Ethics Final- Ch 7-10
The PricewaterhouseCoopers LLP Health Research Institute estimated that a 500-bed hospital could receive______ in HITECH incentives to purchase, deploy, and maintain an EHR system. a. $6.1million b. $296,000 c. $3.2million d. $800 billion
a. $6.1million
In one lawsuit in the early_______ , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems. a. 1990s b. 1980s c. 1970s d. 1960s
a. 1990s
_______created its own social networking Web site, IdeaStorm, as a means for its millions of customers around the world to talk about new products, services, or improvements they would like. a. Dell b. Apple c. Hewlett Packard d. IBM
a. Dell
A(n) _______visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations. a. H-1B b. L-1 c. B-1 d. B-2
a. H-1B
______is the country in Europe with the highest Internet penetration. a. Monaco b. Spain c. Sweden d. Germany
a. Monaco
The country with the lowest Internet penetration in Asia is _____. a. Myanmar b. India c. China d. South Korea
a. Myanmar
______is the probability of an undesirable event occurring times the probability that the event would go undetected times the magnitude of the event's consequences if it does happen. a. Risk b. Redundancy c. Liability d. Certainty
a. Risk
______refers to methods within the development cycle that guarantee reliable operation of the product. a. Software quality assurance b. Software development methodology c. Software documentation d. Software project management
a. Software quality assurance
An advantage of social network advertising over traditional advertising media is that ______. a. ads can be targeted to reach people with the desired demographic characteristics b. it is cost-effective when compared to traditional advertising media c. advertisers can quickly change the advertising message when required d. ad viewers can easily identify useful contacts
a. ads can be targeted to reach people with the desired demographic characteristics
Recent survey results show that _____of teenagers have experienced cyberbullying in their lifetime. a. as many as 25 percent b. at least 20.8 percent c. more than 80 percent d. less than 15 percent
a. as many as 25 percent
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for______ . a. breach of warranty b. comparative negligence c. contributory negligence d. strict liability
a. breach of warranty
Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating federal or state ______laws. a. discrimination b. hiring c. protection d. recruiting
a. discrimination
One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process called ______. a. dynamic testing b. user acceptance testing c. integration testing d. static testing
a. dynamic testing
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in ______ for file servers. a. high-volume data storage b. low-volume data storage c. unpredictable-volume data storage d. irregular-volume data storage
a. high-volume data storage
It is difficult to quantify how much the use of IT has contributed to worker productivity because _____. a. many other factors influence worker productivity rates besides IT b. organizational efficiency tends to decrease despite increased investments in IT c. all IT investments produce intangible benefits that cannot be analyzed d. workers merely use the time provided by IT implementationto do some small tasks
a. many other factors influence worker productivity rates besides IT
Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect product _________. a. quality b. delivery c. testing d. development
a. quality
A majority of social shopping Web sites generate revenue through ______. a. retailer advertising b. sharing with retailers data about their members' like and dislikes c. membership fee d. Internet service providers
a. retailer advertising
Software quality is defined as the degree to which a software product meets: a. the needs of its users. b. the standards of its competitors. c. sustainability and environmental protection needs. d. the minimum financial return standards.
a. the needs of its users.
