Fundamental Info Systems: Module 12

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

An individual makes a free-willed choice based on a principles of right and wrong. These principles would be examples of ____________.

morals

2
New cards

Rules which are codified and enforceable by societal institutions are called ____________.

laws

3
New cards

A framework which guides and evaluates behavior in a specific context such as a company or a professional society is called _________

ethics

4
New cards

The National Information Infrastructure Protection Act is part of a society's ____________.

laws

5
New cards

The Association for Computing Machinery has published a set of principles to guide the conduct of its computing professional members. This is an example of a code of _________.

ethics

6
New cards

A person is guided by a belief that it is important to put in effort and work hard. This belief is a an example of a person's _________.

morals

7
New cards

The United States has an overarching law that broadly views privacy as a fundamental human right.

True or False

False

8
New cards

Many people believe that the traditional notion of privacy as "the right to be left alone" is inadequate in the digital age and needs to be expanded.

True or False

True

9
New cards

The European Union has an overarching law that broadly views privacy as a fundamental human right.

True or False

True

10
New cards

The United States has NO laws which govern data privacy.

True or False

False

11
New cards

The fourth amendment of the United States Constitution protects citizens against unreasonable search and seizure.

True or False

True

12
New cards

The 4th amendment does NOT apply to any electronic communications.

True or False

False

13
New cards

The _________ fair information practice ensures that individuals have the capability to review and correct information about themselves.

access/participation

14
New cards

The __________ fair information practice ensures that other fair information practices are followed.

enforcement

15
New cards

The __________ fair information practice ensures that individual permission is obtained if information is used for purposes that are different from the original purpose .

choice/consent

16
New cards

The __________ fair information practice ensures that information practices are disclosed to individuals before information is collected.

notice

17
New cards

The __________ fair information practice ensures that information is accurate and is accessed for authorized purposes and by only authorized persons.

security

18
New cards

When installing a new third-party app, a social media platform asks the user what user profile and social network information may be shared with the third-party. This is an example of the ___________ fair information practice.

choice/consent

19
New cards

A patient at a medical practice is asked to sign a HIPAA (Health Insurance Portabaility and Accountability ACT) release form which describes how the practice will use subsequently collected medical information. This is an example of the ____________ fair information practice.

notice

20
New cards

A state provides a process for its citizens to check and correct court records about themselves. This is an example of the __________ fair information practice.

access/participation

21
New cards

A company that provides an online marketplace experienced a cyber attack in which hackers gained access to the personal information of more than 100 million users. The company was fined $7 million. This is an example of the _________ fair information practice

enforcement

22
New cards

A bank does criminal background checks on all job applicants who will be accessing customer data. This is an example of the ______________ fair information practice.

security

23
New cards

_____________ makes it illegal to break anti-piracy measures built into software.

The Digital Millennium Copyright Act of 1998

24
New cards

_______________ requires that a probable-cause warrant be obtained from a judge before conducting electronic eavesdropping in a criminal investigation.

The Wiretap Act of 1968

25
New cards

____________ gave consumers rights to access information about themselves that companies use to make loan and insurance decisions and to correct inaccuracies.

The Fair Credit Reporting Act of 1970

26
New cards

______________ requires Internet Service Providers to take down content once they have been notified of copyright infringement.

The Digital Millennium Copyright Act of 1998

27
New cards

____________ provides the right to access records from U.S federal agencies subject to certain exemptions which protect personal privacy, national security, and law enforcement interests.

The Freedom of Information Act of 1967

28
New cards

_______________ prevents unfair and deceptive business practices.

The Federal Trade Commission Act of 1914

29
New cards

______________ extended the Wiretap Act provisions to also include communication over the Internet.

The Electronic Communications Privacy Act of 1986

30
New cards

_______________ granted broad authority to U.S. domestic law enforcement and intelligence agencies to investigate terror-related crimes in response to the 9/11 terrorist attacks.

The Patriot Act of 2001

31
New cards

_____________ permits surveillance of foreign actors engaged in terrorism and espionnage for up to one year without a warrant unless a U.S. person is involved.

The Foreign Intelligence Surveillance Act of 1978

32
New cards

______________ helps to ensure that a company adheres to its published privacy policy.

The Federal Trade Commission Act of 1914

33
New cards

___________________ creates fair information practices regarding data collected by U.S. federal agencies about U.S. persons.

