Final Exam Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A survey by the Fawcett Society on the use of computing resources at work found that: A) 20 percent of men admit to viewing porn while at work B) over 50 percent of mobile workers view porn from their web-enabled phones C) 31 percent of computer users engage in software piracy D) nearly 75 percent of office workers spend 2 hours or more a week on Facebook while at work

A) 20 percent of men admit to viewing porn while at work

Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers? A) Artificial intelligence B) Cell phones C) Personal digital assistants D) Laptop computers

A) Artificial intelligence

Which of the following is a trade group that is funded through dues based on member companies' software revenues and through settlements from companies that commit software piracy? A) Business Software Alliance (BSA) B) Association for Computing Machinery (ACM) C) Institute of Electrical and Electronics Engineers (IEEE) D) SysAdmin, Audit, Network, Security (SANS) Institute

A) Business Software Alliance (BSA)

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under which Amendment? A) First B) Second C) Fourth D) Fifth

A) First

Software that can be installed with a web browser to block access to certain web sites that contain inappropriate or offensive material is known as which of the following? A) Internet filter B) router C) bridge D) Web modem

A) Internet filter

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify which of the following? A) Internet filters B) spams C) compression D) encryption

A) Internet filters

What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript? A) Macro viruses B) Logic bombs C) Trojan horses D) Zombies

A) Macro viruses

An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following? A) Order-processing systems B) Decisions support systems C) Software development systems D) Quality assurance systems

A) Order-processing systems

Which of the following terms is used to describe the act of stealing someone's ideas or words and passing them off as one's own? A) Plagiarism B) Cybersquatting C) Reverse engineering D) Patent trolling

A) Plagiarism

Professionals who breach the duty of care are liable for injuries that their negligence causes. This liability is commonly referred to as which of the following? A) Professional malpractice B) Breach of the duty of care C) Professional standard breach D) Software piracy

A) Professional malpractice

Which term refers to methods within the development process that guarantee reliable operation of the product? A) Quality assurance B) Software development methodology C) Documentation D) Software project management

A) Quality assurance

Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the US government, charging fraud by government contractors and other entities who receive or use government funds? A) Qui tam provision B) Affordable Care Act C) Foreign Corrupt Practices Act D) Roving wiretap provision

A) Qui tam provision

To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in place? A) Social media policy B) Acceptable use policy C) Privacy policy D) Content code policy

A) Social media policy

Which trade group protects the intellectual property of member companies and advocates a legal and regulatory environment that benefits the software industry? A) Software & Information Industry Association (SIIA) B) Association for Computing Machinery (ACM) C) Institute of Electrical and Electronics Engineers (IEEE) D) SysAdmin, Audit, Network, Security (SANS) Institute)

A) Software & Information Industry Association (SIIA)

Which act became law in 1996 with the purpose of allowing freer competition among phone, cable, and TV companies? A) Telecommunications Act B) Telecommunications Deregulation and Reform Act C) Child Online Protection Act D) Communications Opportunity, Promotion and Enhancement Bill

A) Telecommunications Act

A code of ethics cannot gain company-wide acceptance unless it is fully endorsed by the organization's leadership and developed with which of the following? A) employee participation B) board of directors C) business partners D) shareholders

A) employee participation

The posting of thousands of State Department documents on the WikiLeaks Web site is an example of which of the following? A) inappropriate sharing of information B) breach of duty of care C) inappropriate use of computing resources D) negligence

A) inappropriate sharing of information

Which of the following occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract? A) material breach of contract B) fraud C) misrepresentation D) bribery

A) material breach of contract

The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to which of the following? A) subpoenas requesting the identity of anonymous web posters B) determination of obscene material C) Internet filtering within public libraries D) identification of hate speech

A) subpoenas requesting the identity of anonymous web posters

Software quality is defined as the degree to which a software product meets: A) the needs of its users. B) the standards of its competitors. C) sustainability and environmental protection needs. D) the minimum financial return standards.

A) the needs of its users

The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following? A) valid test results B) correct system login ids C) the correct date and time D) sufficient memory for operations

A) valid test results

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following? A) virus B) operating system C) zombie D) CAPTCHA

A) virus

Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity? A) 47 USC 223 B) 18 USC 2425 C) 18 USC 875(c) D) 18 USC 2261A

B) 18 USC 2425

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity? A) Internet censorship B) A John Doe lawsuit C) Hate speech D) An anti-SLAPP law

B) A John Doe lawsuit

Which of the following is NOT one of the three major components of machine learning systems? A) The learner B) A function C) A model D) Parameters

B) A function

A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following? A) DDoS B) APT C) rootkit D) trojan horse

B) APT

A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following? A) USA PATRIOT Act B) Bring your own device (BYOD) C) Mobile Alliance Policy (MAP) D) CAPTCHA

B) Bring your own device (BYOD)

Violation of which of the following acts can cause a school or public library to lose funding to help pay for its Internet connections? A) Child Online Protection Act (COPA) B) Children's Internet Protection Act (CIPA) C) Children's Online Privacy Protection Act (COPPA) D) Communications Decency Act (CDA)

B) Children's Internet Protection Act (CIPA)

Under which act did the Federal Communications Commission respond to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps? A) USA PATRIOT Act B) Communications Assistance for Law Enforcement Act C) Electronic Communications Privacy Act D) Foreign Intelligence Surveillance Act

B) Communications Assistance for Law Enforcement Act

The Organization for Economic Cooperation and Development's requirement that personal data collected should be accurate, complete, current, and relevant to the purpose for which it is used is based on which principle? A) Individual participation B) Data quality C) Collection limitation D) Purpose specification

B) Data quality

A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following? A) Upgrade management system B) Decision support system C) Executive information system D) Data information system

B) Decision support system

Most social networking Web sites have a terms of use agreement that states the Web site has the right to: A) Post messages about its users B) Delete material that violates the site's policies C) Edits material submitted by its users D) Charge users to view adult material

B) Delete material that violates the site's policies

Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use? A) TRIPS Agreement B) Digital Millennium Copyright Act C) WIPO Copyright Treaty D) Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

B) Digital Millennium Copyright Act

Title I of which of the following acts extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet? A) Foreign Intelligence Surveillance Act B) Electronic Communications Privacy Act C) Communications Assistance for Law Enforcement Act D) USA PATRIOT Act

B) Electronic Communications Privacy Act

One purpose of which of the following is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash? A) Cookie B) Event data recorder C) Spear-phishing device D) Answering machine

B) Event data recorder

Which act outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data, and how long data is retained? A) Gramm-Leach-Bliley Act B) Fair Credit Reporting Act C) Credit CARD Act D) Federal Credit Union Act

B) Fair Credit Reporting Act

Remote monitoring is also known as which of the following? A) Real-time telehealth B) Home monitoring C) Telenursing D) Live telemedicine

B) Home monitoring

What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement? A) H-1B worker B) Independent contractor C) Coemployee D) Outsourced employee

B) Independent contractor

Which of the following is true about certification? A) It guarantees the performance of an individual. B) It can be applied to products. C) It is the same as licensing. D) It is a mandatory requirement by the law.

B) It can be applied to products.

