CVS refers to

CVS refers to




a) eyestrain related to computer display screen use
b) carpal vision syndrome
c) wrist injuries brought about by incorrect hand position when using a keyboard
d) stress induced by technology


Answer: A

Re-designing and automating business processes can be seen as a double-edged sword because

Re-designing and automating business processes can be seen as a double-edged sword because



a) increases in efficiency may be accompanied by job losses
b) increases in efficiency may be accompanied by poor data quality
c) support for middle-management decision making may be offset by poor data quality
d) reliance on technology results in the loss of hands-on knowledge



Answer: A

Software presents liability problems in terms of legal protections for users because

Software presents liability problems in terms of legal protections for users because 



a) of the difficulty in classifying its role as a machine, a service, or a book
b) of the inability to review the actual programming behind the software
c) of its inherent similarity to books and periodicals, and therefore it is protected by the First Amendment
d) there are so many parties involved in its creation and distribution



Answer: A

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?



a) digital millennium copyright act
b) privacy act
c) freedom of information act
d) electronic communications privacy act




Answer: A

A limitation of trade secret protection for software is that

A limitation of trade secret protection for software is that



a) it does not protect against copying the underlying ideas behind the software
b) it is difficult to compare one piece of software to another
c) it is difficult to prevent the ideas in the work from falling into the public domain
d) few software programs contain truly unique elements



Answer: C

The P3P standard is concerned with

The P3P standard is concerned with



a) controlling pop-up ads based on user profiles and preventing ads from collecting or sending information
b) allowing users to surf the web anonymously
c) scrambling data so that it can't be read
d) blocking or limiting cookies



Answer: D

The robotics startup you work for has developed an AI-controlled robotic nurse, intended to care for end-of-life patients who are often unconscious. Which five moral dimensions does this raise?

The robotics startup you work for has developed an AI-controlled robotic nurse, intended to care for end-of-life patients who are often unconscious. Which five moral dimensions does this raise?



a) system quality
b) quality of life
c) accountability and control
d) property rights and obligations




Answer: B

The Online Privacy Alliance

The Online Privacy Alliance



a) encourages self-regulation to develop a set of privacy guidelines for its members
b) protects user privacy during interactions with web sites
c) has established technical guidelines for ensuring privacy
d) is a government agency regulating the use of customer information



Answer: A

The Internet has made the protection of intellectual property

The Internet has made the protection of intellectual property



a) more difficult, because of the lack of enforceable regulations
b) easier, because of proliferation of creative and professional software
c) more difficult, because of the ease of copying and transmitting digitized media
d) easier, because of the ability to track user behavior and visits to web sites and file-sharing services



Answer: C

The Federal Trade Commission FIP principle of Notice/Awareness states that

The Federal Trade Commission FIP principle of Notice/Awareness states that 



a) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction
b) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use
c) there is a mechanism in place to enforce FIP principles
d) web sites must disclose their information practices before collecting data



Answer: D

The ethical "no free lunch" rule states that

The ethical "no free lunch" rule states that



a) if an action cannot be taken repeatedly, then it is not right to be taken at any time
b) one should take the action that produces the least harm or incurs the least cost
c) one can put values in rank order and understand the consequences of various courses of action
d) everything is owned by someone else, and that the creator wants compensation for this work




Answer: D

Immanuel Kant's Categorical Imperative states that

Immanuel Kant's Categorical Imperative states that



a) if an action cannot be taken repeatedly, then it is not right to be taken at any time
b) one should take the action that produces the least harm or incurs the least cost
c) one can put values in rank order and understand the consequences of various courses of action
d) if an action is not right for everyone to take, it is not right for anyone to take



Answer: D

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is 



a) acceptable, because the grocer suffers the least harm
b) acceptable, because the higher value is the survival of the family
c) wrong, because the man would not want the grocery to steal from him
d) wrong, because if everyone were to do this, the concept of personal property is defeated




Answer: B

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?



a) kant's categorical imperative
b) the golden rule
c) the risk aversion principle
d) the "no free lunch" rule




Answer: A

The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called




a) liability
b) due process
c) the courts of appeal
d) accountability



Answer: B

The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as

The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as 



a) accountability
b) responsibility
c) due process
d) liability



Answer: D

NORA is a

NORA is a



a) profiling technology used by the EU
b) federal privacy law protecting networked data
c) new data analysis technology that finds hidden connections between data in disparate sources
d) sentencing guideline adopted in 1987 mandating stiff sentences on business executives




Answer: C

The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _______

The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _______



a) advances in wireless networking
b) international standards for data protection
c) networking advances and the Internet
d) increased ease in file sharing and copying



Answer: C

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of



a) family and home
b) property rights and obligations
c) system quality
d) quality of life



Answer: D

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of 



a) property rights and obligations
b) system quality
c) accountability and control
d) information rights and obligations



Answer: A

The introduction of new information technology has a

The introduction of new information technology has a 



a) dampening effect on the new discourse of business ethics
b) ripple effect raising new ethical, social, and political issues
c) beneficial effect for society as a whole, while raising dilemmas for consumers
d) waterfall effect in raising ever more complex ethical issues



Answer: B

Which of the following best describes how new information systems result in legal gray areas?

Which of the following best describes how new information systems result in legal gray areas?



a) they work with networked, electronic data, which are more difficult to control than information stored manually
b) they result in new situations that are not covered by old laws
c) they are implemented by technicians rather than managers
d) they are created from sets of logical and technological rules rather than social or organizational mores




Answer: B

UPS's use of Web-based tools that allow customers to embed UPS functions such as tracing and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.

UPS's use of Web-based tools that allow customers to embed UPS functions such as tracing and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.




Answer: True

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.




Answer: False, information systems consist of something different.