CIS3250 Exam 2 (Quizzes)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following helps physicians keep tabs on patients prone to life-threatening health crises?

Remote monitoring

_____ helps physicians keep tabs on patients prone to life-threatening health crises.

Remote monitoring

the number of internet users worldwide is quickly approaching which of the following

4 billion

Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?

400 hours

appoximately how much material is being uploard to youtube every minutes making it difficult to review all material submitted for

400 hours

Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?

45 percent

Companies applying for H-1B visas must offer a wage that is not _____ less than the average salary for the occupation.

5%

Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2014 and 2024?

532,000 new jobs are expected to be added to IT related positions

An H-1B worker can work for a U.S. employer for a maximum continuous period of _____ years.

6

Congress has set the number of H-1B visas to be granted at _____ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees.

65,000

How many H-1B visas has Congress set as the maximum amount to be granted yearly?

65,000

Which of the following statements is true of Children's Internet Protection Act (CIPA)?.

CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

After an organization decides to adopt ___ , it must conduct an assessment of its software development practices to determine where they fit in the capability model.

CMMI-DEV

After an organization decides to adopt _____, it must conduct an assessment of its software development practices to determine where they fit in the capability model.

CMMI-DEV

After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?

CMMI-DEV

Miller v. _____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.

California

Healthcare professionals can use a(n) _____ to generate a complete electronic record of a clinical patient encounter.

EHR

(T/F) A Turing Test determines the strength of an encryption method

F

(T/F) Generally, a deontologist would be more comfortable breaking a rule in circumstances where doing so would have good consequences.

F

(T/F) Wikipedia relies upon an advertising-based business model

F

(T/F) A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.

FALSE

(T/F) It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.

FALSE

(T/F) The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.

FALSE

(T/F) The healthcare industry was slow to implement IT solutions to improve productivity and efficiency.

FALSE

(T/F) Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded.

FALSE

Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances?

Fair use doctrine

(T/F) A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years.

False

(T/F) A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

False

(T/F) A trademark permits its owner to exclude the public from making, using, or selling a protection invention, and allows for legal action against violators.

False

(T/F) An employer can legally screen applicants based on race or ethnicity.

False

(T/F) Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

False

(T/F) China is considered one of the best sources of programming skills outside Europe and North America.

False

(T/F) Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.

False

(T/F) Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online.

False

(T/F) Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs.

False

(T/F) Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.

False

(T/F) Formulas, inventions, and processes are not considered forms of intellectual property.

False

(T/F) From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is 50.

False

(T/F) In integration testing, special software programs called static analyzers are run against the new code.

False

(T/F) In the early days of IT in the 1960s, productivity improvements were difficult to measure.

False

(T/F) Industrial espionage and competitive intelligence are essentially the same.

False

(T/F) Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.

False

(T/F) Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.

False

(T/F) Live telemedicine requires the presence of patients and healthcare providers at the same site.

False

(T/F) Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.

False

(T/F) MySpace is the most popular social network destination worldwide.

False

(T/F) Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts, and recommendations.

False

(T/F) Question marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.

False

(T/F) Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk.

False

(T/F) Social networking Web sites are used strictly to communicate with your friends, family members, and colleagues.

False

(T/F) Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.

False

(T/F) Software defects are commonly lethal and many personal injuries are related to software failures.

False

(T/F) Software developers do not typically work closely with safety and software engineers.

False

(T/F) Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation.

False

(T/F) Software product litigation first occurred in 2000.

False

(T/F) Studies found that driving while talking on your phone doubles your risk of an accident to about the same level as if you were driving drunk.

False

(T/F) Temporary employees must be treated like official employees of the company and are eligible for vacation, sick pay, and retirement benefits.

False

(T/F) The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

False

(T/F) The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.

False

(T/F) The OLPC XO-4 runs a Windows-based operating system.

False

(T/F) The U.S. Congress has approved the granting of an unlimited number of H-1B visas.

False

(T/F) The cost advantage of offshore outsourcing to India is continuing to increase.

False

(T/F) The digital divide cannot exist within countries.

False

(T/F) The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.

False

(T/F) The first release of a software product typically meets all its users' expectations.

False

(T/F) The impact of software defects is always trivial.

False

(T/F) The information in an EHR is not easily shared with others outside of the healthcare organization where the data originated.

False

(T/F) The term of copyright has been extended several times from its original limit of 25 years to 35 years.

False

(T/F) The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment.

False

(T/F) There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT workers.

False

(T/F) Today most radiologists employ a personal health record system to review cases from a remote location.

False

(T/F) Under no conditions can a Web site remove user submitted content as this would be a violation of their right to freedom of speech.

False

(T/F) When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.

False

(T/F) When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing.

False

(T/F) When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.

False

The qui tam provision of the _____ allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.

False Claim Act

The _____, also known as the Lincoln Law, was enacted to combat fraud by companies that sold supplies to the Union Army.

False Claims Act

The goal of which of the following was to entice whistle-blowers to come forward by offering them a share of the money recovered?

False Claims Act

The Privacy Act of 1974 established rules to regulate

Federal government databases only

Which family of standards serves many industries and organizations as a guide to quality products, services, and management?

ISO 9001

Which family of standards serves many industries and organizations as a guide to quality products, services, and mangement?

ISO 9001

N-version programming is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements ___ times, where N could be 2, 3, 4, or more

N

Which of the following is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times, where N could be 2, 3, 4, or more?

N-version programming

_____ is the control or suppression of the publishing or accessing of information on the Internet.

Internet censorship

_____ enable patients to use the Internet to compare the quality, safety, and cost information on hospitals nationwide.

Medical information Web sites

Trade secret law protects only against the _____ of trade secrets.

Misappropriation

_____ is the country in Europe with the highest Internet penetration.

Monaco

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for ___

breach of warranty

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for which of the following?

breach of warranty

The plaintiff must have a valid contract that the supplier did not fulfill in order to win a(n) __ claim.

breach-of-warranty

The plaintiff must have a valid contract that the supplier did not fulfill in order to win a(n) _____ claim.

breach-of-warranty

Some industry observers identify the increasing use of _____ as an important first step in bridging the digital divide in many countries.

cell phones

_____ is the most common charge in qui tam cases.

charge in qui tam cases. Mischarging

As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information.

claim

In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they _____.

do not meet the legal definition of a professional

Black-box testing and white-box testing are two forms of __

dynamic testing

One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process called ___

dynamic testing

Some critics believe that the use of EHR may actually have contributed to _____ healthcare costs by making it easier to bill for patient services.

increased

Innovation is a key factor in productivity improvement. Which of the following has played an important role in enabling innovation?

information technology

One of the tests that an invention must pass to be eligible for a patent is which of the following?

it must be obvious to a person having ordinary skill in the same field

Most ethical companies make hiring decisions based on how well an applicant fulfills the _____.

job qualifications

A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services is known as which of the following?

labor productivity

In the legal system, compliance usually refers to behavior that is in accordance with _____.

legislation

Oil companies are increasingly relying on _____ to connect a nurse or EMT on an oil platform to emergency physicians at a major medical center.

live telemedicine

while using social networks as part of the hiring process employers can

look at the profiles of potential candidates

As more businesses move their key processes offshore, U.S. IT service providers are forced to _____ in order to compete.

lower prices

What type of artificial intelligence involves computer programs that can learn some task and improve performance with experience?

machine learning

The __ standard serves many industries and organizations as a guide to quality products, services, and management.

many industries and organizations as a guide to quality products, services, and management. ISO 9001

It is difficult to quantify how much the use of IT has contributed to worker productivity because _____.

many other factors influence worker productivity rates besides IT

Some studies have estimated that over 98,000 people die in hospitals each year due to _____.

preventable medical mistakes

Which of the following terms is defined as the existing body of knowledge available to a person of ordinary skill in the art?

prior art

Firms that outsource must take precautions to protect _____, regardless of where it is stored or processed or who handles it.

private data

If an organization follows widely accepted development methods, ___on its part is hard to prove.

negligence

When sued for _____, a software supplier is not held responsible for every product defect that causes customer or third-party loss.

negligence

When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?

negligence

The United States has _____ federal law(s) protecting against the export of toxic waste.

no

A(n) _____ prohibits a departing employee from working for any competitors for a period of time.

noncompete agreement

What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time?

noncompete agreement

For which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing?

political unrest

The _____ in Egypt reduced the attractiveness of that country as a source of IT outsourcing.

political unrest

Which of the following helps physicians keep tabs on patients prone to life-threatening health crises? remote monitoring

remote monitoring

(T/F) A Sensis Consumer Report found that the majority of teleworkers reported a negative impact of teleworking on their lives.

TRUE

Which of the following involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider?

remote monitoring

The National Center for Victims of Crime advises victims to:

send the stalker a written notice that their contact is unwanted and that further contact should cease

An H-1B worker can work for U.S. employer for a maximum continuous period of how many years?

six

Acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation constitute _____.

store-and-forward telemedicine

Defendants in a(n) action may use several legal defenses, including the doctrine of supervening event, the government contractor defense, and an expired statute of limitations

strict liability

The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to _____.

subpoenas requesting to identity of anonymous Web posters

(T/F) A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.

true

The _____ was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law

uniform trade secrets act

An H-1B visa is a temporary visa granted for people who:

work in specialty occupations that require at least a four-year bachelor's degree

Organizations often find that it can take years of ongoing effort and a large up-front investment to develop a good _____ with an offshore outsourcing firm.

working relationship

The _____ is an inexpensive computer about the size of a credit card.

Raspberry Pi

In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as _____.

$2500

n the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as __

$2500

In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?

$5000

The PricewaterhouseCoopers LLP Health Research Institute estimated that a 500-bed hospital could receive _____ in HITECH incentives to purchase, deploy, and maintain an EHR system.

$6.1 million

The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India.

1.5:1

The number of Internet users worldwide is quickly approaching which of the following?

4 billion

Offshore demand is driving up salaries in India by roughly how much per year?

15%

as of March 2017 how many states had implemented the SORNA requirments of the adam walsh act

17

Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?

18 USC 2425

what percent of private employer surveyed surveyed say that they have dismissed employees because of something they posted ib sicail media

18 percent

In one lawsuit in the early ___ , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems.

1990s

In one lawsuit in the early ____, a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems.

1990s

In what year was The Digital Millennium Copyright Act (DMCA) signed into law?

1998

Global Market Research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?

2/3

A survey by the Fawcett Society on the use of computing resources at work found that _____.

20 percent of men admit to viewing porn while at work

In what year did a U. S. appeals court overturn Federal Rules requiring broadband providers to treat all Internet traffic equally?

2014

In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is ___

22.1

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.

25 years

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered?

25 years

for a sex offender who is at tier 2 of the Adam Walsh act how long do they need to remain registered

25 years

Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020?

750,000 new jobs are expected to be added to IT related positions.

Companies applying for H-1B visas must offer a wage that is at least what percent of the average salary for the occupation?

95%

A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called which of the following?

A co-employment relationship

___ and language differences can cause misunderstandings among project members in different countries

Cultural

Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?

ACPA

Which of the following established the minimum levels of protection that each country must provide to all WTO members?

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

Personal computers are composed of many different materials known to be potentially harmful to humans and the environment. These materials include beryllium, cadmium, lead, mercury, selenium, polyvinyl chloride, and _____.

BFR (brominated flame retardants)

What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?

Black-box testing

___ involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown.

Black-box testing

___ are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output.

Business information systems

_____ are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output.

Business information systems

In the awarding of software contracts, particularly by the federal government, organizations that bid on a contract may be required to have adopted ___ and to be performing at a certain level.

Capability Maturity Model Integration (CMMI)

In the awarding of software contracts, particularly by the federal government, organizations that bid on a contract may be required to have adopted _____ and to be performing at a certain level.

Capability Maturity Model Integration (CMMI)

___ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement.

Capability Maturity Model Integration (CMMI)

_____ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement.

Capability Maturity Model Integration (CMMI)

The _____ is a low-cost laptop introduced by Intel and Lenovo designed for use in kindergarten through high school classrooms in developing countries.

Classmate+

The majority of people hired with H-1B visas in 2015 were hired primarily as which of the following positions?

Computer programmers and system analysts

Motion picture companies supported the development and worldwide licensing of the _____, which enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them.

Content Scramble System (CSS)

Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?

Content Scramble System (CSS)

Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following?

Cyberharrasment

At which of the Capability Maturity Model Integration maturity levels, are processes well defined, understood, and consistent across the organization?

Defined

The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material

Digital Millenium Copyright Act

Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use?

Digital Millennium Copyright Act (DMCA)

Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating which kind of laws?

Discrimination

The _____ program helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.

E-Rate

_____ reimburses telecommunications, Internet access, and internal connections providers for discounts on eligible services provided to schools and libraries.

E-Rate

A comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization is known as which of the following?

EHR

A(n) _____ is a computer-readable record of health-related information on an individual.

EHR

Which of the following refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts and recommendations?

Earned Media Marketing

EHR

Electronic Health Record: An integration of all medical documentation into electronic format

The _____ was established to promote a common code of conduct for the electronics and ICT industry.

Electronic Industry Citizenship Coalition

_____ is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

Electronic Product Environmental Assessment Tool

The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging.

European Union's Restriction of Hazardous Substances Directive

The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material intheir packaging

European Union's Restriction of Hazardous Substances Directive

Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?

European Union's Restriction of Hazardous Substances Directive

Which of the following can be oral, written, or inferred from the seller's conduct?

Express warranties

___ can be oral, written, or inferred from the seller's conduct.

Express warranties

The concept that an idea cannot be copyrighted but the _____ of an idea can be is key to understanding copyright protection.

Expression

In 2006, _____ introduced a low-cost laptop called the Classmate PC.

Intel

(T/F) Bank of America, Best Buy, and Yahoo! are some of the organizations that encourage telework.

FALse

(T/F) Telework increases ad hoc work requests and disruptions from fellow workers.

FAlse

The _____ permits facilitating payments that are made for "routine government actions," such as obtaining permits or licenses.

FCPA

An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?

Failure mode and effects analysis (FMEA)

___ is an important technique used to develop ISO 9001-compliant quality systems.

Failure mode and effects analysis (FMEA)

_____ is an important technique used to develop ISO 9001-compliant quality systems.

Failure mode and effects analysis (FMEA)

_____ is the crime of obtaining goods, services, or property through deception or trickery.

Fraud

The _____ created the World Trade Organization.

General Agreement on Tariffs and Trade (GATT)

Organizations can use which of the following to capture interviews with customers, managers, and industry leaders?

Google Hangouts on Air

After a six year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following?

Green Card

The environmental activist organization _____ issues a quarterly ranking of the top manufacturers of personal computers, mobile phones, TVs, and game consoles according to the manufacturers' polices on toxic chemicals, recycling, and climate change.

Greenpeace

A(n) _____ visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations.

H-1B

What type of visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations?

H-1B

The safety engineer uses a logging and monitoring system to track _____ from a project's start to its finish.

HAZARDS

What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement?

Independent Contractor

According to A.T. Kearney, the most attractive offshoring destination is _____.

India

Which country is considered one of the best sources of programming skills outside of Europe and North America?

India

_____ is the use of illegal means to obtain business information not available to the general public.

Industrial espionage

Which of the following is true of the International Organization for Standardization?

It is a worldwide federation of national standards bodies from 161 countries.

Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to-file" system?

Leahy-Smith America Invents Act

which of the following is currently the word's largest professional network

Linkedin

Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?

Live telemedicine

_____ requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites.

Live telemedicine

Which statement best describes Utilitarianism.

Main example of a consequential theory to increase happiness or "Utility".

The _____ program in Nepal started in 2008 as a small pilot project in two schools.

OLPC

The nonprofit organization _____ has a goal of providing children around the world with low-cost laptop computers to aid in their education.

OLPC

The _____ is a low-cost computer that runs a Linux-based operating system and comes with a suite of 300 or so learning applications called Sugar.

OLPC XO-4

Which term is used to identify a form of outsourcing in which services are provided by an organization whose employees are in a foreign country?

Offshore outsourcing

_____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country.

Offshore outsourcing

Turing Test

One method of determining the strength of artificial intelligence, in which a human tries to decide if the intelligence at the other end of a text chat is human.

Which of the following social network platforms enables users to visually share and discover new interests by posting images or videos to their own or others' boards?

Pinterest

Which of the following terms is used to describe the act of stealing someone's ideas or words and passing them off as one's own?

Plagiarism

A claim right is also known as a

Positive right

Which of the following increased trademark and copyright enforcement and substantially increased penalties for infringement?

Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

Software patent

Protects feature, function, or process embodied in instructions executed on a computer

Which term refers to methods within the development process that guarantee reliable operation of the product?

Quality assurance

___ focuses on how to define, measure, and refine the quality of the development process and the products developed during its various stages.

Quality management

Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds?

Qui Tam Provision

What is the name of the project at the Georgia Institute of Technology that uses stories to teach human values to robots?

Quixote

The _____ is a small, inexpensive computer with either 256 MB or 512 MB of RAM, a 700 MHz processor, one or two USB ports, and an Ethernet port—but no case and no monitor.

Raspberry Pi

The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?

Reverse engineering

Which of the following terms is defined as the potential of gaining or losing something of value?

Risk

___ is the probability of an undesirable event occurring times the probability that the event would go undetected times the magnitude of the event's consequences if it does happen.

Risk

The full name of the E-Rate program is _____.

Schools and Libraries Program of theUniversal Service Fund

Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?

Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.

Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile?

Snapchat

Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services?

Social Media Marketing

_____ in a corporate setting can sometimes be directly traceable to IT users—they might allow it to happen or they might actively engage in it.

Software piracy

___ refers to methods within the development cycle that guarantee reliable operation of the product.

Software quality assurance

_____ refers to methods within the development cycle that guarantee reliable operation of the product.

Software quality assurance

The _____ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.

Statement on Auditing Standards No. 70

Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.

Statement on Standards for Attestation and Engagements No. 16

Which of the following is true of software testing?

Static testing involves programs called static analyzers which are run against new code.

Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation?

Store-and-forward telemedicine

In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent?

Strict liability

____ means that the defendant is held responsible for injuring another person, regardless of negligence or intent.

Strict liability

(T/F) Accelerometers help robots stay upright

T

(T/F) In Katz v United States (1967), the US Supreme Court determined that the Fourth Amendment does apply to conversations and that government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.

T

(T/F) In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that is not in use by the general public to "see" things it could not without intrusion, that is a "search" and requires a warrant.

T

(T/F) More people worldwide have access to a cellphone than to a toilet.

T

Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?

TRIPS agreement

(T/F) A computerized provider order entry (CPOE) system enables physicians to places orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.

TRUE

(T/F) Companies can use the Statement on Auditing Standards No. 70, Service Organizations to ensure that company data is protected in an outsourcing arrangement.

TRUE

(T/F) Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies

TRUE

(T/F) Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies.

TRUE

(T/F) In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.

TRUE

(T/F) Machine learning has contributed to the development of a much more in-depth understanding of the human genome as well as practical speech recognition, improved web search results, and self-driving cars.

TRUE

(T/F) Natural language processing is an aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English.

TRUE

(T/F) Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.

TRUE

(T/F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.

TRUE

(T/F) There are roughly 2.4 billion Internet users worldwide.

TRUE

(T/F) When an organization decides to use contingent workers for a project, it is making a trade-off between completing a single project quickly and cheaply versus developing people within its own organization.

TRUE

(T/F) Allowing employees to telework can improve morale and reduce turnover.

TRue

Which of the following technologies employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration?

Telehealth

_____ reduces the need for patients to travel for treatment and allows healthcare professionals to serve more patients in a broader geographic area.

Telehealth

The _____ of 1996 imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets. The Economic Espionage Act (EEA) A(n) _____ is

The Economic Espionage Act (EEA)

Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?

The Economic Espionage Act (EEA) of 1996

Copyright and patent protection was established through which of the following?

The U.S. Constituion

Which of the following is true of strategies for engineering quality software?

The first release of any software rarely meets all its users' expectations.

Which of the following is a true statement about the number of declared undergraduate computer science majors based on data from the National Center for Education Statistics?

There are some 130,000 new computer and information science graduates each year.

Which of the following statements is true about licensing of IT workers?

There is no single administrative body to accredit professional education programs for IT.

Which of the following is a true statement about the number of declared undergraduate computer science majors at doctoral-granting computer science departments?

There was a 50% decline in degrees awarded between 2004 and 2009.

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur which of the following?

Training Costs

What type of programming is commonly found in airplane and spacecraft control systems?

Triple version programming

___ is common in airplane and spacecraft control systems.

Triple version programming

(T/F) A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system.

True

(T/F) A computerized provider order entry (CPOE) system enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.

True

(T/F) A failure mode describes how a product or process could fail to perform the desired functions described by the customer.

True

(T/F) A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.

True

(T/F) A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.

True

(T/F) A successful defense against a product liability case is typically expensive in terms of legal fees.

True

(T/F) An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers.

True

(T/F) Capability Maturity Model Integration (CMMI) is a process improvement approach that defines theessential elements of effective processes.

True

(T/F) Cell phones come in a wide range of capabilities and costs.

True

(T/F) Clinical decision support (CDS) is a process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery.

True

(T/F) Coca-Cola has been able to create a highly popular Facebook fan page to promote its image and brands.

True

(T/F) Companies can use the Statement on Standards for Attestation Engagements (SSAE) No. 16, to ensure that company data is protected in an outsourcing arrangement.

True

(T/F) Computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans.

True

(T/F) Copyright laws protect authored works such as art, books, and film.

True

(T/F) Different types of social media are blogs, discussion forums, media-sharing networks, wikis, social bookmarking tools, social messaging apps, and social networking, news, and shopping platforms.

True

(T/F) Foreign professionals can convert their H-1B visas into permanent green cards.

True

(T/F) If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press.

True

(T/F) Machine learning has contributed to the development of a much more in-depth understanding of the human genome as well as practical speech recognition, improved Web search results, and self-driving cars.

True

(T/F) More advanced artificial-intelligence-based clinical decision support systems can help doctors choose the proper dosage levels of medication based on a patient's most recent tests results.

True

(T/F) Risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well.

True

(T/F) Risk is the potential of gaining or losing something of value.

True

(T/F) Since businesses implemented automated payroll systems, fewer accounting employees are needed.

True

(T/F) Social media platforms also enable a degree of self-image manipulation.

True

(T/F) Software quality is the degree to which a software product meets the needs of its users.

True

(T/F) Software suppliers attempt to limit their liability by specifying that although software is warranted to run on a given machine configuration, no assurance is given as to what that software will do.

True

(T/F) The European Union's Restriction of Hazardous Substances Directive restricts the use of many hazardous materials in computer manufacturing.

True

(T/F) The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement.

True

(T/F) The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members.

True

(T/F) The goal of the Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act is to provide law enforcement and citizens with the location of all sex offenders in the community.

True

(T/F) The main body of law that governs patents is contained in Title 35 of the U.S. Code.

True

(T/F) The standard of living varies greatly among groups within a country as well as from nation to nation.

True

(T/F) There is no federal product liability law.

True

(T/F) Twitter enables an organization to share short text updates, images, links, polls, and videos.

True

(T/F) Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury.

True

(T/F) User acceptance testing is performed by trained end users to ensure that the system operates as they expect.

True

The company with the highest 2010 rating by Greenpeace based on its policies on toxic chemicals, recycling, and climate change was

WIPRO

The _____ lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime.

Vizcaino v. Microsoft

A patent is a grant of a property right issued by which entity?

USPTO

Which act was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law?

Uniform Trade Secrets Act (UTSA)

The goal of the standards set by the Foreign Corrupt Practices Act (FCPA) is to prevent companies from:

Using slush funds or other means to disguise payments to officials.

Which of the following is an approach to social media marketing that encourages individuals to pass along a marketing message to others, thus creating the potential for exponential growth in the message's exposure and influence?

Viral Marketing

Which of the following terms is used to describe an effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by an individual or organization?

Whistle-Blowing

__ treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

White-box testing

Microsoft's third major variation of its operating system is _____.

Windows NT

third major variation of its operating system is

Windows NT

The company with the highest 2010 rating by Greenpeace based on its policies on toxic chemicals, recycling, and climate change was _____.

Wipro

It is difficult to quantify how much the use of IT has contributed to worker productivity because:

`many other factors influence worker productivity rates besides IT

Before a company can apply for an H-1B visa worker, it must file ___

a Labor Condition Application

Before a company can apply for an H-1B visa worker, it must file _____.

a Labor Condition Application

A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called _____.

a coemployment relationship

United States Patent and Trademark Office (USPTO)

a federal agency responsible for assigning rights for limited times to individuals or companies to use innovations

Which of the following is NOT one of the three major components of machine learning systems?

a function

An electronic health record includes _____.

a patient's immunization records

An electronic medical record includes which of the following?

a patient's immunization records

There are essentially no technical-support challenges to overcome when using a(n) _____.

cell phone

inappropriate material posted online include nonconsensual post that comprise intimate photos or videos of people without their permission is known as which of the following

a revenge porn

TO avoid legal issue and set clear guidelines and expectations for employees, employer should put which of the following in place

a social media policy

What are the classes of items that the US Supreme Court ruled that could not be patented?

abstract ideas, laws of nature, and natural phenomena

The _____ enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts.

acpa

Which of the following activities is least suited for automation?

activities associated with managing others

. An employee who identifies an illegal or unethical practice should begin to compile ___ to establish wrongdoing.

adequate documentation

an advantage of social network advertising over traditional advertising media is

ads can be targeted to reach people with the desired demographic characteristics

Despite the importance of _____ in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights.

anonymity

Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers?

artificial intelligence

Which of the following systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that simulate human intelligence processes?

artificial intelligence systems

Which of the following systems includes the people, procedures, hardware, software, data, and knowledge needed to develop compute systems and machines that simulate human intelligence processes?

artificial intelligence systems

The EICC has developed a(n) _____ for member organizations in which areas of improvement are assessed by certified, third-party firms.

audit program

Because wages in the IT field vary greatly, unethical companies can get around the ___

average salary requirement

Because wages in the IT field vary greatly, unethical companies can get around the _____.

average salary requirement

Someone keeps sending you instant messages after you have asked them to stop.

cyberharassment

An advantage of teleworking is that _____.

business operations can be continued even in the event of disaster

The National Center for Victims of Crime advises victims to:send the stalker a written notice that their contact is unwanted and that further contact should ____

cease

social networking platform

can be used for business purposes

a social networking

can be used for nonbusiness purpose

A process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge to improve healthcare delivery is known as which of the following?

clinical decision support

Compared to personal computers, cell phones _____.

come with an extended battery life

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following?

competitive intelligence

What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?

computerized provider order entry (CPOE) system

One of the fundamental ways in which companies can try directly to increase productivity is by _____.

consolidating operations to better leverage economies of scale

One of the fundamental ways in which companies can try directly to increase productivity is by:

consolidating operations to better leverage economies of scale

Which of these statements about contingent workers is true? They have neither an explicit nor an implicit contract for ___.

continuing employment

Telework allows for the _____ in the event of a local or national disaster and supports national pandemic-preparedness planning.

continuity of business operations

IT investments may not produce tangible results such as:

cost savings

IT investments may produce tangible results such as:

cost savings

Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim?

cyberstalking

A type of business system is the , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio.

decision support system

A type of business system is the _____, which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio.

decision support system

A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following?

decision support system

Which of the following can read the machine language of a software program and produce the source code?

decompiler

most social networking web sites have terms of use agreement that states the web site has the rights to

delete material that violates the site's polices

Most social networking Web sites have terms of use agreement that states the Web site has the right to:

delete material that violates the site's policy

Products, such as statements of requirements, flowcharts, and user documentation, are known as ___

deliverables

An example of robotics can be found in which of the following examples?

device used to move heavy pallets

The _____ is a term used to describe the gulf between those who do and those who don't have access to modern information and communications technology.

digital divide

employers can legally reject a job applicant based on the contents of the individual's social networking profile

discrimination

One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process known as which of the following?

dynamic testing

what steps does Facebook plan to take in order to identify and prevent the posting of inappropriate images in Facebook messengers

employ aritifical intelligence and dimage recognition

What steps does Facebook plan to take in order to identify and prevent the posting of inappropriate images in Facebook, Messenger, and Instagram?

employ artificial intelligence and image recognition

In which of the following practices does a business transfer all or part of its workforce to another firm, which handles all human-resource-related activities and costs?

employee leasing

Offshore outsourcing is a form of outsourcing in which the services are provided by an organization whose _____.

employees are in a foreign country

The courts have ruled in favor of using reverse engineering to:

enable interoperability

Electronic Product Environmental Assessment Tool (EPEAT) is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 _____ criteria.

environmental

The EICC has established a code of conduct that defines performance, compliance, auditing, and reporting guidelines across five areas of social responsibility: labor, health and safety, environment, management system, and _____.

ethics

(T/F) A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

fALSE

(T/F) Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.

fALSE

(T/F) In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.

fALSE

(T/F) In the context of maturity level distribution across a large sample of organizations, the percentage of organizations at the initial maturity level is 36.

fALSE

(T/F) Informal, spontaneous meetings become easier to handle with telework.

fALSE

(T/F) Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.

fALSE

(T/F) Productivity in a factory is measured by the annual revenue an employee generates divided by the employee's annual salary.

fALSE

(T/F) The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.

fALSE

(T/F) When developing safety-critical systems, a key assumption must be that safety will automatically result fromfollowing an organization's standard development methodology.

fALSE

(T/F) The information in the EHR is not easily shared with others outside of the healthcare organization where the data originated.

fa;se

which of the following is currently the most popular social network destination worldwide

facebook

(T/F) A patient who doesn't have to pay for a medical test or procedure is probably more likely to consider its cost-to-benefit ratio.

false

(T/F) After a worker's H-1B visa expires, the foreign worker must remain outside the United States for six years before another H-1B will be approved.

false

(T/F) Am employer can legally screen applicants based on race or ethnicity.

false

(T/F) Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding non-compete clauses to employment contracts.

false

(T/F) Companies are prohibited from exporting quantities of used electronics to companies in underdeveloped countries.

false

(T/F) Contingent work is a job situation in which an individual has an implicit contract for long-term employment.

false

(T/F) If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.

false

(T/F) In hospital-related settings, implementing CPOE is associated with a 10 percent decline in preventable adverse drug effects.

false

(T/F) It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms.

false

(T/F) Medical information Web sites are intended to be substitutes for professional medical advice.

false

(T/F) Organic media marketing involves the use of social networks to communicate and promote the benefits of products and services.

false

(T/F) Patient involvement with remote doctors may have a positive effect on the local doctors' relationships with their patients.

false

(T/F) Quotation marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.

false

(T/F) Reverse engineering can only be applied to computer hardware, not computer software.

false

(T/F) The United States has several federal laws prohibiting the export of toxic waste.

false

(T/F) The cost of the necessary equipment and communication services for telework is usually negligible.

false

(T/F) The deciding factor in whether workers are considered contractors is the agreement signed by the workers, not the degree of control the company exercises over them.

false

(T/F) The goal of viral marketing is to spread rumors and innuendo about a rival's product that will hurt its image.

false

(T/F) Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.

false

As a result of the lack of consistent quality in software, many organizations avoid buying the___ release of a major software product.

first

It can take _____ for IT investment to result in a significant increase in productivity.

five to seven years

Researchers have found that it can take how long for IT investment to result in a significant increase in productivity?

five to seven years

organizations can use which of the following to capture interviews with customers

google hangout on AIR

After a six-year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following?

green card

The safety engineer uses a logging and monitoring system to track which of the following?

hAZARds

Successful outsourcing projects require day-to-day interaction between software development and business teams, so it is essential for the hiring company to take a(n) _____ approach to project management.

hands-on

The safety engineer uses a logging and monitoring system to track from a project's start to its finish.

hazards

Which process can reduce expensive redundant tests that are ordered because one provider does not have access to the clinical information stored at another provider's location?

health information exchange

A complex system used in IT is a redundant array of independent disk (RAID), which is commonly used in which type of file servers?

high-volume data storage

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers?

high-volume data storage

Remote monitoring is also known as which of the following?

home monitoring

In the context of Capability Maturity Model of Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?

iNITIAL

Claim rights or positive rights

impose an obligation on some people to provide certain things for others

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the _____ maturity level.

initial

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the ____ maturity level.

initial3

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?

initials

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using ___

integration testing

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?

integration testing

Poor ___ design between systems and humans can greatly increase risk, sometimes with tragic consequences.

interface

Patent law protects which of the following?

inventions

When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of

invisible information gathering

Which of the following limits deceptive commercial email and outlines spammers' responsibilities:

the CAN-SPAM Act

If a business follows an "opt-in" policy for handling personal data, information about a customer

may not be released unless the customer gives permission

A disadvantage of using contingent workers is that they _____.

may pass on information about corporate processes and strategies to subsequent clients who could be competitors

Laypeople can access reliable and objective information on a wide range of medical topics on _____.

medical information Web sites

The contents of _____ are for informational purposes only and not intended to be substitutes for professional medical advice, diagnosis, or treatment.

medical information Web sites

The primary areas where IT has been applied include all of the following except:

medical language processing

Which aspect of artificial intelligence involves technology that allows computers to understand, analyze, manipulate, and/or generate English?

natural language processing

If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us.

negative

Patient involvement with remote doctors may have a _____ effect on the local doctors' relationships with their patients and could adversely affect patient care.

negative

The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following?

open source license

Firefox and OpenOffice are all examples of which of the following?

open source software

An airline's online ticket reservation system and an electronic funds transfer system that moves money among banks, are examples of __

order-processing systems

An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following?

order-processing systems

Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts?

organic media marketing

What is another name for a tethered PHR?

patient portal

Any defect in ___ software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees.

process-control

Any defect in _____ software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees

process-control

The use of software introduces ___ that concern many executives.

product liability issues

The use of software introduces _____ that concern many executives.

product liability issues

A _____ states the principles and core values that are essential to the work of a particular occupational group.

professional code of ethics

Professionals' liability for injuries caused by their negligence is referred to as _____.

professional malpractice

One common use of wireless technology in the healthcare field is to _____.

provide a means to access and update EHRs

Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect which of the following?

quality

The ___ of software, its usability, and its timely development are critical to almost everything businesses do.

quality

How often does The Bureau of Labor Statistics track U.S. productivity?

quarterly

The _____ of the False Claims Act allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.

qui tam provision

What is the name of the project at the Georgia Institute of Technology that uses stores to teach human values to robots?

quixote

The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?

raising brand awareness

A key element of safety-critical systems is ___, the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.

redundancy

Cybersquatters:

register domain names for famous trademarks or company names to which they have no connection

After a worker's H-1B visa expires, the foreigner must _____.

remain outside the United States for one year before another H-1B petition will be approved

a major of social shopping platforms generate revenue through which of the following

retailer advertising

One frequent use of _____ for software is to modify an application that ran on one vendor's database so that it can run on another's.

reverse engineering

After an organization determines all pertinent ___ to a system, it must decide its acceptable level.

risks

After an organization determines all pertinent _____ to a system, it must decide its acceptable level.

risks

Which of the following was a legislator and former singer and entertainer who co-sponsored the Copyright Term Extension Act?

sONNY bono

A(n) __ is one whose failure may cause human injury or death.

safety-critical system

A(n) _____ is one whose failure may cause human injury or death.

safety-critical system

The Health Information Technology for Economic and Clinical Health Act is intended to increase the use of health information technology by _____.

saving the government $10 billion through improvements in the quality of care, care coordination,reductions in medical errors, and duplicate care

which social meidia platform provides filters that alter the user's face by smoothing and whitening skin m changing eye shape nose size

snapchat

which of the following typically involves the use of social network to communicate and promote the benefits of .....

social media marketing

To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in place?

social media policy

A(n) ___ is any error that, if not removed, could cause a software system to fail to meet its users' needs.

software defect

A(n) _____ is any error that, if not removed, could cause a software system to fail to meet its users' needs.

software defect

A ____ is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software.

software development methodology

Which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software?

software development methodology

Which of the following claims as its invention some feature of process embodied in instructions executed by a computer?

software patent

Which of the following claims as its invention some feature or process embodied in instructions executed by a computer?

software patent

Which of the following is an example of cyberharassment?

someone keeps sending you instant messages after you have asked them to stop

Offshore outsourcing has the potential to dramatically _____ development efforts and enable workers to make progress on the project around the clock.

speed up

(T/F) In Olmsted v. United States (1928), the US Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.

t

(T/F) US v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.

t

_____ is a work arrangement in which an employee works away from the office.

tELEWORK

Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded?

tHREE

(T/F) A disadvantage of teleworking is that the contributions of teleworkers may not be fully recognized and credited.

tRUE

(T/F) Copyright law protects authored works such as art, books, and film.

tRUE

(T/F) Defining and controlling the appropriate level of access to intellectual property are complex tasks.

tRUE

(T/F) Doctors were among the first large groups to start using personal digital assistants (PDAs) on the job.

tRUE

(T/F) Employers can legally reject a job applicant based on the individual's social media activity if the company is not violating federal or state discrimination laws.

tRUE

(T/F) It is difficult to quantify how much the use of IT has contributed to worker productivity due to the fact that many other factors influence worker productivity.

tRUE

(T/F) Software, video games, multimedia works, and Web pages can all be copyrighted.

tRUE

(T/F) The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and implements two 1996 WIPO treaties.

tRUE

(T/F) Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights.

tRUE

(T/F) Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury.

tRue

A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its ____ needs.

technical staffing

The Communication Assistance for Law Enforcement Act (CALEA) said that

telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)

The False Claims Act was enacted during _____.

the U.S. Civil War

The False Claims Act was enacted during which war?

the U.S. Civil War

Copyright and patent protection was established through which of the following?

the U.S. Constitution

The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____

the degree of control the company exercises over the employees

The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____.

the degree of control the company exercises over the employees

The legal guidelines for determining whether material is obscene include all of the following EXCEPT

the material is intended for or distributed to persons under the age of 18

Software quality is defined as the degree to which a software product meets:

the needs of its users.

When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may require help with _____.

their English

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is:

there is no need to file an application or disclose a trade secret to gain protection

One potential disadvantage of using contingent workers is that _____.

they may not feel a strong connection to the company for which they are working

How many classes of items did the U.S. Supreme Court rule could not be patented?

three

Violators of the False Claims Act are liable for _____ times the dollar amount for which the government was defrauded.

three

Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's?

trademark

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____.

training costs

Which of the following examples is a use of wireless technology in the healthcare field?

transmit ECG data to a physician's smartphone

(T/F) A computerized provider order entry (CPOE) system enables physicians to place orders for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.

true

(T/F) A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.

true

(T/F) A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.

true

(T/F) A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.

true

(T/F) A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case.

true

(T/F) According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-granting computer science departments has declined dramatically from 2004 to 2009.

true

(T/F) Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S. tech job openings per year.

true

(T/F) Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes.

true

(T/F) Cyberharassment is a form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress.

true

(T/F) Cyberstalking can escalate into physical stalking and even physical assault.

true

(T/F) Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn."

true

(T/F) More advanced artificial-intelligence-based clinical decision support systems can doctors choose the proper dosage levels of medication based on a patient's most recent tests results.

true

(T/F) Online tools offered by medical insurers enable patients to compare the quality, safety, and cost information on hospitals nationwide.

true

(T/F) Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. T 25. A co

true

(T/F) Remote monitoring involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider.

true

(T/F) Some 18 percent of private employers surveyed say they have dismissed employees because of something they posted on social media.

true

(T/F) Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation.

true

(T/F) Telework increases the potential for lost or stolen equipment.

true

(T/F) The EICC was established to promote a common code of conduct for the electronics and ICT industry.

true

(T/F) The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement.

true

(T/F) The development and use of new medical technology, such as new diagnostic procedures and treatments, also contributes to the increase in healthcare spending per person.

true

(T/F) There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions.

true

(T/F) To be classified as a truly green PC, the PC must meet other criteria than simply use less electricity to run than the standard computer.

true

(T/F) Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers

true

(T/F) Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.

true

(t/f) Programs with open source code can be adapted to meet new needs, and bugs can be rapidly identified and fixed.

true

Global market research company JD power claims that how many consumers have use a campanny's social media channel for customer service

two third

Global market research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?

two-thirds

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in ___ for file servers.

used in IT is a redundant array of independent disks (RAID), which is commonly used in ___ for file servers. high-volume data storage

Live telemedicine usually involves a _____ to establish connection between a patient and healthcare providers at different sites.

videoconference link

In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following?

warranties

Software suppliers frequently write _____ to attempt to limit their liability in the event of nonperformance.

warranties

Software suppliers frequently write to attempt to limit their liability in the event of nonperformance.

warranties

A(n) __assures buyers or lessees that a product meets certain standards of quality.

warranty

The False Claims Act provides strong _____ protection.

whistle blower

An H-1B visa is a temporary visa granted for people who _____.

work in specialty occupations that require at least a four-year bachelor's degree


Set pelajaran terkait

(Health) 8 - Florida Laws and Rules Pertinent to Insurance

View Set

Understanding Operating Systems - Computer Basics - GCF LearnFree.org

View Set

English 12A - Unit Five: For the Sake of Argument

View Set

Unit 2: Security Solutions for Wi-Fi Networks

View Set

Industrialization and the British Empire

View Set

IMTA Music Theory Terms - Levels A-F

View Set

Greek Religion: key modern scholarship

View Set

Chapter 13: Financial Statement Analysis

View Set

Module 5 - Networking and Content Delivery [Knowledge Check], Module 4 - AWS Cloud Security [Knowledge Check], Module 3 - AWS Global Infrastructure Overview [Knowledge Check], Module 2 - Cloud Economics and Billing [Knowledge Check], AWS Module 1-6

View Set

Chapter 39: The Child with a Genitourinary Disorder Due

View Set