The ______federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity. a. 47 U.S.C. 223 b. 18 U.S.G. 2425 c. 18 U.S.C. 875(c) d. 18 U.S.G. 2261A
b. 18 U.S.G. 2425
______is a social networking site where entrepreneurs and small-business people collaborate to help each other to succeed. a. LinkedIn b. Biznik c. Facebook d. FastPitch
b. Biznik
_____involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. a. Integration testing b. Black-box testing c. User acceptance testing d. Static testing
b. Black-box testing
______requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites. a. Store-and-forward telemedicine b. Live telemedicine c. Electronic consultation d. Remote monitoring
b. Live telemedicine
N-version programming is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements _____times, where N could be 2, 3, 4, or more. a. N+1 b. N c. N+2 d. N+3
b. N
The ______is a low-cost computer that runs a Linux-based operating system and comes with a suite of 300 or so learning applications called Sugar. a. Raspberry Pi b. OLPC XO-4 c. Simputer d. Classmate+
b. OLPC XO-4
The_____ is a small, inexpensive computer with either 256 MB or 512 MB of RAM, a 700 MHz processor, one or two USB ports, and an Ethernet port—but no case and no monitor. a. OLPC XO b. Raspberry Pi c. Simputer d. Classmate PC
b. Raspberry Pi
_______typically involves the use of social networks to communicate and promote the benefits of products and services. a. Social network shopping b. Social network advertising c. Door-to-door selling d. Word-of-mouth marketing
b. Social network advertising
______is a work arrangement in which an employee works away from the office. a. Telehealth b. Telecommuting c. Outsourcing d. Flextime work
b. Telecommuting
_____ is common in airplane and spacecraft control systems. a. Structured programming b. Triple version programming c. Object programming d. Root programming
b. Triple version programming
The _______lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime. a. McClain v. Hewlett-Packard b. Vizcaino v. Microsoft c. Wainwright v. IBM d. Brown et al v. Oracle
b. Vizcaino v. Microsoft
Some industry observers identify the increasing use of _____as an important first step in bridging the digital divide in many countries. a. electronic health records b. cell phones c. personal digital assistants d. laptop computers
b. cell phones
A type of business system is the______ , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio. a. upgrade management system b. decision support system c. executive information system d. data information system
b. decision support system
Most social networking Web sites have terms of use agreement that states the Web site has the right to _____. a. post messages about its users b. delete material that violates the site's policies c. edit material submitted by its users d. charge users to view adult material
b. delete material that violates the site's policies
The ______is a term used to describe the gulf between those who do and those who don't have access to modern information and communications technology. a. communication rift b. digital divide c. achievement gap d. glass ceiling
b. digital divide
Remote monitoring is also known as _____. a. real-time telehealth b. home monitoring c. telenursing d. live telemedicine
b. home monitoring
While using social networks as part of the hiring process, employers can_____ . a. screen applicants based on race or ethnicity b. look at the profiles of potential candidates c. legally violate federal laws d. post messages on behalf of a candidate
b. look at the profiles of potential candidates
As of April 2013, ______states have enacted laws to curb cyberbullying by calling on schools districts to develop policies regarding cyberbullying and punishment. a. nearly all b. only sixteen c. about half d. no
b. only sixteen
The _______in Egypt reduced the attractiveness of that country as a source of IT outsourcing. a. spike in oil prices b. political unrest c. limited number of resources d. lack of education
b. political unrest
A _____is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software. a. software guide b. software development methodology c. software manual d. software project management
b. software development methodology
Hotmail created what is recognized by many as the most successful ______campaigns ever when it first launched its service in 1996. a. social hiring b. viral marketing c. social shopping d. direct advertising
b. viral marketing
In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as _____. a. $5000 b. $7000 c. $2500 d. $9500
c. $2500
Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020? a. Business is facing a long-term excess of trained and experienced IT workers. b. Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions. c. 750,000 new jobs are expected to be added to IT related positions. d. IT firms are more likely to turn to traditional sources than nontraditional sources to find IT workers.
c. 750,000 new jobs are expected to be added to IT related positions.
MySpace purged _______sex offenders from its site over a period of two years. a. 25,000 b. 65,000 c. 90,000 d. 113,500
c. 90,000
U.S. Representative _______was forced to resign in 2011 after admitting he sent sexually explicit photos of himself to several women using social networks including Facebook and Twitter. a. John Boener b. Barney Frank c. AnthonyWeiner d. Ron Paul
c. AnthonyWeiner
________are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output. a. Management information systems b. Decision support systems c. Business information systems d. Data information systems
c. Business information systems
The ______is a low-cost laptop introduced by Intel and Lenovo designed for use in kindergarten through high school classrooms in developing countries. a. Raspberry Pi b. OLPC XO c. Classmate+ d. Simputer
c. Classmate+
________ involves placing banner ads on a social networking Web site. a. Advertising through groups b. Social shopping c. Direct advertising d. Viral marketing
c. Direct advertising
The _______requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging. a. Electronic Industry Citizenship Coalition Directive b. Greenpeace Environmental Restriction of Hazardous Substances c. European Union's Restriction of Hazardous Substances Directive d. Electronic Product and Environmental Hazards Restriction Directive
c. European Union's Restriction of Hazardous Substances Directive
______is an important technique used to develop ISO 9001-compliant quality systems. a. DO-178B/EUROCCAE ED-128 b. N-version programming c. Failure mode and effects analysis (FMEA) d. Capability Maturity Model Integration (CMMI)
c. Failure mode and effects analysis (FMEA)
In 2006, ______introduced a low-cost laptop called the Classmate PC. a. IBM b. Apple c. Intel d. Microsoft
c. Intel
______enable patients to use the Internet to compare the quality, safety, and cost information on hospitals nationwide. a. Electronic health records b. Inpatient codes c. Medical information Web sites d. Remote monitoring telemedicine systems
c. Medical information Web sites
Which of the following is true about online virtual worlds? a. Virtual world activities cannot violate real world law. b. The use of real world cash is prohibited in the online virtual world. c. Offensive behavior online can be mediated by administrators. d. Online avatars can perform criminal acts in public places.
c. Offensive behavior online can be mediated by administrators.
_______helps physicians keep tabs on patients prone to life-threatening health crises. a. Inpatient codes b. Medical information Web sites c. Remote monitoring d. SMS texts
c. Remote monitoring
The full name of the E-Rate program is ______. a. National School Lunch Program b. Health Information Technology Program c. Schools and Libraries Program of the Universal Service Fund d. One Laptop per Child Program
c. Schools and Libraries Program of the Universal Service Fund
Which of the following is true of software testing? a. White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. b. Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in whitebox testing, are known. c. Static testing involves software programs called static analyzers which are run against new code. d. Integration testing involves independent testing that is performed by trained end users to ensure that the system operates as they expect.
c. Static testing involves software programs called static analyzers which are run against new code.
______involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation. a. Live telemedicine b. Remote monitoring c. Store-and-forward telemedicine d. Inpatient consultation
c. Store-and-forward telemedicine
______means that the defendant is held responsible for injuring another person, regardless of negligence or intent. a. Contributory negligence b. Misrepresentation c. Strict liability d. Breach of warranty
c. Strict liability
The EICC has developed a(n) _______for member organizations in which areas of improvement are assessed by certified, third-party firms. a. application b. governing body c. audit program d. mandate
c. audit program
A(n)_____ is a representation of a virtual world visitor. a. icon b. robot c. avatar d. mythical character
c. avatar
A social networkingWeb site ______. a. is limited within the barriers of time b. prohibits interactions between unknown people c. can be used for nonbusiness purposes d. can generate revenue only through member fee
c. can be used for nonbusiness purposes
It can take _____for IT investment to result in a significant increase in productivity. a. less than three years b. more than 10 years c. five to seven years d. only a few months
c. five to seven years
The safety engineer uses a logging and monitoring system to track _____ from a project's start to its finish. a. standards b. objectives c. hazards d. deliverables
c. hazards
After successful unit testing, the subsystems are combined to test the entire system as a complete entity using _____. a. system testing b. black-box testing c. integration testing d. static testing
c. integration testing
Unless organizations _______ social networks, their customers are left to resolve their issues and questions on their own, often in ways that are not ideal. a. take down their b. use c. monitor d. build
c. monitor
