rainer5ce_ch03_testbank
docx
keyboard_arrow_up
School
University of Calgary *
*We aren’t endorsed by this school
Course
317
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
45
Uploaded by UltraDeer378
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 3, Testbank
Course Title: Rainer, IS 5e
Chapter Number: 3
Question type: Multiple Choice
1) Google understands that to attract digital advertising dollars from advertiser, they: .
a) Must provide discounts to users
b) Must prove that digital ads work
c) Must work with customers and offer them loyalty programs
d) Must first negotiate with the Canadian Government a regulation to protect privacy
Answer: B
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
2) Online publishers use tracking code from Google, Facebook, and many other companies to
help target their advertising. What is a concern about this for individuals? ________.
a) That publishers should share profits with Google, Facebook and others
b) Privacy needs to be scrutinized more carefully.
c) That publishers should pay to users a fee for using their private information
d) That publishers should be careful to display only ads that are of interest to users
Answer: B
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
3) How does Google protects the privacy of consumers?.
a)
Through an agreement between Google and sellers
b) By using patent-pending mathematical formulas when it matches one of its users with a
shopper who makes a purchase in a brick-and-mortar store
c) Through Google Attribution
d) Through Periscope Data Analysis
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: B
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
4) In regards to technology used by Google to protect the privacy of consumers, Paul Stephens of
Privacy Rights Clearinghouse has asserted that a marketing organization can identify an
individual by examining only a few pieces of data. He expressed skepticism about Google’s
technology because:
a) The Google’s system for guarding the identities of users will stand up to the efforts of hackers
b) The Google’s system does not have a strong encryption algorithm
c) The Google’s system is too new to be trusted
d) The Google’s system is not meant to protect privacy but to share data with partners to increase
profits
Answer: A
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
5)
Marc Rotenberg, executive director of the Electronic Privacy Information Center, claims
companies are becoming increasingly intrusive in terms of their data collection and are secretive
as to how they gather and use those data. He proposed that:
a) Government regulators and the U.S. Congress should charge an extra tax to Google and other
technology companies that are collecting and using data from their users G
b)
Government regulators and the U.S. Congress should demand answers about how Google and
other technology companies are collecting and using data from their users.
c) Government regulators and the U.S. Congress should request to Google and other technology
companies that are collecting and using data from their users to give them access to their systems
so they can control that they do.
d) Government regulators and the U.S. Congress should shut down Google and other technology
companies that are collecting and using data from their users
Answer: B
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
6) The _________ approach states that an ethical action is the one that provides the most good or
does the least harm.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: e
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
7) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an
example of a _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: e
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Synthesis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
8) The _________ approach maintains that an ethical action is the one that best protects and
respects the moral rights of the affected parties.
a) common good
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: d
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
9) The pursuit of the “American dream” and our ability to choose our religious orientation is a
reflection of the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: d
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
10) The _________ approach posits that ethical actions treat all human beings equally, or, if
unequally, then fairly, based on some defensible standard.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
11) The debate over CEO salaries being so much higher than other employees is an issue
addressed by the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: c
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
12) The _________ approach highlights the interlocking relationships that underlie all societies.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: a
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : AACSB || Technology
13) Obamacare was created to address the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: a
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
14) The _________ approach states that the morality of an action is based on whether the action
itself is right or wrong under a series of rules, rather than based on the consequences of that
action.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: b
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
15) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an
example of the _________ approach.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Answer: b
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
16) _________ is the first step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Answer: e
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
17) _________ is the second step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
18) _________ is the third step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Answer: b
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
19) _________ is the fourth step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Answer: d
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
20) _________ is the final step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Answer: a
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
21) _________ means that you accept the consequences of your decisions and actions.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Answer: d
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
22) Suppose you only study two hours for your next test. If you understand that means you may
not do well on that test and you are willing to accept the lower grade, it means you are taking
_________ for your actions.
a) accountability
b) answerability
c) liability
d) responsibility
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
23) _________ refers to determining who is responsible for actions that were taken.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Answer: a
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
24) Suppose you only study two hours for your next test. You fail the test and tell the teacher that
he or she obviously did a really terrible job teaching the material. This means you aren’t
accepting _________ for your actions.
a) accountability
b) answerability
c) liability
d) responsibility
Answer: a
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Application
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
25) _________ is a legal concept that gives individuals the right to recover the damages done to
them by other individuals, organizations, or systems.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Answer: c
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
26) Suppose you slip in the hallway and break your arm. You sue the school for not properly
marking the wet spot that caused you to slip. This is an example of ________.
