Chapter 1
The computer ethics issue of ________ is concerned about who owns the information that is stored about people. information property rights information privacy information redundancy information accessibility information accuracy
information property rights
Issues associated with computer ethics include all of the following except: information property rights information privacy information redundancy information accuracy information accessibility
information redundancy
The fact that the value of a company such as eBay increases as more people join and use eBay is characterized as the _________. network effect strategic effect social effect scarcity effect competitive advantage effect
network effect
Data privacy statements on an organization's Web site satisfy the ________ fair information practice principle. notice/awareness access/participation integrity/security enforcement/redress choice/consent
notice/awareness
"My Starbucks Idea," which provides customers a location to post suggestions, is a type of ____________ innovation. open simulation closed socializing focused
open
Having to deal with taxes, tariffs, and import and export regulations is a(n) ________ challenge associated with operating in the digital world. cultural infrastructure time zone difference regulatory demographic
regulatory
Using a Fitbit to log activities is potentially the beginning of ___________, which is the notion of logging all aspects of life. the life-o-meter a mashup e-business the quantified self total mobility
the quantified self
Which of the following IT megatrends is concerned with the generation, collection, and analysis of vast quantities of unstructured data? Cloud computing Access Database Big Data Mobile computing Social media
Big Data
Which of the following competency areas sets an IS professional apart from others and may help protect a person's job from the threat of outsourcing. Business competency Networking Problem solving Systems integration Development methodologies
Business competency
The job description for the _______ is "responsible for strategic planning and IS use throughout the firm." Chief Information Officer (CIO) Database administrator IS security manager IS manager Chief Digital Officer (CDO)
Chief Information Officer (CIO)
The category of information system that is used to process transactions and generate data is ________. executive information systems management information systems business intelligence systems decision support systems transaction processing systems
transaction processing systems
A list of potential donors who live in Seattle and enjoy sports would be considered ___________. data overload data information overload SQL information
information
Which of the following statements correctly describes the relationship between data and information? Information is raw facts with no meaning in and of themselves, whereas data is information that has been transformed to be useful. Data and information are completely unrelated concepts. Data and information are exactly the same thing. None of these statements correctly describes the relationship between data and information. Data are raw facts with no meaning in and of themselves, whereas information is data that has been transformed to be useful.
Data are raw facts with no meaning in and of themselves, whereas information is data that has been transformed to be useful.
Which of the following is NOT a recommended guideline by the Computer Ethics Institute for the ethical use of computers? Do not snoop in other people's files. Do not copy or use proprietary software without paying for it. Do not use other people's computer resources without authorization or compensation. Do not think about the social consequences of programs you write or systems you design. Do not use a computer to harm others.
Do not think about the social consequences of programs you write or systems you design.
Which U.S. Federal Trade Commission document is intended to encourage businesses to make their privacy policies readily available to consumers? Final Privacy Statements Fair Information Practice Principles Forecasts of Privacy Principles Free Information Policies Posted Protective Practices
Fair Information Practice Principles
Using sensors to improve supply chains to increase operational efficiency is part of the __________________. Supply Chain Internet of Things (SCIoT) Industrial Internet of Things (IIoT) Sensor Internet of Things (SIoT) Efficiency Internet of Things (EIoT) Operational Internet of Things (OIoT)
Industrial Internet of Things (IIoT)
________ is a body of governing procedures, such as guidelines or rules, which are used to organize or manipulate data to make it suitable for a given task. Experience Critical thinking Information Perspective Knowledge
Knowledge
The job description for a _________ is "responsible for analyzing business requirements and selecting information systems that meet those needs." Systems analyst Webmaster Software developer IS auditor Systems programmer
Systems analyst
Which of the following IT megatrends is concerned with the networked connection of a wide array of devices using the Internet? Mobile computing Cloud computing Social media Big Data The Internet of Things
The Internet of Things
Today, computing has changed from an activity primarily focused on _______ to one that encompasses many social and casual activities. estimating market growth playing games automating work posting status updates simulating products
automating work
The type of information system that includes methods and systems for analyzing data warehouses to better understand various aspects of a business is a(n) _______. intelligent system business intelligence system customer relationship management system office automation system management system
business intelligence system
When a company allows a customer to opt-in and/or opt-out with respect to the data it collects, it is implementing the _________ fair information practice principle. notice/awareness access/participation enforcement/redress integrity/security choice/consent
choice/consent
Information systems such as those created by Federal Express are created with the intent of gaining a(n) _______. foothold innovative edge competitive advantage disruptive wedge temporary edge
competitive advantage
According to your textbook, a degree in information systems serves as a precursor to becoming a ___________, which is a position experiencing the highest demand in business today. data scientist DOS programmer video rental manager historian COBEL administrator
data scientist
Information technology (IT) includes: telecommunications networks and software. hardware, software, and data. hardware, data, and telecommunications networks. hardware, software, and telecommunications networks. hardware, software, data, and telecommunications networks.
hardware, software, and telecommunications networks.