FSU CIS 3250 Exam 2 Gann Chp 6 - 10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/211

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

212 Terms

1
New cards

The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.

False

2
New cards

Which of the following claims as its invention some feature or process embodied in instructions executed by a computer?

Software Patent

3
New cards

Which of the following increased trademark and copyright enforcement and substantially increased penalties for infringement?

Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

4
New cards

A patent is a grant of a property right issued by which entity?

USPTO

5
New cards

Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.

True

6
New cards

Copyright and patent protection was established through which of the following?

U.S. Constitution

7
New cards

Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's?

Trademark

8
New cards

Patent law protects which of the following?

Inventions

9
New cards

The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following?

Reverse Enineering

10
New cards

Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets?

The Economic Espionage Act (EEA) of 1996

11
New cards

The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement.

True

12
New cards

One of the tests that an invention must pass to be eligible for a patent is which of the following?

it must be obvious to a person having ordinary skill in the same field

13
New cards

A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.

False

14
New cards

Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?

TRIPS agreement

15
New cards

The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.

False

16
New cards

A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

False

17
New cards

The courts have ruled in favor of using reverse engineering to:

enable interoperability

18
New cards

Industrial espionage and competitive intelligence are essentially the same.

False

19
New cards

Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to-file" system?

Leahy-Smith America Invents Act

20
New cards

Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.

False

21
New cards

Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own

False

22
New cards

The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and implements two 1996 WIPO treaties.

True

23
New cards

Firefox and OpenOffice are all examples of which of the following?

open source software

24
New cards

Software, video games, multimedia works, and Web Pages can all be copyrighted.

True

25
New cards

Which of the following terms is defined as the existing body of knowledge available to a person of ordinary skill in the art?

Prior art

26
New cards

The main body of law that governs patents is contained in Title 35 of the U.S. Code

True

27
New cards

A common use of open source software is to move data from one application to another and extract, transform, and load business data into large databases.

True

28
New cards

In what year was the Digital Millennium Copyright Act (DMCA) signed into law?

1998

29
New cards

Which of the following can read the machine language of a software program and produce the source code?

decompiler

30
New cards

Copyright law protects authored works such as art, books, and film

True

31
New cards

Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances?

Fair use doctrine

32
New cards

Which of the following established the minimum levels of protection that each country must provide to all WTO members?

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

33
New cards

Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use?

Digital Millennium Copyright Act (DMCA)

34
New cards

How many classes of items did the U.S. Supreme Court rule could not be patented?

Three

35
New cards

Which act was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law?

Uniform trade secrets act (UTSA)

36
New cards

Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?

ACPA

37
New cards

Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.

True

38
New cards

Defining and controlling the appropriate level of access to intellectual property are complex tasks.

True

39
New cards

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is:

there is no need to file an application or disclose a trade secret to gain protection

40
New cards

The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following?

Open Source License

41
New cards

What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time?

Noncompete Agreement

42
New cards

Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights.

True

43
New cards

A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.

True

44
New cards

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following?

Competitive Intelligence

45
New cards

Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect which of the following?

Quality

46
New cards

When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?

Negligence

47
New cards

An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following?

Order-Processing systems

48
New cards

In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent?

Strict Liability

49
New cards

Which of the following is true of software testing?

Static testing involves software programs called static analyzers which are run against new code.

50
New cards

From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is 50.

False

51
New cards

An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?

Failure mode and effects analysis (FMEA)

52
New cards

When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.

False

53
New cards

Which of the following is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times, where N could be 2, 3, 4, or more?

N-Version Programming

54
New cards

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for which of the following?

Breach of Warranty

55
New cards

Software quality is defined as the degree to which a software product meets:

the needs of its users

56
New cards

In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.

False

57
New cards

What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?

Black-Box Testing

58
New cards

The safety engineer uses a logging and monitoring system to track which of the following?

Hazards

59
New cards

Products, such as statements of requirements, flowcharts, and user documentation, are known as which of the following?

Deliverables

60
New cards

Which of the following can be oral, written, or inferred from the seller's conduct?

Express Warranties

61
New cards

Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.

False

62
New cards

Software quality is the degree to which a software product meets the needs of its users.

True

63
New cards

Which of the following terms is defined as the potential of gaining or losing something of value?

Risk

64
New cards

A successful defense against a product liability case is typically expensive in terms of legal fees.

True

65
New cards

Software developers do not typically work closely with safety and software engineers.

False

66
New cards

Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective process.

True

67
New cards

When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.

False

68
New cards

Risk is the potential of gaining or losing something of value.

True

69
New cards

In the context of Capability Maturity Model of Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?

Initial

70
New cards

What type of programming is commonly found in airplane and spacecraft control systems?

Triple Version programming

71
New cards

Which of the following is true of strategies for engineering quality software?

The first release of any software rarely meets all its users' expectations

72
New cards

A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so.

True

73
New cards

There is no federal product liability law.

True

74
New cards

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers?

high-volume data storage

75
New cards

User acceptance testing is performed by trained end users to ensure that the system operates as they expect.

True

76
New cards

Which of the following is true of the International Organization for Standardization?

It is a worldwide federation of national standards bodies from 161 countries

77
New cards

In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following?

Warranties

78
New cards

Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation.

True

79
New cards

A failure mode describes how a product or process could fail to perform the desired functions described by the customer.

True

80
New cards

Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk.

True

81
New cards

In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?

$5000

82
New cards

A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following?

Decision Support System

83
New cards

After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?

CMMI-DEV

84
New cards

Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

False

85
New cards

In integration testing, special software programs called static analyzers are run against the new code.

False

86
New cards

At which of the Capability Maturity Model Integration maturity levels, are processes well defined, understood, and consistent across the organization?

Defined

87
New cards

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?

Integration Testing

88
New cards

An electronic medical record includes which of the following?

a patient's immunization records

89
New cards

How often does The Bureau of Labor Statistics track U.S. productivity?

Quarterly

90
New cards

In the early days of IT in the 1960s, productivity improvements were difficult to measure.

False

91
New cards

Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.

False

92
New cards

Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers?

Artificial Intelligence

93
New cards

A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services is known as which of the following?

Labor Productivity

94
New cards

It is difficult to quantify how much the use of IT has contributed to worker productivity because:

many other factors influence worker productivity rates besides IT

95
New cards

Which of the following is NOT one of the three major components of machine learning systems?

A Function

96
New cards

Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.

False

97
New cards

Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?

45%

98
New cards

A comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization is known as which of the following?

EHR

99
New cards

Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation?

Store-and-forward telemedicine

100
New cards

Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs.

False