Chapter 4, Chapter 5, Chapter 6
The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision
False
1. ________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. Capacity planning Cloud computing Green computing Utility computing On-demand computing
Green computing
The Federal Trade Commission FIP principle of Notice/Awareness states that:
Web sites must disclose their information practices before collecting data
1. You use ________ to predict when a computer hardware system becomes saturated. capacity planning virtualization localization measured service SLAs
capacity planning
1. The business case for using grid computing involves all of the following except: cost savings. centralized maintenance. speed of computation. agility. increased computational power.
centralized maintenance.
U.S. businesses are allowed to use personal data from EU countries if they
develop equivalent privacy protection policies
The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations
digital
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
due process
The Online Privacy Alliance
encourages self regulation to develop a set of privacy guidelines for its members
The practice of spamming has been growing because
it is so inexpensive and can reach so many people
It is not feasible for companies to produce error-free software because
it is too expensive to create perfect software
1. Software applications that combine different components of online software applications are referred to as: integrated software. widgets. mashups. grid computing. web services.
mashups.
European privacy protection is ________ than in the United States
much more stringent
FIP principles are based on the notion of the
mutuality of interest between the record holder and the individual
NORA is a
new data analysis technology that finds hidden connections between data in disparate sources
When a cookie is created during a Web site visit, it is stored
on the visitor's computer
A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.
patent
the U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
safe-harbour
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
similar to books
1. All of the following are examples of wearable computing devices except: smartwatches. smart badges. activity trackers. smart glasses. smartphones.
smartphones.
1. The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world. 10; 1 20; 2.5 30; 1.5 50; 10 100; 25
30; 1.5
1. Data center traffic is expected to increase by ________ percent by 2016. 50 100 200 300 400
400
1. At the client level, ________ percent of PCs use some form of the Microsoft Windows operating system. 50 70 80 90 100
90
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
Accountability
1. Which of the following is an open-source operating system designed for mobile devices? iOS OS X Chrome Android Apache HTTP
Android
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue
Assign responsibility
1. Which of the following is a type of optical disc storage? CD-ROM Hard drive USB flash drive Magnetic tape SSD
CD-ROM
What legal mechanism protects the owners of intellectual property from having their work copied by others
Copyright law
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials
Digital Millennium Copyright Act
1. Which of the following is not an example of the consumerization of IT? Google Apps Dropbox Facebook Gmail Amazon Web Services
Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision
False
The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals
False
Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy
Firms should limit the length of time that any personal data is stored to six months or less
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed
HIPAA
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise
Information rights and obligations
1. What type of device gathers data and converts them into electronic form for use by the computer? Output device Input device Optical storage Magnetic storage SAN
Input device
______ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web. XML SOA HTML Java COBOL
Java
A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant's Categorical Imperative
1. Which of the following is not a type of output device? Speakers Cathode ray tube Ink jet printer Keyboard Sensor
Keyboard
1. Which of the following statements about Linux is not true? Linux is a UNIX-like operating system. Linux plays a major role in running web servers and local area networks. Linux is the primary OS used in quantum computing. Linux is a robust alternative to Windows operating systems. Linux is an example of open source software.
Linux is the primary OS used in quantum computing.
1. Which of the following storage technology stores data sequentially? CD-ROM RAID Magnetic disks Magnetic tape USB flash drive
Magnetic tape
1. Which of the following is not an essential characteristic of cloud computing? On-demand self-service Rapid elasticity Measured service Open source software Ubiquitous network access
Open source software
1. ________ is free software created and updated by a worldwide community of programmers. An app Open-source software Cloud-based software A web service Office software
Open-source software
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information
Privacy Act of 1974
Which of the five moral dimensions of the information age does spamming raise?
Quality of life
________ can be induced by tens of thousands of repetitions under low-impact loads.
RSI
________ are not held liable for the messages they transmit
Regulated common carriers
According to the ________, you should take the action that produces the least harm
Risk Aversion Principle
1. Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? SSN ASP LAN SAN Grid
SAN
1. In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): TCO. SOA. SLA. API. capacity plan.
SLA.
1. A(n) ________ is a set of self-contained services that communicate with each other to create a working software application. web service hybrid cloud SOA ERP mashup
SOA
1. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? Modifiability Scalability Expandability Disintermediation SLA
Scalability
1. Which of the following devices collects data directly from the environment for input into a computer system? Sensor Touch screen Audio input Trackball Digital scanner
Sensor
1. Which of the following types of computer would you use to support a computer network? Server Mainframe Workstation PC Tablet
Server
Which of the following statements does not describe a key difference between software and books?
Software products are more easily compared to each other than books.
1. Which of the following software tools would you use to prepare a break-even analysis? Word processing Spreadsheet Desktop publishing Personal information management Presentation graphics
Spreadsheet
1. Which of the following types of computer is used for weather forecasting on a national or worldwide scale? Mainframe Server Minicomputer Supercomputer PC
Supercomputer
Which of the following best describes how new information systems result in legal gray areas?
They result in new situations that are not covered by old laws
A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior
True
Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations
True
1. Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? Java C++ XML Visual Basic COBOL
Visual Basic
1. The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? Cloud computing Web services Nanotechnology SaaS PaaS
Web services
1. The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? Mashups Extranet Web services Cloud computing Intranet
Web services
1. What is the foundation technology for web services? HTML XML SOAP UDDI Java
XML
1. Running a Java program on a computer requires: a Java Virtual Machine to be installed on the computer. a Java Virtual Machine to be installed on the server hosting the Java applet. an applet to be downloaded to the user's computer. no extra or specialized software, as Java is platform-independent. an Intel processor and the Windows operating system.
a Java Virtual Machine to be installed on the computer.
1. ZipRealty, which combines Google Maps with real estate data, is an example of: cloud computing. SOA. a widget. a mashup. a web service.
a mashup.
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is
acceptable, because the higher value is the survival of the family
1. Software used to apply the computer to a specific task for an end user is called: system software. application software. data management software. network software. web services software.
application software.
Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.
behavioral targeting
Types of information gathered by Web site tracking tools include all of the following except
birthplace
The "do anything anywhere" computing environment can
blur the traditional boundaries between work and family time
1. Virtualization: allows one operating system to manage several physical machines. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. can boost server utilization rates to 70% or higher. allows smartphones to run full-fledged operating systems. uses the principles of quantum physics to represent data.
can boost server utilization rates to 70% or higher.
Flash cookies are different from ordinary cookies in that they
cannot be easily detected or deleted
The most common source of business system failure is
data quality
The ethical "no free lunch" rule states that
everything is owned by someone else, and that the creator wants compensation for this work
The strength of patent protection is that it
grants a monopoly on underlying concepts and ideas
Immanuel Kant's Categorical Imperative states that
if an action is not right for everyone to take, it is not right for anyone to take
All of the following are current key technology trends raising ethical issues except
increase in multimedia quality
Re-designing and automating business processes can be seen as a double-edged sword
increases in efficiency may be accompanied by job losses
Intellectual property can best be described as
intangible property created by individuals or corporations
The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
opt-in
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
opt-out
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
profiling
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
property rights and obligations
1. In co-location, a firm: purchases and owns its web server but locates the server in the physical facility of a hosting service. contracts with an external vendor to run its computer center and networks. off-loads peak demand for computing power to remote, large-scale data centers. utilizes an external, distributed computing grid. uses only open source software to operate its computer systems.
purchases and owns its web server but locates the server in the physical facility of a hosting service.
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
quality of life
The U.S. CAN-SPAM Act of 2003
requires spammers to identify themselves
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
responsibility
The introduction of new information technology has a
ripple effect, raising new ethical, social, and political issues
1. Microsoft Excel is an example of: data management software. spreadsheet software. presentation graphics. word processing software. presentation graphics software.
spreadsheet software
"Look and feel" copyright infringement lawsuits are concerned with:
the distinction between an idea and its expression
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:
the slippery-slope rule
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
the software is widely distributed
1. In a multitiered network: the work of the entire network is centralized. the work of the entire network is balanced over several levels of servers. processing is split between clients and servers. processing is handled by multiple, geographically remote clients. users interface with the server rather than the client.
the work of the entire network is balanced over several levels of servers.
One of the drawbacks of patent protection is
the years of waiting to receive it
1. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: total cost of ownership model. return on investment model. break-even point. cost benefit analysis. capacity plan.
total cost of ownership model.
The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.
true
1. A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. service-oriented on-demand multitiered client/server two-tiered client/server grid
two-tiered client/server
1. Microsoft Word is an example of: open-source software. word-processing software. software productivity suite. data management software. presentation graphics software.
word-processing software.
CVS refers to:
yestrain related to computer display screen use