Questions

The essence of this section is to enable you to;
 * Student Objectives**
 * 1) Analyze the relationships among ethical, social, and political issues that are raised by information systems.
 * 2) Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions.
 * 3) Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
 * 4) Assess how information systems have affected everyday life.




 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 1."]]==

Which moral dimension of the information age involves cultural values and practices?
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_1.gif width="37" height="26"]]
 * || ||  || Information rights and obligations ||
 * || Accountability and control ||
 * || Property rights and obligations ||
 * || Quality of life || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 1"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 2."]]==

Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_2.gif width="37" height="26"]]
 * || ||  || nonobvious relationship awareness (NORA). ||
 * || profiling. ||
 * || due process. ||
 * || informed consent. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 2"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 3."]]==

Correlating relationships to find obscure hidden connections in disparate databases and other sources is called
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_3.gif width="37" height="26"]]
 * || ||  || nonobvious relationship awareness. ||
 * || profiling. ||
 * || due process. ||
 * || informed consent. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 3"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 4."]]==

A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_4.gif width="37" height="26"]]
 * || ||  || responsibility. ||
 * || liability. ||
 * || accountability. ||
 * || due process. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 4"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 5."]]==

Most American and European privacy law is based on a regime called
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_5.gif width="37" height="26"]]
 * || ||  || fair information practices (FIP). ||
 * || privacy rights of individuals. ||
 * || safe harbor theories. ||
 * || opt-out models of informed consent. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 5"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 6."]]==

Tiny files deposited on a computer hard drive when a user visits certain Web sites are called
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_6.gif width="37" height="26"]]
 * || ||  || Web bugs. ||
 * || cookies. ||
 * || safe harbors. ||
 * || viruses. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 6"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 7."]]==

The ________ model of informed consent permits the collection of personal information until the consumer specifically requests that data not be collected.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_7.gif width="37" height="26"]]
 * || ||  || safe harbor ||
 * || platform for privacy preferences ||
 * || opt-out ||
 * || opt-in || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 7"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 8."]]==

An intellectual work product used for a business purpose is classified as a ________ provided it is not based on information in the public domain.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_8.gif width="37" height="26"]]
 * || ||  || copyright ||
 * || patent ||
 * || digital millennium copyright ||
 * || trade secret || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 8"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 9."]]==

Which law protects creators of intellectual property for the life of the author plus an additional 70 years after the author's death?
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_9.gif width="37" height="26"]]
 * || ||  || Copyright ||
 * || Trade secret ||
 * || Patent ||
 * || Digital Millennium copyright || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 9"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 10."]]==

Which law grants the owner an exclusive monopoly on the ideas behind an invention for 20 years?
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_10.gif width="37" height="26"]]
 * || ||  || Copyright ||
 * || Trade secret ||
 * || Patent ||
 * || Digital millennium copyright || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 10"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 11."]]==

The commission of acts involving a computer that may not be illegal but are considered unethical is known as
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_11.gif width="37" height="26"]]
 * || ||  || computer crime. ||
 * || information privacy violations. ||
 * || lack of accountability. ||
 * || computer abuse. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 11"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 12."]]==

Which of the following is //not// a principal source of poor system performance?
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_12.gif width="37" height="26"]]
 * || ||  || Software bugs and errors ||
 * || Government regulation ||
 * || Hardware or facility failures ||
 * || Poor input data quality || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 12"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 13."]]==

Which of the following makes it illegal to circumvent technology-based protections of copyrighted materials?
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_13.gif width="37" height="26"]]
 * || ||  || Freedom of Information Act of 1966 ||
 * || E-Government Act of 2002 ||
 * || World Intellectual Property Organization Treaty ||
 * || Electronic Communications Privacy Act of 1986 || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 13"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 14."]]==

The single largest source of repetitive stress injuries is
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_14.gif width="37" height="26"]]
 * || ||  || computer monitors. ||
 * || computer keyboards. ||
 * || computer mouse. ||
 * || computer speakers. || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 14"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 15."]]==

The most common kind of computer-related repetitive stress injury is
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_15.gif width="37" height="26"]]
 * || ||  || computer vision syndrome. ||
 * || severe back pain. ||
 * || technostress. ||
 * || carpal tunnel syndrome (CTS). || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 15"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 16."]]==

In today's new legal environment, managers who violate the law and are convicted will most likely spend time in prison.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_16.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 16"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 17."]]==

Information systems don't necessarily threaten existing distributions of power, money, rights, and obligations.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_17.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 17"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 18."]]==

Political institutions do not require a demonstration of real harm before they develop new laws governing information systems.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_18.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 18"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 19."]]==

Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_19.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 19"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 20."]]==

Accountability means that you accept the potential costs, duties, and obligations for the decisions you make.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_20.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 20"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 21."]]==

At present, most U.S. federal privacy laws apply only to the federal government and regulate very few areas of the private sector.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_21.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 21"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 22."]]==

A safe harbor requires government regulation and enforcement.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_22.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 22"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 23."]]==

Most Internet businesses do little to protect customer privacy.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_23.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 23"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 24."]]==

Copyright law protects both the underlying ideas behind a work and the manifestation in a work.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_24.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 24"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 25."]]==

The Internet has made it much easier to protect intellectual property.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_25.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 25"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 26."]]==

Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_26.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 26"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 27."]]==

Lower-level employees may be empowered to make minor decisions, but the key policy decisions are still very centralized.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_27.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 27"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 28."]]==

Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_28.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 28"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 29."]]==

Repetitive stress injuries due to computer use are unavoidable.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_29.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 29"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 30."]]==

According to experts, humans working continuously with computers come to expect other humans to behave like computers.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_30.gif width="37" height="26"]]
 * || True False || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 30"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 31."]]==

Discuss how information systems raise new ethical questions for both individuals and societies.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_31.gif width="37" height="26"]]
 * || || To create paragraphs in your essay response, type at the beginning of the paragraph, and at the end. ||
 * || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 31"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 32."]]==

Define the four basic concepts of ethics in an information society.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_32.gif width="37" height="26"]]
 * || || To create paragraphs in your essay response, type at the beginning of the paragraph, and at the end. ||
 * || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 32"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 33."]]==

Explain the concept of privacy and what the U.S. government is doing to help protect individual online privacy.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_33.gif width="37" height="26"]]
 * || || To create paragraphs in your essay response, type at the beginning of the paragraph, and at the end. ||
 * || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 33"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 34."]]==

Discuss how the Internet and other information technologies challenge intellectual property rights.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_34.gif width="37" height="26"]]
 * || || To create paragraphs in your essay response, type at the beginning of the paragraph, and at the end. ||
 * || || || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_left.gif width="9" height="9"]] ||  || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_lower_right.gif width="9" height="9" caption="End of Question 34"]] ||


 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_left.gif width="9" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="9"]] || [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/ps_bkgd_upper_right.gif width="9" height="9"]] ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="1"]] || ||  || ==[[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/pixel.gif width="1" height="5" caption="Question 35."]]==

Discuss how technology impacts our quality of life and describe some of the negative social consequences of systems.
|| ||^  ||
 * [[image:http://wps.prenhall.com/wps/media/styles/1480/_skins_/D/default_vanilla/problem_type_35.gif width="37" height="26"]]
 * || || To create paragraphs in your essay response, type at the beginning of the paragraph, and at the end. ||