mis test 4

A native app is one that is designed to run on a specific platform

True

Documentation reveals how well the system has met its original objectives

False

A new information system is not considered in productions until conversion is complete.

True

Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system

True

Gantt and PERT charts are two common formal planning tools for project management.

True

Prototyping is more iterative than the conventional life cycle

True

One problem with prototyping is that the systems constructed thereby may not be able to handle large quantities of data in a production environment

True

End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools

True

Intangible benefits of an information systems are those that cannot be easily quantified

True

In one form of outsourcing, a company hires an external vendor to create the software for its system, but operates the software on its own computers

True

It is important that all systems development activities to be placed in sequential order

False

Object oriented development is more iterative and incremental than traditional structured development

True

Objects are grouped into hierarchies and hierarchies into classes.

False

Businesses can use component-based development to create their e-commerce applications.

True

Case tools facilitate the creation of clear documentation and the coordination of team development efforts

True

More timely information is a tangible benefit of information systems

False

An formation systems plan shows how specific information systems fit into a company's overall business plan and business strategy

True

User concerns and designer concerns are usually the same at the beginning of the project.

False

Scope describes the full length of time required to complete a project

False

Successful implementation of an information system requires the participation of end users in the project

True

What was the primary problem facing the Girl Scouts regarding their supply chain problems?
A) The ordering process was inefficient for a large volume of orders.
B) There were high error rates in ordering and fulfillment.
C) It required too much time of volunteers.
D) The paper-based system was outdated.

A) The ordering process was inefficient for a large volume of orders.

Order the following steps in the systems development life cycle in the correct sequence.
A) Systems analysis, systems design, programming, testing, conversion, production and maintenance
B) Systems analysis, systems design, programming, conversion, testing, production and maintenance
C) Systems design, systems analysis, programming, conversion, production and maintenance, and testing
D) Systems design, systems analysis, programming, testing, conversion, production and maintenance

A) Systems analysis, systems design, programming, testing, conversion, production and maintenance

Which of the following is not part of the implementation process?
A) Evaluating the system
B) Testing
C) Systems analysis
D) Creating detailed design specifications

C) Systems analysis

Which process develops a detailed description of the functions that a new information system must perform?
A) Feasibility study
B) Requirements analysis
C) Systems design
D) Test plan development

B) Requirements analysis

Developing an information system has been compared to the problem-solving process. Which one of the following problem-solving steps is not a part of systems analysis?
A) Implement the solution
B) Choose the best solution
C) Develop alternative solutions
D) Define and understand the problem

A) Implement the solution

The entire system-building effort is driven by:
A) organizational change.
B) feasibility studies.
C) data.
D) user information requirements.

D) user information requirements.

Systems design:
A) identifies the system's information requirements.
B) specifies how the new system will fulfill the information requirements.
C) identifies alternate solutions for solving the problem.
D) defines the problem and specifies its causes.

B) specifies how the new system will fulfill the information requirements.

In a data flow diagram, external entities are represented by:
A) rounded boxes.
B) square boxes.
C) circles.
D) open rectangles.

B) square boxes.

Transferring data from a legacy system to the new system would be defined by which system design specification category?
A) Input
B) Database
C) Manual procedures
D) Conversion

D) Conversion

In object-oriented development:
A) an object combines data and processes that act on the data into a single object.
B) data is separated into discrete, reusable objects that any processes may act upon.
C) an object comprises a single, reusable program that can be combined with other objects to form a robust application.
D) data categories are described as distinct objects, which can share characteristics with other objects.

A) an object combines data and processes that act on the data into a single object.

Which of the following is not one of the unique considerations in developing applications for a mobile platform?
A) Reduced screen space
B) Keyboard configuration
C) User gestures
D) Bandwidth constraints

B) Keyboard configuration

Unit testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole.
C) tests each individual program separately.
D) provides the final certification that the system is ready to be used in a production setting.

C) tests each individual program separately.

System testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.

B) tests the functioning of the system as a whole.

Acceptance testing:
A) includes all the preparations for the trials.
B) tests the functioning of the system as a whole.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.

D) provides the final certification that the system is ready to be used in a production setting.

In a parallel conversion strategy, the new system:
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.

C) and the old are run together.

In a direct cutover conversion strategy, the new system:
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.

B) replaces the old one at an appointed time.

The Girl Scouts' conversion strategy of first introducing the modules for ordering cookies and then introducing the modules for transmitting orders and instructions to the cookie factory and shipper, is called a(n) ________ strategy.
A) phased approach
B) direct cutover
C) indirect cutover
D) incremental conversion

A) phased approach

Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed:
A) compliance.
B) production.
C) maintenance.
D) acceptance.

C) maintenance.

The oldest method for building information systems is:
A) component-based development.
B) prototyping.
C) object-oriented development.
D) the systems development lifecycle.

D) the systems development lifecycle.

In the traditional systems development lifecycle, end users:
A) are important and ongoing members of the team from the original analysis phase through maintenance.
B) are important only in the testing phases.
C) have no input.
D) are limited to providing information requirements and reviewing the technical staff's work.

D) are limited to providing information requirements and reviewing the technical staff's work.

As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the order of steps you will follow in this project?
A) Develop the prototype, use the prototype, revise and enhance the prototype.
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype.
C) Define the requirements, develop solutions, select the best prototype, and implement the prototype.
D) Define the requirements, develop the prototype, revise and enhance the prototype.

B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype.

When systems are created rapidly, without a formal development methodology:
A) end users can take over the work of IT specialists.
B) the organization quickly outgrows the new system.
C) hardware, software, and quality standards are less important.
D) testing and documentation may be inadequate.

