Chapter 18 Question 3 and Chapter 23 Question 1 and 5 of the Legal Environment of Business in the Information Age

In: Other Topics

Submitted By lgunter5
Words 390
Pages 2
Chapter 18
The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur? The abuses that are likely to occur without government regulation are more illnesses, deaths and allergic reactions from not knowing what is in the product. If companies were not regulated by the government then you would have mislabeling. By this I mean you could have items that are marked low fat or low sodium when that is not the case. They would not have to include whether or not it was made with or surrounding peanuts and we all know the consequences of that. Having the government regulate labels, warranties and consumer products is very beneficial to the consumers as they are able to make more educated decisions by knowing what they are selecting.

Chapter 23
Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business, seeking to sell to customers located in other states, what are some things you could do to avoid having states where these customers live require you to collect sales tax? Some of the things you could do to avoid having to pay taxes to states where the customers live is by not receiving the benefits from that state. You could also use mail-order catalog sales. If the business only sends the catalog to residents of a particular state that is not sufficient enough to subject the company to the jurisdiction of that state and therefore they don’t have to pay the sales tax of that state.

The EU has recently changed its trade laws and now refuses, among member nations, to enforce choice of forum clauses when a consumer is a purchaser. How might this refusal to enforce choice of forum clauses impact websites within the EU? Within the EU, refusal to enforce choice of forum…...

Similar Documents

Pricinples of Information Security, Chapter 5 Review Questions

...1. How can a security framework assist in the design and implementation of a security infrastructure? Designing a working plan for securing the organization s information assets begins by creating or validating an existing security blueprint for the implementation of needed security controls to protect the information assets.  A framework is the outline from which a more detailed blueprint evolves.  The blueprint is the basis for the design, selection, and implementation of all subsequent security policies, education and training programs, and technologies.  The blueprint provides scaleable, upgradeable, and comprehensive security for the coming years.  The blueprint is used to plan the tasks to be accomplished and the order in which to proceed. What is information security governance? Governance is “the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.”1 Governance describes the entire process of governing, or controlling, the processes used by a group to accomplish some objective. Just like governments, corporations and other organizations have guiding documents—corporate charters or partnership agreements—as well as appointed or elected leaders or officers, and planning and operating procedures. These elements in combination......

Words: 4589 - Pages: 19

Business Math Chapter 3 Questions

...Chapter 3 Problems Valuing Decisions 1. Honda Motor Company is considering offering a $2000 rebate on its minivan, lowering the vehicle’s price from $30,000 to $28,000. The marketing group estimates that this rebate will increase sales over the next year from 40,000 to 55,000 vehicles. Suppose Honda’s profit margin with the rebate is $6000 per vehicle. If the change in sales is the only consequence of this decision, what are its costs and benefits? Is it a good idea? 2. You are an international shrimp trader. A food producer in the Czech Republic offers to pay you 2 million Czech koruna today in exchange for a year’s supply of frozen shrimp. Your Thai supplier will provide you with the same supply for 3 million Thai baht today. If the current competitive market exchange rates are 25.50 koruna per dollar and 41.25 baht per dollar, what is the value of this deal? 3. Suppose the current market price of corn is $3.75 per bushel. Your firm has a technology that can convert 1 bushel of corn to 3 gallons of ethanol. If the cost of conversion is $1.60 per bushel, at what market price of ethanol does conversion become attractive? 4. Suppose your employer offers you a choice between a $5000 bonus and 100 shares of the company stock. Whichever one you choose will be awarded today. The stock is currently trading for $63 per share. a. Suppose that if you receive the stock bonus, you are free to trade it. Which form of the bonus should you choose? What is its value? b. Suppose that if......

Words: 1630 - Pages: 7

Chapter 4 Review Questions 1-5

...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share......

Words: 3229 - Pages: 13

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a......

Words: 2493 - Pages: 10

Principles of Information Security: Chapter 1 End-of-Chapter Questions

...Chapter 1 Assignmnet Ryan M. Kethcart INFOST-491 SEC-OL Exercises 1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined? a. A paper titled the “Rand Report R-609” was sponsored by the Department of Defense and initiated the movement toward security that went beyond protecting physical locations. It attempted to define multiple controls and mechanisms necessary for the protection of a multilevel computer system; identifying the role of management and policy issues in computer security. This report/paper significantly expanded the scope of computer security to include the following: securing the data, limiting random and unauthorized access to said data, and involving personnel from multiple levels of the organization in matters pertaining to information security. 3. Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. a. Threat: i. Theft of Media b. Threat Agent: ii. Hacker (Ex: Ima Hacker) c. Vulnerability: iii. Unprotected system port d. Exposure: iv. Using a website monitored by malicious hackers, reveals a vulnerability – i.e. Unprotected system port e. Risk: v. Low level risk – The probability......

Words: 790 - Pages: 4

Meteorology Chapter 5 Questions

...Chapter 5, Review Questions ________________________________________________________________________ 1. How does Dalton’s law apply to the atmosphere? 2. Provide a definition of air pressure that applies to Earth’s surface and any altitude within the atmosphere. 3. Compare the advantages and disadvantages of mercury barometer versus an aneroid barometer. 4. Explain how air pressure tendency can be a useful indicator of future weather. 5. Air is a compressible mixture of gases. How does this property of air affect the rate at which air pressure decreases with increasing altitude? 6. How does a change in temperature affect air density? How does a change in humidity affect air density? 7. Why does a cold, dry air mass exert a greater surface air pressure than an equally cold but more humid air mass? 8. Why are air pressure readings adjusted to what they would be if the weather station were actually located at sea level? 9. Distinguish between Charles’ law and Boyle’s law. 10. Why is the dry adiabatic lapse rate greater than the moist adiabatic lapse rate? Chapter 5, Critical Thinking Questions ________________________________________________________________________ 1. Is there some altitude which clearly marks the top of the atmosphere? Explain your response. 2. On televised weathercasts, air pressure is often reported in units of length (inches) rather than units of pressure (millibars). Explain why. 3. On a particularly warm...

Words: 423 - Pages: 2

1 and 3 in Chapter 5, and Questions 8 and 9 in Chapter 6.

...Do 1 and 3 in chapter 5, and questions 8 and 9 in chapter 6. For Chapter 5 question 1: One of the potential problems mentioned in the chapter with gathering information requirements by observing potential system users is that people may change their behavior when observed. What could you do to overcome this potential confounding factor in accurately determining information requirements? (5 points) There is no doubt that an employee may change their attitude or work behavior when they are being observed. One thing that I would do is keep observing the employee, however informing the employee before the observation would allow the employee to attempt to work with their best quality while being observe. This will allow the observer to identify the issues that the worker really has. For Chapter 5 question 3: Suppose you were asked to lead a JAD session. List ten guidelines you would follow in playing the proper role of a JAD session leader. (5 points) Chap 5, Question 3: Ten Guidelines listed 1. Limit the distraction to focus on meeting 2. Set an agenda and keep the session on track 3. Always remain neutral  4. Identify and address critical political and organizational issues early 5. Establish the executive sponsor as the tiebreaker 6. Facilitator should be train and be critically involved  7. Team attendance and participation are mandatory 8. Respond to ideas that relate to the project  9. Keep the team in check on topics that relate to the meeting  10.......

Words: 353 - Pages: 2

Chapter 3 Questions

...1. Which of the following is true about 1 bit? c. Represents one binary digit 2. Which of the following terms means approximately 106 bytes? b. Megabyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report? c. Character set 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? d. The binary equivalent of decimal 123456789 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? a. An actuator arm 9. A student writes a report using a word processor,......

Words: 894 - Pages: 4

Chapter 1 Essay Questions

...Chapter 1 Essay Questions: 1. Explain the relationships among the four functions of management. The four basic management functions are planning, influencing, and controlling. a. Planning involves choosing tasks that must be performed to attain organizational goals, outlining how the tasks must be performed, and indicating when they should be performed. b. Organizing-can be thought of as assigning the tasks developed under the planning function to various individuals or groups within the organization. c. Influencing is referred to as motivating, leading, directing, or actuating. d. Controlling is the management function through which managers i. Gather information that measures recent performance within the organization ii. Compare present performance to pre-established performance standards. iii. From this comparison, determine whether the organization should be modified to meet pre-established standards. These functions are interrelated because the performance of one depends on the performance of the others. For example, organizing is based on well thought out plans developed during the planning process, and influencing systems must be tailored to reflect both these plans and the organizational design used to implement them. The fourth function, controlling, involves possible modification to existing plans, organizational structure, or the motivation system used to develop a more successful effort. ...

Words: 597 - Pages: 3

Chapter 1 Questions

...Chapter 1: Introduction to Project Management TRUE/FALSE 1. Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. ANS: T Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. Today’s project management involves much more, and people in every industry and every country manage projects. PTS: 1 DIF: Difficulty: Easy REF: p.2 OBJ: LO: 1-1 NAT: BUSPROG: Technology TOP: Introduction KEY: Bloom's: Knowledge 2. A difference between operations and projects is that operations end when their objectives have been reached, whereas projects do not. ANS: F Projects are different from operations in that they end when their objectives have been reached or the project has been terminated. PTS: 1 DIF: Difficulty: Moderate REF: p.4 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Comprehension 3. Every project should have a well-defined objective. ANS: T A project has a unique purpose. Every project should have a well-defined objective. PTS: 1 DIF: Difficulty: Easy REF: p.6 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Knowledge 4. Projects should be developed in increments. ANS: T A project is developed using progressive elaboration. Projects are often defined......

Words: 7714 - Pages: 31

Test 5 Chapter Study Questions

...Chapter Study Questions Exam Five 2305 (Chapters 4, 5, and 9) The Enduring Democracy Third Edition, 2013-2014, Dautrich and Yalof, Cengage Publishing. Be sure to skip a line between the question and the answer and skip another line before the next question. Chapter Four: Civil Liberties 1. What are civil liberties and when did individual rights recognized by government first appear in a legal charter? What charter? 73 - Those specific individual rights that are guaranteed by the Constitution and cannot be denied to citizens by government. Most of these rights are in the first 10 amendments to the Constitution, known as the Bill of Rights. The original English legal charter, the Magna Carta of 1215. 2. How are civil liberties different from civil rights? 73 - Civil liberties may be distinguished from civil rights (sometimes called equal rights), which refer to rights that members of various groups (racial, ethnic, sexual, and so on) have to equal treatment by government under the law and equal access to society’s opportunities. 3. What were the Alien and Sedition Acts and were editors if newspapers actually jailed? 74 - Alien Act, which authorized the president to deport from the United States all aliens suspected of “treasonable or secret” inclinations; the Alien Enemies Act, which allowed the president during wartime to arrest aliens subject to an enemy power; and the Sedition Act, which criminalized the publication of materials that brought the U.S.......

Words: 10537 - Pages: 43

Chapter 1 Review Questions

...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a......

Words: 1121 - Pages: 5

Pricinples of Information Security, Chapter 3 Review Questions

...Week 2, Chapter 3 Name: ------------------------------------------------- Review Questions p. 114 Assignment 3          1. What is the difference between law and ethics? Laws are formally adopted rules for acceptable behavior in modern society. Ethics are socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on cultural mores: the fixed moral attitudes or customs of a particular group. Some ethical standards are universal. For example, murder, theft, assault, and arson are actions that deviate from ethical and legal codes throughout the world. 2. What is civil law, and what does it accomplish? Civil law comprises a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people. 3. What are the primary examples of public law? criminal, administrative, and constitutional law 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? the National Information Infrastructure Protection Act of 1996, which modified several sections of the amended the Computer Fraud and Abuse Act of 1986 and increased the penalties for selected crimes. The punishment for offenses prosecuted under this statute varies from fines to imprisonment up to 20 years, or both. The severity of the penalty depends on the value of the information obtained and...

Words: 1517 - Pages: 7

Chapter 1 Question

...Chapter 1 Problems 1, 2, 3 = straightforward, intermediate, challenging Section 1.2 Matter and Model-Building Note: Consult the endpapers, appendices, and tables in the text whenever necessary in solving problems. For this chapter, Appendix B.3 may be particularly useful. Answers to odd-numbered problems appear in the back of the book. 1. A crystalline solid consists of atoms stacked up in a repeating lattice structure. Consider a crystal as shown in Figure P1.1a. The atoms reside at the corners of cubes of side L = 0.200 nm. One piece of evidence for the regular arrangement of atoms comes from the flat surfaces along which a crystal separates, or cleaves, when it is broken. Suppose this crystal cleaves along a face diagonal, as shown in Figure P1.1b. Calculate the spacing d between two adjacent atomic planes that separate when the crystal cleaves. [pic] Figure P1.1 Section 1.3 Density and Atomic Mass 2. Use information on the endpapers of this book to calculate the average density of the Earth. Where does the value fit among those listed in Tables 1.5 and 14.1? Look up the density of a typical surface rock like granite in another source and compare also to it. 3. The standard kilogram is a platinum-iridium cylinder 39.0 mm in height and 39.0 mm in diameter. What is the density of the material? 4. A major motor company displays a die-cast model of its first automobile, made from 9.35 kg of iron. To celebrate its......

Words: 4296 - Pages: 18

End of Chapter Questions #1, 3-5, 7-8,12-14, 18

...end of chapter Questions #1, 3-5, 7-8,12-14, 18 1. Which of the following is true about 1 bit? c. Represents one binary digit 2. Which of the following terms means approximately 106 bytes? b. Megabyte 3. Which answer lists the correct number of bits associated with each term? d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? C Used to process data E. Is installed on the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer store in RAM to represent the number 123456789? b. Pixel grid 8. Which of the following is not a feature of a file system that might be used with a hard disk dirve? a. An actuator arm 12. Which of the following are true about random-access memory (RAM) as it is normally used inside a personal computer? a. Used for short-term memory e. Is installed onto the motherboard 13. Which of the following are components of an internal hard disk drive (HDD)? (Choose two answers.) a. Actuator arm c. Platters 14. Which of the following......

Words: 306 - Pages: 2