Ethics in Computer Science Exam 2
In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?
$5,000
For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered?
25 years
The number of Internet users worldwide is quickly approaching which of the following?
4 billion
Approx. how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?
400 hours
Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?
ACPA
What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?
Black-box testing
Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?
Content Scramble System (CSS)
Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim?
Cyberstalking
Which of the following can be oral, written, or inferred from the seller's conduct?
Express warranties
An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?
Failure mode and effects analysis (FMEA)
The goal of which of the following was to entice whistle-blowers to come forward by offering them a share of the money recovered?
False Claims Act
Which country is considered one of the best sources of programming skills outside of Europe and North America?
India
Which of the following is true of the International Organization for Standardization?
It is a worldwide federation of national standards bodies from 161 countries
Which term refers to methods within the development process that guarantee reliable operation of the product?
Quality assurance
The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?
Reverse engineering
Which of the following terms is defined as the potential of gaining or losing something of value?
Risk
Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services?
Social media marketing
Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.
Statements on Standards for Attestation and Engagements No. 16
Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?
TRIPS agreement
Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?
The Economic Espionage Act (EEA) of 1996
Which of the following is true of strategies for engineering quality software?
The first release of any software rarely meets all its user's expectations
Which of these statements about contingent workers is true?
They have neither an explicit nor an implicit contract for continuing employment.
T/F: Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.
True
t/f: Risk is the potential of gaining or losing something of value
True
A patent is a grant of a property right issues by which entity?
USPTO
A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called which of the following?
a coemployment relationship
An advantage of social network advertising over traditional advertising media is:
ads can be targeted to reach people with the desired demographic characteristics
A social networking platform:
can be used for business purposes
Which of the following can read the machine language of a software program and produce the source code?
decomplier
Most social networking Web sites have terms of use agreement that states the Web site has the right to:
delete material that violates the site's policies
t/f: An employer can legally screen applicants based on race or ethnicity.
false
t/f: Contingent work is a job situation in which an individual has an implicit contract for long-term employment
false
t/f: Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.
false
t/f: Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online
false
t/f: MySpace is the most popular social network destination worldwide
false
t/f: Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.
false
t/f: Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online rating, and reviews, tweets and retweets, reposts, and recommendations
false
t/f: Reverse engineering can only be applied to computer hardware, not computer software
false
t/f: The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.
false
t/f: The impact of software defects is always trivial
false
t/f: There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT workers.
false
t/f: Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers
false
t/f: Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded
false
t/f: When developing a safety-critical systems, a key assumption must be that safety will automatically result from the following an organization's standard development methodology.
false
t/f: industrial espionage and competitive intelligence are essentially the same
false
What term is used to refer to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements?
gig economy
After a six year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following?
green card
The safety engineer uses a logging and monitoring system to track which of the following?
hazards
What classification is given to an individual who provides services to another individual or organization according to terms defines in a written contract or within a verbal agreement?
independent contractor
After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?
integration testing
While using social networks as part of the hiring process, employers can:
look at the profiles of potential candidates
When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?
negligence
Firefox and OpenOffice are all examples of _____.
open source software
Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts?
organic media marketing
Process-control computers enable the process to be monitored for variants from operating standards and to eliminate product defects before the affect which of the following?
quality
Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds
qui tam provision
The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?
raise brand awareness
Cybersquatters:
register domain names for famous trademarks or company names to which they have no connection
A majority of social shopping platforms generate revenue through which of the following?
retailer advertising
Which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software?
software development methodology
Copyright and patent protection was established thru which of the following?
the U.S. Constitution
One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is:
there is no need to file an application or disclose a trade secret to gain protection
Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded?
three
T/F: The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and implements two 1996 WIPO treaties.
true
t/f: A failure mode describes how a product or process could fail to perform the desired functions described by the customer.
true
t/f: A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.
true
t/f: A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case
true
t/f: Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S tech job openings per year
true
t/f: Companies can use the Statement on Standards for Attestation Engagements (SSAE) No. 16, to ensure that company data is protected in an outsourcing arrangement
true
t/f: Copyright law protects authored works such as art, books, and film
true
t/f: Cyberstalking can escalate into physical stalking and even physical assault
true
t/f: Defining and controlling the appropriate level of access to intellectual property are complex tasks
true
t/f: Foreign professionals can convert their H-1B visas into permanent green cards
true
t/f: If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press
true
t/f: Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn"
true
t/f: There is no federal product liability law
true
t/f: Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights.
true
t/f: User acceptance testing is performed by trained end users to ensure that the system operates as they expect.
true
Global market research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?
two-thirds