forked from Sharp-Team/chia-khoa-thanh-cong-fpt
-
Notifications
You must be signed in to change notification settings - Fork 0
/
ITE303.txt
2020 lines (2019 loc) · 312 KB
/
ITE303.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
QN=1 Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the ____ by which a society lives. | moral code
QN=2 A set of beliefs about right and wrong behavior within a society is called ____. | ethics
QN=3 Arthur Andersen, once a major international accounting firm, was indicted for obstruction of justice, lost its auditing license, and eventually closed its U.S. offices based on the actions of a few employees even though they were performing in a manner contrary to corporate policy and their employer's directions. This is an example of the principle called respondeat superior or ____. | "let the master answer."
QN=4 In 2007, ____ of all software in circulation worldwide was pirated. | around 38%
QN=5 ____ had one of the highest software piracy rates in 2007. | Armenia
QN=6 Habits that incline people to do what is acceptable are called ____. | virtues
QN=7 ____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs. | Morals
QN=8 ____ is a system of rules that tells us what we can and cannot do. | Laws
QN=9 ____ hired private investigators to identify members of its board of directors who were responsible for leaking confidential company information to the press. | Hewlett-Packard
QN=10 Someone who stands to gain or lose, depending on how a situation is resolved is called a(n) ____. | stakeholder
QN=11 Companies that develop and maintain strong employee relations ____. | suffer lower turnover rates
QN=12 A judge found ____ guilty of not providing timely on-site technical support that customers were entitled to and, as a result, lost its place as the world's largest computer manufacturer. | Dell
QN=13 The Department of Justice established sentencing guidelines that suggest more ____ treatment for convicted executives if their companies have ethics programs. | lenient
QN=14 One characteristic of an organization that has a successful ethics program is that ____. | employees are rewarded for ethical behavior.
QN=15 A rapid increase in the appointment of corporate ethics officers typically follows | the revelation of a major business scandal.
QN=16 In a for-profit organization, it is the primary objective of the ____ to oversee the organization's business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community. | Board of Directors
QN=17 While nearly half of all employees surveyed saw some form of ethical misconduct in 2007, less than ____ of those employees reported the misconduct to management. | 60%
QN=18 In a(n) ____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communications its new goals for the upcoming year. | social audit
QN=19 Ethical conduct criteria that could be used in an employee's performance evaluation includes ____. | operating effectively in a multicultural environment
QN=20 ____ is a likely cause of employees feeling "No one will ever know the difference, and if they do, so what?" | Management failing to hold people accountable for unethical actions
QN=21 The step in the five-step decision-making process during which the decision maker (s) consider laws, guidelines, policies, and principles that might apply to the decision is the ____ step. | evaluate and choose alternative
QN=22 The step of the five-step decision process during which those who will be affected by the decision are identified is the ____ step. | develop problem statement
QN=23 Part of developing a good problem statement includes ____. | determining who is directly affected by the problem
QN=24 An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a common set of values and goals is the ____ approach. | common good
QN=25 An approach to ethical decision making that states you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected is the ____ approach. | utilitarian
QN=26 From a legal perspective, IT workers are not recognized as professionals because they are not ____ by the state or federal government. | licensed
QN=27 Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional. | malpractice
QN=28 As a result of increased ____, clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices. | connectivity
QN=29 As a result of improved ____, clients are able to break down their business processes into their fundamental steps and decide which they will perform themselves and which they will outsource to service providers. | modularization
QN=30 The mission of the Business Software Alliance is to ____. | stop the unauthorized copying of software
QN=31 Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work. | $100,000
QN=32 A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential. | trade secret
QN=33 Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____. | public interest
QN=34 Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____. | the company
QN=35 To prove fraud in a court of law, prosecutors must demonstrate that ____. | the accused made a false representation of a material fact
QN=36 ____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract. | Material breach of contract
QN=37 Accepting payment of entry fees for a golf tournament from a supplier is ____. | could be perceived as a bribe
QN=38 The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____. | lawful under the laws of the foreign country in which it was paid
QN=39 The Foreign Corrupt Practices Act permits facilitating payments so that an official performs or makes a(n) ____. | official function faster
QN=40 Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume. | 30%
