Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Human Resource » Page 424

Human Resource

Q: (p. 301) Two of the largest strongholds for software piracy are: A. India and China. B. Japan and India. C. China and South Africa. D. South Africa and India.

Q: (p. 301) Loss of annual sales due to software piracy by software companies was estimated to be: A. $120 million. B. $25 billion. C. $53 billion. D. Impossible to calculate.

Q: (p. 301) Intellectual property refers to:A. Protecting one's ideas, concepts, and symbolic creations.B. Special laws protecting copyrights, patents, and trademarks.C. Prohibiting the downloading of commercial software or videogames.D. All of the above.

Q: (p. 300) The Child Online Protection Act, passed in 1998, A. Specifically applies to children under 13 years of age. B. Has settled the debate over protecting children from adult-oriented Web sites. C. Has been a model for many European countries' legislation. D. Was vetoed by President Bush as too difficult and too costly to enforce.

Q: (p. 300) Which of the following is not commercial software to block pornography on the Internet? A. Child Safe. B. beTrusted. C. Cyber Snoop. D. Cyber Sitter.

Q: (p. 300) GetNetWise, launched by several major Internet companies, provided: A. Online safety guides for parents. B. Special browsers and other tools for families. C. Web sites appropriate for children. D. All of the above.

Q: (p. 298) At Cisco Systems, the CIO: A. Was credited with slashing $1.5 billion in costs by using Internet technologies. B. Was responsible for moving $5 billion in goods and services through the Internet. C. Discovered that online trading cost only 20 percent as much as conventional trading. D. Was fired for failing to stop computer hackers from breaking into their systems.

Q: (p. 298) Primarily, the CIO is expected to: A. Increase costs through efficiency and productivity. B. Reduce the company's competitive advantage. C. Enable or drive business innovation. D. Know how the rank-and-file are performing.

Q: (p. 298) A CIO is the company's: A. Chief intelligence overseer. B. Chief information officer. C. Coordinator of international operations. D. Controller of internal overhead.

Q: (p. 297) Honeypots are: A. A series of Disney-created Web sites for children. B. Adult Web sites offering fee-for-service information. C. Government programs that profile computer hackers. D. Systems used to lure hackers into a fabricated Web site.

Q: (p. 297) The Federal Trade Commission advocates which of the following for business security? A. Take stock. B. Scale down. C. Pitch it. D. All of the above.

Q: (p. 297) In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database: A. Harvard. B. Dartmouth. C. Princeton. D. None of the above.

Q: (p. 296) The corporate nemesis responsible for creating and spreading computer attacks is called a: A. Google. B. Zombie. C. Computer hacker. D. Platform.

Q: (p. 296) Spraying random packets of data in huge streams over the Internet are: A. Botnets. B. Worms. C. Zombies. D. Hackers.

Q: (p. 296) A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a: A. Hacker. B. Zombie. C. Worm. D. Ghost.

Q: (p. 295) In a 2007 survey of more than 800 North American privacy and security professionals, what percentage acknowledged having at least one reportable data breach of personally identifiable information with their organizations during the past 12 months? A. 25 percent. B. 40 percent. C. 85 percent. D. 99 percent.

Q: (p. 295) The Children's Online Privacy Protection Act of 1998 requires: A. Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13. B. Web site operators to post user privacy laws. C. Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States. D. All of the above.

Q: (p. 294) In 2002, this allowed Web sites to tell the user's Web browser about the site's data privacy policies: A. Platform for Privacy Preference Project. B. Electronic Privacy Information Center. C. Defense to Protect Information. D. Consumer Information Act.

Q: (p. 294) In a 2008 survey from Columbia University, what percentage of American adults said they were uncomfortable when Web sites used personal information to tailor advertisements? A. 20 percent. B. 59 percent. C. 70 percent D. 89 percent.

Q: (p. 293) By the end of 2008, the number of attacks on information security reached: A. 200,000. B. 2 million. C. 20 million. D. 200 million.

Q: (p. 293) In response to employees' challenges that business practices were invasions of their privacy, many businesses: A. Developed a privacy policy. B. Banned sexual harassment. C. Installed an 800-number. D. Fired the disgruntled workers.

Q: (p. 310) Most genetically modified corn grown in the United States is made into animal feed or ethanol.

