Chapter 4-5-6
5 moral dimensions of the information age
1. Information rights and obligations 2. Property rights and obligations 3. Accountability and control 4. System quality 5. Quality of life
Instead of buying and installing software programs, subscribing companies rent the same functions from these services, with users paying on either a subscription or per-transaction basis. The scenario describes which kind of external software source?
A cloud-based software service
can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.
A competitive forces model
Which of the following best describes the competitive forces model?
A competitive forces model can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.
Which of the following best describes a multicore processor?
A multicore processor is a microprocessor to which two or more processing cores have been attached for enhanced performance.
is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement
A safe harbor
Which of the following occupational health risk consists of pressure on the median nerve through the wrist's bony structure and produces pain?
Carpel tunnel syndrome
When firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers, it is called
Cloud Computing
is the commission of illegal acts through the use of a computer or against a computer system.
Computer Crime
is the commission of acts involving a computer that may not be illegal but that are considered unethical.
Computer abuse
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a __________.
Copyright
IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. IBM DB2, Oracle, SQL Server, Sybase, MySQL, EMC, Apache, and Hadoop are all examples of which component?
Data management and storage
Chapter 5
Dsm
Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?
Ethics
consists of a set of physical devices and software applications that are required to operate the entire enterprise.
IT infrastructure
Which of the following statements best describes the Immanuel Kant's Categorical Imperative?
If everyone did this, could the organization, or society, survive?
Which of the following has been a major threat to the Wintel dominance as a computer platform in recent years?
Increasing iPhone and Android device sales
Which statement describes how trade secret laws are limited in their ability to protect intellectual property?
It is difficult to prevent ideas from falling into the public domain.
Which of the following stages of IT infrastructure evolution was a period of highly centralized computing under the control of professional programmers and system operators?
Mainframe era
Which of the following statements best describes nanotechnology?
Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.
__________ is a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists.
Nonobvious relationship awareness(NORA)
Which of the following best describes open source software?
Open source software is free software that is produced by a community of several hundred thousand programmers around the world.
IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. Microsoft Windows, Unix, Linux, Mac OS X, Chrome, Android, and iOS are all examples of which component?
Operating Systems Platform
__________ is the claim of individuals to be left along, free from surveillance.
Privacy
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called __________.
Profiling
Which of the following types of cloud computing is owned and maintained by a cloud service provider and made available to the general public or an industry group?
Public Cloud
Which of the following best describes the Risk Aversion Principle?
Take the action that produces the least harm or the least potential cost.
Which of the following statements best describes the Golden Rule?
The Golden Rule is also known as "Do unto others as you would have them do unto you," this concept can help you think about fairness in decision making.
Which of the following best describes the Law of Mass Digital Storage?
The Law of Mass Digital Storage deals with the exponential decrease in the cost of storing data, stating that the number of kilobytes of data that can be stored on magnetic media for $1 roughly doubles every 15 months.
assumes you can prioritize values in rank order and understand the consequences of various courses of action.
The Utilitarian Principle
can be used to analyze direct and indirect costs to help firms determine the actual cost of specific technology implementations.
The total cost of ownership (TCO) model
Which of the following statements about the social costs of information technology is true?
The traditional boundaries that separate work from family and just plain leisure have been weakened.
organizes computing resources so that their use is not restricted by physical configuration or geographic location.
Virtualization
are tiny software programs that keep a record of users' online clickstream.
Web Beacons
Which of the following refers to loosely coupled software components based on open Web standards that work with any application software and operating system?
Web Services
Java is __________.
an operating system- and hardware-independent programming language that is the leading interactive programming environment for the Web
Information systems affect ethical principles because they ________
raise concerns about the use of intellectual property
When dealing with platform and infrastructure change, __________ refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
scalability
Immanuel Kant's Categorical Imperative states
that if the action is not right for everyone to take, it is not right for anyone
The principle that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise refers to __________.
the ethical "no free lunch" rule