Exam 1 (4-6) Flashcards

1
Q

It is not feasible for companies to produce error-free software because

A

it is too expensive to create perfect software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

European privacy protection is ________ than in the United States.

A

much more strict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any unsolicited e-mail is legally considered spam.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the United States, the claim to privacy is protected primarily by each of the following except

A

COPPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to the ________, you should take the action that produces the least harm.

A

Risk Aversion Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes how new information systems result in legal gray areas?

A

They result in new situations that are not covered by old laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

A

opt-out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Do-Not-Track Act of 2011

A

requires firms to notify customers that they are being tracked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What legal mechanism protects the owners of intellectual property from having their work copied by others?

A

copyright law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Look and feel” copyright infringement lawsuits are concerned with

A

the distinction between an idea and its expression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy?

A

Firms should limit the length of time that any personal data is stored to six months or less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intellectual property can best be described as

A

intangible property created by individuals or corporations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as

A

responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ can be induced by tens of thousands of repetitions under low-impact loads.

A

RSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Technostress is a computer-related malady whose symptoms include fatigue.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

A

Profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The key concepts in patent law are originality, novelty, and value.

A

Flase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When a cookie is created during a Web site visit, it is stored

A

on the visitor’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

A

Kant’s Categorical Imperative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Specifications that establish the compatibility of products and the ability to communicate in a network are called

A

technology standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SaaS refers to

A

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called

A

autonomic computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Interpretations of Moore’s law assert that

A

computing power doubles every 18 months.

25
Q

The business case for using grid computing involves all of the following except

A

increased accuracy.

26
Q

Whereas XML is limited to describing how data should be presented in the form of Web pages, HTML can perform presentation, communication, and data storage tasks.

A

False

27
Q

Legacy systems are still used because they

A

are too expensive to redesign.

28
Q

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

A

True

29
Q

A SAN is a ________ network.

A

storage area

30
Q

All of the following are current hardware platform trends except

A

Unix

31
Q

SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.

A

True

32
Q

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as

A

Software packages

33
Q

The technology challenges facing the U.S. Army, as discussed in the chapter case, illustrates the current trend in software of outsourcing application development.

A

False

34
Q

The decision to outsource software development is also referred to as the rent-versus-buy decision.

A

False

35
Q

Autonomic computing is implemented primarily with enterprise or ISP servers.

A

False

36
Q

The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called

A

virtualization.

37
Q

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.

A

5, 4, 2, 3, 1

38
Q

Which type of software is created and updated by a worldwide community of programmers and available for free?

A

open source

39
Q

Which of the following is the most popular mobile operating system?

A

Android

40
Q

The type of logical database model that treats data as if they were stored in two-dimensional tables is the

A

relational DBMS.

41
Q

Data cleansing is the same process as data scrubbing.

A

True

42
Q

The data dictionary serves as an important data management tool by

A

creating an inventory of the data elements contained in the database.

43
Q

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called

A

normalization

44
Q

Oracle Database Lite is a(n)

A

DBMS for small handheld computing devices.

45
Q

Which of the following is not one of the techniques used in Web mining?

A

user mining

46
Q

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the

A

data dictionary.

47
Q

OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases.

A

False

48
Q

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called

A

data scrubbing.

49
Q

Big data does not refer to

A

datasets with fewer than a billion records.

50
Q

Because HTML was designed as a cross-platform language, it is the preferred method of communicating with back-end databases.

A

False

51
Q

A data warehouse may be updated by a legacy system.

A

True

52
Q

The select operation

A

creates a subset consisting of all records in the file that meet stated criteria.

53
Q

The project operation

A

creates a subset consisting of columns in a table

54
Q

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with

A

two short marks.

55
Q

Common Gateway Interface is a specification for processing data on a Web server.

A

True

56
Q

NoSQL technologies are used to manage sets of data that don’t require the flexibility of tables and relations.

A

True

57
Q

In terms of data relationships, associations refers to

A

occurrences linked to a single event

58
Q

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.

A

True

59
Q

Data mining is a tool for allowing users to

A

find hidden relationships in data.