a) accountability
b) answerability
c) liability
d) responsibility
Answer: c
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
27) _________ is the most recent example of ethical misbehavior in organizations.
a) Enron
b) Tyco
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Wells Fargo bank
d) WorldCom
Answer: c
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
28) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls;
it was passed to address the _________ crisis.
a) financial; Enron
b) financial; Wells Fargo bank
c) operational; Enron
d) operational; Wells Fargo bank
Answer: a
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
29) _________ issues involve collecting, storing, and disseminating information about
individuals.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Answer: c
Difficulty: Easy
Section Reference 1: 3.1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
30) _________ issues involve the authenticity, fidelity, and correctness of information that is
collected and processed.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Answer: b
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
31) You can check your credit report annually for free through TransUnion, Equifax, and
Experian. This allows you to catch signs of identity theft early and note any problems in your
credit reports. This is an example of an ethical issue that falls into the category of ________.
a) accessibility
b) accuracy
c) privacy
d) property
Answer: b
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
32) _________ issues involve the ownership and value of information.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Answer: d
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
33) _________ issues revolve around who should have access to information and whether they
should pay a fee for this access.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Answer: a
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
34) Companies like Google and Facebook make their money by selling your information to
advertisers. This is an example of an ethical issue that falls into the category of ________.
a) accessibility
b) accuracy
c) privacy
d) property
Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
35) Which of the following is a privacy issue?
a) How can we ensure that the information will be processed properly and presented accurately
to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what
conditions, and with what safeguards?
Answer: c
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
36) Which of the following is an accuracy issue?
a) How can we ensure that the information will be processed properly and presented accurately
to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what
conditions, and with what safeguards?
Answer: a
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
37) Which of the following is a property issue?
a) How can we ensure that the information will be processed properly and presented accurately
to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what
conditions, and with what safeguards?
Answer: b
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
38) Which of the following is an accessibility issue?
a) How can we ensure that the information will be processed properly and presented accurately
to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what
conditions, and with what safeguards?
Answer: d
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
39) Which of the following is a privacy issue?
Rainer, Information System, Fifth Canadian Edition
Testbank
a) How can we ensure that errors in databases, data transmissions, and data processing are
accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the
information there?
Answer: d
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
40) Which of the following is an accuracy issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are
accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the
information there?
Answer: a
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
41) Which of the following is a property issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are
accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the
information there?
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
42) Which of the following is an accessibility issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are
accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the
information there?
Answer: b
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
43) ________ can identify which clicks and key words had the largest impact on a consumer’s
purchasing decision.
a) DoubleClick
b) Google Analytics
c) Google Attribution
d) Periscope Data Analysis
Answer: C
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
44) What does recent data from the U.S. Census Bureau indicate about consumer habits?
a) The majority of shopping takes place online at retailers such as Amazon and Alibaba.
b) The majority of shopping takes place offline, in brick-and-mortar stores.
c) Online versus offline shopping habits remain relatively evenly distributed.
d) The rise in popularity for consumer-to-consumer selling, such as Facebook Marketplace and
Craigslist, has made it difficult to get accurate data about consumer shopping habits.
Answer: B
Difficulty: Medium
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
45) What is considered to be the “holy grail” of online advertising?
a) Being able to determine repeat customers to an online retailer
b) Being able to determine exact spending habits of the 18-35 year old demographic
c) Being able to determine which Web browsers elicit the most ad revenue
d) Being able to determine purchases generated by online ad campaigns
Answer: D
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: 3.1
Bloomcode: Comprehension
Standard: AACSB || Technology
46) _______ is a mobile, Web-based study application used by half of all high school students
and one-third of all college students in the United States.
a) Brainly
b) Dropbox
c) Google Docs
d) Quizlet
Answer: D
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: 3.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge
Standard: AACSB || Technology
47) The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018
highlighted the need for ____________.
a) more Web-based study tools to be available to students of all socioeconomic backgrounds.
b) universities to adapt to the changing nature of technology as it pertains to the ways in which
students are learning.
c) widespread reform in terms of Internet access on college campuses.
d) colleges to revise their Codes of Conduct to eliminate the ambiguity in students using
opensource study tools.
