Exam 1 (4-6) Flashcards
It is not feasible for companies to produce error-free software because
it is too expensive to create perfect software.
European privacy protection is ________ than in the United States.
much more strict
Any unsolicited e-mail is legally considered spam.
False
In the United States, the claim to privacy is protected primarily by each of the following except
COPPA
According to the ________, you should take the action that produces the least harm.
Risk Aversion Principle
Which of the following best describes how new information systems result in legal gray areas?
They result in new situations that are not covered by old laws.
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
opt-out
The Do-Not-Track Act of 2011
requires firms to notify customers that they are being tracked.
What legal mechanism protects the owners of intellectual property from having their work copied by others?
copyright law
“Look and feel” copyright infringement lawsuits are concerned with
the distinction between an idea and its expression.
Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy?
Firms should limit the length of time that any personal data is stored to six months or less.
Intellectual property can best be described as
intangible property created by individuals or corporations.
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
responsibility.
________ can be induced by tens of thousands of repetitions under low-impact loads.
RSI
Technostress is a computer-related malady whose symptoms include fatigue.
True
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.
False
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
Profiling
The key concepts in patent law are originality, novelty, and value.
Flase
When a cookie is created during a Web site visit, it is stored
on the visitor’s computer.
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant’s Categorical Imperative
Specifications that establish the compatibility of products and the ability to communicate in a network are called
technology standards.
SaaS refers to
hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called
autonomic computing.