Ethics in Computer Science Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?

$5,000

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered?

25 years

The number of Internet users worldwide is quickly approaching which of the following?

4 billion

Approx. how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?

400 hours

Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?

ACPA

What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?

Black-box testing

Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?

Content Scramble System (CSS)

Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim?

Cyberstalking

Which of the following can be oral, written, or inferred from the seller's conduct?

Express warranties

An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?

Failure mode and effects analysis (FMEA)

The goal of which of the following was to entice whistle-blowers to come forward by offering them a share of the money recovered?

False Claims Act

Which country is considered one of the best sources of programming skills outside of Europe and North America?

India

Which of the following is true of the International Organization for Standardization?

It is a worldwide federation of national standards bodies from 161 countries

Which term refers to methods within the development process that guarantee reliable operation of the product?

Quality assurance

The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?

Reverse engineering

Which of the following terms is defined as the potential of gaining or losing something of value?

Risk

Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services?

Social media marketing

Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.

Statements on Standards for Attestation and Engagements No. 16

Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?

TRIPS agreement

Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?

The Economic Espionage Act (EEA) of 1996

Which of the following is true of strategies for engineering quality software?

The first release of any software rarely meets all its user's expectations

Which of these statements about contingent workers is true?

They have neither an explicit nor an implicit contract for continuing employment.

T/F: Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.

True

t/f: Risk is the potential of gaining or losing something of value

True

A patent is a grant of a property right issues by which entity?

USPTO

A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called which of the following?

a coemployment relationship

An advantage of social network advertising over traditional advertising media is:

ads can be targeted to reach people with the desired demographic characteristics

A social networking platform:

can be used for business purposes

Which of the following can read the machine language of a software program and produce the source code?

decomplier

Most social networking Web sites have terms of use agreement that states the Web site has the right to:

delete material that violates the site's policies

t/f: An employer can legally screen applicants based on race or ethnicity.

false

t/f: Contingent work is a job situation in which an individual has an implicit contract for long-term employment

false

t/f: Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.

false

t/f: Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online

false

t/f: MySpace is the most popular social network destination worldwide

false

t/f: Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.

false

t/f: Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online rating, and reviews, tweets and retweets, reposts, and recommendations

false

t/f: Reverse engineering can only be applied to computer hardware, not computer software

false

t/f: The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.

false

t/f: The impact of software defects is always trivial

false

t/f: There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT workers.

false

t/f: Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers

false

t/f: Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded

false

t/f: When developing a safety-critical systems, a key assumption must be that safety will automatically result from the following an organization's standard development methodology.

false

t/f: industrial espionage and competitive intelligence are essentially the same

false

What term is used to refer to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements?

gig economy

After a six year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following?

green card

The safety engineer uses a logging and monitoring system to track which of the following?

hazards

What classification is given to an individual who provides services to another individual or organization according to terms defines in a written contract or within a verbal agreement?

independent contractor

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?

integration testing

While using social networks as part of the hiring process, employers can:

look at the profiles of potential candidates

When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?

negligence

Firefox and OpenOffice are all examples of _____.

open source software

Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts?

organic media marketing

Process-control computers enable the process to be monitored for variants from operating standards and to eliminate product defects before the affect which of the following?

quality

Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds

qui tam provision

The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?

raise brand awareness

Cybersquatters:

register domain names for famous trademarks or company names to which they have no connection

A majority of social shopping platforms generate revenue through which of the following?

retailer advertising

Which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software?

software development methodology

Copyright and patent protection was established thru which of the following?

the U.S. Constitution

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is:

there is no need to file an application or disclose a trade secret to gain protection

Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded?

three

T/F: The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and implements two 1996 WIPO treaties.

true

t/f: A failure mode describes how a product or process could fail to perform the desired functions described by the customer.

true

t/f: A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.

true

t/f: A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case

true

t/f: Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S tech job openings per year

true

t/f: Companies can use the Statement on Standards for Attestation Engagements (SSAE) No. 16, to ensure that company data is protected in an outsourcing arrangement

true

t/f: Copyright law protects authored works such as art, books, and film

true

t/f: Cyberstalking can escalate into physical stalking and even physical assault

true

t/f: Defining and controlling the appropriate level of access to intellectual property are complex tasks

true

t/f: Foreign professionals can convert their H-1B visas into permanent green cards

true

t/f: If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press

true

t/f: Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn"

true

t/f: There is no federal product liability law

true

t/f: Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights.

true

t/f: User acceptance testing is performed by trained end users to ensure that the system operates as they expect.

true

Global market research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?

two-thirds


Conjuntos de estudio relacionados

3.07-3.08 Business Management Honors

View Set

Fill in the Blank Question- Ethics and Value Based Decision Making

View Set

Sociology Exam (Multiply Choice)

View Set

Exercise 6 Review Sheet Classification of Tissues

View Set

Art History & Criticism Online - Segment One

View Set

Module 6: Nursing Support of Oxygenation

View Set

NCLEX questions therapeutic communication

View Set

Laws and the Judicial System of the United States: Week 5

View Set

CE 7 Level Core Concepts Post Test

View Set

Managerial Economics (Chapter 2)

View Set

NUR 308 Final Practice Questions

View Set