Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Development
Q:
(p. 492) Command-and-control regulation:
A. gives polluters financial motives to control pollution.
B. does not grant abatements.
C. helps determine the value of statistical life.
D. can increase costs without commensurate increases in benefits.
Q:
Some believe that exposure to cellular mobile communication radiation may cause health problems; however, it may take years before the truth of this claim is known.
Q:
(p. 491) The practice of regulating by setting uniform standards, strictly enforcing rules, and using penalties to force compliance is known as:
A. environmental tax reform.
B. cap and trade approach.
C. command-and-control regulation.
D. market incentive regulation.
Q:
Various EC tools can help increase our safety at home and in public, such as e-911 systems; global collaborative commerce technologies, e-procurement, and e-government efforts at information sharing.
Q:
(p. 491) Which of the following is NOT an element of the regulatory options spectrum?
A. Market incentives
B. Voluntary compliance
C. Flexible enforcement
D. Contingent valuation
Q:
Virtual universities are helping to reduce the digital divide.
Q:
(p. 490) What method does the EPA use to calculate the value of a statistical life?
A. Willingness-to-accept approach
B. Willingness-to-pay approach
C. Social welfare approach
D. Social surplus approach
Q:
Teleconferencing or virtual work offers many green benefits, including reducing rush hour traffic, improving air quality, improving highway safety, and improving health care.
Q:
(p. 489) Contingent valuation is the method of:
A. assigning a price to ecological goods that are not traded in markets.
B. calculating the dollar amount that people exposed to a risk are willing to pay to reduce the risk of premature death.
C. estimating economic values for ecosystem services that directly affect market prices.
D. harnessing market forces to motivate compliance with regulatory goals.
Q:
Electronic Product Environmental Assessment Tool (EPEAT) is a searchable database of computer hardware that meets a strict set of environmental criteria.
Q:
(p. 489) _____ is a polling process in which people are asked to put a dollar amount on some aspect of nature.
A. Risk assessment
B. Contingent valuation
C. Cost-benefit analysis
D. Exposure assessment
Q:
(p. 489) Which of the following is a criticism of cost-benefit analysis?
A. It disciplines thinking and always dictates choices.
B. Fixing precise values of costs and benefits is difficult and controversial.
C. They compromise ecosystems deserving conditional, not absolute, protection.
D. Benefits and costs of a program often fall on the same party.
Q:
Sustainability regulations such as RoHS in the European Union (EU) will increasingly impact how supply chains function regardless of location.
Q:
Green software refers to software products that help companies save energy or comply with EPA requirements.
Q:
(p. 488) Cost-benefit analysis:
A. forces methodical consideration of each impact of a policy on social welfare.
B. disciplines thinking and always dictates choices.
C. injects untenable calculation into emotional arguments.
D. that reveals marginal abatement costs rarely helps regulators find efficient levels of regulation.
Q:
According to the Gartner Group, 40 percent of the world's data centers are constrained by heat, space, and power requirements.
Q:
(p. 487) The systematic calculation of the bottom line and profit of a proposed regulatory action is called:
A. cost-effectiveness analysis.
B. cost-utility analysis.
C. cost-benefit analysis.
D. QALY.
Q:
(p. 487) Identify the Act that prohibits consideration of economic factors in the decision to list a species.
A. The United States Fish and Wildlife Service Act
B. The Land and Water Conservation Fund Act
C. The Driftnet Impact Monitoring, Assessment and Control Act
D. The Endangered Species Act
Q:
Biometric controls provide access procedures that match every valid user with a unique user identifier.
Q:
Digital reference is a generic, technology-neutral term that refers to the various methods by which one can sign an electronic record.
Q:
(p. 487) This Act sets forth the general guideline that regulators should develop criteria for urban air quality that are "reasonably anticipated" to protect public health with "an adequate margin of safety."
A. The Air (Prevention and Control of Pollution) Act
B. The Air Quality Act
C. The Clean Air Act
D. The National Environmental Policy Act
Q:
Online sellers can better protect themselves against fraud by requiring customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account.
Q:
(p. 486) Risk management decisions are based on the:
A. social sciences.
B. natural sciences.
C. formal sciences.
D. applied sciences.
Q:
Electronic signatures improve EC by helping to distinguish between legitimate and fraudulent transactions and build trust and predictability needed by parties doing business online.
Q:
(p. 484) Risk characterization:
A. is a measure of activities that bring individuals in contact with toxic substances.
B. is a statistical survey of human mortality and morbidity in a sample population.
C. is a quantitative estimate of how toxic a substance is to humans at increasing levels of exposure.
D. is a detailed, written narrative describing the scientific evidence, including areas of ambiguity.
Q:
Several public organizations and private companies attempt to protect consumers and build users' trust and confidence in the Internet through a seal of quality, such as Trustmark and BBBOnLine.
Q:
(p. 484) The study of the amount of a substance human beings can absorb through inhalation, ingestion, or skin absorption is called:
A. exposure assessment.
B. contingent valuation.
C. epidemiological study.
D. hazard characterization.
Q:
Contemporary information systems should be built to encourage compliance and maximize the possibility of accountability for violations.
Q:
(p. 484) According to the Environmental Protection Agency:
A. a sublinear relationship exists between the amount of exposure to a toxic substance and the effect it has on human health.
B. in the absence of a clear understanding of dose-response relationships at low doses, risk estimates should be based on a sublinear or threshold curve.
C. there should be more regulation to limit human exposure when the risk estimate is based on the linear curve.
D. the higher the inferred risk, the more justification there is for high expenditures to control polluting emissions.
Q:
Under the Dodd-Frank Act, privacy notices guarantee consumers certain rights while shopping online.
Q:
(p. 483) Which of the following refers to an exposure point greater than zero at which a substance begins to pose a health risk?
A. Hormesis
B. Absolute limit
C. Threshold
D. Level of tolerance
Q:
Ethical principles that apply to the collection and use of personal information, such as notifying customers of information practices before collecting it, do not apply to information collected in e-commerce.
Q:
(p. 483) The Environmental Protection Agency uses the _____ dose-response rate model that assumes that there will be a proportionate decrease in cancers from large exposures to small ones.
A. linear
B. quantal
C. graded
D. indirect
Q:
(p. 483) Which of the following methods is used to infer the value of an unknown state from the value of another state that is known?
A. Extrapolation
B. Hazard assessment
C. Interpolation
D. Contingent valuation
Q:
RFIDs can be used to track individuals.
Q:
Government supercomputers are capable of reading every e-mail sent, listening to every mobile conversation, reading every text message, knowing every user location, and following every credit card purchase besides tracking every website visited by Internet users around the globe.
Q:
(p. 482) A quantitative estimate of how toxic a substance is to human beings or animals at increasing levels of exposure is called a(n) _____ assessment.
A. hazard
B. exposure
C. dose-response
D. chemical safety
Q:
(p. 482) Epidemiological studies:
A. have high statistical power.
B. are totally reliable and valid.
C. do not measure human deaths.
D. measure real human illness.
Q:
Legal precedents are decisions by judges that may be used as standards in similar legal cases that follow.
Q:
(p. 481) A statistical survey of human mortality and morbidity in a sample population is called a(n) _____ study.
A. demographic
B. epidemiological
C. cosmology
D. community
Q:
Internet regulation at a federal level is authorized by the USA PATRIOT Act.
Q:
Virtually all U.S. states and the federal government, either by statute or by common law, recognize the right to privacy, but few government agencies actually follow all the statutes.
Q:
(p. 481) An agent capable of initiating cancer is known as a(n):
A. effluent.
B. precipitate.
C. carcinogen.
D. condensible.
Q:
(p. 480) The two basic methods of proving a substance dangerous are:
A. animal testing and natural experiments.
B. animal testing and epidemiological studies.
C. computer models and epidemiological studies.
D. computer models and natural experiments.
Q:
Unlike hate sites that can cause problems for corporations or lead to lawsuits, fan sites are beneficial and welcomed by the entertainment industry.
