Extra Quiz Practice Flashcards
Live telemedicine requires the presence of patients and healthcare providers at the same site.
False
China is considered one of the best sources of programming skills outside Europe and North America.
False
Which of the following social network platforms enables users to visually share and discover new interests by posting images or videos to their own or others’ boards?
If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press.
False
A common use of open source software is to move data from one application to another and extract, transform, and load business data into large databases.
True
Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.
True
From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is 50.
False
Foreign professionals can convert their H-1B visas into permanent green cards.
True
Copyright and patent protection was established through which of the following?
U.S. Constitution
Based on the data from the National Center for Education Statistics there are some 130,000 new computer and information science graduates each year to fill what the BLS projects as a need of roughly 53,000 new U.S. tech job openings per year.
False
Which of the following increased trademark and copyright enforcement and substantially increased penalties for infringement?
Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act
After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?
CMMI-DEV
The False Claims Act was enacted during which war?
U.S. Civil War
How often does The Bureau of Labor Statistics track U.S. productivity?
Quarterly
In integration testing, special software programs called static analyzers are run against the new code.
False
Researchers have found that it can take how long for IT investment to result in a significant increase in productivity?
Five to Seven Years
Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?
400 Hours
Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?
45%
Which of the following is NOT one of the three major components of machine learning systems?
A Function
How many classes of items did the U.S. Supreme Court rule could not be patented?
Three
Which country is considered one of the best sources of programming skills outside of Europe and North America?
India
The majority of people hired with H-1B visas in 2015 were hired primarily as which of the following positions?
Computer programmers nd system analysts
The number of Internet users worldwide is quickly approaching which of the following?
4 Billion
What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement?
Temporary Worker
A patent is a grant of a property right issued by which entity?
USPTO
Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider’s office thus enabling a broader view of a patient’s care.
False
Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers.
False
In the early days of IT in the 1960s, productivity improvements were difficult to measure.
False
Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use?
Digital Millennium Copyright Act (DMCA)
Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.
Iso 9001 quality management standards
An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?
Failure mode and effects analysis (FMEA)
Organizations can use which of the following to capture interviews with customers, managers, and industry leaders?
Google Hangouts On Air
Studies found that driving while talking on your phone doubles your risk of an accident to about the same level as if you were driving drunk.
False
The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following?
Raise Brand Awareness
An H-1B worker can work for U.S. employer for a maximum continuous period of how many years?
Six
Copyright infringement is the act of stealing someone’s ideas or words and passing them off as one’s own
False
Organic media marketing involves the use of social networks to communicate and promote the benefits of products and services.
False
One of the tests that an invention must pass to be eligible for a patent is which of the following?
it must be obvious to a person having ordinary skill in the same field
The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.
False
A comprehensive view of the patient’s complete medical history designed to be shared with authorized providers and staff from more than one organization is known as which of the following?
EHR
Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other’s copyrights.
True
Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.
False
Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers
False
Labor productivity is measured by the annual revenue an employee generates divided by the employee’s annual salary.
False
Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?
European Union’s Restriction of Hazardous Substances Directive
The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
False
There is no federal product liability law.
True
Which act was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law?
Uniform trade secrets act (UTSA)
Which of the following established the minimum levels of protection that each country must provide to all WTO members?
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
The National Center for Victims of Crime advises victims to:
send the stalker a written notice that their contact is unwanted and that further contact should cease
Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?
ACPA
It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms.
False
Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
False
It usually takes less than two years for IT to result in a significant increase in productivity in large firms.
False
Which of the following is a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim?
Cyberstalking