Chapter 4-5-6

Ace your homework & exams now with Quizwiz!

5 moral dimensions of the information age

1. Information rights and obligations 2. Property rights and obligations 3. Accountability and control 4. System quality 5. Quality of life

Instead of buying and installing software programs, subscribing companies rent the same functions from these services, with users paying on either a subscription or per-transaction basis. The scenario describes which kind of external software source?

A cloud-based software service

can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.

A competitive forces model

Which of the following best describes the competitive forces model?

A competitive forces model can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.

Which of the following best describes a multicore processor?

A multicore processor is a microprocessor to which two or more processing cores have been attached for enhanced performance.

is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement

A safe harbor

Which of the following occupational health risk consists of pressure on the median nerve through the wrist's bony structure and produces pain?

Carpel tunnel syndrome

When firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers, it is called

Cloud Computing

is the commission of illegal acts through the use of a computer or against a computer system.

Computer Crime

is the commission of acts involving a computer that may not be illegal but that are considered unethical.

Computer abuse

A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a __________.

Copyright

IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. IBM DB2, Oracle, SQL Server, Sybase, MySQL, EMC, Apache, and Hadoop are all examples of which component?

Data management and storage

Chapter 5

Dsm

Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?

Ethics

consists of a set of physical devices and software applications that are required to operate the entire enterprise.

IT infrastructure

Which of the following statements best describes the Immanuel Kant's Categorical Imperative?

If everyone did this, could the organization, or society, survive?

Which of the following has been a major threat to the Wintel dominance as a computer platform in recent years?

Increasing iPhone and Android device sales

Which statement describes how trade secret laws are limited in their ability to protect intellectual property?

It is difficult to prevent ideas from falling into the public domain.

Which of the following stages of IT infrastructure evolution was a period of highly centralized computing under the control of professional programmers and system operators?

Mainframe era

Which of the following statements best describes nanotechnology?

Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

__________ is a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists.

Nonobvious relationship awareness(NORA)

Which of the following best describes open source software?

Open source software is free software that is produced by a community of several hundred thousand programmers around the world.

IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. Microsoft Windows, Unix, Linux, Mac OS X, Chrome, Android, and iOS are all examples of which component?

Operating Systems Platform

__________ is the claim of individuals to be left along, free from surveillance.

Privacy

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called __________.

Profiling

Which of the following types of cloud computing is owned and maintained by a cloud service provider and made available to the general public or an industry group?

Public Cloud

Which of the following best describes the Risk Aversion Principle?

Take the action that produces the least harm or the least potential cost.

Which of the following statements best describes the Golden Rule?

The Golden Rule is also known as "Do unto others as you would have them do unto you," this concept can help you think about fairness in decision making.

Which of the following best describes the Law of Mass Digital Storage?

The Law of Mass Digital Storage deals with the exponential decrease in the cost of storing data, stating that the number of kilobytes of data that can be stored on magnetic media for $1 roughly doubles every 15 months.

assumes you can prioritize values in rank order and understand the consequences of various courses of action.

The Utilitarian Principle

can be used to analyze direct and indirect costs to help firms determine the actual cost of specific technology implementations.

The total cost of ownership (TCO) model

Which of the following statements about the social costs of information technology is true?

The traditional boundaries that separate work from family and just plain leisure have been weakened.

organizes computing resources so that their use is not restricted by physical configuration or geographic location.

Virtualization

are tiny software programs that keep a record of users' online clickstream.

Web Beacons

Which of the following refers to loosely coupled software components based on open Web standards that work with any application software and operating system?

Web Services

Java is __________.

an operating system- and hardware-independent programming language that is the leading interactive programming environment for the Web

Information systems affect ethical principles because they ________

raise concerns about the use of intellectual property

When dealing with platform and infrastructure change, __________ refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

scalability

Immanuel Kant's Categorical Imperative states

that if the action is not right for everyone to take, it is not right for anyone

The principle that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise refers to __________.

the ethical "no free lunch" rule


Related study sets

Role of Screening for Nonorganic Signs, Depression, & Fear Avoidance Beliefs in Patients with Back Pain

View Set

Histotechnology Exam 1 Questions (chapter 1)

View Set