CIS exam 2 quiz q's
Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?
18 USC 2425
For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.
25 years
The number of Internet users worldwide is quickly approaching which of the following?
4 billion
Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?
400 hours
How many H-1B visas has Congress set as the maximum amount to be granted yearly?
65,000
Companies applying for H-1B visas must offer a wage that is at least what percent of the average salary for the occupation?
95%
Which of the following are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output?
Business information systems
After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?
CMMI-DEV
Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?
European Union's Restriction of Hazardous Substances Directive
Which of the following is currently the most popular social network destination worldwide?
An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?
Failure mode and effects analysis (FMEA)
Organizations can use which of the following to capture interviews with customers, managers, and industry leaders?
Google Hangouts On Air
Which of the following is true of the International Organization for Standardization?
It is a worldwide federation of national standards bodies from 161 countries.
Which company has been able to achieve EPEAT's Gold level by using increasing amounts of recycled plastics in their product development?
Lenovo
Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?
Live telemedicine
Which of the following helps physicians keep tabs on patients prone to life-threatening health crises?
Remote monitoring
Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation?
Store-and-forward telemedicine
Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?
TRIPS agreement
Which of the following technologies employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration?
Telehealth
Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?
The Economic Espionage Act (EEA) of 1996
A patent is a grant of a property right issued by which entity?
USPTO
A social networking platform:
can be used for business purposes
One of the fundamental ways in which companies can try directly to increase productivity is by:
consolidating operations to better leverage economies of scale
Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following?
cyberharassment
Which of the following can read the machine language of a software program and produce the source code?
decompiler
Which of the following can be oral, written, or inferred from the seller's conduct?
express warranties
A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years.
false
A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
false
China is considered one of the best sources of programming skills outside Europe and North America.
false
Companies are prohibited from exporting quantities of used electronics to companies in underdeveloped countries.
false
Cyberstalking differs from cyberharassment in that it is aimed at tormenting an individual but does not involve a credible threat of physical harm.
false
Formulas, inventions, and processes are not considered forms of intellectual property.
false
If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.
false
In integration testing, special software programs called static analyzers are run against the new code
false
Industrial espionage and competitive intelligence are essentially the same.
false
It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.
false
Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.
false
Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.
false
Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.
false
Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.
false
Quotation marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.
false
Reverse engineering can only be applied to computer hardware, not computer software.
false
Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.
false
Software defects are commonly lethal and many personal injuries are related to software failures.
false
Temporary employees must be treated like official employees of the company and are eligible for vacation, sick pay, and retirement benefits.
false
The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.
false
The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
false
The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.
false
The first release of a software product typically meets all its users' expectations.
false
The recommended approach to put an end to cyberstalking is to insist that the cyberstalker meet face-to-face with the victim to talk things out.
false
The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment.
false
When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.
false
When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing.
false
currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online
false
Which of the following is NOT one of the three major components of machine learning systems?
function
What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement?
independent contractor
Which country is considered one of the best sources of programming skills outside of Europe and North America?
india
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?
initial
After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?
integration testing
Patent law protects which of the following?
inventions
While using social networks as part of the hiring process, employers can:
look at the profiles of potential candidates
The primary areas where IT has been applied include all of the following except:
medical language processing
Which aspect of artificial intelligence involves technology that allows computers to understand, analyze, manipulate, and/or generate English?
natural language processing
When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?
negligence
Firefox and OpenOffice are all examples of which of the following?
open source software
Which of the following terms is used to describe the act of stealing someone's ideas or words and passing them off as one's own?
plagiarism
For which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing?
political unrest
The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?
raise brand awareness
A majority of social shopping platforms generate revenue through which of the following?
retailer advertising
The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?
reverse engineering
The National Center for Victims of Crime advises victims to:
send the stalker a written notice that their contact is unwanted and that further contact should cease
In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent?
strict liability
One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is
there is no need to file an application or disclose the trade secret to gain protection
How many classes of items did the U.S. Supreme Court rule could not be patented?
three
Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded?
three
A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system.
true
A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.
true
A computerized provider order entry (CPOE) system enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.
true
A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.
true
A successful defense against a product liability case is typically expensive in terms of legal fees.
true
An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers.
true
Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S. tech job openings per year.
true
Clinical decision support (CDS) is a process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery.
true
Companies can use the Statement on Standards for Attestation Engagements (SSAE) No. 16, to ensure that company data is protected in an outsourcing arrangement
true
Electronics manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials.
true
Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn."
true
Natural language processing is an aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English.
true
Remote monitoring involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider.
true
Risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well.
true
Risk is the potential of gaining or losing something of value.
true
Software suppliers attempt to limit their liability by specifying that although software is warranted to run on a given machine configuration, no assurance is given as to what that software will do.
true
Software, video games, multimedia works, and Web pages can all be copyrighted.
true
Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation.
true
The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members
true
The development and use of new medical technology, such as new diagnostic procedures and treatments, also contributes to the increase in healthcare spending per person.
true
The goal of the Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act is to provide law enforcement and citizens with the location of all sex offenders in the community.
true
The main body of law that governs patents is contained in Title 35 of the U.S. Code.
true
There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions
true
User acceptance testing is performed by trained end users to ensure that the system operates as they expect.
true
In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following?
warranties