if everyone
were to take office supplies the loss would no longer be minimal. Your rationale
expresses which historical ethical principle? - Answers - Kant's Categorical Imperative
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store
in order to feed his starving family. If you used the Utilitarian Principle to evaluate this
situation, you might argue that stealing the food is: - Answers - acceptable, because
the higher value is the survival of the family.
Immanuel Kant's Categorical Imperative states that: - Answers - if an action is not right
for everyone to take, it is not right for anyone to take.
The ethical "no free lunch" rule states that: - Answers - everything is owned by
someone else, and that the creator wants compensation for this work.
According to the ________, you should take the action that produces the least harm. -
Answers - Risk Aversion Principle
Which U.S. act restricts the information the federal government can collect and
regulates what they can do with the information? - Answers - Privacy Act of 1974
FIP principles are based on the notion of the: - Answers - mutuality of interest between
the record holder and the individual.
The Federal Trade Commission FIP principle of Notice/Awareness states that: -
Answers - Web sites must disclose their information practices before collecting data.
Which of the following U.S. laws gives patients access to personal medical records and
the right to authorize how this information can be used or disclosed? - Answers -
HIPAA
European privacy protection is ________ than in the United States. - Answers - much
more stringent
U.S. businesses are allowed to use personal data from EU countries if they: - Answers
- develop equivalent privacy protection policies.
When a cookie is created during a Web site visit, it is stored: - Answers - on the
visitor's computer.
,The U.S. Department of Commerce developed a ________ framework in order to
enable U.S. businesses to legally use personal data from EU countries. - Answers -
safe-harbor
The Online Privacy Alliance: - Answers - encourages self regulation to develop a set of
privacy guidelines for its members.
A(n) ________ model of informed consent permits the collection of personal information
until the consumer specifically requests that the data not be collected. - Answers - opt-
out
Types of information gathered by Web site tracking tools include all of the following
except: - Answers - birthplace.
Which of the following statements does not describe a key difference between software
and books? - Answers - Software products are more easily compared to each other
than books.
The limitation of trade secret protection for software is that it is difficult to prevent the
ideas in the work from falling into the public domain when: - Answers - the software is
widely distributed.
Intellectual property can best be described as: - Answers - intangible property created
by individuals or corporations.
What legal mechanism protects the owners of intellectual property from having their
work copied by others? - Answers - Copyright law
"Look and feel" copyright infringement lawsuits are concerned with: - Answers - the
distinction between an idea and its expression.
The strength of patent protection is that it: - Answers - grants a monopoly on
underlying concepts and ideas.
One of the drawbacks of patent protection is: - Answers - the years of waiting to
receive it.
Which of the following adjusts copyright laws to the Internet age by making it illegal to
circumvent technology-based protections of copyrighted materials? - Answers - Digital
Millennium Copyright Act
In general, it is very difficult to hold software producers liable for their software products
when those products are considered to be: - Answers - similar to books.
________ are not held liable for the messages they transmit. - Answers - Regulated
common carriers
, It is not feasible for companies to produce error-free software because: - Answers - it
is too expensive to create perfect software.
The most common source of business system failure is: - Answers - data quality.
Flash cookies are different from ordinary cookies in that they: - Answers - cannot be
easily detected or deleted.
The "do anything anywhere" computing environment can: - Answers - blur the
traditional boundaries between work and family time.
The practice of spamming has been growing because: - Answers - it is so inexpensive
and can reach so many people.
The U.S. CAN-SPAM Act of 2003: - Answers - requires spammers to identify
themselves.
Which of the five moral dimensions of the information age does spamming raise? -
Answers - Quality of life
Re-designing and automating business processes can be seen as a double-edged
sword because: - Answers - increases in efficiency may be accompanied by job
losses.
The term "________ divide" refers to large disparities in access to computers and the
Internet among different social groups and different locations. - Answers - digital
CVS refers to: - Answers - eyestrain related to computer display screen use.
________ can be induced by tens of thousands of repetitions under low-impact loads. -
Answers - RSI
Advertisers use ________ in order to display more relevant ads based on user's search
and browsing history. - Answers - behavioral targeting
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to
take at all, is also known as: - Answers - the slippery-slope rule.
In a(n) ________ computing model, companies use their own infrastructure for essential
computing tasks and adopt public cloud computing for less critical operations or
additional processing during peak business periods. - Answers - hybrid cloud
Software that manages the resources of the computer is called: - Answers - system
software.