Ch.6 - 10 correct cis

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India.

1.5:1

Offshore demand is driving up salaries in India by roughly how much per year

15 percent

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.

25 years

Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?

45 percent

Congress has set the number of H-1B visas to be granted at _____ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees.

65,000

how many H-1B visas has congress set as the maximum amount of to be granted yearly

65000

Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020?

750,000 new jobs are expected to be added to IT related positions.

Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim?

Cyberstalking

A comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization is known as which of the following?

EHR

The _____ was established to promote a common code of conduct for the electronics and ICT industry.

Electronic Industry Citizenship Coalition

The _____ was established to promote a common code of conduct for the electronics and communications technology industry.

Electronic Industry Citizenship Coalition

_____ is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

Electronic Product Environmental Assessment Tool

The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging

European Union's Restriction of Hazardous Substances Directive

The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging.

European Union's Restriction of Hazardous Substances Directive

1. The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.

F

14. A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.

F

15. Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.

F

17. The term of copyright has been extended several times from its original limit of 25 years to 35 years.

F

18. A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

F

19. The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.

F

2. Formulas, inventions, and processes are not considered forms of intellectual property.

F

21. Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding non-compete clauses to employment contracts.

F

22. Reverse engineering can only be applied to computer hardware, not computer software.

F

3. Industrial espionage and competitive intelligence are essentially the same.

F

4. Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.

F

8. The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.

F

Which of the following is currently the most popular social network destination worldwide?

Facebook

A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years.

False

After a worker's H-1B visa expires, the foreign worker must remain outside the United States for six years before another H-1B will be approved.

False

Computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans.

False

Contingent work is a job situation in which an individual has an implicit contract for long-term employment.

False

Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs.

False

Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.

False

If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.

False

In hospital-related settings, implementing CPOE is associated with a 10 percent decline in preventable adverse drug effects.

False

In the early days of IT in the 1960s, productivity improvements were difficult to measure.

False

It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.

False

It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms.

False

Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.

False

Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.

False

Live telemedicine requires the presence of patients and healthcare providers at the same site.

False

Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.

False

Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.

False

Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts, and recommendations.

False

Quotation marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.

False

Social networking Web sites are used strictly to communicate with your friends, family members, and colleagues.

False

The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

False

The U.S. Congress has approved the granting of an unlimited number of H-1B visas.

False

The United States has several federal laws prohibiting the export of toxic waste.

False

The cost advantage of offshore outsourcing to India is continuing to increase.

False

The deciding factor in whether workers are considered contractors is the agreement signed by the workers, not the degree of control the company exercises over them.

False

The information in an EHR is not easily shared with others outside of the healthcare organization where the data originated.

False

The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment.

False

There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT workers.

False

Today most radiologists employ a personal health record system to review cases from a remote location.

False

Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers.

False

Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded.

False

The qui tam provision of the _____ allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.

False Claim Act

The _____, also known as the Lincoln Law, was enacted to combat fraud by companies that sold supplies to the Union Army.

False Claims Act

The environmental activist organization _____ issues a quarterly ranking of the top manufacturers of personal computers, mobile phones, TVs, and game consoles according to the manufacturers' polices on toxic chemicals, recycling, and climate change.

Greenpeace

A(n) _____ visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations.

H-1B

what type of visa is a temporary worker visa granted by US citizenship and immigration services for people who work in specialty accupations

H-1B

which country is considered one of the best sources of programing skills outside of Europe and North American

India

which company has been able to achieve EPEAT'S GOLD level by using increasing amounts of recycled plastics in their product development

Lenova

Which of the following is currently the world's largest professional network?

LinkedIn

Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?

Live telemedicine

_____ is the most common charge in qui tam cases.

Mischarging

_____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country.

Offshore outsourcing

what term is used to identify a form of outsourcing in which services are provided by an organization whose employees are in a foreign country

Offshore outsourcing

What is the name of the project at the Georgia Institute of Technology that uses stories to teach human values to robots?

Quixote

Which of the following helps physicians keep tabs on patients prone to life-threatening health crises?

Remote monitoring

Which of the following involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider?

Remote monitoring

Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile?

Snapchat

Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services?

Social Media Marketing

The _____ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.

Statement on Auditing Standards No. 70

Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation?

Store-and-forward telemedicine

10. The The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement.

T

11. Copyright law protects authored works such as art, books, and film.

T

12. The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members.

T

13. The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and implements two 1996 WIPO treaties.

T

16. The main body of law that governs patents is contained in Title 35 of the U.S. Code.

T

20. A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.

T

23. Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.

T

24. Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.

T

25. A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.

T

5. The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement.

T

6. Software, video games, multimedia works, and Web pages can all be copyrighted.

T

7. Defining and controlling the appropriate level of access to intellectual property are complex tasks.

T

9. Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights.

T

Which of the following technologies employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration?

Telehealth

A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system.

True

A computerized provider order entry (CPOE) system enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.

True

A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.

True

A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.

True

A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case.

True

According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-granting computer science departments has declined dramatically from 2004 to 2009.

True

An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers.

True

Clinical decision support (CDS) is a process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery.

True

Coca-Cola has been able to create a highly popular Facebook fan page to promote its image and brands.

True

Companies can use the Statement on Auditing Standards No. 70, Service Organizations to ensure that company data is protected in an outsourcing arrangement.

True

Cyberstalking can escalate into physical stalking and even physical assault.

True

Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies.

True

Different types of social media are blogs, discussion forums, media-sharing networks, wikis, social bookmarking tools, social messaging apps, and social networking, news, and shopping platforms.

True

If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press.

True

In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.

True

Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn."

True

Machine learning has contributed to the development of a much more in-depth understanding of the human genome as well as practical speech recognition, improved web search results, and self-driving cars.

True

More advanced artificial-intelligence-based clinical decision support systems can help doctors choose the proper dosage levels of medication based on a patient's most recent tests results.

True

Natural language processing is an aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English.

True

Remote monitoring involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider.

True

Since businesses implemented automated payroll systems, fewer accounting employees are needed.

True

Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation.

True

The EICC was established to promote a common code of conduct for the electronics and ICT industry.

True

The European Union's Restriction of Hazardous Substances Directive restricts the use of many hazardous materials in computer manufacturing.

True

The development and use of new medical technology, such as new diagnostic procedures and treatments, also contributes to the increase in healthcare spending per person.

True

The standard of living varies greatly among groups within a country as well as from nation to nation.

True

There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions.

True

To be classified as a truly green PC, the PC must meet other criteria than simply use less electricity to run than the standard computer.

True

When an organization decides to use contingent workers for a project, it is making a trade-off between completing a single project quickly and cheaply versus developing people within its own organization.

True

A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called _____.

a coemployment relationship

a situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called

a coemployment relationship

Which of the following is NOT one of the three major components of machine learning systems?

a function

what term is used to refer to a work environment in which temporary positions are command and organization contract with independent workers for short term engagements

a gig economy

An electronic medical record includes which of the following?

a patient's immunization records

Software quality is defined as the degree to which a software product meets: a) the needs of its users b) the standards of competitors c) sustainability and environmental protection needs d) the minimum financial return standards

a) the needs of its users

In one lawsuit in the early _____ , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems. a. 1990s b. 1980s c. 1970s d. 1960s

a. 1990s

Companies applying for H-1B visas must offer a wage that is not _____ less than the average salary for the occupation. a. 5% b. 10% c. 15% d. 20%

a. 5%

43. Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts? a. ACPA b. PRO-IP Act c. Economic Espionage Act d. CAN-SPAM Act

a. ACPA

The _____ was established to promote a common code of conduct for the electronics and ICT industry. a. Electronic Industry Citizenship Coalition b. European Union's Restriction of Hazardous Substances c. Electronic Produce Environmental Assessment Tool d. Consumer Electronics Association

a. Electronic Industry Citizenship Coalition

A(n) ____ visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations. a. H-1B b. L-1 c. B-1 d. B-2

a. H-1B

55. Which of the following terms is used to describe the act of stealing someone's ideas or words and passing them off as one's own? a. Plagiarism b. Cybersquatting c. Reverse engineering d. Patent trolling

a. Plagiarism

45. Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations? a. TRIPS agreement b. DMCA c. PRO-IP Act d. WIPO Copyright Agreement

a. TRIPS agreement

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for ____. a. breach of warranty b. comparative negligence c. contributory negligence d. strict liability

a. breach of warranty

One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process called _____ a. dynamic testing b. user acceptance testing c. integration testing d. static testing

a. dynamic testing

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____for file servers. a. high-volume data storage b. low-volume data storage c. unpredictable-volume data storage d. irregular-volume data storage

a. high- volume data storage

A disadvantage of using contingent workers is that they _____. a. may pass on information about corporate processes and strategies to subsequent clients who could be competitors b. may attempt to form a union c. can demand payment for health insurance and retirement benefits d. create the need to hire new employees when staffing needs increase

a. may pass on information about corporate processes and strategies to subsequent clients who could be competitors

. The United States has _____ federal law(s) protecting against the export of toxic waste. a. no b. just one c. two d. several

a. no

39. What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time? a. noncompete agreement b. license agreement c. nondisclosure agreement d. union agreement

a. noncompete agreement

Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect product ____. a. quality b. delivery c. testing d. development

a. quality

The _____ of the False Claims Act allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds. a. qui tam provision b. Affordable Care Act c. Foreign Corrupt Practices Act d. roving wiretap provision

a. qui tam provision

___ is the probability of an undesirable event occurring times the probability that the event would go undetected times the magnitude of the event's consequences if it does happen. a. risk b. redundancy c. liability d. certainty

a. risk

____ refers to methods within the development cycle that guarantee reliable operation of the product. a. Software quality assurance b. Software development methodology c. Software documentation d. Software project management

a. software quality assurance

The False Claims Act was enacted during . a. the U.S. Civil War b. World War I c. World War II d. the Vietnam War

a. the U.S. Civil War

Software quality is defined as the degree to which a software product meets: a. the needs of its users. b. the standards of its competitors. c. sustainability and environmental protection needs. d. the minimum financial return standards.

a. the needs of its users

Which of the following activities is least suited for automation?

activities associated with managing others

marketers can create an opportunity to generate a conversation with viewers of the message and messages can be targeted to reach a specific demographic group

advantages of social media marketing

Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers?

artificial intelligence

Which of the following systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that simulate human intelligence processes?

artificial intelligence systems

The EICC has developed a(n) _____ for member organizations in which areas of improvement are assessed by certified, third-party firms.

audit program

character in the form or a human, animal, or mythical creature

avatar

Because wages in the IT field vary greatly, unethical companies can get around the _____.

average salary requirement

26. In what year was The Digital Millennium Copyright Act (DMCA) signed into law? a. 1992 b. 1998 c. 1990 d. 1996

b. 1998

___ involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. a. Integration testing b. Black-box testing c. User acceptance testing d. Static testing

b. Black-box testing

40. Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use? a. TRIPS Agreement b. Digital Millennium Copyright Act (DMCA) c. WIPO Copyright Treaty d. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

b. Digital Millennium Copyright Act (DMCA)

N-version programming is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements times, where N could be 2, 3, 4, or more. a. N+1 b. N c. N+2 d. N+3

b. N

44. Which of the following was a legislator and former singer and entertainer who co-sponsored the Copyright Term Extension Act? a. Frank Sinatra b. Sonny Bono c. Dean Martin d. Sammy Davis Jr.

b. Sonny Bono

28. Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets? a. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Actb. Agreement on Trade-Related Aspects of Intellectual Property Rights b. The Economic Espionage Act (EEA) of 1996 c. The Lanham Act

b. The Economic Espionage Act (EEA) of 1996

Which of the following is a true statement about the number of declared undergraduate computer science majors at doctoral-granting computer science departments? a. There was an increase in enrollment in spite of the forecast for a decreased number of workers in this field. b. There was a 50% decline in degrees awarded between 2004 and 2009. c. There has been a steady decline in enrollment for the past twelve years. d. The level of enrollment has remained about the same for the past ten years.

b. There was a 50% decline in degrees awarded between 2004 and 2009.

____ is common in airplane and spacecraft control systems. a. Structured programming b. Triple version programming c. Object programming d. Root programming

b. Triple version programming

33. A patent is a grant of a property right issued by which entity? a. USPS b. USPTO c. FTC d. SEC

b. USPTO

The lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime. a. McClain v. Hewlett-Packard b. Vizcaino v. Microsoft c. Wainwright v. IBM d. Brown et al v. Oracle

b. Vizcaino v. Microsoft

A type of business system is the ____ , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio. a. upgrade management system b. decision support system c. executive information system d. data information system

b. decision support system

47. The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following? a. nondisclosure clause b. open source license c. patent protection d. copyright term

b. open source license

The _____ in Egypt reduced the attractiveness of that country as a source of IT outsourcing. a. spike in oil prices b. political unrest c. limited number of resources d. lack of education

b. political unrest

51. Cybersquatters: a. frequently launch denial-of-service attacks against popular Web sites b. register domain names for famous trademarks or company names to which they have no connection c. remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service d. employ phishing tactics using the domain names of popular Web sites

b. register domain names for famous trademarks or company names to which they have no connection

A ____ is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software. a. software guide b. software development methodology c. software manual d. software project management

b. software development methodology

46. Which of the following claims as its invention some feature or process embodied in instructions executed by a computer? a. trade secret b. software patent c. cross-licensing agreement d. patent infringement

b. software patent

When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may require help with _____. a. finding adequate housing b. their English c. obtaining a driver's license d. dealing with financial institutions

b. their English

_____ are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output. a) Management information systems b) Decision support systems c) Business information systems d) Data information systems

c) Business information systems

Which of the following is true of software testing? a) White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. b) Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in whitebox testing, are known. c) Static testing involves software programs called static analyzers which are run against new code d) Integration testing involves independent testing that is performed by trained end users to ensure that the system operates as they expect.

c) Static testing involves software programs called static analyzers which are run against new code

In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as ____. a. $5000 b. $7000 c. $2500 d. $9500

c. $2500

Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020? a. Business is facing a long-term excess of trained and experienced IT workers. b. Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions. c. 750,000 new jobs are expected to be added to IT related positions. d. IT firms are more likely to turn to traditional sources than nontraditional sources to find IT workers.

c. 750,000 new jobs are expected to be added to IT related positions

The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging. a. Electronic Industry Citizenship Coalition Directive b. Greenpeace Environmental Restriction of Hazardous Substances c. European Union's Restriction of Hazardous Substances Directive d. Electronic Product and Environmental Hazards Restriction Directive

c. European Union's Restriction of Hazardous

____ . is an important technique used to develop ISO 9001-compliant quality systems. a. DO-178B/EUROCCAE ED-128 b. N-version programming c. Failure mode and effects analysis (FMEA) d. Capability Maturity Model Integration (CMMI)

c. Failure mode and effects analysis (FMEA)

41. Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances? a. Plagiarism b. Copyright infringement c. Fair use doctrine d. Use of prior art

c. Fair use doctrine

____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country. a. Consulting b. Employee leasing c. Offshore outsourcing d. Employing H-1B workers

c. Offshore outsourcing

29. The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following? a. Plagiarism b. Patent infringement c. Reverse engineering d. Decompiling

c. Reverse engineering

Before a company can apply for an H-1B visa worker, it must file _____. a. a statement of intent to hire a foreign worker b. a petition to hire an H-1B worker c. a Labor Condition Application d. a visa request with the U.S. Citizenship and Immigration Services

c. a Labor Condition Application

A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called . a. contingent employment b. employee leasing c. a coemployment relationship d. outsourcing

c. a coemployment relationship

The EICC has developed a(n) ______ for member organizations in which areas of improvement are assessed by certified, third-party firms. a. application b. governing body c. audit program d. mandate

c. audit program

54. Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following? a. prior art b. industrial espionage c. competitive intelligence d. trade secrets

c. competitive intelligence

Electronic Product Environmental Assessment Tool (EPEAT) is a system that enables purchasers to evaluate,compare, and select electronic products based on a total of 51 _____ criteria. a. economic b. performance c. environmental d. ethical

c. environmental

The safety engineer uses a logging and monitoring system to track ____ from a project's start to its finish. a. standards b. objectives c. hazards d. deliverables

c. hazards

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using _____. a. system testing b. black-box testing c. integration testing d. static testing

c. integration testing

After a worker's H-1B visa expires, the foreigner must _____. a. return to school to get an advanced degree before applying for another H-1B visa b. apply to become a U.S. citizen c. remain outside the United States for one year before another H-1B petition will be approved d. never again apply for an H-1B visa

c. remain outside the United States for one year before another H-1B petition will be approved

An H-1B worker can work for a U.S. employer for a maximum continuous period of ____ years. a. two b. four c. six d. eight

c. six

_____ means that the defendant is held responsible for injuring another person, regardless of negligence or intent. a. Contributory negligence b. Misrepresentation c. Strict liability d. Breach of warranty

c. strict liability

32. Copyright and patent protection was established through which of the following? a. the Bill of Rights b. the U.S. Federal Codes and Statutes c. the U.S. Constitution d. various state laws

c. the U.S. Constitution

The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____ . a. how many hours per week they are asked to work b. who oversees their work c. the degree of control the company exercises over the employees d. who performs their performance appraisal

c. the degree of control the company exercises over the employees

50. Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's? a. trade secret b. watermark c. trademark d. earmark

c. trademark

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____. a. relocation expenses b. start-up costs c. training costs d. travel expenses

c. training costs

Software suppliers frequently write ____ to attempt to limit their liability in the event of nonperformance. a. manuals b. warnings c. warranties d. sureties

c. warranties

An H-1B visa is a temporary visa granted for people who _______. a. only work in the IT field b. were educated outside the U.S. and wish to work in the U.S. c. work in specialty occupations that require at least a four-year bachelor's degree d. were born and educated outside the U.S. but have relatives living in the U.S.

c. work in specialty occupations that require at least a four-year bachelor's degree

The National Center for Victims of Crime advises victims to: send the stalker a written notice that their contact is unwanted and that further contact should ____

cease

A process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge to improve healthcare delivery is known as which of the following?

clinical decision support

the majority of people hired with H1B visas in 2015 were hired primarily as which of the following positions

computer programmers and system analysts

What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?

computerized provider order entry (CPOE) system

One of the fundamental ways in which companies can try directly to increase productivity is by:

consolidating operations to better leverage economies of scale

billed on a per click basis; no charge when an ad is displayed but not clicked on

cost per click

billed at a flat rate per 1,000 impressions (a measure of the number of times an ad is displayed_ - whether or not it was clicked

cost per thousand impressions

IT investments may produce tangible results such as:

cost savings

any form of mistreatment, both physical and mental, based on the use of an electronic communications device, that causes harm and distress to others

cyberabuse

a form of cyberabuse in which the abusive behavior is humiliating, hurtful, intimidating, malicious, or otherwise offensive to an individual or group of individuals and causes substantial emotional distress

cyberbullying

Someone keeps sending you instant messages after you have asked them to stop.

cyberharassment

a form of cyberabuse that consists of a long term pattern of unwanted, persistent pursuit and intrusive behavior that is directed by one person against another and that causes feat and distress to the vicitim

cyberstalking

Products, such as statements of requirements, flowcharts, and user documentation, are known as ______. a) project systems b) information systems c) objects d) deliverables

d) deliverables

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the _______ maturity level. a) quantitatively managed b) managed c) defined d) initial

d) initial

The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India. a. 4.5:1 b. 3.0:1 c. 2.0:1 d. 1.5:1

d. 1.5:1

In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is ___. a. 5.8 b. 25.7 c. 38.9 d. 22.1

d. 22.1

Congress has set the number of H-1B visas to be granted at _____per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees. a. 55,400 b. 30,000 c. 71,000 d. 65,000

d. 65,000

37. Which of the following established the minimum levels of protection that each country must provide to all WTO members? a. World Trade Organization (WTO) b. Digital Millennium Copyright Act (DMCA) c. The World Intellectual Property Organization (WIPO) d. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

d. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

. After an organization decides to adopt ____, it must conduct an assessment of its software development practices to determine where they fit in the capability model. a. QA b. software development methodology c. software quality management d. CMMI-DEV

d. CMMI-DEV

35. Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them? a. Time Warner Cable system b. RIAA c. DeCSS d. Content Scramble System (CSS)

d. Content Scramble System (CSS)

49. The standard serves many industries and organizations as a guide to quality products, services, and management. a. ISO 7498-4 b. ISO 9595/DAM 1 c. ISO 9596 d. ISO 9001

d. ISO 9001

According to A.T. Kearney, the most attractive offshoring destination is _____. a. China b. Egypt c. Mexico d. India

d. India

Which of the following is true of the International Organization for Standardization? a. It is an American organization founded in 2001. b. The ISO 9000:2007 provides a set of standardized requirements for a quality management system. c. It issued the 9000 series of business standards in 1987. d. It is a worldwide federation of national standards bodies from 161 countries

d. It is a worldwide federation of national standards bodies from 161 countries

53. Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to-file" system? a. Economic Espionage Act b. Lanham Act c. Uniform Trade Secrets Act d. Leahy-Smith America Invents Act

d. Leahy-Smith America Invents Act

30. Which of the following terms is defined as the existing body of knowledge available to a person of ordinary skill in the art? a. Prior experience b. Known facts c. Body of practice d. Prior art

d. Prior art

36. Which of the following increased trademark and copyright enforcement and substantially increased penalties for infringement? a. Digital Millennium Copyright Act (DMCA) b. General Agreement on Tariffs and Trade c. Agreement on Trade-Related Aspects of Intellectual Property Rights d. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

d. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

The ______ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement. a. CMMI b. Sarbanes-Oxley Act of 2002 c. Foreign Corrupt Practices Act d. Statement on Auditing Standards No. 70

d. Statement on Auditing Standards No. 70

Which of these statements about contingent workers is true? a. They typically work as a separate, independent group of workers and move from project to project working for the same firm. b. They are often paid a lower hourly wage than full-time employees doing equivalent work. c. They are eligible for most company benefits such as vacation, sick pay, and medical insurance. d. They have neither an explicit nor an implicit contract for continuing employment.

d. They have neither an explicit nor an implicit contract for continuing employment.

34. Which act was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law? a. The Economic Espionage Act (EEA) b. Defend Trade Secrets Act (DTSA) c. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act d. Uniform Trade Secrets Act (UTSA)

d. Uniform Trade Secrets Act (UTSA)

The company with the highest 2010 rating by Greenpeace based on its policies on toxic chemicals, recycling, and climate change was . a. Apple b. Dell c. Hewlett Packard d. Wipro

d. Wipro

38. Which of the following can read the machine language of a software program and produce the source code? a. compiler b. open source decoder c. re-engineering device d. decompiler

d. decompiler

52. The courts have ruled in favor of using reverse engineering to: a. allow the domination of a particular software market by a single manufacturer b. provide access to protected elements of an original work c. circumvent restrictive trade secrets d. enable interoperability

d. enable interoperability

_____ can be oral, written, or inferred from the seller's conduct. a. Indemnity b. Strict liabilities c. Warranty tolling d. Express warranties

d. express warranties

31. How many classes of items did the U.S. Supreme Court rule could not be patented? a. two b. three c. four d. five

d. five

27. Patent law protects which of the following? a. art and film b. information critical to an organization's success c. books d. inventions

d. inventions

42. One of the tests that an invention must pass to be eligible for a patent is which of the following? a. it must be a machine b. it must not be economical to produce c. it must be capable of providing economic benefit d. it must be obvious to a person having ordinary skill in the same field

d. it must be obvious to a person having ordinary skill in the same field

When sued for ____ , a software supplier is not held responsible for every product defect that causes customer or third-party loss. a. breach of warranty b. misrepresentation c. strict liability d. negligence

d. negligence

48. Firefox and OpenOffice are all examples of which of the following? a. Web browsers b. utility software c. products developed through re-engineering d. open source software

d. open source software

49. One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is: a. the time limitation for a trade secret is longer than for patents and copyrights b. no royalties must be paid on trade secrets c. trade secrets can become part of the prior art and be used to protect patents and copyrights d. there is no need to file an application or disclose a trade secret to gain protection

d. there is no need to file an application or disclose a trade secret to gain protection

One potential disadvantage of using contingent workers is that ______. a. the costs for their health care, paid time off, and contributions to a retirement plan can be considerable b. the company may have to adjust the number of contingent workers that it uses to meet business needs c. there can be substantial training expenses d. they may not feel a strong connection to the company for which they are working

d. they may not feel a strong connection to the company for which they are working

An example of robotics can be found in which of the following examples?

device used to move heavy pallets

refers to the media exposure an organization gets through press and social media mentions, positive online ratings and reviews, tweets and retweets, and reposts or shares

earned media

In which of the following practices does a business transfer all or part of its workforce to another firm, which handles all human resource realted activities and costs

employee leasing

Offshore outsourcing is a form of outsourcing in which the services are provided by an organization whose _____.

employees are in a foreign country

Electronic Product Environmental Assessment Tool (EPEAT) is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 _____ criteria.

environmental

The EICC has established a code of conduct that defines performance, compliance, auditing, and reporting guidelines across five areas of social responsibility: labor, health and safety, environment, management system, and _____.

ethics

. Software defects are commonly lethal and many personal injuries are related to software failures.

false

A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years

false

After a worker's H-1B visa expires, the foreign worker must remain outside the United States for six years before another H-1B will be approved.

false

Contingent work is a job situation in which an individual has an implicit contract for long-term employment.

false

If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.

false

In integration testing, special software programs called static analyzers are run against the new code

false

In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log

false

In the context of maturity level distribution across a large sample of organizations, the percentage of organizations at the initial maturity level is 36.

false

It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.

false

Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.

false

Software developers do not typically work closely with safety and software engineers.

false

Software product litigation first occurred in 2000.

false

Temporary employees must be treated like official employees of the company and are eligible for vacation, sick pay, and retirement benefits.

false

The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

false

The U.S. Congress has approved the granting of an unlimited number of H-1B visas.

false

The United States has several federal laws prohibiting the export of toxic waste.

false

The cost advantage of offshore outsourcing to India is continuing to increase

false

The deciding factor in whether workers are considered contractors is the agreement signed by the workers, not the degree of control the company exercises over them.

false

The first release of a software product typically meets all its users' expectations

false

The impact of software defects is always trivial.

false

There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT worker

false

There is no federal product liability law

false

Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers.

false

Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded.

false

When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology

false

When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing

false

When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.

false

the goal of which of the following was to entice whistle- blowers to come forward by offering them a share of the money recovered

false claims Act

Researchers have found that it can take how long for IT investment to result in a significant increase in productivity?

five to seven years

after a six year H-1B visa expire a foreign professional can convert covert their H1B visa into which of the following

green card

Successful outsourcing projects require day-to-day interaction between software development and business teams, so it is essential for the hiring company to take a(n) _____ approach to project management.

hands-on

Which process can reduce expensive redundant tests that are ordered because one provider does not have access to the clinical information stored at another provider's location?

health information exchange

Remote monitoring is also known as which of the following?

home monitoring

what classification is given to an individual who provide services to another individual organization according to terms defined i a written

independent contractor

Innovation is a key factor in productivity improvement. Which of the following has played an important role in enabling innovation?

information technology

Most ethical companies make hiring decisions based on how well an applicant fulfills the _____.

job qualifications

A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services is known as which of the following?

labor productivity

As more businesses move their key processes offshore, U.S. IT service providers are forced to _____ in order to compete.

lower prices

What type of artificial intelligence involves computer programs that can learn some task and improve performance with experience?

machine learning

It is difficult to quantify how much the use of IT has contributed to worker productivity because:

many other factors influence worker productivity rates besides IT

multiplayer video game capable of supporting hundreds and even thousands of concurrent players. accessible via the internet, with players using personal computers, or game consoles.

massively multiplayer online game

A disadvantage of using contingent workers is that they _____.

may pass on information about corporate processes and strategies to subsequent clients who could be competitors

The primary areas where IT has been applied include all of the following except:

medical language processing

is a subcategory of mmog that provides a huge online world in which players take on the role of a character and control that characters action

multiplayer online role playing games

Which aspect of artificial intelligence involves technology that allows computers to understand, analyze, manipulate, and/or generate English?

natural language processing

The United States has _____ federal law(s) protecting against the export of toxic waste.

no

shared multi media computer generated environment in which users represented as avatars, can act, communicate, create, retain ownership of what they create and exchange assets, including currency, with each other.

online virtual world

Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts?

organic media marketing

employs tools tailored for a particular social media platform to build a social community and interact with it

organic media marketing

involves paying third party to broadcast an organizations display ads or sponsored messages to social media users

paid media marketing

What is another name for a tethered PHR?

patient portal

The _____ in Egypt reduced the attractiveness of that country as a source of IT outsourcing.

political unrest

for which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing

political unrest

Firms that outsource must take precautions to protect _____, regardless of where it is stored or processed or who handles it.

private data

How often does The Bureau of Labor Statistics track U.S. productivity?

quarterly

The _____ of the False Claims Act allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.

qui tam provision

The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?

raising brand awareness

After a worker's H-1B visa expires, the foreigner must _____.

remain outside the United States for one year before another H-1B petition will be approved

An H-1B worker can work for a US. employer for maximum continuous period of how many years

six

web based communication tools that enable people to interact in online communities where they can share ideas, messages, images, audio, and video

social media

the use of social networks to communicate and promote the benefits of products and services

social network marketing

can be used for business purposes

social networking platform

creates an online community of internet users that breaks down barriers created by time, distance and cultural differences

social networking platform

combine two highly popular online activities - shopping and social networking

social shopping platforms

Offshore outsourcing has the potential to dramatically _____ development efforts and enable workers to make progress on the project around the clock.

speed up

which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing

statement on standards for Attestation and engagements NO 16

The False Claims Act was enacted during _____.

the U.S. Civil War

The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____

the degree of control the company exercises over the employees

The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____.

the degree of control the company exercises over the employees

THE false claims Act was enacted during which war

the us civil war

When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may require help with _____.

their English

One potential disadvantage of using contingent workers is that _____.

they may not feel a strong connection to the company for which they are working

Violators of the False Claims Act are liable for _____ times the dollar amount for which the government was defrauded.

three

Since contingent workers are already specialist in a particular task, the hiring firm does not customarily incur which for the following

training costs

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____.

training costs

Which of the following examples is a use of wireless technology in the healthcare field?

transmit ECG data to a physician's smartphone

. According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-granting computer science departments has declined dramatically from 2004 to 2009

true

A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.

true

A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.

true

A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.

true

A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case.

true

A successful defense against a product liability case is typically expensive in terms of legal fees.

true

Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes.

true

Companies can use the Statement on Auditing Standards No. 70, Service Organizations to ensure that company data is protected in an outsourcing arrangement.

true

Contingent workers, H-1B workers, and outsourced offshore workers are examples of nontraditional workers

true

Cyberharassment is a form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress.

true

Electronics manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials.

true

If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press

true

In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.

true

Software quality is the degree to which a software product meets the needs of its users

true

Software suppliers attempt to limit their liability by specifying that although software is warranted to run on a given machine configuration, no assurance is given as to what that software will do.

true

The EICC has established a code of conduct that defines performance, compliance, auditing, and reporting guidelines across five areas of social responsibility

true

The EICC was established to promote a common code of conduct for the electronics and ICT industry

true

The European Union's Restriction of Hazardous Substances Directive restricts the use of many hazardous materials in computer manufacturing

true

To be classified as a truly green PC, the PC must meet other criteria than simply use less electricity to run than the standard computer

true

Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury.

true

User acceptance testing is performed by trained end users to ensure that the system operates as they expect.

true

When an organization decides to use contingent workers for a project, it is making a trade-off between completing a single project quickly and cheaply versus developing people within its own organization.

true

depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies.

true

risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well.

true

raise brand awareness and drive traffic to a website to increase sales

two primary objectives of social media marketers

an approach to social media marketing that encourages individuals to pass along a marketing message to others

viral marketing

which of the following terms in used to describe an effort to attract public attention to a negligent, illegal, unethical abusive or dangerous act by an individual or organization

whistle blowing

An H-1B visa is a temporary visa granted for people who

work in specialty occupations that require at least a four years bachelor's degree

An H-1B visa is a temporary visa granted for people who _____.

work in specialty occupations that require at least a four-year bachelor's degree

Organizations often find that it can take years of ongoing effort and a large up-front investment to develop a good _____ with an offshore outsourcing firm.

working relationship


संबंधित स्टडी सेट्स

Test 1 (Leukemia) - Chapter 25: The Child with Cancer

View Set

Fundamentals of Nursing Ch 20 PrepU and NCLEX

View Set

Organizations and Management Final

View Set

Exam 4: Normal Newborn NCLEX Questions

View Set

Chapter 5 - Introdution to Buneiss Law

View Set

Chapter 14 - Medication Safety and Error Prevention

View Set