MIS Exam 2
A characteristic or quality that describes a particular database entity is called a(n): A) field. B) tuple. C) key field. D) attribute. E) relationship.
Attribute
Which of the following enables you to create a script that allows a web server to communicate with a back-end database? A) CGI B) HTML C) Java D) SQL E) NoSQL
CGI
Which of the following is not an example of the mobile digital platform? A) Tablets B) Kindle C) Cell phones D) CRM E) Apps
CRM
Which of the following is a specialized language that programmers use to add and change data in the database? A) Data access language B) Data manipulation language C) Structured query language D) Data definition language E) DBMS
Data manipulation language
Digital media differs from a physical book in all of the following ways except: A) ease of replication. B) ease of alteration. C) ease of transmission. D) ease of global distribution. E) ease of establishing uniqueness
Ease of establishing uniqueness
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? A) On-demand B) Grid C) Edge D) Autonomic E) Quantum
On-demand
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A) 5, 2, 3, 4, 1 B) 5, 4, 2, 3, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 1, 3 E) 4, 5, 3, 2, 1
5, 4, 2, 3, 1
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with: A) one short mark. B) two short marks. C) three short marks. D) a crow's foot. E) a crow's foot topped by a short mark.
A crow's foot topped by a short mark
Running a Java program on a computer requires: A) a Java Virtual Machine to be installed on that computer. B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) a miniature program to be downloaded to the user's computer. D) no specialized software, as Java is platform-independent. E) the Mozilla Firefox browser and no other browsers.
A java virtual machine to be installed on that computer
ZipRealty, which combines Google Maps with real estate data, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup. E) a web service.
A mashup
Today's nanotechnology-produced computer transistors are roughly equivalent in size to: A) the width of a fingernail. B) a human hair. C) a virus. D) an atom. E) a grain of sand
A virus
Which of the following enables a DBMS to reduce data redundancy and inconsistency? A) Ability to enforce referential integrity B) Ability to couple program and data C) Use of a data dictionary D) Ability to create two-dimensional tables E) Ability to minimize isolated files with repeated data
Ability to minimize isolated files with repeated data
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability
Accountability
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: A) service. B) client. C) browser. D) app. E) beacon.
Browser
Which of the following is a leading networking hardware provider? A) Dell B) Intel C) Seagate D) IBM E) Cisco
Cisco
In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
Classifications
You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast
Classify data
All of the following are technologies used to analyze and manage big data except: A) cloud computing. B) noSQL. C) in-memory computing. D) analytic platforms. E) Hadoop.
Cloud computing
The join operation: A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements into segments. E) creates a subset consisting of rows in a table.
Combines relational tables to provide the user with more information than is otherwise available
The select operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria. E) creates a subset consisting of rows in a table.
Creates a subset consisting of all records in the file that meet stated criteria
The project operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected. E) creates a subset consisting of rows in a table.
Creates a subset consisting of columns in a table
Microsoft SQL Server is a(n): A) DBMS for both desktops and mobile devices. B) Internet DBMS. C) desktop relational DBMS. D) DBMS for midrange computers. E) DBMS for mobile devices.
DBMS for midrange computers
In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management
Data administration
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) Data normalization B) Data accuracy C) Data redundancy D) Data inconsistency E) Data duplication
Data consistency
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Data dictionary B) Data definition diagram C) Entity-relationship diagram D) Relationship dictionary E) Data table
Data dictionary
Which of the following occurs when the same attribute in related data files has different values? A) Data redundancy B) Data duplication C) Data dependence D) Data discrepancy E) Data inconsistency
Data inconsistency
________ creates confusion that hampers the creation of information systems that integrate data from different sources. A) Batch processing B) Data redundancy C) Data independence D) Online processing E) Data quality
Data redundancy
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization. E) data normalization.
Data scrubbing
In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management
Database administration
The term big data refers to all of the following except: A) datasets with fewer than a billion records. B) datasets with unstructured data. C) machine-generated data (i.e. from sensors). D) data created by social media (i.e. tweets, Facebook Likes). E) data from Web traffic.
Datasets with fewer than a billion records
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act
Digital Millennium Copyright act
DBMSs typically include report generating tools in order to: A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis. E) analyze the database's performance.
Display data in an easier-to-read format
The Online Privacy Alliance: A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with websites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. E) is a safe harbor program established by the U.S. government.
Encourages self-regulation to develop a set of privacy guidelines for its members
Data cleansing not only corrects errors but also: A) establishes logical relationships between data. B) structures data. C) normalizes data. D) removes duplicate data. E) enforces consistency among different sets of data.
Enforces consistency among different sets of data
The development of TCP/IP occurred during the ________ era. A) cloud and mobile computing B) general-purpose mainframe and minicomputer C) client/server era D) personal computer E) enterprise computing
Enterprise computing
A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.
Entity-relationship diagram
Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A) TCP/IP B) COBOL C) Ethernet D) ASCII E) Linux
Ethernet
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) Address B) City C) Airport code D) State E) Day
Airport code
The introduction of the minicomputer: A) allowed computers to be customized to the specific needs of departments or business units. B) strengthened centralized computing. C) offered new, powerful machines at higher prices than mainframes. D) represented the rise of Microsoft. E) was dominated by IBM
Allowed computers to be customized to the specific needs
Which of the following is not an example of the consumerization of IT? A) Google Apps B) Dropbox C) Facebook D) Gmail E) Amazon Web Services
Amazon web services
Linux is: A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open-source software. D) especially useful for processing numeric data. E) poorly suited to power fast computers.
An example of open-source software
Data mining allows users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data warehouse.
Find hidden relationships in data
TRUSTe is an example of which of the following? A) Web beacon B) Behavioral targeting program C) Opt-out program D) Spyware E) Online seal program
Online seal program
Which type of software is created and updated by a worldwide community of programmers and available for free? A) Software packages B) Mashups C) Outsourced D) Open source E) Closed source
Open source
Software that manages the resources of the computer is called: A) operating system software. B) application software. C) data management software. D) network software. E) web services software.
Operating system software
The practice of contracting custom software development to an outside firm is commonly referred to as: A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.
Outsourcing
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. A) Copyright law B) Trademark law C) Patent law D) Trade secret protection E) Privacy law
Patent law
A DBMS makes the: A) physical database available for different logical views. B) relational database available for different logical views. C) physical database available for different analytic views. D) relational database available for different analytic views. E) logical database available for different analytic views
Physical database available for different logical views
The logical view of a database: A) displays the organization and structure of data on the physical storage media. B) includes a digital dashboard. C) allows the creation of supplementary reports. D) enables users to manipulate the logical structure of the database. E) presents data as they would be perceived by end users.
Presents data as they would be perceived by end users
A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity
Primary key
Which of the following is a grouping of characters into a word, a group of words, or a complete number? A) File B) Table C) Entity D) Field E) Tuple
Field
MongoDB and SimpleDB are both examples of: A) open source databases. B) SQL databases. C) NoSQL databases. D) cloud databases. E) big data databases.
NoSQL databases
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.
Normalization
Which of the following tools enables users to view the same data in different ways using multiple dimensions? A) Predictive analysis B) SQL C) OLAP D) Data mining E) Hadoop
OLAP
In the context of data relationships, the term associations refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. E) relationships between different customers.
Occurrences linked to a single event
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware
Profiling
In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.
Row
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): A) SOA. B) SLA. C) TCO. D) RFQ. E) SaaS.
SLA
Which of the following refers to a set of self-contained services that communicate with each other to create a working software application? A) Web services B) EAI software C) SOA D) SOAP E) Prepackaged software
SOA
Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL
SQL
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) FIP E) safe harbor
Safe harbor
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modality B) Scalability C) Expandability D) Disintermediation E) Customizability
Scalability
Which of the following is an example of a legacy system? A) Transaction processing system running on a mainframe B) Scalable grid computing system C) Web services running on a cloud computing platform D) MDM software E) Quantum computing system
Scalable grid computing system
In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select
Select, project and join
A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data? A) Text mining tools B) Sentiment analysis software C) Web mining technologies D) Data mining software E) Data governance software
Sentiment analysis software
In data mining, which of the following involves events linked over time? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
Sequences
Which of the following is not one of the techniques used in web mining? A) Content mining B) Structure mining C) Server mining D) Usage mining E) Data mining
Server mining
Which of the following is not an example of a wearable computing device? A) Smartwatch B) Smart glasses C) Smartphones D) Activity trackers E) Smart ID badges
Smartphones
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as: A) software packages. B) mashups. C) outsourced software. D) open-source software. E) service level agreements.
Software packages
Which of the following is not a method for performing a data quality audit? A) Surveying entire data files B) Surveying samples from data files C) Surveying data definition and query files D) Surveying end users about their perceptions of data quality E) Surveying managers about their perceptions of data quality
Surveying data definition and query files
________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A) OLAP B) Text mining C) In-memory D) Clustering E) Classification
Text mining
Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT B) The entity CUSTOMER with the attribute PURCHASE C) The entity PRODUCT with the attribute PURCHASE D) The entity PRODUCT with the attribute CUSTOMER E) The entity PURCHASE with the attribute CUSTOMER
The entity CUSTOMER with the attribute PURCHASE
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule
The golden rule
In a relational database, a record is referred to in technical terms as a(n): A) tuple. B) table. C) entity. D) field. E) key.
Tuple
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n): A) service-oriented architecture. B) on-demand architecture. C) multi-tiered client/server architecture. D) two-tiered client/server architecture. E) divided architecture.
Two-tiered client/server architecture
All of the following are current hardware platform trends except: A) green computing. B) virtualization. C) cloud computing. D) Unix. E) quantum computing.
Unix
OLAP enables: A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate summary reports.
Users to obtain online answers to ad-hoc questions in a rapid amount of time
________ are created by combining and customizing components from different online software applications. A) Apps B) Web browsers C) SaaS D) Web services E) Web mashups
Web mashups
Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as: A) web services. B) EAI software. C) SOA. D) SOAP. E) SaaS.
Web services
Which of the following would you use to find patterns in user interaction data recorded by a web server? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining
Web usage mining
Hardware and software acquisition costs account for about ________ percent of TCO. A) 20 B) 40 C) 50 D) 75 E) 90
20
Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases? A) Database server software B) Application server software C) Web browser software D) Data mining software E) Web server software
Application server software
In data mining, which of the following involves using a series of existing values to determine what other future values will be? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
Forecasting
Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A) OLAP B) Data warehouse C) Data mart D) Hadoop E) DBMS
Hadoop
A data warehouse is composed of: A) historical data from legacy systems. B) current data. C) internal and external data sources. D) historic and current internal data. E) historic external data.
Historic and current internal data
How would you determine the market demand for your firm's IT services? A) Perform a TCO analysis B) Benchmark your services C) Hold focus groups to assess your services D) Analyze sales returns on key investments E) Perform a stress test
Hold focus groups to assess your services
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast
Identify sequences
A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot topped by a short mark. E) with a crow's foot topped by two short marks.
In two short marks
All of the following are issues with the traditional file environment except: A) data inconsistency. B) inability to develop specialized applications for functional areas. C) lack of flexibility in creating ad-hoc reports. D) poor security. E) data sharing.
Inability to develop specialized applications for functional areas
An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy. B) data definition file. C) data quality audit. D) data governance policy. E) data policy.
Information policy
Which of the following statements about Linux is not true? A) It plays a major role in the back office running local area networks. B) It is available in free versions downloadable from the Internet. C) It has garnered 20 percent of the server operating system market. D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices. E) Linux works on all the major hardware platforms.
It has garnered 20 percent of the server operating system market
A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.
Key field
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A) Program-data dependence B) Lack of flexibility C) Poor security D) Lack of data sharing E) Data redundancy
Lack of flexibility
A ________ is an example of pre-digital data storage that is comparable to a database. A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet E) schedule of due dates on a project outline
Library card catalog
Which of the following is a DBMS for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange
Microsoft access
Which of the following is not one of the current software platform trends? A) Web services and service-oriented architecture B) Open-source software C) HTML5 D) Software outsourcing E) Multicore processors
Multicore processors
Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy
Redundancy
A(n) ________ represent data as two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS
Relational DBMS
Microsoft Access's data dictionary displays all of the following information about a field except the: A) size of the field. B) format of the field. C) description of the field. D) type of the field. E) the organization within the organization that is responsible for maintaining the data.
The organization within the organization that is responsible for maintaining the data
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A) Supply and demand B) Return on investment C) Breakeven point D) Cost-benefit analysis E) Total cost of ownership
Total cost of ownership
Which of the following is the foundation technology for web services? A) XML B) HTML C) SOAP D) UDDI E) SCSI
XML
________ provides a standard format for data exchange, enabling web services to pass data from one process to another. A) HTML B) HTML5 C) Java D) Chrome OS E) XML
XML
Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? A) Your firm's business strategy B) The IT investments made by competitor firms C) Market demand for your firm's services D) Your firm's organizational culture E) Information technology assessment
Your firm's organizational culture
At what percent of capacity do most servers operate? A) 100% B) 80-90% C) approximately 70 percent D) 40-50% E) 15-20%
15-20%
Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? A) A failure of Amazon's cloud computing service B) A failure of Netflix's recommendation engine software C) A blackout at Netflix's primary data center D) A hacking attack E) A bug in Netflix's credit card processing system
A failure of Amazon's cloud computing service
Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future. B) Use of a device installed in a car to analyze driving habits. C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. D) Use of computerized systems to filter and hire job applicants. E) Analyzing data from sensors installed in local parks to monitor soil moisture
Analyzing data from sensors installed in local parks to monitor soil moisture
Which of the following were involved in what has been called the patent trial of the century? A) Apple and Microsoft B) Apple and Hewlett-Packard C) Microsoft and Symantec D) Microsoft and Facebook E) Apple and Samsung
Apple and Samsung
A(n)________ is used to communicate between a user and an organization's back-end systems. A) public server B) private server C) legacy server D) application server E) blade server
Application server
All of the following are steps in the process for analyzing an ethical issue except: A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options
Assigning responsibility
Firms that allow employees to use their own devices are embracing which of the following? A) Wearable computing B) Mobile consolidation C) Cloud computing D) BYOD E) Self computing
BYOD
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles
Behavioral targeting
________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. A) Mainframes B) Rack servers C) Cloud servers D) Hybrid servers E) Blade servers
Blade servers
All of the following laws apply to actions by the federal government except the: A) Freedom of Information Act. B) Privacy Act. C) Computer Security Act. D) Children's Online Privacy Protection Act. E) E-Government Act.
Children's online privacy protection act
Which of the following is not a U.S. federal law affecting private institutions? A) COPPA B) HIPAA C) Gramm-Leach-Bliley Act D) Video Privacy Protection Act E) Computer Matching and Privacy Protection Act
Computer matching and privacy protection act
Interpretations of Moore's law assert that: A) computing power will eventually level off. B) transistors decrease in size 50% every two years. C) data storage costs decrease by 50% every 18 months. D) PCs decrease in market share by 9% every 5 years. E) computing power doubles every 18 months
Computing power doubles every 18 months
Which of the following protects the authors of a book from having their work copied by others? A) Patent protection B) Due process C) Copyright law D) Fair Use Doctrine E) Trade Secret law
Copyright law
Which of the following is the most common reason that business systems fail? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality
Data quality
All of the following are technical solutions to protecting user privacy except: A) e-mail encryption. B) anonymous surfing. C) anonymous email. D) preventing client computers from accepting cookies. E) data use policies.
Data use policies
Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A) CVS B) Technostress C) Digital divide D) RSI E) CTS
Digital divide
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system
Due process
CVS refers to: A) eyestrain related to computer display screen use. B) a business practice that attempts to evaluate the intangible values of computer systems. C) carpal vision syndrome. D) a type of antivirus protection software. E) wrist injuries brought about by incorrect hand position when using a keyboard.
Eyestrain related to computer display screen use
In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A) firms should build products and services that protect privacy. B) firms should increase the transparency of their data collection. C) firms should require consumer consent and provide clear options to opt out of data collection. D) firms should limit the length of time that any personal data is stored to six months or less. E) consumers should be able to review and contest the accuracy and completeness of data.
Firms should limit the length of time that any personal data is stored to six months or less
Which of the following statements about Flash cookies is not true? A) Flash cookies are installed only at the user's request. B) Flash cookies are stored on the user's computer. C) Flash cookies cannot be easily detected or deleted. D) Flash cookies are sometimes called super cookies. E) Flash cookies can be installed whenever a person clicks a Flash video.
Flash cookies are installed only at the user's request
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A) Capacity planning B) Cloud computing C) Green computing D) Utility computing E) On-demand computing
Green computing
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act E) COPPA
HIPAA
The marketplace for computer hardware: A) has become increasingly concentrated in top firms. B) has expanded to include a wide variety of start-up and mobile-computing firms. C) has moved significantly to Asian firms. D) has been decimated by mobile and cloud computing. E) has begun moving away from blade servers.
Has become increasingly concentrated in top firms
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A) His action is acceptable because the grocer suffers the least harm. B) His action is acceptable, because the higher social value is the survival of the family. C) His action is wrong, because the man would not want the grocer to steal from him. D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E) His action is wrong, because the grocery store owner is harmed.
His action is acceptable, because the higher social value is the survival of the family
SaaS refers to: A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) self-contained services that communicate with each other to create a working software application. D) easy-to-use software tools for displaying Web pages. E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis
Hosting and managing access to software applications delivered over the internet to clients on a subscription basis
Which of the following best describes Immanuel Kant's categorical imperative? A) If an action cannot be taken repeatedly, then it is not right to be taken at any time. B) One should take the action that produces the least harm or incurs the least cost. C) One can put values in rank order and understand the consequences of various courses of action. D) If an action is not right for everyone to take, it is not right for anyone to take. E) You should act towards others as you would like them to act towards you.
If an action is not right for everyone to take, it is not right for anyone to take
The ethical "no free lunch" rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.
If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
Which of the following is not one of the current key technology trends that raises ethical issues? A) Data storage improvements B) Data analysis advancements C) Increase in data quality D) Increase in use of mobile devices E) Advances in networking technology
Increase in data quality
Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.
Increases in efficiency may be accompanied by job losses
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? A) Property rights and obligations B) System quality C) Accountability and control D) Quality of life E) Information rights and obligations
Information rights and obligations
Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed
It blurs the traditional boundaries between work and family time
Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.
It has a ripple effect, raising new ethical, social and political issues
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule E) The slippery-slope rule
Kant's categorical imperative
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A) Slippery-slope rule B) Lemming rule C) High-failure cost rule D) Utilitarian principle E) Golden Rule
Slippery-slope rule
Which of the following is the most popular mobile operating system? A) Linux B) Android C) Chrome OS D) iOS E) Unix
Linux
Which of the following is not protected by copyright law? A) Musical compositions B) Motion pictures C) Maps D) Artwork E) Machines
Machines
________ states that the value or power of a network grows exponentially as a function of the number of network members. A) Metcalfe's Law B) Moore's Law C) Law of scalability D) Law of outsourcing E) Law of networks
Metcalfe's law
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A) multicore processor B) legacy processor C) scalable processor D) aggregate circuit E) green circuit
Multicore processor
________ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard. A) Hypertouch B) Nanotech C) Multitouch D) Linux E) Scalable
Multitouch
FIP principles are based on a belief in which of the following? A) Accountability of the record holder B) Responsibility of the record holder C) Mutuality of interest between the record holder and the individual D) Privacy of the individual E) Difference between the interests of the individual and commercial organizations
Mutuality of interest between the record holder and the individual
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? A) HIPAA B) FIP C) NORA D) COPPA E) Spyware
NORA
________ uses individual atoms and molecules to create computer chips and other devices. A) Virtualization B) Nanotechnology C) Quantum computing D) A minicomputer E) On-demand computing
Nanotechnology
What percent of global Internet users use Google Search and other Google services? A) Less than 10 percent B) Around 25 percent C) About 50 percent D) Nearly 80 percent E) Over 90 percent
Nearly 80 percent
When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web
On the hard drive of the visitor's computer
The NAI is an industry association formed to help with which of the following? A) Copyright protection B) Online privacy issues C) Patent protection D) Trademark protection E) Trade secret protection
Online privacy issues
Which of the following is not an IT infrastructure service component? A) Operating system software B) Computing platforms to provide a coherent digital environment C) Physical facilities management to manage the facilities housing physical components D) IT management services to plan and develop the infrastructure and provide project management E) IT education services that provide training to employees
Operating system software
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor
Opt-out
Which of the following is not a file-sharing service? A) The Pirate Bay B) Megaupload C) Morpheus D) Pandora E) Grokster
Pandora
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? A) Property rights and obligations B) System quality C) Accountability and control D) Information rights and obligations E) Quality of life
Property rights and obligations
Which of the five moral dimensions of the information age does spamming involve? A) Quality of life B) System quality C) Accountability and control D) Information rights and obligations E) Property rights and obligations
Property rights and obligations
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A) Family and home B) Property rights and obligations C) System quality D) Accountability and control E) Quality of life
Quality of life
The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: A) co-location. B) edge computing. C) grid computing. D) utility computing. E) quantum computing
Quantum computing
Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? A) CTS B) CVS C) RSI D) Technostress E) RSS
RSI
Which of the following is not one of the NIST defined characteristics of cloud computing? A) Ubiquitous network access B) Location-independent resource pooling C) On-demand self service D) Measured service E) Reduced elasticity
Reduced elasticity
________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials E) European ISPs
Regulated common carriers
The U.S. CAN-SPAM Act: A) makes spamming illegal. B) requires commercial email senders to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.
Requires commercial email senders to identify themselves
________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty
Responsibility
Which of the following statements about spam is not true? A) Most spam originates from bot networks. B) Cell phone spam usually comes in the form of SMS text messages. C) Spam costs for business are very high. D) Spamming has mushroomed because it is so inexpensive and can reach so many people. E) Spamming is more tightly regulated in Europe than in the United States.
Spamming is more tightly regulated in Europe than in the United States
Specifications that establish the compatibility of products and the ability to communicate in a network are called: A) network standards. B) telecommunications standards. C) technology standards. D) Internet standards. E) compatibility standards
Technology standards
Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A) Networking B) Telephone C) VOIP D) Telecommunications E) Data management
Telecommunications
"Look and feel" copyright infringement lawsuits are concerned with: A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product. E) violation of a monopoly on the ideas behind a product.
The distinction between an idea and its expression
Which of the following is not true about the changes to EU data protection rules proposed in 2012? A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. B) The new rules would require Internet companies to delete information at the user's request. C) The new rules would require Internet companies to retain information only as long as absolutely necessary. D) The new rules would reject the right to be forgotten. E) The new rules would apply only to all companies providing services in Europe.
The new rules would reject the right to be forgotten
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A safe harbor B) The opt-in model C) FIP principles D) P3P E) The opt-out model
The opt-in model
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? A) The Privacy Act B) The Gramm-Leach-Bliley Act C) The Freedom of Information Act D) COPPA E) HIPPA
The privacy act
Which of the following is not a difficulty in establishing patent protection? A) Length of time required to receive protection B) The requirement that the work reflect some special understanding and contribution C) The requirement that the work must be original D) The requirement that the work must be novel E) The requirement that the work must be a secret
The requirement that the work must be a secret
According to ________, you should take the action that produces the least harm. A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule
The risk aversion principle
In a multi-tiered network: A) the work of the entire network is centralized. B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers. D) processing is handled by multiple, geographically-remote clients. E) processing is located in the cloud.
The work of the entire network is balanced over several levels of servers
Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.
They result in new situations that are not covered by old laws
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A) Copyright B) Patent C) All forms of intellectual property protection D) Trademark E) Trade secret
Trade secret
Which of the following is a multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms? A) Unix B) Linux C) OS X D) COBOL E) DOS
Unix
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A) Cloud computing B) Autonomic computing C) Virtualization D) Multicore processing E) Ubiquitous computing
Virtualization
All of the following are cloud computing services except: A) infrastructure as a service. B) platform as a service. C) software as a service. D) on-demand computing. E) virtualization as a service
Virtualization as a service
Which of the following is a recent addition to the mobile digital platform? A) Quantum computing devices B) Wearable computing devices C) Cloud computing devices D) Grid computing devices E) Green computing devices
Wearable computing devices
The FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there must be a mechanism in place to enforce FIP principles. D) consumers should be able to review the data collected about them. E) websites must disclose their information practices before collecting data.
Websites must disclose their information practices before collecting data
Which of the following factors does not help explain why computing resources today are even more available than in previous decades? A) Network economics B) Law of mass digital storage C) Moore's law D) Declining communications costs and the Internet E) Widespread rejection of technology standards
Widespread rejection of technology standards
Which of the following became the standard PC in the Personal Computer Era? A) Wintel PC B) DOS PC C) MITS PC D) Altair E) Apple II
Wintel PC
A SAN is a ________ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement
storage area