Ethics Final- Ch 7-10

¡Supera tus tareas y exámenes ahora con Quizwiz!

The PricewaterhouseCoopers LLP Health Research Institute estimated that a 500-bed hospital could receive______ in HITECH incentives to purchase, deploy, and maintain an EHR system. a. $6.1million b. $296,000 c. $3.2million d. $800 billion

a. $6.1million

In one lawsuit in the early_______ , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems. a. 1990s b. 1980s c. 1970s d. 1960s

a. 1990s

_______created its own social networking Web site, IdeaStorm, as a means for its millions of customers around the world to talk about new products, services, or improvements they would like. a. Dell b. Apple c. Hewlett Packard d. IBM

a. Dell

A(n) _______visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations. a. H-1B b. L-1 c. B-1 d. B-2

a. H-1B

______is the country in Europe with the highest Internet penetration. a. Monaco b. Spain c. Sweden d. Germany

a. Monaco

The country with the lowest Internet penetration in Asia is _____. a. Myanmar b. India c. China d. South Korea

a. Myanmar

______is the probability of an undesirable event occurring times the probability that the event would go undetected times the magnitude of the event's consequences if it does happen. a. Risk b. Redundancy c. Liability d. Certainty

a. Risk

______refers to methods within the development cycle that guarantee reliable operation of the product. a. Software quality assurance b. Software development methodology c. Software documentation d. Software project management

a. Software quality assurance

An advantage of social network advertising over traditional advertising media is that ______. a. ads can be targeted to reach people with the desired demographic characteristics b. it is cost-effective when compared to traditional advertising media c. advertisers can quickly change the advertising message when required d. ad viewers can easily identify useful contacts

a. ads can be targeted to reach people with the desired demographic characteristics

Recent survey results show that _____of teenagers have experienced cyberbullying in their lifetime. a. as many as 25 percent b. at least 20.8 percent c. more than 80 percent d. less than 15 percent

a. as many as 25 percent

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for______ . a. breach of warranty b. comparative negligence c. contributory negligence d. strict liability

a. breach of warranty

Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating federal or state ______laws. a. discrimination b. hiring c. protection d. recruiting

a. discrimination

One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process called ______. a. dynamic testing b. user acceptance testing c. integration testing d. static testing

a. dynamic testing

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in ______ for file servers. a. high-volume data storage b. low-volume data storage c. unpredictable-volume data storage d. irregular-volume data storage

a. high-volume data storage

It is difficult to quantify how much the use of IT has contributed to worker productivity because _____. a. many other factors influence worker productivity rates besides IT b. organizational efficiency tends to decrease despite increased investments in IT c. all IT investments produce intangible benefits that cannot be analyzed d. workers merely use the time provided by IT implementationto do some small tasks

a. many other factors influence worker productivity rates besides IT

Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect product _________. a. quality b. delivery c. testing d. development

a. quality

A majority of social shopping Web sites generate revenue through ______. a. retailer advertising b. sharing with retailers data about their members' like and dislikes c. membership fee d. Internet service providers

a. retailer advertising

Software quality is defined as the degree to which a software product meets: a. the needs of its users. b. the standards of its competitors. c. sustainability and environmental protection needs. d. the minimum financial return standards.

a. the needs of its users.

The ______federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity. a. 47 U.S.C. 223 b. 18 U.S.G. 2425 c. 18 U.S.C. 875(c) d. 18 U.S.G. 2261A

b. 18 U.S.G. 2425

______is a social networking site where entrepreneurs and small-business people collaborate to help each other to succeed. a. LinkedIn b. Biznik c. Facebook d. FastPitch

b. Biznik

_____involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. a. Integration testing b. Black-box testing c. User acceptance testing d. Static testing

b. Black-box testing

______requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites. a. Store-and-forward telemedicine b. Live telemedicine c. Electronic consultation d. Remote monitoring

b. Live telemedicine

N-version programming is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements _____times, where N could be 2, 3, 4, or more. a. N+1 b. N c. N+2 d. N+3

b. N

The ______is a low-cost computer that runs a Linux-based operating system and comes with a suite of 300 or so learning applications called Sugar. a. Raspberry Pi b. OLPC XO-4 c. Simputer d. Classmate+

b. OLPC XO-4

The_____ is a small, inexpensive computer with either 256 MB or 512 MB of RAM, a 700 MHz processor, one or two USB ports, and an Ethernet port—but no case and no monitor. a. OLPC XO b. Raspberry Pi c. Simputer d. Classmate PC

b. Raspberry Pi

_______typically involves the use of social networks to communicate and promote the benefits of products and services. a. Social network shopping b. Social network advertising c. Door-to-door selling d. Word-of-mouth marketing

b. Social network advertising

______is a work arrangement in which an employee works away from the office. a. Telehealth b. Telecommuting c. Outsourcing d. Flextime work

b. Telecommuting

_____ is common in airplane and spacecraft control systems. a. Structured programming b. Triple version programming c. Object programming d. Root programming

b. Triple version programming

The _______lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime. a. McClain v. Hewlett-Packard b. Vizcaino v. Microsoft c. Wainwright v. IBM d. Brown et al v. Oracle

b. Vizcaino v. Microsoft

Some industry observers identify the increasing use of _____as an important first step in bridging the digital divide in many countries. a. electronic health records b. cell phones c. personal digital assistants d. laptop computers

b. cell phones

A type of business system is the______ , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio. a. upgrade management system b. decision support system c. executive information system d. data information system

b. decision support system

Most social networking Web sites have terms of use agreement that states the Web site has the right to _____. a. post messages about its users b. delete material that violates the site's policies c. edit material submitted by its users d. charge users to view adult material

b. delete material that violates the site's policies

The ______is a term used to describe the gulf between those who do and those who don't have access to modern information and communications technology. a. communication rift b. digital divide c. achievement gap d. glass ceiling

b. digital divide

Remote monitoring is also known as _____. a. real-time telehealth b. home monitoring c. telenursing d. live telemedicine

b. home monitoring

While using social networks as part of the hiring process, employers can_____ . a. screen applicants based on race or ethnicity b. look at the profiles of potential candidates c. legally violate federal laws d. post messages on behalf of a candidate

b. look at the profiles of potential candidates

As of April 2013, ______states have enacted laws to curb cyberbullying by calling on schools districts to develop policies regarding cyberbullying and punishment. a. nearly all b. only sixteen c. about half d. no

b. only sixteen

The _______in Egypt reduced the attractiveness of that country as a source of IT outsourcing. a. spike in oil prices b. political unrest c. limited number of resources d. lack of education

b. political unrest

A _____is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software. a. software guide b. software development methodology c. software manual d. software project management

b. software development methodology

Hotmail created what is recognized by many as the most successful ______campaigns ever when it first launched its service in 1996. a. social hiring b. viral marketing c. social shopping d. direct advertising

b. viral marketing

In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as _____. a. $5000 b. $7000 c. $2500 d. $9500

c. $2500

Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020? a. Business is facing a long-term excess of trained and experienced IT workers. b. Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions. c. 750,000 new jobs are expected to be added to IT related positions. d. IT firms are more likely to turn to traditional sources than nontraditional sources to find IT workers.

c. 750,000 new jobs are expected to be added to IT related positions.

MySpace purged _______sex offenders from its site over a period of two years. a. 25,000 b. 65,000 c. 90,000 d. 113,500

c. 90,000

U.S. Representative _______was forced to resign in 2011 after admitting he sent sexually explicit photos of himself to several women using social networks including Facebook and Twitter. a. John Boener b. Barney Frank c. AnthonyWeiner d. Ron Paul

c. AnthonyWeiner

________are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output. a. Management information systems b. Decision support systems c. Business information systems d. Data information systems

c. Business information systems

The ______is a low-cost laptop introduced by Intel and Lenovo designed for use in kindergarten through high school classrooms in developing countries. a. Raspberry Pi b. OLPC XO c. Classmate+ d. Simputer

c. Classmate+

________ involves placing banner ads on a social networking Web site. a. Advertising through groups b. Social shopping c. Direct advertising d. Viral marketing

c. Direct advertising

The _______requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging. a. Electronic Industry Citizenship Coalition Directive b. Greenpeace Environmental Restriction of Hazardous Substances c. European Union's Restriction of Hazardous Substances Directive d. Electronic Product and Environmental Hazards Restriction Directive

c. European Union's Restriction of Hazardous Substances Directive

______is an important technique used to develop ISO 9001-compliant quality systems. a. DO-178B/EUROCCAE ED-128 b. N-version programming c. Failure mode and effects analysis (FMEA) d. Capability Maturity Model Integration (CMMI)

c. Failure mode and effects analysis (FMEA)

In 2006, ______introduced a low-cost laptop called the Classmate PC. a. IBM b. Apple c. Intel d. Microsoft

c. Intel

______enable patients to use the Internet to compare the quality, safety, and cost information on hospitals nationwide. a. Electronic health records b. Inpatient codes c. Medical information Web sites d. Remote monitoring telemedicine systems

c. Medical information Web sites

Which of the following is true about online virtual worlds? a. Virtual world activities cannot violate real world law. b. The use of real world cash is prohibited in the online virtual world. c. Offensive behavior online can be mediated by administrators. d. Online avatars can perform criminal acts in public places.

c. Offensive behavior online can be mediated by administrators.

_______helps physicians keep tabs on patients prone to life-threatening health crises. a. Inpatient codes b. Medical information Web sites c. Remote monitoring d. SMS texts

c. Remote monitoring

The full name of the E-Rate program is ______. a. National School Lunch Program b. Health Information Technology Program c. Schools and Libraries Program of the Universal Service Fund d. One Laptop per Child Program

c. Schools and Libraries Program of the Universal Service Fund

Which of the following is true of software testing? a. White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. b. Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in whitebox testing, are known. c. Static testing involves software programs called static analyzers which are run against new code. d. Integration testing involves independent testing that is performed by trained end users to ensure that the system operates as they expect.

c. Static testing involves software programs called static analyzers which are run against new code.

______involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation. a. Live telemedicine b. Remote monitoring c. Store-and-forward telemedicine d. Inpatient consultation

c. Store-and-forward telemedicine

______means that the defendant is held responsible for injuring another person, regardless of negligence or intent. a. Contributory negligence b. Misrepresentation c. Strict liability d. Breach of warranty

c. Strict liability

The EICC has developed a(n) _______for member organizations in which areas of improvement are assessed by certified, third-party firms. a. application b. governing body c. audit program d. mandate

c. audit program

A(n)_____ is a representation of a virtual world visitor. a. icon b. robot c. avatar d. mythical character

c. avatar

A social networkingWeb site ______. a. is limited within the barriers of time b. prohibits interactions between unknown people c. can be used for nonbusiness purposes d. can generate revenue only through member fee

c. can be used for nonbusiness purposes

It can take _____for IT investment to result in a significant increase in productivity. a. less than three years b. more than 10 years c. five to seven years d. only a few months

c. five to seven years

The safety engineer uses a logging and monitoring system to track _____ from a project's start to its finish. a. standards b. objectives c. hazards d. deliverables

c. hazards

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using _____. a. system testing b. black-box testing c. integration testing d. static testing

c. integration testing

Unless organizations _______ social networks, their customers are left to resolve their issues and questions on their own, often in ways that are not ideal. a. take down their b. use c. monitor d. build

c. monitor

When school authorities do get involved in an effort to discipline students for cyberbullying, they are sometimes sued for violating the student's right to free speech, especially if the activity _________. a. involved minority students b. involved students under the age of 13 c. occurred off school premises d. occurred in the presence of a teacher

c. occurred off school premises

One common use of wireless technology in the healthcare field is to______ . a. provide the public access to a patient's medical history b. provide access to Medicare and Medicaid reimbursements c. provide a means to access and update EHRs d. increase chances of duplicate care

c. provide a means to access and update EHRs

After a worker's H1B visa expires, the foreigner must _______. a. return to school to get an advanced degree before applying for another H-1B visa b. apply to become a U.S. citizen c. remain outside the United States for one year before another H-1B petition will be approved d. never again apply for an H-1B visa

c. remain outside the United States for one year before another H-1B petition will be approved

The Health Information Technology for Economic and Clinical Health Act is intended to increase the use of health information technology by ______. a. requiring the government to develop individual standards for records in each medical organization b. providing incentives to encourage doctors and hospitals to pull together the paper trail of a person's medical history and immunization records c. saving the government $10 billion through improvements in the quality of care, care coordination,reductions in medical errors, and duplicate care d. allowing everyone free access to a patient's medical history and identifiable health information

c. saving the government $10 billion through improvements in the quality of care, care coordination,reductions in medical errors, and duplicate care

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____. a. relocation expenses b. start-up costs c. training costs d. travel expenses

c. training costs

Software suppliers frequently write ______to attempt to limit their liability in the event of nonperformance. a. manuals b. warnings c. warranties d. sureties

c. warranties

About _______of material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting. a. 120 hours b. 24 hours c. 48 hours d. 100 hours

d. 100 hours

In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is_____ . a. 5.8 b. 25.7 c. 38.9 d. 22.1

d. 22.1

After an organization decides to adopt _____ , it must conduct an assessment of its software development practices to determine where they fit in the capability model. a. QA b. software development methodology c. software quality management d. CMMI-DEV

d. CMMI-DEV

______built a virtual world model of its Salt Lake refinery for training new operators. a. British Petroleum b. Exxon Mobil c. Shell d. Chevron

d. Chevron

________is threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications. a. Libel b. Slander c. Cyberbullying d. Cyberstalking

d. Cyberstalking

The ______regards it as a federal crime to enter a social networking site in violation of the terms of service. a. New Media Consortium b. National Center for Victims of Crime c. Emarketer d. Department of Justice

d. Department of Justice

______can be oral, written, or inferred from the seller's conduct. a. Indemnity b. Strict liabilities c. Warranty tolling d. Express warranties

d. Express warranties

_______is the most popular social network destination worldwide. a. Twitter b. LinkedIn c. MySpace d. Facebook

d. Facebook

Which of the following factors has increased the prevalence of telework? a. Reduced levels of traffic congestion b. Lack of broadband connections in homes and retail locations c. Reduced need for employees to take time off d. Highly trained workers demanding flexible work arrangements

d. Highly trained workers demanding flexible work arrangements

The _____standard serves many industries and organizations as a guide to quality products, services, and management. a. ISO 7498-4 b. ISO 9595/DAM 1 c. ISO 9596 d. ISO 9001

d. ISO 9001

According to A.T. Kearney, the most attractive offshoring destination is ______. a. China b. Egypt c. Mexico d. India

d. India

Which of the following is true of the International Organization for Standardization? a. It is an American organization founded in 2001. b. The ISO 9000:2007 provides a set of standardized requirements for a quality management system. c. It issued the 9000 series of business standards in 1987. d. It is a worldwide federation of national standards bodies from 161 countries.

d. It is a worldwide federation of national standards bodies from 161 countries.

The ______program in Nepal started in 2008 as a small pilot project in two schools. a. HITECH b. E-Rate c. telework d. OLPC

d. OLPC

________is a social shopping Web site that implemented a reward system for members in which they are paid a commission each time another shopper acts on their recommendations to purchase a specific item. a. Buzzillions b. ZEBO c. Kaboodle d. Stuffpit

d. Stuffpit

Which of the following is true of strategies for engineering quality software? a. High-quality software systems are tough to learn and use because they perform slowly. b. Software defects never lead to injury. c. Developers develop high-quality software instantaneously without a set of principles. d. The first release of any software rarely meets all its users' expectations.

d. The first release of any software rarely meets all its users' expectations.

Which of these statements about contingent workers is true? a. They typically work as a separate, independent group of workers and move from project to project working for the same firm. b. They are often paid a lower hourly wage than full-time employees doing equivalent work. c. They are eligible for most company benefits such as vacation, sick pay, and medical insurance. d. They have neither an explicit nor an implicit contract for continuing employment.

d. They have neither an explicit nor an implicit contract for continuing employment.

An electronic health record includes______ . a. a patient's Medicare reimbursements b. inpatient codes c. audit trails of patient health information d. a patient's immunization records

d. a patient's immunization records

An advantage of teleworking is that _____. a. it ensures the security of organizational data b. it is easier to monitor the quantity and quality of the work performed by teleworkers c. planning required by managers is significantly reduced d. business operations can be continued even in the event of disaster

d. business operations can be continued even in the event of disaster

Compared to personal computers, cell phones______ . a. are more expensive b. are less portable c. require a steeper learning curve to master their use d. come with an extended battery life

d. come with an extended battery life

One of the fundamental ways in which companies can try directly to increase productivity is by ______. a. increasing the amount of input required to produce a given output b. selling smaller quantities of goods to decrease capacity c. decreasing the value of the output produced by a given amount of input d. consolidating operations to better leverage economies of scale

d. consolidating operations to better leverage economies of scale

Products, such as statements of requirements, flowcharts, and user documentation, are known as_______ . a. project systems b. information systems c. objects d. deliverables

d. deliverables

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the _______maturity level. a. quantitatively managed b. managed c. defined d. initial

d. initial

Oil companies are increasingly relying on______ to connect a nurse or EMT on an oil platform to emergency physicians at a major medical center. a. electronic consultation b. remote monitoring c. store-and-forward telemedicine d. live telemedicine

d. live telemedicine

The contents of ______are for informational purposes only and not intended to be substitutes for professional medical advice, diagnosis, or treatment. a. store-and-forward telemedicine b. electronic health records c. live telemedicine d. medical information Web sites

d. medical information Web sites

When sued for______ , a software supplier is not held responsible for every product defect that causes customer or third-party loss. a. breach of warranty b. misrepresentation c. strict liability d. negligence

d. negligence

The popularity of social networking is increasing most rapidly_______ . a. in age group 13-18 b. in age group 19-32 c. in age group 33-49 d. over all ages

d. over all ages

The Bureau of Labor Statistics tracks U.S. productivity on a(n)_____ basis. a. monthly b. annual c. semiannual d. quarterly

d. quarterly

The National Center for Victims of Crime advises victims to_______ . a. destroy all evidence of any contact with the cyberstalker b. meet in a public place with the cyberstalker to talk things out before involving any law enforcement officers c. not consider getting law enforcement officers involved until the stalker threatens violence d. send the stalker a written notice that their contact is unwanted and that further contact should cease

d. send the stalker a written notice that their contact is unwanted and that further contact should cease

The medical information Web sites are intended to be ______. a. substitutes for paper documentation of a patient's medical history b. sources of professional medical advice for illnesses c. substitutes for professional diagnosis and treatments d. sources of reliable and objective information on medical-related topics

d. sources of reliable and objective information on medical-related topics

The primary reason someone "friends" a brand on Facebook is to ______. a. make additional friends b. gain publicity c. earn direct payments from the brand marketers d. to access exclusive deals or offers

d. to access exclusive deals or offers

Organizations direct advertisements toward those members of a social network who would likely find a product most appealing by ______. a. sharing their likes and dislikes with competitors b. acquiring the social network c. creating their own social networking Web site d. using the information in their user profiles

d. using the information in their user profiles


Conjuntos de estudio relacionados

Judicial Process and Behavior Midterm

View Set

Psychology Chapter 3: Development

View Set

Marketing Management Chapter Fourteen

View Set

Preguntas (questions) y respuestas (answers) #1 español-inglés (Spanish-English)

View Set