D) testing and documentation may be inadequate.

Of the following, which is the most important reason for creating a mobile version of a business's Web site?
A) Mobile devices provide access from anywhere.
B) Mobile devices use touch interfaces.
C) Mobile devices use lower bandwidth.
D) Mobile devices use different platforms.

A) Mobile devices provide access from anywhere.

Management can control the development of end-user applications in part by:
A) developing a formal development methodology.
B) requiring cost justification for end-user IS projects.
C) establishing standards for project requirements.
D) requiring Gantt charts.

C) establishing standards for project requirements.

If an organization's requirements conflict with the software package chosen and the package cannot be customized, the organization should:
A) change its procedures.
B) outsource the development of the system.
C) redesign the RFP.
D) change the evaluation process.

A) change its procedures.

"Hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing.
A) vendor selection
B) hardware
C) software
D) employee salary

A) vendor selection

The process of creating workable information systems in a very short period of time is called:
A) RAD.
B) JAD.
C) prototyping.
D) end-user development.

A) RAD Rapid Application Development

This type of systems development is characterized by significantly speeding the generation of information requirements and involving users at an intense level in the systems design.
A) RAD
B) JAD
C) Prototyping
D) End-user development

B) JAD Joint Application Design

The term structured, when discussing structured methodologies, refers to the fact that:
A) the finished software is highly documented.
B) the development process is highly documented.
C) the techniques are step by step, with each step building on the previous one.
D) a defined hierarchy of objects and classes are used to structure the programming.

C) the techniques are step by step, with each step building on the previous one.

The primary tool for representing a system's component processes and the flow of data between them is the:
A) data dictionary.
B) process specifications diagram.
C) user documentation.
D) data flow diagram.

D) data flow diagram

You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project?
A) RAD
B) JAD
C) End-user development
D) Prototyping

D) Prototyping

To show each level of a system's design, its relationship to other levels, and its place in the overall design structure, structured methodologies use:
A) structure charts.
B) Gantt charts and PERT.
C) process specifications diagrams.
D) data flow diagrams.

A) structure charts.

An entire information system is broken down into its main subsystems by using:
A) high-level data flow diagrams.
B) low-level data flow diagrams.
C) process specifications.
D) structured diagrams.

A) high-level data flow diagrams.

In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related?
A) Degree would be a sister class to Mathematics and Physics.
B) Degree is a superclass to Mathematics and Physics.
C) Mathematics and Physics would be ancestors to Degree.
D) Degree would be a subclass to Mathematics and Physics.

B) Degree is a superclass to Mathematics and Physics.

Object-oriented modeling is based on the concepts of:
A) objects and relationships.
B) classes and objects.
C) class and inheritance.
D) objects and inheritance.

C) class and inheritance

Object-oriented development could potentially reduce the time and cost of writing software because:
A) object-oriented programming requires less training.
B) iterative prototyping is not required.
C) objects are reusable.
D) a single user interface object can be used for the entire application.

C) objects are reusable

Groups of objects are assembled into software components for common functions, which can be combined into large-scale business applications, in which type of software development?
A) Object-oriented development
B) Component-based development
C) Structured methodologies
D) RAD

B) Component-based

Which of the following is a technique used to create Web sites that will conform to the screen resolution of the user?
A) Native design
B) Responsive design
C) End-user design
D) Multi-platform design

B) Responsive design

________ provides software tools to automate development methodologies and reduce the amount of repetitive work in systems development.
A) CASE
B) CAD
C) JAD
D) RAD

A) CASE

________ refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints.
A) Systems analysis
B) Systems design
C) Project management
D) Project implementation

C) Project management

A PERT chart:
A) portrays a project as a network diagram consisting of numbered nodes that represent tasks.
B) is used to evaluate project risk and time.
C) displays a horizontal bar for each project task.
D) tracks progress of, and modifications to, project tasks.

A) portrays a project as a network diagram consisting of numbered nodes that represent tasks.

________ are tangible benefits of information systems.
A) Improved asset utilization, increased organizational learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and increased productivity
C) Increased productivity, reduced workforce, and increased job satisfaction
D) Lower operational costs, improved resource control, and more information

B) Reduced workforce, lower outside vendor costs, and increased productivity

________ are intangible benefits of information systems.
A) Improved asset utilization, increased organizational learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and increased productivity
C) Increased productivity, reduced workforce, and increased job satisfaction
D) Lower operational costs, improved resource control, and more information

A) Improved asset utilization, increased organizational learning, and improved operations

Which process is used to develop risk profiles for a firm's information system projects and assets?
A) Information systems plan
B) Scoring model
C) Portfolio analysis
D) Feasibility study

C) Portfolio analysis

You have been hired by a pharmaceutical company to evaluate its portfolio of systems and IT projects. Which types of projects would be best avoided?
A) Any high-risk projects
B) Any low-benefit projects
C) High-risk, low-benefit projects
D) None - any project might be beneficial

C) High-risk, low-benefit projects

You would expect to find all of the following in an information systems plan except:
A) key business processes.
B) budget requirements.
C) portfolio analysis.
D) milestones and planning.

C) portfolio analysis.

The project risk will rise if the project team and the IS staff lack:
A) RAD experience.
B) web services.
C) the required technical expertise.
D) CASE tools.

C) the required technical expertise.

Users prefer systems that:
A) are oriented to facilitating organizational tasks and solving business problems.
B) work with existing DBMS.
C) are able to provide optimum hardware and software efficiency.
D) are capable of storing much more data than they need.

A) are oriented to facilitating organizational tasks and solving business problems.

