1/199
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances?
Plagiarism
Copyright infringement
Fair use doctrine
Use of prior art
Fair use doctrine
Reverse engineering can only be applied to computer hardware, not computer software. T/F
False
Which of the following claims as its invention some feature or process embodied in instructions executed by a computer?
trade secret
software patent
cross-licensing agreement
patent infringement
software patent
Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?
Time Warner Cable system
RIAA
DeCSS
Content Scramble System (CSS)
Content Scramble System (CSS)
Firefox and OpenOffice are all examples of which of the following?
Web browsers
utility software
products developed through re-engineering
open source software
open source software
The courts have ruled in favor of using reverse engineering to:
-allow the domination of a particular software market by a single manufacturer
-provide access to protected elements of an original work
-circumvent restrictive trade secrets
-enable interoperability
enable interoperability
One of the tests that an invention must pass to be eligible for a patent is which of the following?
-it must be a machine
-it must not be economical to produce
-it must be capable of providing economic benefit
-it must not be obvious to a person having ordinary skill in the same field
it must not be obvious to a person having ordinary skill in the same field
Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's?
trade secret
watermark
trademark
earmark
trademark
In what year was The Digital Millennium Copyright Act (DMCA) signed into law?
1992
1998
1990
1996
1998
Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use?
-TRIPS Agreement
-Digital Millennium Copyright Act (DMCA)
-WIPO Copyright Treaty
-Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act
Digital Millennium Copyright Act (DMCA)
The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following?
nondisclosure clause
open source license
patent protection
copyright term
open source license
Which of the following established the minimum levels of protection that each country must provide to all WTO members?
-World Trade Organization (WTO)
-Digital Millennium Copyright Act (DMCA)
-The World Intellectual Property Organization (WIPO)
-Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Cybersquatters:
-frequently launch denial-of-service attacks against popular Web sites
-register domain names for famous trademarks or company names to which they have no connection
-remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service
-employ phishing tactics using the domain names of popular Web sites
register domain names for famous trademarks or company names to which they have no connection
What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time?
noncompete agreement
license agreement
nondisclosure agreement
union agreement
noncompete agreement
The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement. T/F
True
Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights. T/F
True
Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. T/F
True
A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators. T/F
False
Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to-file" system?
Economic Espionage Act
Lanham Act
Uniform Trade Secrets Act
Leahy-Smith America Invents Act
Leahy-Smith America Invents Act
Which of the following can read the machine language of a software program and produce the source code?
compiler
open source decoder
re-engineering device
decompiler
decompiler
Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk. T/F
True
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?
quantitatively managed
managed
defined
initial
initial
After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?
QA
software development methodology
software quality management
CMMI-DEV
CMMI-DEV
A type of business system which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio is known as which of the following?
upgrade management system
decision support system
executive information system
data information system
decision support system
Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes. T/F
True
A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so. T/F
True
In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log. T/F
False
An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following?
order-processing systems
decision support systems
software development systems
quality assurance systems
order-processing systems
An important technique used to develop ISO 9001-compliant quality systems by both evaluating reliability and determining the effects of system and equipment failures is which of the following?
DO-178B/EUROCCAE ED-128
N-version programming
Failure mode and effects analysis (FMEA)
Capability Maturity Model Integration (CMMI)
Failure mode and effects analysis (FMEA)
Under the doctrine of supervening event, the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury. T/F
True
Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known. T/F
False
Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation. T/F
True
A failure mode describes how a product or process could fail to perform the desired functions described by the customer. T/F
True
In integration testing, special software programs called static analyzers are run against the new code. T/F
False
Which of the following is an approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times, where N could be 2, 3, 4, or more?
Acceptance programming
Risk management programming
N-version programming
Avoidance programming
N-version programming
When forced to choose between adding more user features and doing more testing, most software companies decide in favor of more testing. T/F
False
The safety engineer uses a logging and monitoring system to track which of the following?
standards
objectives
hazards
deliverables
hazards
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers?
high-volume data storage
low-volume data storage
unpredictable-volume data storage
irregular-volume data storage
high-volume data storage
When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss?
breach of warranty
misrepresentation
strict liability
negligence
negligence
Software quality is defined as the degree to which a software product meets:
the needs of its users.
the standards of its competitors.
sustainability and environmental protection needs.
the minimum financial return standards.
the needs of its users.
Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites?
Store-and-forward telemedicine
Live telemedicine
Electronic consultation
Remote monitoring
Live telemedicine
It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms. T/F
False
There are thousands of mobile applications available to improve patient's access to healthcare information and to enable doctors to keep a close watch on patients' conditions. T/F
True
Researchers have found that it can take how long for IT investment to result in a significant increase in productivity?
less than three years
more than 10 years
five to seven years
only a few months
five to seven years
Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation. T/F
True
Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs. T/F
False
Live telemedicine requires the presence of patients and healthcare providers at the same site. T/F
False
Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care. T/F
False
Innovation is a key factor in productivity improvement. Which of the following has played an important role in enabling innovation?
productivity
economy
research and statistics
information technology
information technology
Today most radiologists employ a personal health record system to review cases from a remote location. T/F
False
The information in an EHR is not easily shared with others outside of the healthcare organization where the data originated. T/F
False
What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?
telemedicine system
computerized provider order entry (CPOE) system
clinical decision support (CDS) system
health information exchange (HIE) system
computerized provider order entry (CPOE) system
More advanced artificial-intelligence-based clinical decision support systems can help doctors choose the proper dosage levels of medication based on a patient's most recent tests results. T/F
True
IT investments may produce tangible results such as:
improved quality
improved reliability
cost savings
improved service
cost savings
Which of the following examples is a use of wireless technology in the healthcare field?
provide the public access to a patient's medical history
provide access to Medicare and Medicaid reimbursements
transmit ECG data to a physician's smartphone
increase chances of duplicate care
transmit ECG data to a physician's smartphone
Which process can reduce expensive redundant tests that are ordered because one provider does not have access to the clinical information stored at another provider's location?
electronic medical records processing
health information exchange
telehealth
clinical decision support
health information exchange
The types of work-related activities best suited for automation include activities associated with managing others, applying expertise in making decisions and offering recommendations, interacting with stakeholders, and performing physical activities in an unstructured and unpredictable environment. T/F
False
One of the fundamental ways in which companies can try directly to increase productivity is by:
-increasing the amount of input required to produce a given output
-selling smaller quantities of goods to decrease capacity
-decreasing the value of the output produced by a given amount of input
-consolidating operations to better leverage economies of scale
consolidating operations to better leverage economies of scale
A PHR can exist either as a stand-alone application that allows information to be exported to or imported from other sources or as a "tethered" application connected to a specific healthcare organization's information system. T/F
True
What type of artificial intelligence involves computer programs that can learn some task and improve performance with experience?
machine learning
robotics
natural language processing
electronic medial record
machine learning
Some 18 percent of private employers surveyed say they have dismissed employees because of something they posted on social media. T/F
True
Social networking Web sites are used strictly to communicate with your friends, family members, and colleagues. T/F
False
Inappropriate material posted online includes nonconsensual posts that comprise intimate photos or videos of people without their permission is known as which of the following?
cyberporn
cyberabuse
revenge porn
image manipulation
revenge porn
An employer can legally screen applicants based on race or ethnicity. T/F
False
Twitter enables an organization to share short text updates, images, links, polls, and videos. T/F
True
Most social networking Web sites have terms of use agreement that states the Web site has the right to:
post messages about its users
delete material that violates the site's policies
edit material submitted by its users
charge users to view adult material
delete material that violates the site's policies
An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers. T/F
True
Global market research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?
one-half
two-thirds
one-quarter
all
two-thirds
Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating which kind of laws?
discrimination
hiring
protection
recruiting
discrimination
Cyberstalking differs from cyberharassment in that it is aimed at tormenting an individual but does not involve a credible threat of physical harm. T/F
False
What percent of private employers surveyed say that they have dismissed employees because of something they posted on social media?
10 percent
15 percent
18 percent
22 percent
18 percent
A majority of social shopping platforms generate revenue through which of the following?
retailer advertising
sharing with retailers data about their members' like and dislikes
membership fee
Internet service providers
retailer advertising
Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?
47 USC 223
18 USC 2425
18 USC 875(c)
18 USC 2261A
18 USC 2425
Under no conditions can a Web site remove user submitted content as this would be a violation of their right to freedom of speech. T/F
False
Cyberstalking can escalate into physical stalking and even physical assault. T/F
True
Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online. T/F
False
To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in place?
social media policy
acceptable use policy
privacy policy
content code policy
social media policy
A social networking platform creates an online community of Internet users that enables members to break down barriers created by time, distance, and cultural differences. T/F
True
Paid media marketing refers to the media exposure an organization gets through press and social media mentions, positive online ratings, and reviews, tweets and retweets, reposts, and recommendations. T/F
False
The National Center for Victims of Crime advises victims to:
-destroy all evidence of any contact with the cyberstalker
-meet in a public place with the cyberstalker to talk things out before involving any law enforcement officers
-not consider getting law enforcement officers involved until the stalker threatens violence
-send the stalker a written notice that their contact is unwanted and that further contact should cease
send the stalker a written notice that their contact is unwanted and that further contact should cease
If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press. T/F
True
What term is used to refer to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements?
coemployment
employee leasing
gig economy
contingent employment
gig economy
Foreign professionals can convert their H-1B visas into permanent green cards. T/F
True
Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement.
CMMI
Sarbanes-Oxley Act of 2002
Foreign Corrupt Practices Act
Statement on Standards for Attestation and Engagements No. 16
Statement on Standards for Attestation and Engagements No. 16
The False Claims Act was enacted during which war?
the U.S. Civil War
World War I
World War II
the Vietnam War
the U.S. Civil War
Which of the following is a true statement about the number of declared undergraduate computer science majors based on data from the National Center for Education Statistics?
-There was an increase in enrollment in spite of the forecast for a decreased number of workers in this field.
-There are some 130,000 new computer and information science graduates each year.
-There has been a steady decline in enrollment for the past twelve years.
-The level of enrollment has remained about the same for the past ten years.
There are some 130,000 new computer and information science graduates each year.
What term is used to identify a form of outsourcing in which services are provided by an organization whose employees are in a foreign country?
Consulting
Employee leasing
Offshore outsourcing
Employing H-1B workers
Offshore outsourcing
An H-1B worker can work for a U.S. employer for a maximum continuous period of how many years?
two
four
six
eight
six
Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging?
-Electronic Industry Citizenship Coalition Directive
-Greenpeace Environmental Restriction of Hazardous Substances
-European Union's Restriction of Hazardous Substances Directive
-Electronic Product and Environmental Hazards Restriction Directive
European Union's Restriction of Hazardous Substances Directive
An H-1B visa is a temporary visa granted for people who:
-only work in the IT field
-were educated outside the U.S. and wish to work in the U.S.
-work in specialty occupations that require at least a four-year bachelor's degree
-were born and educated outside the U.S. but have relatives living in the U.S.
work in specialty occupations that require at least a four-year bachelor's degree
Electronics manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials. T/F
True
Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds?
qui tam provision
Affordable Care Act
Foreign Corrupt Practices Act
roving wiretap provision
qui tam provision
Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2014 and 2024?
-Business is facing a long-term excess of trained and experienced IT workers.
-Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions.
-532,000 new jobs are expected to be added to IT related positions.
-IT firms are more likely to turn to traditional sources than nontraditional sources to find IT workers.
532,000 new jobs are expected to be added to IT related positions.
Violators of the False Claims Act are liable for the exact dollar amount for which the government was defrauded. T/F
False
Unethical companies cannot use H-1B visas to exploit the average salary requirements for H-1B workers. T/F
False
A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs. T/F
True
What type of visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations?
H-1B
L-1
B-1
B-2
H-1B
Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur which of the following?
relocation expenses
start-up costs
training costs
travel expenses
training costs
Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function. T/F
False
For which of the following reasons has Egypt become a less attractive country as a source of IT outsourcing?
spike in oil prices
political unrest
limited number of resources
lack of education
political unrest