The Privacy Act of 1974

34
New cards

The item below an example of intellectual property:

a pound of sugar

True or False

False

35
New cards

The item below an example of intellectual property:

a movie

True or False

True

36
New cards

The item below an example of intellectual property:

a sculpture

True or False

True

37
New cards

The item below an example of intellectual property:

an eye retina

True or False

False

38
New cards

The item below an example of intellectual property:

a biographical book

True or False

True

39
New cards

The item below an example of intellectual property:

a 12 ounce filet mignon

True or False

False

40
New cards

The item below an example of intellectual property:

an ounce of gold

True or False

False

41
New cards

The item below an example of intellectual property:

a software program

True or False

True

42
New cards

_________ is a protected identifier of a brand or company that may consist of words, phrases, symbols, sounds, scents and/or color schemes.

a trademark

43
New cards

__________ is the illegal copying of intellectual property.

Piracy

44
New cards

__________ protects only the manifestation or expression of a creative work and NOT the underlying idea of a that work.

A copyright

45
New cards

__________ excludes others from using an idea behind an invention for a period of time.

A patent

46
New cards

___________ is intellectual property of a company that is NOT in the public domain.

A trade secret

47
New cards

Colonel Sanders kept the original recipe for Kentucky Fried Chicken in a safe. Only a few employees who were bound by confidentiality agreements had access to the recipe. This is an example of _________.

a trade secret

48
New cards

A hair styler created vidoes demonstrating how to do different hair updoes such as a french twist. The best way for the hair styler to protect his videos is ______________.

a copyright

49
New cards

The jingle "Liberty, Liberty, Liberty ... Liberty!" created by Liberty Mutual Insurance Company is an example of ___________.

a trademark

50
New cards

A person who records a new movie and shares the recording with friends has most likely engaged in an illegal act known as __________.

piracy

51
New cards

An engineer created the design for a 3D printer. The design would be protected using __________.

a patent

52
New cards

Using a system audit trail, a company was able to determine who processed an improper transaction. This is an example of _______________.

accountability

53
New cards

An employee acknowledged his large number of absences from work and agreed to a demotion. This is an example of _______________.

responsibility

54
New cards

The institutional mechanisms used to identify parties who chose and followed a course of action is called ___________.

accountability

55
New cards

A person damaged a neighbor's lawn by driving an all-terrain vehicle on the lawn in muddy conditions. The driver was ordered by a court to repair the lawn. This is an example of __________.

liability

56
New cards

The mechanism which enables individuals to recover damages for harm done is called ___________.

liability

57
New cards

Accepting the consequences of one’s actions is called _____________.

responsibility

58
New cards

An airbag inflated when it shouldn't have and caused a passenger to sustain broken ribs. The appropriate legal remedy would fall under ______________.

strict product liability

59
New cards

Legal protection against products that do not function in ways that their creators described they would function and that doesn't require showing harm done is called _____________.

a warranty

60
New cards

Showing that harm was caused by creators who did not use a reasonable standard of care when creating the product is called _____________.

negligence

61
New cards

A legal mechanism to protect against defective products which requires showing only that the product caused harm to a person or property is ____________.

strict product liability

62
New cards

The keys on the keyboard of a laptop began falling off soon after purchasing the laptop. The appropriate legal remedy would be _____________.

a warranty

63
New cards

A patient who suffered irreparable harm from a delayed cancer diagnosis showed that the physician did not follow generally accepted medical procedures. The appropriate legal remedy would fall under the category of ____________

negligence

64
New cards

Incorrect information that is deliberately disseminated with intent to manipulate people's attitudes and behavior is called _________.

disinformation

65
New cards

To counter efforts to increase government oversight, the high-tech industry ran advertisements touting their own importance for global competitiveness while ignoring the negative consequences of the industry’s concentrated market power. This is an example of ____________.

propaganda

66
New cards

In order to profit from increased social media followers, a person knowingly promoted a false story that the Apollo 11 moon landing in 1969 was faked. This is an example of ___________.

disinformation

67
New cards

Persuasive speech common in politics and advertising which promotes one point of view while ignoring or discounting other points of view is called ___________.

propaganda

68
New cards

Incorrect information that is disseminated with neutral intent is called ____________.

misinformation

69
New cards

A political party deliberately portrayed a group of people as subhuman animals in order to prime the citizenry to subsequently treat this group with prejudice and cruelty. This is an example of ___________.

disinformation

70
New cards

A foreign government deliberately created the false impression of two opposing grassroots movements in order to create chaos in another country’s political institutions. This is an example of ___________.

disinformation

71
New cards

A journalist accidentally reported that a political candidate likes to spend his time reading Toy Story instead of Tolstoy. The news outlet ran a correction the following day. This is an example of __________.

misinformation