When school authorities do get involved in an effort to discipline students for cyberbullying, they are sometimes sued for violating the student's right to free speech, especially if the activity _________. a. involved minority students b. involved students under the age of 13 c. occurred off school premises d. occurred in the presence of a teacher
c. occurred off school premises
One common use of wireless technology in the healthcare field is to______ . a. provide the public access to a patient's medical history b. provide access to Medicare and Medicaid reimbursements c. provide a means to access and update EHRs d. increase chances of duplicate care
c. provide a means to access and update EHRs
After a worker's H1B visa expires, the foreigner must _______. a. return to school to get an advanced degree before applying for another H-1B visa b. apply to become a U.S. citizen c. remain outside the United States for one year before another H-1B petition will be approved d. never again apply for an H-1B visa
c. remain outside the United States for one year before another H-1B petition will be approved
The Health Information Technology for Economic and Clinical Health Act is intended to increase the use of health information technology by ______. a. requiring the government to develop individual standards for records in each medical organization b. providing incentives to encourage doctors and hospitals to pull together the paper trail of a person's medical history and immunization records c. saving the government $10 billion through improvements in the quality of care, care coordination,reductions in medical errors, and duplicate care d. allowing everyone free access to a patient's medical history and identifiable health information
c. saving the government $10 billion through improvements in the quality of care, care coordination,reductions in medical errors, and duplicate care
Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____. a. relocation expenses b. start-up costs c. training costs d. travel expenses
c. training costs
Software suppliers frequently write ______to attempt to limit their liability in the event of nonperformance. a. manuals b. warnings c. warranties d. sureties
c. warranties
About _______of material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting. a. 120 hours b. 24 hours c. 48 hours d. 100 hours
d. 100 hours
In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is_____ . a. 5.8 b. 25.7 c. 38.9 d. 22.1
d. 22.1
After an organization decides to adopt _____ , it must conduct an assessment of its software development practices to determine where they fit in the capability model. a. QA b. software development methodology c. software quality management d. CMMI-DEV
d. CMMI-DEV
______built a virtual world model of its Salt Lake refinery for training new operators. a. British Petroleum b. Exxon Mobil c. Shell d. Chevron
d. Chevron
________is threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications. a. Libel b. Slander c. Cyberbullying d. Cyberstalking
d. Cyberstalking
The ______regards it as a federal crime to enter a social networking site in violation of the terms of service. a. New Media Consortium b. National Center for Victims of Crime c. Emarketer d. Department of Justice
d. Department of Justice
______can be oral, written, or inferred from the seller's conduct. a. Indemnity b. Strict liabilities c. Warranty tolling d. Express warranties
d. Express warranties
_______is the most popular social network destination worldwide. a. Twitter b. LinkedIn c. MySpace d. Facebook
d. Facebook
Which of the following factors has increased the prevalence of telework? a. Reduced levels of traffic congestion b. Lack of broadband connections in homes and retail locations c. Reduced need for employees to take time off d. Highly trained workers demanding flexible work arrangements
d. Highly trained workers demanding flexible work arrangements
The _____standard serves many industries and organizations as a guide to quality products, services, and management. a. ISO 7498-4 b. ISO 9595/DAM 1 c. ISO 9596 d. ISO 9001
d. ISO 9001
According to A.T. Kearney, the most attractive offshoring destination is ______. a. China b. Egypt c. Mexico d. India
d. India
Which of the following is true of the International Organization for Standardization? a. It is an American organization founded in 2001. b. The ISO 9000:2007 provides a set of standardized requirements for a quality management system. c. It issued the 9000 series of business standards in 1987. d. It is a worldwide federation of national standards bodies from 161 countries.
d. It is a worldwide federation of national standards bodies from 161 countries.
The ______program in Nepal started in 2008 as a small pilot project in two schools. a. HITECH b. E-Rate c. telework d. OLPC
d. OLPC
________is a social shopping Web site that implemented a reward system for members in which they are paid a commission each time another shopper acts on their recommendations to purchase a specific item. a. Buzzillions b. ZEBO c. Kaboodle d. Stuffpit
d. Stuffpit
Which of the following is true of strategies for engineering quality software? a. High-quality software systems are tough to learn and use because they perform slowly. b. Software defects never lead to injury. c. Developers develop high-quality software instantaneously without a set of principles. d. The first release of any software rarely meets all its users' expectations.
d. The first release of any software rarely meets all its users' expectations.
