Management Test 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

True or False: COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on

False

True or False: IT infrastructure consists of only those physical computing devices and software required to operate the enterprise

False

True or False: In green computing, reducing computer power consumption is not a top priority

False

True or False: In today's legal environment, managers who are convicted for the illegal use of information systems are still unlikely to be given a prison sentence

False

True or False: NFC tags are always passive

False

True or False: Spam is legally defined as any email that is unsolicited.

False

True or False: Telephone networks are based on the same principles as computer networks

False

True or False: The operating system is used to manage the software applications used in business activities

False

True or False: VoIP technology delivers voice information in digital form using circuit switching

False

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues

What is not a feature of the General Data Protection Regulation (GDPR)?

It prevents firms from using cookies

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery-slope rule

True or False: A Facebook user's visit to a website can be tracked even if they do not click a Like button

True

True or False: A computer network consists of at least two computers

True

True or False: Client/server computing is a primary example of decentralized processing

True

True or False: Copyright is a legal protection given to creators of certain types of intellectual property

True

True or False: Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business

True

True or False: Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior

True

True or False: Fiber-optic cable is more expensive and harder to install than wireless media

True

True or False: In a client/server network, a network server sets the rules of communication for the network

True

True or False: Liability is a feature of political systems and allows individuals to recover damages done to them by others

True

True or False: Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware

True

True or False: Routine violations of individual privacy are made easier by advances in data storage

True

True or False: The Domain Name System (DNS) converts domain names to IP addresses

True

True or False: Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms

True

True or False: Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior

True

True or False: Wikis allow visitors to change or add to the original posted material

True

Which process is used to protect transmitted data in a VPN?

Tunneling

All of the following are current hardware platform trends except

UNIX

T1 lines

are high-speed, leased data lines providing guaranteed service levels

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history

behavioral targeting

The Internet of Things (IoT) refers to

billions of Internet-connected sensors

All of the following are steps in the process for analyzing an ethical issue except:

Assigning responsibility

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

The total amount of digital information that can be transmitted through any telecommunications medium is measured in

BPS

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

All of the following are physical components of an RFID system except

Bar Codes

Instant messaging is a type of ________ service

Chat

Which of the following statements about cookies is not true?

Cookies are installed only at the user's request

Which of the following is the most common reason that business systems fail?

Data quality

All of the following are technical solutions to protecting user privacy except

Data use policies

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

What are the drawbacks of cloud computing? Do you think these ever outweigh the benefits, and if so, in what cases?

Drawbacks include: 1. placing data storage and control in another firm's hands. 2. security risks in having critical systems and data entrusted to a firm that does business with other firms. 3. loss of business capability if cloud infrastructures malfunction. 4. dependence on cloud computing provider and switching costs. Student answers regarding the relative weight will vary, an example is: The disadvantages of cloud computing outweigh the advantages, except if any data lost is irreplaceable or creates harm to others. For example, a database of financial information should remain the responsibility of the original firm so that they can be held accountable.

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?

Ethernet

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which organization manages the domain name system of the Internet?

ICANN

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers

ISP

Distinguish between cloud computing, green computing, and quantum computing

In cloud computing, technology services are provided over a network, primarily the Internet. These may be infrastructure services, such as storage or networking, or platform services, such as IBM's application development and test service, or software services, such as salesforce.com. Green computing refers to practices and technologies for designing computer equipment to minimize impact on the environment. Quantum computing refers to emerging technology that uses the principles of quantum physics to dramatically boost computer processing power.

Which of the following is NOT one of the current key technology trends that raises ethical issues?

Increase in data quality

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

NORA

When a cookie is created during a website visit, it is stored

On the hard drive of the visitor's computer

Which type of software is created and updated by a worldwide community of programmers and available for free?

Open source

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

Opt-in

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

Profiling

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read

________ means that you accept the potential costs and obligations for the decisions you make

Responsibility

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

Router

Which of the following can be used to help a website achieve a higher ranking with the major search engines?

SEO

The GDPR created a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries

Safe Harbor

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

Scalability

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as

Software packages

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

The Golden Rule

Which one of the following statements is not true?

The Internet backbone is owned by the federal government in the United States

What is the digital divide and how does it impact society?

The digital divide relates to the fact that information, knowledge, computers, and access to digital and information resources through educational institutions and public libraries are inequitably distributed along ethnic and social class lines. Several studies have found that poor and minority groups in the United States are less likely to have computers or online Internet access even though computer ownership and Internet access have soared in the past five years. Although the gap in computer access is narrowing, higher-income families in each ethnic group are still more likely to have home computers and broadband Internet access than lower-income families in the same group. Moreover, the children of higher-income families are far more likely to use their Internet access to pursue educational goals, whereas lower-income children are much more likely to spend time on entertainment and games. Left uncorrected, this digital divide could lead to a society of information haves, computer literate and skilled, versus a large group of information have-nots, computer illiterate and unskilled. Public interest groups want to narrow this digital divide by making digital information services-including the Internet-available to virtually everyone, just as basic telephone service is now.

All of the following are typically factors in a firm's decision to engage consulting and system integration services except

The firm's staff knows more about the firm's IT infrastructure than service providers

Identify the five moral dimensions that are involved in political, social, and ethical issues and briefly describe each

The five moral dimensions are: (1) Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them? (2) Property rights and obligations. How can intellectual property rights be protected when it is so easy to copy digital materials? (3) Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? (4) System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? (5) Quality of life. What values should be preserved? What institutions must we protect? What cultural values can be harmed?

________ allows an organization to collect personal information without the user's explicit consent

The opt-out model

What are the steps in conducting an ethical analysis?

The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify the options that you can reasonably take; and (5) identify the potential consequences of your options

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?

Virtualization

All of the following are cloud computing services except

Virtualization as a service

Interpretations of Moore's law assert that

computing power doubles every 18 months

IPv6 has been developed in order to:

create more IP addresses.

Client/server computing is a

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer

SaaS refers to

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis

The ethical "no free lunch" rule states that

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

A VPN

is an encrypted private network configured within a public network

The Windows Operating System

is an operating system used on most Wintel PCs throughout the world

Infrastructure-as-a-Service (IaaS)

is one type of cloud computing service where users pay only for the computing capacity they actually use

The domain .gov is a(n)

top-level domain

List and describe four services that comprise IT infrastructure, beyond physical devices and software applications

• The service components of IT infrastructure include: • Telecommunications services that provide data, voice, and video connectivity. • Data management services to store, manage, and analyze data. • Application software services that provide enterprise-wide capabilities. • Physical facilities management services, to develop and manage physical installations of technology. • IT standards services that establish and monitor the firm's policies. • IT education services that provide training in use of the systems. • IT research and development services that research potential projects, products, and investments


संबंधित स्टडी सेट्स

RN Comprehensive Online Practice 2023 A

View Set

BASIC VEHICLE TECHNOLOGIES 2: SAFETY

View Set

MICROECON Chapter 17 Hw questions

View Set

Final Exam Rotation #1 Study Guide

View Set

tfm #2: Elements of Narrative + Mis-en-Scene

View Set