A ________ shows each task as a horizontal bar whose length is proportional to the time required to complete it.
A) PERT chart
B) DFD
C) feasibility study
D) Gantt chart

D) Gantt chart

Which of the following tools may help identify risk areas associated with employee acceptance of a new information system?
A) Formal planning software
B) Organizational impact analysis
C) System prototype
D) Feasibility study

B) Organizational impact analysis

A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
A) test plan
B) conversion plan
C) feasibility study
D) risk analysis

C) feasibility study

A test plan includes all the preparations for the series of tests to be performed on the system.

True

Which of the following Web development languages is used for mobile applications because it supports cross-platform mobile applications?
A) Java
B) Javascript
C) XML
D) HTML5

D) HTML5

A prototype is the final working version of an information system.

False

A(n) ________ is a detailed list of questions submitted to external vendors to determine how well they meet the organization's specific requirements.
A) RFP
B) RFQ
C) RAD
D) JAD

A) RFP

PaaS are online development environments that enable developers to quickly write customer- or employee-facing Web applications.

True

________ describe the transformation occurring within the lowest level of the data flow diagrams. They express the logic of each process.
A) Process specifications
B) Structure charts
C) DFDs
D) Component procedures

A) Process specifications

A reduced workforce is an example of a tangible benefit of an information system.

True

________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.
A) A scoring model
B) A scorecard
C) Portfolio analysis
D) Risk analysis

A) A scoring model

Ergonomics is the interaction of people and machines in the work environment, including the design of jobs and legal issues.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.

False

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm

False

Spyware is software that comes hidden in downloaded applications and can track your online movements.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

The rate of global piracy is approximately 20%.

False

Trade secret law does not protect the actual ideas in a work product.

False

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

True

The Copyright Office began registering software programs in the 1990s.

False

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

True

According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

False

The key concepts in patent law are originality, novelty, and value.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

False

Any unsolicited e-mail is legally considered spam

False

The European Parliament has passed a ban on unsolicited commercial messaging.

True

The most common type of computer-related RSI is CTS.

True

Technostress is a computer-related malady whose symptoms include fatigue.

True

Most American and European privacy law is based on a set of five principles called COPPA.

False

Which of the following best describes how new information systems result in legal gray areas?
A) They work with networked, electronic data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.

B) They result in new situations that are not covered by old laws.

The introduction of new information technology has a:
A) dampening effect on the discourse of business ethics.
B) ripple effect, raising new ethical, social, and political issues.
C) beneficial effect for society as a whole, while raising dilemmas for consumers.
D) waterfall effect in raising ever more complex ethical issues.

B) ripple effect, raising new ethical, social, and political issues.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
A) property rights and obligations.
B) system quality.
C) accountability and control.
D) information rights and obligations.

A) property rights and obligations.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
A) family and home.
B) property rights and obligations.
C) system quality.
D) quality of life.

D) quality of life.

All of the following are current key technology trends raising ethical issues except:
A) data storage improvements.
B) data analysis advancements.
C) increase in multimedia quality.
D) increase in use of mobile devices.

C) increase in multimedia quality.

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
A) profiling.
B) phishing.
C) spamming.
D) targeting.

A) profiling.

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
A) Property rights and obligations
B) System quality
C) Accountability and control
D) Information rights and obligations

D) Information rights and obligations

NORA is a:
A) profiling technology used by the EU.
B) federal privacy law protecting networked data.
C) new data analysis technology that finds hidden connections between data in disparate sources.
D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.

C) new data analysis technology that finds hidden connections between data in disparate sources.

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
A) responsibility.
B) accountability.
C) liability.
D) due process.

A) responsibility.

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?
A) Firms should build products and services that protect privacy.
B) Firms should increase the transparency of their data collection.
C) Firms should require consumer consent and provide clear options to opt out of data collection.
D) Firms should limit the length of time that any personal data is stored to six months or less.

D) Firms should limit the length of time that any personal data is stored to six months or less.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
A) due process.
B) accountability.
C) the courts of appeal.
D) the judicial system.

B) accountability.

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
A) liability.
B) due process.
C) the courts of appeal.
D) accountability.

B) due process.

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
A) Assign responsibility.
B) Identify the stakeholders.
C) Identify the options you can reasonably take.
D) Identify and clearly describe the facts.

A) Assign responsibility.

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
A) Kant's Categorical Imperative
B) The Golden Rule
C) The Risk Aversion Principle
D) The "No free lunch" rule

A) Kant's Categorical Imperative

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
A) acceptable, because the grocer suffers the least harm.
B) acceptable, because the higher value is the survival of the family.
C) wrong, because the man would not want the grocer to steal from him.
D) wrong, because if everyone were to do this, the concept of personal property is defeated.

B) acceptable, because the higher value is the survival of the family.

Immanuel Kant's Categorical Imperative states that:
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if an action is not right for everyone to take, it is not right for anyone to take.

D) if an action is not right for everyone to take, it is not right for anyone to take.

The ethical "no free lunch" rule states that:
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) everything is owned by someone else, and that the creator wants compensation for this work.

D) everything is owned by someone else, and that the creator wants compensation for this work.

According to the ________, you should take the action that produces the least harm.
A) Categorical Imperative
B) Risk Aversion Principle
C) Utilitarian Principle
D) Golden Rule

B) Risk Aversion Principle

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?
A) Privacy Act of 1974
B) Gramm-Leach-Bliley Act of 1999
C) Freedom of Information Act
D) HIPAA of 1996

A) Privacy Act of 1974

FIP principles are based on the notion of the:
A) accountability of the record holder.
B) responsibility of the record holder.
C) mutuality of interest between the record holder and the individual.
D) privacy of the individual.

C) mutuality of interest between the record holder and the individual.

The Federal Trade Commission FIP principle of Notice/Awareness states that:
A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C) there is a mechanism in place to enforce FIP principles.
D) Web sites must disclose their information practices before collecting data.

D) Web sites must disclose their information practices before collecting data.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act

A) HIPAA

European privacy protection is ________ than in the United States.
A) less far reaching
B) less liable to laws
C) much less stringent
D) much more stringent

D) much more stringent

U.S. businesses are allowed to use personal data from EU countries if they:
A) have informed consent.
B) create a safe harbor.
C) develop equivalent privacy protection policies.
D) make their privacy protection policies publicly available.

C) develop equivalent privacy protection policies.

When a cookie is created during a Web site visit, it is stored:
A) on the Web site computer.
B) on the visitor's computer.
C) on the ISP's computer.
D) in a Web directory.

B) on the visitor's computer.

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
A) COPPA
B) P3P
C) PGP
D) safe-harbor

D) safe-harbor

The Online Privacy Alliance:
A) encourages self regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with Web sites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.

A) encourages self regulation to develop a set of privacy guidelines for its members.

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
A) opt-in
B) opt-out
C) P3P
D) PGP

B) opt-out

Types of information gathered by Web site tracking tools include all of the following except:
A) health concerns.
B) birthplace.
C) income.
D) purchases.

B) birthplace.

Which of the following statements does not describe a key difference between software and books?
A) Software contains more information than a book.
B) Software is less easily inspected than a book.
C) Software products are more easily compared to each other than books.
D) Software is understood to be more fallible than a book.

C) Software products are more easily compared to each other than books.

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
A) the courts become involved.
B) hackers are able to break into the source code.
C) the software is widely distributed.
D) a new version of the software is released.

C) the software is widely distributed.

Intellectual property can best be described as:
A) intangible property created by individuals or corporations.
B) unique creative work or ideas.
C) tangible or intangible property created from a unique idea.
D) the expression of an intangible idea.

A) intangible property created by individuals or corporations.

What legal mechanism protects the owners of intellectual property from having their work copied by others?
A) Patent protection
B) Intellectual property law
C) Copyright law
D) Fair Use Doctrine

C) Copyright law

"Look and feel" copyright infringement lawsuits are concerned with:
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product

B) the distinction between an idea and its expression.

The strength of patent protection is that it:
A) puts the strength of law behind copyright.
B) allows protection from Internet theft of ideas put forth publicly.
C) is easy to define.
D) grants a monopoly on underlying concepts and ideas.

D) grants a monopoly on underlying concepts and ideas.

One of the drawbacks of patent protection is:
A) that only the underlying ideas are protected.
B) digital media cannot be patented.
C) preventing the ideas from falling into public domain.
D) the years of waiting to receive it.

D) the years of waiting to receive it.

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act

A) Digital Millennium Copyright Act

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:
A) part of a machine.
B) similar to books.
C) services.
D) artistic expressions.

B) similar to books.

________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials

A) Regulated common carriers

It is not feasible for companies to produce error-free software because:
A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.

B) it is too expensive to create perfect software.

The most common source of business system failure is:
A) software bugs.
B) software errors.
C) hardware or facilities failures.
D) data quality.

D) data quality.

Flash cookies are different from ordinary cookies in that they:
A) are installed only at the user's request.
B) are not stored on the user's computer.
C) cannot be easily detected or deleted.
D) monitor the user's behavior at a web site.

C) cannot be easily detected or deleted.

The "do anything anywhere" computing environment can:
A) make work environments much more pleasant.
B) create economies of efficiency.
C) centralize power at corporate headquarters.
D) blur the traditional boundaries between work and family time.

D) blur the traditional boundaries between work and family time.

The practice of spamming has been growing because:
A) telephone solicitation is no longer legal.
B) it is good advertising practice and brings in many new customers.
C) it helps pay for the Internet.
D) it is so inexpensive and can reach so many people.

D) it is so inexpensive and can reach so many people.

The U.S. CAN-SPAM Act of 2003:
A) makes spamming illegal.
B) requires spammers to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.

B) requires spammers to identify themselves.

Which of the five moral dimensions of the information age does spamming raise?
A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations

A) Quality of life

Re-designing and automating business processes can be seen as a double-edged sword because:
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.

A) increases in efficiency may be accompanied by job losses.

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
A) computer
B) technology
C) digital
D) electronic

C) digital

CVS refers to:
A) eyestrain related to computer display screen use.
B) carpal vision syndrome.
C) wrist injuries brought about by incorrect hand position when using a keyboard.
D) stress induced by technology.

A) eyestrain related to computer display screen use.

________ can be induced by tens of thousands of repetitions under low-impact loads.
A) CTS
B) CVS
C) RSI
D) Technostress

C) RSI

The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals.

False

Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.
A) behavioral targeting
B) web bugs
C) NORA
D) intelligent agents

A) behavioral targeting

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:
A) the slippery-slope rule.
B) the lemming rule.
C) high-failure cost rule.
D) the utilitarian principle.

A) the slippery-slope rule.

Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.

True

The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision.

False

Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision.

False

A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior.

True

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
A) safe harbor
B) opt-in
C) FIP
D) P3P

B) opt-in

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.
A) copyright
B) trademark
C) patent
D) trade secret

C) patent

The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.

True

mis test 4 - Subjecto.com

mis test 4

Your page rank:

Total word count: 5935
Pages: 22

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

A native app is one that is designed to run on a specific platform

True

Documentation reveals how well the system has met its original objectives

False

A new information system is not considered in productions until conversion is complete.

True

Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system

True

Gantt and PERT charts are two common formal planning tools for project management.

True

Prototyping is more iterative than the conventional life cycle

True

One problem with prototyping is that the systems constructed thereby may not be able to handle large quantities of data in a production environment

True

End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools

True

Intangible benefits of an information systems are those that cannot be easily quantified

True

In one form of outsourcing, a company hires an external vendor to create the software for its system, but operates the software on its own computers

True

It is important that all systems development activities to be placed in sequential order

False

Object oriented development is more iterative and incremental than traditional structured development

True

Objects are grouped into hierarchies and hierarchies into classes.

False

Businesses can use component-based development to create their e-commerce applications.

True

Case tools facilitate the creation of clear documentation and the coordination of team development efforts

True

More timely information is a tangible benefit of information systems

False

An formation systems plan shows how specific information systems fit into a company’s overall business plan and business strategy

True

User concerns and designer concerns are usually the same at the beginning of the project.

False

Scope describes the full length of time required to complete a project

False

Successful implementation of an information system requires the participation of end users in the project

True

What was the primary problem facing the Girl Scouts regarding their supply chain problems?
A) The ordering process was inefficient for a large volume of orders.
B) There were high error rates in ordering and fulfillment.
C) It required too much time of volunteers.
D) The paper-based system was outdated.

A) The ordering process was inefficient for a large volume of orders.

Order the following steps in the systems development life cycle in the correct sequence.
A) Systems analysis, systems design, programming, testing, conversion, production and maintenance
B) Systems analysis, systems design, programming, conversion, testing, production and maintenance
C) Systems design, systems analysis, programming, conversion, production and maintenance, and testing
D) Systems design, systems analysis, programming, testing, conversion, production and maintenance

A) Systems analysis, systems design, programming, testing, conversion, production and maintenance

Which of the following is not part of the implementation process?
A) Evaluating the system
B) Testing
C) Systems analysis
D) Creating detailed design specifications

C) Systems analysis

Which process develops a detailed description of the functions that a new information system must perform?
A) Feasibility study
B) Requirements analysis
C) Systems design
D) Test plan development

B) Requirements analysis

Developing an information system has been compared to the problem-solving process. Which one of the following problem-solving steps is not a part of systems analysis?
A) Implement the solution
B) Choose the best solution
C) Develop alternative solutions
D) Define and understand the problem

A) Implement the solution

The entire system-building effort is driven by:
A) organizational change.
B) feasibility studies.
C) data.
D) user information requirements.

D) user information requirements.

Systems design:
A) identifies the system’s information requirements.
B) specifies how the new system will fulfill the information requirements.
C) identifies alternate solutions for solving the problem.
D) defines the problem and specifies its causes.

B) specifies how the new system will fulfill the information requirements.

In a data flow diagram, external entities are represented by:
A) rounded boxes.
B) square boxes.
C) circles.
D) open rectangles.

B) square boxes.

Transferring data from a legacy system to the new system would be defined by which system design specification category?
A) Input
B) Database
C) Manual procedures
D) Conversion

D) Conversion

In object-oriented development:
A) an object combines data and processes that act on the data into a single object.
B) data is separated into discrete, reusable objects that any processes may act upon.
C) an object comprises a single, reusable program that can be combined with other objects to form a robust application.
D) data categories are described as distinct objects, which can share characteristics with other objects.

A) an object combines data and processes that act on the data into a single object.

Which of the following is not one of the unique considerations in developing applications for a mobile platform?
A) Reduced screen space
B) Keyboard configuration
C) User gestures
D) Bandwidth constraints

B) Keyboard configuration

Unit testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole.
C) tests each individual program separately.
D) provides the final certification that the system is ready to be used in a production setting.

C) tests each individual program separately.

System testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.

B) tests the functioning of the system as a whole.

Acceptance testing:
A) includes all the preparations for the trials.
B) tests the functioning of the system as a whole.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.

D) provides the final certification that the system is ready to be used in a production setting.

In a parallel conversion strategy, the new system:
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.

C) and the old are run together.

In a direct cutover conversion strategy, the new system:
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.

B) replaces the old one at an appointed time.

The Girl Scouts’ conversion strategy of first introducing the modules for ordering cookies and then introducing the modules for transmitting orders and instructions to the cookie factory and shipper, is called a(n) ________ strategy.
A) phased approach
B) direct cutover
C) indirect cutover
D) incremental conversion

A) phased approach

Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed:
A) compliance.
B) production.
C) maintenance.
D) acceptance.

C) maintenance.

The oldest method for building information systems is:
A) component-based development.
B) prototyping.
C) object-oriented development.
D) the systems development lifecycle.

D) the systems development lifecycle.

In the traditional systems development lifecycle, end users:
A) are important and ongoing members of the team from the original analysis phase through maintenance.
B) are important only in the testing phases.
C) have no input.
D) are limited to providing information requirements and reviewing the technical staff’s work.

D) are limited to providing information requirements and reviewing the technical staff’s work.

As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the order of steps you will follow in this project?
A) Develop the prototype, use the prototype, revise and enhance the prototype.
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype.
C) Define the requirements, develop solutions, select the best prototype, and implement the prototype.
D) Define the requirements, develop the prototype, revise and enhance the prototype.

B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype.

When systems are created rapidly, without a formal development methodology:
A) end users can take over the work of IT specialists.
B) the organization quickly outgrows the new system.
C) hardware, software, and quality standards are less important.
D) testing and documentation may be inadequate.

D) testing and documentation may be inadequate.

Of the following, which is the most important reason for creating a mobile version of a business’s Web site?
A) Mobile devices provide access from anywhere.
B) Mobile devices use touch interfaces.
C) Mobile devices use lower bandwidth.
D) Mobile devices use different platforms.

A) Mobile devices provide access from anywhere.

Management can control the development of end-user applications in part by:
A) developing a formal development methodology.
B) requiring cost justification for end-user IS projects.
C) establishing standards for project requirements.
D) requiring Gantt charts.

C) establishing standards for project requirements.

If an organization’s requirements conflict with the software package chosen and the package cannot be customized, the organization should:
A) change its procedures.
B) outsource the development of the system.
C) redesign the RFP.
D) change the evaluation process.

A) change its procedures.

"Hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing.
A) vendor selection
B) hardware
C) software
D) employee salary

A) vendor selection

The process of creating workable information systems in a very short period of time is called:
A) RAD.
B) JAD.
C) prototyping.
D) end-user development.

A) RAD Rapid Application Development

This type of systems development is characterized by significantly speeding the generation of information requirements and involving users at an intense level in the systems design.
A) RAD
B) JAD
C) Prototyping
D) End-user development

B) JAD Joint Application Design

The term structured, when discussing structured methodologies, refers to the fact that:
A) the finished software is highly documented.
B) the development process is highly documented.
C) the techniques are step by step, with each step building on the previous one.
D) a defined hierarchy of objects and classes are used to structure the programming.

C) the techniques are step by step, with each step building on the previous one.

The primary tool for representing a system’s component processes and the flow of data between them is the:
A) data dictionary.
B) process specifications diagram.
C) user documentation.
D) data flow diagram.

D) data flow diagram

You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project?
A) RAD
B) JAD
C) End-user development
D) Prototyping

D) Prototyping

To show each level of a system’s design, its relationship to other levels, and its place in the overall design structure, structured methodologies use:
A) structure charts.
B) Gantt charts and PERT.
C) process specifications diagrams.
D) data flow diagrams.

A) structure charts.

An entire information system is broken down into its main subsystems by using:
A) high-level data flow diagrams.
B) low-level data flow diagrams.
C) process specifications.
D) structured diagrams.

A) high-level data flow diagrams.

In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related?
A) Degree would be a sister class to Mathematics and Physics.
B) Degree is a superclass to Mathematics and Physics.
C) Mathematics and Physics would be ancestors to Degree.
D) Degree would be a subclass to Mathematics and Physics.

B) Degree is a superclass to Mathematics and Physics.

Object-oriented modeling is based on the concepts of:
A) objects and relationships.
B) classes and objects.
C) class and inheritance.
D) objects and inheritance.

C) class and inheritance

Object-oriented development could potentially reduce the time and cost of writing software because:
A) object-oriented programming requires less training.
B) iterative prototyping is not required.
C) objects are reusable.
D) a single user interface object can be used for the entire application.

C) objects are reusable

Groups of objects are assembled into software components for common functions, which can be combined into large-scale business applications, in which type of software development?
A) Object-oriented development
B) Component-based development
C) Structured methodologies
D) RAD

B) Component-based

Which of the following is a technique used to create Web sites that will conform to the screen resolution of the user?
A) Native design
B) Responsive design
C) End-user design
D) Multi-platform design

B) Responsive design

________ provides software tools to automate development methodologies and reduce the amount of repetitive work in systems development.
A) CASE
B) CAD
C) JAD
D) RAD

A) CASE

________ refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints.
A) Systems analysis
B) Systems design
C) Project management
D) Project implementation

C) Project management

A PERT chart:
A) portrays a project as a network diagram consisting of numbered nodes that represent tasks.
B) is used to evaluate project risk and time.
C) displays a horizontal bar for each project task.
D) tracks progress of, and modifications to, project tasks.

A) portrays a project as a network diagram consisting of numbered nodes that represent tasks.

________ are tangible benefits of information systems.
A) Improved asset utilization, increased organizational learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and increased productivity
C) Increased productivity, reduced workforce, and increased job satisfaction
D) Lower operational costs, improved resource control, and more information

B) Reduced workforce, lower outside vendor costs, and increased productivity

________ are intangible benefits of information systems.
A) Improved asset utilization, increased organizational learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and increased productivity
C) Increased productivity, reduced workforce, and increased job satisfaction
D) Lower operational costs, improved resource control, and more information

A) Improved asset utilization, increased organizational learning, and improved operations

Which process is used to develop risk profiles for a firm’s information system projects and assets?
A) Information systems plan
B) Scoring model
C) Portfolio analysis
D) Feasibility study

C) Portfolio analysis

You have been hired by a pharmaceutical company to evaluate its portfolio of systems and IT projects. Which types of projects would be best avoided?
A) Any high-risk projects
B) Any low-benefit projects
C) High-risk, low-benefit projects
D) None – any project might be beneficial

C) High-risk, low-benefit projects

You would expect to find all of the following in an information systems plan except:
A) key business processes.
B) budget requirements.
C) portfolio analysis.
D) milestones and planning.

C) portfolio analysis.

The project risk will rise if the project team and the IS staff lack:
A) RAD experience.
B) web services.
C) the required technical expertise.
D) CASE tools.

C) the required technical expertise.

Users prefer systems that:
A) are oriented to facilitating organizational tasks and solving business problems.
B) work with existing DBMS.
C) are able to provide optimum hardware and software efficiency.
D) are capable of storing much more data than they need.

A) are oriented to facilitating organizational tasks and solving business problems.

