Chapter 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The computer ethics issue of ________ is concerned about who owns the information that is stored about people. information property rights information privacy information redundancy information accessibility information accuracy

information property rights

Issues associated with computer ethics include all of the following except: information property rights information privacy information redundancy information accuracy information accessibility

information redundancy

The fact that the value of a company such as eBay increases as more people join and use eBay is characterized as the _________. network effect strategic effect social effect scarcity effect competitive advantage effect

network effect

Data privacy statements on an organization's Web site satisfy the ________ fair information practice principle. notice/awareness access/participation integrity/security enforcement/redress choice/consent

notice/awareness

"My Starbucks Idea," which provides customers a location to post suggestions, is a type of ____________ innovation. open simulation closed socializing focused

open

Having to deal with taxes, tariffs, and import and export regulations is a(n) ________ challenge associated with operating in the digital world. cultural infrastructure time zone difference regulatory demographic

regulatory

Using a Fitbit to log activities is potentially the beginning of ___________, which is the notion of logging all aspects of life. the life-o-meter a mashup e-business the quantified self total mobility

the quantified self

Which of the following IT megatrends is concerned with the generation, collection, and analysis of vast quantities of unstructured data? Cloud computing Access Database Big Data Mobile computing Social media

Big Data

Which of the following competency areas sets an IS professional apart from others and may help protect a person's job from the threat of outsourcing. Business competency Networking Problem solving Systems integration Development methodologies

Business competency

The job description for the _______ is "responsible for strategic planning and IS use throughout the firm." Chief Information Officer (CIO) Database administrator IS security manager IS manager Chief Digital Officer (CDO)

Chief Information Officer (CIO)

The category of information system that is used to process transactions and generate data is ________. executive information systems management information systems business intelligence systems decision support systems transaction processing systems

transaction processing systems

A list of potential donors who live in Seattle and enjoy sports would be considered ___________. data overload data information overload SQL information

information

Which of the following statements correctly describes the relationship between data and information? Information is raw facts with no meaning in and of themselves, whereas data is information that has been transformed to be useful. Data and information are completely unrelated concepts. Data and information are exactly the same thing. None of these statements correctly describes the relationship between data and information. Data are raw facts with no meaning in and of themselves, whereas information is data that has been transformed to be useful.

Data are raw facts with no meaning in and of themselves, whereas information is data that has been transformed to be useful.

Which of the following is NOT a recommended guideline by the Computer Ethics Institute for the ethical use of computers? Do not snoop in other people's files. Do not copy or use proprietary software without paying for it. Do not use other people's computer resources without authorization or compensation. Do not think about the social consequences of programs you write or systems you design. Do not use a computer to harm others.

Do not think about the social consequences of programs you write or systems you design.

Which U.S. Federal Trade Commission document is intended to encourage businesses to make their privacy policies readily available to consumers? Final Privacy Statements Fair Information Practice Principles Forecasts of Privacy Principles Free Information Policies Posted Protective Practices

Fair Information Practice Principles

Using sensors to improve supply chains to increase operational efficiency is part of the __________________. Supply Chain Internet of Things (SCIoT) Industrial Internet of Things (IIoT) Sensor Internet of Things (SIoT) Efficiency Internet of Things (EIoT) Operational Internet of Things (OIoT)

Industrial Internet of Things (IIoT)

________ is a body of governing procedures, such as guidelines or rules, which are used to organize or manipulate data to make it suitable for a given task. Experience Critical thinking Information Perspective Knowledge

Knowledge

The job description for a _________ is "responsible for analyzing business requirements and selecting information systems that meet those needs." Systems analyst Webmaster Software developer IS auditor Systems programmer

Systems analyst

Which of the following IT megatrends is concerned with the networked connection of a wide array of devices using the Internet? Mobile computing Cloud computing Social media Big Data The Internet of Things

The Internet of Things

Today, computing has changed from an activity primarily focused on _______ to one that encompasses many social and casual activities. estimating market growth playing games automating work posting status updates simulating products

automating work

The type of information system that includes methods and systems for analyzing data warehouses to better understand various aspects of a business is a(n) _______. intelligent system business intelligence system customer relationship management system office automation system management system

business intelligence system

When a company allows a customer to opt-in and/or opt-out with respect to the data it collects, it is implementing the _________ fair information practice principle. notice/awareness access/participation enforcement/redress integrity/security choice/consent

choice/consent

Information systems such as those created by Federal Express are created with the intent of gaining a(n) _______. foothold innovative edge competitive advantage disruptive wedge temporary edge

competitive advantage

According to your textbook, a degree in information systems serves as a precursor to becoming a ___________, which is a position experiencing the highest demand in business today. data scientist DOS programmer video rental manager historian COBEL administrator

data scientist

Information technology (IT) includes: telecommunications networks and software. hardware, software, and data. hardware, data, and telecommunications networks. hardware, software, and telecommunications networks. hardware, software, data, and telecommunications networks.

hardware, software, and telecommunications networks.


Kaugnay na mga set ng pag-aaral

Organizational behavior: Ch. 5, & 6 (only) Concepts

View Set

Skin integrity/Wound Care Practice Questions

View Set

Exam 2 Managerial Accounting: Chapter 5 & 6

View Set