cis3250 ch6-10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances?

Plagiarism
Copyright infringement
Fair use doctrine
Use of prior art

Fair use doctrine

2
New cards

Reverse engineering can only be applied to computer hardware, not computer software. T/F

False

3
New cards

Which of the following claims as its invention some feature or process embodied in instructions executed by a computer?

trade secret
software patent
cross-licensing agreement
patent infringement

software patent

4
New cards

Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?

Time Warner Cable system
RIAA
DeCSS
Content Scramble System (CSS)

Content Scramble System (CSS)

5
New cards

Firefox and OpenOffice are all examples of which of the following?

Web browsers
utility software
products developed through re-engineering
open source software

open source software

6
New cards

The courts have ruled in favor of using reverse engineering to:

-allow the domination of a particular software market by a single manufacturer
-provide access to protected elements of an original work
-circumvent restrictive trade secrets
-enable interoperability

enable interoperability

7
New cards

One of the tests that an invention must pass to be eligible for a patent is which of the following?

-it must be a machine
-it must not be economical to produce
-it must be capable of providing economic benefit
-it must not be obvious to a person having ordinary skill in the same field

it must not be obvious to a person having ordinary skill in the same field

8
New cards

Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's?

trade secret
watermark
trademark
earmark

trademark

9
New cards

In what year was The Digital Millennium Copyright Act (DMCA) signed into law?

1992
1998
1990
1996

1998

10
New cards

Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use?

-TRIPS Agreement
-Digital Millennium Copyright Act (DMCA)
-WIPO Copyright Treaty
-Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

Digital Millennium Copyright Act (DMCA)

11
New cards

The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following?

nondisclosure clause
open source license
patent protection
copyright term

open source license

12
New cards

Which of the following established the minimum levels of protection that each country must provide to all WTO members?

-World Trade Organization (WTO)
-Digital Millennium Copyright Act (DMCA)
-The World Intellectual Property Organization (WIPO)
-Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

13
New cards

Cybersquatters:

-frequently launch denial-of-service attacks against popular Web sites
-register domain names for famous trademarks or company names to which they have no connection
-remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service
-employ phishing tactics using the domain names of popular Web sites

register domain names for famous trademarks or company names to which they have no connection

14
New cards

What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time?

noncompete agreement
license agreement
nondisclosure agreement
union agreement

noncompete agreement

15
New cards

The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement. T/F

True

16
New cards

Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights. T/F

True

17
New cards

Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. T/F

True

18
New cards

A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators. T/F

False

19
New cards

Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to-file" system?

Economic Espionage Act
Lanham Act
Uniform Trade Secrets Act
Leahy-Smith America Invents Act

Leahy-Smith America Invents Act

20
New cards

Which of the following can read the machine language of a software program and produce the source code?

compiler
open source decoder
re-engineering device
decompiler

decompiler

21
New cards

Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk. T/F

True

22
New cards

In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?

quantitatively managed
managed
defined
initial

initial

23
New cards

After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?

QA
software development methodology
software quality management
CMMI-DEV

CMMI-DEV

24
New cards

A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following?

upgrade management system
decision support system
executive information system
data information system

decision support system

25
New cards

Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes. T/F

True

26
New cards

A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so. T/F

True

27
New cards

In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log. T/F

False

28
New cards

An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following?

order-processing systems
decision support systems
software development systems
quality assurance systems

order-processing systems

29
New cards

An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?

DO-178B/EUROCCAE ED-128
N-version programming
Failure mode and effects analysis (FMEA)
Capability Maturity Model Integration (CMMI)

Failure mode and effects analysis (FMEA)

30
New cards

Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury. T/F

True

31
New cards

Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known. T/F

False

32
New cards

Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation. T/F

True

33
New cards

A failure mode describes how a product or process could fail to perform the desired functions described by the customer. T/F

True

34
New cards

In integration testing, special software programs called static analyzers are run against the new code. T/F

False

35
New cards

Which of the following is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times, where N could be 2, 3, 4, or more?

Acceptance programming
Risk management programming
N-version programming
Avoidance programming

N-version programming

36
New cards

When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing. T/F

False

37
New cards

The safety engineer uses a logging and monitoring system to track which of the following?

standards
objectives
hazards
deliverables

hazards

38
New cards

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers?

high-volume data storage
low-volume data storage
unpredictable-volume data storage
irregular-volume data storage

high-volume data storage

39
New cards

When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?

breach of warranty
misrepresentation
strict liability
negligence

negligence

40
New cards

Software quality is defined as the degree to which a software product meets:

the needs of its users.
the standards of its competitors.
sustainability and environmental protection needs.
the minimum financial return standards.

the needs of its users.

41
New cards

Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?

Store-and-forward telemedicine
Live telemedicine
Electronic consultation
Remote monitoring

Live telemedicine

42
New cards

It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms. T/F

False

43
New cards

There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions. T/F

True

44
New cards

Researchers have found that it can take how long for IT investment to result in a significant increase in productivity?

less than three years
more than 10 years
five to seven years
only a few months

five to seven years

45
New cards

Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation. T/F

True

46
New cards

Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs. T/F

False

47
New cards

Live telemedicine requires the presence of patients and healthcare providers at the same site. T/F

False

48
New cards

Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care. T/F

False

49
New cards

Innovation is a key factor in productivity improvement. Which of the following has played an important role in enabling innovation?

productivity
economy
research and statistics
information technology

information technology

50
New cards

Today most radiologists employ a personal health record system to review cases from a remote location. T/F

False

51
New cards

The information in an EHR is not easily shared with others outside of the healthcare organization where the data originated. T/F

False

52
New cards

What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?

telemedicine system
computerized provider order entry (CPOE) system
clinical decision support (CDS) system
health information exchange (HIE) system

computerized provider order entry (CPOE) system

53
New cards

More advanced artificial-intelligence-based clinical decision support systems can help doctors choose the proper dosage levels of medication based on a patient's most recent tests results. T/F

True

54
New cards

IT investments may produce tangible results such as:

improved quality
improved reliability
cost savings
improved service

cost savings

55
New cards

Which of the following examples is a use of wireless technology in the healthcare field?

provide the public access to a patient's medical history
provide access to Medicare and Medicaid reimbursements
transmit ECG data to a physician's smartphone
increase chances of duplicate care

transmit ECG data to a physician's smartphone

56
New cards

Which process can reduce expensive redundant tests that are ordered because one provider does not have access to the clinical information stored at another provider's location?

electronic medical records processing
health information exchange
telehealth
clinical decision support

health information exchange

57
New cards

The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment. T/F

False

58
New cards

One of the fundamental ways in which companies can try directly to increase productivity is by:

-increasing the amount of input required to produce a given output
-selling smaller quantities of goods to decrease capacity
-decreasing the value of the output produced by a given amount of input
-consolidating operations to better leverage economies of scale

consolidating operations to better leverage economies of scale

59
New cards

A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system. T/F

True

60
New cards

What type of artificial intelligence involves computer programs that can learn some task and improve performance with experience?

machine learning
robotics
natural language processing
electronic medial record

machine learning

61
New cards

Some 18 percent of private employers surveyed say they have dismissed employees because of something they posted on social media. T/F

True

62
New cards

Social networking Web sites are used strictly to communicate with your friends, family members, and colleagues. T/F

False

63
New cards

Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission is known as which of the following?

cyberporn
cyberabuse
revenge porn
image manipulation

revenge porn

64
New cards

An employer can legally screen applicants based on race or ethnicity. T/F

False

65
New cards

Twitter enables an organization to share short text updates, images, links, polls, and videos. T/F

True

66
New cards

Most social networking Web sites have terms of use agreement that states the Web site has the right to:

post messages about its users
delete material that violates the site's policies
edit material submitted by its users
charge users to view adult material

delete material that violates the site's policies

67
New cards

An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers. T/F

True

68
New cards

Global market research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?

one-half
two-thirds
one-quarter
all

two-thirds

69
New cards

Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating which kind of laws?

discrimination
hiring
protection
recruiting

discrimination

70
New cards

Cyberstalking differs from cyberharassment in that it is aimed at tormenting an individual but does not involve a credible threat of physical harm. T/F

False

71
New cards

What percent of private employers surveyed say that they have dismissed employees because of something they posted on social media?

10 percent
15 percent
18 percent
22 percent

18 percent

72
New cards

A majority of social shopping platforms generate revenue through which of the following?

retailer advertising
sharing with retailers data about their members' like and dislikes
membership fee
Internet service providers

retailer advertising

73
New cards

Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?

47 USC 223
18 USC 2425
18 USC 875(c)
18 USC 2261A

18 USC 2425

74
New cards

Under no conditions can a Web site remove user submitted content as this would be a violation of their right to freedom of speech. T/F

False

75
New cards

Cyberstalking can escalate into physical stalking and even physical assault. T/F

True

76
New cards

Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online. T/F

False

77
New cards

To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in place?

social media policy
acceptable use policy
privacy policy
content code policy

social media policy

78
New cards

A social networking platform creates an online community of Internet users that enables members to break down barriers created by time, distance, and cultural differences. T/F

True

79
New cards

Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts, and recommendations. T/F

False

80
New cards

The National Center for Victims of Crime advises victims to:

-destroy all evidence of any contact with the cyberstalker
-meet in a public place with the cyberstalker to talk things out before involving any law enforcement officers
-not consider getting law enforcement officers involved until the stalker threatens violence
-send the stalker a written notice that their contact is unwanted and that further contact should cease

send the stalker a written notice that their contact is unwanted and that further contact should cease

81
New cards

If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press. T/F

True

82
New cards

What term is used to refer to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements?

coemployment
employee leasing
gig economy
contingent employment

gig economy

83
New cards

Foreign professionals can convert their H-1B visas into permanent green cards. T/F

True

84
New cards

Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.

CMMI
Sarbanes-Oxley Act of 2002
Foreign Corrupt Practices Act
Statement on Standards for Attestation and Engagements No. 16

Statement on Standards for Attestation and Engagements No. 16

85
New cards

The False Claims Act was enacted during which war?

the U.S. Civil War
World War I
World War II
the Vietnam War

the U.S. Civil War

86
New cards

Which of the following is a true statement about the number of declared undergraduate computer science majors based on data from the National Center for Education Statistics?

-There was an increase in enrollment in spite of the forecast for a decreased number of workers in this field.
-There are some 130,000 new computer and information science graduates each year.
-There has been a steady decline in enrollment for the past twelve years.
-The level of enrollment has remained about the same for the past ten years.

There has been a steady decline in enrollment for the past twelve years.

87
New cards

What term is used to identify a form of outsourcing in which services are provided by an organization whose employees are in a foreign country?

Consulting
Employee leasing
Offshore outsourcing
Employing H-1B workers

Offshore outsourcing

88
New cards

An H-1B worker can work for a U.S. employer for a maximum continuous period of how many years?

two
four
six
eight

six

89
New cards

Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?

-Electronic Industry Citizenship Coalition Directive
-Greenpeace Environmental Restriction of Hazardous Substances
-European Union's Restriction of Hazardous Substances Directive
-Electronic Product and Environmental Hazards Restriction Directive

European Union's Restriction of Hazardous Substances Directive

90
New cards

An H-1B visa is a temporary visa granted for people who:

-only work in the IT field
-were educated outside the U.S. and wish to work in the U.S.
-work in specialty occupations that require at least a four-year bachelor's degree
-were born and educated outside the U.S. but have relatives living in the U.S.

work in specialty occupations that require at least a four-year bachelor's degree

91
New cards

Electronics manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials. T/F

True

92
New cards

Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds?

qui tam provision
Affordable Care Act
Foreign Corrupt Practices Act
roving wiretap provision

qui tam provision

93
New cards

Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2014 and 2024?

-Business is facing a long-term excess of trained and experienced IT workers.
-Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions.
-532,000 new jobs are expected to be added to IT related positions.
-IT firms are more likely to turn to traditional sources than nontraditional sources to find IT workers.

532,000 new jobs are expected to be added to IT related positions.

94
New cards

Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded. T/F

False

95
New cards

Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers. T/F

False

96
New cards

A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs. T/F

True

97
New cards

What type of visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations?

H-1B
L-1
B-1
B-2

H-1B

98
New cards

Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur which of the following?

relocation expenses
start-up costs
training costs
travel expenses

training costs

99
New cards

Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function. T/F

False

100
New cards

For which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing?

spike in oil prices
political unrest
limited number of resources
lack of education

political unrest