QN=41 An IT professional organization whose mission is to provide superior leadership and education in information technology and that has a goal to help its members make themselves more marketable within their industry is ____. | AITP
QN=42 Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the ____. | certifying organization
QN=43 A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the ____ level and often requires that the recipient pass a test of some kind. | state
QN=44 The obligation to protect people against any unreasonable harm or risk is called ____. | duty of care
QN=45 Because there are no ____ against which to compare a software engineer's professional behavior, he or she cannot be subject to malpractice lawsuits. | uniform standards
QN=46 A device that limits access to the company's network based on the organization's Internet usage policy is called a(n) ____. | firewall
QN=47 Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making. | core values and beliefs
QN=48 IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____. | information
QN=49 A feature that is associated with a bribe is that a bribe ____. | encourages an obligation for the recipient
QN=50 If misrepresentation causes a party to enter into a contract, that party may have the legal right to ____. | cancel the contract and seek reimbursement for damages
QN=51 The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some �4.9 billion was ____. | Jerome Kerviel
QN=52 ____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007. | Instant messaging abuse
QN=53 A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability. | exploit
QN=54 Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem. | patch
QN=55 Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots. | exploits
QN=56 ____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates. | Macro
QN=57 ____ was a worm that was released in 2007 and caused billions of dollars in damages. | Storm
QN=58 ____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date. | Logic bomb
QN=59 A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in. | distributed denial-of-service
QN=60 It is estimated that about one in ____ personal computers in the United States is part of a botnet. | four
QN=61 The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file. | dropper
QN=62 Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____. | valid test results
QN=63 ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people. | E-mail spam
QN=64 Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts. | bot
QN=65 Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act. | CAN-SPAM
QN=66 ____ have become the primary means for distributing spam, malware, and phishing scams. | Botnets
QN=67 The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain. | cybercriminal
QN=68 ____ is an annual gathering in Las Vegas of computer hackers. | DEFCON
QN=69 Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____. | cyberterrorism
QN=70 The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications. | US Code Title 18, Part I, Chapter 121
QN=71 ____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing. | Microsoft
QN=72 A strong security program begins by ____. | assessing the threats to an organization's computers and network
QN=73 Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations. | mitigated
QN=74 The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved. | reasonable assurance
QN=75 A security policy outlines what needs to be done but not ____ to do it. | how
QN=76 The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services. | National Institute of Standards and Technology
QN=77 Installation of a(n) ____ is the most common computer security precaution taken by businesses. | firewall
QN=78 The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks. | U.S. Computer Emergency Readiness Team
QN=79 A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____. | intrusion detection system
QN=80 A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network. | intrusion prevention system
QN=81 The concept of privacy is ____. | protected by a number of amendments in the Bill of Rights
QN=82 The Supreme Court has ruled that ____. | without a reasonable expectation of privacy, there is no privacy right
QN=83 The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained. | Fair Credit Reporting Act
QN=84 The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions. | Gramm-Leach-Bliley Act
QN=85 Under the ____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected. | Gramm-Leach-Bliley Act
QN=86 Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records. | written consent
QN=87 The Children's Online Privacy Protection Act ____. | does not cover the dissemination of information to children
QN=88 The Foreign Intelligence Surveillance Act ____. | Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party
QN=89 The ____, passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act establishes a requirement for court-approved law enforcement use of a pen register or trap and trace. | Electronic Communications Privacy Act
QN=90 The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public. | Electronic Communications Privacy Act
QN=91 Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps. | Communications Assistance for Law Enforcement Act
QN=92 The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records. | USA PATRIOT Act
QN=93 A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored. | roving wiretap
QN=94 Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation. | National Security Letter
QN=95 In Doe v. Holder, the courts ruled that the NSL gag rule (prohibits NSL recipients from informing anyone that the government has secretly requested his or her records) violates the ____. | First Amendment
QN=96 A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law. | sunset provision
QN=97 The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt. | Fair Information Practices
QN=98 The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's. | European Union Data Protection Directive
QN=99 The ____ seal program identifies online businesses that honor their own stated privacy protection policies. | BBBOnLine
QN=100 For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organization's oversight and consumer resolution process, and pay an annual fee. | TRUSTe
QN=101 The ____ enables the public to gain access to certain government records. | Freedom of Information Act
QN=102 The ____ prohibits the government from concealing the existence of any personal data record-keeping systems. | Privacy Act
QN=103 ____ is one of the fastest growing forms of fraud in the United States, directly impacting over 4% of the overall U.S. adult population in 2008 with a resulting loss of $48 billion. | Identity theft
QN=104 ____ is keystroke-logging software downloaded to users' computers without the knowledge or consent of the user. | Spyware
QN=105 ____ is information gathered by monitoring a consumer's online activity. | Click-stream data
QN=106 ____ uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views and product information to display when a user visits a Web site. | Rules-based personalized software
QN=107 A screening technology called ____ helps shield users from sites that do not provide the level of privacy protection they desire. | Platform for Privacy Preferences
QN=108 The institution and communication of an ____ establishes boundaries of acceptable behavior and enables managers to take action against violators. | IT usage policy
QN=109 The ____ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees. | Fourth Amendment
QN=110 In order to avoid Fourth Amendment issues with the use of advanced surveillance technology to track people in public places, advocates of such technology argue that people ____. | have no legitimate expectation of privacy in public
QN=111 The First Amendment protects American's rights to freedom of religion and ____. | freedom of expression
QN=112 The Supreme Court has held that this form of speech is not protected by the First Amendment and may be forbidden by the government: ____. | perjury
QN=113 Miller v. California is the Supreme Court case that established a test to determine ____. | if material is obscene
QN=114 The problem with the Communications Decency Act was its broad language and vague definition of ____, resulting in the Act being ruled unconstitutional. | indecency
QN=115 After a three judge federal panel ruled unanimously that the Communications Decency Act unconstitutionally restricted ____, the government appealed to the Supreme Court in a case that became known as Reno v. ACLU. | free speech
QN=116 Privacy advocacy groups such as the Electronic Privacy Information Center, the ACLU, and the Electronic Frontier Foundation claimed that the language in the Child Online Protection Act was overly vague and limited the ability of ____ to access material protected under the First Amendment. | adults
QN=117 The ____ Act is still in effect and has not been ruled unconstitutional. | Children's Internet Protection
QN=118 Organizations may direct their network administrators to install a(n) ____ on employee's computers to prevent them from viewing sites that contain pornography or other objectionable material. | Internet filter
QN=119 In the Internet Content Rating Association's Web site rating scheme, ____ fill out an online questionnaire to describe the content of the Web site. | Web site authors
QN=120 The Children's Internet Protection Act ____. | attempted to protect children from accessing pornography and other explicit material online
QN=121 Proponents of the Children's Internet Protection Act argued that ____. | schools and libraries could elect to not implement the program, they just would not receive Federal money for Internet access
QN=122 Implementing the Children's Internet Protection Act is more difficult for a library than a school because ____. | the library's services are open to people of all ages
QN=123 In United States v. American Library Association, the Supreme Court, in a 6-3 decision, held that public libraries ____. | must purchase filtering software and comply with all portions of the Children's Internet Protection Act
QN=124 Anonymous expression is ____. | the expression of opinions by people who do not reveal their identity
QN=125 Anonymous expression in the U.S. began around the time of ____. | the American Revolution
QN=126 ____ was a printer who was prosecuted for seditious libel because s(he) refused to reveal the names of anonymous authors whose writings were critical of the governor of new York. | John Zenger
QN=127 A pamphlet called ____ was published by Thomas Paine and critiqued the British monarchy and urged the colonies to become independent. | Common Sense
QN=128 One of the first rulings by the Supreme Court to address anonymity as an aspect of the Bill or Rights was the 1958 case ____. | NAACP v. Alabama
QN=129 In U.S. Navy v. America Online, a sailor used a pseudonym to post information that ____. | suggested that he might be gay
QN=130 A(n) ____ is a numeric identifier assigned to each computer connected to the Internet. | IP address