Which of the following is a Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment? A) Miller v. Brown B) Miller v. California C) Miller v. Stern D) Miller v. Texas

B) Miller v. California

The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following? A) Pharming B) Phishing C) Spamdexing D) Flyposting

B) Phishing

Which of the following social network platforms enables users to visually share and discover new interests by posting images or videos to their own or others' boards? A) Twitter B) Pinterest C) Yelp D) MyDeco

B) Pinterest

Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services? A) Social network shopping B) Social media marketing C) Door-to-door selling D) Word-of-mouth marketing

B) Social media marketing

Which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software? A) Software guide B) Software development methodology C) Software manual D) Software project management

B) Software development methodology

What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people? A) A botnet B) Spam C) Logic bombing D) A worm

B) Spam

Global market research company J. D. Power claims that how many consumers have used a company's social media channel for customer service? A) One-half B) Two-thirds C) One-quarter D) All

B) Two-thirds

Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks? A) Carnegie Mellon's Computer Response Team B) US Computer Emergency Readiness Team C) The National Institute of Standards and Technology D) The Science and Technology Directorate of Homeland Security

B) US Computer Emergency Readiness Team

A patent is a grant of a property right issued by which entity? A) USPS B) USPTO C) FTC D) SEC

B) USPTO

In the case of United States v. New York Central & Hudson River Railroad Co., the U.S. Supreme Court established that: A) executives in an organization with an effective ethics program can receive lesser sentences for unethical actions. B) an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to their employer's directions. C) organizations can escape criminal liability if they make strong efforts to prevent and detect misconduct in the workplace. D) officers of companies cannot be given light sentences if their ethics programs fail to deter criminal activity within their firms.

B) an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to their employer's directions.

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as? A) distributed denial-of-service attack B) bot attack C) CAPTCHA attack D) logic bomb

B) bot attack

A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making is known as which of the following? A) mission statement B) code of ethics C) problem statement D) acceptable use policy

B) code of ethics

Before the IT security group can begin an eradication effort, it must: A) seek permission of the firm's legal counsel B) collect and log all possible criminal evidence from the system C) consider the potential for negative publicity D) develop an estimate for the monetary damage caused

B) collect and log all possible criminal evidence from the system

Which of the following positions provides an organization with vision and leadership in the area of business conduct? A) spiritual leader B) corporate ethics officer C) disseminator D) disturbance handler

B) corporate ethics officer

Abusive behaviour, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following? A) cyberattacking B) cyberharassment C) cyberstalking D) cybertexting

B) cyberharassment

The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following? A) whistleblowing B) cyberterrorism C) hacktivism D) cyberespionage

B) cyberterrorism

The Supreme Court has held that obscene speech and which of the following are not protected by the First Amendment and may be forbidden by the government? A) audition B) defamation C) declamation D) demarcation

B) defamation

Possession of child pornography is a federal offense punishable by up to how many years in prison? A) two B) five C) seven D) ten

B) five

The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following? A) non-disclosure clause B) open source license C) patent protection D) copyright term

B) open source license

Although they may implement a speech code, which of the following entities are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint? A) religious institutions B) public schools and universities C) Internet service providers D) communications providers

B) public schools and universities

Which of the following concepts recognizes that managers must use their judgement to ensure that the cost of control does not exceed the system's benefits or the risks involved? A) competitive intelligence B) reasonable assurance C) separation of duties D) risk assessment

B) reasonable assurance

At which level is licensing generally administered? A) federal B) state C) local D) association

B) state

In an environment where employees are encourages to do "whatever it takes" to get the job done, employees may feel pressured to act in which of the following ways? A) with integrity B) unethically C) morally D) that which is culturally accepted

B) unethically

Penalties for violating the Foreign Corrupt Practices Act (FCPA) are severe - corporations face a fine of up to how much per violation? A) $100,000 B) $500,000 C) $2 million D) $5 million

C) $2 million

The majority of people hired with H-1B visas in 2015 were hired primarily as which of the following positions? A) Hospitality management B) IT directors and management C) Computer programmers and system analysts D) Data entry specialists

C) Computer programmers and system analysts

IT investments may produce tangible results such as: A) Improved quality B) Improved reliability C) Cost savings D) Improved service

C) Cost savings

At which of the Capability Maturity Model Integration maturity levels are processes well-defined, understood, and consistent across the organization? A) Initial B) Managed C) Defined D) Quantitatively managed

C) Defined

An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following? A) DO-178B/EUROCCAE ED-128 B) N-version programming C) Failure mode and effects analysis (FMEA) D) Capability Maturity Model Integration (CMMI)

C) Failure mode and effects analysis (FMEA)

In Doe v. Holder, the courts ruled that the NSL gag provision violates which of the following? A) Fair Information Practices Act B) USA PATRIOT Act C) First Amendment D) Sunset provision

C) First Amendment

Which act protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees? A) USA PATRIOT Act B) Communications Assistance for Law Enforcement Act C) Fourth Amendment D) Freedom of Information Act

C) Fourth Amendment

The crime of obtaining goods, services, or property through deception or trickery is known as which of the following? A) Conflict of interest B) Breach of contract C) Fraud D) Misrepresentation

C) Fraud

What term is used to refer to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements? A) Coemployment B) Employee leasing C) Gig economy D) Contingent employment

C) Gig economy

Organizations can use which of the following to capture interviews with customers, managers, and industry leaders? A) Twitter B) Facebook C) Google Hangouts on Air D) Meetup

C) Google Hangouts on Air

After a six year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following? A) US citizenship B) Permanent H-1B status C) Green card D) Foreign contract

C) Green card

A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services is known as which of the following? A) Labor innovation B) Outsourcing C) Labor productivity D) Workplace automation

C) Labor productivity

Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts? A) Social media marketing B) Paid media marketing C) Organic media marketing D) Earned media marketing

C) Organic media marketing

Which act prohibits the government from concealing the existence of any personal data record-keeping systems? A) Fair Information Practices Act B) USA PATRIOT Act C) Privacy Act D) Freedom of Information Act

C) Privacy Act

Which of the following helps physicians keep tabs on patients prone to life-threatening health crises? A) Inpatient codes B) Medical information web sites C) Remote monitoring D) SMS texts

C) Remote monitoring

The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following? A) Plagiarism B) Patent infringement C) Reverse engineering D) Decompiling

C) Reverse engineering

In 1972, which organization recommended that publicly held organizations establish audit committees? A) SysAdmin, Audit, Network, Security (SANS) Institute B) Association of Information Technology Professionals (AITP) C) Securities and Exchange Commission D) National Council of Examiners for Engineering and Surveying (NCEES)

C) Securities and Exchange Commission

An H-1B worker can work for a U.S. employer for a maximum continuous period of how many years? A) Two B) Four C) Six D) Eight

C) Six

Which of the following is true of software testing? A) White-box testing involves viewing the software unit as a device that has expected input and output behaviours but whose internal workings are unknown. B) Black-box testing treats the software unit as a device that has expected input and output behaviours but whose internal workings, unlike the unit in whitebox testing, are unknown. C) Static testing involves software programs called static analyzers which are run against new code. D) Integration testing involves independent testing that is performed by trained ends users to ensure that the system operates as they expect.

C) Static testing involves software programs called static analyzers which are run against new code.

Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation? A) Live telemedicine B) Remote monitoring C) Store-and-forward telemedicine D) Inpatient consultation

C) Store-and-forward telemedicine

Which of the following statements is true of Communications Decency Act (CDA)? A) Title V of the CDA was the Telecommunications Act, aimed at protecting children from pornography. B) The CDA imposed a $150,000 fine and a prison term of up to five years for the transmission of "indecent" material over the Internet C) The problem with the CDA was its broad language and vague definition of "indecency," a standard that was left to individual communities to determine. D) In June 2004, the ruling by the Supreme Court in the case of Ashcroft v. American Civil Liberties Union made it clear that CDA was unconstitutional.

C) The problem with the CDA was its broad language and vague definition of "indecency," a standard that was left to individual communities to determine.

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur which of the following? A) Relocation expenses B) Start-up costs C) Training costs D) Travel expenses

C) Training costs

Which of the following is an approach to social media marketing that encourages individuals to pass along a marketing message to others, thus creating the potential for exponential growth in the message's exposure and influence? A) Earned media B) Paid media marketing C) Viral marketing D) Organic media marketing

C) Viral marketing

Which of the following terms is used to describe an effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by an individual or organization? A) Offshore outsourcing B) Green computing C) Whistle-blowing D) Private contracting

C) Whistle-blowing

Despite the importance of which of the following in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights? A) privacy B) freedom C) anonymity D) rights

C) anonymity

A social networking platform: A) is limited within the barriers of time B) prohibits interactions between unknown people C) can be used for business purposes D) can generate revenue only through member fees

C) can be used for business purposes

The Children's Online Privacy Protection Act: A) was found to be unconstitutional. B) is meant to give web masters control over the collection, use, and disclosure of children's personal information. C) does not cover the dissemination of information to children. D) requires the installation of Internet filters in public libraries.

C) does not cover the dissemination of information to children.

Researchers have found that it can take how long for IT investments to result in a significant increase in productivity? A) less than three years B) more than 10 years C) five to seven years D) only a few months

C) five to seven years

A discrepancy between employee's own values and an organization's actions: A) encourages employee commitment. B) increases employee involvement. C) fosters poor performance. D) creates high morale.

C) fosters poor performance.

To extend to all people the same respect and consideration that you expect from them is considered which of the following character traits? A) morality B) ethical C) integrity D) consistency

C) integrity

In the legal system, compliance usually refers to behavior that is in accordance with which of the following? A) personal beliefs B) morality C) legislation D) ethical codes

C) legislation

Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following? A) security dashboard B) computer forensics C) managed security service provider D) product lifecycle management

C) managed security service provider

Which of the following is defined as the misstatement or incomplete statement of a material fact? A) fraud B) piracy C) misrepresentation D) breach of contract

C) misrepresentation

Which of the following is defined as not doing something that a reasonable person would do or doing something that a reasonable person would not do? A) professional malpractice B) breach of the duty of care C) negligence D) software piracy

C) negligence

A clear, concise statement of an issue that needs to be addressed is known as which of the following? A) mission statement B) acceptable use policy C) problem statement D) code of ethics

C) problem statement

An oral defamatory statement is called which of the following? A) libel B) hate speech C) slander D) exaggeration

C) slander

Which of the following activities describes when an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year? A) ethics review B) performance appraisal C) social audit D) morals assessment

C) social audit

Someone who stands to gain or lose, depending on how a situation is resolved is known as which of the following? A) negotiator B) figurehead C) stakeholder D) philanthropist

C) stakeholder

Copyright and patent protection was established through which of the following? A) the Bills of Rights B) the US Federal Codes and Statutes C) the US Constitution D) various state laws

C) the US constitution

Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's? A) trade secret B) watermark C) trademark D) earmark

C) trademark

Which of the following describes a habit that inclines people to do what is acceptable? A) laws B) ethics C) virtue D) vice

C) virtue

An H-1B visa is a temporary visa granted for people who: A) only work in the IT field B) were educated outside the US and wish to work in the US C) work in specialty occupations that require at least a four-year bachelor's degree D) were born and educated outside the US but have relatives living in the US

C) work in specialty occupations that require at least a four-year bachelor's degree

The number of Internet users worldwide is quickly approaching which of the following? A) 4 million B) 2 billion C) 5 million D) 4 billion

D) 4 billion

How many H-1B visas has Congress set as the maximum amount to be granted yearly? A) 55,400 B) 30,000 C) 71,000 D) 65,000

D) 65,000

The piracy rate is nearly 80 percent across which continent? A) Asia B) North America C) Europe D) Africa

D) Africa

Which of the following established the minimum levels of protection that each country must provide to all WTO members? A) World Trade Organization (WTO) B) Digital Millennium Copyright Act (DMCA) C) The World Intellectual Property Organization (WIPO) D) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

D) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

Which of the following statements is true of Children's Internet Protection Act (CIPA)? A) In case of CIPA, Congress specifically defined what content or Web sites should be forbidden and the measures to be used. B) CIPA requires the tracking of Internet use by minors or adults. C) In June 2004, the Supreme Court ruling in the case of Ashcroft v. American Civil Liberties Union made it clear that CIPA was unconstitutional. D) CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

D) CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model? A) QA B) Software development methodology C) Software quality management D) CMMI-DEV

D) CMMI-DEV

Section 230 of which act provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider? A) Online Protection Act B) Online Privacy Protection Act C) Internet Freedom and Nondiscrimination Act D) Communications Decency Act

D) Communications Decency Act

Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behaviour (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim? A) Libel B) Slander C) Cyberbullying D) Cyberstalking

D) Cyberstalking

What term refers to the obligation to protect people against any unreasonable harm or risk? A) Negligence B) Professional malpractice C) Reasonable professional standard D) Duty of care

D) Duty of care

Which act bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries? A) Fair Information Protection Act B) Fair Credit Reporting Act C) Freedom of Information Act D) European Union Data Protection Directive

D) European Union Data Protection Directive

Which of the following can be oral, written, or inferred from the seller's conduct? A) Indemnity B) Strict liabilities C) Warranty tolling D) Express warranties

D) Express warranties

Which of the following is currently the most popular social network destination worldwide? A) Twitter B) LinkedIn C) Meetup D) Facebook

D) Facebook

Which act enables the public to gain access to certain government records? A) Fair Information Practices Act B) USA PATRIOT Act C) Privacy Act D) Freedom of Information Act

D) Freedom of Information Act

Which type of attacker hacks computers or websites in an attempt to promote a political ideology? A) Industrial spies B) Hackers C) Cyberterrorists D) Hacktivists

D) Hacktivists

Which country is considered one of the best sources of programming skills outside of Europe and North America? A) China B) Egypt C) Saudi Arabia D) India

D) India

Patent law protects which of the following? A) Art and film B) Information critical to an organization's success C) Books D) Inventions

D) Inventions

One of the tests that an invention must pass to be eligible for a patent is which of the following? A) It must be a machine B) It must not be economical to produce C) It must be capable of providing economic benefit D) It must not be obvious to a person having ordinary skill in the same field

D) It must not be obvious to a person having ordinary skill in the same field

The primary areas where IT has been applied include all of the following except: A) Computerized patient records B) Clinical decision support C) Computerized provider order entry D) Medical language processing

D) Medical language processing

How often does the Bureau of Labor Statistics track US productivity? A) Monthly B) Annually C) Semiannually D) Quarterly

D) Quarterly

Which of the following is an example of cyberharassment? A) Someone sends you a credible threats that they are "out to get you." B) Someone posts a strongly worded dissenting opinion to your post on a social network. C) An unknown individual posts photos of you, taken over several days in different locations, without you being aware that your photo was taken. D) Someone keeps sending you instant messages after you have asked them to stop.

D) Someone keeps sending you instant messages after you have asked them to stop.

Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization? A) Spamdexing B) Vishing C) Smishing D) Spear phishing

D) Spear phishing

Which of the following technologies employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration? A) Health machine learning B) Clinical decision support C) Health Information Exchange D) Telehealth

D) Telehealth

Which of these statements about contingent workers is true? A) They typically work as a separate, independent group of workers and move from project to project working for the same firm. B) They are often paid a lower hourly wage than full-time employees doing equivalent work. C) They are eligible for most company benefits such as vacation, sick pay, and medical insurance. D) They have neither an explicit nor an implicit contract for continuing employment.

D) They have neither an explicit nor an implicit contract for continuing employment.

The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following? A) pay an official to perform some official function faster B) make lawful payments to a foreign official C) make facilitating payments D) bribe a foreign official

D) bribe a foreign official

Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner? A) mission statement B) acceptable use policy C) problem statement D) code of ethics

D) code of ethics

The most common computer security precaution taken by businesses is the installation of which of the following? A) emergency response team B) rootkit C) virtual private network D) firewal

D) firewall

A well-implemented ethics and compliance program and a strong ethical culture can lead to: A) more fear of retaliation by management. B) less comfort for the employees reporting misconduct. C) more negative views on the organization. D) less pressure on employees to misbehave.

D) less pressure on employees to misbehave.

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is: A) the time limitation for a trade secret is longer than for patents and copyrights. B) no royalties must be paid on trade secrets C) trade secrets can become part of the prior art and be used to protect patents and copyrights D) there is no need to file an application or disclose a trade secret to gain protection

D) there is no need to file an application or disclose a trade secret to gain protection

One potential disadvantage of using contingent workers is that: A) the costs for their health care, paid time off, and contributions to a retirement plan can be considerable B) the company may have to adjust the number of contingent workers that it uses to meet business needs C) there can be substantial training expenses D) they may not feel a strong connection to the company for which they are working

D) they may not feel a strong connection to the company for which they are working

What term is used to describe a habit of unacceptable behaviour? A) moral B) virtue C) ethic D) vice

D) vice

True or False: A US citizens who posts material on the web that is illegal in a foreign country cannot be prosecuted in that country.

False

True or False: After virus eradication, you can use a previous backup to restore an infected computer.

False

True or False: Compliance means to be in conformance with a profession's core body of knowledge.

False

True or False: Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.

False

True or False: Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.

False

True or False: Government licensing of IT workers is common within most of the states of the United States.

False

True or False: Individual views on what is moral are so strongly held that there is nearly universal agreement in spite of differences in age, cultural group, ethnic background, religion, life experience, education, and gender.

False

True or False: Laws provide a complete guide to ethical behavior.

False

True or False: Live telemedicine requires the presence of patients and healthcare providers at the same site.

False

True or False: Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.

False

True or False: Reverse engineering can only be applied to computer hardware, not computer software.

False

True or False: Stakeholders who stand to lose or gain from a situation should be kept out of the decision making process as they will simply introduce their personal biases.

False

True or False: The Fifth Amendment regulates the collection of the content of wire and electronic communications.

False

True or False: The Privacy Act of 1974 extends to the actions of the CIA, US law enforcement agencies, and the private industry.

False

True or False: The Supreme Court has ruled that the Fifth Amendment protects the right to speak anonymously as part of the guarantee of free speech.

False

True or False: The USA PATRIOT Act grants citizens the right to access certain information and records of federal, state, and local governments upon request.

False

True or False: The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.

False

True or False: The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.

False

True or False: The term of copyright has been extended several times from its original limit of 25 years to 35 years.

False

True or False: Title III of the Wiretap Act allows state and federal law enforcement officials to use wiretapping without requiring them to obtain warrants.

False

True or False: To qualify legally as a bribe, the gift or payment must be made directly from donor to recipient.

False

True or False: Trojan horse has become an umbrella term for many types of malicious code.

False

True or False: Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.

False

True or False: When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.

False

True or False: When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient almost always coincide.

False

True or False: A person can work for a US employer as an H-1B employee for a maximum continuous period of ten years.

False.

True or False: China is considered one of the best sources of programming skills outside Europe and North America.

False.

True or False: Contingent work is a job situation in which an individual has an implicit contract for long-term employment.

False.

True or False: Currently, there is a fairly narrow range of social networking websites catering to interest of Internet users represented online.

False.

True or False: Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs.

False.

True or False: In integration testing, special software programs called static analyzers are run against the new code.

False.

True or False: Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.

False.

True or False: Organic media marketing involves the use of social networks to communicate and promote the benefits of products and services.

False.

True or False: Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online ratings and reviews, tweets and retweets, reposts, and recommendations.

False.

True or False: The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment.

False.

True or False: There is no evidence that the hiring of H-1B workers has affected the salaries of US IT workers.

False.

True or False: A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system.

True

True or False: A failure mode describes how a product or process could fail to perform the desired functions described by the customer.

True

True or False: A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.

True

True or False: A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.

True

True or False: A strategic lawsuit against public participation (SLAPP) is typically without merit.

True

True or False: A trade secret is information, generally unknown to the public, that a company has taken strong measures to keep confidential.

True

True or False: Anonymous political expression played an important role in the early formation of the United States.

True

True or False: Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization.

True

True or False: Computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans.

True

True or False: Consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization - that it will behave in the future much as it has in the past.

True

True or False: Copyright law protects authored works such as art, books, and film.

True

True or False: Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.

True

True or False: Defining and controlling the appropriate level of access to intellectual property are complex tasks.

True

True or False: Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.

True

True or False: Electronic discovery is the collection, preparation, review, and production of electronically stored information for use in criminal and civil actions and proceedings.

True

True or False: Electronically stored information includes any form of digital information stored on any form of electronic storage device.

True

True or False: Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.

True

True or False: Ethics has risen to the top of the business agenda because risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact.

True

True or False: Fairness and generosity are examples of virtues.

True

True or False: Ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the CEO.

True

True or False: In general, the closer an internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will apply.

True

True or False: Increasingly, managers are including ethical conduct as part of an employee's performance appraisal.

True

True or False: It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.

True

True or False: Machine learning has contributed to the development of a much more in-depth understanding of the human genome as well as practical speech recognition, improved web search results, and self-driving cars.

True

True or False: More advanced artificial-intelligence-based clinical decision support systems can help doctors choose the proper dosage levels of medication based on a patient's most recent test results.

True

True or False: Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity laws.

True

True or False: Private schools may prohibit students, instructors, and other employees from engaging in offensive speech.

True

True or False: Risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well.

True

True or False: Risk is the potential of gaining or losing something of value.

True

True or False: Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk.

True

True or False: Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.

True

True or False: Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation.

True

True or False: The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.

True

True or False: The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.

True

True or False: The Foreign Intelligence Surveillance Act describes procedures for the electronic surveillance of communications between foreign powers and the agents of foreign powers.

True

True or False: The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.

True

True or False: The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.

True

True or False: The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement.

True

True or False: The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.

True

True or False: The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional.

True

True or False: The main body of law that governs patents is contained in Title 35 of the US Code.

True

True or False: The right to freedom of expression is restricted when the expression, whether spoken or written, are untrue and cause harm to another person.

True

True or False: The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.

True

True or False: The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong.

True

True or False: The use of cookies and tracking software is controversial because companies can collection information about consumers without their explicit permission.

True

True or False: There are many industry association certifications in a variety of IT-related subject areas.

True

True or False: Through the use of cookies, a web site is able to identify visitors on subsequent visits.

True

True or False: Today's computer menace is much better organized and may be part of an organized group.

True

True or False: Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury.

True

True or False: User acceptance testing is performed by trained end users to ensure that the system operates as they expect.

True

True or False: Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.

True

True or False: When the Business Software Alliance (BSA) finds cases of software piracy, it can assess heavy monetary penalties.

True

True or False: While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.

True

True or False: A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.

True.

True or False: A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.

True.

True or False: Cyberharassment is a form of cyberabuse in which the abusive behaviour, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress.

True.

True or False: Different types of social media are blogs, discussion forums, media-sharing networks, wikis, social bookmarking tools, social messaging apps, and social networking, news, and shopping platforms.

True.

True or False: Foreign professionals can convert their H-1B visas into permanent green cards.

True.

True or False: The standard of living varies greatly among groups within a country as well as from nation to nation.

True.


Ensembles d'études connexes

Prefix "de" meaning down, off of

View Set

MODULE 4: THE NETIQUETTE AND THE COMPUTER ETHICS (Module Version)

View Set

Effects of HIV infection on the immune system

View Set