Q: (p. 305) The human genome is the application of engineering to create materials on a molecular or atomic scale.

Q: (p. 304) Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.

Q: (p. 301) Software piracy is a spreading and global problem.

Q: (p. 298) The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.

Q: (p. 297) Honeypots are systems used by security professionals to prevent hackers from entering a computer network.

Q: (p. 295) GetNetWise and the Child Online Protection Act of 1998 protect children in the United States against adult-oriented Web sites.

Q: (p. 295) Children are the least vulnerable to invasions of privacy.

Q: (p. 294) Advocacy groups such as the Electronic Privacy Information Center criticized the P3P concept as too difficult for users to understand or use properly.

Q: (p. 294) Many experts have raised ethical questions about the ways RFID technology enables businesses, governments, and criminals to gather information about presale, sales, and post-sale activities.

Q: (p. 294) Radio Frequency Identification (RFID) was featured in a TV commercial where "the packages knew the truck was lost" before the driver did.

Q: (p. 293) Recent technological advances have decreased the number of way that privacy violations may occur.

Q: (p. 293) Due to efforts by companies to help consumers feel more secure about their personal information, consumer mistrust has diminished.

Q: (p. 293) Most Americans mistakenly believe that if a Web site has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.

Q: (p. 293) Many businesses have developed a privacy policy, which explains what use of the company's technology is permissible.

Q: (p. 285 - 287) Discuss the issue of digital divide. Is it lessening or widening with more technological innovation? How have businesses, government bodies, and nonprofit organizations met the digital divide challenge?

Q: (p. 284 - 285) Since surfing the Internet for medical information is widespread, how can the quality of information provided online be verified as accurate or reliable?

Q: (p. 277 - 280) What is social networking? What are the ethical challenges faced by some of the more popular social networking sites?

Q: (p. 275 - 276) Should all businesses venture into e-commerce, or is it better for only certain types of businesses?

Q: (p. 271 - 272) Discuss what factors have fueled technological growth and development.

Q: (p. 271 - 271) Describe the activities and primary skills used in each of the six periods of technology development.

Q: (p. 269 - 270) Define technology and describe its three primary features.

Q: (p. 287) The unmistakable economic and social force of technology is evident in A. Every part of the world. B. Every industry. C. Every aspect of our lives. D. All of the above.

Q: (p. 286) The United Nations' Human Settlements Program forecast that by the year 2020 what percent of the world's population would live in poverty? A. 25 percent. B. 35 percent. C. 45 percent. D. 55 percent.

Q: (p. 286) A program designed to build, and market ultralightweight, durable netbook computers for children aged 6 through 12 throughout the world is called: A. Computers without Boarders. B. One Laptop per Child. C. No Child Left Behind. D. Computers for Kids.

Q: (p. 285) The digital divide describes the gap between those: A. Individuals who have technology and those who do not. B. Businesses who use e-business and those who do not. C. Hospitals who use online information and those who do not. D. Individuals who have broadband technology and those who do not.

Q: (p. 285) According to an article published in the New England Journal of Medicine in 2009, based on a survey of 3,000 hospitals, what percentage of the nation's medical care facilities were found to have digital or electronic health records? A. 1 percent. B. 5 percent. C. 9 percent. D. 11 percent.

Q: (p. 285) In 2009 the U.S. government announced plans to spend how much to spur the use of digital or electronic patient records, as part of a national effort to reduce medical costs? A. 19 million. B. 19 billion. C. 119 billion. D. None of the above.

Q: (p. 284) A group of people who leap to the most dreadful conclusions while researching health matters online are called: A. Hypochondriac. B. Cyberchondriacs. C. Hyperchondriac. D. Internchondriac.

Q: (p. 283) In 2006, the largest for-profit online education provider was: A. Apollo Group. B. Career Education Corporation. C. University of Phoenix. D. Hooked on Phonics.

Q: (p. 283) By 2008, the ratio of computers to students in the United States was: A. One to ten. B. One to five. C. One to two. D. One to one.

Q: (p. 282) A hacking technique that redirects a user's computer from a legitimate Web site to another site by altering the user's computer or router is called: A. Phishing. B. Pharming. C. Tweeting. D. Censorship.

