ITE302 - MULTIPLE CHOICES

Ace your homework & exams now with Quizwiz!

40. It is estimated that about one in ____ personal computers in the United States is part of a botnet. a. two b. four c. six d. eight

B

40. Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for "one-click shopping," based on the use of a shopping cart purchase system for electronic commerce. a. eBay b. Amazon.com c. Dell d. Microsoft

B

43. The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____. a. under $100,000 b. made through a third party c. lawful under the laws of the foreign country in which it was paid d. disguised as a gift

C

43. The Department of Justice established sentencing guidelines that suggest more ____ treatment for convicted executives if their companies have ethics programs. a. stringent b. intense c. lenient d. fair

C

50. _____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country. a. Consulting b. Employee leasing c. Offshore outsourcing d. H-1B

C

51. A 2006 Institute of Medicine report concluded that more than _____ preventable medication errors per year cost the United States about $3.5 billion annually. a. .5 million b. 1.0 million c. 1.5 million d. 2.0 million

C

51. A device that limits access to the company's network based on the organization's Internet usage policy is called a(n) ____. a. router b. gateway c. firewall d. intrusion detection device

C

51. _____ is a country known as a leading offshore outsourcing country that is close to the United States, has no language barriers, and has a highly skilled labor pool. a. Mexico b. United Kingdom c. Canada d. Bermuda

C

51. The ____ enables the public to gain access to certain government records. a. Fair Information Practices Act b. USA PATRIOT Act c. Privacy Act d. Freedom of Information Act

D

33. Arthur Andersen, once a major international accounting firm, was indicted for obstruction of justice, lost its auditing license, and eventually closed its U.S. offices based on the actions of a few employees even though they were performing in a manner contrary to corporate policy and their employer's directions. This is an example of the principle called respondeat superior or ____.

"let the master answer."

31. Which of the following is a true statement about the number of declared undergraduate computer science majors at doctoral-granting computer science departments? a. there was a decline in enrollment in spite of the forecast for an increased number of workers in this field b. there was an increase in enrollment in spite of the forecast for a decreased number of workers in this field c. there has been a steady decline in enrollment for over nine years d. the level of enrollment has remained about the same for the past seven years

A

32. The Supreme Court has ruled that ____. a. without a reasonable expectation of privacy, there is no privacy right b. Federal agents can listen to phone conversations of U.S. citizens without a warrant c. recordings by the FBI of various telephone calls made by a U.S. citizen from a public phone booth do not violate an individual's privacy d. the Fourth Amendment is no longer valid

A

32. This organization was forced to notify more than 800,000 borrowers that a software installation error had resulted in a miscalculation of their loans and that their payments would increase. a. Sallie Mae b. Freddie Mac c. AIG d. Bank of America

A

33. A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability. a. exploit b. zero-day attack c. virus d. worm

A

33. Copyright and patent protection was established through ____. a. the U.S. Constitution b. the U.S. Federal Codes and Statutes c. the Bill of Rights d. various state laws

A

33. Today, organizations are trying to improve IT systems and business processes that have already gone through several rounds of improvement. This makes it difficult to measure significant improvements in _____. a. productivity b. cost/ benefit ratios c. gross domestic product d. quality

A

34. Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem. a. patch b. bot c. logic bomb d. Trojan horse

A

35. After a three judge federal panel ruled unanimously that the Communications Decency Act unconstitutionally restricted ____, the government appealed to the Supreme Court in a case that became known as Reno v. ACLU. a. free speech b. the right to bear arms c. protection of personal privacy d. protection of personal property

A

35. ____ had one of the highest software piracy rates in 2007. a. Armenia b. United States c. United Kingdom d. New Zealand

A

36. ____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates. a. Macro b. Logic bomb c. Trojan horse d. Application

A

31. Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the ____ by which a society lives.

virtues

37. It is estimated that the Microsoft Vista operating system ____. a. took over five years to develop b. contains less than 50 million lines of code c. contains fewer than 5,000 bugs d. will be wildly popular with PC users

A

37. Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use. a. Digital Millennium Copyright Act b. TRIPS Act c. WIPO Copyright Act d. PRO-IP Act

A

38. Additional features in a new release of software ____. a. make it more useful and easier to sell b. improve the quality of the release c. allow for more time for testing d. ensure more rigorous quality management

A

38. Another disadvantage of using contingent workers is that _____. a. contingent workers may pass on information about corporate processes and strategies to subsequent clients who could be competitors b. contingent workers may attempt to form a union c. contingent workers can demand payment for health insurance and retirement benefits d. contingent workers avoid the need to hire new employees and then let them go when staffing needs decrease

A

38. _____ is one of the advantages of teleworking for organizations. a. Telework allows for the continuity of business operations in the event of a disaster b. Allowing teleworkers to access organizational data and systems from remote sites creates potential security issues c. Informal, spontaneous meetings become more difficult if not impossible d. Increased planning is required by managers to accommodate and include teleworkers

A

39. Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____. a. the company b. the appropriate local, state, or federal agency c. the local news media d. the nearest federal law enforcement agency

A

40. Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating federal or state _____ laws. a. discrimination b. hiring c. protection d. recruiting

A

41. In 2009, ____ announced that it would donate some 3,000 patents for free use by developers to help them innovate and build new hardware and software. The announcement represented a major shift in this firm's intellectual property strategy and was meant to encourage other patent holders to donate their own intellectual property. a. IBM b. Microsoft c. Oracle d. SAP

A

41. When sued for negligence, a software developer is not held responsible for every product defect that could have been detected that causes customer or third-party loss. Instead, responsibility is limited to ____. a. harmful defects that could have been detected and corrected through "reasonable" software development practices b. the most harmful defects that cause the most serious problems c. those defects uncovered in the first 90 days of product usage d. those defects for which no software upgrades have been released

A

42. Implementing the Children's Internet Protection Act is more difficult for a library than a school because ____. a. the library's services are open to people of all ages b. the library services are typically available to more people than a school c. librarians are not well versed in issues dealing with the access of obscene material d. there are many more books in a library than in a school

