179. A person sets up an electronic bulletin board on which he encourages others to upload computer-based applications’ software and games for free. The software and games are copyrighted. He then transfers the uploaded programs to a second bulletin board without any fees to potential users. The users with password access to the second bulletin board can download the programs. Under this scenario, who would be liable under wire fraud statutes?

a. The originator of the bulletin boards

b. Users who uploaded the programs to the first bulletin board

c. Users who downloaded the programs from the second bulletin board

d. Users who downloaded the programs from the first bulletin board

179. a. The originator of the bulletin board would be fully liable because he made illegal copying and distribution of copyrighted software available without payment of license fees and royalties to software manufacturers and vendors.

180. Which one of the following can cause the least damage in terms of severe financial losses?

a. Online stalkers

b. Computer worm designers

c. Computer virus designers

d. An employee tapping into a former employer’s computer

180. a. Online stalking is harassment by a computer via sending threatening or obscene electronic-mail messages. Antistalking laws are state government-dependent and hence not enforced uniformly. The victim may be able to seek a restraining order to stop such online conduct.

The other three choices are incorrect because they cause heavy damage in terms of financial losses. A worm and virus designer can destroy valuable computer programs and tie up the network for hours and days. An employee tapping into a former employer’s computer can steal valuable information and can sell it to competitors for financial gain or revenge.

181. Which one of the following raises significant legal issues in terms of fair use of copyrighted material?

a. Published work on paper

b. Unpublished work on paper

c. Digitized work on computer

d. Out-of-print work on paper

181. c. Information that is in digital form, and is thus easy to reuse and manipulate, raises a number of legal issues about what constitutes fair use. For example, if computer software is reverse-engineered, the systems analyst might copy the entire work, not just parts of it. This causes a significant loss of market share to the software vendor.

The other choices deal with paper media where “fair use” is clearly defined in terms of percentage of the work copied or used.

182. Which of the following is a major risk of not tracking personal computer hardware and software assets?

a. Incorrect amortization charges

b. Incorrect depreciation charges

c. Charges of software piracy

d. Lost vendor discounts

182. c. Managing PC hardware and software assets alerts management of any new, unauthorized software brought into the organization for the purpose of using it. These alerts not only find the presence of computer viruses but also protect from software piracy charges. Any unauthorized use of software should be discouraged.

The other three choices are incorrect because incorrect depreciation and amortization charges and lost vendor discounts are also risks, but not as big as the computer viruses and charges of software piracy. Amortization is used for software, whereas depreciation is used for hardware. An incorrect depreciation and amortization charge will result when the hardware and software assets are not properly accounted for and valued for. Vendor purchase discounts will be lost when centralized purchasing management is not aware of the potential assets.

183. A United States organization is transmitting its data outside the country. Its management must be alerted to which of the following?

a. The receiving country’s transborder laws

b. The transmitting country’s transborder laws

c. The receiving organization’s data center policies

d. The transmitting organization’s data center policies

Перейти на страницу:

Поиск

Похожие книги