Filters
Question type

Study Flashcards

Which of the following is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA) ?


A) Safeguarding patients' billing information
B) Protecting patients' computer records
C) Protecting patients' credit information
D) Safeguarding conversations between patients and their families

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.

A) True
B) False

Correct Answer

verifed

verified

__________are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.


A) Applets
B) Kernels
C) Cookies
D) Firewalls
E) Select

F) A) and B)
G) A) and E)

Correct Answer

verifed

verified

__________is computing that promotes a sustainable environment and consumes the least amount of energy.


A) Digital computing
B) Soft computing
C) Green computing
D) Cyber computing
E) Select

F) A) and E)
G) C) and D)

Correct Answer

verifed

verified

Which of the following can help offset the digital divide?


A) Increasing the speed of the Internet for the information rich
B) Increasing the number of computers in public places
C) Reducing the number of computer equipment at schools
D) Reducing the Internet bandwidth for the information poor

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

__________make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.


A) Cookies
B) Trojans
C) Applets
D) Kernels
E) Select

F) None of the above
G) C) and D)

Correct Answer

verifed

verified

_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.


A) Uniform Civil Code
B) The Fair Use Doctrine
C) The Copyright Act of 1790
D) IT code of conduct

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Job deskilling occurs when:


A) experienced labor is eliminated by high technology.
B) a worker is promoted from a semiskilled to a skilled position.
C) a job is carried out manually.
D) fragmented jobs are combined as a whole.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

In the context of information technology in workplaces, which of the following allows adding new tasks to employees' responsibilities?


A) Job virtualization
B) Job upgrading
C) Job deskilling
D) Job rotation

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Organizations can benefit from patents as they can use patents:


A) for an unlimited period of time.
B) for contents derived from other processes.
C) to upgrade a pre-existing patented process.
D) to keep competitors from entering certain market segments.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called__________.


A) virus
B) bug
C) spam
D) cookie
E) Select

F) B) and D)
G) A) and E)

Correct Answer

verifed

verified

A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.


A) ethical, but illegal
B) legal, but unethical
C) illegal and unethical
D) legal and ethical

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Information technologies have led to job deskilling.

A) True
B) False

Correct Answer

verifed

verified

__________is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.


A) An identity log file
B) A virtual organization
C) Intellectual property
D) Information policy
E) Select

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.


A) unethical and illegal
B) ethical, but illegal
C) legal and ethical
D) legal, but unethical

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.


A) sniffing
B) phishing
C) cybersquatting
D) spamming

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A potential benefit of telecommuting is that it _____.


A) regulates work routine
B) reduces employee turnover
C) separates work and home life
D) increases interaction with coworkers

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

In the context of Web and network privacy, an acceptable use policy is a:


A) legal document that protects an organization from embezzlement of money by its service providers.
B) set of rules to govern the electronic fund transfers between an organization and its clients.
C) legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D) set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

To minimize the invasion of privacy, organizations should:


A) not delete data even when it is not needed.
B) not modify data once it is entered into an information system.
C) collect only the data that is necessary for the stated purpose.
D) provide unlimited access to personal information to those who have authorization.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The principle of__________is the idea that several organizations working together can do what one organization cannot.


A) virtual organization
B) collated organization
C) merged organization
D) pool organization
E) Select

F) C) and E)
G) A) and E)

Correct Answer

verifed

verified

Showing 61 - 80 of 80

Related Exams

Show Answer