MIS Quiz 3

The ethical "no free lunch" rule states that:

a) if an action is not right for everyone to take, it is not right for anyone to take
b) one can put values in rank order and understand the consequences of various courses of action
c) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
d) if an action cannot be taken repeatedly, then it is not right to be taken at any time
e) one should take the action that produces the least harm or incurs the least cost

c) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

Interpretations of Moore's law assert that:

a) transistors decrease in size 50% every two years
b) data storage costs decrease by 50% every 18 months
c) computing power doubles every 18 months
d) computing power will eventually level off
e) PCs decrease in market share by 9% every 5 years

c) computing power doubles every 18 months

According to ________, you should take the action that produces the least harm.

a) Kant's categorical imperative
b) the "no free lunch" rule
c) the Golden Rule
d) the utilitarian principle
e) the risk aversion principle

e) the risk aversion principle

________ means that you accept the potential costs and obligations for the decisions you make.

a) Responsibility
b) Accountability
c) Duty
d) Due process
e) Liability

a) Responsibility

________ states that the value or power of a network grows exponentially as a function of the number of network members.

a) Law of scalability
b) Law of networks
c) Metcalfe's Law
d) Law of outsourcing
e) Moore's Law

c) Metcalfe's Law

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

a) Spyware
b) Phishing
c) Spamming
d) Profiling
e) Targeting

d) Profiling

When a cookie is created during a website visit, it is stored:

a) on the ISP's servers
b) in the browser's application settings
c) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site
d) on the website's server
e) on the hard drive of the visitor's computer

e) on the hard drive of the visitor's computer

Which of the following best describes how new information systems can result in legal gray areas?

a) they are little understood by politicians or lawyers
b) they work with networked, digital data, which are more difficult to control than information stored manually
c) they result in new situations that are not covered by old laws
d) they are implemented by technicians rather than managers
d) they are created from sets of logical and technological rules rather than social or organizational mores.

c) they result in new situations that are not covered by old laws

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

a) the slippery-slope rule
b) the "No free lunch" rule
c) Kant's Categorical Imperative
d) the Golden Rule
e) the Risk Aversion Principle

c) Kant's Categorical Imperative

Digital media differs from a physical book in all of the following ways except:

a) ease of transmission
b) ease of establishing uniqueness
c) ease of alteration
d) ease of replication
e) ease of global distribution

b) ease of establishing uniqueness

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

a) the risk aversion principle
b) the utilitarian principle
c) Kant's categorical imperative
d) the Golden Rule
e) the "no free lunch" rule

d) the Golden Rule

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

a) Due process
b) Accountability
c) the judicial system
d) Liability
e) Responsibility

a) Due process

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

a) Scalability
b) Disintermediation
c) Expandability
d) Modality
e) Customizability

a) Scalability

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

a) Grid
b) Edge
c) Quantum
d) Autonomic
e) On-demand

e) On-demand

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

a) Copyright
b) Trademark
c) Patent
d) Trade secret
e) All forms of intellectual property protection

d) Trade secret

Which one is not one of the features of Big Data that makes it powerful?

a) zooming in to subsets of the data
b) always finding a pattern with a large enough number of variables
c) offering a constant stream of new information
d) finding unbiased opinions
e) making it easy to run A/B tests

b) always finding a pattern with a large enough number of variables

Which of the following protects the authors of a book from having their work copied by others?

a) Fair Use Doctrine
b) Due process
c) Copyright law
d) Trade Secret law
e) Patent protection

c) Copyright law

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

a) Lemming rule
b) Utilitarian principle
c) Slippery-slope rule
d) High-failure cost rule
e) Golden Rule

c) Slippery-slope rule

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

a) Copyright law
b) Patent law
c) Trademark law
d) Trade secret protection
e) Privacy law

b) Patent law

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

a) opt-out
b) opt-in
c) PGP
d) safe harbour
e) P3P

a) opt-out

MIS Quiz 3 - Subjecto.com

MIS Quiz 3

Your page rank:

Total word count: 1042
Pages: 4

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

The ethical "no free lunch" rule states that:

a) if an action is not right for everyone to take, it is not right for anyone to take
b) one can put values in rank order and understand the consequences of various courses of action
c) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
d) if an action cannot be taken repeatedly, then it is not right to be taken at any time
e) one should take the action that produces the least harm or incurs the least cost

c) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

Interpretations of Moore’s law assert that:

a) transistors decrease in size 50% every two years
b) data storage costs decrease by 50% every 18 months
c) computing power doubles every 18 months
d) computing power will eventually level off
e) PCs decrease in market share by 9% every 5 years

c) computing power doubles every 18 months

According to ________, you should take the action that produces the least harm.

a) Kant’s categorical imperative
b) the "no free lunch" rule
c) the Golden Rule
d) the utilitarian principle
e) the risk aversion principle

e) the risk aversion principle

________ means that you accept the potential costs and obligations for the decisions you make.

a) Responsibility
b) Accountability
c) Duty
d) Due process
e) Liability

a) Responsibility

________ states that the value or power of a network grows exponentially as a function of the number of network members.

a) Law of scalability
b) Law of networks
c) Metcalfe’s Law
d) Law of outsourcing
e) Moore’s Law

c) Metcalfe’s Law

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

a) Spyware
b) Phishing
c) Spamming
d) Profiling
e) Targeting

d) Profiling

When a cookie is created during a website visit, it is stored:

a) on the ISP’s servers
b) in the browser’s application settings
c) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site
d) on the website’s server
e) on the hard drive of the visitor’s computer

e) on the hard drive of the visitor’s computer

Which of the following best describes how new information systems can result in legal gray areas?

a) they are little understood by politicians or lawyers
b) they work with networked, digital data, which are more difficult to control than information stored manually
c) they result in new situations that are not covered by old laws
d) they are implemented by technicians rather than managers
d) they are created from sets of logical and technological rules rather than social or organizational mores.

c) they result in new situations that are not covered by old laws

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

a) the slippery-slope rule
b) the "No free lunch" rule
c) Kant’s Categorical Imperative
d) the Golden Rule
e) the Risk Aversion Principle

c) Kant’s Categorical Imperative

Digital media differs from a physical book in all of the following ways except:

a) ease of transmission
b) ease of establishing uniqueness
c) ease of alteration
d) ease of replication
e) ease of global distribution

b) ease of establishing uniqueness

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

a) the risk aversion principle
b) the utilitarian principle
c) Kant’s categorical imperative
d) the Golden Rule
e) the "no free lunch" rule

d) the Golden Rule

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

a) Due process
b) Accountability
c) the judicial system
d) Liability
e) Responsibility

a) Due process

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

a) Scalability
b) Disintermediation
c) Expandability
d) Modality
e) Customizability

a) Scalability

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

a) Grid
b) Edge
c) Quantum
d) Autonomic
e) On-demand

e) On-demand

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

a) Copyright
b) Trademark
c) Patent
d) Trade secret
e) All forms of intellectual property protection

d) Trade secret

Which one is not one of the features of Big Data that makes it powerful?

a) zooming in to subsets of the data
b) always finding a pattern with a large enough number of variables
c) offering a constant stream of new information
d) finding unbiased opinions
e) making it easy to run A/B tests

b) always finding a pattern with a large enough number of variables

Which of the following protects the authors of a book from having their work copied by others?

a) Fair Use Doctrine
b) Due process
c) Copyright law
d) Trade Secret law
e) Patent protection

c) Copyright law

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

a) Lemming rule
b) Utilitarian principle
c) Slippery-slope rule
d) High-failure cost rule
e) Golden Rule

c) Slippery-slope rule

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

a) Copyright law
b) Patent law
c) Trademark law
d) Trade secret protection
e) Privacy law

b) Patent law

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

a) opt-out
b) opt-in
c) PGP
d) safe harbour
e) P3P

a) opt-out

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending