ITE301
QN=201 White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown.
*False
QN=203 User acceptance testing is a process improvement approach that defines the essential elements of effective processes.
*False
QN=204 The Capability Maturity Model Integration-Development process improvement approach defines six levels of software development maturity.
*False
QN=207 Many shortcuts can be taken when safety-critical software is being developed.
*False
QN=208 Redundancy, the provision of multiple interchangeable components to perform a single function, is a key element of the standard decision support system.
*False
QN=21 An individual's manager has very little impact on his/her ethical behavior.
*False
QN=213 The standard of living is about the same among groups within a single country although it varies greatly from country to country.
*False
QN=215 The decade of 1990-2000 demonstrated the greatest rate of increase in worker productivity in the history of the United States.
*False
QN=217 There is a simple and direct relationship between investment in IT and U.S. productivity.
*False
QN=218 There is seldom much lag time between the application of innovative IT solutions and the capture of significant productivity gains.
*False
QN=219 Investment in IT is by far the single most important driver of worker productivity.
*False
QN=221 Telework, or telecommuting, focuses on enabling workers to work from home.
*False
QN=225 There really is no such thing as a digital divide.
*False
QN=226 While over 812 out of every 1,000 people in the United States own a computer, that figure drops to less than 20 out of 1,000 in the Middle East and Africa.
*False
QN=228 The digital divide does not exist in the United States.
*False
QN=229 One of the goals of the Education Rate (E-Rate) program is to help schools and churches to obtain access to state-of-the-art services and technologies at discounted rates.
*False
QN=230 The E-Rate program is one example of a government program that has been well run and free of abuse, fraud, and scandal.
*False
QN=235 An electronic health record is a summary of health information generated by each physician encounter in any healthcare setting.
*False
QN=236 The comprehensive use of Electronic Health Records has spread to well over 50% of all U.S. hospitals and physicians.
*False
QN=237 Although quick to invest in IT, the healthcare industry has been a laggard in adopting mobile and wireless technology.
*False
QN=239 The use of telemedicine is a natural extension of medical practices followed for decades and really does not require addressing new legal and ethical issues.
*False
QN=24 Problem stakeholders who stand to lose or gain from a situation should be kept out of the decision making process as they will simply introduce their personal biases.
*False
QN=240 The use of medical web sites have become quite sophisticated and can be used as a reliable substitute for professional medical advice and diagnosis.
*False
QN=243 Although Twitter is a very rapidly growing service, its founders have been able to manage the rapid growth with few start-up problems or on-going service issues.
*False
QN=244 During the 2009 Iranian elections, Twitter emerged as a highly reliable and accurate news source.
*False
QN=246 Social networking Web sites are used strictly to communicate with your friends, family members, and colleagues.
*False
QN=247 Currently, there is a fairly narrow range of interests represented in social networking Web sites.
*False
QN=248 There are a few hundred social networking Web sites worldwide.
*False
QN=249 According to the 2009 Pew Internet & American Life Project, about 55% of U.S. Internet users age 18 and older have a profile on an online social networking Web site.
*False
QN=25 The utilitarian approach to ethical decision making treats everyone the same and shows no favoritism or discrimination.
*False
QN=250 Social networking Web sites are used almost exclusively for nonbusiness purposes with almost no business applications.
*False
QN=254 The goal of viral marketing is to spread rumors and innuendo about a rival's product that will hurt its image.
*False
QN=257 Employees cannot legally reject a job applicant based on the contents of the individual's social networking profile.
*False
QN=259 Cyberbullying is most common among males and among 18- to 20-year olds.
*False
QN=26 The virtue ethics approach to decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected.
*False
QN=261 Facebook spent two years purging potential problem members from its site, including over 100,000 registered sex offenders.
*False
QN=262 Under no conditions can a Web site remove user submitted content as this would be a violation of their right to freedom of speech.
*False
QN=268 No organizations have yet figured out how to conduct classes and meetings from within a virtual learning world.
*False
QN=27 If the desired results are not achieved upon implementation of the solution, one should return to the "identify alternatives" step of the decision making process and rework the decision.
*False
QN=270 Many researchers feel that the true extent of cyberstalking has been greatly exaggerated.
*False
QN=137 The Children's Internet Protection Act was eventually found to be unconstitutional.
*False
QN=138 Anonymous expression is a relatively new phenomena that came shortly after the arrival of the Internet allowed people to express their opinions without revealing their identity.
*False
QN=14 The Department of Justice has established sentencing guidelines that suggest stiffer penalties for convicted executives if their companies have ethics programs.
*False
QN=142 Anonymity on the Internet is guaranteed.
*False
QN=143 The New York State Court in Pre-Paid v. Sturtz et al. set a legal precedent that refined the criteria that the courts apply when deciding whether or not to approve subpoenas requesting the identity of anonymous Web posters.
*False
QN=144 In the United States, speech that is annoying, critical, demeaning, or offensive is not protected under the First Amendment.
*False
QN=145 Many Internet service providers reserve the right to remove content that, in their judgment, does not meet their standards documented in some form of user agreement or guidelines. However, the pulling of such content violates the subscriber's First Amendment rights.
*False
QN=147 Fewer and fewer organizations are allowing their employees to create their own personal blogs relating to their employment.
*False
11.Which statement about the "Professional Codes of Ethics" is not true
Participation in an IT professional organization does little to help IT workers stay on top of the many new developments in their field.
15. _________________ is used by marketers to optimize the number, frequency, and mixture of their ad placements.
Personalization software
# The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called____.
Redundancy
# Falsify the results of a quality assurance test can be found in...
Relationships Between IT Workers and Employers
# vacation policy; time off for a funeral or illness in the family; tuition reimbursement, can be in...
Relationships Between IT Workers and Employers
14) The __v.ACLU suit
Reno
QN=273 The number of declared undergraduate computer science majors at doctoral-granting computer science departments has declined steadily for the past decade — 1999 to 2009.
*False
QN=276 Contingent workers must be treated like official employees of the company and are eligible for vacation, sick days, and retirement benefits.
*False
QN=279 If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.
*False
QN=28 To the detriment of all concerned, the importance of ethics and human values have been over emphasized in the midst of many IT breakthroughs in recent years.
*False
QN=280 It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.
*False
QN=282 If workers sign an agreement indicating that they are contractors and not employees, this is the deciding factor as to whether or not they are an employee and not the degree of control the company exercises over the employees.
*False
QN=283 U.S. employers need not pay an H-1B worker roughly the same rate as U.S. citizens performing the same work.
*False
QN=284 After a worker's H-1B visa expires, the foreign worker must remain outside the United States for six years before another H-1B will be approved.
*False
QN=286 Each year the U.S. Congress sets a federal cap on the number of H-1B visas to be granted. Since 2004 the cap has been set at 75,000.
*False
QN=287 H-1B workers are highly educated and need little assistance to work effectively in U.S. organizations.
*False
QN=288 There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT workers.
*False
QN=289 Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.
*False
QN=291 The cost advantage of offshore outsourcing to India is continuing to increase.
*False
QN=293 A whistle-blower must be an employee of the company that is misbehaving.
*False
QN=294 Violators of the False Claims Act are liable for four times the dollar amount for which the government was defrauded.
*False
QN=298 The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.
*False
QN=32 Professionals require advanced training and experience, they must exercise discretion and judgment in the course of their work; and their work can be easily standardized.
*False
QN=35 There has been a lowering of expectations for the clients of professional service organizations. They are less aware of what they need from service providers and less willing to look outside their own organization to get the best possible services.
*False
QN=84 Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks.
*False
QN=85 Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
*False
QN=22 Most of us have developed a decision-making process we use almost automatically, without thinking about the steps we go through.
*True
QN=220 It is difficult to quantify how much the use of IT has contributed to worker productivity.
*True
QN=222 Some work roles and some individuals are not well suited for telework opportunities.
*True
QN=223 A potential disadvantage of telework is that some teleworkers may suffer from isolation and may not really feel "part of the team."
*True
QN=224 A potential disadvantage of telework is that can create potential security issues.
*True
QN=227 The digital divide exists not only between more and less developed countries but also within countries—among age groups, economic classes, and people who live in cities versus those in rural areas.
*True
QN=23 The development of a good problem statement is the most critical step in the
*True
QN=231 It is estimated that more than 1 billion personal computer will be connected to the Internet by 2010 leaving some 5.5 billion people unconnected.
*True
QN=232 Mobile phones have many distinct advantages that lead industry observers to think that it will be the cell phone that ultimately bridges the digital divide rather than the personal computer.
*True
QN=233 The development and use of new medical technology, such as new diagnostic procedures and treatments has increased spending and "accounts for one-half to two-thirds of the increase in healthcare spending in excess of general inflation."
*True
QN=234 Although the healthcare industry depends on highly sophisticated technology for diagnostics and treatment, it has been slow to implement IT solutions to improve productivity and efficiency.
*True
QN=238 Store-and-forward telemedicine does not require the presence of the patient and care provider at the same time.
*True
QN=241 Twitter text-based posts must be 140 characters or less.
*True
QN=242 Twitter users can restrict delivery of their messages, control whose tweets they receive, when they receive them, and on what devices.
*True
QN=245 During the 2009 Iranian elections, there were rumors that the Iranian government attempted to block Twitter traffic and used Twitter to communicate its own message.
*True
QN=251 Social network advertising has at least two advantages over more traditional advertising media such as radio, TV, and newspapers.
*True
QN=252 There are a number of ethical issues associated with using social network advertising to send messages to an individual's network of friends.
*True
QN=253 Coca-Cola has been able to create a highly popular Facebook fan page to promote its image and brands.
*True
QN=255 More than 1 out of 5 hiring managers use social networking Web sites as a source of information about candidates.
*True
QN=256 Of those hiring managers who use social networking Web sites to screen candidates, over one-third have found information that made them drop a candidate from consideration.
*True
QN=258 Some social shopping Web sites earn money by sharing with retailers data about their members' likes and dislikes.
*True
QN=260 Cyberstalking is the adult version of cyberbullying.
*True
QN=263 A visitor to a virtual world represents him- or herself through an avatar.
*True
QN=264 In some virtual worlds, an avatar can earn virtual world money by performing some task in the virtual world and convert their virtual world money into real world cash.
*True
QN=265 Some virtual world activities can cause real life anguish for the human owners of the avatars involved but may or may not rise to the level of real life crimes.
*True
QN=266 Some virtual activities are clear violations of real world laws.
*True
QN=267 A number of organizations are exploring the use of virtual online worlds to improve teaching, learning, and creative expression.
*True
QN=269 A virtual world may support e-commerce and allow users to sell their own real products within the real world.
*True
QN=271 Computer hardware manufacturers are sometimes faced with dealing with raw material suppliers who funnel money to groups engaged in armed conflict, including some who commit crimes and human rights abuses.
*True
QN=272 Temporary workers, contractors, consulting firms, H-1B workers, and outsourced offshore workers are examples of nontraditional workers.
*True
QN=274 IT firms and organizations that use IT products and services are concerned about a shortfall in the number of U.S. workers to fill positions in networking and data communications analysis.
*True
QN=275 Contingent work is a job situation in which an individual does not have an explicit or implicit contract for long-term employment.
*True
QN=277 In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee.
*True
QN=278 When an organization decides to use contingent workers for a project, it is making a trade-off between completing a single project quickly and cheaply versus developing people within its own organization.
*True
# Most of us have developed a simple decision-making model that includes ..... steps
5
# Organizations have at least .... good reasons for promoting a work environment in which they encourage employees to act ethically
5
QN=254 Companies applying for H-1B visas must offer a wage that is not _____ less than the average salary for the occupation.
5%
QN=226 Estimates from Internet safety groups reveal an increasing number of cyberstalking reports with _____ reports per day for help from victims of cyberstalking.
50 to 500
QN=207 In a Commonwealth Fund study of 41 Texas hospitals that treat a diverse group of patients, researchers found that when physicians electronically entered patient care instructions, there was a _____ reduction in the likelihood of death related to some procedures.
50%
# EPEAT (Electronic Product Environmental Assessment Tool) is a system that enables purchasers to evaluate, compare, and select electronic products based on ..... environmental criteria
51
# assess the feasibility of implementing the mitigation options, is step....of risk assessment
6
QN=17 While nearly half of all employees surveyed saw some form of ethical misconduct in 2007, less than ____ of those employees reported the misconduct to management.
60%
QN=250 Congress has set the number of H-1B visas to be granted at _____ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees.
65,000
# As a member of the professional services industry, IT workers must be cognizant of ..... major factors that are transforming the professional services industry
7
34. contributory negligence
A defense in a negligence case in which the defendant argues that the plaintiffs' own actions contributed to their injuries.
63. European Union Data Protection Directive
A directive passed by the European Union in 1998 that requires any company doing business within the borders of 15 western European nations to implement a set of privacy directives on the fair and appropriate use of information; it also bars the export of data to countries that do not have comparable data privacy protection standards.
32."For man, when perfected, is the best of animals, but, when separated from law and justice, he is the worst of all".This is a quote from
Aristotle
55) "Man, when perfected,"
Aristotle
QN=5 ____ had one of the highest software piracy rates in 2007.
Armenia
QN=170 There is no federal product liability law; instead, product liability is mainly covered by common law and ____ which deals with the sale of goods.
Article 2 of the Uniform Commercial Code
# Software that generates and grades tests that humans can pass but that all but the most sophisticated computer programs cannot is called _________________.
CAPTCHA
# An approach that defines the essential elements of an effective process and outlines a sys- tem for continuously improving software development is____.
CMMI-DEV
QN=256 _____ is a country known as a leading offshore outsourcing country that is close to the United States, has no language barriers, and has a highly skilled labor pool.
Canada
20) In 1997, Cleveland State
ERP
# IT user is the person for whom a hardware or software product is designed, and that it is the IT professional's duty to deliver products and services that best unmet the users' needs.
TRUE
# Computer companies looking to manufacture green computers are challenged to produce computers that use no electricity
F
# Cyberbullying is more common among 15- and 16-year-old males than any other group of social networking users
F
# H-1B workers may also be used when there are no temporary shortages of needed skills
F
# It is not unusual for cyberstalking to escalate to vandalism, physical stalking, and even cyberstalking
F
# Outsourcing and offshore outsourcing are used to meet staffing needs while potentially reducing and slowing down project schedules
F
# Police can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not violating discrimination laws
F
# Social shopping Web sites generate money primarily through advertising and by selling cyberbullying
F
# Social shopping Web sites generate money primarily through advertising and by selling cyberstalking
F
# The contingent workforce includes dependent workers
F
# The healthcare industry spends less per employee on IT than public industry
F
# There are around 700,000 registered sex offenders in the United States, and 90,000 of them were found on and subsequently banned from the social networking Web site Facebook
F
# To date, no practical business applications of online virtual worlds have been implemented
F
# wo main reasons have been advanced as the cause of rising healthcare costs: the use of more expensive technology and the E-Computing of patients from the true costs of medical care.
F
14.Congress specifically defined which content or Web site should be
F
18.Utilitarian approach can be applied to the business world by equating the virtues of a good businessperson with those of a good person
F
4. Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest.
F
# A copy is a form of protection for intellectual property that does not require any disclosures or filing of an application
FALSE
# A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the national level and often requires that the recipient pass a test of some kind.
FALSE
# A patent is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.
FALSE
# A reliability evaluation technique that can determine the effect of system and equipment failures is risk
FALSE
# A standard, proven work process for the development of high-quality software is called a bug
FALSE
# A very limited amount of open source code is in use today
FALSE
# About one in six regular Internet users visits a Web sex site at least once per month
FALSE
# An organization with a successful ethics program is one in which employees are will- ing to post advice about unethical issues that arise
FALSE
# An organization with a successful ethics program is one in which employees are will- ing to seek advice about unethical issues that arise
FALSE
# An organization with a successful ethics program is one in which employees are will- ing to seek post advice about unethical issues that arise
FALSE
# Anonymous expression, or the expression of opinions by people who do not reveal their identities, has been found to be unconstitutional.
FALSE
# Business Software Alliance gave sweeping new powers to law enforcement agencies to search telephone, e-mail, medical, financial, and other records; it also eased restrictions on foreign intelligence gathering in the United States
FALSE
# CMM requiring organizations to develop formal quality management systems that focus on identifying and meeting the needs, desires, and expectations of their customers.
FALSE
# Companies that are viewed as harmful to their community may find that positive publicity reduces sales, impedes relationships with some business partners, and attracts unwanted government attention.
FALSE
# Congress specifically defined which content or Web sites should be forbidden or which measures should be used—these decisions were left to individual school districts and library systems
FALSE
# Decreased service sophistication is a major factors that are transforming the professional services industry
FALSE
# Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will NOT protect them against anticipated punishment.
FALSE
# Even within the same society, people can have strong agreements over important moral issues
FALSE
# FMEA requiring organizations to develop formal quality management systems that focus on identifying and meeting the needs, desires, and expectations of their customers are the standards.
FALSE
# Facebook is a popular business-oriented Web site that is used by professionals for networking
FALSE
# From a legal perspective, IT workers are recognized as professionals because they are not licensed by the state or federal government
FALSE
# Health, crime, and other emergencies could be resolved more quickly if people in trouble had access to a communications network is a valid reason for trying to increase the digital divide
FALSE
# Hotmail employed a direct marketing campaign when it first launched its service, with each e-mail sent by a Hotmail user containing a short message that promoted Hotmail's free e-mail service
FALSE
# Hotmail employed a indirect marketing campaign when it first launched its service, with each e-mail sent by a Hotmail user containing a short message that promoted Hotmail's free e-mail service
FALSE
# IT user is the person for whom a hardware or software product is designed, and that it is the IT professional's duty to deliver products and services that best unmet the users' needs.
FALSE
# If an intrusion occurs, there must be a clear reaction plan that addresses notification, evidence protection, activity log maintenance, containment, enrollment, and uncovered
FALSE
# Implementing CIPA in libraries is much more easier because a library's services are open to people of all age
FALSE
# In a lawsuit alleging risk, responsibility is limited to harmful defects that could have been detected and corrected through "reasonable" software development practices.
FALSE
# In contrast to adult pornography, few federal laws address child pornography.
FALSE
# Install cracked software in working pc means software piracy
FALSE
# It is difficult to apply principles and codes of ethics inconsistently across cultures.
FALSE
# Managers' behavior and expectations can partly influence employees' ethical behavior
FALSE
# Mispresentation of contract occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract.
FALSE
# Most of us have developed a simple decision-making model that includes 4 steps
FALSE
# Outsourcing is a long-term business arrangement in which a company contracts for services with an inside organization that has expertise in providing a specific func- tion
FALSE
# Plagiarism is an issue only in academia
FALSE
# Putting source code into the public domain with no copyright is equivalent to creating open source code
FALSE
# Responsibility for compliance—that is. ensuring that ethical procedures are put into place and inconsistently adhered to throughout the organization
FALSE
# Schools subject to COPA are required to adopt a policy to monitor the online activities of minors.
FALSE
# The IT security group must lead the effort to increase security breaches by implementing security policies and procedures, as well as effectively employing available hardware and software tools
FALSE
# The decade of 1990-2000 demonstrated the greatest rate of increase in worker productivity in the history of the United States.
FALSE
# The impact of a software defect can NOT be quite subtle or very serious
FALSE
# The key distinguishing factor between a gift and a bribe is that gift should be hidden.
FALSE
# The number of PCs per 1,000 people in the Middle East and Africa is more than in China
FALSE
# The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called risk
FALSE
# The security of any system or network is a combination of technology. policy, and rules and requires a wide range of activities to be effective
FALSE
# There are fewer than 60,000 Web sex sites
FALSE
# There is a federal product liability law governing product liability
FALSE
# There is only one definition of open source code
FALSE
# Utilitarian approach focuses on how fairly actions and policies distribute benefits and burdens among people affected by the decision
FALSE
# Whistle-blowing is another area that causes problems between employers and IT professionals because whistle-blowers frequently have no special information related to their position.
FALSE
1) The Fifth Amendment protects
FALSE
12) The Supreme Court
FALSE
2) Today, cryptography is a key
FALSE
30) A bribe is a crime even
FALSE
40) bribe made directly from donor to recipient?
FALSE
5) According to a study conducted
FALSE
54.An act designed to promote accuracy, fairness, and privacy of information in the files of credit-reporting companies is the
Fair Credit Reporting Act
QN=83 The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained.
Fair Credit Reporting Act
# One approach to treating consumer data responsibly is to adopt the ....; some companies also appoint a chief privacy officer
Fair Information Practices
QN=97 The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt.
Fair Information Practices
# A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is called a cyberterrorist. True or False?
False
# Implementation of a strong firewall provides adequate security for almost any network. True or False?
False
# Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest
False
# Résumé inflation is a usual and customary practice tolerated by employers. True or False?
False
# To date, there are no documented cases of cyberterrorism. True or False?
False
QN=9 ____ hired private investigators to identify members of its board of directors who were responsible for leaking confidential company information to the press.
Hewlett-Packard
QN=146 In 2009, ____ announced that it would donate some 3,000 patents for free use by developers to help them innovate and build new hardware and software. The announcement represented a major shift in this firm's intellectual property strategy and was meant to encourage other patent holders to donate their own intellectual property.
IBM
QN=240 The IT consulting firm with the most employees is _____.
IBM
QN=130 A(n) ____ is a numeric identifier assigned to each computer connected to the Internet.
IP address
# ....requiring organizations to develop formal quality management systems that focus on identifying and meeting the needs, desires, and expectations of their customers.
ISO 9000
QN=184 To obtain the ____ certificate, an organization must submit to an examination by an external auditor and have written procedures for all processes, follow those procedures, and prove to an auditor that it has fulfilled these requirements.
ISO 9000
# FPT Software dang theo chu?n b?o m?t thông tin c?a:
ISO27001
# The customer changes the scope of the project or the system requirements. can be found in relationship of...
IT Workers and Clients
# Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to _________________
IT staff
2. Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to _________________.
IT staff
QN=108 The institution and communication of an ____ establishes boundaries of acceptable behavior and enables managers to take action against violators.
IT usage policy
11) The term ____ distinguishes the person
IT user
# There are around 700,000 registered sex offenders in the United States, and 90,000 of them were found on and subsequently banned from the social networking Web site ....
MySpace
QN=128 One of the first rulings by the Supreme Court to address anonymity as an aspect of the Bill or Rights was the 1958 case ____.
NAACP v. Alabama
QN=76 The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services.
National Institute of Standards and Technology
# Brainstorming with just one other person will reduce your chances of identifying a broad range of alternatives and deter- mining the best solution, can be found in...
Identify Alternatives
QN=103 ____ is one of the fastest growing forms of fraud in the United States, directly impacting over 4% of the overall U.S. adult population in 2008 with a resulting loss of $48 billion.
Identity theft
QN=202 _____ created a competitor to the OLPC laptop computer called the classmate PC.
Intel
3) __ is a tern used to describe works of the mind, such as art, books
Intellectual property
QN=175 ____ occurs when a seller or lessor either misrepresents the quality of a product or conceals a defect in it.
Intentional misrepresentation
# Thông tin du?c s? d?ng trong n?i b?; không ti?t l? cho bên ngoài du?c dánh d?u:
Internal use
# An ... is software that can be used to block access to certain Web sites that con- tain material deemed inappropriate or offensive
Internet filter
49) A(n)__ is software
Internet filter
QN=118 Organizations may direct their network administrators to install a(n) ____ on employee's computers to prevent them from viewing sites that contain pornography or other objectionable material.
Internet filter
45.filtering, each Web site's content is evaluated immediately before it is displayed, using such techniques as object analysis and image recognition
Internet filtering
22) An approach to restricting
Internet service provider(ISP)
12. Under the USA PATRIOT Act, the FBI can issue a(n) _________________ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that the information is needed for an ongoing investigation.
National Security Letter
49. defamation
Making either an oral or a written statement of alleged fact that is false and harms another person.
QN=20 ____ is a likely cause of employees feeling "No one will ever know the difference, and if they do, so what?"
Management failing to hold people accountable for unethical actions
# .... can strongly influence employees' ethical behavior
Managers' behavior and expectations
# Which of the following is not a major cause of poor software quality?
Many organizations avoid buying the first release of a major software product
QN=36 ____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract.
Material breach of contract
QN=71 ____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.
Microsoft
3. An important Supreme Court case that established a test to determine if material is obscene and therefore not protected speech was _________________.
Miller vs California
QN=7 ____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.
Morals
Companies that are viewed as harmful to their community may find that negative publicity reduces sales, impedes relationships with some business partners, and attracts unwanted government attention.
True
Companies that can't protect or don't respect customer information often lose business and some become defendants in class action lawsuits stemming from privacy violations.
True
Computer hardware manufacturers are sometimes faced with dealing with raw material suppliers who funnel money to groups engaged in armed conflict, including some who commit crimes and human rights abuses.
True
Contingent work is a job situation in which an individual does not have an explicit or implicit contract for long-term employment.
True
Cookies allow marketers to collect click-stream data—information gathered by monitoring a consumer's online activity.
True
Copyright law protects authored works such as art, books, and film.
True
Crackers break into other people's networks and systems to cause harm—defacing Web pages, crashing computers, and spreading harmful programs or hateful messages.
True
Cybersquatters are individuals who registered domain names for famous trademarks or company names to which they had no connection.
True
Cyberstalking is the adult version of cyberbullying.
True
Demographic filtering augments click-stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions.
True
QN=119 In the Internet Content Rating Association's Web site rating scheme, ____ fill out an online questionnaire to describe the content of the Web site.
Web site authors
QN=239 A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called _____.
a coemployment relationship
# A trade secret is information, generally unknown to the public, that ....
a company has taken strong measures to keep confidential.
# A form of software testing that involves viewing a software unit as a device that has expected input and output behaviors but whose internal workings are unknown is known as ____.
black-box testing
# The _________________ is responsible for the careful and responsible management of an organization
board of directors
26.The person that is responsible for the careful and responsible management of an organization
board of directors
8. The _________________ is responsible for the careful and responsible management of an organization.
board of directors
QN=64 Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts.
bot
QN=222 Social shopping Web sites generate revenue through _____.
both retail advertising and sharing with retailers data about their members' likes and dislikes
# A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is called a(n) ....
botnet
# A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is called a(n) _________________.
botnet
4. A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is called a(n) _________________.
botnet
# _________________ is a process for generating a number of alternative solutions to a problem
brainstorming
16. _________________ is a process for generating a number of alternative solutions to a problem.
brainstorming
8. _________________ involves providing money, property, or favors to someone in business or government to obtain a business advantage.
bribery
24.which statements about relationships between IT workers and clients are not true ?
bribery involves providing money, property, or favor
QN=42 Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the ____.
certifying organization
# The dropper code portion of a rootkit gets the rootkit installation started and can be easily activated by ...
clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.
QN=59 A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
distributed denial-of-service
# The cost to identify and remove a defect in an early stage of software development can be up to 100 times less than the cost of removing a defect in an operating piece of software after it has been .....
distributed to many customers
QN=87 The Children's Online Privacy Protection Act ____.
does not cover the dissemination of information to children
QN=61 The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.
dropper
QN=44 The obligation to protect people against any unreasonable harm or risk is called ____.
duty of care
# The best Internet filters rely on the use of....
dynamic content filtering
39.the best internet filters rely on the use of
dynamic content filtering
QN=160 The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program's code, the software ____.
improves
QN=161 One cause for the delay of the Boeing 787 Dreamliner was the ____.
inability to trace lines of code back to specific system requirements for the braking system
# Give friend way to access your working pc means .....
inappropriate sharing of information
# Install free software in working pc means .....
inappropriate sharing of information
# Reading news, and playing music in working time means .....
inappropriate use of IT resources
44.reading news, and playing music in working time means
inappropriate use of IT resources
# ..... Is a major factors that are transforming the professional services industry
increased client sophistication
QN=114 The problem with the Communications Decency Act was its broad language and vague definition of ____, resulting in the Act being ruled unconstitutional.
indecency
QN=48 IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____.
information
# ... is the combination of communications privacy and data privacy.
information privacy
13.is the combination of communications privacy and data privacy
information privacy
2. _________________ is the combination of communications privacy and data privacy.
information privacy
QN=133 The use of a remailer keeps communications anonymous; what is communicated, and whether it is ethical or legal, ____.
is up to the user of the remailer
QN=181 Even with safety precautions in place, the software associated with safety-critical systems ____.
is vulnerable to errors that can lead to injury or death
QN=143 One of the tests that an invention must pass to be eligible for a patent is ____.
it must not be obvious to a person having ordinary skill in the same field
# software piracy in a corporate setting in sometimes directly traceable to...
it staff members
# in ....when, and if, the identity becomes known, the complaint is modified to show the correct name(s) of the defendant(s)
john doe lawsuits
# Others believe that the use of H-1B workers is required to ....
keep the United States competitive.
The EICC has established a code of conduct that established guidelines across five areas of responsibility
labor, health and safety, environment, management system, and ethics.
QN=38 The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____.
lawful under the laws of the foreign country in which it was paid
QN=13 The Department of Justice established sentencing guidelines that suggest more ____ treatment for convicted executives if their companies have ethics programs.
lenient
# A written statement that is false and that harms another person is called....
libel
25) Organizations must be on guard
libelous
23) From a legal perspective
licensed
QN=26 From a legal perspective, IT workers are not recognized as professionals because they are not ____ by the state or federal government.
licensed
# From a legal perspective, IT workers are not recognized as professionals because they are not ...
licensed by the state or federal government
# Outsourcing is a...... that has expertise in providing a specific func- tion
long-term business arrangement in which a company contracts for services with an outside organization
QN=205 A 1999 report by the Institute of Medicine found that 98,000 Americans die annually due to preventable medical errors. A 2009 Consumers Union report claims that we have _____ the number of such deaths.
made no change in
QN=168 Additional features in a new release of software ____.
make it more useful and easier to sell
# A type of attacker that is extremely difficult to detect or stop because he or she is often authorized to access the very systems being abused is called a(n) _________________.
malicious insider
10. A type of attacker that is extremely difficult to detect or stop because he or she is often authorized to access the very systems being abused is called a(n) _________________.
malicious insider
50.Many courts have ruled that iT workers are not liable for
malpractice
QN=27 Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional.
malpractice
# Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a ....
manner that will protect them against anticipated punishment.
QN=165 A primary cause of poor software quality is that ____.
many developers do not know how to design quality into software from the very start
# Legislation that protects people from data privacy abuses by ... is almost non- existent
private industry
# opponents of the law were concerned that it transferred power over education to ... who develop the internet filters and define which sites to block
private software companies
# The most important part of the decision-making process is _________________
problem definition
14. The most important part of the decision-making process is _________________.
problem definition
# a good.... answers the following questions: what do people observe that causes them to think there is a problem
problem statement
# Organizations are advised to formulate and publish employee blogging policies to avoid potential ... from employee criticism of corporate policies and decisions
negative consequences
QN=210 A patient should _____ because of something he or she reads on a medical information Web site.
never disregard professional medical advice
# Thông tin là s? hi?u bi?t hay s? th?t v? con ngu?i hay s? ki?n, hi?n tu?ng nào dó thu nh?n du?c qua cung c?p, trao d?i, và....
nh?n xét, h?c t?p, truy?n th?, c?m nh?n
# Thông tin c?n ph?i b?o m?t vì:
nhi?u nguy co b? "m?t" thông tin
QN=260 The United States has _____ federal law(s) protecting the export of toxic waste.
no
QN=199 A University of Chicago study found that the E-Rate program led to _____ in California students' scores in the six subjects covered by the Stanford Achievement Test.
no change
QN=150 A(n) ____ prohibits an employee from working for any competitors for a period of time.
noncompete agreement
38.require a Web site that caters to children to offer comprehensive privacy and to receive parental consent before collecting any personal information from children under 18 years of age
none of the other (COPPA- 13)
31.the best internet filters rely on the use of
none of the others
# As 2012-2013 stat, Twitter is the social networking Web site with the ...
not largest number of adult U.S. Internet users
# A type of system used to control many industrial processes in an effort to reduce costs, eliminate human error, improve quality, and shorten the time it takes to make products is called...
process control system
# The goal of personalization software is to turn first-time visitors to a site into ... and to facilitate greater cross-selling activities.
paying customers
# Which of the following identifies the numbers dialed for outgoing calls?
pen register
QN=214 Members of a social networking Web site may use the site to interact with _____.
people they know and people who they would like to meet
QN=232 Avatars can earn virtual money by _____.
performing some task in the virtual world or using real cash to purchase virtual cash
QN=112 The Supreme Court has held that this form of speech is not protected by the First Amendment and may be forbidden by the government: ____.
perjury
# A person's virtues and vices help define that .....
person's ethics
# Numerous organizations allow employees to create their own... relating to their employment as a means to reach out to partners, customers, and other employees and to improve their corporate image
personal blogs
# Marketers use ..... software to optimize the number, frequency, and mix- ture of their ad placements
personalization
# ... is used by marketers to optimize the number, frequency, and mixture of their ad placements.
personalization software
# It is not unusual for cyberstalking to escalate to vandalism, physical stalking, and even _________________
physical assault
# The Health Insurance Portability and Accountability Act defined numerous standards to improve the ...
portability and continuity of health insurance coverage
# An organization with a successful ethics program is one in which employees are will- ing to ...
post advice about ethical issues that arise
# Outsourcing and offshore outsourcing are used to meet staffing needs while ...
potentially reducing and speeding up project schedules
QN=249 After a worker's H-1B visa expires, the foreigner must _____.
remain outside the United States for one year before another H-1B petition will be approved
# If an intrusion occurs, there must be a clear reaction plan that addresses notification, evidence protection, activity log maintenance, containment, eradication, and recovery
TRUE
# In a lawsuit alleging negligence, responsibility is limited to harmful defects that could have been detected and corrected through "reasonable" software development practices.
TRUE
# In many of India's rural communities, one must travel more than 5 miles to the nearest telephone
TRUE
# Increased need for modularization is a major factors that are transforming the professional services industry
TRUE
# It exists not only between more and less developed countries but also within countries—among age groups, economic classes, and people who live in cities versus those in rural areas
TRUE
# It is difficult to quantify how much the use of IT has contributed to worker productivity
TRUE
# It is frequently measured using the GDP per capita
TRUE
# Many large software companies have cross-licensing agreements in which each agrees not to sue the other over patent infringements
TRUE
# Marketers use personalization software to optimize the number, frequency, and mix- ture of their ad placements
TRUE
# Material breach of contract occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract.
TRUE
# Much of the vital information that people need to manage their retirement, health, and safety is increasingly provided by the Internet is a valid reason for trying to reduce the digital divide
TRUE
# Not only does a patent prevent copying, but it also prevents independent creation, unlike a copyright
TRUE
# Only about 20 million of the world's 1 billion Internet users live in less developed nations
TRUE
# Open source code advocates believe that the quality of open source code is on par with that of commercial software
TRUE
# Ready access to information and communications technology can provide a country with a wealth of economic opportunities and give its industries a competitive advantage is a valid reason for trying to reduce the digital divide
TRUE
# Social network advertising has become big business, with some social networking Web sites earning more than $200 million in ad revenue.
TRUE
# Special measures must be taken in the development of safety-critical systems
TRUE
# Standard of living varies greatly from nation to nation
TRUE
# The First Amendment is often used to protect distributors of adult pornography over the Internet
TRUE
# The Fourth Amendment protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.
TRUE
# The Health Insurance Portability and Accountability Act defined numerous standards to improve the portability and continuity of health insurance coverage
TRUE
# The Internet enables a worldwide exchange of news, ideas, opinions, rumors, and information. Its broad accessibility, open discussions, and anonymity make it a pow- erful communications medium
TRUE
# The Supreme Court has ruled that the First Amendment also protects the right to speak anonymously
TRUE
# The common good approach to decision making is based on a vision of society as a community whose members work together to achieve a common set of values and goals
TRUE
# The corporate ethics officer ensures that ethical procedures are installed and consistently adhered to throughout the organization
TRUE
# The impact of a software defect can be quite subtle or very serious
TRUE
# The main tactic used to circumvent cybersquatting is to register numerous domain name variations as soon as an organization thinks it might want to develop a Web presence
TRUE
# The project manager may want to keep resources flowing into the project and hope that problems can be corrected before anyone notices
TRUE
# The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called redundancy
TRUE
# The responsibility for decision making is shared between client and IT worker
TRUE
# The right to freedom of expression has been broadened by the Supreme Court to include nonverbal, visual, and symbolic forms of expression.
TRUE
# The security of any system is a combination of technology, policy, and people, and it requires a wide range of activities to be effective
TRUE
# The term of a copyright, originally 28 years, has been extended many times and now can be as long as the life of the author plus 70 years
TRUE
# Trustworthy computing is a method of computing that delivers secure, private computing experiences
TRUE
17. opt out
To refuse to give an organization the right to collect and share one's personal data with unaffiliated parties.
# Thu?c tính c?a thông tin th? hi?n tính ch?t ch?c ch?n c?a thông tin, tính th?ng nh?t gi?a các kênh truy?n t?i thông tin th? hi?n tính ch?t:
Toàn v?n
14. Business Software Alliance (BSA)
Trade group that represents the world's largest software and hardware manufacturers; its mission is to stop the unauthorized copying of software produced by its members.
# ....can include the design of new software code, hardware designs. business plans. the design of a user interface to a computer program. and manufacturing processes
Trade secrets
49.can include the design of new software code, hardware designs, business plans,the design of a user interface to a computer program, and manufacturing processes
Trade secrets
# .... established minimum levels of protection that each government must provide to the intellectual property of all WTO members.
Trade-Related Aspects of Intellectual Property Rights ( TRIPS) Agreement
10. The goal of the Sarbanes-Oxley Act was to _________________.
renew investor's trust
# The goal of the Sarbanes-Oxley Act was to _________________.
renew investor's trust in the content and preparation of disclosure documents by public companies
# Social shopping Web sites generate money primarily through advertising and by selling _________________
sharing with retailers data about their members' likes and dislikes
QN=248 An H-1B worker can work for a U.S. employer for a maximum continuous period of _____ years.
six
9.Speech or a written statement that is not true and that harms another person is called
slander , libel
QN=258 The _____ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.
statement on Auditing Standards No. 70
# Identity theft occurs when someone ....
steals key pieces of personal information to impersonate a person
2.The mission of the Business Software Aliance is to
stop the unauthorized copyig of software
QN=30 The mission of the Business Software Alliance is to ____.
stop the unauthorized copying of software
# The mission of the Business Software Alliance is to _________________.
stop the unauthorized copying of software produced by its members
3. The mission of the Business Software Alliance is to _________________.
stop the unauthorized copying of software produced by its members
QN=209 The two basic forms of telemedicine are _____.
store-and-forward and live
# Even within the same society, people can have ...
strong disagreements over important moral issues
# Managers' behavior and expectations can... employees' ethical behavior
strongly influence
QN=147 A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a(n) ____.
submarine patent
QN=11 Companies that develop and maintain strong employee relations ____.
suffer lower turnover rates
QN=45 Because there are no ____ against which to compare a software engineer's professional behavior, he or she cannot be subject to malpractice lawsuits.
uniform standards
# an increasing number of web sites lock visitors out ... they allow cook-ies to be deposited on their hard drives
unless
# a possible compromise for public libraries with multi- ple computers would be to allow ... internet use for adults but to provide computers with only ... access for children
unrestricted, limited
# Computer companies looking to manufacture green computers are challenged to produce computers that ...
use less electricity
QN=247 An H-1B visa is a temporary visa granted for people who _____.
work in specialty occupations that require at least a four-year bachelor's degree
QN=86 Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records.
written consent
QN=13 The United States Supreme Court has established that an employer cannot be held responsible for the acts of its employees if the employees act in a manner contrary to corporate policy and their employer's directions.
*False
QN=3 Arthur Andersen, once a major international accounting firm, was indicted for obstruction of justice, lost its auditing license, and eventually closed its U.S. offices based on the actions of a few employees even though they were performing in a manner contrary to corporate policy and their employer's directions. This is an example of the principle called respondeat superior or ____.
"let the master answer."
QN=200 One Laptop per Child is a nonprofit organization whose goal is to provide children around the world with low cost computers costing less than _____ to aid in their education.
$100
26) Penalties
$100,000
QN=159 Under the ACPA, trademark holders can seek civil damages of up to ____ from cybersquatters that register their trade names or similar-sounding names as domain names.
$100,000
QN=31 Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work.
$100,000
35) Penalties for
$2 million
QN=204 The healthcare industry invests about _____ in IT for each worker, compared with nearly $15,000 per worker in the banking industry.
$3,000
QN=100 The Foreign Intelligence Surveillance Act allows the surveillance and collection of information about foreign governments or agents of foreign governments or organizations, only if a warrant is obtained from the FISA court within 72 hours after surveillance begins.
*False
QN=101 A pen register is a device that records the originating number of incoming calls for a particular phone number.
*False
QN=102 The Electronic Communications Privacy Act of 1986 required the communications industry to build tools into its products that federal investigators could use—after obtaining a court order—to eavesdrop on conversations and intercept electronic communications.
*False
QN=103 Under the PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order but only if the FBI believed the individual to be a foreign spy.
*False
QN=104 A sunset provision extends a law beyond a specific date unless further legislative action is taken to repeal the law.
*False
QN=105 The European Union Data Protection Directive requires member countries to ensure that data transferred is protected. It has no impact on non-European Union countries
*False
QN=106 The U.S. approach to data privacy involves strict government regulation while the European approach relies on self-regulation.
*False
QN=107 The Freedom of Information Act prohibits the government from concealing the existence of any personal data record-keeping systems.
*False
QN=109 Incidents of identity theft exceeded 4% of the overall U.S. adult population in 2008 resulting in losses of some $48 billion.
*False
QN=11 Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.
*False
QN=110 The cost of a data breach can be quite expensive, by some estimates nearly $500 for each record lost. Nearly half the cost is due to lost business opportunity associated with customers who've been lost due to the incident.
*False
QN=115 Online marketers use personalization software to optimize the number, frequency, and mixture of their ad placements, and to evaluate how visitors react to new ads.
*False
QN=132 After a temporary injunction as well as numerous hearings and appeals, the Supreme Court ruled that the Child Online Protection Act was constitutional.
*False
QN=133 Web dynamic filtering uses keywords or phrases to block access to Web sites.
*False
QN=116 There is virtually no way to limit the deposit of cookies on your hard drive.
*False
QN=123 The Second Amendment to the U.S. Constitution was adopted to guarantee the right to freedom of expression.
*False
QN=125 The Supreme Court has ruled that the First Amendment does not protect the right of individuals to speak anonymously.
*False
QN=127 Mason v. California is the 1973 Supreme Court case that established a test to determine if material is obscene.
*False
QN=128 Making either an oral or a written statement of alleged fact that is false and harms another is called slander.
*False
QN=129 The Communications Decency Act was aimed at protecting children from revealing personal information about themselves or their parents.
*False
QN=148 Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the Children's Internet Protection Act.
*False
QN=152 Formulas, inventions, and processes are not considered forms of intellectual property.
*False
QN=154 A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. The author may not grant this exclusive right to others.
*False
QN=155 Copyright law guarantees developers the rights to their works for a certain amount of time. Over the years, the term of copyright has been extended several times from its original limit of 17 1/2 years.
*False
QN=156 Art, architecture, graphics, and sculptures cannot be copyrighted.
*False
QN=158 The fair use doctrine allows portions of patented materials to be used with permission under certain circumstances.
*False
QN=16 An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making
*False
QN=161 The World Trade Organization developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the maximum penalties to be meted out for patent and copyright infringement.
*False
QN=162 The WIPO Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
*False
QN=164 A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
*False
QN=165 Software cannot be patented.
*False
QN=166 A few of the larger software companies have cross-licensing agreements in which each party agrees not to sue the other over trademark infringements.
*False
QN=167 A patent demon is a firm that acquires patents with no intention of manufacturing anything, instead licensing the patents to others.
*False
QN=168 A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
*False
QN=17 Apple was the highest rated U.S.-based, publicly held IT company by Business Ethics magazine based on its performance between 2000 and 2007.
*False
QN=171 Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.
*False
QN=173 Reverse engineering can only be applied to computer hardware, not computer software.
*False
QN=175 Only a small amount of open source code is available for use.
*False
QN=176 Competitive intelligence involves the gathering and analysis of the trade secrets of your competitors.
*False
QN=177 Industrial espionage and competitive intelligence are essentially the same.
*False
QN=178 Competitive intelligence analysts must be authorized to take unethical or illegal actions in the normal course of their job.
*False
QN=183 A software feature is any error that, if not removed, could cause a software system to fail to meet its users' needs.
*False
QN=184 The impact of a software defect is catastrophic and leads to death or serious injury.
*False
QN=185 Software defect is the degree to which a software product meets the needs of its users.
*False
QN=186 The various products created during the software development process such as a statement of requirements, flowcharts, and user documentation are called developments.
*False
QN=187 According to one study, even experienced software developers unknowingly inject an average of one design or implementation defect for every 15 - 20 lines of code.
*False
QN=188 The Microsoft Vista operating system took over seven years to develop and consists of more than 100 million lines of code.
*False
QN=189 The extreme pressure that software companies feel to reduce the time to market for their products has little impact on the quality of the software.
*False
QN=19 Lawrence Kohlberg found that many factors stimulate a person's moral development, but one of the most crucial is monetary reward for good behavior.
*False
QN=193 The liability of manufacturers, sellers, lessors, and others for injuries caused by defective products is commonly referred to as negligence.
*False
QN=194 Contributory negligence means that the defendant is held responsible for injuring another person, regardless of negligence or intent.
*False
QN=195 Strict liability is the failure to do what a reasonable person would do, or doing something that a reasonable person would not do.
*False
QN=197 If the product fails to meet the terms of its warranty, the buyer or lessee can sue for contributory negligence.
*False
QN=198 Breach of warranty occurs when a seller or lessee either misrepresents the quality of a product or conceals a defect in it.
*False
QN=2 The stock price of Hewlett-Packard dropped dramatically as a result of a scandal involving the leaking of information about HP's long term strategy to the news media.
*False
QN=20 Well over half of all organizations include ethical conduct as part of an employee's performance appraisal.
*False
QN=37 The Business Software Alliance is a trade group that represents the world's largest software and hardware manufacturers and whose goal is to stop unauthorized software produced by its members. Each year it receives over 25,000 piracy reports.
*False
QN=38 The cost of "getting legal" by acquiring the correct number of software licenses is many times more expensive than the cost of criminal or civil penalties to a corporation or the people involved in software piracy.
*False
QN=39 The design of new software code and computer hardware cannot be treated as a trade secret.
*False
QN=4 There is near universal opposition to the practice of illegally making copies of software or enabling others to access software to which they are not entitled.
*False
QN=40 Whistle-blowing is an effort by an organization's marketing people to call attention to a new product or new feature in an existing product.
*False
QN=41 The relationship between IT workers and clients is usually documented in a contract that specifies who does what, when the work begins, how long it will take, and how much the client will pay. However, decision making is solely the responsibility of the IT worker.
*False
QN=43 Fraud is the misstatement or incomplete statement of a material fact.
*False
QN=44 Bribery involves providing money, property, or favors to someone in business or government to obtain a business advantage.
*False
QN=47 IT workers cannot be held responsible for creating an environment that supports the ethical behavior of IT users.
*False
QN=48 IT workers have a duty to understand a user's needs and capabilities and to deliver products and services that best meet those needs without regard for the costs and time involved.
*False
QN=5 An individual who exhibits few vices and many virtues is said to be a person of high integrity.
*False
QN=51 Participation in an IT professional organization does little to help IT workers stay on top of the many new developments in their field.
*False
QN=52 The Association of Information Technology Professionals (AITP) was founded in 1947 and has 24,000 student members and 68,000 professional members in more than 100 countries.
*False
QN=53 Licensing applies to both people and products, and indicates that a professional possesses a particular set of skills, knowledge, or abilities.
*False
QN=57 A breach of duty of care addresses only the failure to act as a reasonable person would act. It does not address the failure to act when there is a duty to do so.
*False
QN=59 There is little organizations can do to stop employees who participate in chat rooms, view pornographic sites, and play computer games while at work.
*False
QN=6 Ethics defines one's personal beliefs about right and wrong.
*False
QN=60 Organizations must implement systems and procedures to provide access to all organizational data by all employees no matter where they are located.
*False
QN=61 Societe Generale, France's second largest banking establishment, had long had a reputation for having poor internal controls. It is no wonder that a relatively inexperienced trader was able to take advantage of the bank's system of weak internal controls to exceed his trading limit and cause the bank to lose more than €4.9 billion.
*False
QN=64 A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday.
*False
QN=65 Unlike a computer worm, which requires users to spread infected files to other users, a virus is a harmful program that resides in the active memory of the computer and duplicates itself. A virus can propagate without human intervention.
*False
QN=69 The cost of creating an e-mail campaign for a product or a service can easily exceed the cost of a direct-mail campaign. Such an e-mail campaign also typically takes longer to develop.
*False
QN=70 Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
*False
QN=71 A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units.
*False
QN=74 Industrial espionage and competitive intelligence are the same thing.
*False
QN=75 The use of smart cards which contain a memory chip that is updated with encrypted data every time the card is used, is much more popular in the United States than Europe.
*False
QN=77 Individuals committed to trustworthy computing take a pledge to not send viruses and worms and to refrain from spamming others.
*False
QN=78 The Computer Fraud and Abuse Act addresses identity theft.
*False
QN=79 The security of any system or network is a combination of technology, policy, and people and requires a surprisingly narrow range of activities to be effective.
*False
QN=8 The risks associated with inappropriate behavior have decreased, both in their likelihood and in their potential negative impact.
*False
QN=81 A security policy details exactly what needs to be done and how it must be accomplished.
*False
QN=83 While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.
*False
QN=86 Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.
*False
QN=88 An intrusion prevention system is software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
*False
QN=89 An organization can never be prepared for the worst—a successful attack that defeats all or some of a system's defenses and damages data and information systems.
*False
QN=93 The right to personal privacy is explicitly spelled out in the Constitution.
*False
QN=94 The right to privacy is closely associated with the Second Amendment to the Constitution.
*False
QN=95 Roger Clark, director of the ACLU, first coined the term information privacy which is the combination of communications privacy and data privacy.
*False
QN=98 The Children's Online Privacy Protection Act requires a Web site that caters to children to offer comprehensive privacy policies and to receive parental consent before collecting any personal information from children under 18 years of age.
*False
QN=99 Title III of the Omnibus Crime Control and Safe Streets Act is also know as the Wiretap Act and authorizes wiretapping and electronic eavesdropping without the requirement of first obtaining a warrant from a judge.
*False
QN=1 Pretexting involves the use of false pretenses to gain access to the personal records of individuals.
*True
QN=10 Companies that are viewed as harmful to their community may find that negative publicity reduces sales, impedes relationships with some business partners, and attracts unwanted government attention.
*True
QN=108 A Freedom of Information Act request prevents disclosure of records if it would invade someone's privacy. A balancing test must be applied to evaluate whether the privacy interests at stake are outweighed by competing public interests.
*True
QN=111 There is no federal law requiring that organizations reveal a data breach, however, more than half the states have implemented such legislation.
*True
QN=112 Spyware frequently employs sophisticated methods to avoid detection by popular software packages that are specifically designed to combat it.
*True
QN=113 The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission.
*True
QN=114 Cookies allow marketers to collect click-stream data—information gathered by monitoring a consumer's online activity.
*True
QN=117 Demographic filtering augments click-stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions.
*True
QN=118 Companies that can't protect or don't respect customer information often lose business and some become defendants in class action lawsuits stemming from privacy violations.
*True
QN=119 Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees.
*True
QN=12 Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment.
*True
QN=120 Advocates of advanced surveillance technology argue that people have no legitimate expectation of privacy in a public place.
*True
QN=121 According to a survey by the National Campaign to Prevent Teen and Unplanned Pregnancy, one in five teenagers have engaged in sexting.
*True
QN=122 In some states, sexting can result in felony charges and first-time offenders can be registered as sex offenders.
*True
QN=124 Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First Amendment.
*True
QN=126 Obscene speech is not protected by the First Amendment.
*True
QN=130 In Reno v. ACLU, the Supreme Court ruled that the same free-speech protections apply to communication over the Internet as exists for print communication.
*True
QN=131 The Child Online Protection Act was an attempt to protect children from online pornography while preserving the rights of adults.
*True
QN=134 Employees who are unwillingly exposed to pornography or other objectionable material while using their work computer would have a strong case for sexual harassment.
*True
QN=135 In the ICRA rating system, Web authors fill out an online questionnaire to describe the content of their site.
*True
QN=136 The Children's Internet Protection Act required federally financed schools and libraries to use some form of technological protection to block computer access to obscene material, pornography, and anything else considered harmful to minors.
*True
QN=139 One of the early Supreme Court rulings that addressed anonymity as an aspect of the Bill of Rights was NAACP v. Alabama in which the court ruled that the NAACP did not have to turn its membership list over to the state of Alabama.
*True
QN=140 The IP address can be used to identify the sender of an ordinary e-mail or online posting.
*True
QN=214 Most countries have continually been able to produce more goods and services over time—not through a proportional increase in input but by making production more efficient.
*True
QN=141 Once a John Doe lawsuit is filed and the court grants permission, the plaintiff can serve subpoenas on any third party—such as an Internet service provider or a Web site hosting firm—that may have information about the true identity of the defendant.
*True
QN=146 Although they may implement a speech code, public schools and universities are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint.
*True
QN=149 The CAN-SPAM Act clearly defines the conditions under which the sending of spam is legal.
*True
QN=15 A rapid increase in the appointment of corporate ethics officers typically follows the revelation of a major business scandal.
*True
QN=150 The Federal Trade Commission is charged with enforcing the CAN-SPAM act but has done little to enforce the act.
*True
QN=151 Copyright law protects authored works such as art, books, and film.
*True
QN=153 Protecting computer software has proven to be difficult because it is has not been well categorized under the law.
*True
QN=157 Software, video games, multimedia works, and Web pages can all be copyrighted.
*True
QN=159 Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing the other's copyright.
*True
QN=160 The PRO-IP Act of 2008 increased trademark and copyright enforcement, and substantially increased penalties for infringement.
*True
QN=163 The Digital Millennium Copyright Act made it an offense to circumvent a technical protection of copyrighted material.
*True
QN=169 The Economic Espionage Act imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets.
*True
QN=170 Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding nondisclosure clauses to employment contracts.
*True
QN=172 Plagiarism software checks for matching text in different documents as a means of identifying potential plagiarism.
*True
QN=174 Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.
*True
QN=179 Procter & Gamble admitted publicly that it unethically gained information about Unilever, its competitor in the multibillion-dollar hair-care business.
*True
QN=18 The goal of the Sarbanes-Oxley Act was to renew investor's trust in corporate executives and their firm's financial reports following numerous financial scandals in the early 2000's.
*True
QN=180 Cybersquatters are individuals who registered domain names for famous trademarks or company names to which they had no connection.
*True
QN=181 There have been many delays in the development of the new Boeing 787 Dreamliner including problems with the software that controls and monitors the aircraft's braking system.
*True
QN=182 Software manufacturers face economic, ethical, and organizational challenges associated with improving the quality of their software.
*True
QN=190 The accurate, thorough, and timely processing of business transactions is a key requirement for business information systems. A software defect in such a system can be devastating, resulting in lost customers and reduced revenue.
*True
QN=191 The decision support system is used to improve the decision making in a variety of industries.
*True
QN=192 A defect in process control software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees.
*True
QN=196 A warranty assures buyers or lessees that a product meets certain standards of quality.
*True
QN=199 A software development methodology is a standard, proven work process that enables systems analysts, programmers, project managers, and others to make controlled and orderly progress in developing high-quality software.
*True
QN=200 Quality assurance refers to methods within the development cycle designed to guarantee reliable operation of the product.
*True
QN=202 There are two forms of dynamic testing—black-box testing and white-box testing.
*True
QN=205 As the software maturity level increases, the organization improves its ability to deliver good software on time and on budget.
*True
QN=206 The safe operation of many safety-critical systems relies on the flawless performance of software.
*True
QN=209 Reliability is the probability of a component or system performing without failure over its product life.
*True
QN=210 Failure mode and effects analysis is an important technique used to develop ISO 9000-compliant systems by both evaluating reliability and determining the effects of system and equipment failures.
*True
QN=211 The Western Cape province initiated the Khanya Project to address the shortage of teachers in the region, to bridge the digital divide by providing access to computer technology to all schoolchildren and educators, and to prepare the Western Cape for the new "knowledge economy."
*True
QN=212 The program manager of Khanya feels that the greatest contribution of the Khanya project was that it proved that ICT can be implemented successfully on a large scale in Africa.
*True
QN=216 It is harder to quantify the benefits of today's IT investments on worker productivity than during the early days of IT in the 1960s.
*True
QN=281 Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies.
*True
QN=285 Nearly 40% of H-1B temporary workers are employed as computer programmers.
*True
QN=29 The general public does not understand the critical importance of ethics as they apply to IT, as too much emphasis has been placed on technical issues.
*True
QN=290 India is widely acknowledged as the best source of programming skills outside Europe and North America.
*True
QN=295 A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case.
*True
QN=296 To be classified as a truly green PC, the PC must meet other criteria than simply use less electricity to run than the standard computer.
*True
QN=297 Electronic manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials.
*True
QN=3 Morality refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus.
*True
QN=30 In the business world, important IT decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.
*True
QN=300 The EICC has established a code of conduct that established guidelines across five areas of responsibility: labor, health and safety, environment, management system, and ethics.
*True
QN=31 Dorothea Perry and Robert Gross were put on probation and subsequently fired for job-performance issues by their employer, Collegis, shortly after reporting that they found child pornography on the computer of a professor at New York Law School.
*True
QN=33 Many professional roles carry special rights and responsibilities.
*True
QN=34 From a legal perspective, IT workers are not recognized as professionals because they are not licensed by the state or federal government.
*True
QN=36 Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to IT staff members.
*True
QN=42 Theft is the crime of obtaining goods, services, or property through deception or
*True
QN=45 The key distinguishing factor between a gift and a bribe is that no gift should be hidden.
*True
QN=46 Studies have shown that around 10 percent of all job applicants seriously misrepresent their backgrounds on their resumes.
*True
QN=49 Most codes of ethics created by professional organizations have two main parts: one part outlines what the professional organization aspires to become, and the other part lists rules and principles by which members of the organization are expected to abide.
*True
QN=50 Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business.
*True
QN=54 Certifications that are tied to a vendor's product are relevant for job roles with very specific requirements or certain aspects of broader roles. Sometimes, however, vendor certifications are too focused on technical details of the vendor's technology and do not address more general concepts.
*True
QN=55 The requirements for certification generally require that the individual has the prerequisite education and experience, sits for and passes an exam, and commits to and abides by a code of ethics established by the organization providing the certification.
*True
QN=56 The lack of agreement on the core body of knowledge for various IT roles is a primary reason for the lack of international or national licensing programs for IT professions.
*True
QN=58 No policy can stop wrongdoers from taking inappropriate actions, but it can set forth the general rights and responsibilities of all IT users, establish boundaries of acceptable and unacceptable behavior and enable management to punish violators.
*True
QN=62 Although the necessity of security is obvious, it must often be balanced against other business needs and issues. As a result, most organizations spend 5 percent or less of their overall IT budget on information security.
*True
QN=63 According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident.
*True
QN=66 The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
*True
QN=67 A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
*True
QN=68 Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers.
*True
QN=7 The United States has one of the lowest software piracy rates in the world, along with Luxembourg and New Zealand.
*True
QN=72 Crackers break into other people's networks and systems to cause harm—defacing Web pages, crashing computers, and spreading harmful programs or hateful messages.
*True
QN=73 Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.
*True
QN=76 The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.
*True
QN=80 A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
*True
QN=82 Whenever possible, automated system rules should mirror an organization's written policies.
*True
QN=87 It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
*True
QN=9 A stakeholder is someone who stands to gain or lose, depending on how a situation is resolved.
*True
QN=90 Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
*True
QN=91 The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used.
*True
QN=92 One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in online privacy.
*True
QN=96 The Gramm-Leach-Bliley Act repealed the prohibition of any one institution from offering investment, commercial banking, and insurance services. It also included three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.
*True
QN=97 HIPPA requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.
*True
10.How many criteria, there are defined by U.S code of Federal Regulations to become a person "employed in proffessional capacity"
4
# provide leadership to overcome resistance to change can be found in step....of ethical decision making
4
QN=206 A 2006 Institute of Medicine report concluded that more than _____ preventable medication errors per year cost the United States about $3.5 billion annually.
1.5 million
QN=257 The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India.
1.5:1
QN=230 About _____ of material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting.
10 hours
27) As the number
100 million
QN=192 In the United States, it is estimated that there are roughly _____ employees who telework more than eight hours per week.
14 million
# The USA PATRIOT Act modified ..... existing statutes and gave sweeping new powers both to domestic law enforcement and to international intelligence agencies
15
42) The Digital Millennium Copyright Act(DMCA)
1998
# indentify the loss events or the risks or threats that could occur, such as a distributed denial-of-service attack or insider fraud, is step....of risk assessment
2
# the electronic frontier foundation (EFF) represented .... of the john does whose identities were subpoenaed
2
QN=187 In the United States, labor productivity growth has averaged about _____ percent per year for the past century.
2%
QN=194 Of the roughly 1 billion Internet users worldwide, only _____ are estimated to live in less developed nations.
20 million
34) Since the early 1980s
20,000
# Evaluate alternatives based on multiple criteria, can be found in step....of ethical decision making
3
# Thông tin g?m có....thu?c tính
3
QN=40 Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume.
30%
41) To prevent Internet users
30,000
# There are .. ways to limit or even stop the deposit of cookies on your hard drive
4
# determine the impact of each threat occurring. Would the threat have a minor impact on the organization, or could it keep the organization from carrying out its mission for a lengthy period of
4
QN=228 MySpace purged _____ sex offenders from its site over a period of two years.
90,000
28. Communications Assistance for Law Enforcement Act (CALEA)
A 1994 law that amended both the Wiretap Act and ECPA; it required the telecommunications industry
20. Children's Online Privacy Protection Act (COPPA)
A 1998 law that requires Web sites that cater to children to offer comprehensive privacy policies, notify parents or guardians about their data-collection practices, and receive parental consent before collecting any personal information from children under 13 years of age
18. Child Online Protection Act (COPA)
A 1998 law that was intended to protect children from online pornography while preserving the rights of adults; it was eventually ruled unconstitutional.
77. Gramm-Leach-Bliley Act (GLBA)
A 1999 bank deregulation law, also known as the Financial Services Modernization Act, which granted banks the right to offer investment, commercial banking, and insurance services through a single entity.
19. Children's Internet Protection Act (CIPA)
A 2000 law that required federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors
35. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act
A 2004 law that specifies requirements that commercial e-mailers must follow when sending out messages that advertise or promote a commercial product or service.
60. employee leasing
A business arrangement in which an organization (called the subscribing firm) transfers all or part of its workforce to another firm (called the leasing firm), which handles all human resourcerelated activities and costs, such as payroll, training, and the administration of employee benefits. The subscribing firm leases these workers back but as employees of the leasing firm.
4. anonymous remailer
A company that provides a service in which an originating IP number (physical address) is stripped from an e-mail message before the message is sent on to its destination.
14. online virtual world
A computer-simulated world in which a visitor can move in threedimensional space, communicate and interact with other visitors, and manipulate elements of the simulated world.
24. coemployment relationship
A employment situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.
61. Enhancing Education Through Technology (Ed-Tech) program
A federal program with the following goals: (1) improve student academic achievement through the use of technology in schools; (2) assist children in crossing the digital divide by ensuring that every student is technologically literate by the end of eighth grade; and (3) encourage the effective integration of technology with teacher training and curriculum.
QN=238 Which of these statements about contingent workers is true?
A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.
22. patent troll
A firm that acquires patents for the purpose of licensing the patents to others rather than manufacturing anything itself.
7. black-box testing
A form of dynamic testing that involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown (a black box). If the unit demonstrates the expected behaviors for all the input data in the test suite, it passes the test.
12. offshore outsourcing
A form of outsourcing in which the services are provided by an organization whose employees are in a foreign country.
11. N-version programming
A form of redundancy in which two computer systems execute a series of program instructions simultaneously.
86. integration testing
A form of software testing in which individual software units are combined into an integrated subsystem that undergoes rigorous testing to ensure that the linkages among the various subsystems work successfully.
99. live telemedicine
A form of telemedicine in which patients and healthcare providers are present at the same time; often involves a videoconference link between the two sites.
76. government license
A government-issued permission to engage in an activity or to operate a business; it is generally administered at the state level and often requires that the recipient pass a test of some kind.
19. patent
A grant of a property right issued by the U.S. Patent and Trademark Office to an inventor; permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
1. affiliated Web sites
A group of Web sites served by a single advertising network.
71. firewall
A hardware or software device that serves as a barrier between an organization's network and the Internet; a firewall also limits access to the company's network based on the organization's Internet usage policy.
33. contingent work
A job situation in which an individual does not have an explicit or implicit contract for long-term employment.
31. compiler
A language translator that converts computer program statements expressed in a source language (such as COBOL, Pascal, or C) into a machine language (a series of binary codes of 0s and 1s) that the computer can execute.
8. botnet
A large group of computers controlled centrally from one or more remote locations by hackers, without the knowledge or consent of their owners.
82. Health Insurance Portability and Accountability Act of 1996 (HIPAA)
A law designed to improve the portability and continuity of health insurance coverage; to reduce fraud, waste, and abuse in health insurance and healthcare delivery; and to simplify the administration of health insurance.
70. False Claims Act
A law enacted during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army; also known as the Lincoln Law.
56. Electronic Communications Privacy Act of 1986 (ECPA)
A law focusing on three main issues: (1) the protection of communications while in transfer from sender to receiver; (2) the protection of communications held in electronic storage; and (3) the prohibition of devices to record dialing, routing, addressing, and signaling information without a search warrant.
75. Freedom of Information Act (FOIA)
A law passed in 1966 and amended in 1974 that grants citizens the right to access certain information and records of the federal government upon request.
66. Fair Credit Reporting Act
A law passed in 1970 that regulates the operations of credit-reporting bureaus, including how they collect, store, and use credit information.
95. John Doe lawsuit
A lawsuit in which the identity of the defendant is temporarily unknown, typically because the defendant is communicating anonymously or using a pseudonym.
68. fair use doctrine
A legal doctrine that allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty: (1) the purpose and character of the use (such as commercial use or nonprofit, educational purposes); (2) the nature of the copyrighted work; (3) the portion of the copyrighted work used in relation to the work as a whole; and (4) the effect of the use on the value of the copyrighted work.
18. outsourcing
A long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function.
# It is estimated that more than 1 billion personal computers will be connected to the Internet by 2010, leaving more than 5.5 billion people unconnected. _________________ is the standard of living characteristic that most of the 5.5 billion people have in common
A low income
92. intrusion prevention system (IPS)
A network security device that prevents an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
13. One Laptop per Child (OLPC)
A nonprofit organization whose goal is to provide children around the world with low-cost (less than $100) laptop computers to aid in their education.
29. Communications Decency Act (CDA)
A part of the 1996 Telecommunications Act directed at protecting children from online pornography; it was eventually ruled
94. IT user
A person for whom a hardware or software product is designed.
44. cybersquatter
A person or company that registers domain names for famous trademarks or company names to which they have no connection, with the hope that the
15. Capability Maturity Model Integration (CMMI)
A process improvement approach developed by the Software Engineering Institute at Carnegie Mellon that defines the essential elements of effective processes.
55. Education Rate (E-Rate) program
A program of the Telecommunications Act of 1996 whose primary goal is to help schools and libraries obtain access to state-of-the-art services and technologies at discounted rates.
16. certification
A recognition that a professional possesses a particular set of skills, knowledge, or abilities—in the opinion of the certifying organization.
17. chief privacy officer (CPO)
A senior manager within an organization whose role is to both ensure that the organization does not violate government regulations and reassure customers that their privacy will be protected
40. corporate ethics officer
A senior-level manager who provides an organization with vision and leadership in the area of business conduct.
62. ethics
A set of beliefs about right and wrong behavior within a society.
67. Fair Information Practices
A set of eight principles created by the Organisation for Economic Co-operation and Development that provides guidelines for the ethical treatment of consumer data.
13. business information system
A set of interrelated components—including hardware, software, databases, networks, people, and procedures—that collects data, processes it, and disseminates the output.
5. moral code
A set of rules that establishes the boundaries of generally accepted behavior within a society.
93. ISO 9000 standard
A standard that serves as a guide to quality products, services, and management.
23. code of ethics
A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
57. electronic health record (EHR)
A summary of health information generated by each patient encounter in any healthcare delivery setting. It can include patient demographics, medical history, immunization records, laboratory data, problems, progress notes, medications, vital signs, and radiology reports.
33.what is law ?
A system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions
97. law
A system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions.
65. failure mode and effects analysis (FMEA)
A technique used to develop ISO 9000- compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures.
36. cookie
A text file that a Web site downloads to visitors' hard drives so that it can identify them on subsequent visits.
1. logic bomb
A type of Trojan horse that executes when it is triggered by a specific event.
47. decision support system (DSS)
A type of business information system used to improve decision making in a variety of industries.
38. copyright infringement
A violation of the rights secured by the owner of a copyright; occurs when someone copies a substantial and material part of another's copyrighted work without permission.
21. patent infringement
A violation of the rights secured by the owner of a patent; occurs when someone makes unauthorized use of another's patent.
6. avatar
A virtual world visitor's representation of him- or herself—usually in the form of a human but sometimes in some other form.
98. libel
A written defamatory statement.
QN=88 The Foreign Intelligence Surveillance Act ____.
Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party
9) In September 1999, __ obtained
Amazon.com
81. hacktivism
Hacking to achieve a political or social goal.
QN=41 An IT professional organization whose mission is to provide superior leadership and education in information technology and that has a goal to help its members make themselves more marketable within their industry is ____.
AITP
QN=215 _____ of teenagers in the U.S. use social networking Web sites.
About 65%
87. integrity
Adherence to a personal code of principles.
# Which of the following is a valid reason for trying to reduce the digital divide?
All of the above
17.which of the following contents that Federally financed schools and libraries must block computer access to, otherwise they would no longer be eligible to receive federal money?
All of the others
QN=145 Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for "one-click shopping," based on the use of a shopping cart purchase system for electronic commerce.
Amazon.com
73. Foreign Intelligence Surveillance Act (FISA)
An act passed in 1978 that describes procedures for the electronic surveillance and collection of foreign intelligence information in communications between foreign powers and agents of foreign powers.
74. Foreign Intelligence Surveillance Amendments Act
An act passed in 2008 that both revised many of the FISA procedures for gathering foreign intelligence and implemented legal protections for electronic communications service providers who previously provided consumer data to the NSA and the CIA. fraud The crime of obtaining goods, services, or property through deception or trickery.
2. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS Agreement)
An agreement of the World Trade Organization that requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations.
22. CMMI-Development (CMMI-DEV)
An application of CMMI, frequently used to assess and improve software development practices.
26. common good approach
An approach to ethical decision making based on a vision of society as a community whose members work together to achieve a common set of values and goals.
69. fairness approach
An approach to ethical decision making that focuses on how fairly actions and policies distribute benefits and burdens among people affected by the decision.
54. dynamic testing
An approach to software QA in which the code for a completed unit of software is tested by entering test data and comparing the actual results to the expected results.
64. exploit
An attack on an information system that takes advantage of a particular system vulnerability.
46. cyberterrorist
An individual who launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce a government in order to advance certain political or social objectives.
43. cybercriminal
An individual, motivated by the potential for monetary gain, who hacks into corporate computers to steal, often by transferring money from one account to another to another
58. Electronic Industry Citizenship Coalition (EICC)
An industry organization established to promote a common code of conduct for the electronics and information and communications technology (ICT) industry.
# ... is one in which employees are will- ing to seek advice about ethical issues that arise
An organization with a successful ethics program
20. patent farming
An unethical strategy of influencing a standards organization to make use of a patented item without revealing the existence of a patent; later, the patent holder might demand royalties from all implementers of the standard.
QN=157 The ____ Act enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts.
Anticybersquatting Consumer Protection
15. open source code
Any program whose source code is made available for use or modification, as users or other developers see fit.
52) Nicholas Ciarelli is an
Apple
7) __ is the science of encoding messages so that only
Cryptography
32) __,which provides credit card
Authorize.net
QN=246 Which of the following actions is recommended to avoid potential coemployment issues with contingent workers _____.
Avoid training contingent workers.
# Thu?c tính c?a thông tin th? hi?n tính ch?t du?c luu gi? an toàn và ko du?c ti?t l? n?u chua du?c phép th? hi?n tính ch?t:
B?o m?t
# Thu?c tính c?a thông tin là....
B?o m?t, s?n sàng, toàn v?n
QN=99 The ____ seal program identifies online businesses that honor their own stated privacy protection policies.
BBBOnLine
1.The U.S. Supreme Court has ruled that the concept of privacy is protected by the _________________.
Bill of Rights (particularly the Fourth Amendment)
# Không cài d?t và s? d?ng ph?n m?m ngoài danh sách .... c?a IT
Black-list
33) In August 2005
Blaster
QN=16 In a for-profit organization, it is the primary objective of the ____ to oversee the organization's business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community.
Board of Directors
QN=149 ____ can qualify for trade secret protection under the Uniform Trade Secrets Act.
Both computer hardware and software
QN=66 ____ have become the primary means for distributing spam, malware, and phishing scams.
Botnets
# Occurs when a party fails to perform certain express
Breach of contract
# _________________ involves providing money, property, or favors to someone in business or government to obtain a business advantage
Bribery
# The.... Act specifies requirements that commercial e-mailers must follow in sending out messages that advertise or promote a commercial product or service.
CAN-SPAM
14. The _________________ Act specifies requirements that commercial e-mailers must follow in sending out messages that advertise or promote a commercial product or service
CAN-SPAM
QN=65 Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act.
CAN-SPAM
QN=179 ____ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement.
Capability Maturity Model Integration-Dev
# _________________ is a process that one undertakes voluntarily to prove competency in a set of skills
Certification
7.harmful material on the World wide web from reaching minors
Child Online Protection Act (COPA)
QN=117 The ____ Act is still in effect and has not been ruled unconstitutional.
Children's Internet Protection
QN=105 ____ is information gathered by monitoring a consumer's online activity.
Click-stream data
# Offers consumer recommendations based on the types of products purchased by other people with similar buying habits.
Collaborative filtering
QN=127 A pamphlet called ____ was published by Thomas Paine and critiqued the British monarchy and urged the colonies to become independent.
Common Sense
4.250,000 fines and prison terms of up to 2 years for the transmission of indecent material over the Internet
Communacations Decency Act
13) The __ was a hotly debated law
Communication Assistance for Law Enforcement Act (CALEA)
7. The _________________ established the Federal Communications Commission and made it responsible for regulating all non-federal government use of radio and TV broadcasting and all interstate telecommunications.
Communications Act of 1934
QN=91 Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.
Communications Assistance for Law Enforcement Act
48) __ gathering has become enough
Competitive intelligence
# Thông tin nh?y c?m, b?o m?t v?i nh?ng thành viên không liên quan du?c dánh d?u:
Confidential
# .... has become a major marketing issue—companies that can- not protect or do not respect customer information have lost business
Consumer data privacy
15) Popular Internet filters include __
ContentProtect
QN=68 ____ is an annual gathering in Las Vegas of computer hackers.
DEFCON
21) Several cases brought
DMCA
QN=12 A judge found ____ guilty of not providing timely on-site technical support that customers were entitled to and, as a result, lost its place as the world's largest computer manufacturer.
Dell
QN=217 _____ created its own social networking Web site, IdeaStorm, as a means for its millions of customers around the world to talk about new products, services, or improvements they would like.
Dell
# In.... additional information such as age and location can be used as ad-selection criteria
Demographic filtering
# It augments click- stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions. is ...
Demographic filtering
# The ... was signed into law in 1998 and was written in compliance with the global copyright protection treaty from WIPO; the law makes it illegal to circumvent a technical protection of copyrighted materials or to develop and provide tools that allow others to access a technologically protected work.
Digital Millennium Copyright Act
QN=142 Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.
Digital Millennium Copyright Act
# _________________ is a term used to describe the gulf between those who do and those who don't have access to modern information and communications technology such as cell phones, personal computers, and the Internet
Digital divide
QN=63 ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
E-mail spam
# The No Child Left Behind Act requires that each state have an _________________ program to improve academic achievement through the use of technology in schools
Ed-Tech
QN=198 The _____ program was launched in recognition that the ability to use computers and access the Internet is a requirement for succeeding in the U.S. educational system and global workforce.
Ed-Tech
78. green computing
Efforts directed toward the efficient design, manufacture, operation, and disposal of IT-related products, including personal computers, laptops, servers, printers, and printer supplies.
QN=89 The ____, passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act establishes a requirement for court-approved law enforcement use of a pen register or trap and trace.
Electronic Communications Privacy Act
QN=90 The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public.
Electronic Communications Privacy Act
QN=208 As part of the $787 billion 2009 economic stimulus plan, the federal government earmarked $33 billion in incentives for healthcare providers to implement government certified, interoperable _____ systems by 2015.
Electronic Health Records
# .... can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not violating discrimination laws
Employers
QN=98 The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's.
European Union Data Protection Directive
5.This evaluation may indicate that further refinements are needed, can be found in
Evaluate the Results
4) __ is the legal authority for electronic
Executive Order 12333
# Contingent work is a job situation in which an individual does not have...
Explicit or implicit contract for long-term employment
# "Nguy co b? "m?t" thông tin có th? là do ngày càng ít ki?u luu tr?, truy?n và s? d?ng thông tin
F
# "Thông tin c?n ph?i b?o m?t vì nhi?u nguy co b? "rò r?" thông tin
F
# A potential whistle-blower must consider many ethical implications, including whether the high price of whistle-blowing is not worth it
F
# An H-1B is a permanent work visa granted by the U.S. Citizenship and Immigration Services (USCIS)
F
QN=185 ____ describes how a product or process could fail to perform the desired function described by the customer.
FMEA
# A reliability evaluation technique that can determine the effect of system and equipment failures is____.
Failure Mode and Effects Analysis
43.established mandatory guidelines for the collection and disclosure of personal financial information by financial organizations
Finalcial Privacy rule
# The most basic legal guarantee to the right of freedom of expression in the United States is contained in the....
First Amendment
QN=95 In Doe v. Holder, the courts ruled that the NSL gag rule (prohibits NSL recipients from informing anyone that the government has secretly requested his or her records) violates the ____.
First Amendment
53.the Supreme Court has held that the following types of speech are not protected by the _______________ and may be forbidden by the government: perjury, fraud, defamation, obscene speech, incitement of panic, incitement to crime,"fighting words," and sedition
First amendment
QN=109 The ____ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.
Fourth Amendment
# _________________ is the crime of obtaining goods, services, or property through deception or trickery
Fraud
10) __ is the crime of obtaining goods
Fraud
89. intentional misrepresentation
Fraud that occurs when a seller or lessor either misrepresents the quality of a product or conceals a defect in it.
# ... occurs when a person consciously decides to induce another person to rely and act on the misrepresentation
Fraudulent misrepresentation
QN=101 The ____ enables the public to gain access to certain government records.
Freedom of Information Act
# It is frequently measured using the ... per capita
GDP
12.repealed the prohibition of any on institution from offering investment, commercial banking, adng insurance services
Gramm-Leach-Biley Act
# An act designed to promote accuracy, fairness, and privacy of information in the files of credit-reporting companies is the....
Gramm-Leach-Bliley Act
# CAn act designed to promote accuracy, fairness, and privacy of information in the files of credit-reporting companies is the....
Gramm-Leach-Bliley Act
QN=84 The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions.
Gramm-Leach-Bliley Act
QN=85 Under the ____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.
Gramm-Leach-Bliley Act
# Hacker differs from cracker is....
Hacker can find limits, cracker intrudes from limits
# This is much easier said than done, since people tend to resist change. can be found in phase... of ethical decision making
Implement Decision
45) __ use illegal means to obtain
Industrial spies
21. click-stream data
Information gathered by monitoring a consumer's online activity through the use of cookies.
72. foreign intelligence
Information relating to the capabilities, intentions, or activities of foreign governments, agents of foreign governments, or foreign organizations.
QN=52 ____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007.
Instant messaging abuse
QN=51 The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some €4.9 billion was ____.
Jerome Kerviel
QN=237 Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2006 and 2014?
Jobs related to networking and data communications analysis had the highest forecasted growth rate at 50 percent.
# A lawsuit in which the true identity of the defendant is temporarily unknown is called a....
John Doe lawsuit
# Organizations may file a ..... to enable them to gain subpoena power in an effort to learn the identity of anonymous Internet users who have caused some form of harm through their postings
John Doe lawsuit
10. A lawsuit in which the true identity of the defendant is temporarily unknown is called a _________________.
John Doe lawsuit
QN=134 A(n) ____ is often filed against a defendant whose identity is temporarily unknown.
John Doe lawsuit
QN=126 ____ was a printer who was prosecuted for seditious libel because s(he) refused to reveal the names of anonymous authors whose writings were critical of the governor of new York.
John Zenger
8. _________________ v. United States is a famous court ruling that helped form the basis for the requirement that there be a reasonable expectation of privacy for the Fourth Amendment to apply.
Katz
QN=8 ____ is a system of rules that tells us what we can and cannot do.
Laws
30. competitive intelligence
Legally obtained information gathered to help a company gain an advantage over its rivals.
52.A written statement that is false and that harms another person is
Libel (may Slander , best Defamation
# _________________ is a popular business-oriented Web site that is used by professionals for networking
QN=58 ____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.
Logic bomb
# Ph?i xin phê duy?t c?a .... cài d?t và c?u hình theo chu?n b?o m?t c?a Công ty
Lãnh d?o don v?, IT
QN=56 ____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.
Macro
42.Which of the following principles should be avoided if a company wants to operate consistently
Make decisions based on personal's benefits
QN=94 Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation.
National Security Letter
QN=201 _____ of the roughly 1.0 billion people around the world who earn less than $1,000 USD per year have access to a computer.
Nearly 0%
# In a lawsuit alleging________, responsibility is limited to harmful defects that could have been detected and corrected through "reasonable" software development practices.
Negligence
# _________________ has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do
Negligence
11. _________________ has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do.
Negligence
QN=234 _____ built a simulation of a Combat Information Center of a command and control ship for the Seventh Fleet in Second Life to provide a real-to-life training experience for its future operators.
Northrop Grumman Corporation
QN=255 _____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country.
Offshore outsourcing
7. morals
One's personal beliefs about right and wrong.
41.which of the following acts was established to set policies that all agree on the model of ethical treatment of consumer data
Organization for economic Co-operation and Development Fair Information Pratices (1980)
# Résumé inflation is to .....
Overpromote candidate's information
QN=107 A screening technology called ____ helps shield users from sites that do not provide the level of privacy protection they desire.
Platform for Privacy Preferences
QN=197 _____ is the European country with the smallest percentage of population using the Internet.
Poland
48.attempts by people to access personal information without proper authority by such means as impersonating an account holder or phishing.
Pretexting
QN=102 The ____ prohibits the government from concealing the existence of any personal data record-keeping systems.
Privacy Act
# Lo?i thông tin này cho phép công b? công khai du?c dánh d?u:
Public
# Ph?i xin phép.....khi có nhu c?u d? máy qua dêm ph?c v? công vi?c
Qu?n tr? d? án & du?c phê duy?t
QN=136 The ____ is the trade group that represents the U.S. recording industry.
RIAA
5. The Communications Decency Act, which was passed in 1996 and was aimed at protecting children from online pornography, was eventually ruled unconstitutional in the ______ v._________________ lawsuit.
Reno vs ACLU
# In..., uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views
Rules-based personali- zation
QN=106 ____ uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views and product information to display when a user visits a Web site.
Rules-based personalized software
# Thu?c tính c?a thông tin th? hi?n tính ch?t du?c luu gi? an toàn và du?c mã hóa và khi c?n du?c l?y ra xem thông tin th? hi?n tính ch?t:
S?n sàng
QN=162 This organization was forced to notify more than 800,000 borrowers that a software installation error had resulted in a miscalculation of their loans and that their payments would increase.
Sallie Mae
9. _________________ requires public companies to disclose whether they have codes of ethics and disclose any waiver to their code of ethics for certain members of senior management.
Section 406
# The _________________ is responsible for the careful and responsible management of an organization
Section 406 of the Sarbanes-Oxley Act
39. corporate compliance officer
See also corporate ethics officer.
# wo main reasons have been advanced as the cause of rising healthcare costs: the use of more expensive technology and the _________________ of patients from the true costs of medical care.
Shielding
6. morality
Social conventions about right and wrong that are widely shared throughout a society.
QN=216 _____ involves the use of social networks to inform, promote, and communicate the benefits of products and services.
Social network advertising
QN=213 A _____ is a site whose purpose is to create an online community of Internet users that enables members to break down barriers created by time, distance, and cultural differences.
Social networking Web site
91. intrusion detection system
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
# ......is any error that, if not removed, could cause a software system to fail to meet its users' needs
Software defect
QN=176 ____ is a standard, proven work process that enables project team members to make controlled and orderly progress in developing high-quality software.
Software development methodology
90. Internet filter
Software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive.
48. decompiler
Software that can read the machine language version of software and produce the source code.
32. Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
Software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
5. antivirus software
Software that regularly scans a computer's memory and disk drives for viruses.
41. cracker
Someone who breaks into other people's networks and systems to cause harm.
84. industrial spy
Someone who uses illegal means to obtain trade secrets from competitors of their firm.
QN=104 ____ is keystroke-logging software downloaded to users' computers without the knowledge or consent of the user.
Spyware
# It is ideal to enlist the help of others. including ...., to identify several alternative solutions to the problem
Stake- holders
QN=57 ____ was a worm that was released in 2007 and caused billions of dollars in damages.
Storm
QN=221 _____ is a social shopping Web site that implemented a reward system for members in which they are paid a commission each time another shopper acts on their recommendations to purchase a specific item.
Stuffpit
# "Nguy co b? "m?t" thông tin có th? là do ngày càng nhi?u ki?u luu tr?, truy?n và s? d?ng thông tin
T
# A potential whistle-blower must consider many ethical implications, including whether the high price of whistle-blowing is worth it
T
# Computer companies looking to manufacture green computers are challenged to produce computers that use less electricity
T
# It is not unusual for cyberstalking to escalate to vandalism, physical stalking, and even physical assault
T
# Outsourcing and offshore outsourcing are used to meet staffing needs while potentially reducing and speeding up project schedules
T
# Outsourcing is a long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific func- tion
T
# The European Union passed the Restriction of Hazardous Substances Directive which restricts the use of many hazardous materials in computer manufacturing.
T
# The healthcare industry spends less per employee on IT than private industry
T
# To date, practical business applications of online physical worlds have been implemented
T
# To date, practical business applications of online virtual worlds have been implemented
T
QN=141 The ____ requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations.
TRIPS agreement
# A code serves as a guideline for ethical decision making, promotes high standards of practice and ethical behavior, enhances trust and respect from the general public, and provides an evaluation benchmark
TRUE
# A customer list can be considered a trade secret if an organization treats the information as valuable and takes measures to safeguard it
TRUE
# A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the state level and often requires that the recipient pass a test of some kind.
TRUE
# A standard, proven work process for the development of high-quality software is called a software development methodology
TRUE
# A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected Web sites
TRUE
# Almost all the data needed for competitive intelligence can be collected either from carefully examining published information or through interviews
TRUE
# An organization with a successful ethics program is one in which employees are will- ing to seek advice about ethical issues that arise
TRUE
# CIPA does not require the tracking of Internet use by minors or adults
TRUE
# Contingent work is a job situation in which an individual does not have an explicit or implicit contract for long-term employment
TRUE
# Employers can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not violating discrimination laws
TRUE
# Four common philosophies are the virtue ethics approach, the utilitarian approach, the fairness approach, and the common good approach
TRUE
# H-1B workers may also be used when there are temporary shortages of needed skills
TRUE
24) Computer virus has became
TRUE
29) Although smart card are used
TRUE
36) Any intrusion detection system
TRUE
37) The use of remailers to enable
TRUE
38) Organizations need basic information
TRUE
43) Gifts encourage
TRUE
50) An increasing number of companies
TRUE
57) IT vendors have become
TRUE
58) Many organizations that operate
TRUE
8) The ancient Greek philosophers
TRUE
QN=100 For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organization's oversight and consumer resolution process, and pay an annual fee.
TRUSTe
QN=193 _____ is one of the advantages of teleworking for organizations.
Telework allows for the continuity of business operations in the event of a disaster
# The contingent workforce includes ...
Temporary workers
10. nondisclosure clause
Terms of an employment contract that prohibit an employee from revealing secrets.
9. noncompete agreement
Terms of an employment contract that prohibit an employee from working for any competitors for a period of time, often one to two years.
3. Miller v. California
The 1973 Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.
# ....protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.
The Fourth Amendment
QN=196 _____ is the European country with the greatest percentage of people using the Internet.
The Netherlands
59. e-mail spam
The abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
12. bribery
The act of providing money, property, or favors to someone in business or government to obtain a business advantage.
83. identity theft
The act of stealing key pieces of personal information to impersonate a person. industrial espionage The use of illegal means to obtain business information not available to the general public.
85. information privacy
The combination of communications privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy (the ability to limit access to one's personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use).
# ....ensures that ethical procedures are installed and consistently adhered to throughout the organization
The corporate ethics officer
37. copyright
The exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work; granted to creators of original works of authorship.
3. anonymous expression
The expression of opinions by people who do not reveal their identity.
9. breach of contract
The failure of one party to meet the terms of a contract.
2. material breach of contract
The failure of one party to perform certain express or implied obligations, which impairs or destroys the essence of the contract.
10. breach of the duty of care
The failure to act as a reasonable person would act.
8. negligence
The failure to do what a reasonable person would do, or doing something that a reasonable person would not do.
51. digital divide
The gulf between those who do and those who do not have access to modern information and communications technology such as cell phones personal computers, and the Internet.
42. cyberbullying
The harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the Internet or cell phone.
QN=203 _____ This is one advantage that a cell phone has over a personal computer that leads industry experts to believe that it will be the cell phone that will ultimately bridge the digital divide.
The infrastructure needed to connect wireless devices to the Internet is easier and less expensive to build.
27. Communications Act of 1934
The law that established the Federal Communications Commission and gave it responsibility for regulating all non-federal government use of radio and television broadcasting and all interstate telecommunications—including wire, satellite, and cable—as well as all international communications that originate or terminate in the United States.
4. misrepresentation
The misstatement or incomplete statement of a material fact.
53. duty of care
The obligation to protect people against any unreasonable harm or risk.
16. opt in
To agree (either implicitly or by default) to allow an organization to collect and share one's personal data with other institutions.
45. cyberstalking
Threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications; it is the adult version of cyberbullying.
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
True
# A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected Web sites. True or False?
True
# Concern over potential cyberterrorism began well before the attacks of 9/11. True or False?
True
# There are many industry associations and vendor certificate programs for IT workers. True or False
True
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
True
A defect in process control software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees.
True
A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
True
A number of organizations are exploring the use of virtual online worlds to improve teaching, learning, and creative expression.
True
A potential disadvantage of telework is that can create potential security issues.
True
A potential disadvantage of telework is that some teleworkers may suffer from isolation and may not really feel "part of the team."
True
A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case.
True
A rapid increase in the appointment of corporate ethics officers typically follows the revelation of a major business scandal.
True
A software development methodology is a standard, proven work process that enables systems analysts, programmers, project managers, and others to make controlled and orderly progress in developing high-quality software.
True
A stakeholder is someone who stands to gain or lose, depending on how a situation is resolved.
True
A virtual world may support e-commerce and allow users to sell their own real products within the real world.
True
A visitor to a virtual world represents him- or herself through an avatar.
True
A warranty assures buyers or lessees that a product meets certain standards of quality.
True
According to a survey by the National Campaign to Prevent Teen and Unplanned Pregnancy, one in five teenagers have engaged in sexting.
True
According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident.
True
Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business.
True
Advocates of advanced surveillance technology argue that people have no legitimate expectation of privacy in a public place.
True
Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to IT staff members.
True
Although the healthcare industry depends on highly sophisticated technology for diagnostics and treatment, it has been slow to implement IT solutions to improve productivity and efficiency.
True
Although the necessity of security is obvious, it must often be balanced against other business needs and issues. As a result, most organizations spend 5 percent or less of their overall IT budget on information security.
True
Although they may implement a speech code, public schools and universities are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint.
True
As the software maturity level increases, the organization improves its ability to deliver good software on time and on budget.
True
Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding nondisclosure clauses to employment contracts.
True
Certifications that are tied to a vendor's product are relevant for job roles with very specific requirements or certain aspects of broader roles. Sometimes, however, vendor certifications are too focused on technical details of the vendor's technology and do not address more general concepts.
True
Coca-Cola has been able to create a highly popular Facebook fan page to promote its image and brands.
True
Companies can use the Statement on Auditing Standards No. 70, Service Organizations to assess if company data is protected in an outsourcing arrangement.
True
The decision support system is used to improve the decision making in a variety of industries.
True
Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies.
True
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
True
Dorothea Perry and Robert Gross were put on probation and subsequently fired for job-performance issues by their employer, Collegis, shortly after reporting that they found child pornography on the computer of a professor at New York Law School.
True
During the 2009 Iranian elections, there were rumors that the Iranian government attempted to block Twitter traffic and used Twitter to communicate its own message.
True
Electronic manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials.
True
Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment.
True
Employees who are unwillingly exposed to pornography or other objectionable material while using their work computer would have a strong case for sexual harassment.
True
Failure mode and effects analysis is an important technique used to develop ISO 9000-compliant systems by both evaluating reliability and determining the effects of system and equipment failures.
True
Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.
True
From a legal perspective, IT workers are not recognized as professionals because they are not licensed by the state or federal government.
True
HIPPA requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.
True
IT firms and organizations that use IT products and services are concerned about a shortfall in the number of U.S. workers to fill positions in networking and data communications analysis.
True
In Reno v. ACLU, the Supreme Court ruled that the same free-speech protections apply to communication over the Internet as exists for print communication.
True
In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee.
True
In some states, sexting can result in felony charges and first-time offenders can be registered as sex offenders.
True
In some virtual worlds, an avatar can earn virtual world money by performing some task in the virtual world and convert their virtual world money into real world cash.
True
In the ICRA rating system, Web authors fill out an online questionnaire to describe the content of their site.
True
In the business world, important IT decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.
True
India is widely acknowledged as the best source of programming skills outside Europe and North America.
True
It is difficult to quantify how much the use of IT has contributed to worker productivity.
True
It is estimated that more than 1 billion personal computer will be connected to the Internet by 2010 leaving some 5.5 billion people unconnected.
True
It is harder to quantify the benefits of today's IT investments on worker productivity than during the early days of IT in the 1960s.
True
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
True
Many professional roles carry special rights and responsibilities.
True
Mobile phones have many distinct advantages that lead industry observers to think that it will be the cell phone that ultimately bridges the digital divide rather than the personal computer.
True
Morality refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus.
True
More than 1 out of 5 hiring managers use social networking Web sites as a source of information about candidates.
True
Most countries have continually been able to produce more goods and services over time—not through a proportional increase in input but by making production more efficient.
True
Most of us have developed a decision-making process we use almost automatically, without thinking about the steps we go through.
True
Nearly 40% of H-1B temporary workers are employed as computer programmers.
True
No policy can stop wrongdoers from taking inappropriate actions, but it can set forth the general rights and responsibilities of all IT users, establish boundaries of acceptable and unacceptable behavior and enable management to punish violators.
True
Obscene speech is not protected by the First Amendment.
True
Of those hiring managers who use social networking Web sites to screen candidates, over one-third have found information that made them drop a candidate from consideration.
True
Once a John Doe lawsuit is filed and the court grants permission, the plaintiff can serve subpoenas on any third party—such as an Internet service provider or a Web site hosting firm—that may have information about the true identity of the defendant.
True
One of the early Supreme Court rulings that addressed anonymity as an aspect of the Bill of Rights was NAACP v. Alabama in which the court ruled that the NAACP did not have to turn its membership list over to the state of Alabama.
True
Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.
True
Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First Amendment.
True
Plagiarism software checks for matching text in different documents as a means of identifying potential plagiarism.
True
Pretexting involves the use of false pretenses to gain access to the personal records of individuals.
True
Procter & Gamble admitted publicly that it unethically gained information about Unilever, its competitor in the multibillion-dollar hair-care business.
True
Protecting computer software has proven to be difficult because it is has not been well categorized under the law.
True
Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees.
True
Quality assurance refers to methods within the development cycle designed to guarantee reliable operation of the product.
True
Reliability is the probability of a component or system performing without failure over its product life.
True
Social network advertising has at least two advantages over more traditional advertising media such as radio, TV, and newspapers.
True
Software manufacturers face economic, ethical, and organizational challenges associated with improving the quality of their software.
True
Software, video games, multimedia works, and Web pages can all be copyrighted.
True
Some social shopping Web sites earn money by sharing with retailers data about their members' likes and dislikes.
True
Some virtual activities are clear violations of real world laws.
True
Some virtual world activities can cause real life anguish for the human owners of the avatars involved but may or may not rise to the level of real life crimes.
True
Some work roles and some individuals are not well suited for telework opportunities.
True
Spyware frequently employs sophisticated methods to avoid detection by popular software packages that are specifically designed to combat it.
True
Store-and-forward telemedicine does not require the presence of the patient and care provider at the same time.
True
Studies have shown that around 10 percent of all job applicants seriously misrepresent their backgrounds on their resumes.
True
Temporary workers, contractors, consulting firms, H-1B workers, and outsourced offshore workers are examples of nontraditional workers.
True
The CAN-SPAM Act clearly defines the conditions under which the sending of spam is legal.
True
The Child Online Protection Act was an attempt to protect children from online pornography while preserving the rights of adults.
True
The Children's Internet Protection Act required federally financed schools and libraries to use some form of technological protection to block computer access to obscene material, pornography, and anything else considered harmful to minors.
True
The Digital Millennium Copyright Act made it an offense to circumvent a technical protection of copyrighted material.
True
The Economic Espionage Act imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets.
True
The European Union passed the Restriction of Hazardous Substances Directive which restricts the use of many hazardous materials in computer manufacturing.
True
The Federal Trade Commission is charged with enforcing the CAN-SPAM act but has done little to enforce the act.
True
The IP address can be used to identify the sender of an ordinary e-mail or online posting.
True
The PRO-IP Act of 2008 increased trademark and copyright enforcement, and substantially increased penalties for infringement.
True
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.
True
The United States has one of the lowest software piracy rates in the world, along with Luxembourg and New Zealand.
True
The Western Cape province initiated the Khanya Project to address the shortage of teachers in the region, to bridge the digital divide by providing access to computer technology to all schoolchildren and educators, and to prepare the Western Cape for the new "knowledge economy."
True
The accurate, thorough, and timely processing of business transactions is a key requirement for business information systems. A software defect in such a system can be devastating, resulting in lost customers and reduced revenue.
True
The development and use of new medical technology, such as new diagnostic procedures and treatments has increased spending and "accounts for one-half to two-thirds of the increase in healthcare spending in excess of general inflation."
True
The development of a good problem statement is the most critical step in the decision-making process.
True
The digital divide exists not only between more and less developed countries but also within countries—among age groups, economic classes, and people who live in cities versus those in rural areas.
True
The general public does not understand the critical importance of ethics as they apply to IT, as too much emphasis has been placed on technical issues.
True
The goal of the Sarbanes-Oxley Act was to renew investor's trust in corporate executives and their firm's financial reports following numerous financial scandals in the early 2000's.
True
The key distinguishing factor between a gift and a bribe is that no gift should be hidden.
True
The lack of agreement on the core body of knowledge for various IT roles is a primary reason for the lack of international or national licensing programs for IT professions.
True
The program manager of Khanya feels that the greatest contribution of the Khanya project was that it proved that ICT can be implemented successfully on a large scale in Africa.
True
The requirements for certification generally require that the individual has the prerequisite education and experience, sits for and passes an exam, and commits to and abides by a code of ethics established by the organization providing the certification.
True
The safe operation of many safety-critical systems relies on the flawless performance of software.
True
The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission.
True
The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used.
True
There are a number of ethical issues associated with using social network advertising to send messages to an individual's network of friends.
True
There are two forms of dynamic testing—black-box testing and white-box testing.
True
There have been many delays in the development of the new Boeing 787 Dreamliner including problems with the software that controls and monitors the aircraft's braking system.
True
There is no federal law requiring that organizations reveal a data breach, however, more than half the states have implemented such legislation.
True
To be classified as a truly green PC, the PC must meet other criteria than simply use less electricity to run than the standard computer.
True
Twitter text-based posts must be 140 characters or less.
True
Twitter users can restrict delivery of their messages, control whose tweets they receive, when they receive them, and on what devices.
True
Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing the other's copyright.
True
When an organization decides to use contingent workers for a project, it is making a trade-off between completing a single project quickly and cheaply versus developing people within its own organization.
True
Whenever possible, automated system rules should mirror an organization's written policies.
True
# Các d?ch v? cung c?p di?n, nu?c, du?ng truy?n internet, ánh sáng.. là
Tài s?n d?ch v?
# Các ph?n m?m ?ng d?ng, ph?n m?m công c?, ph?n m?m h? th?ng, các ?ng d?ng khác là
Tài s?n ph?n m?m
# T?n t?i trong các d? li?u, t?p van b?n, các b?n ghi âm, file luu tr? hình ?nh, tài li?u h? th?ng, hu?ng d?n s? d?ng.. là
Tài s?n thông tin
# Máy tính cá nhân, các thi?t b? truy?n t?i thông tin, các thi?t b? k? thu?t, bàn gh?.. là
Tài s?n v?t lý
QN=78 The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
U.S. Computer Emergency Readiness Team
QN=244 The _____ lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime.
Viscaino v. Microsoft
QN=70 The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.
US Code Title 18, Part I, Chapter 121
# .... gave sweeping new powers to law enforcement agencies to search telephone, e-mail, medical, financial, and other records; it also eased restrictions on foreign intelligence gathering in the United States
USA PATRIOT Act
11. _________________ gave sweeping new powers to law enforcement agencies to search telephone, e-mail, medical, financial, and other records; it also eased restrictions on foreign intelligence gathering in the United States.
USA PATRIOT Act
QN=92 The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records.
USA PATRIOT Act
# E-mail spam is (are) the abuse of e-mail systems to send ....
Unsolicited e-mail to large numbers of people.
51) __ is the country
Vietnam
39) __ is an effort by an employee
Whistle-blowing
55.What is an effort by an employee to attract attention to a negligentm illegal, unethical, abusive, or dangerous act by a company that threatens the public interest
Whistle-blowing
53) __ is a distinct possibility
Wireless spamming
88. intellectual property
Works of the mind— such as art, books, films, formulas, inventions, music, and processes—that are distinct, and owned or created by a single person or group. Intellectual property is protected through copyright, patent, trade secret, and trademark laws.
17) The U.S.Securities
WorldCom
# Viruses differs from worm is....
Worm can self-multiply, virus not
QN=253 Before a company can apply for an H-1B visa worker, it must file _____.
a Labor Condition Statement
#Which of the following is an example of intellectual property?
a business process for the efficient handling of medical insurance claims
18) In March 2005
a dozen
# Material breach of contract occurs when ...
a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract.
QN=182 When developing safety-critical software ____.
a project safety engineer maintains a hazard log
13. Which of the following statements about Internet pornography is true?
a. The First Amendment is often used to protect distributors of adult pornography over the Internet.
10. Which of the following identifies the numbers dialed for outgoing calls?
a. pen register
7. The U.S. Supreme Court in United States v. American Library Association ruled that public libraries must install Internet filtering software to comply with all portions of:
a. the Children's Internet Protection Act
QN=195 As of 2007, what percent of all U.S. heads-of-household have never used e-mail?
about 20%
QN=223 Recent survey results show that _____ of students ages 13-17 had experienced cyberbullying within the last year.
about 43%
QN=219 Of those hiring managers who use social networking Web sites to screen candidates, _____ have found information that made them drop a candidate from consideration.
about one-third
# The Freedom of Information Act (FOIA) grants citizens the right to ...
access certain information and records of the federal government upon request
QN=116 Privacy advocacy groups such as the Electronic Privacy Information Center, the ACLU, and the Electronic Frontier Foundation claimed that the language in the Child Online Protection Act was overly vague and limited the ability of ____ to access material protected under the First Amendment.
adults
# A group of Web sites served by a single advertising net- work is called a collection of...
affiliated Web sites
# A professional is someone who
all of the above
# According to the Children's Online Privacy Protection Act, a Web site that caters to children must....
all of the above
# Society expects professionals to act in a way that
all of the above
# View films and share access to view on cracked software in working pc means .....
all the above
# The security of information technology used in business is of the utmost importance, but it must be ... against other business needs and issues
balanced
3.Once a John Doe lawsuit is filed and court grants permission, the plaintiff can serve subpeonas on any third party such as _____ that
an internet service provider
19) Despite the importance
anonymity
11. The California State Court in Pre-Paid Legal v. Sturtz et al. set a precedent that courts apply when deciding whether to approve subpoenas requesting the identity of _______________.
anonymous Internet speakers
QN=131 Internet users who want to remain anonymous can send e-mail to a(n) ____ service, which uses software to strip the originating IP address from the message.
anonymous remailer
# The Children's Internet Protection Act requires federally financed schools and librar- ies to use filters to block computer access to ...
any material considered harmful to minors
QN=4 In 2007, ____ of all software in circulation worldwide was pirated.
around 38%
QN=72 A strong security program begins by ____.
assessing the threats to an organization's computers and network
QN=120 The Children's Internet Protection Act ____.
attempted to protect children from accessing pornography and other explicit material online
# Companies that are viewed as harmful to their community may find that negative publicity reduces sales, impedes relationships with some business partners, and ...
attracts unwanted government attention.
QN=186 The most widely used measurement of the material standard of living is _____.
gross domestic product per capita
9. _________________ is a process that one undertakes voluntarily to prove competency in a set of skills.
b. Certification
4. An act designed to promote accuracy, fairness, and privacy of information in the files of credit-reporting companies is the
b. Fair Credit Reporting Act
14. The written statement that defines an organization's security requirements as well as the controls and sanctions used to meet those requirements is known as a:
b. security policy
1. The most basic legal guarantee to the right of freedom of expression in the United States is contained in the:
c. First Amendment
4. A written statement that is false and that harms another person is called:
c. libel
5. A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called a(n):
c. rootkit
QN=50 If misrepresentation causes a party to enter into a contract, that party may have the legal right to ____.
cancel the contract and seek reimbursement for damages
# Software that generates and grades tests that humans can pass but that all but the most sophisticated computer programs cannot is called....
capcha
7. Software that generates and grades tests that humans can pass but that all but the most sophisticated computer programs cannot is called _________________.
captcha
# A _________________ states the principles and core values that are essential to the work of a particular occupational group
code of ethics
# _________________ highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision-making process
code of ethics
11. _________________ highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision-making process.
code of ethics
12. A _________________ states the principles and core values that are essential to the work of a particular occupational group
code of ethics
QN=24 An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a common set of values and goals is the ____ approach.
common good
# Four common philosophies are the virtue ethics approach, the utilitarian approach, the fairness approach, and the....
common good approach
1. An approach to ethical decision making based on a vision of society as a community whose members work together to achieve a common set of values and goals is
common good approach
QN=155 Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ____.
competitive intelligence
QN=180 After an organization decides to adopt CMMI-DEV, it must ____.
conduct an assessment of its software development practices
QN=28 As a result of increased ____, clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices.
connectivity
# _________________ means that employees know what is expected of them, and they can employ the organizational values to help them in their decision making
consistency
4._________________ means that employees know what is expected of them, and they can employ the organizational values to help them in their decision making
consistency
# If an intrusion occurs, there must be a clear reaction plan that addresses notification, evidence protection, activity log maintenance, and...
containment, eradication, and recovery
QN=243 Another disadvantage of using contingent workers is that _____.
contingent workers may pass on information about corporate processes and strategies to subsequent clients who could be competitors
# The use of cookies and tracking software is ... because companies can collect information about consumers without their explicit permission
controversial
# The .... is that it is difficult to restrict children's Internet access without also restricting adults' access.
conundrum
36.is that it is difficult to restrict children's Internet access without also restricting adults'access
conundrum
54) A(n) __ is a text file
cookie
# Marketers use .... to recognize return visitors to their sites and to store useful informa-tion aboutthem
cookies
QN=47 Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making.
core values and beliefs
QN=37 Accepting payment of entry fees for a golf tournament from a supplier is ____.
could be perceived as a bribe
QN=67 The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain.
cybercriminal
QN=69 Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____.
cyberterrorism
1. A professional is someone who:
d. all of the above
7. Society expects professionals to act in a way that:
d. all of the above
8. The best Internet filters rely on the use of:
d. all of the above
9. The Electronic Communications Privacy Act deals with
d. all of the above
must:
d. all of the above
14. Which of the following is not a technique frequently employed by identity thieves?
d. trap and trace
1. According to the "2008 CSI Computer Crime and Security Survey," which of the following was the most common security incident?
d. virus attack
# A code of ethics is a statement that highlights an organization's key ethical issues and iden- tifies the overarching values and principles that are important to the organization and its....
decision making
QN=152 A(n) ____ can read the machine language of a software program and produce the source code.
decompiler
QN=212 Shortly after the 2009 Iranian election, the U.S. State Department contacted Twitter and asked the company to _____.
delay a scheduled software upgrade that would have cut off daytime service in Iran
QN=229 Most social networking Web sites have a terms of user agreement that states the Web site has the right to _____.
delete material that violates the site's policies
QN=163 The objective of quality management is to ____.
deliver high-quality systems that meet the needs of their users
# Ethics training not only makes employees more aware of a company's code of ethics and how to apply it, but also ...
demonstrates that the company intends to operate in an ethical manner
44) A __ attack is one in which
denial-of-service
16) During the Kosovo confict in 1999
denial-of-service attacks
# Companies use many different methods to collect personal data about visitors to their Web sites, including ...
depositing cookies on visitors' hard drives and capturing click-stream
# Organizations should implement ... systems to catch intruders in the act
detection
QN=23 Part of developing a good problem statement includes ____.
determining who is directly affected by the problem
QN=224 Several states have enacted laws to curb bullying by calling on schools districts to _____ regarding cyberbullying and punishment.
develop policies
QN=22 The step of the five-step decision process during which those who will be affected by the decision are identified is the ____ step.
develop problem statement
# Industrialized nations generally have a higher standard of living than ...
developing countries
# Which of the following approaches to social network advertising involves placing a banner ad on a Web site?
direct advertising
# Even within the same society, people can have strong .... over important moral issues
disagreements
QN=220 Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating federal or state _____ laws.
discrimination
QN=177 One approach to quality assurance is to test the code of a completed unit of software by actually entering test data and comparing the results to the expected results. This is called ____.
dynamic testing
# a code of ethics cannot gain company-wide acceptance unless it is developed with...
employee participation
QN=14 One characteristic of an organization that has a successful ethics program is that ____.
employees are rewarded for ethical behavior.
28.which is not an characteristic of a successful ethics program
employees feel pressure about their company
QN=49 A feature that is associated with a bribe is that a bribe ____.
encourages an obligation for the recipient
QN=252 Heads of U.S. companies continue to complain that they have trouble finding _____ and have urged the USCIS to loosen the reins on visas for qualified workers.
enough qualified IT workers
8.The Foreign Intelligence Surveillance Act (FISA)
escribes procedures for the elec-tronic surveillance and collection of foreign intelligence information between foreign powers and agents of foreign powers
QN=2 A set of beliefs about right and wrong behavior within a society is called ____.
ethics
30.what are the correct statements about ethics
ethics is a set of beliefs about right and wrong behavior
QN=21 The step in the five-step decision-making process during which the decision maker (s) consider laws, guidelines, policies, and principles that might apply to the decision is the ____ step.
evaluate and choose alternative
# this evaluation may indicate that further refinements are needed., can be found in
evaluate the results
QN=245 The key lesson from Viscaino v. Microsoft is that _____.
even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor is not the agreement but the degree of control the company exercises over the employees
QN=231 On May 20, 2009, an organized group of users uploaded video clips of _____ to YouTube tagged with child-friendly identifiers.
explicit adult content
# An attack on an information system that takes advantage of a vulnerability is called a(n) _________________.
exploit
# An attack on an information system that takes advantage of a vulnerability is called a(n)...
exploit
3. An attack on an information system that takes advantage of a vulnerability is called a(n) _________________.
exploit
QN=53 A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
exploit
QN=55 Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots.
exploits
QN=139 The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection.
expression
15. Implementation of a strong firewall provides adequate security for almost any network. True or False?
f
6. Resume inflation is a usual and customary practice tolerated by employers. True or False?
f
8. A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is called a cyberterrorist. True or False?
f
9. To date, there are no documented cases of cyberterrorism. True or False?
f
9. True or False? Anonymous expression, or the expression of opinions by people who do not reveal their identities, has been found to be unconstitutional.
f
# The ... established four factors for courts to consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty.
fair use doctrine
# in relationships between it workers and clients, each party agrees to provide something of secured to the other
false
# the sarbanes-oxley act of 2001 was assed in response to public outrage over several major accounting scandals, including those at enron, worldcom
false
# the sarbanes-oxley act of 2001 was passed in response to public outrage over several major accounting acandals, including those at enron, worldcom
false
# utilitarian approach can be applied to the business world by equating the virtues of a good businessperson with those of a good person
false
The Gramm-Leach-Bliley Act repealed the prohibition of any one institution from offering investment, commercial banking, and insurance services. It also included three key rules that affect personal privacy
financial privacy rule, safeguards rule, and pretexting rule. | True
QN=132 An organization's IT department can set up a(n) ____ to prohibit employees from accessing remailers.
firewall
QN=46 A device that limits access to the company's network based on the organization's Internet usage policy is called a(n) ____.
firewall
QN=77 Installation of a(n) ____ is the most common computer security precaution taken by businesses.
firewall
29.hardware or software device that serves as a barrier between an organization's network and the Internet; a firewall also limits access to the company'snetwork based on the organization'sInternetusagepolicy
firewall,firewall
# Obscene speech, defamation, incitement of panic, incitement to crime, "fighting words," and sedition are not protected by the First Amendment and may be .... by the government.
forbidden
35.Obscene speech, defamation, incitement of panic, incitement to crime,"fighting words,"and sedition are not protected by the First Amendment and may be
forbidden
# _________________ makes employees more aware of a company's code of ethics and how to apply it, as well as demonstrates that the company intends to operate in an ethical manner
formal ethics training
13. _________________ makes employees more aware of a company's code of ethics and how to apply it, as well as demonstrates that the company intends to operate in an ethical manner.
formal ethics training
34.Often they declare these responsibilities in a formal statement of their company's principles or beliefs
formal statement
QN=60 It is estimated that about one in ____ personal computers in the United States is part of a botnet.
four
# H1B contract need jobs that require at least a ...... bachelor's degree in a specific field, or equivalent experience
four-year
5. _________________ is the crime of obtaining goods, services, or property through deception or trickery.
fraud
QN=115 After a three judge federal panel ruled unanimously that the Communications Decency Act unconstitutionally restricted ____, the government appealed to the Supreme Court in a case that became known as Reno v. ACLU.
free speech
QN=111 The First Amendment protects American's rights to freedom of religion and ____.
freedom of expression
21.which statement about professional definition is not true
from a legal perspective,IT workers are not recognized as professionals because they are
QN=233 Bad deeds done in a virtual online world can be mediated by _____, who can take action according to the rules of the game and with consequences internal to the game
game administrators
QN=140 The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will ____ to protect American innovation.
go the extra mile
# The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will
go the extra mile to protect American innovation.
# The _________________ that socially responsible activities create can make it easier for corporations to conduct their business
goodwill
3.The _________________ that socially responsible activities create can make it easier for corporations to conduct their business.
goodwill
# The IT security group must lead the effort to implement security policies and proce- dures, along with ...
hardware and software tools to help prevent security breaches
QN=171 When sued for negligence, a software developer is not held responsible for every product defect that could have been detected that causes customer or third-party loss. Instead, responsibility is limited to ____.
harmful defects that could have been detected and corrected through "reasonable" software development practices
QN=211 Twitter _____.
has had problems related to its rapid growth
QN=110 In order to avoid Fourth Amendment issues with the use of advanced surveillance technology to track people in public places, advocates of such technology argue that people ____.
have no legitimate expectation of privacy in public
QN=75 A security policy outlines what needs to be done but not ____ to do it.
how
# In a social audit, an organization reviews ... meeting its ethical and social responsibility goals. and communicates its new goals for the upcoming year
how well it is
# Many businesses monitor the Web for the public expression of opinions that might ...
hurt their reputations
QN=113 Miller v. California is the Supreme Court case that established a test to determine ____.
if material is obscene
# The key to prevention of a computer security incident is to ..... solution to make computer break-ins so difficult that an attacker eventually gives up
implement a layered security
QN=173 A(n) ____ requires several standards must be met including; the goods must be fit for the ordinary purpose for which they are used, the quality of the goods must pass without objection in the trade, and the goods must meet a fair average or middle range of quality.
implied warranty of merchantability
# An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are ....
important to the organization and its decision making
QN=125 Anonymous expression in the U.S. began around the time of ____.
the American Revolution
# Identity thieves often create data breaches, purchase personal data, employ phish- ing, and ...
install spyware to capture personal data
51.dentity thieves often create data breaches, purchase personal data employ phish-ing, and
install spyware to capture personal data
QN=178 After successful unit testing, the software units are combined into an integrated subsystem that undergoes rigorous testing to ensure that the linkages among the various subsystems work successfully. This form of testing is called ____.
integration testing
# Board members are expected to conduct themselves according to the highest standards for personal and professional ....
integrity
46.Board members are expected to conduct themselves according to the highest standards for personal and professional
integrity
QN=153 The courts have ruled in favor of using reverse engineering to enable ____.
interoperability
QN=79 A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____.
intrusion detection system
# A device that works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the company network is called a(n):
intrusion prevention system
QN=80 A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
intrusion prevention system
QN=137 These objects are protected under patent law: ____.
inventions
QN=235 Online muggings and sex crimes in a virtual world can cause real life anguish for the human owners of the avatars involved. Such acts _____ rise to the level of a real life crime.
may or may not
# Board members must create an environment in which employees feel they can seek advice about appropriate business conduct raise issues, and report .... through appropriate channels
misconduct
QN=73 Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations.
mitigated
QN=29 As a result of improved ____, clients are able to break down their business processes into their fundamental steps and decide which they will perform themselves and which they will outsource to service providers.
modularization
# No security system is perfect, so systems and procedures must be...
monitored to detect a possible intrusion
# Statements about how people should behave fit together to form the _________________ by which a society lives
moral code
1.Statements about how people should behave fit together to form the _________________ by which a society lives
moral code
QN=1 Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the ____ by which a society lives.
moral code
28) A form of inconsistency
moral standards
6) The term __ refers to social conventions
morality
QN=190 U.S. regulations make it easier for companies to hire and fire workers and to start and end business activities compared to many other industrialized nations. This flexibility makes it easier for markets to relocate workers to _____ firms and sectors.
more productive
QN=123 In United States v. American Library Association, the Supreme Court, in a 6-3 decision, held that public libraries ____.
must purchase filtering software and comply with all portions of the Children's Internet Protection Act
# if an intrusion occurs, there must be a clear reaction plan that addresses...
notification, evidence protection, containment, eradication, activity log maintenance, and recovery
QN=225 When school authorities do get involved in an effort to discipline students for cyberbullying, they are sometimes sued for violating the student's right to free speech, especially if the activity involved _____.
occurred off school premises
# In the United States, speech that is merely annoying, critical, demeaning, or ....
offensive enjoys protection under the First Amendment.
QN=39 The Foreign Corrupt Practices Act permits facilitating payments so that an official performs or makes a(n) ____.
official function faster
Most codes of ethics created by professional organizations have two main parts
one part outlines what the professional organization aspires to become, and the other part lists rules and principles by which members of the organization are expected to abide. | True
QN=154 7-zip, Audacity, Blender 3D, eMule, Eraser, and Firefox are all examples of ____.
open source software
QN=19 Ethical conduct criteria that could be used in an employee's performance evaluation includes ____.
operating effectively in a multicultural environment
# If someone refuses to give an institution the right to collect and share personal data about oneself, he or she is said to ....
opt-out
QN=54 Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.
patch
# Many large software companies have cross-licensing agreements in which each agrees not to sue the other over....
patent infringements
QN=169 Software used to control many industrial processes in an effort to reduce costs, eliminate human error, improve quality, and shorten the time it takes to manufacture products is called a(n) ____.
process control system
# It is difficult to quantify how much the use of IT has contributed to worker ...
productivity
# The amount of output produced per unit of input is called....
productivity
QN=188 Today, organizations are trying to improve IT systems and business processes that have already gone through several rounds of improvement. This makes it difficult to measure significant improvements in _____.
productivity
25.is a calling that requires specialized knowledge and often long and intensive academic preparation
profession
40.to countribute to society, to participate in a lifelong training program (both formal and informal), to keep abreast of developments in their field, and to assist other professionals in their development
professionals
# An organization's IT department can set up a(n) firewall to ....
prohibit employees from accessing remailers.
# Organizations and governments have attempted to establish policies and laws to help guide Internet use as well as ...
protect their own interests
QN=81 The concept of privacy is ____.
protected by a number of amendments in the Bill of Rights
QN=33 Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____.
public interest
QN=166 The degree to which a software product meets the needs of its users is called software ____.
quality
QN=259 The _____ allows a private citizen to file a sit in the name of the U.S. government.
qui tam provision
QN=164 The first release of any software ____.
rarely meets all its users' expectations
QN=74 The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
reasonable assurance
QN=189 Labor productivity in the United States remained relatively high despite a(n) _____ level of investment in IT from 1999 to 2004.
reduced
QN=158 Cybersquatters ____.
register domain names for famous trademarks or company names to which they have no connection
# The public _________________ of an organization strongly influences the value of its stock, how consumers regard its products and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation it receives from its business partners
reputation
6.The public _________________ of an organization strongly influences the value of its stock, how consumers regard its products and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation it receives from its business partners.
reputation
5.That an employer can be held responsible for the acts of its employee even if the employee acts in a manner contrary to corporate policy and the employer's direction is based on the principle called _________________.
respondeat superior
# That an employer can be held responsible for the acts of its employee even if the employee acts in a manner contrary to corporate policy and the employer's direction is based on the principle called _________________
respondeat superior or "let the master answer"
# The process of taking something apart in order to understand it, build a copy of it, or improve it is called ....
reverse engineering
QN=151 The process of taking something apart in order to understand it, build a copy of it, or improve it is called ____.
reverse engineering
# The goal of is to identify which investments of time and resources will best protect the organization from its most likely and serious threats
risk assessment
# The process of assessing security-related risks from both internal and external threats to an organization's computers and networks is called a(n) _________________.
risk assessment
13. The process of assessing security-related risks from both internal and external threats to an organization's computers and networks is called a(n) _________________.
risk assessment
# A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called a(n) ....
rootkit
# A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called a(n):
rootkit
16.a set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge
rootkit
QN=93 A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored.
roving wiretap
27.uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views
rules-based presonalization
# It exists not only between more and less developed countries but also within countries among age groups, economic classes, and people who live in cities versus those in ...
rural areas
QN=121 Proponents of the Children's Internet Protection Act argued that ____.
schools and libraries could elect to not implement the program, they just would not receive Federal money for Internet access
# Trustworthy computing is a method of computing that delivers secure, private, and reliable computing experiences
secure, private, and reliable
# A... defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements
security policy
# The written statement that defines an organization's security requirements as well as the controls and sanctions used to meet those requirements is known as a......
security policy
# The written statement that defines an organization's security requirements as well as the controls and sanctions used to meet those requirements is known as a:
security policy
23.The written statement that defines an organization's security require-ments, as well as the controls and sanctionsneeded to meet those requirements
security policy
QN=227 The National Center for Victims of Crime offers this advice for cyberstalking victims ____.
send the stalker a written notice that their contact is unwanted and that further contact should cease
# A(n) _________________ enables an organization to review how well it is meeting its ethical and social responsibility goals, and communicate new goals for the upcoming year.
social audit
12. A(n) _________________ enables an organization to review how well it is meeting its ethical and social responsibility goals, and communicate new goals for the upcoming year.
social audit
QN=18 In a(n) ____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communications its new goals for the upcoming year.
social audit
# A standard, proven work process for the development of high-quality software is called a...
software development methodology
# Install cracked software in working pc means .....
software piracy
# Methods within the development cycle designed to guarantee reliable operation of the product are known as ____.
software quality assurance
# .....forces unwanted and often objectionable materials into e-mail boxes, detracts from the ability of Internet users to communicate effectively, and costs Internet users and service providers millions of dollars annually
spam
# _________________ forces unwanted and often objectionable materials into e-mail boxes, detracts from the ability of Internet users to communicate effectively, and costs Internet users and service providers millions of dollars annually
spam
6. _________________ forces unwanted and often objectionable materials into e-mail boxes, detracts from the ability of Internet users to communicate effectively, and costs Internet users and service providers millions of dollars annually.
spam
# Legal recourse is possible only when hate speech turns into clear threats and intimidation against ...
specific citizens
QN=135 In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment. Legal recourse is possible only when that speech turns into clear threats and intimidation against ____.
specific citizens
31) Organizations often employ
spoof
QN=10 Someone who stands to gain or lose, depending on how a situation is resolved is called a(n) ____.
stakeholder
47) The primary functions of a corporate ethics
standards
QN=43 A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the ____ level and often requires that the recipient pass a test of some kind.
state
QN=129 In U.S. Navy v. America Online, a sailor used a pseudonym to post information that ____.
suggested that he might be gay
59) A(n) __ provision terminates
sunset
QN=96 A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law.
sunset provision
10. There are many industry associations and vendor certificate programs for IT workers. True or False
t
11. Concern over potential cyberterrorism began well before the attacks of 9/11. True or False?
t
12. True or False? In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment. Legal recourse is possible only when hate speech turns into clear threats and intimidation against specific citizens.
t
13. The European philosophy of addressing privacy concerns employs strict government regulation, including enforcement by a set of commissioners; it differs greatly from the U.S. philosophy of having no federal privacy policy. True or False?
t
16. Over 25 percent of employers have fired workers for violating or abusing their corporate e-mail policy. True or False
t
2. A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected Web sites. True or False?
t
2. True or False? The right to freedom of expression has been broadened by the Supreme Court to include nonverbal, visual, and symbolic forms of expression.
t
3. Legislation that protects people from data privacy abuses by private industry is almost nonexistent. True or False?
t
6. True or False? The Child Online Protection Act prohibited dissemination of harmful material to minors and was ruled unconstitutional.
t
# Thi?t l?p và d?i m?t kh?u theo nguyên t?c 90-8-3, nghia là
t?i da 90 ngày, t?i thi?u là 8 ký t?, không du?c trùng v?i 3 m?t kh?u g?n nh?t
# An H-1B is a .... work visa granted by the U.S. Citizenship and Immigration Services (USCIS)
temporary work
# The First Amendment is often used to protect distributors of adult pornography over ...
the Internet
QN=138 Copyright and patent protection was established through ____.
the U.S. Constitution
QN=35 To prove fraud in a court of law, prosecutors must demonstrate that ____.
the accused made a false representation of a material fact
QN=34 Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____.
the company
56) In the utilitarian
the ethical chooice product...
QN=124 Anonymous expression is ____.
the expression of opinions by people who do not reveal their identity
# A potential whistle-blower must consider many ethical implications, including whether ...
the high price of whistle-blowing is worth it
QN=122 Implementing the Children's Internet Protection Act is more difficult for a library than a school because ____.
the library's services are open to people of all ages
QN=183 Risk involves the measurement or assessment of two parameters, the probability of an undesirable event occurring and ____.
the magnitude of the event's consequences
# Installation of a(n) firewall is ...
the most common computer security precaution taken by businesses.
QN=172 Under the doctrine of supervening event, ____.
the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury
47.A rapid increase in the appointment of corporate ethics officers typically follows
the revelation of a major business scandal
QN=15 A rapid increase in the appointment of corporate ethics officers typically follows
the revelation of a major business scandal.
# The use of information technology in business requires balancing the needs of those who use the information that is collected against ....
the rights and desires of the people whose information is being used
# A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at ...
the state level and often requires that the recipient pass a test of some kind.
QN=251 When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may required help with _____.
their English
QN=148 One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____.
there is no need to file an application or disclose the trade secret to gain protection
QN=236 Which of the following is a true statement about the number of declared undergraduate computer science majors at doctoral granting computer science departments?
there was a decline in enrollment in spite of the forecast for an increased number of workers in this field
# Many courts have ruled that IT workers are not liable for malpractice because ...
they do not meet the legal definition of a professional
QN=242 One potential disadvantage of using contingent workers is that _____.
they may not feel a strong connection to the company for which they are working
QN=144 The U.S. Supreme Court has ruled that there are ____ classes of items that cannot be patented.
three
# Thông tin là s? hi?u bi?t hay s? th?t v? con ngu?i hay s? ki?n, hi?n tu?ng nào dó ...
thu nh?n du?c qua nghiên c?u, trao d?i, nh?n xét, h?c t?p, truy?n th?, c?m nh?n
# E-mail @fsoft.com.vn là tài s?n... c?a Công ty
thông tin
QN=167 It is estimated that the Microsoft Vista operating system ____.
took over five years to develop
22.the usa patriot act provided law enforcement authoritis more
track down & prevent
# A ... is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.
trade mark
QN=32 A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential.
trade secret
# A ... is a form of protection for intellectual property that does not require any disclosures or filing of an application
trade secret d. trademark
QN=156 A(n) ____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.
trademark
QN=241 Because contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____.
training expenses
# Some librarians say they wish they could simply focus on ...
training students and adults to use the Internet safely and wisely.
# Which of the following is not a technique frequently employed by identity thieves?
trap and trace
# the code of ethics focusses employees on areas of ethical risk relating to their role in the organization, offers guidance to help them recognize and deal with ethical issues
true
# trustworthy computing is a method of computing that delivers secure, private, and reliable computing experiences based on sound business pratices
true
# _________________ is a method of computing that delivers secure, private, and reliable computing experiences
trustworthy computing
12. _________________ is a method of computing that delivers secure, private, and reliable computing experiences.
trustworthy computing
20.the child online protection act prohibited dissemination harmful material to minors and was ruled
unconstitutional
# The Child Online Protection Act prohibited dissemination of harmful material to minors and was ruled .....
unconstitutional.
# Whistle-blowing is an effort to attract public attention to a negligent, abusive and...
unethical
# The _________________ approach to ethical decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected
utilitarian
15. The _________________ approach to ethical decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected.
utilitarian
QN=25 An approach to ethical decision making that states you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected is the ____ approach.
utilitarian
46) The __ to ethical desicion decision
utilitarian appoach
37.An approach to ethical decision making that states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected
utilitarian approach
QN=174 The plaintiff must have a ____ that the supplier did not fulfill in order to win a breach-of-warranty claim.
valid contract
QN=62 Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.
valid test results
# A customer list can be considered a trade secret if an organization treats the information as ....
valuable and takes measures to safeguard it
# Employers can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not ...
violating discrimination laws
# Hotmail employed a ..... campaign when it first launched its service, with each e-mail sent by a Hotmail user containing a short message that promoted Hotmail's free e-mail service
viral marketing
QN=218 Hotmail created what is recognized by many as the most successful _____ campaign ever when it first launched its service in 1996.
viral marketing
# A(n) _________________ is a moral habit that inclines people to do what is considered acceptable
virtue
2.A(n) _________________ is a moral habit that inclines people to do what is considered acceptable
virtue
QN=6 Habits that incline people to do what is acceptable are called ____.
virtues
# According to the "2008 CSI Computer Crime and Security Survey," which of the following was the most common security incident?
virus attack
15.According to the "2008 csi computer crime and security survey". Which of the following was the most common security incident
virus attack
# The corporate ethics officer provides the organization with _________________ and _________________ in the area of business conduct
vision and leadership
7. The corporate ethics officer provides the organization with _________________ and _________________ in the area of business conduct.
vision and leadership
QN=191 The goal of telework is to allow employees to be effective and productive from _____.
wherever they are
# The security of any system is a combination of technology, policy, and people, and it requires a ...
wide range of activities to be effective
19.the supreme court has ruled that
without a reasonable expectation of privacy, there is no privacy right
QN=82 The Supreme Court has ruled that ____.
without a reasonable expectation of privacy, there is no privacy right