Chapter 4, Chapter 5, Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision

False

1. ________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. Capacity planning Cloud computing Green computing Utility computing On-demand computing

Green computing

The Federal Trade Commission FIP principle of Notice/Awareness states that:

Web sites must disclose their information practices before collecting data

1. You use ________ to predict when a computer hardware system becomes saturated. capacity planning virtualization localization measured service SLAs

capacity planning

1. The business case for using grid computing involves all of the following except: cost savings. centralized maintenance. speed of computation. agility. increased computational power.

centralized maintenance.

U.S. businesses are allowed to use personal data from EU countries if they

develop equivalent privacy protection policies

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations

digital

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

due process

The Online Privacy Alliance

encourages self regulation to develop a set of privacy guidelines for its members

The practice of spamming has been growing because

it is so inexpensive and can reach so many people

It is not feasible for companies to produce error-free software because

it is too expensive to create perfect software

1. Software applications that combine different components of online software applications are referred to as: integrated software. widgets. mashups. grid computing. web services.

mashups.

European privacy protection is ________ than in the United States

much more stringent

FIP principles are based on the notion of the

mutuality of interest between the record holder and the individual

NORA is a

new data analysis technology that finds hidden connections between data in disparate sources

When a cookie is created during a Web site visit, it is stored

on the visitor's computer

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

patent

the U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe-harbour

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be

similar to books

1. All of the following are examples of wearable computing devices except: smartwatches. smart badges. activity trackers. smart glasses. smartphones.

smartphones.

1. The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world. 10; 1 20; 2.5 30; 1.5 50; 10 100; 25

30; 1.5

1. Data center traffic is expected to increase by ________ percent by 2016. 50 100 200 300 400

400

1. At the client level, ________ percent of PCs use some form of the Microsoft Windows operating system. 50 70 80 90 100

90

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

Accountability

1. Which of the following is an open-source operating system designed for mobile devices? iOS OS X Chrome Android Apache HTTP

Android

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue

Assign responsibility

1. Which of the following is a type of optical disc storage? CD-ROM Hard drive USB flash drive Magnetic tape SSD

CD-ROM

What legal mechanism protects the owners of intellectual property from having their work copied by others

Copyright law

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials

Digital Millennium Copyright Act

1. Which of the following is not an example of the consumerization of IT? Google Apps Dropbox Facebook Gmail Amazon Web Services

Facebook

Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision

False

The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals

False

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy

Firms should limit the length of time that any personal data is stored to six months or less

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed

HIPAA

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise

Information rights and obligations

1. What type of device gathers data and converts them into electronic form for use by the computer? Output device Input device Optical storage Magnetic storage SAN

Input device

______ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web. XML SOA HTML Java COBOL

Java

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's Categorical Imperative

1. Which of the following is not a type of output device? Speakers Cathode ray tube Ink jet printer Keyboard Sensor

Keyboard

1. Which of the following statements about Linux is not true? Linux is a UNIX-like operating system. Linux plays a major role in running web servers and local area networks. Linux is the primary OS used in quantum computing. Linux is a robust alternative to Windows operating systems. Linux is an example of open source software.

Linux is the primary OS used in quantum computing.

1. Which of the following storage technology stores data sequentially? CD-ROM RAID Magnetic disks Magnetic tape USB flash drive

Magnetic tape

1. Which of the following is not an essential characteristic of cloud computing? On-demand self-service Rapid elasticity Measured service Open source software Ubiquitous network access

Open source software

1. ________ is free software created and updated by a worldwide community of programmers. An app Open-source software Cloud-based software A web service Office software

Open-source software

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information

Privacy Act of 1974

Which of the five moral dimensions of the information age does spamming raise?

Quality of life

________ can be induced by tens of thousands of repetitions under low-impact loads.

RSI

________ are not held liable for the messages they transmit

Regulated common carriers

According to the ________, you should take the action that produces the least harm

Risk Aversion Principle

1. Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? SSN ASP LAN SAN Grid

SAN

1. In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): TCO. SOA. SLA. API. capacity plan.

SLA.

1. A(n) ________ is a set of self-contained services that communicate with each other to create a working software application. web service hybrid cloud SOA ERP mashup

SOA

1. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? Modifiability Scalability Expandability Disintermediation SLA

Scalability

1. Which of the following devices collects data directly from the environment for input into a computer system? Sensor Touch screen Audio input Trackball Digital scanner

Sensor

1. Which of the following types of computer would you use to support a computer network? Server Mainframe Workstation PC Tablet

Server

Which of the following statements does not describe a key difference between software and books?

Software products are more easily compared to each other than books.

1. Which of the following software tools would you use to prepare a break-even analysis? Word processing Spreadsheet Desktop publishing Personal information management Presentation graphics

Spreadsheet

1. Which of the following types of computer is used for weather forecasting on a national or worldwide scale? Mainframe Server Minicomputer Supercomputer PC

Supercomputer

Which of the following best describes how new information systems result in legal gray areas?

They result in new situations that are not covered by old laws

A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior

True

Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations

True

1. Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? Java C++ XML Visual Basic COBOL

Visual Basic

1. The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? Cloud computing Web services Nanotechnology SaaS PaaS

Web services

1. The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? Mashups Extranet Web services Cloud computing Intranet

Web services

1. What is the foundation technology for web services? HTML XML SOAP UDDI Java

XML

1. Running a Java program on a computer requires: a Java Virtual Machine to be installed on the computer. a Java Virtual Machine to be installed on the server hosting the Java applet. an applet to be downloaded to the user's computer. no extra or specialized software, as Java is platform-independent. an Intel processor and the Windows operating system.

a Java Virtual Machine to be installed on the computer.

1. ZipRealty, which combines Google Maps with real estate data, is an example of: cloud computing. SOA. a widget. a mashup. a web service.

a mashup.

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is

acceptable, because the higher value is the survival of the family

1. Software used to apply the computer to a specific task for an end user is called: system software. application software. data management software. network software. web services software.

application software.

Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.

behavioral targeting

Types of information gathered by Web site tracking tools include all of the following except

birthplace

The "do anything anywhere" computing environment can

blur the traditional boundaries between work and family time

1. Virtualization: allows one operating system to manage several physical machines. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. can boost server utilization rates to 70% or higher. allows smartphones to run full-fledged operating systems. uses the principles of quantum physics to represent data.

can boost server utilization rates to 70% or higher.

Flash cookies are different from ordinary cookies in that they

cannot be easily detected or deleted

The most common source of business system failure is

data quality

The ethical "no free lunch" rule states that

everything is owned by someone else, and that the creator wants compensation for this work

The strength of patent protection is that it

grants a monopoly on underlying concepts and ideas

Immanuel Kant's Categorical Imperative states that

if an action is not right for everyone to take, it is not right for anyone to take

All of the following are current key technology trends raising ethical issues except

increase in multimedia quality

Re-designing and automating business processes can be seen as a double-edged sword

increases in efficiency may be accompanied by job losses

Intellectual property can best be described as

intangible property created by individuals or corporations

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

opt-in

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

opt-out

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

profiling

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

property rights and obligations

1. In co-location, a firm: purchases and owns its web server but locates the server in the physical facility of a hosting service. contracts with an external vendor to run its computer center and networks. off-loads peak demand for computing power to remote, large-scale data centers. utilizes an external, distributed computing grid. uses only open source software to operate its computer systems.

purchases and owns its web server but locates the server in the physical facility of a hosting service.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

quality of life

The U.S. CAN-SPAM Act of 2003

requires spammers to identify themselves

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

responsibility

The introduction of new information technology has a

ripple effect, raising new ethical, social, and political issues

1. Microsoft Excel is an example of: data management software. spreadsheet software. presentation graphics. word processing software. presentation graphics software.

spreadsheet software

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:

the slippery-slope rule

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

the software is widely distributed

1. In a multitiered network: the work of the entire network is centralized. the work of the entire network is balanced over several levels of servers. processing is split between clients and servers. processing is handled by multiple, geographically remote clients. users interface with the server rather than the client.

the work of the entire network is balanced over several levels of servers.

One of the drawbacks of patent protection is

the years of waiting to receive it

1. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: total cost of ownership model. return on investment model. break-even point. cost benefit analysis. capacity plan.

total cost of ownership model.

The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.

true

1. A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. service-oriented on-demand multitiered client/server two-tiered client/server grid

two-tiered client/server

1. Microsoft Word is an example of: open-source software. word-processing software. software productivity suite. data management software. presentation graphics software.

word-processing software.

CVS refers to:

yestrain related to computer display screen use


Set pelajaran terkait

Exam 1: Osteoarthritis Questions

View Set

Mutation and its effect on phenotype

View Set