ICT170
The relationship between laws and ethics is: Select one: a. Not necessarily absolute; unethical actions are not always unlawful b. Absolute; laws explain how professionals should act ethically c. Not necessarily absolute: lawful actions are always ethical d. Absolute: if you follow the law, you will always be OK ethically
a. Not necessarily absolute; unethical actions are not always unlawful
The recycling of the waste chaff from a biscuit factory into garden mulch by another organisation is an example of: Select one: a. Perturbation b. Symbiosis c. Interdependent webs d. Niche
a. Perturbation
TPS are used to: Select one: a. Process daily business transactions b. Provide an integrated environment to allow organisations to function effectively c. Provide routine information to managers d. Help managers do the right thing
a. Process daily business transactions
Which of the following is NOT a reason for outsourcing? Select one: a. Security concerns b. Lack of suitably qualified staff c. Expense of maintaining systems in-house d. Preference to concentrate on core business
a. Security concerns
Which of the following is not considered to be an example of a closed system? Select one: a. The Murdoch University system b. The coolant in a car engine c. The blood circulating in your body. d. The Earth's water cycle
a. The Murdoch University system
Which of the following is a way to classify systems? Select one: a. permanent-temporary b. simple-dynamic c. input-output d. open-adaptive
a. permanent-temporary
____ systems typically provide standard reports generated with data and information from the ____ system. Select one: a. MIS, DSS b. TPS, ERP c. MIS, TPS d. TPS, MIS
c. MIS, TPS
A code of ethics is... Select one: a. A way of ensuring that people join professional societies b. A collection of principles to guide ethical decision making c. A collection of laws that constrain how professionals make decisions d. How people exercise their rights as members of society
b. A collection of principles to guide ethical decision making
The Rights Approach to ethics suggests that an ethical action is one that: Select one: a. Provides the most good or does the least harm b. Best protects and respects the moral rights of the affected parties c. Treats all humans fairly d. Shows respect and compassion for others
b. Best protects and respects the moral rights of the affected parties
In terms of systems theory, anything that leaves a system is a/an: Select one: a. Transformation b. Output c. Result d. Waste of time
b. Output
Which of the following is NOT a value included in the ACS Code of Ethics? Select one: a. The Primacy of the Public Interest b. Protection of Personal Data c. The Enhancement of Quality of Life d. Professional Development
b. Protection of Personal Data
Data about students collected by the university should include: Select one: a. Membership of political organisations b. That which is required for the university to perform its statutory and related functions c. That which is required to identify students that might be at risk of infectious diseases d. Any relevant criminal record
b. That which is required for the university to perform its statutory and related functions
A virtuous circle is: Select one: a. a causal loop diagram b. a pattern of behaviour that reinforces itself leading to desirable consequences c. a pattern of behaviour that reinforces itself leading to undesirable consequences d. a coven of white witches
b. a pattern of behaviour that reinforces itself leading to desirable consequences
The main difference between tightly and loosely coupled systems is: Select one: a. how directly the input of one system is used as output for the other b. how directly the output of one system is used as input for the other c. whether or not they are both subsystems of the same system d. none of the above.
b. how directly the output of one system is used as input for the other
Which of the following is NOT a characteristics of valuable information? Select one: a. Accuracy b. Completeness c. Attractiveness d. Relevance
c. Attractiveness
Homeostasis refers to: Select one: a. A system maintaining itself through a feedback mechanism b. The way in which the human body regulates its steady state c. Both of the above d. Neither of the above
c. Both of the above
An information system is a set of elements that interact to accomplish goals and have inputs, processing mechanisms, output and ___________ Select one: a. Information b. Forecasting c. Feedback d. Computers
c. Feedback
Buying a cinema ticket on a mobile phone is an example of what? Select one: a. Decision-making b. B2B e-commerce c. M-commerce d. C2C e-commerce
c. M-commerce
In a thermostat, more heat causes more room temperature, that causes the thermostat to heat up too, which at a certain point acts to reduce the heat and therefore room temperature. This is an example of: Select one: a. Good environmental management b. Positive feedback c. Negative feedback d. An internally balanced thermometer
c. Negative feedback
Which of the following is a purpose of positive feedback in a system: Select one: a. Keep the room at the same temperature b. Make it easier for you to swim longer distances c. Reinforce the system's behaviour d. Inhibit the system's behaviour
c. Reinforce the system's behaviour
Whilst privacy is seen to be the right to be left alone and to be free of unreasonable personal intrusions, various court decisions in many countries have determined that: Select one: a. The right to privacy is absolute and cannot be violated, regardless of the needs of society. b. The right to privacy is a myth and does not exit. c. The right to privacy is not absolute and must be balanced against the needs of society. d. The right to privacy is not absolute unless it can be demonstrated that society will be harmed by violating that right.
c. The right to privacy is not absolute and must be balanced against the needs of society.
In a car, when the output of the accelerator is directly linked to the input of the tachometer, this is an example of: Select one: a. A negative feedback loop b. A positive feedback loop c. Tightly coupled systems d. Loosely coupled systems
c. Tightly coupled systems
A vicious circle is: Select one: a. a causal loop diagram b. a pattern of behaviour that reinforces itself leading to desirable consequences c. a pattern of behaviour that reinforces itself leading to undesirable consequences d. a coven of black witches
c. a pattern of behaviour that reinforces itself leading to undesirable consequences
A new set of ethical issues in IT have arisen in recent times because: Select one: a. Organisations can store increasing amounts of data about individuals b. Increasing processing power means that organisations are more easily able to integrate and mine data about customers c. IT Professionals are bored d. A & B above
d. A & B above
SFIA is... Select one: a. Owned by the Australian Computer Society b. A city in Bulgaria. c. A framework that explains how to get an ICT job. d. A framework that assists in the description and management of competencies for ICT professionals in the 21st century to match the skills of the workforce to the needs of the organisation
d. A framework that assists in the description and management of competencies for ICT professionals in the 21st century to match the skills of the workforce to the needs of the organisation
What type of system is best used when the problem is complex and the information needed to make the best decision is difficult to obtain? Select one: a. TPS b. MIS c. DSS d. AI
d. AI
Time, energy, skill, and knowledge are considered to be ____ to a system. Select one: a. Feedback mechanisms b. Processing mechanisms c. Outputs d. Inputs
d. Inputs
The Utilitarian Approach to ethics suggests the following about an ethical action: Select one: a. It protects and respects the moral rights of the affected parties b. It treats all humans equally c. It demonstrates respect and compassion for others d. It provides the most good, or does the least harm
d. It provides the most good, or does the least harm
Data confidentiality is an important aspect of any data privacy policy. Security procedures to assist with confidentiality will NOT include which of the following: Select one: a. Locking the door to the server room b. Having a strong password policy c. Educating the workforce of the organisation about the need for security of data d. Making sure that sensitive data collected on individuals is verified prior to entry into the database
d. Making sure that sensitive data collected on individuals is verified prior to entry into the database
Which of the following is not a major element of artificial intelligence? Select one: a. Robotics b. Learning systems c. Expert systems d. Transaction processing systems
d. Transaction processing systems