CIS3250 Exam 2 (Quizzes)
Which of the following helps physicians keep tabs on patients prone to life-threatening health crises?
Remote monitoring
_____ helps physicians keep tabs on patients prone to life-threatening health crises.
Remote monitoring
the number of internet users worldwide is quickly approaching which of the following
4 billion
Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?
400 hours
appoximately how much material is being uploard to youtube every minutes making it difficult to review all material submitted for
400 hours
Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?
45 percent
Companies applying for H-1B visas must offer a wage that is not _____ less than the average salary for the occupation.
5%
Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2014 and 2024?
532,000 new jobs are expected to be added to IT related positions
An H-1B worker can work for a U.S. employer for a maximum continuous period of _____ years.
6
Congress has set the number of H-1B visas to be granted at _____ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees.
65,000
How many H-1B visas has Congress set as the maximum amount to be granted yearly?
65,000
Which of the following statements is true of Children's Internet Protection Act (CIPA)?.
CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
After an organization decides to adopt ___ , it must conduct an assessment of its software development practices to determine where they fit in the capability model.
CMMI-DEV
After an organization decides to adopt _____, it must conduct an assessment of its software development practices to determine where they fit in the capability model.
CMMI-DEV
After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?
CMMI-DEV
Miller v. _____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.
California
Healthcare professionals can use a(n) _____ to generate a complete electronic record of a clinical patient encounter.
EHR
(T/F) A Turing Test determines the strength of an encryption method
F
(T/F) Generally, a deontologist would be more comfortable breaking a rule in circumstances where doing so would have good consequences.
F
(T/F) Wikipedia relies upon an advertising-based business model
F
(T/F) A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
FALSE
(T/F) It is fairly simple to prevent contingent workers from passing on corporate processes and strategies to subsequent employers.
FALSE
(T/F) The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
FALSE
(T/F) The healthcare industry was slow to implement IT solutions to improve productivity and efficiency.
FALSE
(T/F) Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded.
FALSE
Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances?
Fair use doctrine
(T/F) A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years.
False
(T/F) A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
False
(T/F) A trademark permits its owner to exclude the public from making, using, or selling a protection invention, and allows for legal action against violators.
False
(T/F) An employer can legally screen applicants based on race or ethnicity.
False
(T/F) Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.
False
(T/F) China is considered one of the best sources of programming skills outside Europe and North America.
False
(T/F) Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.
False
(T/F) Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online.
False
(T/F) Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs.
False
(T/F) Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.
False
(T/F) Formulas, inventions, and processes are not considered forms of intellectual property.
False
(T/F) From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is 50.
False
(T/F) In integration testing, special software programs called static analyzers are run against the new code.
False
(T/F) In the early days of IT in the 1960s, productivity improvements were difficult to measure.
False
(T/F) Industrial espionage and competitive intelligence are essentially the same.
False
(T/F) Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.
False
(T/F) Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.
False
(T/F) Live telemedicine requires the presence of patients and healthcare providers at the same site.
False
(T/F) Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.
False
(T/F) MySpace is the most popular social network destination worldwide.
False
(T/F) Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts, and recommendations.
False
(T/F) Question marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.
False
(T/F) Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk.
False
(T/F) Social networking Web sites are used strictly to communicate with your friends, family members, and colleagues.
False
(T/F) Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.
False
(T/F) Software defects are commonly lethal and many personal injuries are related to software failures.
False
(T/F) Software developers do not typically work closely with safety and software engineers.
False
(T/F) Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation.
False
(T/F) Software product litigation first occurred in 2000.
False
(T/F) Studies found that driving while talking on your phone doubles your risk of an accident to about the same level as if you were driving drunk.
False
(T/F) Temporary employees must be treated like official employees of the company and are eligible for vacation, sick pay, and retirement benefits.
False
(T/F) The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.
False
(T/F) The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.
False
(T/F) The OLPC XO-4 runs a Windows-based operating system.
False
(T/F) The U.S. Congress has approved the granting of an unlimited number of H-1B visas.
False
(T/F) The cost advantage of offshore outsourcing to India is continuing to increase.
False
(T/F) The digital divide cannot exist within countries.
False
(T/F) The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.
False
(T/F) The first release of a software product typically meets all its users' expectations.
False
(T/F) The impact of software defects is always trivial.
False
(T/F) The information in an EHR is not easily shared with others outside of the healthcare organization where the data originated.
False
(T/F) The term of copyright has been extended several times from its original limit of 25 years to 35 years.
False
(T/F) The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment.
False
(T/F) There is no evidence that the hiring of H-1B workers has affected the salaries of U.S. IT workers.
False
(T/F) Today most radiologists employ a personal health record system to review cases from a remote location.
False
(T/F) Under no conditions can a Web site remove user submitted content as this would be a violation of their right to freedom of speech.
False
(T/F) When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.
False
(T/F) When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing.
False
(T/F) When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.
False
The qui tam provision of the _____ allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.
False Claim Act
The _____, also known as the Lincoln Law, was enacted to combat fraud by companies that sold supplies to the Union Army.
False Claims Act
The goal of which of the following was to entice whistle-blowers to come forward by offering them a share of the money recovered?
False Claims Act
The Privacy Act of 1974 established rules to regulate
Federal government databases only
Which family of standards serves many industries and organizations as a guide to quality products, services, and management?
ISO 9001
Which family of standards serves many industries and organizations as a guide to quality products, services, and mangement?
