IS Exam #2-Ch 4-6

Ace your homework & exams now with Quizwiz!

Which operating system does the iPad use?

iOS

If you want to collect data (i.e., photos) from someone and use the data, you must obtain ________.

informed consent

A photo you have taken of your family is considered __________________ and is protected by law.

intellectual property

The use and regulation of trade secrets, copyrights, and patents is the U.S. government's attempt to protect ________.

intellectual property

A computer _________________ causes the most repetitive stress injuries.

keyboard

A __________is a large-capacity, high-performance computer that can process large amounts of data very rapidly.

mainframe

The most common use of nonrelational database management systems is for__________________.

managing extremely large data sets

Software applications that are based on combining different online software applications are called:

mashups

Compared to in-house hosting, cloud-based hosting ____________________

minimizes the risk of investing in technology that will soon become obsolete.

Racking your movements without consent is most related to the trend,

mobile device growth impact

When thinking about downloading and using a photo off the Internet, don't forget the ethical ____________rule.

no free lunch

In cloud computing, resources are said to be "pooled" because

organizations share the same physical hardware through virtualization.

Professional organizations like the American Medical Association have _____________________, which includes specific conduct guidelines such as, do no harm.

professional codes of conduct

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of _______________________________

property rights and obligations

Disney is using a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a guest's room key, park ticket, and eventually a vacation-planning system to make the experience more efficient with reduced wait times.

radio-frequency identification (RFID)

In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________.

record

In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________.

record

Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless they already exist in the TEACHER table.

referential

If you accept a position as an information systems manager, you have a(n) ____________ to accept the costs, benefits, and obligations for the decisions you make.

responsibility

A formal name to describe self-regulating policies is called _____________.

safe harbor

A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines.

safe harbor

The Windows operating system is an example of _____________

system software

The ethical principle that calls ranking alternatives before making a decision is called the

utilitarian principle.

Developing effective apps is considered a critical element to successful adoption of:

wearable computing.

The Apple watch is a new type of mobile digital computing called:

wearable computing.

Another common name for a web beacon is a __________which tracks user activities.

web bug

A server dedicated to managing HTML pages is called a(n

web server.

Copyright is protected throughout the life of the author plus an additional _____ years after the author's death.

70

_____________ involves determining who is responsible for actions taken.

Accountability

Among the five identified moral dimensions of the information age, which addresses the question of liability related to information systems?

Accountability and control

Which of the following is FALSE about techno stress?

Affected people start to behave like computers, devoid of emotions.

Which of the following statements is FALSE about business intelligence (BI) systems?

BI systems are used by any business professionals and knowledge workers.

Among the following statements, which one is NOT applicable to big data?

Big data can be processed with traditional techniques.

A ________ in a database represents a single character such as a letter or number.

Byte

Which of the following is NOT a function of a data warehouse?

Catalog data

What affects approximately 90% of persons who spend 3 or more hours a day at a computer?

Computer Vision Syndrome (CVS)

Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?

DMV

What technology trend raises ethical issues related to the limitless data that can be collected about you?

Data storage costs rapidly decline

Which of the following refers to the capability of a computer, product, or system to add additional features?

EXPANDABILITY

Surprisingly, laws guiding American privacy law are based on a 1973 report called the _____________.

FIP

United States privacy laws are largely based on the ______________________ report

Fair Information Practices

What is the understanding that most American and European privacy law is based on?

Fair Information Practices (FIP)

The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the

Golden Rule

Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.

Google

Which government act was enacted in 1996 to protect your medical records?

HIPAA

____________is an upgrade to traditional HTML because it allows the addition of multimedia features (i.e., video) without cumbersome add-ons.

HTML5

Which of the following statements is NOT a characteristic of Hadoop?

Hadoop extracts data from multiple tables that have a relationship.

What are the components for IT infrastructure?

Hardware, software, data management technology, Networking & telecommunications technology, and technology services

Hitachi's new wearable device that can track office temperature, interactions, and even movements around the office is called the:

Hitachi Business Microscope (HBM).

What is the first step you should take in managing data for a firm?

Identify the data needed to run the business.

Which is the BEST description of intellectual property?

Intangible property created by individuals or corporations

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information systems?

It is an equalizer for social classes and minorities.

Which of the following is FALSE about the digital divide in the U.S

It is based only on having fair access to digital technology.

Which of the following is FALSE about the U.S. CAN-SPAM Act of 2003?

It outlaws unsolicited commercial messaging.

_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.

Liability

________________involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

Liability

Which of the following is an example of a popular open source operating system?

Linux.

The data _______________ language would allow you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands).

Manipulation

Which is NOT a way in which NORA technology can create a detailed dossier of a person?

Medical records

If you needed a DBMS for large commercial use on a mainframe, _____________ would be a viable option.

Microsoft SQL Server

Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the government?

NORA

Relational tables need to be ______________ to help avoid duplicate data.

Normalized

Which tool enables users to view the same data in different ways using multiple dimensions?

OLAP

Where is a cookie that is created during a Web site visit stored?

On the visitor's computer

Which type of software is created and updated by a worldwide community of programmers and is available for free?

Open source

Major products including Bluemix and Salesforce.com's Force.com are considered a:

Platform as a Service (PaaS).

A(n) __________ key uniquely identifies a row or record in a table.

Primary

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?

Privacy Act of 1974

Which of the following is NOT a rule in an organization's information policy?

Procedures and accountabilities around managing data resources

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on individuals?

Profiling

Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?"

Quality of life

______________ databases are by far the most popular type of database on the market today.

Relational

The most popular data manipulation language and method to "question" a database is called ______________.

Structured Query Language

Among the following, what is the best way to distinguish between reporting tools and data mining tools?

The complexity of techniques used

Which Ethical rule below is combined with its proper description?

The utilitarian principle; assumes values are prioritized in an order and the consequences of various courses of action are understood

Which is TRUE of a multi-tiered network?

The work of the entire network is balanced over several levels of servers.

Why are legacy systems still used?

They are too expensive to redesign.

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

Total cost of ownership (TCO)

Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying?

Utilitarian principle

Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of

VIRTUALIZATION

The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

____________ uniquely allows for presentation, communication, and storage of data. It is often used to transfer data from one organization to another.

XML

The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly to:

advances in data analysis.

in a student database, a column called LastName would be an example of a(n) _____________.

attribute

A ________ is represented by a 0 or 1. Eight together make a byte (i.e., 00101100).

bit

Microsoft Azure SQL is an example of a _________________ database

cloud

An unethical, but not illegal act committed using a computer is called _____________.

computer abuse

Putting a key logger on your boss's computer without permission would be considered a(n) ___________.

computer crime

If you return to a website that welcomes you back by name, you likely have small text file on your computer with information about your prior visits called a ___________.

cookie

A store printing out receipts based on your buying patterns is related to the trend, ___________, where technology trends raise ethical issues

data analysis advances

A location specified to include IT infrastructure such as storage, security, and system backup is called a:

data center.

Software such as Sequel Server 2014 which is used to manage business data (i.e., inventory) is an example of _______________ software.

data management

Which of the following involves searching for patterns and relationships among data?

data mining

The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design andmaintenance, is called ________.

database administration

In the U.S., while there are many people that have access to technology and information, there are many that do not. This creates a ______ that leads to unequal opportunities

digital divide

A common approach of networking multiple computers as opposed to a single computer is called:

distributed processing

If someone at your work accuses you of sending inappropriate emails, you should be afforded _______

due process

A(n) __________ is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database

entity relationship diagram

Principles of right and wrong that you use to make choices are called

ethics

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called ________.

grid computing


Related study sets

Chapter 5 - Creating Effective Business Messages

View Set

Cardiac Action Potentials & Conduction (Lecture 10, Exam 2-Lecture 2)

View Set

Загальноприродничі та екологічні закони (питання №8)

View Set

Combo with "NBME 11 Notes" and 9 others

View Set

Agile Software Development - Scrum

View Set