Answer: B
Difficulty: Medium
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
48) _________ is NOT an example of a data aggregator.
a) Acxiom
b) ChoicePoint
c) Google
d) LexisNexis
Answer: c
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
49) Companies purchase digital dossiers to ________.
a) create customer intimacy
b) engage in electronic surveillance
c) evaluate the competition
Rainer, Information System, Fifth Canadian Edition
Testbank
d) track their own reputations
Answer: a
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
50) Photo tagging is a type of _________ technology.
a) facial recognition
b) GPS
c) information privacy
d) RFID
Answer: a
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
51) The _________ model of informed consent permits the company to collect personal
information until the customer specifically requests that the data not be collected.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Answer: b
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
52) The _________ model of informed consent prohibits an organization from collecting any
personal information unless the customer specifically authorizes it.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Answer: a
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
53) Companies prefer the _________ model of informed consent.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Answer: b
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
54) Europeans and privacy advocates prefer the _________ model of informed consent.
a) opt-in
b) opt-out
c) sign-up
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
d) sign-out
Answer: a
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
55) License plate reader companies maintain that only two groups can use their software to find
the owner of a car: law enforcement agencies and ______ companies.
a) advertising
b) insurance
c) loan
d) repossession
Answer: D
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
56) While law enforcement officials, insurance companies, and automakers might be proponents
of LPR companies and the technology they use, private citizens are largely concerned with
_______.
a) issues of privacy
b) elimination of certain jobs that the technology replaces
c) increased costs of things like municipal fees and fines and insurance premiums
d) the Department of Motor Vehicles’ access to this information
Answer: A
Difficulty: Medium
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: 3.2
Bloomcode: Application
Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
57) Aadhaar is a _______ database.
a) biometric
b) credit card
c) password
d) security
Answer: A
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
58) ________ implemented a biometric database to better serve its poor citizens.
a) Australia
b) China
c) India
d) Russia
Answer: C
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
59) Which is NOT a current negative consequence of Aadhaar?
a) People were unfairly dropped from food subsidiary lists.
b) People have been dropped from life insurance programs.
c) Millions of users’ information has been leaked to non-government entities.
d) Government agencies have wrongfully published welfare beneficiaries’ information.
Answer: B
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Comprehension
Standard: AACSB || Technology
60) Some are concerned that the use of Aadhaar’s information will further impede _________.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
a) tax collection
b) access to the Internet
c) social mobility
d) government transparency
Answer: C
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Comprehension
Standard: AACSB || Technology
61) The Facebook and Cambridge Analytica scandal occurred in ______; the problem started in
______.
a) 2016; 2010
b) 2016; 2017
c) 2018; 2010
d) 2018; 2017
Answer: C
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
62) The Cambridge Analytica scandal involved ______ user data.
a) Amazon
b) Facebook
c) Google
d) Twitter
Answer: B
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
63) Cambridge Analytica’s data collection of Facebook users has been used to impact and affect
which area the most?
a) Politics
b) Retail
c) Banking and finance
d) Education
Answer: A
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: 3.2
Bloomcode: Comprehension
Standard: AACSB || Technology
Question type: True/False
64) When a patient is admitted to a hospital emergency room, the physician
may have never seen them before, and must diagnose their problem quickly. If the physician
knew the patient’s medical history, then the examination and subsequent diagnosis would be
faster. To address this problem, the Government of Canada created Canada Health Infoway.
Answer: True
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
Question type: Multiple Choice
65) In Canada. Doctors across the country now use electronic medical records to access patient
information online. Medical data is private, confidential data. There are three provinces that
had privacy laws that are considered similar enough to PIPEDA to be used instead: .
a) Alberta, British Columbia, and Ontario
b) Alberta, British Columbia, and Quebec
c) Alberta, British Columbia, and Manitoba
d) Alberta, Quebec, and Nova Scotia
Answer: B
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge
Standard: AACSB || Technology
66) One source of data used for medical and pharmaceutical research
is anonymized health data.
IQVIA Biotech (www.iqviabiotech.com) is
a company that sells data to pharmaceutical industry when physicians and clinics
have given permission and patient’s data is striped of names and other personal
information. Why is this legal and does not violate Canadian legislation?
a) Such anonymized data is not covered by privacy legislation.
b) Because physicians and clinics are giving permission
c) Once data is collected by Doctors, they own the data and not patients
d) Privacy laws do not apply to a clinic’s data
Answer: A
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
67) What was the result of E-Health Saskatchewan tracking access to the health records for the
privacy of the victims of the Humboldt Broncos junior hockey team bus crash of April 2018?
a) Several Doctors lost their license as a result of this tracking effort. .
b) Clinics were charged for selling private medical records to insurance companies.
c) Several doctors and an office manager were charged with inappropriately accessing the team’s
medical records during April and May 2018.
d)
E-Health Saskatchewan was charged with invasion of privacy by Doctors and Clinics.
Answer: C
Difficulty: Medium
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Application
Standard: AACSB || Technology
68) Besides doctors and medical clinics that are gathering electronic health information, who else
is gathering health information?.
a) The manufactures of smartphones, tablets, and personal technology such as Fitbit
b) Gyms gather information on users
c) Car manufacturers gather health information of drivers
d) Walmart monitors and gathers health of information of consumers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: A
Difficulty: Medium
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Application
Standard: AACSB || Technology
Question type: True/False
69) When you use an Internet app, the app could also have access to your data
Answer: True
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
70) When you use your email, or an Internet browser, the advertisements change rapidly in
response to your searches in Google.
Answer: True
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
71) Deciding what is right or wrong is always easy and clear-cut.
Answer: False
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : AACSB || Technology
72) What is unethical is not necessarily illegal.
Answer: True
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
73) If it is unethical, it is illegal.
Answer: False
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
74) All unethical actions are illegal in the United States.
Answer: False
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
75) All employees have a responsibility to encourage ethical uses of information and information
technology.
Answer: True
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
76) You check your credit report annually to ensure your identity hasn’t been stolen. This is an
example of a property issue.
Answer: False
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
77) Google and Facebook collect, store, and disseminate a great deal of information about the
people who use their websites. This is an example of an accuracy issue.
Answer: False
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
78) Telemarketing and ads on Google are examples of accessibility issues.
Answer: True
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
79) Google can analyze offline purchase activity even when consumers deactivate location
tracking on their smartphones.
Answer: True
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
80) Privacy experts agree with Google that Google’s double-blind encryption ensures the privacy
and security of consumer information.
Answer: False
Difficulty: Medium
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
81) Credit card data is only helpful to online retailers and publishers if those cards are used for
purchasing items online; they do not provide relevant information for brick-and-mortar
purchases.
Answer: False
Difficulty: Medium
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
82) The suspended Texas Christian University (TCU) students won their battle against TCU
because there was not enough evidence to prove they had cheated using Quizlet.
Answer: True
Difficulty: Medium
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
83) Quizlet’s community guidelines explicitly prohibit cheating.
Answer: True
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
84) One thing that the popularity of open source and online studying resources has uncovered is
that what learning looks like in many areas of study has drastically changed.
Answer: True
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four
categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
85) Privacy rights apply only to individuals.
Answer: False
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
86) Privacy rights apply to individuals, groups, and institutions.
Answer: True
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
87) The right to privacy is recognized today in all the US states and by the federal government,
either by statute or in common law.
Answer: True
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
88) The right of privacy is absolute.
Answer: False
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
89) The right of privacy is not absolute.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
90) Privacy must be balanced against the needs of society.
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
91) The public’s right to know supersedes the individual’s right of privacy.
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
92) The public’s right to know isn’t as important as the individual’s right of privacy.
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
93) Advancements in information technology make privacy harder to manage.
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
94) Data aggregators can collect public and non-public information to create digital dossiers.
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
95) Smartphones are sensors that can be used for electronic surveillance.
Answer: True
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
96) The United Nations ensures privacy laws are consistent across countries so that it is easier to
do business in multiple countries.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
97) The European Union has stricter data protection laws than the US.
Answer: True
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
98) The city of Boston suspended its license plate reader program because it accidently revealed
information to a newspaper.
Answer: True
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
99) Vigilant makes money by charging police departments for license plate readers and access to
its databases.
Answer: False
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge
Standard: AACSB || Technology
100) The Driver’s Privacy Protection Act of 1994 does not limit
who
can access information
about automobile registrations and drivers, only
what
information can be used for.
Answer: False
Difficulty: Medium
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Analysis
Standard: AACSB || Technology
101) Critics view Aadhaar as a step toward a surveillance state.
Answer: True
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
102) As anticipated by Aadhaar’s opponents, the Supreme Court found that Aadhaar violates
privacy rights.
Answer: False
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
103) The origination of Aadhaar was from a benevolent place: identifying impoverished Indians
so that they could be documented and therefore receive government benefits.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
104) According to Facebook executives, the Facebook and Cambridge Analytica scandal
occurred because hackers got access to the database by stealing key passwords from users.
Answer: False
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
105) Facebook’s main legal battles are against Russia.
Answer: False
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
106) Much of the discovery of the ways in which Cambridge Analytica and Facebook were
misusing user data came from the Pew Research Center.