A ________ shows each task as a horizontal bar whose length is proportional to the time required to complete it.
A) PERT chart
B) DFD
C) feasibility study
D) Gantt chart

D) Gantt chart

Which of the following tools may help identify risk areas associated with employee acceptance of a new information system?
A) Formal planning software
B) Organizational impact analysis
C) System prototype
D) Feasibility study

B) Organizational impact analysis

A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
A) test plan
B) conversion plan
C) feasibility study
D) risk analysis

C) feasibility study

A test plan includes all the preparations for the series of tests to be performed on the system.

True

Which of the following Web development languages is used for mobile applications because it supports cross-platform mobile applications?
A) Java
B) Javascript
C) XML
D) HTML5

D) HTML5

A prototype is the final working version of an information system.

False

A(n) ________ is a detailed list of questions submitted to external vendors to determine how well they meet the organization’s specific requirements.
A) RFP
B) RFQ
C) RAD
D) JAD

A) RFP

PaaS are online development environments that enable developers to quickly write customer- or employee-facing Web applications.

True

________ describe the transformation occurring within the lowest level of the data flow diagrams. They express the logic of each process.
A) Process specifications
B) Structure charts
C) DFDs
D) Component procedures

A) Process specifications

A reduced workforce is an example of a tangible benefit of an information system.

True

________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.
A) A scoring model
B) A scorecard
C) Portfolio analysis
D) Risk analysis

A) A scoring model

Ergonomics is the interaction of people and machines in the work environment, including the design of jobs and legal issues.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

The last step in analyzing an ethical issue should be to identify the stakeholders – people who have a vested interest in the outcome of the decision.

False

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Even in today’s legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm

False

Spyware is software that comes hidden in downloaded applications and can track your online movements.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

The rate of global piracy is approximately 20%.

False

Trade secret law does not protect the actual ideas in a work product.

False

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

True

The Copyright Office began registering software programs in the 1990s.

False

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

True

According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

False

The key concepts in patent law are originality, novelty, and value.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

False

Any unsolicited e-mail is legally considered spam

False

The European Parliament has passed a ban on unsolicited commercial messaging.

True

The most common type of computer-related RSI is CTS.

True

Technostress is a computer-related malady whose symptoms include fatigue.

True

Most American and European privacy law is based on a set of five principles called COPPA.

False

Which of the following best describes how new information systems result in legal gray areas?
A) They work with networked, electronic data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.

B) They result in new situations that are not covered by old laws.

The introduction of new information technology has a:
A) dampening effect on the discourse of business ethics.
B) ripple effect, raising new ethical, social, and political issues.
C) beneficial effect for society as a whole, while raising dilemmas for consumers.
D) waterfall effect in raising ever more complex ethical issues.

B) ripple effect, raising new ethical, social, and political issues.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
A) property rights and obligations.
B) system quality.
C) accountability and control.
D) information rights and obligations.

A) property rights and obligations.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
A) family and home.
B) property rights and obligations.
C) system quality.
D) quality of life.

D) quality of life.

All of the following are current key technology trends raising ethical issues except:
A) data storage improvements.
B) data analysis advancements.
C) increase in multimedia quality.
D) increase in use of mobile devices.

C) increase in multimedia quality.

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
A) profiling.
B) phishing.
C) spamming.
D) targeting.

A) profiling.

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
A) Property rights and obligations
B) System quality
C) Accountability and control
D) Information rights and obligations

D) Information rights and obligations

NORA is a:
A) profiling technology used by the EU.
B) federal privacy law protecting networked data.
C) new data analysis technology that finds hidden connections between data in disparate sources.
D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.

C) new data analysis technology that finds hidden connections between data in disparate sources.

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
A) responsibility.
B) accountability.
C) liability.
D) due process.

A) responsibility.

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?
A) Firms should build products and services that protect privacy.
B) Firms should increase the transparency of their data collection.
C) Firms should require consumer consent and provide clear options to opt out of data collection.
D) Firms should limit the length of time that any personal data is stored to six months or less.

D) Firms should limit the length of time that any personal data is stored to six months or less.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
A) due process.
B) accountability.
C) the courts of appeal.
D) the judicial system.

B) accountability.

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
A) liability.
B) due process.
C) the courts of appeal.
D) accountability.

B) due process.

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
A) Assign responsibility.
B) Identify the stakeholders.
C) Identify the options you can reasonably take.
D) Identify and clearly describe the facts.

A) Assign responsibility.

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
A) Kant’s Categorical Imperative
B) The Golden Rule
C) The Risk Aversion Principle
D) The "No free lunch" rule

A) Kant’s Categorical Imperative

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
A) acceptable, because the grocer suffers the least harm.
B) acceptable, because the higher value is the survival of the family.
C) wrong, because the man would not want the grocer to steal from him.
D) wrong, because if everyone were to do this, the concept of personal property is defeated.

B) acceptable, because the higher value is the survival of the family.

Immanuel Kant’s Categorical Imperative states that:
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if an action is not right for everyone to take, it is not right for anyone to take.

D) if an action is not right for everyone to take, it is not right for anyone to take.

The ethical "no free lunch" rule states that:
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) everything is owned by someone else, and that the creator wants compensation for this work.

D) everything is owned by someone else, and that the creator wants compensation for this work.

According to the ________, you should take the action that produces the least harm.
A) Categorical Imperative
B) Risk Aversion Principle
C) Utilitarian Principle
D) Golden Rule

B) Risk Aversion Principle

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?
A) Privacy Act of 1974
B) Gramm-Leach-Bliley Act of 1999
C) Freedom of Information Act
D) HIPAA of 1996

A) Privacy Act of 1974

FIP principles are based on the notion of the:
A) accountability of the record holder.
B) responsibility of the record holder.
C) mutuality of interest between the record holder and the individual.
D) privacy of the individual.

