Management Test 2
True or False: COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on
False
True or False: IT infrastructure consists of only those physical computing devices and software required to operate the enterprise
False
True or False: In green computing, reducing computer power consumption is not a top priority
False
True or False: In today's legal environment, managers who are convicted for the illegal use of information systems are still unlikely to be given a prison sentence
False
True or False: NFC tags are always passive
False
True or False: Spam is legally defined as any email that is unsolicited.
False
True or False: Telephone networks are based on the same principles as computer networks
False
True or False: The operating system is used to manage the software applications used in business activities
False
True or False: VoIP technology delivers voice information in digital form using circuit switching
False
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues
What is not a feature of the General Data Protection Regulation (GDPR)?
It prevents firms from using cookies
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?
Slippery-slope rule
True or False: A Facebook user's visit to a website can be tracked even if they do not click a Like button
True
True or False: A computer network consists of at least two computers
True
True or False: Client/server computing is a primary example of decentralized processing
True
True or False: Copyright is a legal protection given to creators of certain types of intellectual property
True
True or False: Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business
True
True or False: Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior
True
True or False: Fiber-optic cable is more expensive and harder to install than wireless media
True
True or False: In a client/server network, a network server sets the rules of communication for the network
True
True or False: Liability is a feature of political systems and allows individuals to recover damages done to them by others
True
True or False: Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware
True
True or False: Routine violations of individual privacy are made easier by advances in data storage
True
True or False: The Domain Name System (DNS) converts domain names to IP addresses
True
True or False: Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms
True
True or False: Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior
True
True or False: Wikis allow visitors to change or add to the original posted material
True
Which process is used to protect transmitted data in a VPN?
Tunneling
All of the following are current hardware platform trends except
UNIX
T1 lines
are high-speed, leased data lines providing guaranteed service levels
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history
behavioral targeting
The Internet of Things (IoT) refers to
billions of Internet-connected sensors
All of the following are steps in the process for analyzing an ethical issue except:
Assigning responsibility
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
The total amount of digital information that can be transmitted through any telecommunications medium is measured in
BPS
Firms that allow employees to use their own devices are embracing which of the following?
BYOD
All of the following are physical components of an RFID system except
Bar Codes
Instant messaging is a type of ________ service
Chat
Which of the following statements about cookies is not true?
Cookies are installed only at the user's request
Which of the following is the most common reason that business systems fail?
Data quality
All of the following are technical solutions to protecting user privacy except
Data use policies
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
What are the drawbacks of cloud computing? Do you think these ever outweigh the benefits, and if so, in what cases?
Drawbacks include: 1. placing data storage and control in another firm's hands. 2. security risks in having critical systems and data entrusted to a firm that does business with other firms. 3. loss of business capability if cloud infrastructures malfunction. 4. dependence on cloud computing provider and switching costs. Student answers regarding the relative weight will vary, an example is: The disadvantages of cloud computing outweigh the advantages, except if any data lost is irreplaceable or creates harm to others. For example, a database of financial information should remain the responsibility of the original firm so that they can be held accountable.
Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?
Ethernet
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
Which organization manages the domain name system of the Internet?
ICANN
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers
ISP
Distinguish between cloud computing, green computing, and quantum computing
In cloud computing, technology services are provided over a network, primarily the Internet. These may be infrastructure services, such as storage or networking, or platform services, such as IBM's application development and test service, or software services, such as salesforce.com. Green computing refers to practices and technologies for designing computer equipment to minimize impact on the environment. Quantum computing refers to emerging technology that uses the principles of quantum physics to dramatically boost computer processing power.
Which of the following is NOT one of the current key technology trends that raises ethical issues?
Increase in data quality
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
Modem
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?
NORA
When a cookie is created during a website visit, it is stored
On the hard drive of the visitor's computer
Which type of software is created and updated by a worldwide community of programmers and available for free?
Open source
In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.
Opt-in
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
Profiling
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read
________ means that you accept the potential costs and obligations for the decisions you make
Responsibility
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?
Router
Which of the following can be used to help a website achieve a higher ranking with the major search engines?
SEO
The GDPR created a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries
Safe Harbor
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
Scalability
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as
Software packages
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?
The Golden Rule
Which one of the following statements is not true?
The Internet backbone is owned by the federal government in the United States
What is the digital divide and how does it impact society?
The digital divide relates to the fact that information, knowledge, computers, and access to digital and information resources through educational institutions and public libraries are inequitably distributed along ethnic and social class lines. Several studies have found that poor and minority groups in the United States are less likely to have computers or online Internet access even though computer ownership and Internet access have soared in the past five years. Although the gap in computer access is narrowing, higher-income families in each ethnic group are still more likely to have home computers and broadband Internet access than lower-income families in the same group. Moreover, the children of higher-income families are far more likely to use their Internet access to pursue educational goals, whereas lower-income children are much more likely to spend time on entertainment and games. Left uncorrected, this digital divide could lead to a society of information haves, computer literate and skilled, versus a large group of information have-nots, computer illiterate and unskilled. Public interest groups want to narrow this digital divide by making digital information services-including the Internet-available to virtually everyone, just as basic telephone service is now.
All of the following are typically factors in a firm's decision to engage consulting and system integration services except
The firm's staff knows more about the firm's IT infrastructure than service providers
Identify the five moral dimensions that are involved in political, social, and ethical issues and briefly describe each
The five moral dimensions are: (1) Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them? (2) Property rights and obligations. How can intellectual property rights be protected when it is so easy to copy digital materials? (3) Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? (4) System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? (5) Quality of life. What values should be preserved? What institutions must we protect? What cultural values can be harmed?
________ allows an organization to collect personal information without the user's explicit consent
The opt-out model
What are the steps in conducting an ethical analysis?
The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify the options that you can reasonably take; and (5) identify the potential consequences of your options
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?
Virtualization
All of the following are cloud computing services except
Virtualization as a service
Interpretations of Moore's law assert that
computing power doubles every 18 months
IPv6 has been developed in order to:
create more IP addresses.
Client/server computing is a
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer
SaaS refers to
hosting and managing access to software applications delivered over the Internet to clients on a subscription basis
The ethical "no free lunch" rule states that
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
A VPN
is an encrypted private network configured within a public network
The Windows Operating System
is an operating system used on most Wintel PCs throughout the world
Infrastructure-as-a-Service (IaaS)
is one type of cloud computing service where users pay only for the computing capacity they actually use
The domain .gov is a(n)
top-level domain
List and describe four services that comprise IT infrastructure, beyond physical devices and software applications
• The service components of IT infrastructure include: • Telecommunications services that provide data, voice, and video connectivity. • Data management services to store, manage, and analyze data. • Application software services that provide enterprise-wide capabilities. • Physical facilities management services, to develop and manage physical installations of technology. • IT standards services that establish and monitor the firm's policies. • IT education services that provide training in use of the systems. • IT research and development services that research potential projects, products, and investments