A

42. Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____. a. valid test results b. correct system logon ids c. the correct date and time d. sufficent memory for operations

A

44. A University of Chicago study found that the E-Rate program led to _____ in California students' scores in the six subjects covered by the Stanford Achievement Test. a. no change b. a small improvement c. a small decrease d. a large improvement

A

44. Anonymous expression is ____. a. the expression of opinions by people who do not reveal their identity b. the freedom to express an opinion without fear of reprisal c. less important in countries that do not allow free speech d. relatively new and was brought on by the arrival of e-mail and the Internet

A

46. A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law. a. sunset provision b. gag rule c. amendment d. Sunday law

A

46. _____ of the roughly 1.0 billion people around the world who earn less than $1,000 USD per year have access to a computer. a. Nearly 0% b. Less than 2% c. Less than 5% d. Less than 7%

A

47. A pamphlet called ____ was published by Thomas Paine and critiqued the British monarchy and urged the colonies to become independent. a. Common Sense b. The Tattler c. Independence d. On Guard

A

47. Heads of U.S. companies continue to complain that they have trouble finding _____ and have urged the USCIS to loosen the reins on visas for qualified workers. a. enough qualified IT workers b. enough qualified H-1B workers c. enough H-1B workers d. enough trained H-1B workers

A

47. One approach to quality assurance is to test the code of a completed unit of software by actually entering test data and comparing the results to the expected results. This is called ____. a. dynamic testing b. black-box testing c. white-box testing d. static testing

A

48. The courts have ruled in favor of using reverse engineering to enable ____. a. interoperability b. creation of open source code c. to circumvent restrictive trade secrets d. avoid domination of a particular software market by a single manufacturer

A

49. Companies applying for H-1B visas must offer a wage that is not _____ less than the average salary for the occupation. a. 5% b. 10% c. 15% d. 20%

A

49. ____ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement. a. Capability Maturity Model Integration-Dev b. ISO 9000 c. Quality assurance d. FMEA

A

50. For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organization's oversight and consumer resolution process, and pay an annual fee. a. TRUSTe b. Fair Information Practices c. BBBOnLine d. Business Software Alliance

A

51. Even with safety precautions in place, the software associated with safety-critical systems ____. a. is vulnerable to errors that can lead to injury or death b. simply never fails c. exhibits 100% reliability d. exhibits both 100% availability and reliability

A

52. A strong security program begins by ____. a. assessing the threats to an organization's computers and network b. authorizing a large budget to pay for the necessary hardware and software c. hiring a chief security officer d. monitoring the network for potential intrusions

A

52. The ____ Act enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts. a. Anticybersquatting Consumer Protection b. PRO-IP c. Economic Espionage d. CAN-SPAM

A

52. The step of the five-step decision process during which those who will be affected by the decision are identified is the ____ step. a. develop problem statement b. evaluate result c. identify alternatives d. implement decision

A

53. IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____. a. information b. computer passwords c. trade secrets d. copyrighted material

A

53. The _____ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement. a. statement on Auditing Standards No. 70 b. Sarbanes-Oxley c. Foreign Corrupt Practices Act d. CMMI

A

54. The two basic forms of telemedicine are _____. a. store-and-forward and live b. store-and-save and simulate c. capture-and-save and record d. receive-and-send and save

A

55. The United States has _____ federal law(s) protecting the export of toxic waste. a. no b. just one c. two d. several

A

31. One cause for the delay of the Boeing 787 Dreamliner was the ____. a. braking system did not work properly b. inability to trace lines of code back to specific system requirements for the braking system c. decision to use electric brakes instead of conventional, hydraulically actuated brakes d. inability to design the new brake system

B

31. The First Amendment protects American's rights to freedom of religion and ____. a. right to bear arms b. freedom of expression c. personal privacy d. freedom from self-incrimination

B

31. The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some €4.9 billion was ____. a. Robert Richardson b. Jerome Kerviel c. Daniel Boulton d. Nicholas Sarkozy

B

31. The concept of privacy is ____. a. protected by the U.S. constitution b. protected by a number of amendments in the Bill of Rights c. protected by only the Fourth Amendment d. protected only by Federal statutes implemented in the late 19th century

B

31. The most widely used measurement of the material standard of living is _____. a. number of personal computers per 1,000 population b. gross domestic product per capita c. average number of calories consumed per person per day d. average life expectancy

B

32. In the United States, labor productivity growth has averaged about _____ percent per year for the past century. a. 1% b. 2% c. 3% d. 4%

B

32. Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional. a. workman's compensation b. malpractice c. negligence d. unemployment insurance

B

33. The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained. a. Gramm-Leach-Bliley Act b. Fair Credit Reporting Act c. HIPAA d. Electronic Communications Privacy Act

B

33. The objective of quality management is to ____. a. eliminate mistakes b. deliver high-quality systems that meet the needs of their users c. produce software deliverables that are flawless d. specify the quality controls checks that need to be made

B

33. Which of these statements about contingent workers is true? a. Typically contingent IT workers work as a separate, independent group of workers and move from project to project working for the same firm. b. A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs. c. Contingent workers are eligible for most company benefits such as vacation, sick pay, and medical insurance. d. Because they do not receive additional compensation through company benefits, contingent IT workers usually make less that full-time employees doing equivalent work.