C) mutuality of interest between the record holder and the individual.

The Federal Trade Commission FIP principle of Notice/Awareness states that:
A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C) there is a mechanism in place to enforce FIP principles.
D) Web sites must disclose their information practices before collecting data.

D) Web sites must disclose their information practices before collecting data.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act

A) HIPAA

European privacy protection is ________ than in the United States.
A) less far reaching
B) less liable to laws
C) much less stringent
D) much more stringent

D) much more stringent

U.S. businesses are allowed to use personal data from EU countries if they:
A) have informed consent.
B) create a safe harbor.
C) develop equivalent privacy protection policies.
D) make their privacy protection policies publicly available.

C) develop equivalent privacy protection policies.

When a cookie is created during a Web site visit, it is stored:
A) on the Web site computer.
B) on the visitor’s computer.
C) on the ISP’s computer.
D) in a Web directory.

B) on the visitor’s computer.

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
A) COPPA
B) P3P
C) PGP
D) safe-harbor

D) safe-harbor

The Online Privacy Alliance:
A) encourages self regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with Web sites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.

A) encourages self regulation to develop a set of privacy guidelines for its members.

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
A) opt-in
B) opt-out
C) P3P
D) PGP

B) opt-out

Types of information gathered by Web site tracking tools include all of the following except:
A) health concerns.
B) birthplace.
C) income.
D) purchases.

B) birthplace.

Which of the following statements does not describe a key difference between software and books?
A) Software contains more information than a book.
B) Software is less easily inspected than a book.
C) Software products are more easily compared to each other than books.
D) Software is understood to be more fallible than a book.

C) Software products are more easily compared to each other than books.

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
A) the courts become involved.
B) hackers are able to break into the source code.
C) the software is widely distributed.
D) a new version of the software is released.

C) the software is widely distributed.

Intellectual property can best be described as:
A) intangible property created by individuals or corporations.
B) unique creative work or ideas.
C) tangible or intangible property created from a unique idea.
D) the expression of an intangible idea.

A) intangible property created by individuals or corporations.

What legal mechanism protects the owners of intellectual property from having their work copied by others?
A) Patent protection
B) Intellectual property law
C) Copyright law
D) Fair Use Doctrine

C) Copyright law

"Look and feel" copyright infringement lawsuits are concerned with:
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product

B) the distinction between an idea and its expression.

The strength of patent protection is that it:
A) puts the strength of law behind copyright.
B) allows protection from Internet theft of ideas put forth publicly.
C) is easy to define.
D) grants a monopoly on underlying concepts and ideas.

D) grants a monopoly on underlying concepts and ideas.

One of the drawbacks of patent protection is:
A) that only the underlying ideas are protected.
B) digital media cannot be patented.
C) preventing the ideas from falling into public domain.
D) the years of waiting to receive it.

D) the years of waiting to receive it.

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act

A) Digital Millennium Copyright Act

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:
A) part of a machine.
B) similar to books.
C) services.
D) artistic expressions.

B) similar to books.

________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials

A) Regulated common carriers

It is not feasible for companies to produce error-free software because:
A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.

B) it is too expensive to create perfect software.

The most common source of business system failure is:
A) software bugs.
B) software errors.
C) hardware or facilities failures.
D) data quality.

D) data quality.

Flash cookies are different from ordinary cookies in that they:
A) are installed only at the user’s request.
B) are not stored on the user’s computer.
C) cannot be easily detected or deleted.
D) monitor the user’s behavior at a web site.

C) cannot be easily detected or deleted.

The "do anything anywhere" computing environment can:
A) make work environments much more pleasant.
B) create economies of efficiency.
C) centralize power at corporate headquarters.
D) blur the traditional boundaries between work and family time.

D) blur the traditional boundaries between work and family time.

The practice of spamming has been growing because:
A) telephone solicitation is no longer legal.
B) it is good advertising practice and brings in many new customers.
C) it helps pay for the Internet.
D) it is so inexpensive and can reach so many people.

D) it is so inexpensive and can reach so many people.

The U.S. CAN-SPAM Act of 2003:
A) makes spamming illegal.
B) requires spammers to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.

B) requires spammers to identify themselves.

Which of the five moral dimensions of the information age does spamming raise?
A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations

A) Quality of life

Re-designing and automating business processes can be seen as a double-edged sword because:
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.

A) increases in efficiency may be accompanied by job losses.

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
A) computer
B) technology
C) digital
D) electronic

C) digital

CVS refers to:
A) eyestrain related to computer display screen use.
B) carpal vision syndrome.
C) wrist injuries brought about by incorrect hand position when using a keyboard.
D) stress induced by technology.

A) eyestrain related to computer display screen use.

________ can be induced by tens of thousands of repetitions under low-impact loads.
A) CTS
B) CVS
C) RSI
D) Technostress

C) RSI

The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals.

False

Advertisers use ________ in order to display more relevant ads based on user’s search and browsing history.
A) behavioral targeting
B) web bugs
C) NORA
D) intelligent agents

A) behavioral targeting

Descartes’ rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:
A) the slippery-slope rule.
B) the lemming rule.
C) high-failure cost rule.
D) the utilitarian principle.

A) the slippery-slope rule.

Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.

True

The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision.

False

Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision.

False

A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior.

True

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
A) safe harbor
B) opt-in
C) FIP
D) P3P

B) opt-in

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.
A) copyright
B) trademark
C) patent
D) trade secret

C) patent

The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.

True

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending