IS Exam #2-Ch 4-6
Which operating system does the iPad use?
iOS
If you want to collect data (i.e., photos) from someone and use the data, you must obtain ________.
informed consent
A photo you have taken of your family is considered __________________ and is protected by law.
intellectual property
The use and regulation of trade secrets, copyrights, and patents is the U.S. government's attempt to protect ________.
intellectual property
A computer _________________ causes the most repetitive stress injuries.
keyboard
A __________is a large-capacity, high-performance computer that can process large amounts of data very rapidly.
mainframe
The most common use of nonrelational database management systems is for__________________.
managing extremely large data sets
Software applications that are based on combining different online software applications are called:
mashups
Compared to in-house hosting, cloud-based hosting ____________________
minimizes the risk of investing in technology that will soon become obsolete.
Racking your movements without consent is most related to the trend,
mobile device growth impact
When thinking about downloading and using a photo off the Internet, don't forget the ethical ____________rule.
no free lunch
In cloud computing, resources are said to be "pooled" because
organizations share the same physical hardware through virtualization.
Professional organizations like the American Medical Association have _____________________, which includes specific conduct guidelines such as, do no harm.
professional codes of conduct
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of _______________________________
property rights and obligations
Disney is using a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a guest's room key, park ticket, and eventually a vacation-planning system to make the experience more efficient with reduced wait times.
radio-frequency identification (RFID)
In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________.
record
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________.
record
Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless they already exist in the TEACHER table.
referential
If you accept a position as an information systems manager, you have a(n) ____________ to accept the costs, benefits, and obligations for the decisions you make.
responsibility
A formal name to describe self-regulating policies is called _____________.
safe harbor
A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines.
safe harbor
The Windows operating system is an example of _____________
system software
The ethical principle that calls ranking alternatives before making a decision is called the
utilitarian principle.
Developing effective apps is considered a critical element to successful adoption of:
wearable computing.
The Apple watch is a new type of mobile digital computing called:
wearable computing.
Another common name for a web beacon is a __________which tracks user activities.
web bug
A server dedicated to managing HTML pages is called a(n
web server.
Copyright is protected throughout the life of the author plus an additional _____ years after the author's death.
70
_____________ involves determining who is responsible for actions taken.
Accountability
Among the five identified moral dimensions of the information age, which addresses the question of liability related to information systems?
Accountability and control
Which of the following is FALSE about techno stress?
Affected people start to behave like computers, devoid of emotions.
Which of the following statements is FALSE about business intelligence (BI) systems?
BI systems are used by any business professionals and knowledge workers.
Among the following statements, which one is NOT applicable to big data?
Big data can be processed with traditional techniques.
A ________ in a database represents a single character such as a letter or number.
Byte
Which of the following is NOT a function of a data warehouse?
Catalog data
What affects approximately 90% of persons who spend 3 or more hours a day at a computer?
Computer Vision Syndrome (CVS)
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
DMV
What technology trend raises ethical issues related to the limitless data that can be collected about you?
Data storage costs rapidly decline
Which of the following refers to the capability of a computer, product, or system to add additional features?
EXPANDABILITY
Surprisingly, laws guiding American privacy law are based on a 1973 report called the _____________.
FIP
United States privacy laws are largely based on the ______________________ report
Fair Information Practices
What is the understanding that most American and European privacy law is based on?
Fair Information Practices (FIP)
The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the
Golden Rule
Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.
Which government act was enacted in 1996 to protect your medical records?
HIPAA
____________is an upgrade to traditional HTML because it allows the addition of multimedia features (i.e., video) without cumbersome add-ons.
HTML5
Which of the following statements is NOT a characteristic of Hadoop?
Hadoop extracts data from multiple tables that have a relationship.
What are the components for IT infrastructure?
Hardware, software, data management technology, Networking & telecommunications technology, and technology services
Hitachi's new wearable device that can track office temperature, interactions, and even movements around the office is called the:
Hitachi Business Microscope (HBM).
What is the first step you should take in managing data for a firm?
Identify the data needed to run the business.
Which is the BEST description of intellectual property?
Intangible property created by individuals or corporations
Which of the following is false concerning the social and cultural issues in regard to the prevalence of information systems?
It is an equalizer for social classes and minorities.
Which of the following is FALSE about the digital divide in the U.S
It is based only on having fair access to digital technology.
Which of the following is FALSE about the U.S. CAN-SPAM Act of 2003?
It outlaws unsolicited commercial messaging.
_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.
Liability
________________involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.
Liability
Which of the following is an example of a popular open source operating system?
Linux.
The data _______________ language would allow you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands).
Manipulation
Which is NOT a way in which NORA technology can create a detailed dossier of a person?
Medical records
If you needed a DBMS for large commercial use on a mainframe, _____________ would be a viable option.
Microsoft SQL Server
Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the government?
NORA
Relational tables need to be ______________ to help avoid duplicate data.
Normalized
Which tool enables users to view the same data in different ways using multiple dimensions?
OLAP
Where is a cookie that is created during a Web site visit stored?
On the visitor's computer
Which type of software is created and updated by a worldwide community of programmers and is available for free?
Open source
Major products including Bluemix and Salesforce.com's Force.com are considered a:
Platform as a Service (PaaS).
A(n) __________ key uniquely identifies a row or record in a table.
Primary
Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?
Privacy Act of 1974
Which of the following is NOT a rule in an organization's information policy?
Procedures and accountabilities around managing data resources
What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on individuals?
Profiling
Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?"
Quality of life
______________ databases are by far the most popular type of database on the market today.
Relational
The most popular data manipulation language and method to "question" a database is called ______________.
Structured Query Language
Among the following, what is the best way to distinguish between reporting tools and data mining tools?
The complexity of techniques used
Which Ethical rule below is combined with its proper description?
The utilitarian principle; assumes values are prioritized in an order and the consequences of various courses of action are understood
Which is TRUE of a multi-tiered network?
The work of the entire network is balanced over several levels of servers.
Why are legacy systems still used?
They are too expensive to redesign.
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
Total cost of ownership (TCO)
Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying?
Utilitarian principle
Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of
VIRTUALIZATION
The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:
Websites must disclose their information practices before collecting data.
____________ uniquely allows for presentation, communication, and storage of data. It is often used to transfer data from one organization to another.
XML
The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly to:
advances in data analysis.
in a student database, a column called LastName would be an example of a(n) _____________.
attribute
A ________ is represented by a 0 or 1. Eight together make a byte (i.e., 00101100).
bit
Microsoft Azure SQL is an example of a _________________ database
cloud
An unethical, but not illegal act committed using a computer is called _____________.
computer abuse
Putting a key logger on your boss's computer without permission would be considered a(n) ___________.
computer crime
If you return to a website that welcomes you back by name, you likely have small text file on your computer with information about your prior visits called a ___________.
cookie
A store printing out receipts based on your buying patterns is related to the trend, ___________, where technology trends raise ethical issues
data analysis advances
A location specified to include IT infrastructure such as storage, security, and system backup is called a:
data center.
Software such as Sequel Server 2014 which is used to manage business data (i.e., inventory) is an example of _______________ software.
data management
Which of the following involves searching for patterns and relationships among data?
data mining
The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design andmaintenance, is called ________.
database administration
In the U.S., while there are many people that have access to technology and information, there are many that do not. This creates a ______ that leads to unequal opportunities
digital divide
A common approach of networking multiple computers as opposed to a single computer is called:
distributed processing
If someone at your work accuses you of sending inappropriate emails, you should be afforded _______
due process
A(n) __________ is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database
entity relationship diagram
Principles of right and wrong that you use to make choices are called
ethics
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called ________.
grid computing