Q:
(p. 480) Attempting to establish a link between a substance and human disease is called:
A. hazard assessment.
B. risk management.
C. risk characterization.
D. hazard characterization.
Q:
A trademark is a symbol businesses use to identify their goods and services.
Q:
(p. 480) Which of the following is NOT an element of risk assessment?
A. Risk characterization
B. Exposure assessment
C. Control options
D. Dose-response assessment
Q:
In 2010, the Supreme Court ruled that patents cover abstract ideas.
Q:
(p. 480) The process of deciding which regulatory action to take regarding specific risks is called:
A. risk assessment.
B. contingent valuation.
C. cost-benefit analysis.
D. risk management.
Q:
Trade secrets serve to protect tangible technological inventions, especially in traditional industrial areas.
Q:
(p. 480) In theory, _____ is a scientific process leading to an objective, quantitative measure of the risks posed by a substance.
A. contingent valuation
B. risk assessment
C. risk management
D. cost-benefit analysis
Q:
Digital technologies make it possible to produce and distribute a high-quality duplicate of any digital recording with minimal effort and cost.
Q:
(p. 479) Risk is the probability that a harm will occur and it is typically measured on a scale that ranges between:
A. minus one and absolute certainty.
B. minus one to plus one.
C. zero and absolute certainty.
D. zero to ten.
Q:
The Communications Decency Act gives U.S. law enforcement the right to shut down websites without trial or defense if it finds the central reason for the site is to distribute copyrighted information illegally.
Q:
(p. 500) The environmental management system is an asset of methods and procedures for aligning corporate strategies, policies, and operations with principles that protect ecosystems.
Q:
(p. 498) Voluntary regulation is used when the political will for stringent command rules is present.
Q:
Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce are known as private property.
Q:
EC Web site content needs to be reviewed by attorneys with cyberlaw expertise to ensure that there is nothing unethical or illegal and that all required statements and disclaimers are properly included.
Q:
(p. 497) The Toxics Release Inventory is an Environmental Protection Agency Program that requires facilities handling any of 650 hazardous chemicals to disclose amounts each year that are released or transferred.
Q:
(p. 496) The Clean Development Mechanism was a carbon offset program set up under the Montreal Protocol.
Q:
A corporate code of ethics should specify whether the company allows employees to set up their own Web pages on the company intranet and the rules for private e-mail usage during working hours.
Q:
(p. 495) Carbon offsets are projects that compensate for all or part of a company's greenhouse gas emissions by eliminating the equivalent sum of those emissions from another source.
Q:
According to a survey conducted by the 24/7 Wall St. Company, workers spend approximately 12 hours online each week on personal matters during work.
Q:
(p. 494) The CO2e is a universal measure that uses the warming potential of carbon dioxide as a reference for the relative warming potential of the six greenhouse gases covered by the Kyoto Protocol.
Q:
The USA PATRIOT Act allows employers to monitor their electronic workplace.
Q:
(p. 493) The substitution of revenues from taxes on productivity for revenues from taxes on pollution is known as the environmental tax reform.
Q:
Acts or activities that are unethical are also illegal.
Q:
(p. 492) Unlike command regulation, environmental taxes allow polluters to forgo, change, or control production in any way that reduces compliance costs.
Q:
Business ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment.
Q:
Violation of copyrights on the Internet is a major problem for creators and distributors of intellectual property such as movies, music, and books.
Q:
(p. 491) Command-and-control regulation give polluters financial motives to control pollution while also giving them flexibility in how reductions are achieved.
Q:
Define cloud computing. Identify five advantages of cloud computing.
Q:
(p. 490) Cost-benefit approaches compromise ecosystems deserving absolute, not conditional, protection.
Q:
List and explain five methods for evaluating IT investments.
Q:
(p. 489) Contingent valuation is a method for assigning a price to ecological goods or services that are traded in markets.
Q:
(p. 488) A cost-benefit analysis forces methodical consideration of each impact of a policy on social welfare.
Q:
Explain tangible costs and benefits. Explain intangible costs and benefits.
Q:
List and briefly discuss the difficulties in measuring productivity and performance gains from EC investments.
Q:
(p. 487) Risk decisions are based solely on science.