ISO 9001
N-version programming is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements ___ times, where N could be 2, 3, 4, or more
N
Which of the following is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times, where N could be 2, 3, 4, or more?
N-version programming
_____ is the control or suppression of the publishing or accessing of information on the Internet.
Internet censorship
_____ enable patients to use the Internet to compare the quality, safety, and cost information on hospitals nationwide.
Medical information Web sites
Trade secret law protects only against the _____ of trade secrets.
Misappropriation
_____ is the country in Europe with the highest Internet penetration.
Monaco
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for ___
breach of warranty
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for which of the following?
breach of warranty
The plaintiff must have a valid contract that the supplier did not fulfill in order to win a(n) __ claim.
breach-of-warranty
The plaintiff must have a valid contract that the supplier did not fulfill in order to win a(n) _____ claim.
breach-of-warranty
Some industry observers identify the increasing use of _____ as an important first step in bridging the digital divide in many countries.
cell phones
_____ is the most common charge in qui tam cases.
charge in qui tam cases. Mischarging
As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information.
claim
In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they _____.
do not meet the legal definition of a professional
Black-box testing and white-box testing are two forms of __
dynamic testing
One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process called ___
dynamic testing
Some critics believe that the use of EHR may actually have contributed to _____ healthcare costs by making it easier to bill for patient services.
increased
Innovation is a key factor in productivity improvement. Which of the following has played an important role in enabling innovation?
information technology
One of the tests that an invention must pass to be eligible for a patent is which of the following?
it must be obvious to a person having ordinary skill in the same field
Most ethical companies make hiring decisions based on how well an applicant fulfills the _____.
job qualifications
A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services is known as which of the following?
labor productivity
In the legal system, compliance usually refers to behavior that is in accordance with _____.
legislation
Oil companies are increasingly relying on _____ to connect a nurse or EMT on an oil platform to emergency physicians at a major medical center.
live telemedicine
while using social networks as part of the hiring process employers can
look at the profiles of potential candidates
As more businesses move their key processes offshore, U.S. IT service providers are forced to _____ in order to compete.
lower prices
What type of artificial intelligence involves computer programs that can learn some task and improve performance with experience?
machine learning
The __ standard serves many industries and organizations as a guide to quality products, services, and management.
many industries and organizations as a guide to quality products, services, and management. ISO 9001
It is difficult to quantify how much the use of IT has contributed to worker productivity because _____.
many other factors influence worker productivity rates besides IT
Some studies have estimated that over 98,000 people die in hospitals each year due to _____.
preventable medical mistakes
Which of the following terms is defined as the existing body of knowledge available to a person of ordinary skill in the art?
prior art
Firms that outsource must take precautions to protect _____, regardless of where it is stored or processed or who handles it.
private data
If an organization follows widely accepted development methods, ___on its part is hard to prove.
negligence
When sued for _____, a software supplier is not held responsible for every product defect that causes customer or third-party loss.
negligence
When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?
negligence
The United States has _____ federal law(s) protecting against the export of toxic waste.
no
A(n) _____ prohibits a departing employee from working for any competitors for a period of time.
noncompete agreement
What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time?
noncompete agreement
For which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing?
political unrest
The _____ in Egypt reduced the attractiveness of that country as a source of IT outsourcing.
political unrest
Which of the following helps physicians keep tabs on patients prone to life-threatening health crises? remote monitoring
remote monitoring
(T/F) A Sensis Consumer Report found that the majority of teleworkers reported a negative impact of teleworking on their lives.
TRUE
Which of the following involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider?
remote monitoring
The National Center for Victims of Crime advises victims to:
send the stalker a written notice that their contact is unwanted and that further contact should cease
An H-1B worker can work for U.S. employer for a maximum continuous period of how many years?
six
Acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation constitute _____.
store-and-forward telemedicine
Defendants in a(n) action may use several legal defenses, including the doctrine of supervening event, the government contractor defense, and an expired statute of limitations
strict liability
The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to _____.
subpoenas requesting to identity of anonymous Web posters
(T/F) A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.
true
The _____ was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law
uniform trade secrets act
An H-1B visa is a temporary visa granted for people who:
work in specialty occupations that require at least a four-year bachelor's degree
Organizations often find that it can take years of ongoing effort and a large up-front investment to develop a good _____ with an offshore outsourcing firm.
working relationship
The _____ is an inexpensive computer about the size of a credit card.
Raspberry Pi
In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as _____.
$2500
n the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as __
$2500
In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?
$5000
The PricewaterhouseCoopers LLP Health Research Institute estimated that a 500-bed hospital could receive _____ in HITECH incentives to purchase, deploy, and maintain an EHR system.
$6.1 million
The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India.
1.5:1
The number of Internet users worldwide is quickly approaching which of the following?
4 billion
Offshore demand is driving up salaries in India by roughly how much per year?
15%
as of March 2017 how many states had implemented the SORNA requirments of the adam walsh act
17
Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?
18 USC 2425
what percent of private employer surveyed surveyed say that they have dismissed employees because of something they posted ib sicail media
18 percent
In one lawsuit in the early ___ , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems.
1990s
In one lawsuit in the early ____, a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems.
1990s
In what year was The Digital Millennium Copyright Act (DMCA) signed into law?
1998
Global Market Research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?
2/3
A survey by the Fawcett Society on the use of computing resources at work found that _____.
20 percent of men admit to viewing porn while at work
In what year did a U. S. appeals court overturn Federal Rules requiring broadband providers to treat all Internet traffic equally?
2014
In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is ___
22.1
For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.
25 years
For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered?
25 years
for a sex offender who is at tier 2 of the Adam Walsh act how long do they need to remain registered
25 years
Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020?
750,000 new jobs are expected to be added to IT related positions.
Companies applying for H-1B visas must offer a wage that is at least what percent of the average salary for the occupation?
95%
A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called which of the following?
A co-employment relationship
___ and language differences can cause misunderstandings among project members in different countries
Cultural
Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?
ACPA
Which of the following established the minimum levels of protection that each country must provide to all WTO members?
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Personal computers are composed of many different materials known to be potentially harmful to humans and the environment. These materials include beryllium, cadmium, lead, mercury, selenium, polyvinyl chloride, and _____.
BFR (brominated flame retardants)
What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?
Black-box testing
___ involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown.
Black-box testing
___ are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output.
Business information systems
_____ are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output.
Business information systems
In the awarding of software contracts, particularly by the federal government, organizations that bid on a contract may be required to have adopted ___ and to be performing at a certain level.
Capability Maturity Model Integration (CMMI)
In the awarding of software contracts, particularly by the federal government, organizations that bid on a contract may be required to have adopted _____ and to be performing at a certain level.
Capability Maturity Model Integration (CMMI)
___ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement.
Capability Maturity Model Integration (CMMI)
_____ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement.
Capability Maturity Model Integration (CMMI)
The _____ is a low-cost laptop introduced by Intel and Lenovo designed for use in kindergarten through high school classrooms in developing countries.
Classmate+
The majority of people hired with H-1B visas in 2015 were hired primarily as which of the following positions?
Computer programmers and system analysts
Motion picture companies supported the development and worldwide licensing of the _____, which enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them.
Content Scramble System (CSS)
Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?
Content Scramble System (CSS)
Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following?
Cyberharrasment
At which of the Capability Maturity Model Integration maturity levels, are processes well defined, understood, and consistent across the organization?
Defined
The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material
Digital Millenium Copyright Act
Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use?
Digital Millennium Copyright Act (DMCA)
Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating which kind of laws?
Discrimination
The _____ program helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
E-Rate
_____ reimburses telecommunications, Internet access, and internal connections providers for discounts on eligible services provided to schools and libraries.
E-Rate
A comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization is known as which of the following?
EHR
A(n) _____ is a computer-readable record of health-related information on an individual.
EHR
Which of the following refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts and recommendations?
Earned Media Marketing
EHR
Electronic Health Record: An integration of all medical documentation into electronic format
The _____ was established to promote a common code of conduct for the electronics and ICT industry.
Electronic Industry Citizenship Coalition
_____ is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.
Electronic Product Environmental Assessment Tool
The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging.
European Union's Restriction of Hazardous Substances Directive
The _____ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material intheir packaging
European Union's Restriction of Hazardous Substances Directive
Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?
European Union's Restriction of Hazardous Substances Directive
Which of the following can be oral, written, or inferred from the seller's conduct?
Express warranties
___ can be oral, written, or inferred from the seller's conduct.
Express warranties
The concept that an idea cannot be copyrighted but the _____ of an idea can be is key to understanding copyright protection.
Expression
In 2006, _____ introduced a low-cost laptop called the Classmate PC.
Intel
(T/F) Bank of America, Best Buy, and Yahoo! are some of the organizations that encourage telework.
FALse
(T/F) Telework increases ad hoc work requests and disruptions from fellow workers.
FAlse
The _____ permits facilitating payments that are made for "routine government actions," such as obtaining permits or licenses.
FCPA
An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?
Failure mode and effects analysis (FMEA)
___ is an important technique used to develop ISO 9001-compliant quality systems.
Failure mode and effects analysis (FMEA)
_____ is an important technique used to develop ISO 9001-compliant quality systems.
Failure mode and effects analysis (FMEA)
_____ is the crime of obtaining goods, services, or property through deception or trickery.
Fraud
The _____ created the World Trade Organization.
General Agreement on Tariffs and Trade (GATT)
Organizations can use which of the following to capture interviews with customers, managers, and industry leaders?
Google Hangouts on Air
After a six year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following?
Green Card
The environmental activist organization _____ issues a quarterly ranking of the top manufacturers of personal computers, mobile phones, TVs, and game consoles according to the manufacturers' polices on toxic chemicals, recycling, and climate change.
Greenpeace
A(n) _____ visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations.
H-1B
What type of visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations?
H-1B
The safety engineer uses a logging and monitoring system to track _____ from a project's start to its finish.
HAZARDS
What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement?
Independent Contractor
According to A.T. Kearney, the most attractive offshoring destination is _____.
India
Which country is considered one of the best sources of programming skills outside of Europe and North America?
India
_____ is the use of illegal means to obtain business information not available to the general public.
Industrial espionage
Which of the following is true of the International Organization for Standardization?
It is a worldwide federation of national standards bodies from 161 countries.
Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to-file" system?
Leahy-Smith America Invents Act
which of the following is currently the word's largest professional network
Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?
Live telemedicine
_____ requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites.
Live telemedicine
Which statement best describes Utilitarianism.
Main example of a consequential theory to increase happiness or "Utility".
The _____ program in Nepal started in 2008 as a small pilot project in two schools.
OLPC
The nonprofit organization _____ has a goal of providing children around the world with low-cost laptop computers to aid in their education.
OLPC
The _____ is a low-cost computer that runs a Linux-based operating system and comes with a suite of 300 or so learning applications called Sugar.
OLPC XO-4
Which term is used to identify a form of outsourcing in which services are provided by an organization whose employees are in a foreign country?
Offshore outsourcing
_____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country.
Offshore outsourcing
Turing Test
One method of determining the strength of artificial intelligence, in which a human tries to decide if the intelligence at the other end of a text chat is human.
Which of the following social network platforms enables users to visually share and discover new interests by posting images or videos to their own or others' boards?
Which of the following terms is used to describe the act of stealing someone's ideas or words and passing them off as one's own?
Plagiarism
A claim right is also known as a
Positive right
Which of the following increased trademark and copyright enforcement and substantially increased penalties for infringement?
Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act
Software patent
Protects feature, function, or process embodied in instructions executed on a computer
Which term refers to methods within the development process that guarantee reliable operation of the product?
Quality assurance
___ focuses on how to define, measure, and refine the quality of the development process and the products developed during its various stages.
Quality management
Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds?
Qui Tam Provision
What is the name of the project at the Georgia Institute of Technology that uses stories to teach human values to robots?
Quixote
The _____ is a small, inexpensive computer with either 256 MB or 512 MB of RAM, a 700 MHz processor, one or two USB ports, and an Ethernet port—but no case and no monitor.
Raspberry Pi
The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?
Reverse engineering
Which of the following terms is defined as the potential of gaining or losing something of value?
Risk
___ is the probability of an undesirable event occurring times the probability that the event would go undetected times the magnitude of the event's consequences if it does happen.
Risk
The full name of the E-Rate program is _____.
Schools and Libraries Program of theUniversal Service Fund
Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?
Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.
Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile?
Snapchat
Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services?
Social Media Marketing
_____ in a corporate setting can sometimes be directly traceable to IT users—they might allow it to happen or they might actively engage in it.
Software piracy
___ refers to methods within the development cycle that guarantee reliable operation of the product.
Software quality assurance
_____ refers to methods within the development cycle that guarantee reliable operation of the product.
Software quality assurance
The _____ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.
Statement on Auditing Standards No. 70
Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.
Statement on Standards for Attestation and Engagements No. 16
Which of the following is true of software testing?
Static testing involves programs called static analyzers which are run against new code.
Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation?
Store-and-forward telemedicine
In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent?
Strict liability
____ means that the defendant is held responsible for injuring another person, regardless of negligence or intent.
Strict liability
(T/F) Accelerometers help robots stay upright
T
(T/F) In Katz v United States (1967), the US Supreme Court determined that the Fourth Amendment does apply to conversations and that government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
T
(T/F) In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that is not in use by the general public to "see" things it could not without intrusion, that is a "search" and requires a warrant.
T
(T/F) More people worldwide have access to a cellphone than to a toilet.
T
Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?
TRIPS agreement
(T/F) A computerized provider order entry (CPOE) system enables physicians to places orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.
TRUE
(T/F) Companies can use the Statement on Auditing Standards No. 70, Service Organizations to ensure that company data is protected in an outsourcing arrangement.
TRUE
(T/F) Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies
TRUE
(T/F) Depending on how closely workers are supervised and how the job is structured, contingent workers may be viewed as permanent employees by the Internal Revenue Service, the Labor Department, or a state's workers' compensation and employment agencies.
TRUE
(T/F) In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.
TRUE
(T/F) Machine learning has contributed to the development of a much more in-depth understanding of the human genome as well as practical speech recognition, improved web search results, and self-driving cars.
TRUE
(T/F) Natural language processing is an aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English.
TRUE
(T/F) Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.
TRUE
(T/F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.
TRUE
(T/F) There are roughly 2.4 billion Internet users worldwide.
TRUE
(T/F) When an organization decides to use contingent workers for a project, it is making a trade-off between completing a single project quickly and cheaply versus developing people within its own organization.
TRUE
(T/F) Allowing employees to telework can improve morale and reduce turnover.
TRue
Which of the following technologies employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration?
Telehealth
_____ reduces the need for patients to travel for treatment and allows healthcare professionals to serve more patients in a broader geographic area.
Telehealth
The _____ of 1996 imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets. The Economic Espionage Act (EEA) A(n) _____ is
The Economic Espionage Act (EEA)
Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?
The Economic Espionage Act (EEA) of 1996
Copyright and patent protection was established through which of the following?
The U.S. Constituion
Which of the following is true of strategies for engineering quality software?
The first release of any software rarely meets all its users' expectations.
Which of the following is a true statement about the number of declared undergraduate computer science majors based on data from the National Center for Education Statistics?
There are some 130,000 new computer and information science graduates each year.
Which of the following statements is true about licensing of IT workers?
There is no single administrative body to accredit professional education programs for IT.
Which of the following is a true statement about the number of declared undergraduate computer science majors at doctoral-granting computer science departments?
There was a 50% decline in degrees awarded between 2004 and 2009.
Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur which of the following?
Training Costs
What type of programming is commonly found in airplane and spacecraft control systems?
Triple version programming
___ is common in airplane and spacecraft control systems.
Triple version programming
(T/F) A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system.
True
(T/F) A computerized provider order entry (CPOE) system enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.
True
(T/F) A failure mode describes how a product or process could fail to perform the desired functions described by the customer.
True
(T/F) A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.
True
(T/F) A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.
True
(T/F) A successful defense against a product liability case is typically expensive in terms of legal fees.
True
(T/F) An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers.
True
(T/F) Capability Maturity Model Integration (CMMI) is a process improvement approach that defines theessential elements of effective processes.
True
(T/F) Cell phones come in a wide range of capabilities and costs.
True
(T/F) Clinical decision support (CDS) is a process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery.
True
(T/F) Coca-Cola has been able to create a highly popular Facebook fan page to promote its image and brands.
True
(T/F) Companies can use the Statement on Standards for Attestation Engagements (SSAE) No. 16, to ensure that company data is protected in an outsourcing arrangement.
True
(T/F) Computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans.
True
(T/F) Copyright laws protect authored works such as art, books, and film.
True
(T/F) Different types of social media are blogs, discussion forums, media-sharing networks, wikis, social bookmarking tools, social messaging apps, and social networking, news, and shopping platforms.
True
(T/F) Foreign professionals can convert their H-1B visas into permanent green cards.
True
(T/F) If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press.
True
(T/F) Machine learning has contributed to the development of a much more in-depth understanding of the human genome as well as practical speech recognition, improved Web search results, and self-driving cars.
True
(T/F) More advanced artificial-intelligence-based clinical decision support systems can help doctors choose the proper dosage levels of medication based on a patient's most recent tests results.
True
(T/F) Risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well.
True
(T/F) Risk is the potential of gaining or losing something of value.
True
(T/F) Since businesses implemented automated payroll systems, fewer accounting employees are needed.
True
(T/F) Social media platforms also enable a degree of self-image manipulation.
True
(T/F) Software quality is the degree to which a software product meets the needs of its users.
True
(T/F) Software suppliers attempt to limit their liability by specifying that although software is warranted to run on a given machine configuration, no assurance is given as to what that software will do.
True
(T/F) The European Union's Restriction of Hazardous Substances Directive restricts the use of many hazardous materials in computer manufacturing.
True
(T/F) The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement.
True
(T/F) The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members.
True
(T/F) The goal of the Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act is to provide law enforcement and citizens with the location of all sex offenders in the community.
True
(T/F) The main body of law that governs patents is contained in Title 35 of the U.S. Code.
True
(T/F) The standard of living varies greatly among groups within a country as well as from nation to nation.
True
(T/F) There is no federal product liability law.
True
(T/F) Twitter enables an organization to share short text updates, images, links, polls, and videos.
True
(T/F) Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury.
True
(T/F) User acceptance testing is performed by trained end users to ensure that the system operates as they expect.
True
The company with the highest 2010 rating by Greenpeace based on its policies on toxic chemicals, recycling, and climate change was
WIPRO
The _____ lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime.
Vizcaino v. Microsoft
A patent is a grant of a property right issued by which entity?
USPTO
Which act was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law?
Uniform Trade Secrets Act (UTSA)
The goal of the standards set by the Foreign Corrupt Practices Act (FCPA) is to prevent companies from:
Using slush funds or other means to disguise payments to officials.
Which of the following is an approach to social media marketing that encourages individuals to pass along a marketing message to others, thus creating the potential for exponential growth in the message's exposure and influence?
Viral Marketing
Which of the following terms is used to describe an effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by an individual or organization?
Whistle-Blowing
__ treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.
White-box testing
Microsoft's third major variation of its operating system is _____.
Windows NT
third major variation of its operating system is
Windows NT
The company with the highest 2010 rating by Greenpeace based on its policies on toxic chemicals, recycling, and climate change was _____.
Wipro
It is difficult to quantify how much the use of IT has contributed to worker productivity because:
`many other factors influence worker productivity rates besides IT
Before a company can apply for an H-1B visa worker, it must file ___
a Labor Condition Application
Before a company can apply for an H-1B visa worker, it must file _____.
a Labor Condition Application
A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called _____.
a coemployment relationship
United States Patent and Trademark Office (USPTO)
a federal agency responsible for assigning rights for limited times to individuals or companies to use innovations
Which of the following is NOT one of the three major components of machine learning systems?
a function
An electronic health record includes _____.
a patient's immunization records
An electronic medical record includes which of the following?
a patient's immunization records
There are essentially no technical-support challenges to overcome when using a(n) _____.
cell phone
inappropriate material posted online include nonconsensual post that comprise intimate photos or videos of people without their permission is known as which of the following
a revenge porn
TO avoid legal issue and set clear guidelines and expectations for employees, employer should put which of the following in place
a social media policy
What are the classes of items that the US Supreme Court ruled that could not be patented?
abstract ideas, laws of nature, and natural phenomena
The _____ enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts.
acpa
Which of the following activities is least suited for automation?
activities associated with managing others
. An employee who identifies an illegal or unethical practice should begin to compile ___ to establish wrongdoing.
adequate documentation
an advantage of social network advertising over traditional advertising media is
ads can be targeted to reach people with the desired demographic characteristics
Despite the importance of _____ in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights.
anonymity
Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers?
artificial intelligence
Which of the following systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that simulate human intelligence processes?
artificial intelligence systems
Which of the following systems includes the people, procedures, hardware, software, data, and knowledge needed to develop compute systems and machines that simulate human intelligence processes?
artificial intelligence systems
The EICC has developed a(n) _____ for member organizations in which areas of improvement are assessed by certified, third-party firms.
audit program
Because wages in the IT field vary greatly, unethical companies can get around the ___
average salary requirement
Because wages in the IT field vary greatly, unethical companies can get around the _____.
average salary requirement
Someone keeps sending you instant messages after you have asked them to stop.
cyberharassment
An advantage of teleworking is that _____.
business operations can be continued even in the event of disaster
The National Center for Victims of Crime advises victims to:send the stalker a written notice that their contact is unwanted and that further contact should ____
cease
social networking platform
can be used for business purposes
a social networking
can be used for nonbusiness purpose
A process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge to improve healthcare delivery is known as which of the following?
clinical decision support
Compared to personal computers, cell phones _____.
come with an extended battery life
Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following?
competitive intelligence
What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?
computerized provider order entry (CPOE) system
One of the fundamental ways in which companies can try directly to increase productivity is by _____.
consolidating operations to better leverage economies of scale
One of the fundamental ways in which companies can try directly to increase productivity is by:
consolidating operations to better leverage economies of scale
Which of these statements about contingent workers is true? They have neither an explicit nor an implicit contract for ___.
continuing employment
Telework allows for the _____ in the event of a local or national disaster and supports national pandemic-preparedness planning.
continuity of business operations
IT investments may not produce tangible results such as:
cost savings
IT investments may produce tangible results such as:
cost savings
Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim?
cyberstalking
A type of business system is the , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio.
decision support system
A type of business system is the _____, which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio.
decision support system
A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following?
decision support system
Which of the following can read the machine language of a software program and produce the source code?
decompiler
most social networking web sites have terms of use agreement that states the web site has the rights to
delete material that violates the site's polices
Most social networking Web sites have terms of use agreement that states the Web site has the right to:
delete material that violates the site's policy
Products, such as statements of requirements, flowcharts, and user documentation, are known as ___
deliverables
An example of robotics can be found in which of the following examples?
device used to move heavy pallets
The _____ is a term used to describe the gulf between those who do and those who don't have access to modern information and communications technology.
digital divide
employers can legally reject a job applicant based on the contents of the individual's social networking profile
discrimination
One approach to quality assurance is to test the code for a completed unit of software by actually entering test data and comparing the results with the expected results in a process known as which of the following?
dynamic testing
what steps does Facebook plan to take in order to identify and prevent the posting of inappropriate images in Facebook messengers
employ aritifical intelligence and dimage recognition
What steps does Facebook plan to take in order to identify and prevent the posting of inappropriate images in Facebook, Messenger, and Instagram?
employ artificial intelligence and image recognition
In which of the following practices does a business transfer all or part of its workforce to another firm, which handles all human-resource-related activities and costs?
employee leasing
Offshore outsourcing is a form of outsourcing in which the services are provided by an organization whose _____.
employees are in a foreign country
The courts have ruled in favor of using reverse engineering to:
enable interoperability
Electronic Product Environmental Assessment Tool (EPEAT) is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 _____ criteria.
environmental
The EICC has established a code of conduct that defines performance, compliance, auditing, and reporting guidelines across five areas of social responsibility: labor, health and safety, environment, management system, and _____.
ethics
(T/F) A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
fALSE
(T/F) Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.
fALSE
(T/F) In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.
fALSE
(T/F) In the context of maturity level distribution across a large sample of organizations, the percentage of organizations at the initial maturity level is 36.
fALSE
(T/F) Informal, spontaneous meetings become easier to handle with telework.
fALSE
(T/F) Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.
fALSE
(T/F) Productivity in a factory is measured by the annual revenue an employee generates divided by the employee's annual salary.
fALSE
(T/F) The Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.
fALSE
(T/F) When developing safety-critical systems, a key assumption must be that safety will automatically result fromfollowing an organization's standard development methodology.
fALSE
(T/F) The information in the EHR is not easily shared with others outside of the healthcare organization where the data originated.
fa;se
which of the following is currently the most popular social network destination worldwide
(T/F) A patient who doesn't have to pay for a medical test or procedure is probably more likely to consider its cost-to-benefit ratio.
false
(T/F) After a worker's H-1B visa expires, the foreign worker must remain outside the United States for six years before another H-1B will be approved.
false
(T/F) Am employer can legally screen applicants based on race or ethnicity.
false
(T/F) Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding non-compete clauses to employment contracts.
false
(T/F) Companies are prohibited from exporting quantities of used electronics to companies in underdeveloped countries.
false
(T/F) Contingent work is a job situation in which an individual has an implicit contract for long-term employment.
false
(T/F) If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach.
false
(T/F) In hospital-related settings, implementing CPOE is associated with a 10 percent decline in preventable adverse drug effects.
false
(T/F) It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms.
false
(T/F) Medical information Web sites are intended to be substitutes for professional medical advice.
false
(T/F) Organic media marketing involves the use of social networks to communicate and promote the benefits of products and services.
false
(T/F) Patient involvement with remote doctors may have a positive effect on the local doctors' relationships with their patients.
false
(T/F) Quotation marks, which can be used to quickly spread a company's message, allow a company's tweets to be seen not only by its followers but also by those who are interested in the topic being tweeted about.
false
(T/F) Reverse engineering can only be applied to computer hardware, not computer software.
false
(T/F) The United States has several federal laws prohibiting the export of toxic waste.
false
(T/F) The cost of the necessary equipment and communication services for telework is usually negligible.
false
(T/F) The deciding factor in whether workers are considered contractors is the agreement signed by the workers, not the degree of control the company exercises over them.
false
(T/F) The goal of viral marketing is to spread rumors and innuendo about a rival's product that will hurt its image.
false
(T/F) Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
false
As a result of the lack of consistent quality in software, many organizations avoid buying the___ release of a major software product.
first
It can take _____ for IT investment to result in a significant increase in productivity.
five to seven years
Researchers have found that it can take how long for IT investment to result in a significant increase in productivity?
five to seven years
organizations can use which of the following to capture interviews with customers
google hangout on AIR
After a six-year H-1B visa expires, a foreign professional can convert their H-1B visa into which of the following?
green card
The safety engineer uses a logging and monitoring system to track which of the following?
hAZARds
Successful outsourcing projects require day-to-day interaction between software development and business teams, so it is essential for the hiring company to take a(n) _____ approach to project management.
hands-on
The safety engineer uses a logging and monitoring system to track from a project's start to its finish.
hazards
Which process can reduce expensive redundant tests that are ordered because one provider does not have access to the clinical information stored at another provider's location?
health information exchange
A complex system used in IT is a redundant array of independent disk (RAID), which is commonly used in which type of file servers?
high-volume data storage
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers?
high-volume data storage
Remote monitoring is also known as which of the following?
home monitoring
In the context of Capability Maturity Model of Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?
iNITIAL
Claim rights or positive rights
impose an obligation on some people to provide certain things for others
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the _____ maturity level.
initial
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in the ____ maturity level.
initial3
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?
initials
After successful unit testing, the subsystems are combined to test the entire system as a complete entity using ___
integration testing
After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?
integration testing
Poor ___ design between systems and humans can greatly increase risk, sometimes with tragic consequences.
interface
Patent law protects which of the following?
inventions
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of
invisible information gathering
Which of the following limits deceptive commercial email and outlines spammers' responsibilities:
the CAN-SPAM Act
If a business follows an "opt-in" policy for handling personal data, information about a customer
may not be released unless the customer gives permission
A disadvantage of using contingent workers is that they _____.
may pass on information about corporate processes and strategies to subsequent clients who could be competitors
Laypeople can access reliable and objective information on a wide range of medical topics on _____.
medical information Web sites
The contents of _____ are for informational purposes only and not intended to be substitutes for professional medical advice, diagnosis, or treatment.
medical information Web sites
The primary areas where IT has been applied include all of the following except:
medical language processing
Which aspect of artificial intelligence involves technology that allows computers to understand, analyze, manipulate, and/or generate English?
natural language processing
If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us.
negative
Patient involvement with remote doctors may have a _____ effect on the local doctors' relationships with their patients and could adversely affect patient care.
negative
The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following?
open source license
Firefox and OpenOffice are all examples of which of the following?
open source software
An airline's online ticket reservation system and an electronic funds transfer system that moves money among banks, are examples of __
order-processing systems
An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following?
order-processing systems
Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts?
organic media marketing
What is another name for a tethered PHR?
patient portal
Any defect in ___ software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees.
process-control
Any defect in _____ software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees
process-control
The use of software introduces ___ that concern many executives.
product liability issues
The use of software introduces _____ that concern many executives.
product liability issues
A _____ states the principles and core values that are essential to the work of a particular occupational group.
professional code of ethics
Professionals' liability for injuries caused by their negligence is referred to as _____.
professional malpractice
One common use of wireless technology in the healthcare field is to _____.
provide a means to access and update EHRs
Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect which of the following?
quality
The ___ of software, its usability, and its timely development are critical to almost everything businesses do.
quality
How often does The Bureau of Labor Statistics track U.S. productivity?
quarterly
The _____ of the False Claims Act allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.
qui tam provision
What is the name of the project at the Georgia Institute of Technology that uses stores to teach human values to robots?
quixote
The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?
raising brand awareness
A key element of safety-critical systems is ___, the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
redundancy
Cybersquatters:
register domain names for famous trademarks or company names to which they have no connection
After a worker's H-1B visa expires, the foreigner must _____.
remain outside the United States for one year before another H-1B petition will be approved
a major of social shopping platforms generate revenue through which of the following
retailer advertising
One frequent use of _____ for software is to modify an application that ran on one vendor's database so that it can run on another's.
reverse engineering
After an organization determines all pertinent ___ to a system, it must decide its acceptable level.
risks
After an organization determines all pertinent _____ to a system, it must decide its acceptable level.
risks
Which of the following was a legislator and former singer and entertainer who co-sponsored the Copyright Term Extension Act?
sONNY bono
A(n) __ is one whose failure may cause human injury or death.
safety-critical system
A(n) _____ is one whose failure may cause human injury or death.
safety-critical system
The Health Information Technology for Economic and Clinical Health Act is intended to increase the use of health information technology by _____.
saving the government $10 billion through improvements in the quality of care, care coordination,reductions in medical errors, and duplicate care
which social meidia platform provides filters that alter the user's face by smoothing and whitening skin m changing eye shape nose size
snapchat
which of the following typically involves the use of social network to communicate and promote the benefits of .....
social media marketing
To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in place?
social media policy
A(n) ___ is any error that, if not removed, could cause a software system to fail to meet its users' needs.
software defect
A(n) _____ is any error that, if not removed, could cause a software system to fail to meet its users' needs.
software defect
A ____ is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software.
software development methodology
Which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software?
software development methodology
Which of the following claims as its invention some feature of process embodied in instructions executed by a computer?
software patent
Which of the following claims as its invention some feature or process embodied in instructions executed by a computer?
software patent
Which of the following is an example of cyberharassment?
someone keeps sending you instant messages after you have asked them to stop
Offshore outsourcing has the potential to dramatically _____ development efforts and enable workers to make progress on the project around the clock.
speed up
(T/F) In Olmsted v. United States (1928), the US Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.
t
(T/F) US v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
t
_____ is a work arrangement in which an employee works away from the office.
tELEWORK
Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded?
tHREE
(T/F) A disadvantage of teleworking is that the contributions of teleworkers may not be fully recognized and credited.
tRUE
(T/F) Copyright law protects authored works such as art, books, and film.
tRUE
(T/F) Defining and controlling the appropriate level of access to intellectual property are complex tasks.
tRUE
(T/F) Doctors were among the first large groups to start using personal digital assistants (PDAs) on the job.
tRUE
(T/F) Employers can legally reject a job applicant based on the individual's social media activity if the company is not violating federal or state discrimination laws.
tRUE
(T/F) It is difficult to quantify how much the use of IT has contributed to worker productivity due to the fact that many other factors influence worker productivity.
tRUE
(T/F) Software, video games, multimedia works, and Web pages can all be copyrighted.
tRUE
(T/F) The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and implements two 1996 WIPO treaties.
tRUE
(T/F) Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights.
tRUE
(T/F) Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury.
tRue
A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its ____ needs.
technical staffing
The Communication Assistance for Law Enforcement Act (CALEA) said that
telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)
The False Claims Act was enacted during _____.
the U.S. Civil War
The False Claims Act was enacted during which war?
the U.S. Civil War
Copyright and patent protection was established through which of the following?
the U.S. Constitution
The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____
the degree of control the company exercises over the employees
The key lesson from Vizcaino v. Microsoft is that even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor about whether or not they are viewed as employees is not the agreement but _____.
the degree of control the company exercises over the employees
The legal guidelines for determining whether material is obscene include all of the following EXCEPT
the material is intended for or distributed to persons under the age of 18
Software quality is defined as the degree to which a software product meets:
the needs of its users.
When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may require help with _____.
their English
One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is:
there is no need to file an application or disclose a trade secret to gain protection
One potential disadvantage of using contingent workers is that _____.
they may not feel a strong connection to the company for which they are working
How many classes of items did the U.S. Supreme Court rule could not be patented?
three
Violators of the False Claims Act are liable for _____ times the dollar amount for which the government was defrauded.
three
Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's?
trademark
Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____.
training costs
Which of the following examples is a use of wireless technology in the healthcare field?
transmit ECG data to a physician's smartphone
(T/F) A computerized provider order entry (CPOE) system enables physicians to place orders for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.
true
(T/F) A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.
true
(T/F) A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.
true
(T/F) A key requirement for using H-1B workers is that employers must pay H-1B workers the prevailing wage for the work being performed.
true
(T/F) A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on how helpful the person was to the success of the case.
true
(T/F) According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-granting computer science departments has declined dramatically from 2004 to 2009.
true
(T/F) Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S. tech job openings per year.
true
(T/F) Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes.
true
(T/F) Cyberharassment is a form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress.
true
(T/F) Cyberstalking can escalate into physical stalking and even physical assault.
true
(T/F) Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission; such posts are often referred to as "revenge porn."
true
(T/F) More advanced artificial-intelligence-based clinical decision support systems can doctors choose the proper dosage levels of medication based on a patient's most recent tests results.
true
(T/F) Online tools offered by medical insurers enable patients to compare the quality, safety, and cost information on hospitals nationwide.
true
(T/F) Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. T 25. A co
true
(T/F) Remote monitoring involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider.
true
(T/F) Some 18 percent of private employers surveyed say they have dismissed employees because of something they posted on social media.
true
(T/F) Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation.
true
(T/F) Telework increases the potential for lost or stolen equipment.
true
(T/F) The EICC was established to promote a common code of conduct for the electronics and ICT industry.
true
(T/F) The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement.
true
(T/F) The development and use of new medical technology, such as new diagnostic procedures and treatments, also contributes to the increase in healthcare spending per person.
true
(T/F) There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions.
true
(T/F) To be classified as a truly green PC, the PC must meet other criteria than simply use less electricity to run than the standard computer.
true
(T/F) Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers
true
(T/F) Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.
true
(t/f) Programs with open source code can be adapted to meet new needs, and bugs can be rapidly identified and fixed.
true
Global market research company JD power claims that how many consumers have use a campanny's social media channel for customer service
two third
Global market research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?
two-thirds
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in ___ for file servers.
used in IT is a redundant array of independent disks (RAID), which is commonly used in ___ for file servers. high-volume data storage
Live telemedicine usually involves a _____ to establish connection between a patient and healthcare providers at different sites.
videoconference link
In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following?
warranties
Software suppliers frequently write _____ to attempt to limit their liability in the event of nonperformance.
warranties
Software suppliers frequently write to attempt to limit their liability in the event of nonperformance.
warranties
A(n) __assures buyers or lessees that a product meets certain standards of quality.
warranty
The False Claims Act provides strong _____ protection.
whistle blower
An H-1B visa is a temporary visa granted for people who _____.
work in specialty occupations that require at least a four-year bachelor's degree