Exam Name___________________________________ 1. Violation of copyrights on the Internet is a major problem for creators and distributors of intellectual property such as movies, music, and books. Answer:
True False
Diff: 1
Type: TF Page Ref: 718 Objective:
2. Business ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment. Answer:
True False
Diff: 2
Type: TF Page Ref: 719 Objective:
3. Acts or activities that are unethical are also illegal. Answer: True
False
Diff: 1
Type: TF Page Ref: 719 Objective:
4. The USA PATRIOT Act allows employers to monitor their electronic workplace. Answer: True
False
Diff: 2
Type: TF Page Ref: 720 Objective:
5. According to a survey conducted by the 24/7 Wall St. Company, workers spend approximately 12 hours online each week on personal matters during work. Answer: True
False
Diff: 2
Type: TF Page Ref: 720 Objective:
6. A corporate code of ethics should specify whether the company allows employees to set up their own Web pages on the company intranet and the rules for private e-mail usage during working hours.
Answer:
True False
Diff: 2
Type: TF Page Ref: 722 Objective:
7. EC Web site content needs to be reviewed by attorneys with cyberlaw expertise to ensure that there is nothing unethical or illegal and that all required statements and disclaimers are properly included. Answer:
True False
Diff: 2
Type: TF Page Ref: 722 Objective:
8. Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce are known as private property. Answer: True
False
Diff: 1
Type: TF Page Ref: 723 Objective:
9. The Communications Decency Act gives U.S. law enforcement the right to shut down websites without trial or defense if it finds the central reason for the site is to distribute copyrighted information illegally. Answer: True
False
Diff: 3
Type: TF Page Ref: 724 Objective:
10. Digital technologies make it possible to produce and distribute a high-quality duplicate of any digital recording with minimal effort and cost. Answer:
True False
Diff: 1
Type: TF Page Ref: 725 Objective:
11. Trade secrets serve to protect tangible technological inventions, especially in traditional industrial areas. Answer: True
False
Diff: 2
Type: TF Page Ref: 725 Objective:
12. In 2010, the Supreme Court ruled that patents cover abstract ideas. Answer: True
False
Diff: 2
Type: TF Page Ref: 726 Objective:
13. A trademark is a symbol businesses use to identify their goods and services. Answer:
True False
Diff: 2
Type: TF Page Ref: 726 Objective:
14. Unlike hate sites that can cause problems for corporations or lead to lawsuits, fan sites are beneficial and welcomed by the entertainment industry. Answer:
True
False
Diff: 3
Type: TF Page Ref: 727 Objective:
15. Virtually all U.S. states and the federal government, either by statute or by common law, recognize the right to privacy, but few government agencies actually follow all the statutes. Answer:
True False
Diff: 2
Type: TF Page Ref: 728 Objective:
16. Internet regulation at a federal level is authorized by the USA PATRIOT Act. Answer: True
False
Diff: 2
Type: TF Page Ref: 729 Objective:
17. Legal precedents are decisions by judges that may be used as standards in similar legal cases that follow. Answer:
True False
Diff: 3
Type: TF Page Ref: 730 Objective:
18. Government supercomputers are capable of reading every e-mail sent, listening to every mobile conversation, reading every text message, knowing every user location, and following every credit card purchase besides tracking every website visited by Internet users around the globe. Answer:
True False
Diff: 2
Type: TF Page Ref: 733-734 Objective:
19. RFIDs can be used to track individuals. Answer:
True False Type: TF
Diff: 1
Page Ref: 734 Objective:
20. Ethical principles that apply to the collection and use of personal information, such as notifying customers of information practices before collecting it, do not apply to information collected in e-commerce. Answer: True
False
Diff: 1
Type: TF Page Ref: 736 Objective:
21. Under the Dodd-Frank Act, privacy notices guarantee consumers certain rights while shopping online. Answer: True
False
Diff: 2
Type: TF Page Ref: 737 Objective:
22. Contemporary information systems should be built to encourage compliance and maximize the possibility of accountability for violations. Answer:
True False
Diff: 2
Type: TF Page Ref: 740 Objective:
23. Several public organizations and private companies attempt to protect consumers and build users' trust and confidence in the Internet through a seal of quality, such as Trustmark and BBBOnLine. Answer:
True False
Diff: 2
Type: TF Page Ref: 744 Objective:
24. Electronic signatures improve EC by helping to distinguish between legitimate and fraudulent transactions and build trust and predictability needed by parties doing business online. Answer:
True False
Diff: 2
Type: TF Page Ref: 746 Objective:
25.
Online sellers can better protect themselves against fraud by requiring customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account. Answer:
True False
Diff: 2
Type: TF Page Ref: 746 Objective:
26. Digital reference is a generic, technology-neutral term that refers to the various methods by which one can sign an electronic record. Answer: True
False
Diff: 2
Type: TF Page Ref: 747 Objective:
27. Biometric controls provide access procedures that match every valid user with a unique user identifier. Answer:
True False
Diff: 1
Type: TF Page Ref: 747
Objective:
28. According to the Gartner Group, 40 percent of the world's data centers are constrained by heat, space, and power requirements. Answer: True
False
Diff: 2
Type: TF Page Ref: 754 Objective:
29. Green software refers to software products that help companies save energy or comply with EPA requirements. Answer:
True False
Diff: 2
Type: TF Page Ref: 754 Objective:
30. Sustainability regulations such as RoHS in the European Union (EU) will increasingly impact how supply chains function regardless of location. Answer:
True
False
Diff: 2
Type: TF Page Ref: 755 Objective:
31. Electronic Product Environmental Assessment Tool (EPEAT) is a searchable database of computer hardware that meets a strict set of environmental criteria. Answer:
True False
Diff: 2
Type: TF Page Ref: 756 Objective:
32. Teleconferencing or virtual work offers many green benefits, including reducing rush hour traffic, improving air quality, improving highway safety, and improving health care. Answer:
True False
Diff: 1
Type: TF Page Ref: 756 Objective:
33.
Virtual universities are helping to reduce the digital divide. Answer:
True False
Diff: 1
Type: TF Page Ref: 756 Objective:
34. Various EC tools can help increase our safety at home and in public, such as e-911 systems; global collaborative commerce technologies, e-procurement, and e-government efforts at information sharing. Answer:
True False
Diff: 2
Type: TF Page Ref: 756 Objective:
35. Some believe that exposure to cellular mobile communication radiation may cause health problems; however, it may take years before the truth of this claim is known. Answer:
True False
Diff: 1
Type: TF Page Ref: 757
Objective:
36. The branch of philosophy that deals with what is considered to be right and wrong best defines A)
ethics.
B)
due process.
C)
business law. D)
intellectual property law. Answer: A
Diff: 1
Type: MC Page Ref: 719 Objective:
37. The right to be left alone and free from unreasonable personal intrusions best defines A)
intrusion protection. B) patent law.
privacy.
social law.
C)
D)
Answer: C
Diff: 1
Type: MC Page Ref: 719 Objective:
38. According to a study by Robert Half Technology, the top time waster is A)
online games. B) gambling.
C)
personal email. D)
social networks. Answer: D
Diff: 2
Type: MC Page Ref: 720 Objective:
39. Which of the following states the rules and expected behaviors and actions? A)
citizenship
B)
corporate code of ethics
C)
company mission statement D)
job description Answer: B
Diff: 1
Type: MC Page Ref: 722 Objective:
40. Corporate Web policy guidelines include each of the following except A)
post disclaimers concerning content. B) issue word-of-mouth acceptable use policies (AUP). C)
make it clear to employees that they cannot use copyrighted or trademarked material without permission. D)
have attorneys with cyber law expertise review Web content. Answer: B
Diff: 2
Type: MC Page Ref: 722 Objective:
41.
An Internet acceptable use policy (AUP) is an important safeguard because A)
without a formal AUP, it is much more difficult to enforce acceptable behaviors and eliminate unacceptable behaviors and punish violators. B) employees may be using company e-mail to advertise their own businesses. C)
it is required by the FTC. D)
it includes a corporate code of ethics. Answer: A
Diff: 2
Type: MC Page Ref: 722 Objective:
42. Intellectual property law is the area of law that is associated with each of the following except A)
visual and performing arts. B) patent law, copyright law, trademark law, and trade secret law. C)
business contracts. D)
electronic databases, advertising, and video games. Answer: C
Diff: 2
Type: MC Page Ref: 723 Objective:
43. An exclusive right of the author or creator of a book, movie, musical composition, or other artistic property to print, copy, sell, license, distribute, transform to another medium, translate, record, perform, or otherwise use best defines A)
trademark law. B) fair use.
patent.
copyright.
D
C)
D)
Answer:
Diff: 2
Type: MC Page Ref: 723 Objective:
44. Which of the following extends a copyright to 70 years after the death of the author? A)
Sarbanes-Oxley Act B) Sonny Bono Copyright Extension Act C)
Carry Grant Copyright Extension Act
D)
Communications Privacy and Consumer Empowerment Act Answer: B
Diff: 2
Type: MC Page Ref: 723 Objective:
45. Which of the following intellectual property laws protects confidential business information? A)
trademark law B) law of licensing C)
patent law
D)
trade secret law Answer: D
Diff: 3
Type: MC Page Ref: 723 Objective:
46. Which of the following intellectual property laws protects inventions and discoveries? A)
law of licensing B) patent law
C)
trademark law D)
trade secret law Answer: B
Diff: 3
Type: MC Page Ref: 723 Objective:
47. Which intellectual property law is correctly matched with its protection? A)
Trade secret law protects creations of the mind. B) Copyright law protects confidential business information. C)
Patent law protects inventions. D)
Trademark law protects discoveries. Answer: C
Diff: 2
Type: MC Page Ref: 723 Objective:
48. Use of the work without permission or contracting for payment of a royalty best defines A)
cyberlifting.
B)
digital rights violation. C)
infringement. D)
fair use.
C
Answer:
Diff: 2
Type: MC Page Ref: 724 Objective:
49. Which of the following gives the authorities dramatic new copyright enforcement powers allowing them to take down entire domains dedicated to online piracy rather than just targeting files that actually infringe copyright law? A)
Copyright Enforcement Bill B) Anti-Cybersquatting Consumer Protection Act C)
Federal Trademark Dilution Act D)
Communications Decency Act Answer:
A
Diff: 3
Type: MC Page Ref: 724 Objective:
50. Each of the following statements about digital rights management (DRM) is true except A)
DRM technologies were developed with strict regard for privacy protection. B) typically, the content is a copyrighted digital work to which the vendor holds right. C)
DRM is an umbrella term for any arrangement that allows a vendor of content in electronic form to control the material and restrict its usage. D)
DRM are technology-based protection measures. Answer: A
Diff: 2
Type: MC Page Ref: 725 Objective:
51. An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage best defines A)
fair use.
B)
digital patent.
C)
digital rights management. D)
electronic conservatorship. Answer: C
Diff: 3
Type: MC Page Ref: 725 Objective:
52. Fair use means A)
a copyright holder has exclusive rights to the invention for a fixed number of years. B) the author or creator of a book, movie, or musical composition can use his or her creations for an unlimited number of years. C)
copyrighted material can be used for noncommercial purposes without paying royalties or getting permission. D)
copyrighted material can be digitally protected against misuse. Answer: C
Diff: 2
Type: MC Page Ref: 725 Objective:
53.
The use of famous trademarks in public that diminishes the capacity of the mark to distinguish goods or services, or tarnishes the mark in the eyes of the consumer best defines A)
patent theft.
social use.
B)
C)
trademark dilution. D)
copyright infringement. Answer: C
Diff: 2
Type: MC Page Ref: 726 Objective:
54. A domain name that criticizes an organization or person best defines A)
cyberstalking. B) cyberbashing. C)
cyberflaming. D)
repudiation site. Answer: B
Diff: 2
Type: MC Page Ref: 727 Objective:
55. Each of the following statements apply to hate Web sites except A)
web sites that contain legitimate complaints that are not defamatory, sponsored by competitors, or infringe upon trademark rights by confusing consumers are usually protected by the First Amendment. B) the intent of most hate Web sites is to commit fraud. C)
cyberbashing is the registration of a domain name that criticizes an organization or person. D)
many hate sites are directed against large corporations such as Wal-Mart, Microsoft, and Nike. Answer: B
Diff: 2
Type: MC Page Ref: 727 Objective:
56. Section 5 of the FTC Act does each of the following except A)
prohibits unfair or deceptive EC practices. B) gives the FTC authority to take action against companies whose lax security practices could expose customers' financial information to theft or loss. C)
requires monitoring of employees' e-mail. D)
protects privacy. Answer: C
Diff: 2
Type: MC Page Ref: 728 Objective:
57. Companies can improve their responsibility as custodians of customers' personal data by implementing A)
firewalls.
AUP.
B)
C)
e-mail monitoring. D)
opt-in and opt-out information practices. Answer: D
Diff: 2
Type: MC Page Ref: 728 Objective:
58. The business practice that gives consumers the opportunity to refuse sharing information about themselves best defines A)
right of refusal. B) opt-out.
opt-in.
C)
D)
freedom of information. Answer: B
Diff: 2
Type: MC Page Ref: 728 Objective:
59. An agreement that requires computer users to take specific steps to allow the collection of personal information best defines A)
cyberawareness. B) opt-in.
opt-out.
C)
D)
information submission clause. Answer: B
Diff: 2
Type: MC Page Ref: 729 Objective:
60. Which of the following mandated the use of filtering technologies in schools and libraries that receive certain types of U.S. federal funding? A)
Lanham Act
B)
Communications Decency Act C)
Children's Internet Protection Act D)
Federal commuter Fraud and Abuse Act Answer: C
Diff: 2
Type: MC Page Ref: 730 Objective:
61. Methods used for collecting data about people include A)
RFIDs.
B)
site transaction logs. C)
search engines. D)
all of the above.
Answer: D
Diff: 1
Type: MC Page Ref: 731-734 Objective:
62. Which of the following is one of the most common ways of gathering information on the Internet? A)
reading an individual's blogs or newsgroup postings B) using spyware, keystroke loggers, and similar methods C)
reading an individual's e-mail, IM, or text message D)
wiretapping wireline and wireless communication lines Answer: B
Diff: 2
Type: MC Page Ref: 732 Objective:
63. Based on Richard Clarke's 2010 definition, which of the following refers to actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption? A)
cybercombat B)
cyberlashing
C)
cyberintrusion D)
cyberwarfare Answer: D
Diff: 2
Type: MC Page Ref: 732 Objective:
64. All unwanted software programs designed to steal proprietary information or that target data stores containing confidential information best defines A)
target emails. B) cybersniffers. C)
viruses.
spyware.
D
D)
Answer:
Diff: 2
Type: MC Page Ref: 733 Objective:
65. Ethical principles commonly applied to the collection and use of personal information include A)
integrity or security. B) access or participation. C)
choice or consent. D)
all of the above. Answer: D
Diff: 1
Type: MC Page Ref: 736-737 Objective:
66. Which of the following requires the FTC to enforce online privacy rights in EC, including the collection and use of personal data? A)
Computer Fraud and Abuse Act B) USA Patriot Act C)
Communications Privacy and Consumer Empowerment Act D)
Dodd-Frank Act Answer: C
Type: MC Page Ref: 737 Objective:
67. A protocol allowing websites to declare their intended use of information they collect about browsing users best defines A)
Cyberawareness Authentication Signature. B) Platform for Privacy Preferences Project. C)
Internet Data Collection Protocol. D)
HTML.
B
Answer:
Diff: 2
Type: MC Page Ref: 739 Objective:
68. Which of the following is the European Union's directive that aims to regulate the activities of any person or company that controls the collection, storage, processing, or use of personal data on the Internet? A)
EU Privacy Enforcement Act B) EU Information Control and Disbursal Act C)
EU Internet Data Collection Act
D)
EU Data Protection Directive Answer: D
Diff: 3
Type: MC Page Ref: 739 Objective:
69. Discovery in civil litigation that deals with information in electronic format best describes A)
metadata.
B)
electronic case files. C)
electronic discovery. D)
electronic delivery. Answer: C
Diff: 2
Type: MC Page Ref: 741 Objective:
70. Important EC issues include A)
liability.
B)
time and place. C)
defamation.
D)
all of the above. Answer: D
Diff: 1
Type: MC Page Ref: 741 Objective:
71. A major computer crime law to protect computers and other Internet-connected computers best describes A)
Sarbanes-Oxley Act. B) Computer Fraud and Abuse Act. C)
American Recovery and Reinvestment Act. D)
Dodd-Frank Act. Answer: B
Diff: 3
Type: MC Page Ref: 745 Objective:
72. EC sellers need to protect against fraud and each of the following except A)
customers who deny that they placed an order. B) public keys.
C)
use of their name by imposter sellers. D)
customers who give false credit card or bad check information in payment for products and services provided. Answer: B
Diff: 1
Type: MC Page Ref: 746 Objective:
73. Examples of electronic signatures to help distinguish between legitimate and fraudulent transactions include each of the following except A)
a Web site development agreement. B) a secret code or PIN to identify the sender to the recipient. C)
a name typed at the end of an e-mail message by the sender. D)
a digitized image of a handwritten signature attached to an electronic document. Answer:
A
Diff: 2
Type: MC Page Ref: 747 Objective:
74. According to an ExecuNet survey, what percentage of hiring managers now use social media sites to check out job candidates? A)
77 percent.
66 percent.
55 percent.
B)
C)
D)
88 percent. Answer: A
Diff: 2
Type: MC Page Ref: 751 Objective:
75. Data pertaining to the enterprise included in the law that can be used for the purpose of implementing or validating compliance best defines A)
ethical data.
digital data.
B)
C)
research data. D)
compliance data. Answer: D
Diff: 1
Type: MC Page Ref: 751 Objective:
76. The gap that has emerged between those who have and those who do not have the ability to use the technology best defines A)
cyberdivide. B) electronic divide. C)
digital divide. D)
computing divide. Answer: C
Diff: 2
Type: MC Page Ref: 752 Objective:
77.
The study and practice of eco-friendly computing resources which is now a key concern for businesses in all industries best defines A)
red computing. B) safe computing. C)
green computing. D)
blue computing. Answer: C
Diff: 1
Type: MC Page Ref: 753 Objective:
78. Potential benefits of telecommuting or virtual work for an organization include A)
reduces or eliminates travel-related time and expenses. B) increases productivity despite distractions. C)
allows closer proximity to and involvement with family. D)
improves job satisfaction and productivity. Answer: D
Diff: 2
Type: MC Page Ref: 753 Objective:
79. Potential benefits of telecommuting or virtual work for community and society include A)
reduces traffic-related pollution and congestion. B) increases employment. C)
allows the movement of job opportunities to areas of high unemployment. D)
all of the above. Answer: D
Diff: 2
Type: MC Page Ref: 753 Objective:
80. A searchable database of computer hardware that meets a strict set of environmental criteria best defines A)
Cloud Computing and Data Management Compliance Tool. B) Electronic Product Environmental Assessment Tool. C)
Digital Rights Management Database. D)
Cybercollection Distribution Database. Answer: B
Diff: 2
Type: MC Page Ref: 756 Objective:
81. Explain the similarities and differences between laws and ethics. Answer: Ethics refers to the acceptable ways individuals interact with one another and for the good of society. Ethics defines the nature of duties that people owe themselves and one another. One duty is to not intrude on a person's privacy. Laws embody ethical principles, but acts that are considered unethical may not be illegal. Conversely, the law is not simply the coding of ethical norms, nor are all ethical codes incorporated into public law. A common agreement in a society as to what is right and wrong determines ethics, but they are not subject to legal sanctions except when they overlap with activities that also are illegal. Diff: 1
Type: ES Page Ref: 719 Objective:
82. Identify five intellectual property law specialty areas. Answer: Areas include intellectual property law, patent law, copyright law, trademark law, trade secret law, law of licensing, and law of unfair competition dealing with counterfeiting and piracy. Diff: 2
Type: ES Page Ref: 723 Objective:
83. List ten ways that information about individuals is collected and used online.
Answer: Website registration, cookies, spyware, RFIDs, site transaction logs, EC ordering systems and shopping carts, search engines, behavioral targeting, polling and surveys, and payment information and e-wallets are ten ways that information about individuals is collected and used online. Diff: 2
Type: ES Page Ref: 731-734 Objective:
84. Identify five ethical principles for privacy protection. Answer: Notice of awareness, choice or consent, access or participation, integrity or security, and enforcement or redress are five ethical principles for privacy protection. Diff: 2
Type: ES Page Ref: 736-737 Objective:
85. Define green computing. Provide five guidelines for saving computing power. Answer: Green computing is the study and practice of eco-friendly computing resources. Five guidelines are using the computer's power management options, training all personnel to turn off monitors when not in use, powering down all computers automatically after hours or when not in use, embracing telecommuting and supporting employees who wish to stay home to work, and configuring IT data center equipment by recommended operating temperatures are five guidelines. Exhibit 14.7 provides additional guidelines. Diff: 2
Type: ES Page Ref: 753-754 Objective:
1. TRUE
2. TRUE
3. FALSE
4. FALSE
5. FALSE
6. TRUE
7. TRUE
8. FALSE
9. FALSE
10. TRUE
11. FALSE
12. FALSE
13. TRUE
14. FALSE
15. TRUE
16. FALSE
17. TRUE
18. TRUE
19. TRUE
20. FALSE
21.
FALSE
22. TRUE
23. TRUE
24. TRUE
25. TRUE
26. FALSE
27. TRUE
28. FALSE
29. TRUE
30. TRUE
31. TRUE
32. TRUE
33. TRUE
34. TRUE
35. TRUE
36. A
37. C
38. D
39. B
40. B
41. A
42. C
43. D
44. B
45. D
46. B
47. C
48. C
49. A
50. A
51. C
52. C
53. C
54. B
55. B
56. C
57. D
58. B
59. B
60. C
61. D
62.
B
63. D
64. D
65. D
66. C
67. B
68. D
69. C
70. D
71. B
72. B
73. A
74. A
75. D
76. C
77. C
78. D
79. D
80. B
81. Ethics refers to the acceptable ways individuals interact with one another and for the good of society. Ethics defines the nature of duties that people owe themselves and one another. One duty is to not intrude on a person's privacy. Laws embody ethical principles, but acts that are considered unethical may not be illegal. Conversely, the law is not simply the coding of ethical norms, nor are all ethical codes incorporated into public law. A common agreement in a society as to what is right and wrong determines ethics, but they are not subject to legal sanctions except when they overlap with activities that also are illegal.
82. Areas include intellectual property law, patent law, copyright law, trademark law, trade secret law, law of licensing, and law of unfair competition dealing with counterfeiting and piracy.
83. Website registration, cookies, spyware, RFIDs, site transaction logs, EC ordering systems and shopping carts, search engines, behavioral targeting, polling and surveys, and payment information and e-wallets are ten ways that information about individuals is collected and used online.
84. Notice of awareness, choice or consent, access or participation, integrity or security, and enforcement or redress are five ethical principles for privacy protection.
85. Green computing is the study and practice of eco-friendly computing resources. Five guidelines are using the computer's power management options, training all personnel to turn off monitors when not in use, powering down all computers automatically after hours or when not in use, embracing telecommuting and supporting employees who wish to stay home to work, and configuring IT data center equipment by recommended operating temperatures are five guidelines. Exhibit 14.7 provides additional guidelines.