Answer: False
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
107) Facebook has been harshly fined and has undergone massive restructuring as a result of the
discovery of the Cambridge Analytica scandal.
Answer: False
Difficulty: Medium
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Application
Standard: AACSB || Technology
Question type: Text Entry
108) _____ refers to the principles of right and wrong that individuals use to make choices that
guide their behavior.
Answer: Ethics
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
109) The utilitarian approach states that an ethical action is the one that provides the most ___ or
does the least ___.
Answer 1: good
Answer 2: harm
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
110) The fairness approach posits that ethical actions treat all human beings equally, or, if
unequally, then fairly, based on some ___.
Answer: defensible standard
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
111) The common good approach highlights the ___ relationships that underlie all societies.
Answer: interlocking
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
112) The deontology approach states that the morality of an action is based on whether that
action itself is right or wrong under a series of rules, rather than based on the ___ of that action.
Answer: consequences
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
113) ___ is the right to be left alone and to be free of unreasonable personal intrusions.
Answer: Privacy
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
114) Privacy is the right to be ___ and to be free of unreasonable personal intrusions.
Answer: left alone
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
115) Information privacy is the right to determine when, and to what extent, ___ about you can
be gathered or communicated to others.
Answer: information
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
116) ___ is the right to determine when, and to what extent, information about you can be
gathered or communicated to others.
Answer: Information privacy
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
117) The process of forming a digital dossier is called ___.
Answer: profiling
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Question type: Essay
118) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe
the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all
five approaches.
Answer:
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Synthesis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Analytic
Standard 5 : AACSB || Reflective Thinking
Solution: Ethics – principles of right and wrong that individuals use to make choices that guide
their behavior
No because an answer could be different based on the approach chosen
1) Utilitarian approach states that an ethical action is the one that provides the most good or does
the least harm; a policeman killing a person who is holding others hostage is best for those being
held hostage
2) Rights approach maintains that an ethical action is the one that best protects and respects the
moral rights of the affected parties; nobody should be killed because everyone has the right to
live
3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
then fairly, based on some defensible standard; killing someone who is holding others hostage is
fair because people know it isn’t right to threaten the lives of others
4) Common good approach highlights the interlocking relationships that underlie all societies;
the police being on-scene is for the best of everyone – they have the right to kill under these
circumstances
5) Deontology approach states that the morality of an action is based on whether than action
itself is right or wrong under a series of rules, rather than based on the consequences of that
action; it is never OK to kill a person even if they are being “bad”
119) The concept of “green IT” is an ethical decision every company needs to make. Using the
five steps in the general framework for ethical decision-making, how would you handle the
situation if you were the CEO?
Answer:
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of
ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: 1) Recognize an ethical issue – could not being green damage the environment? What
are the good and bad alternatives for being green? Are there legal requirements for being green
(energy consumption, pollution, etc.) ?
2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient
information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted
those people?
3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good,
deontology
4) Make a decision and test it – pick an option
5) Act and reflect on the outcome of your decision – am I taking better care of the environment?
120) Describe five ways a digital dossier is created. Describe a potential profile that has been
created for your life.
Answer:
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Synthesis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls,
banking transactions, queries to search engines, government records
Potential profile – many schools have cameras and many towns have cameras at intersections to
record what students are doing at school or on the road (students may also have ID badges that
are required to get into buildings) ; many students already have credit cards so purchases are
tracked, all activity on phones can be tracked including phone calls and text messages, many
students are already doing online banking, all Internet searching is tracked, students may also
talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be
tracked
121) Who conducts electronic surveillance? What types of electronic surveillance impact your
life? Are you paranoid about this? If not, should you be? Explain why or why not for these last
two questions.
Answer:
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many
capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric
readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that
watch activity, drones, URL filtering, etc.
122) How does the Internet create a conflict between free speech and privacy?
Answer:
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Analysis
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies
can check the Internet on potential and current employees, but people may not be able to defend
themselves (could harm chances of getting hired or could result in getting fired).
123) Given the global nature of our economy, what are the international aspects of privacy that
we need to consider in our business dealings?
Answer:
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in
each of three places that store personal data.
Bloomcode: Comprehension
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Solution: 50 countries have data protection laws
Some countries have stricter laws (Europe)
No consistent or uniform standards for privacy and security – obstructs flow of information
among countries (transborder data flows)
Privacy issues – whose laws do you follow?
Come up with “safe harbor” frameworks for regulation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help