OMIS 350 - Test 2
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Select one: a. Due process b. Accountability c. Liability d. The judicial system e. Responsibility
A. Due Process
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. Select one: a. Web bugs b. behavioral targeting c. NORA d. intelligent agents e. FIP principles
B. Behavioral Targeting
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? Select one: a. the utilitarian principle b. the Golden Rule c. Kant's categorical imperative d. the risk aversion principle e. the "no free lunch" rule
B. the Golden Rule
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. Select one: a. Due process b. The courts of appeal c. The judicial system d. Liability e. Accountability
E. Accountability
All of the following are steps in the process for analyzing an ethical issue except: Select one: a. identifying the options you can reasonably take. b. identifying the potential consequences of your options. c. identifying the stakeholders. d. identifying and clearly describing the facts. e. assigning responsibility.
E. Assigning Responsibility
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? Select one: a. The Golden Rule b. The slippery-slope rule c. The "No free lunch" rule d. The Risk Aversion Principle e. Kant's Categorical Imperative
E. Kant's Categorical Imperative
________ are not held liable for the messages they transmit. Select one: a. Organizations and businesses b. European ISPs c. Private individuals d. Elected officials e. Regulated common carriers
E. Regulated Common Carriers
________ allows an organization to collect personal information without the user's explicit consent. Select one: a. The opt-in model b. A safe harbor c. P3P d. FIP principles e. The opt-out model
E. The opt-out model
What percent of global Internet users use Google Search and other Google services such as YouTube? Select one: a. Nearly 80 percent b. Less than 10 percent c. Over 90 percent d. Around 25 percent e. About 50 percent
a. Nearly 80 percent
Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? Select one: a. Quality of life b. System quality c. Information rights and obligations d. Property rights and obligations e. Accountability and control
a. Quality of life
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a: Select one: a. SLA. b. SaaS. c. RFQ. d. SOA. e. TCO.
a. SLA
Interpretations of Moore's law assert that: Select one: a. computing power doubles every 18 months. b. PCs decrease in market share by 9% every 5 years. c. transistors decrease in size 50% every two years. d. computing power will eventually level off. e. data storage costs decrease by 50% every 18 months.
a. computing power doubles every 18 months.
Which of the following is not a difficulty in establishing patent protection? Select one: a. The requirement that the work reflect some special understanding and contribution ***Wrong b. The requirement that the work must be a secret c. The requirement that the work must be original d. Length of time required to receive protection e. The requirement that the work must be novel ***Wrong
b-d... i dont know
Which of the following is a leading networking hardware provider? Select one: a. IBM b. Cisco c. Seagate d. Dell e. Intel
b. Cisco
All of the following are typically factors in a firm's decision to engage consulting and system integration services except: Select one: a. The firm's staff does not have the necessary experience to deploy and maintain the firm's IT infrastructure. b. The firm's staff knows more about the firm's IT infrastructure than service providers. c. the firm's staff do not have the skills necessary to deploy and maintain the firm's IT infrastructure. d. The firm does not have the budget to deploy and maintain a firm's IT infrastructure. e. the firm does not have the staff necessary to deploy and maintain the firm's IT infrastructure.
b. The firm's staff knows more about the firm's IT infrastructure than service providers.
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? Select one: a. Cost-benefit analysis b. Total cost of ownership c. Return on investment d. Supply and demand e. Breakeven point
b. Total cost of ownership
All of the following are technical solutions to protecting user privacy except: Select one: a. preventing client computers from accepting cookies. b. data use policies. c. anonymous surfing. d. anonymous email. e. email encryption.
b. data use policies.
The marketplace for computer hardware: Select one: a. has been decimated by mobile and cloud computing. b. has become increasingly concentrated in top firms. c. has expanded to include a wide variety of start-up and mobile-computing firms. d. has begun moving away from blade servers. e. has moved significantly to Asian firms.
b. has become increasingly concentrated in top firms.
Redesigning and automating business processes can be seen as a double-edged sword because: Select one: a. reliance on technology results in the loss of hands-on knowledge. b. increases in efficiency may be accompanied by job losses. c. it can concentrate power in the hands of senior executives. d. increases in efficiency may be accompanied by poor data quality. e. support for middle-management decision making may be offset by poor data quality.
b. increases in efficiency may be accompanied by job losses.
When a cookie is created during a website visit, it is stored: Select one: a. on the ISP's servers. b. on the hard drive of the visitor's computer. c. nowhere, because they are only used during a visit and are discarded once a visitor leaves the website. d. on the website's server. e. in the browser's application settings.
b. on the hard drive of the visitor's computer.
Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as: Select one: a. EAI software. b. web services. c. SaaS. d. SOA. e. SOAP.
b. web services.
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Select one: a. Privacy law b. Copyright law c. Patent law d. Trade secret protection e. Trademark law
c. Patent law
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Select one: a. System quality b. Accountability and control c. Property rights and obligations d. Information rights and obligations e. Quality of life
c. Property rights and obligations
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Select one: a. System quality b. Accountability and control c. Quality of life d. Family and home e. Property rights and obligations
c. Quality of life
Which of the following is a multitasking, multiuser, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms? Select one: a. OS X b. DOS c. Unix d. COBOL e. Linux
c. Unix
The introduction of the minicomputer: Select one: a. represented the rise of Microsoft. b. was dominated by IBM. c. allowed computers to be customized to the specific needs of departments or business units. d. offered new, powerful machines at higher prices than mainframes. e. strengthened centralized computing.
c. allowed computers to be customized to the specific needs of departments or business units.
The Network Advertising Initiative is an industry association that: Select one: a. regulates the use of customer information by firms. b. is a safe harbor program established by the U.S. government. c. encourages self-regulation to develop a set of privacy guidelines for its members. d. has established technical guidelines for ensuring privacy. e. protects user privacy during interactions with websites.
c. encourages self-regulation to develop a set of privacy guidelines for its members.
SaaS refers to: Select one: a. managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. b. easy-to-use software tools for displaying Web pages. c. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis. d. self-contained services that communicate with each other to create a working software application. e. supplying online access over networks to storage devices and storage area network technology.
c. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
The ethical "no free lunch" rule states that: Select one: a. if an action cannot be taken repeatedly, then it is not right to be taken at any time. b. one should take the action that produces the least harm or incurs the least cost. c. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. d. one can put values in rank order and understand the consequences of various courses of action. e. if an action is not right for everyone to take, it is not right for anyone to take.
c. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
Infrastructure-as-a-Service (IaaS): Select one: a. is a cloud-based service that provides a platform for software development. b. provides users with a service-oriented architecture for their systems. c. is one type of cloud computing service where users pay only for the computing capacity they actually use. d. provides cloud users with ubiquitous networking environment. e. is a cloud-based service which provides software applications to users on demand.
c. is one type of cloud computing service where users pay only for the computing capacity they actually use.
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Select one: a. Property rights and obligations b. Accountability and control c. System quality d. Information rights and obligations e. Quality of life
d. Information rights and obligations
Which type of software is created and updated by a worldwide community of programmers and available for free? Select one: a. Closed source b. Outsourced c. Software packages d. Open source e. Mashups
d. Open source
Which of the following is not an example of the moral dimensions of the information age identified in the text? Select one: a. Information rights and obligations b. Accountability and control c. Quality of life d. The emergence of giant tech firms that dominate their markets e. System quality
d. The emergence of giant tech firms that dominate their markets
Which of the following is the most common reason that business systems fail? Select one: a. Software errors b. Software bugs c. Hardware failures d. Facilities failures e. Data quality
e. Data quality
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? Select one: a. His action is wrong, because the grocery store owner is harmed. b. His action is wrong, because the man would not want the grocer to steal from him. c. His action is acceptable, because the grocer suffers the least harm. d. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. e. His action is acceptable, because the higher social value is the survival of the family.
e. His action is acceptable, because the higher social value is the survival of the family.
How would you determine the market demand for your firm's IT services? Select one: a. Benchmark your services b. Perform a TCO analysis c. Perform a stress test d. Analyze sales returns on key investments e. Hold focus groups to assess your services
e. Hold focus groups to assess your services
in the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. Select one: a. PGP b. safe harbor c. P3P d. opt-out e. opt-in
e. Opt-in
Which of the following is an example of a legacy system? Select one: a. Quantum computing system b. Web services running on a cloud computing platform c. MDM software d. Scalable grid computing system e. Transaction processing system running on a mainframe
e. Transaction processing system running on a mainframe
Which of the following is a recent addition to the mobile digital platform? Select one: a. Grid computing devices b. Cloud computing devices c. Quantum computing devices d. Green computing devices e. Wearable computing devices
e. Wearable computing devices
Which of the following best describes the effect that new information technology has on society? Select one: a. It has a ripple effect, raising new ethical, social, and political issues. b. It has a dampening effect on the discourse of business ethics. c. It has a waterfall effect in raising ever more complex ethical issues. d. It has a magnifying effect, creating increasing numbers of ethical issues. e. It is beneficial for society as a whole, while raising dilemmas for consumers.
a. It has a ripple effect, raising new ethical, social, and political issues.
Which of the following is not one of the current key technology trends that raises ethical issues? Select one: a. Advances in networking technology b. Increase in data quality c. Increase in use of mobile devices d. Data storage improvements e. Data analysis advancements
b. Increase in data quality
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Select one: a. Spamming b. Profiling c. Targeting d. Spyware e. Phishing
b. Profiling
According to ________, you should take the action that produces the least harm. Select one: a. the utilitarian principle b. the risk aversion principle c. the Golden Rule d. Kant's categorical imperative e. the "no free lunch" rule
b. the risk aversion principle
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: Select one: a. beacon. b. app. c. browser. d. service. e. client.
c. browser
Digital media differs from a physical book in all of the following ways except: Select one: a. ease of alteration. b. ease of transmission. c. ease of establishing uniqueness. d. ease of replication. e. ease of global distribution.
c. ease of establishing uniqueness.
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? Select one: a. Capacity planning b. On-demand computing c. Utility computing d. Green computing e. Cloud computing
d. Green computing
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Select one: a. Copyright b. Trademark c. All forms of intellectual property protection d. Trade secret e. Patent
d. Trade secret
The practice of contracting custom software development to an outside firm is commonly referred to as: Select one: a. utility computing. b. service-oriented architecture. c. scaling. d. outsourcing. e. application integration.
d. outsourcing.
Which of the following is not an example of the consumerization of IT? Select one: a. Google Apps b. Facebook c. Dropbox d. Gmail e. Amazon Web Services
e. Amazon Web Services
Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data? Select one: a. Telecommunications b. Telephone c. VOIP d. Networking e. Data management
e. Data management