Which of these statements about contingent workers is true? a. They typically work as a separate, independent group of workers and move from project to project working for the same firm. b. They are often paid a lower hourly wage than full-time employees doing equivalent work. c. They are eligible for most company benefits such as vacation, sick pay, and medical insurance. d. They have neither an explicit nor an implicit contract for continuing employment.
d. They have neither an explicit nor an implicit contract for continuing employment.
An electronic health record includes______ . a. a patient's Medicare reimbursements b. inpatient codes c. audit trails of patient health information d. a patient's immunization records
d. a patient's immunization records
An advantage of teleworking is that _____. a. it ensures the security of organizational data b. it is easier to monitor the quantity and quality of the work performed by teleworkers c. planning required by managers is significantly reduced d. business operations can be continued even in the event of disaster
d. business operations can be continued even in the event of disaster
Compared to personal computers, cell phones______ . a. are more expensive b. are less portable c. require a steeper learning curve to master their use d. come with an extended battery life
d. come with an extended battery life
One of the fundamental ways in which companies can try directly to increase productivity is by ______. a. increasing the amount of input required to produce a given output b. selling smaller quantities of goods to decrease capacity c. decreasing the value of the output produced by a given amount of input d. consolidating operations to better leverage economies of scale
d. consolidating operations to better leverage economies of scale
Products, such as statements of requirements, flowcharts, and user documentation, are known as_______ . a. project systems b. information systems c. objects d. deliverables
d. deliverables
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the _______maturity level. a. quantitatively managed b. managed c. defined d. initial
d. initial
Oil companies are increasingly relying on______ to connect a nurse or EMT on an oil platform to emergency physicians at a major medical center. a. electronic consultation b. remote monitoring c. store-and-forward telemedicine d. live telemedicine
d. live telemedicine
The contents of ______are for informational purposes only and not intended to be substitutes for professional medical advice, diagnosis, or treatment. a. store-and-forward telemedicine b. electronic health records c. live telemedicine d. medical information Web sites
d. medical information Web sites
When sued for______ , a software supplier is not held responsible for every product defect that causes customer or third-party loss. a. breach of warranty b. misrepresentation c. strict liability d. negligence
d. negligence
The popularity of social networking is increasing most rapidly_______ . a. in age group 13-18 b. in age group 19-32 c. in age group 33-49 d. over all ages
d. over all ages
The Bureau of Labor Statistics tracks U.S. productivity on a(n)_____ basis. a. monthly b. annual c. semiannual d. quarterly
d. quarterly
The National Center for Victims of Crime advises victims to_______ . a. destroy all evidence of any contact with the cyberstalker b. meet in a public place with the cyberstalker to talk things out before involving any law enforcement officers c. not consider getting law enforcement officers involved until the stalker threatens violence d. send the stalker a written notice that their contact is unwanted and that further contact should cease
d. send the stalker a written notice that their contact is unwanted and that further contact should cease
The medical information Web sites are intended to be ______. a. substitutes for paper documentation of a patient's medical history b. sources of professional medical advice for illnesses c. substitutes for professional diagnosis and treatments d. sources of reliable and objective information on medical-related topics
d. sources of reliable and objective information on medical-related topics
The primary reason someone "friends" a brand on Facebook is to ______. a. make additional friends b. gain publicity c. earn direct payments from the brand marketers d. to access exclusive deals or offers
d. to access exclusive deals or offers
Organizations direct advertisements toward those members of a social network who would likely find a product most appealing by ______. a. sharing their likes and dislikes with competitors b. acquiring the social network c. creating their own social networking Web site d. using the information in their user profiles
d. using the information in their user profiles