Q: (p. 281) The practice of duping computer users into revealing their passwords or other private data under false pretences is called: A. Phishing. B. Pharming. C. Tweeting. D. Censorship.

Q: (p. 281) Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones? A. United States. B. Japan. C. United Kingdom. D. Germany.

Q: (p. 280) Another name for unsolicited commercial emails is: A. Spam. B. Junk e-mail. C. UCE. D. All of the above.

Q: (p. 280) Laughpractice.blogspot.com is an example of a(n): A. Blog. B. Vlog. C. Spam. D. iTune.

Q: (p. 279) A social network available only to IBM employees on the company's intranet is called: A. The hut. B. Beekeeper. C. Beehive. D. Hat and glove.

Q: (p. 277) A pain or numbness in your thumbs caused by constant e-mailing, messaging, or Internet surfing on hand-held devices is called: A. BlackBerry thumb. B. Cell phone thumb. C. PDA thumb. D. None of the above.

Q: (p. 276) One controversial area where e-business has made a significant impact is: A. Online shopping. B. Online gambling. C. Online libraries. D. None of the above.

Q: (p. 275) The buying and selling of goods and services electronically is called: A. M-commerce. B. E-business. C. Telecommunications. D. Software piracy.

Q: (p. 275) Which of the following is an example of a business firm that has invested directly in technology through their research and development operations? A. Google. B. Enron. C. Mattel. D. Lockheed Martin.

Q: (p. 274) Which of the following countries is not one of the top 15 Internet users? A. Singapore. B. United Kingdom. C. China. D. United States.

Q: (p. 271) A technological application that uses biological systems or living organisms to make or modify products or processes for specific use is called: A. Biosphere outcome. B. Metatechnology. C. Biology. D. Biotechnology.

Q: (p. 271) Descriptive information embedded within Web pages, documents, and files is called: A. Metadata. B. Gigabytes. C. Search engines. D. Information.

Q: (p. 271) The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called: A. The personal computer. B. Cyberspace. C. Cloud computing. D. Communication.

Q: (p. 270) The information phase of technology primarily requires: A. Providing services. B. Intellectual and electronic skills. C. Manual and machine skills. D. The same skills as needed in previous phases.

Q: (p. 270) Which of the following is not true about the service phase of technology? A. It was the fourth phase in the development of technology. B. It emphasized providing services. C. It required manual and intellectual skills. D. It dominated from 1900 to 1960.

Q: (p. 270) The phase of technology that focuses on building material goods and manual labor is: A. Agrarian. B. Service. C. Industrial. D. Information.

Q: (p. 270) In the nomadic-agrarian phase of technology in society, people: A. Hunted wild animals for meat. B. Gathered wild plants for food. C. Provided services. D. Both A and B, but not C.

Q: (p. 270) The self-reinforcing feature of technology means that: A. Civilization develops at an uncontrollable pace. B. Developing economies demand newer and larger innovations. C. Technology acts as a multiplier to encourage is own faster development. D. An invention in one place is localized only.

Q: (p. 270) The use of publicly accessed servers to store users' text photos, videos and other data at remote sites, rather than on their own computers is called: A. Business-to-business commerce. B. Technology ripples. C. Future shock. D. Cloud computing.

Q: (p. 269) Nanotechnology is an example of the latest: A. Future shock. B. E-commerce. C. Agarian. D. Semantic.

Q: (p. 287) High-technology businesses, governments, and community groups acting together appear to be winning the battle of making technology more accessible to all people regardless of their race, income, education, age, or residence.

Q: (p. 286) In 2008, there were 3.3 billion phone subscriptions worldwide, a number that was barely half of the world's total population.

Q: (p. 285) Recently, some evidence suggested that the digital divide in the United States is widening.

Q: (p. 285) The gap between those who have access to technology and those who do not was called the digital divide.

Q: (p. 280) In 2009, the global ratio of spam in e-mail traffic was 1 in every 1.32 e-mails.

Q: (p. 275) Businesses generally discovered that the adoption of technology was a money-saver rather than an expense in the short run.

Q: (p. 275) Among Internet shoppers, South Korea accounted for the highest percentage (99 percent) of those with Internet access who used the Internet to shop.

1 2 3 … 819 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved