Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Ethical, Privacy, and Security Issues

Question 1
When does the support for open access to Internet grow in a country?
1) When only private-sector organizations gain online access
2) When only government officials gain online access
3) When more people gain online access
4) When online access is limited to schools and colleges

Question 2
Fly thermostat, an automatic temperature controller for homes, learns the patterns for raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of _____.
1) the Internet of Things
2) Net neutrality
3) the Education Rate (E-Rate) program
4) Net censorship

Question 3
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?
1) Terms of Trade policy
2) Terms of Use policy
3) Terms of Endearment policy
4) Terms of Retention policy

Question 4
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?
1) A wiki
2) A cookie
3) An antivirus
4) A bookmark

Question 5
_____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices.
1) The Internet of Digital divide
2) The Internet of Things
3) The Internet of Data
4) The Internet of Regulations

Question 6
The Fourth Amendment to the U.S. Constitution was adopted to _____.
1) guarantee fair trial and other rights of an accused
2) prohibit excessive bail as well as cruel and unusual punishment
3) protect people from unreasonable searches and seizures of properties
4) guarantee the rights to freedom of religion, freedom of expression, and freedom to assemble

Question 7
Which of the following is true of the First Amendment to the U.S. Constitution?
1) It was adopted to protect Americans from unreasonable searches and seizures of properties.
2) It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.
3) It was adopted to guarantee fair trial and other rights of the accused.
4) It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble.

Question 8
The digital divide must be bridged to _____.
1) solve emergency issues
2) support net neutrality
3) prevent online threats
4) promote Internet censorship

Question 9
PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a _____.
1) cookie
2) metadata
3) data dictionary
4) popup

Question 10
Linc Corp., a software firm, decides to ban social networking sites for its employees at the workplace. However, the employees are able to access other Web sites. Identify the strategy adopted by the firm.
1) Cyberespionage
2) Internet censorship
3) Internet rootkit
4) Spear phishing

Question 11
Identify the objective of the Communications Act of 1934.
1) To provide dial-up Internet services to schools and libraries
2) To protect users from online threats such as cracking and identity theft
3) To restrict the use of social networking Web sites
4) To ensure broad access to affordable communications services

Question 12
_____ is the control of the publishing of information on the Internet.
1) Internet graying
2) Internet flagship
3) Internet catalysis
4) Internet censorship

Question 13
Which of the following is a feature of Internet censorship?
1) Monitoring the Internet activity of individuals
2) Storing user credentials such as name and address
3) Selling user data to third parties
4) Pilfering credit card information from online shoppers

Question 14
Which of the following is true of a cookie?
1) It saves shortcuts to Web sites and navigates to them within a few seconds.
2) It helps users to browse incognito by hiding their browsing data.
3) It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request.
4) It captures browsing history for Web site customization and personalization purposes.

Question 15
A company based in Houston wants to expand its business to Rome. The human resources department will run background checks from Houston. Identify the condition that must be satisfied to make this possible.
1) A "safe harbor" framework must be developed.
2) The US Patriot Act must be implemented.
3) A doxing framework must be developed.
4) The Digital Millennium Copyright Act must be implemented.

Question 16
_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.
1) Data brokers
2) Yellow pagers
3) Data miners
4) Drill-down analysts

Question 17
Which of the following is a reason for the rapid growth of the Internet of Everything?
1) Limited availability of network services
2) Increased availability of expensive smart devices
3) Increased availability of network access
4) Limited availability of inexpensive smart devices

Question 18
Which of the following is true of a code of ethics?
1) It is an individual's beliefs about right and wrong.
2) It is a set of beliefs about right and wrong behavior that are universally accepted.
3) It states the principles and core values that are essential to any professional's work and that govern their behavior.
4) It is a system of rules enforced by a set of institutions that states what a person can and cannot do .

Question 19
Which program was designed to eliminate the digital divide in the United States?
1) The Internet traffic program
2) Net neutrality program
3) Workplace monitoring program
4) The Education Rate program

Question 20
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.
1) Hacking
2) Spamming
3) Doxing
4) Cracking.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92282257

Have any Question?


Related Questions in Management Information System

Assignmentcontinuing with a company you selected in week

Assignment Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: Impacts of Performance Manag ...

Software quality is a difficult term to define it means

Software quality is a difficult term to define. It means many things to many different people. Do different software programs have different definitions for quality? How would you measure quality?

Suppose that frames are 500 bytes long which includes 58

Suppose that frames are 500 bytes long which includes 58 bytes of overhead. Also assume that ACK frames are 64 bytes long. a) The transmission uses Stop-and-Wait ARQ. Let the transmission rate of the system be R where R= ...

Assignmentyour team will pick a business sector and then

Assignment Your team will pick a business sector and then visualize a type of business. You are not researching a real business, you are creating a fictional business. A. Choose one of these business sectors: 1. Healthca ...

Ethics and information managementusing campbellsville

Ethics and Information Management Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please ...

As a junior congress person you have been asked to help

As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill. Using distributive bargaining, discuss the pros and cons which might a ...

Respectfully please see the structure for the program im

Respectfully, Please see the structure for the program I'm trying to write using Python. Below is how the program should be structured. 1. Program general structure: Function definitions should be at the top of the progr ...

Keep answers separateapa format1 discuss the role of the

Keep Answers Separate APA format 1. Discuss the role of the configuration control board (CCB) in the process of configuration control using the text Internet and/or your job as reference for full credit Submission Instru ...

Instructionsin this final assignment you will develop a

Instructions In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below. Identify the components of an information ...

Review the building shared services at rr communications

Review the Building Shared Services at RR Communications case study online, and ansswer the below questions. Describe the advantages of a single customer service center for RR Communications. Devise an implementation str ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As