mis T/F
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect
T
) A data warehouse is typically comprised of several smaller data marts
f
) Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision
f
94) An information policy specifies the procedures and rules for defining the structure and content of corporate databases
f
A grouping of characters into a word, a group of words, or a complete number is called a record
f
A mainframe is a type of legacy workstation
f
According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law
f
Advances in data storage have made routine violation of individual privacy more difficult
f
Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support
f
An SaaS provider maintains a large Web server, or series of servers, and provides fee-paying subscribers with space to maintain their Web sites
f
Any unsolicited e-mail is legally considered spam
f
Application server software is responsible for locating and managing stored Web pages
f
Client/server computing is the most widely used form of centralized processing
f
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
f
OLAP is used to find hidden patterns and relationships in large databases, and infer rules from these to infer future behavior.
f
The Copyright Office began registering software programs in the 1990s
f
The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision
f
Today, most system and application software is custom built by in-house programmers
f
Using an online storage service such as DropBox is a type of virtualization
f
) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations
t
) XML provides a standard format for data exchange, enabling Web services to pass data from one process to another
t
A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior
t
A firm's information policy lays out who is responsible for updating and maintaining the information in a database system
t
A foreign key is a field that links to a separate table
t
A physical view shows data as it is organized on the storage media
t
Data cleansing is the same process as data scrubbing
t
Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations
t
Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit
t
Spyware is software that comes hidden in downloaded applications and can track your online movements
t
Technostress is a computer-related malady whose symptoms include fatigue
t
The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.
t
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product
t
The most common type of computer-related RSI is CTS
t
Total cost of ownership components include costs for downtime, training, and support
t
Web browsers are the primary interface for accessing the Internet
t