MIS Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A characteristic or quality that describes a particular database entity is called a(n): A) field. B) tuple. C) key field. D) attribute. E) relationship.

Attribute

Which of the following enables you to create a script that allows a web server to communicate with a back-end database? A) CGI B) HTML C) Java D) SQL E) NoSQL

CGI

Which of the following is not an example of the mobile digital platform? A) Tablets B) Kindle C) Cell phones D) CRM E) Apps

CRM

Which of the following is a specialized language that programmers use to add and change data in the database? A) Data access language B) Data manipulation language C) Structured query language D) Data definition language E) DBMS

Data manipulation language

Digital media differs from a physical book in all of the following ways except: A) ease of replication. B) ease of alteration. C) ease of transmission. D) ease of global distribution. E) ease of establishing uniqueness

Ease of establishing uniqueness

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? A) On-demand B) Grid C) Edge D) Autonomic E) Quantum

On-demand

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A) 5, 2, 3, 4, 1 B) 5, 4, 2, 3, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 1, 3 E) 4, 5, 3, 2, 1

5, 4, 2, 3, 1

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with: A) one short mark. B) two short marks. C) three short marks. D) a crow's foot. E) a crow's foot topped by a short mark.

A crow's foot topped by a short mark

Running a Java program on a computer requires: A) a Java Virtual Machine to be installed on that computer. B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) a miniature program to be downloaded to the user's computer. D) no specialized software, as Java is platform-independent. E) the Mozilla Firefox browser and no other browsers.

A java virtual machine to be installed on that computer

ZipRealty, which combines Google Maps with real estate data, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup. E) a web service.

A mashup

Today's nanotechnology-produced computer transistors are roughly equivalent in size to: A) the width of a fingernail. B) a human hair. C) a virus. D) an atom. E) a grain of sand

A virus

Which of the following enables a DBMS to reduce data redundancy and inconsistency? A) Ability to enforce referential integrity B) Ability to couple program and data C) Use of a data dictionary D) Ability to create two-dimensional tables E) Ability to minimize isolated files with repeated data

Ability to minimize isolated files with repeated data

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability

Accountability

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: A) service. B) client. C) browser. D) app. E) beacon.

Browser

Which of the following is a leading networking hardware provider? A) Dell B) Intel C) Seagate D) IBM E) Cisco

Cisco

In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

Classifications

You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast

Classify data

All of the following are technologies used to analyze and manage big data except: A) cloud computing. B) noSQL. C) in-memory computing. D) analytic platforms. E) Hadoop.

Cloud computing

The join operation: A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements into segments. E) creates a subset consisting of rows in a table.

Combines relational tables to provide the user with more information than is otherwise available

The select operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria. E) creates a subset consisting of rows in a table.

Creates a subset consisting of all records in the file that meet stated criteria

The project operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected. E) creates a subset consisting of rows in a table.

Creates a subset consisting of columns in a table

Microsoft SQL Server is a(n): A) DBMS for both desktops and mobile devices. B) Internet DBMS. C) desktop relational DBMS. D) DBMS for midrange computers. E) DBMS for mobile devices.

DBMS for midrange computers

In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management

Data administration

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) Data normalization B) Data accuracy C) Data redundancy D) Data inconsistency E) Data duplication

Data consistency

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Data dictionary B) Data definition diagram C) Entity-relationship diagram D) Relationship dictionary E) Data table

Data dictionary

Which of the following occurs when the same attribute in related data files has different values? A) Data redundancy B) Data duplication C) Data dependence D) Data discrepancy E) Data inconsistency

Data inconsistency

________ creates confusion that hampers the creation of information systems that integrate data from different sources. A) Batch processing B) Data redundancy C) Data independence D) Online processing E) Data quality

Data redundancy

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization. E) data normalization.

Data scrubbing

In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management

Database administration

The term big data refers to all of the following except: A) datasets with fewer than a billion records. B) datasets with unstructured data. C) machine-generated data (i.e. from sensors). D) data created by social media (i.e. tweets, Facebook Likes). E) data from Web traffic.

Datasets with fewer than a billion records

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act

Digital Millennium Copyright act

DBMSs typically include report generating tools in order to: A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis. E) analyze the database's performance.

Display data in an easier-to-read format

The Online Privacy Alliance: A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with websites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. E) is a safe harbor program established by the U.S. government.

Encourages self-regulation to develop a set of privacy guidelines for its members

Data cleansing not only corrects errors but also: A) establishes logical relationships between data. B) structures data. C) normalizes data. D) removes duplicate data. E) enforces consistency among different sets of data.

Enforces consistency among different sets of data

The development of TCP/IP occurred during the ________ era. A) cloud and mobile computing B) general-purpose mainframe and minicomputer C) client/server era D) personal computer E) enterprise computing

Enterprise computing

A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.

Entity-relationship diagram

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A) TCP/IP B) COBOL C) Ethernet D) ASCII E) Linux

Ethernet

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) Address B) City C) Airport code D) State E) Day

Airport code

The introduction of the minicomputer: A) allowed computers to be customized to the specific needs of departments or business units. B) strengthened centralized computing. C) offered new, powerful machines at higher prices than mainframes. D) represented the rise of Microsoft. E) was dominated by IBM

Allowed computers to be customized to the specific needs

Which of the following is not an example of the consumerization of IT? A) Google Apps B) Dropbox C) Facebook D) Gmail E) Amazon Web Services

Amazon web services

Linux is: A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open-source software. D) especially useful for processing numeric data. E) poorly suited to power fast computers.

An example of open-source software

Data mining allows users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data warehouse.

Find hidden relationships in data

TRUSTe is an example of which of the following? A) Web beacon B) Behavioral targeting program C) Opt-out program D) Spyware E) Online seal program

Online seal program

Which type of software is created and updated by a worldwide community of programmers and available for free? A) Software packages B) Mashups C) Outsourced D) Open source E) Closed source

Open source

Software that manages the resources of the computer is called: A) operating system software. B) application software. C) data management software. D) network software. E) web services software.

Operating system software

The practice of contracting custom software development to an outside firm is commonly referred to as: A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.

Outsourcing

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. A) Copyright law B) Trademark law C) Patent law D) Trade secret protection E) Privacy law

Patent law

A DBMS makes the: A) physical database available for different logical views. B) relational database available for different logical views. C) physical database available for different analytic views. D) relational database available for different analytic views. E) logical database available for different analytic views

Physical database available for different logical views

The logical view of a database: A) displays the organization and structure of data on the physical storage media. B) includes a digital dashboard. C) allows the creation of supplementary reports. D) enables users to manipulate the logical structure of the database. E) presents data as they would be perceived by end users.

Presents data as they would be perceived by end users

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity

Primary key

Which of the following is a grouping of characters into a word, a group of words, or a complete number? A) File B) Table C) Entity D) Field E) Tuple

Field

MongoDB and SimpleDB are both examples of: A) open source databases. B) SQL databases. C) NoSQL databases. D) cloud databases. E) big data databases.

NoSQL databases

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.

Normalization

Which of the following tools enables users to view the same data in different ways using multiple dimensions? A) Predictive analysis B) SQL C) OLAP D) Data mining E) Hadoop

OLAP

In the context of data relationships, the term associations refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. E) relationships between different customers.

Occurrences linked to a single event

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

Profiling

In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.

Row

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): A) SOA. B) SLA. C) TCO. D) RFQ. E) SaaS.

SLA

Which of the following refers to a set of self-contained services that communicate with each other to create a working software application? A) Web services B) EAI software C) SOA D) SOAP E) Prepackaged software

SOA

Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL

SQL

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) FIP E) safe harbor

Safe harbor

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modality B) Scalability C) Expandability D) Disintermediation E) Customizability

Scalability

Which of the following is an example of a legacy system? A) Transaction processing system running on a mainframe B) Scalable grid computing system C) Web services running on a cloud computing platform D) MDM software E) Quantum computing system

Scalable grid computing system

In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select

Select, project and join

A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data? A) Text mining tools B) Sentiment analysis software C) Web mining technologies D) Data mining software E) Data governance software

Sentiment analysis software

In data mining, which of the following involves events linked over time? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

Sequences

Which of the following is not one of the techniques used in web mining? A) Content mining B) Structure mining C) Server mining D) Usage mining E) Data mining

Server mining

Which of the following is not an example of a wearable computing device? A) Smartwatch B) Smart glasses C) Smartphones D) Activity trackers E) Smart ID badges

Smartphones

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as: A) software packages. B) mashups. C) outsourced software. D) open-source software. E) service level agreements.

Software packages

Which of the following is not a method for performing a data quality audit? A) Surveying entire data files B) Surveying samples from data files C) Surveying data definition and query files D) Surveying end users about their perceptions of data quality E) Surveying managers about their perceptions of data quality

Surveying data definition and query files

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A) OLAP B) Text mining C) In-memory D) Clustering E) Classification

Text mining

Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT B) The entity CUSTOMER with the attribute PURCHASE C) The entity PRODUCT with the attribute PURCHASE D) The entity PRODUCT with the attribute CUSTOMER E) The entity PURCHASE with the attribute CUSTOMER

The entity CUSTOMER with the attribute PURCHASE

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

The golden rule

In a relational database, a record is referred to in technical terms as a(n): A) tuple. B) table. C) entity. D) field. E) key.

Tuple

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n): A) service-oriented architecture. B) on-demand architecture. C) multi-tiered client/server architecture. D) two-tiered client/server architecture. E) divided architecture.

Two-tiered client/server architecture

All of the following are current hardware platform trends except: A) green computing. B) virtualization. C) cloud computing. D) Unix. E) quantum computing.

Unix

OLAP enables: A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate summary reports.

Users to obtain online answers to ad-hoc questions in a rapid amount of time

________ are created by combining and customizing components from different online software applications. A) Apps B) Web browsers C) SaaS D) Web services E) Web mashups

Web mashups

Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as: A) web services. B) EAI software. C) SOA. D) SOAP. E) SaaS.

Web services

Which of the following would you use to find patterns in user interaction data recorded by a web server? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining

Web usage mining

Hardware and software acquisition costs account for about ________ percent of TCO. A) 20 B) 40 C) 50 D) 75 E) 90

20

Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases? A) Database server software B) Application server software C) Web browser software D) Data mining software E) Web server software

Application server software

In data mining, which of the following involves using a series of existing values to determine what other future values will be? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

Forecasting

Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A) OLAP B) Data warehouse C) Data mart D) Hadoop E) DBMS

Hadoop

A data warehouse is composed of: A) historical data from legacy systems. B) current data. C) internal and external data sources. D) historic and current internal data. E) historic external data.

Historic and current internal data

How would you determine the market demand for your firm's IT services? A) Perform a TCO analysis B) Benchmark your services C) Hold focus groups to assess your services D) Analyze sales returns on key investments E) Perform a stress test

Hold focus groups to assess your services

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast

Identify sequences

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot topped by a short mark. E) with a crow's foot topped by two short marks.

In two short marks

All of the following are issues with the traditional file environment except: A) data inconsistency. B) inability to develop specialized applications for functional areas. C) lack of flexibility in creating ad-hoc reports. D) poor security. E) data sharing.

Inability to develop specialized applications for functional areas

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy. B) data definition file. C) data quality audit. D) data governance policy. E) data policy.

Information policy

Which of the following statements about Linux is not true? A) It plays a major role in the back office running local area networks. B) It is available in free versions downloadable from the Internet. C) It has garnered 20 percent of the server operating system market. D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices. E) Linux works on all the major hardware platforms.

It has garnered 20 percent of the server operating system market

A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.

Key field

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A) Program-data dependence B) Lack of flexibility C) Poor security D) Lack of data sharing E) Data redundancy

Lack of flexibility

A ________ is an example of pre-digital data storage that is comparable to a database. A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet E) schedule of due dates on a project outline

Library card catalog

Which of the following is a DBMS for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange

Microsoft access

Which of the following is not one of the current software platform trends? A) Web services and service-oriented architecture B) Open-source software C) HTML5 D) Software outsourcing E) Multicore processors

Multicore processors

Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy

Redundancy

A(n) ________ represent data as two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS

Relational DBMS

Microsoft Access's data dictionary displays all of the following information about a field except the: A) size of the field. B) format of the field. C) description of the field. D) type of the field. E) the organization within the organization that is responsible for maintaining the data.

The organization within the organization that is responsible for maintaining the data

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A) Supply and demand B) Return on investment C) Breakeven point D) Cost-benefit analysis E) Total cost of ownership

Total cost of ownership

Which of the following is the foundation technology for web services? A) XML B) HTML C) SOAP D) UDDI E) SCSI

XML

________ provides a standard format for data exchange, enabling web services to pass data from one process to another. A) HTML B) HTML5 C) Java D) Chrome OS E) XML

XML

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? A) Your firm's business strategy B) The IT investments made by competitor firms C) Market demand for your firm's services D) Your firm's organizational culture E) Information technology assessment

Your firm's organizational culture

At what percent of capacity do most servers operate? A) 100% B) 80-90% C) approximately 70 percent D) 40-50% E) 15-20%

15-20%

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? A) A failure of Amazon's cloud computing service B) A failure of Netflix's recommendation engine software C) A blackout at Netflix's primary data center D) A hacking attack E) A bug in Netflix's credit card processing system

A failure of Amazon's cloud computing service

Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future. B) Use of a device installed in a car to analyze driving habits. C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. D) Use of computerized systems to filter and hire job applicants. E) Analyzing data from sensors installed in local parks to monitor soil moisture

Analyzing data from sensors installed in local parks to monitor soil moisture

Which of the following were involved in what has been called the patent trial of the century? A) Apple and Microsoft B) Apple and Hewlett-Packard C) Microsoft and Symantec D) Microsoft and Facebook E) Apple and Samsung

Apple and Samsung

A(n)________ is used to communicate between a user and an organization's back-end systems. A) public server B) private server C) legacy server D) application server E) blade server

Application server

All of the following are steps in the process for analyzing an ethical issue except: A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options

Assigning responsibility

Firms that allow employees to use their own devices are embracing which of the following? A) Wearable computing B) Mobile consolidation C) Cloud computing D) BYOD E) Self computing

BYOD

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles

Behavioral targeting

________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. A) Mainframes B) Rack servers C) Cloud servers D) Hybrid servers E) Blade servers

Blade servers

All of the following laws apply to actions by the federal government except the: A) Freedom of Information Act. B) Privacy Act. C) Computer Security Act. D) Children's Online Privacy Protection Act. E) E-Government Act.

Children's online privacy protection act

Which of the following is not a U.S. federal law affecting private institutions? A) COPPA B) HIPAA C) Gramm-Leach-Bliley Act D) Video Privacy Protection Act E) Computer Matching and Privacy Protection Act

Computer matching and privacy protection act

Interpretations of Moore's law assert that: A) computing power will eventually level off. B) transistors decrease in size 50% every two years. C) data storage costs decrease by 50% every 18 months. D) PCs decrease in market share by 9% every 5 years. E) computing power doubles every 18 months

Computing power doubles every 18 months

Which of the following protects the authors of a book from having their work copied by others? A) Patent protection B) Due process C) Copyright law D) Fair Use Doctrine E) Trade Secret law

Copyright law

Which of the following is the most common reason that business systems fail? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

Data quality

All of the following are technical solutions to protecting user privacy except: A) e-mail encryption. B) anonymous surfing. C) anonymous email. D) preventing client computers from accepting cookies. E) data use policies.

Data use policies

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A) CVS B) Technostress C) Digital divide D) RSI E) CTS

Digital divide

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system

Due process

CVS refers to: A) eyestrain related to computer display screen use. B) a business practice that attempts to evaluate the intangible values of computer systems. C) carpal vision syndrome. D) a type of antivirus protection software. E) wrist injuries brought about by incorrect hand position when using a keyboard.

Eyestrain related to computer display screen use

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A) firms should build products and services that protect privacy. B) firms should increase the transparency of their data collection. C) firms should require consumer consent and provide clear options to opt out of data collection. D) firms should limit the length of time that any personal data is stored to six months or less. E) consumers should be able to review and contest the accuracy and completeness of data.

Firms should limit the length of time that any personal data is stored to six months or less

Which of the following statements about Flash cookies is not true? A) Flash cookies are installed only at the user's request. B) Flash cookies are stored on the user's computer. C) Flash cookies cannot be easily detected or deleted. D) Flash cookies are sometimes called super cookies. E) Flash cookies can be installed whenever a person clicks a Flash video.

Flash cookies are installed only at the user's request

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A) Capacity planning B) Cloud computing C) Green computing D) Utility computing E) On-demand computing

Green computing

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act E) COPPA

HIPAA

The marketplace for computer hardware: A) has become increasingly concentrated in top firms. B) has expanded to include a wide variety of start-up and mobile-computing firms. C) has moved significantly to Asian firms. D) has been decimated by mobile and cloud computing. E) has begun moving away from blade servers.

Has become increasingly concentrated in top firms

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A) His action is acceptable because the grocer suffers the least harm. B) His action is acceptable, because the higher social value is the survival of the family. C) His action is wrong, because the man would not want the grocer to steal from him. D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E) His action is wrong, because the grocery store owner is harmed.

His action is acceptable, because the higher social value is the survival of the family

SaaS refers to: A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) self-contained services that communicate with each other to create a working software application. D) easy-to-use software tools for displaying Web pages. E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis

Hosting and managing access to software applications delivered over the internet to clients on a subscription basis

Which of the following best describes Immanuel Kant's categorical imperative? A) If an action cannot be taken repeatedly, then it is not right to be taken at any time. B) One should take the action that produces the least harm or incurs the least cost. C) One can put values in rank order and understand the consequences of various courses of action. D) If an action is not right for everyone to take, it is not right for anyone to take. E) You should act towards others as you would like them to act towards you.

If an action is not right for everyone to take, it is not right for anyone to take

The ethical "no free lunch" rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

Which of the following is not one of the current key technology trends that raises ethical issues? A) Data storage improvements B) Data analysis advancements C) Increase in data quality D) Increase in use of mobile devices E) Advances in networking technology

Increase in data quality

Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.

Increases in efficiency may be accompanied by job losses

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? A) Property rights and obligations B) System quality C) Accountability and control D) Quality of life E) Information rights and obligations

Information rights and obligations

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed

It blurs the traditional boundaries between work and family time

Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.

It has a ripple effect, raising new ethical, social and political issues

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule E) The slippery-slope rule

Kant's categorical imperative

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A) Slippery-slope rule B) Lemming rule C) High-failure cost rule D) Utilitarian principle E) Golden Rule

Slippery-slope rule

Which of the following is the most popular mobile operating system? A) Linux B) Android C) Chrome OS D) iOS E) Unix

Linux

Which of the following is not protected by copyright law? A) Musical compositions B) Motion pictures C) Maps D) Artwork E) Machines

Machines

________ states that the value or power of a network grows exponentially as a function of the number of network members. A) Metcalfe's Law B) Moore's Law C) Law of scalability D) Law of outsourcing E) Law of networks

Metcalfe's law

A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A) multicore processor B) legacy processor C) scalable processor D) aggregate circuit E) green circuit

Multicore processor

________ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard. A) Hypertouch B) Nanotech C) Multitouch D) Linux E) Scalable

Multitouch

FIP principles are based on a belief in which of the following? A) Accountability of the record holder B) Responsibility of the record holder C) Mutuality of interest between the record holder and the individual D) Privacy of the individual E) Difference between the interests of the individual and commercial organizations

Mutuality of interest between the record holder and the individual

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? A) HIPAA B) FIP C) NORA D) COPPA E) Spyware

NORA

________ uses individual atoms and molecules to create computer chips and other devices. A) Virtualization B) Nanotechnology C) Quantum computing D) A minicomputer E) On-demand computing

Nanotechnology

What percent of global Internet users use Google Search and other Google services? A) Less than 10 percent B) Around 25 percent C) About 50 percent D) Nearly 80 percent E) Over 90 percent

Nearly 80 percent

When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web

On the hard drive of the visitor's computer

The NAI is an industry association formed to help with which of the following? A) Copyright protection B) Online privacy issues C) Patent protection D) Trademark protection E) Trade secret protection

Online privacy issues

Which of the following is not an IT infrastructure service component? A) Operating system software B) Computing platforms to provide a coherent digital environment C) Physical facilities management to manage the facilities housing physical components D) IT management services to plan and develop the infrastructure and provide project management E) IT education services that provide training to employees

Operating system software

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor

Opt-out

Which of the following is not a file-sharing service? A) The Pirate Bay B) Megaupload C) Morpheus D) Pandora E) Grokster

Pandora

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? A) Property rights and obligations B) System quality C) Accountability and control D) Information rights and obligations E) Quality of life

Property rights and obligations

Which of the five moral dimensions of the information age does spamming involve? A) Quality of life B) System quality C) Accountability and control D) Information rights and obligations E) Property rights and obligations

Property rights and obligations

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A) Family and home B) Property rights and obligations C) System quality D) Accountability and control E) Quality of life

Quality of life

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: A) co-location. B) edge computing. C) grid computing. D) utility computing. E) quantum computing

Quantum computing

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? A) CTS B) CVS C) RSI D) Technostress E) RSS

RSI

Which of the following is not one of the NIST defined characteristics of cloud computing? A) Ubiquitous network access B) Location-independent resource pooling C) On-demand self service D) Measured service E) Reduced elasticity

Reduced elasticity

________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials E) European ISPs

Regulated common carriers

The U.S. CAN-SPAM Act: A) makes spamming illegal. B) requires commercial email senders to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.

Requires commercial email senders to identify themselves

________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty

Responsibility

Which of the following statements about spam is not true? A) Most spam originates from bot networks. B) Cell phone spam usually comes in the form of SMS text messages. C) Spam costs for business are very high. D) Spamming has mushroomed because it is so inexpensive and can reach so many people. E) Spamming is more tightly regulated in Europe than in the United States.

Spamming is more tightly regulated in Europe than in the United States

Specifications that establish the compatibility of products and the ability to communicate in a network are called: A) network standards. B) telecommunications standards. C) technology standards. D) Internet standards. E) compatibility standards

Technology standards

Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A) Networking B) Telephone C) VOIP D) Telecommunications E) Data management

Telecommunications

"Look and feel" copyright infringement lawsuits are concerned with: A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product. E) violation of a monopoly on the ideas behind a product.

The distinction between an idea and its expression

Which of the following is not true about the changes to EU data protection rules proposed in 2012? A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. B) The new rules would require Internet companies to delete information at the user's request. C) The new rules would require Internet companies to retain information only as long as absolutely necessary. D) The new rules would reject the right to be forgotten. E) The new rules would apply only to all companies providing services in Europe.

The new rules would reject the right to be forgotten

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A safe harbor B) The opt-in model C) FIP principles D) P3P E) The opt-out model

The opt-in model

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? A) The Privacy Act B) The Gramm-Leach-Bliley Act C) The Freedom of Information Act D) COPPA E) HIPPA

The privacy act

Which of the following is not a difficulty in establishing patent protection? A) Length of time required to receive protection B) The requirement that the work reflect some special understanding and contribution C) The requirement that the work must be original D) The requirement that the work must be novel E) The requirement that the work must be a secret

The requirement that the work must be a secret

According to ________, you should take the action that produces the least harm. A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

The risk aversion principle

In a multi-tiered network: A) the work of the entire network is centralized. B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers. D) processing is handled by multiple, geographically-remote clients. E) processing is located in the cloud.

The work of the entire network is balanced over several levels of servers

Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.

They result in new situations that are not covered by old laws

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A) Copyright B) Patent C) All forms of intellectual property protection D) Trademark E) Trade secret

Trade secret

Which of the following is a multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms? A) Unix B) Linux C) OS X D) COBOL E) DOS

Unix

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A) Cloud computing B) Autonomic computing C) Virtualization D) Multicore processing E) Ubiquitous computing

Virtualization

All of the following are cloud computing services except: A) infrastructure as a service. B) platform as a service. C) software as a service. D) on-demand computing. E) virtualization as a service

Virtualization as a service

Which of the following is a recent addition to the mobile digital platform? A) Quantum computing devices B) Wearable computing devices C) Cloud computing devices D) Grid computing devices E) Green computing devices

Wearable computing devices

The FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there must be a mechanism in place to enforce FIP principles. D) consumers should be able to review the data collected about them. E) websites must disclose their information practices before collecting data.

Websites must disclose their information practices before collecting data

Which of the following factors does not help explain why computing resources today are even more available than in previous decades? A) Network economics B) Law of mass digital storage C) Moore's law D) Declining communications costs and the Internet E) Widespread rejection of technology standards

Widespread rejection of technology standards

Which of the following became the standard PC in the Personal Computer Era? A) Wintel PC B) DOS PC C) MITS PC D) Altair E) Apple II

Wintel PC

A SAN is a ________ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement

storage area


Ensembles d'études connexes

Chapter 1: Evolution of the fire apparatus

View Set

Virtual ATI: Pharmacology Therapies

View Set

unit 3: Psychosocial Concepts/Sexuality/Cultural

View Set

Descubre 1: Chapter 5 (direct object pronouns)

View Set

Heterogeneity and cancer stem cells

View Set

APUSH Chapter 19 Vocabulary and People

View Set

Chapter 28 (EGW) Child, Older Adult, and Intimate Partner Abuse

View Set

D8-Business Continuity and Disaster Recovery Planning

View Set

MGT 2013 Chapter 7 - Individual & Group Decision Making

View Set