B

34. The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection. a. summary b. expression c. variation d. illustration

B

34. The problem with the Communications Decency Act was its broad language and vague definition of ____, resulting in the Act being ruled unconstitutional. a. privacy b. indecency c. protected speech d. libel

B

35. The IT consulting firm with the most employees is _____. a. Tata Consultancy Service b. IBM c. Hewlett Packard d. Accenture

B

36. Privacy advocacy groups such as the Electronic Privacy Information Center, the ACLU, and the Electronic Frontier Foundation claimed that the language in the Child Online Protection Act was overly vague and limited the ability of ____ to access material protected under the First Amendment. a. children b. adults c. minorities d. non-U.S. citizens

B

36. _____ involves the use of social networks to inform, promote, and communicate the benefits of products and services. a. Social network shopping b. Social network advertising c. Viral marketing d. Direct advertising

B

37. A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential. a. patent b. trade secret c. copyright d. trademark

B

37. _____ created its own social networking Web site, IdeaStorm, as a means for its millions of customers around the world to talk about new products, services, or improvements they would like. a. Apple b. Dell c. Hewlett Packard d. IBM

B

38. Hotmail created what is recognized by many as the most successful _____ campaign ever when it first launched its service in 1996. a. spam b. viral marketing c. indirect advertising d. direct advertising

B

38. Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____. a. national security b. public interest c. the balance of competitiveness among member organizations of an industry d. the on-going viability of another business entity

B

38. ____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date. a. Distributed denial-of-service attack b. Logic bomb c. Botnet d. Worm

B

39. The U.S. Supreme Court has ruled that there are ____ classes of items that cannot be patented. a. two b. three c. four d. five

B

39. The ____, passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act establishes a requirement for court-approved law enforcement use of a pen register or trap and trace. a. Foreign Intelligence Surveillance Act b. Electronic Communications Privacy Act c. Communications Assistance for Law Enforcement Act d. USA PATRIOT Act

B

40. The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public. a. Foreign Intelligence Surveillance Act b. Electronic Communications Privacy Act c. USA PATRIOT Act d. Communications Assistance for Law Enforcement Act

B

40. There is no federal product liability law; instead, product liability is mainly covered by common law and ____ which deals with the sale of goods. a. Article 1 of the U.S. Constitution b. Article 2 of the Uniform Commercial Code c. The Code of Federal Regulations d. Federal Rules of Civil Procedure

B

40. To prove fraud in a court of law, prosecutors must demonstrate that ____. a. the accused used unreasonable force b. the accused made a false representation of a material fact c. the accused gained access to a trade secret though illegal means d. the accused failed to convey a legal title to the property

B

41. Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps. a. USA PATRIOT Act b. Communications Assistance for Law Enforcement Act c. Electronic Communications Privacy Act d. Foreign Intelligence Surveillance Act

B

41. _____ is a social shopping Web site that implemented a reward system for members in which they are paid a commission each time another shopper acts on their recommendations to purchase a specific item. a. Buzzillions b. Stuffpit c. Kaboodle d. ZEBO

B

42. A judge found ____ guilty of not providing timely on-site technical support that customers were entitled to and, as a result, lost its place as the world's largest computer manufacturer. a. Hewlett-Packard b. Dell c. IBM d. Apple

B

42. An H-1B visa is a temporary visa granted for people who _____. a. only work in the IT field b. work in specialty occupations that require at least a four-year bachelor's degree c. were educated outside the U.S. and wish to work in the U.S. d. were born and educated outside the U.S. but have relatives living in the U.S.

B

43. A(n) ____ requires several standards must be met including; the goods must be fit for the ordinary purpose for which they are used, the quality of the goods must pass without objection in the trade, and the goods must meet a fair average or middle range of quality. a. quality control standard b. implied warranty of merchantability c. warranty d. user need

B

43. Recent survey results show that _____ of students ages 13-17 had experienced cyberbullying within the last year. a. less than 25 % b. about 43% c. almost 67% d. over 75%

B

43. The _____ program was launched in recognition that the ability to use computers and access the Internet is a requirement for succeeding in the U.S. educational system and global workforce. a. E-Rate b. Ed-Tech c. One Laptop Per Child d. ITC

B

43. ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people. a. Botnets b. E-mail spam c. Logic bombs d. Worms

B

44. Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts. a. distributed denial-of-service attack b. bot c. CAPTCHA d. logic bomb

B

44. The Foreign Corrupt Practices Act permits facilitating payments so that an official performs or makes a(n) ____. a. different substantive decision b. official function faster c. payment to a third party d. payment to a member of the judiciary

B

44. The plaintiff must have a ____ that the supplier did not fulfill in order to win a breach-of-warranty claim. a. warranty b. valid contract c. purchase order d. shipping notice

B

44. Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation. a. warrant b. National Security Letter c. roving wiretap d. trap and trace order

B

45. A rapid increase in the appointment of corporate ethics officers typically follows ____. a. the acquisition of one company by another. b. the revelation of a major business scandal. c. the appointment of a new CEO. d. a substantial decrease in the stock price of the firm.

B

45. One Laptop per Child is a nonprofit organization whose goal is to provide children around the world with low cost computers costing less than _____ to aid in their education. a. $50 b. $100 c. $150 d. $200

B

45. Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume. a. 15% b. 30% c. 45% d. 60%

B

46. The process of taking something apart in order to understand it, build a copy of it, or improve it is called ____. a. plagiarism b. reverse engineering c. patent infringement d. decompiling

B

46. When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may required help with _____. a. finding adequate housing b. their English c. obtaining a driver's license d. dealing with financial institutions

B

47. A(n) ____ can read the machine language of a software program and produce the source code. a. compiler b. decompiler c. re-engineering device d. open source decoder

B

47. Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the ____. a. professional's employer b. certifying organization c. IT professional organization to which the professional belongs d. national board of certification

B

47. The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt. a. European Union Data Protection Directives b. Fair Information Practices c. transborder data flow principles d. BBB Online data protection guidelines

B

47. _____ created a competitor to the OLPC laptop computer called the classmate PC. a. Dell b. Intel c. Microsoft d. Cisco

B

48. A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the ____ level and often requires that the recipient pass a test of some kind. a. local b. state c. national d. professional organization

B

48. After successful unit testing, the software units are combined into an integrated subsystem that undergoes rigorous testing to ensure that the linkages among the various subsystems work successfully. This form of testing is called ____. a. static testing b. integration testing c. system testing d. user acceptance testing

B

48. Before a company can apply for an H-1B visa worker, it must file _____. a. a statement of intent to hire a foreign worker b. a Labor Condition Statement c. a petition to hire an H-1B worker d. a visa request with the U.S. Citizenship and Immigration Services

B

48. One of the first rulings by the Supreme Court to address anonymity as an aspect of the Bill or Rights was the 1958 case ____. a. U.S. Navy v. America Online b. NAACP v. Alabama c. Miranda v. Arizona d. ACLU v. Department of Justice

B

48. ____ is an annual gathering in Las Vegas of computer hackers. a. Woodstock b. DEFCON c. Computer Security Institute convention d. CAPTCHA

B

49. Most social networking Web sites have a terms of user agreement that states the Web site has the right to _____. a. post messages about its users b. delete material that violates the site's policies c. edit material submitted by its users d. charge users to view adult material

B

49. The obligation to protect people against any unreasonable harm or risk is called ____. a. negligence b. duty of care c. reasonable person standard d. malpractice

B

50. After an organization decides to adopt CMMI-DEV, it must ____. a. budget considerable sums of money to cover the additional expense b. conduct an assessment of its software development practices c. hire a software development guru d. revamp all its current software development practices

B

51. A(n) ____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. a. trade secret b. trademark c. watermark d. earmark

B

51. Internet users who want to remain anonymous can send e-mail to a(n) ____ service, which uses software to strip the originating IP address from the message. a. Internet filter b. anonymous remailer c. John Doe d. ISP

B

51. ____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing. a. IBM b. Microsoft c. Oracle d. Hewlett Packard

B

52. An organization's IT department can set up a(n) ____ to prohibit employees from accessing remailers. a. Internet filter b. firewall c. anonymizer d. Trojan horse

B

52. When developing safety-critical software ____. a. many more quality assurance tasks are performed but at a much faster pace than on other types of projects b. a project safety engineer maintains a hazard log c. there is much more informal documentation of requirements and test results d. although the elapsed development time increases, the development cost is reduced

B

53. As part of the $787 billion 2009 economic stimulus plan, the federal government earmarked $33 billion in incentives for healthcare providers to implement government certified, interoperable _____ systems by 2015. a. Electronic Drug Dispensing b. Electronic Health Records c. Electronic Medical Billing d. Electronic Physical Referral

B

53. Cybersquatters ____. a. frequently launch denial-of-service attacks against popular Web sites b. register domain names for famous trademarks or company names to which they have no connection c. remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service d. employ phishing tactics using the domain names of popular Web sites

B

53. Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations. a. detected b. mitigated c. eliminated d. overcome

B

53. Risk involves the measurement or assessment of two parameters, the probability of an undesirable event occurring and ____. a. the frequency of that event b. the magnitude of the event's consequences c. the duration of the event d. the number of people affected by the event

B

53. The use of a remailer keeps communications anonymous; what is communicated, and whether it is ethical or legal, ____. a. depends on if it violates the Electronic Communications Privacy Act b. is up to the user of the remailer c. is up to the recipient of the e-mail d. is up to the remailer

B

54. A(n) ____ is often filed against a defendant whose identity is temporarily unknown. a. USA PATRIOT Act warrant b. John Doe lawsuit c. restraining order d. anonymous warrant

B

54. The _____ allows a private citizen to file a sit in the name of the U.S. government. a. False Claims Act b. qui tam provision c. Foreign Corrupt Practices Act d. U.S. Patriot Act

B

54. The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved. a. internal control b. reasonable assurance c. separation of duties d. risk assessment

B

54. ____ is keystroke-logging software downloaded to users' computers without the knowledge or consent of the user. a. A cookie b. Spyware c. Spear-phishing d. A virus

B

58. The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks. a. Carnegie Mellon's Computer Response Team b. U.S. Computer Emergency Readiness Team c. The National Institute of Standards and Technology d. The Science and Technology Directorate of Homeland Security

B

58. The institution and communication of an ____ establishes boundaries of acceptable behavior and enables managers to take action against violators. a. IT code of ethics b. IT usage policy c. IT service level agreement d. IT support guidelines

B

60. A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network. a. anti-virus software b. intrusion prevention system c. intrusion detection system d. network monitor

B

60. In order to avoid Fourth Amendment issues with the use of advanced surveillance technology to track people in public places, advocates of such technology argue that people ____. a. simply cannot be trusted b. have no legitimate expectation of privacy in public c. must avoid public places d. should forego the right to assemble in large groups in public

B

31. Twitter _____. a. was created by Jack Dorsey in 2008 b. is headquartered in Los Angeles c. has had problems related to its rapid growth d. has more users than Facebook

C

32. These objects are protected under patent law: ____. a. art and film b. information critical to an organization's success c. inventions d. books and movies

C

32. Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2006 and 2014? a. Business is facing a long term excess of trained and experienced IT workers. b. Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions. c. Jobs related to networking and data communications analysis had the highest forecasted growth rate at 50 percent. d. Employment in computer system design and related services are expected to decline slightly.

C

32. ____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007. a. Laptop theft b. Denial of service c. Instant messaging abuse d. Insider abuse

C

33. A _____ is a site whose purpose is to create an online community of Internet users that enables members to break down barriers created by time, distance, and cultural differences. a. Social networking shopping Web site b. Internet portal c. Social networking Web site d. Chat room

C

33. As a result of increased ____, clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices. a. modularization b. globalization c. connectivity d. commoditization

C

34. A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called _____. a. contingent employment b. employee leasing c. a coemployment relationship d. outsourcing

C

34. The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions. a. Fair Credit Reporting Act b. HIPAA c. Gramm-Leach-Bliley Act d. Electronic Communications Privacy Act

C

35. A primary cause of poor software quality is that ____. a. development teams fail to use the latest design techniques b. developers spend too little time testing c. many developers do not know how to design quality into software from the very start d. developers do not know how to test software effectively

C

35. The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will ____ to protect American innovation. a. do very little b. use copyrights and patents c. go the extra mile d. negotiate with violators

C

35. The mission of the Business Software Alliance is to ____. a. stop the unauthorized use of organizational IT resources b. encourage the development of IT usage policies c. stop the unauthorized copying of software d. stop the downloading of copyrighted music without the payment of royalties

C

35. Under the ____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected. a. Fair Credit Reporting Act b. HIPAA c. Gramm-Leach-Bliley Act d. USA PATRIOT Act

C

35. _____ of teenagers in the U.S. use social networking Web sites. a. Less than 35% b. About 50% c. About 65% d. Over 75%

C

36. Because contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____. a. relocation expenses b. start-up costs c. training expenses d. travel expenses

C

36. Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work. a. $1,000 b. $10,000 c. $100,000 d. $1,000,000

C

36. The degree to which a software product meets the needs of its users is called software ____. a. accuracy b. reliability c. quality d. availability

C

37. In the United States, it is estimated that there are roughly _____ employees who telework more than eight hours per week. a. 8 million b. 10 million c. 14 million d. 16 million

C

37. The Children's Online Privacy Protection Act ____. a. was found to be unconstitutional b. is meant to give Web masters control over the collection, use, and disclosure of children's personal information c. does not cover the dissemination of information to children d. requires the installation of Internet filters in public libraries

C

37. The ____ Act is still in effect and has not been ruled unconstitutional. a. Child Online Protection b. Communications Decency c. Children's Internet Protection d. Online Community Protection

C

38. Organizations may direct their network administrators to install a(n) ____ on employee's computers to prevent them from viewing sites that contain pornography or other objectionable material. a. packet sniffer b. antivirus software c. Internet filter d. intrusion prevention software

C

38. The Foreign Intelligence Surveillance Act ____. a. describes procedures for the electronic surveillance and collection of competitive intelligence about foreign organizations b. created the FISA court which rules over the admissibility in court of information obtained from foreign wiretaps c. Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party d. requires that each application for a surveillance warrant be made before the attorney general

C

39. In the Internet Content Rating Association's Web site rating scheme, ____ fill out an online questionnaire to describe the content of the Web site. a. Web site visitors b. members of the ICRA c. Web site authors d. objective, third-party Web consultants

C

39. Of those hiring managers who use social networking Web sites to screen candidates, _____ have found information that made them drop a candidate from consideration. a. about one-fourth b. around half c. about two-thirds d. about one-third

C

39. Software used to control many industrial processes in an effort to reduce costs, eliminate human error, improve quality, and shorten the time it takes to manufacture products is called a(n) ____. a. business information system b. decision support system c. process control system d. expert system

C

39. The _____ lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime. a. McClain v. Hewlett-Packard b. Wainwright v. IBM c. Viscaino v. Microsoft d. Brown et al v. Oracle

C

40. As of 2007, what percent of all U.S. heads-of-household have never used e-mail? a. about 10% b. about 15% c. about 20% d. about 25%

C

40. Someone who stands to gain or lose, depending on how a situation is resolved is called a(n) ____. a. shareholder b. business partner c. stakeholder d. philanthropist

C

41. Companies that develop and maintain strong employee relations ____. a. avoid costly product recalls b. retain customers c. suffer lower turnover rates d. place a priority on working with companies that operate in an ethical manner

C

41. Proponents of the Children's Internet Protection Act argued that ____. a. Internet filters are inflexible and non-customizable b. opponents downplayed the limitations of Internet filters c. schools and libraries could elect to not implement the program, they just would not receive Federal money for Internet access d. the act transferred power over education to private software companies

C

41. The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file. a. logic bomb b. zombie c. dropper d. loader

C

41. Which of the following actions is recommended to avoid potential coemployment issues with contingent workers _____. a. When hiring continent workers, plan to use them over an extended period of time to minimize turnover. b. Be specific in telling contingent workers where, when, and how to do their work to avoid any confusion. c. Avoid training contingent workers. d. Provide and pay for all equipment, computers, and e-mail accounts that contingent workers need to perform their job.

C

42. A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a(n) ____. a. patent troll b. patent standard c. submarine patent d. patent farm

C

42. Accepting payment of entry fees for a golf tournament from a supplier is ____. a. clearly a bribe b. clearly a gift c. could be perceived as a bribe d. neither a gift or a bribe

C

42. Social shopping Web sites generate revenue through _____. a. retailer advertising b. sharing with retailers data about their members' like and dislikes c. both retail advertising and sharing with retailers data about their members' likes and dislikes d. names and e-mail addresses of friends of shoppers

C

42. The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records. a. HIPAA b. Communications Assistance for Law Enforcement Act c. USA PATRIOT Act d. Foreign Intelligence Surveillance Act

C

43. A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored. a. pen-register b. trap-and-trace c. roving wiretap d. search and seizure warrant

C

43. An H-1B worker can work for a U.S. employer for a maximum continuous period of _____ years. a. two b. four c. six d. eight

C

43. In United States v. American Library Association, the Supreme Court, in a 6-3 decision, held that public libraries ____. a. cannot implement Internet filters to restrict patrons' access to material b. must allow unrestricted Internet access for adults and provide computers with only limited access for students c. must purchase filtering software and comply with all portions of the Children's Internet Protection Act d. must hire librarians well versed in the use of computer filters to aid in the implementation of a library filtering program

C

44. After a worker's H-1B visa expires, the foreigner must _____. a. return to school to get an advanced degree before applying for another H-1B visa b. apply to become a U.S. citizen c. remain outside the United States for one year before another H-1B petition will be approved d. never again apply for an H-1B visa

C

44. Several states have enacted laws to curb bullying by calling on schools districts to _____ regarding cyberbullying and punishment. a. implement computer software b. offer training c. develop policies d. define strict punishments

C

44. ____ can qualify for trade secret protection under the Uniform Trade Secrets Act. a. Only computer hardware b. Only computer software c. Both computer hardware and software d. Neither computer hardware and software

C

45. Anonymous expression in the U.S. began around the time of ____. a. the American Civil War b. the Vietnam War c. the American Revolution d. World War II

C

45. Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act. a. Patriot b. CAPTCHA c. CAN-SPAM d. Do Not Call

C

45. In Doe v. Holder, the courts ruled that the NSL gag rule (prohibits NSL recipients from informing anyone that the government has secretly requested his or her records) violates the ____. a. the Fair Information Practices Act b. USA PATRIOT Act c. First Amendment d. sunset provision

C

45. When school authorities do get involved in an effort to discipline students for cyberbullying, they are sometimes sued for violating the student's right to free speech, especially if the activity involved _____. a. minority students b. students under the age of 13 c. occurred off school premises d. both a student and a teacher

C

45. ____ occurs when a seller or lessor either misrepresents the quality of a product or conceals a defect in it. a. Breach of warranty b. Fraud c. Intentional misrepresentation d. Slander

C

46. An IT professional organization whose mission is to provide superior leadership and education in information technology and that has a goal to help its members make themselves more marketable within their industry is ____. a. IEEE-CS b. PMI c. AITP d. SANS

C

46. Estimates from Internet safety groups reveal an increasing number of cyberstalking reports with _____ reports per day for help from victims of cyberstalking. a. 10 to 30 b. 75 to 250 c. 50 to 500 d. 150 to 750

C

46. In a for-profit organization, it is the primary objective of the ____ to oversee the organization's business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community. a. Chief Executive Officer b. Chief Ethics Officer c. Board of Directors d. Chief Compliance Officer

C

46. ____ have become the primary means for distributing spam, malware, and phishing scams. a. Spear-phishers b. Hackers c. Botnets d. Logic bombs

C

46. ____ is a standard, proven work process that enables project team members to make controlled and orderly progress in developing high-quality software. a. ISO 9000 b. CMMI c. Software development methodology d. Quality assurance

C

47. The National Center for Victims of Crime offers this advice for cyberstalking victims ____. a. destroy all evidence of any contact with the cyberstalker b. meet in a public place with the cyberstalker to talk things out before involving any law enforcement officers c. send the stalker a written notice that their contact is unwanted and that further contact should cease d. do not consider getting law enforcement officers involved until the stalker threatens violence

C

48. In a(n) ____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communications its new goals for the upcoming year. a. ethics review b. performance report c. social audit d. morals assessment

C

48. MySpace purged _____ sex offenders from its site over a period of two years. a. 25,000 b. 65,000 c. 90,000 d. 113,500

C

49. 7-zip, Audacity, Blender 3D, eMule, Eraser, and Firefox are all examples of ____. a. Web browsers b. utility software c. open source software d. products developed through re-engineering

C

49. Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____. a. hacktivism b. industrial spying c. cyberterrorism d. cracking

C

49. Ethical conduct criteria that could be used in an employee's performance evaluation includes ____. a. the employee's overall contribution to moving the business ahead b. successful completion of projects and tasks c. operating effectively in a multicultural environment d. maintenance of good customer relations

C

49. In U.S. Navy v. America Online, a sailor used a pseudonym to post information that ____. a. revealed the current locations of several warships b. outlined future navy missions c. suggested that he might be gay d. identified names and addresses of many of his fellow sailors

C

49. The ____ seal program identifies online businesses that honor their own stated privacy protection policies. a. TRUSTe b. Fair Information Practices c. BBBOnLine d. Business Software Alliance

C

50. A 1999 report by the Institute of Medicine found that 98,000 Americans die annually due to preventable medical errors. A 2009 Consumers Union report claims that we have _____ the number of such deaths. a. dramatically reduced b. somewhat reduced c. made no change in d. somewhat increased

C

50. Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ____. a. prior art b. industrial espionage c. competitive intelligence d. trade secrets

C

50. The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications. a. USA Patriot Act b. Computer Fraud and Abuse Act c. US Code Title 18, Part I, Chapter 121 d. Identity Theft and Assumption Deterrence Act

C

52. Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making. a. techniques and practices b. models and rules c. core values and beliefs d. references and teachings

C

52. In a Commonwealth Fund study of 41 Texas hospitals that treat a diverse group of patients, researchers found that when physicians electronically entered patient care instructions, there was a _____ reduction in the likelihood of death related to some procedures. a. 10% b. 25% c. 50% d. 75%

C

52. The ____ prohibits the government from concealing the existence of any personal data record-keeping systems. a. Fair Information Practices Act b. USA PATRIOT Act c. Privacy Act d. Freedom of Information Act

C

53. Bad deeds done in a virtual online world can be mediated by _____, who can take action according to the rules of the game and with consequences internal to the game, a. real world law enforcement officers b. other virtual world members c. game administrators d. virtually no one

C

53. ____ is one of the fastest growing forms of fraud in the United States, directly impacting over 4% of the overall U.S. adult population in 2008 with a resulting loss of $48 billion. a. E-mail spam b. Phishing c. Identity theft d. Cybercrime

C

54. To obtain the ____ certificate, an organization must submit to an examination by an external auditor and have written procedures for all processes, follow those procedures, and prove to an auditor that it has fulfilled these requirements. a. CMMI-DEV b. FMEA c. ISO 9000 d. quality assurance

C

54. Under the ACPA, trademark holders can seek civil damages of up to ____ from cybersquatters that register their trade names or similar-sounding names as domain names. a. $10,000 b. $50,000 c. $100,000 d. $250,000

C

54. _____ built a simulation of a Combat Information Center of a command and control ship for the Seventh Fleet in Second Life to provide a real-to-life training experience for its future operators. a. IBM b. The New Media Consortium c. Northrop Grumman Corporation d. The U.S. Navy

C

55. A patient should _____ because of something he or she reads on a medical information Web site. a. never seek out the advice of a professional medical practitioner b. discontinue use of a prescribed medication c. never disregard professional medical advice d. discontinue following medical advice

C

55. A security policy outlines what needs to be done but not ____ to do it. a. when b. where c. how d. who

C

55. An approach to ethical decision making that states you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected is the ____ approach. a. common good b. fairness c. utilitarian d. virtue ethics

C

55. If misrepresentation causes a party to enter into a contract, that party may have the legal right to ____. a. cancel the contract b. seek reimbursement for damages c. cancel the contract and seek reimbursement for damages d. either cancel the contract or seek reimbursement for damages, but not both

C

55. ____ is information gathered by monitoring a consumer's online activity. a. Affiliate data b. Breach data c. Click-stream data d. Identity data

C

56. ____ uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views and product information to display when a user visits a Web site. a. Click-stream data b. Spyware c. Rules-based personalized software d. Contextual commerce software

C

57. A screening technology called ____ helps shield users from sites that do not provide the level of privacy protection they desire. a. Internet filters b. contextual commerce software c. Platform for Privacy Preferences d. cookies

C

59. A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____. a. anti-virus device b. intrusion prevention system c. intrusion detection system d. network monitor

C

59. The ____ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees. a. USA PATRIOT Act b. First Amendment c. Fourth Amendment d. Freedom of Information Act

C

31. From a legal perspective, IT workers are not recognized as professionals because they are not ____ by the state or federal government. a. registered b. certified c. authorized d. licensed

D

31. The ____ is the trade group that represents the U.S. recording industry. a. MPAA b. ACLU c. EFF d. RIAA

D

32. Shortly after the 2009 Iranian election, the U.S. State Department contacted Twitter and asked the company to _____. a. upgrade the network capacity allocated to the Middle East to support the increase in traffic b. jam messages from the Iranian government to its citizens c. send specially worded text messages to the citizens of Iran d. delay a scheduled software upgrade that would have cut off daytime service in Iran

D

32. The Supreme Court has held that this form of speech is not protected by the First Amendment and may be forbidden by the government: ____. a. flag burning b. speech that is highly offensive to a majority of people c. anonymous speech d. perjury

D

33. Miller v. California is the Supreme Court case that established a test to determine ____. a. whether someone has been defamed b. if court testimony is true or represents perjury c. local community standards d. if material is obscene

D

34. As a result of improved ____, clients are able to break down their business processes into their fundamental steps and decide which they will perform themselves and which they will outsource to service providers. a. client sophistication b. governance c. transparency d. modularization

D

34. Labor productivity in the United States remained relatively high despite a(n) _____ level of investment in IT from 1999 to 2004. a. growing b. near zero c. increased d. reduced

D

34. Members of a social networking Web site may use the site to interact with _____. a. people whom they have designated as their "friends" b. people they already know c. people they want to develop some sort of relationship with d. people they know and people who they would like to meet

D

34. The first release of any software ____. a. is usually the least inexpensive release b. has the least number of defects c. often fails to include user documentation d. rarely meets all its users' expectations

D

35. Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots. a. denial-of-service attacks b. zero-day attacks c. zombies d. exploits

D

35. U.S. regulations make it easier for companies to hire and fire workers and to start and end business activities compared to many other industrialized nations. This flexibility makes it easier for markets to relocate workers to _____ firms and sectors. a. larger b. higher value c. lower cost d. more productive

D

36. Habits that incline people to do what is acceptable are called ____. a. ethics b. integrity c. vices d. virtues

D

36. The ____ requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations. a. WIPO Copyright Agreement b. Digital Millennium Copyright Act c. PRO-IP Act d. TRIPS agreement

D

36. The goal of telework is to allow employees to be effective and productive from _____. a. home b. hotel c. client's office d. wherever they are

D

36. Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records. a. payment for all services rendered b. a social security number c. a second opinion d. written consent

D

37. One potential disadvantage of using contingent workers is that _____. a. the costs for their health care, paid time off, and contributions to a retirement plan can be considerable b. the company may have to adjust the number of contingent workers that it uses to meet business needs c. there can be substantial training expenses d. they may not feel a strong connection to the company for which they are working

D

37. ____ was a worm that was released in 2007 and caused billions of dollars in damages. a. Melissa b. SirCam c. Code Red d. Storm

D

38. One of the tests that an invention must pass to be eligible for a patent is ____. a. it must be a machine b. it must be economical to produce c. it must be capable of providing economic benefit d. it must not be obvious to a person having ordinary skill in the same field

D

39. A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in. a. botnet b. rootkit c. logic bomb d. distributed denial-of-service

D

39. Of the roughly 1 billion Internet users worldwide, only _____ are estimated to live in less developed nations. a. 200 million b. 100 million c. 10 million d. 20 million

D

40. The Children's Internet Protection Act ____. a. attempted to block children from providing personal information without consent of their parents b. excludes discounts offered by the E-rate program to schools, churches, and libraries that do not implement certain Internet safety measures c. requires schools, churches, and libraries to adopt a policy to monitor the online activities of minors d. attempted to protect children from accessing pornography and other explicit material online

D

40. The key lesson from Viscaino v. Microsoft is that _____. a. even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor is not the agreement but how many hours per week they are asked to work b. even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor is not the agreement but who oversees their work c. even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor is not the agreement but who performs their performance appraisal d. even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor is not the agreement but the degree of control the company exercises over the employees

D

41. ____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract. a. Breach of contract b. Misrepresentation c. Negligence d. Material breach of contract

D

41. _____ is the European country with the greatest percentage of people using the Internet. a. The United Kingdom b. France c. Italy d. The Netherlands

D

42. Under the doctrine of supervening event, ____. a. the original seller is not liable if the precise software specifications were provided by the government and the software conformed to the specifications b. the original seller is not liable because a statute of limitations has expired c. the original seller is not liable because the buyer used the product in a manner for which it was not intended d. the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury

D

42. _____ is the European country with the smallest percentage of population using the Internet. a. Italy b. France c. Spain d. Poland

D

43. One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____. a. the time limitation for a trade secret is longer than for patents and copyrights b. no royalties must be paid on trade secrets c. trade secrets can become part of the prior art and be used to protect patents and copyrights d. there is no need to file an application or disclose the trade secret to gain protection

D

44. One characteristic of an organization that has a successful ethics program is that ____. a. employees are not prepared to handle situations that could lead to misconduct. b. employees have a negative feeling about their company. c. employees do not seek advice about ethical issues that arise. d. employees are rewarded for ethical behavior.

D

45. A(n) ____ prohibits an employee from working for any competitors for a period of time. a. nonemployment agreement b. employee contract c. nondisclosure agreement d. noncompete agreement

D

45. Congress has set the number of H-1B visas to be granted at _____ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees. a. 55,400 b. 5,400 c. 6,500 d. 65,000

D

46. ____ was a printer who was prosecuted for seditious libel because s(he) refused to reveal the names of anonymous authors whose writings were critical of the governor of new York. a. Ben Franklin b. Martha Franklin c. Thomas Paine d. John Zenger

D

47. The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain. a. industrial spy b. cracker c. cracker d. cybercriminal

D

47. While nearly half of all employees surveyed saw some form of ethical misconduct in 2007, less than ____ of those employees reported the misconduct to management. a. 10% b. 25% c. 50% d. 60%

D

48. The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's. a. Fair Information Protection Act b. Fair Credit Reporting Act c. Freedom of Information Act d. European Union Data Protection Directive

D

48. _____ This is one advantage that a cell phone has over a personal computer that leads industry experts to believe that it will be the cell phone that will ultimately bridge the digital divide. a. Cell phones are more portable and run more complex applications than personal computers. b. Cell phones have many technical-support challenges that must be overcome. c. Cell phones are more costly to own and operate. d. The infrastructure needed to connect wireless devices to the Internet is easier and less expensive to build.

D

49. The healthcare industry invests about _____ in IT for each worker, compared with nearly $15,000 per worker in the banking industry. a. $20,000 b. $5,000 c. $7,500 d. $3,000

D

50. A(n) ____ is a numeric identifier assigned to each computer connected to the Internet. a. URL b. logon id c. serial number d. IP address

D

50. About _____ of material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting. a. 1 hour b. 3 hours c. 7 hours d. 10 hours

D

50. Because there are no ____ against which to compare a software engineer's professional behavior, he or she cannot be subject to malpractice lawsuits. a. codes of ethics b. reasonable person standards c. industry certifications d. uniform standards

D

50. ____ is a likely cause of employees feeling "No one will ever know the difference, and if they do, so what?" a. Management setting and holding people accountable to meet "stretch" goals, quotas, and budgets b. Management failing to provide a corporate code of ethics and operating principles to guide decisions c. Management failing to act in an ethical manner and instead setting a poor example for others to follow d. Management failing to hold people accountable for unethical actions

D

51. On May 20, 2009, an organized group of users uploaded video clips of _____ to YouTube tagged with child-friendly identifiers. a. copyrighted children cartoons b. Iraqi war scenes c. unreleased movies d. explicit adult content

D

51. The step in the five-step decision-making process during which the decision maker(s) consider laws, guidelines, policies, and principles that might apply to the decision is the ____ step. a. develop problem statement b. implement decision c. identify alternatives d. evaluate and choose alternative

D

52. Avatars can earn virtual money by _____. a. performing some task in the virtual world b. performing some task in the real world c. using real world cash to purchase virtual cash d. performing some task in the virtual world or using real cash to purchase virtual cash

D

52. The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India. a. 4.5:1 b. 3.0:1 c. 2.0:1 d. 1.5:1

D

53. Part of developing a good problem statement includes ____. a. involving others, including stakeholders, in brainstorming b. identifying and evaluating alternative solutions c. providing leadership to overcome resistance to change d. determining who is directly affected by the problem

D

54. A feature that is associated with a bribe is that a bribe ____. a. is made directly from donor to recipient b. is made openly and publicly c. is made as a gesture of friendship or goodwill d. encourages an obligation for the recipient

D

54. An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a common set of values and goals is the ____ approach. a. virtue ethics b. utilitarian approach c. fairness d. common good

D

55. In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment. Legal recourse is possible only when that speech turns into clear threats and intimidation against ____. a. government officials b. members of a minority group c. U.S. citizens d. specific citizens

D

55. Online muggings and sex crimes in a virtual world can cause real life anguish for the human owners of the avatars involved. Such acts _____ rise to the level of a real life crime. a. clearly b. may c. may not d. may or may not

D

55. The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program's code, the software ____. a. becomes easier to use b. costs less c. is more fun to maintain d. improves

D

55. ____ describes how a product or process could fail to perform the desired function described by the customer. a. CMMI-DEV b. Quality assurance c. ISO 9000 d. FMEA

D

56. The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services. a. The Science and Technology Directorate of the Department of Homeland Security b. The U.S. Computer Emergency Response Team c. Carnegie Mellon Computer Emergency Response Team d. National Institute of Standards and Technology

D

57. Installation of a(n) ____ is the most common computer security precaution taken by businesses. a. emergency response team b. intrusion detection device c. intrusion prevention device d. firewall

D

39. ____ hired private investigators to identify members of its board of directors who were responsible for leaking confidential company information to the press. a. Oracle b. IBM c. Microsoft

DD

38. ____ is a system of rules that tells us what we can and cannot do.

a. Laws

37. ____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.

a. Morals

34. In 2007, ____ of all software in circulation worldwide was pirated.

b. around 38%

32. A set of beliefs about right and wrong behavior within a society is called ____.

ethics


Related study sets

Chapter 25 - Acquisitions and Takeovers

View Set

NU473 Week 4: Evolve Elsevier EAQ Psychiatric Drugs

View Set

Property insurance terms and related concepts

View Set

CCNA Routing&Switching 200-125 (part 9)

View Set