QN=131 Internet users who want to remain anonymous can send e-mail to a(n) ____ service, which uses software to strip the originating IP address from the message. | anonymous remailer
QN=132 An organization's IT department can set up a(n) ____ to prohibit employees from accessing remailers. | firewall
QN=133 The use of a remailer keeps communications anonymous; what is communicated, and whether it is ethical or legal, ____. | is up to the user of the remailer
QN=134 A(n) ____ is often filed against a defendant whose identity is temporarily unknown. | John Doe lawsuit
QN=135 In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment. Legal recourse is possible only when that speech turns into clear threats and intimidation against ____. | specific citizens
QN=136 The ____ is the trade group that represents the U.S. recording industry. | RIAA
QN=137 These objects are protected under patent law: ____. | inventions
QN=138 Copyright and patent protection was established through ____. | the U.S. Constitution
QN=139 The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection. | expression
QN=140 The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will ____ to protect American innovation. | go the extra mile
QN=141 The ____ requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations. | TRIPS agreement
QN=142 Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use. | Digital Millennium Copyright Act
QN=143 One of the tests that an invention must pass to be eligible for a patent is ____. | it must not be obvious to a person having ordinary skill in the same field
QN=144 The U.S. Supreme Court has ruled that there are ____ classes of items that cannot be patented. | three
QN=145 Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for "one-click shopping," based on the use of a shopping cart purchase system for electronic commerce. | Amazon.com
QN=146 In 2009, ____ announced that it would donate some 3,000 patents for free use by developers to help them innovate and build new hardware and software. The announcement represented a major shift in this firm's intellectual property strategy and was meant to encourage other patent holders to donate their own intellectual property. | IBM
QN=147 A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a(n) ____. | submarine patent
QN=148 One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____. | there is no need to file an application or disclose the trade secret to gain protection
QN=149 ____ can qualify for trade secret protection under the Uniform Trade Secrets Act. | Both computer hardware and software
QN=150 A(n) ____ prohibits an employee from working for any competitors for a period of time. | noncompete agreement
QN=151 The process of taking something apart in order to understand it, build a copy of it, or improve it is called ____. | reverse engineering
QN=152 A(n) ____ can read the machine language of a software program and produce the source code. | decompiler
QN=153 The courts have ruled in favor of using reverse engineering to enable ____. | interoperability
QN=154 7-zip, Audacity, Blender 3D, eMule, Eraser, and Firefox are all examples of ____. | open source software
QN=155 Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ____. | competitive intelligence
QN=156 A(n) ____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. | trademark
QN=157 The ____ Act enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts. | Anticybersquatting Consumer Protection
QN=158 Cybersquatters ____. | register domain names for famous trademarks or company names to which they have no connection
QN=159 Under the ACPA, trademark holders can seek civil damages of up to ____ from cybersquatters that register their trade names or similar-sounding names as domain names. | $100,000
QN=160 The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program's code, the software ____. | improves
QN=161 One cause for the delay of the Boeing 787 Dreamliner was the ____. | inability to trace lines of code back to specific system requirements for the braking system
QN=162 This organization was forced to notify more than 800,000 borrowers that a software installation error had resulted in a miscalculation of their loans and that their payments would increase. | Sallie Mae
QN=163 The objective of quality management is to ____. | deliver high-quality systems that meet the needs of their users
QN=164 The first release of any software ____. | rarely meets all its users' expectations
QN=165 A primary cause of poor software quality is that ____. | many developers do not know how to design quality into software from the very start
QN=166 The degree to which a software product meets the needs of its users is called software ____. | quality
QN=167 It is estimated that the Microsoft Vista operating system ____. | took over five years to develop
QN=168 Additional features in a new release of software ____. | make it more useful and easier to sell
QN=169 Software used to control many industrial processes in an effort to reduce costs, eliminate human error, improve quality, and shorten the time it takes to manufacture products is called a(n) ____. | process control system
QN=170 There is no federal product liability law; instead, product liability is mainly covered by common law and ____ which deals with the sale of goods. | Article 2 of the Uniform Commercial Code
QN=171 When sued for negligence, a software developer is not held responsible for every product defect that could have been detected that causes customer or third-party loss. Instead, responsibility is limited to ____. | harmful defects that could have been detected and corrected through "reasonable" software development practices
QN=172 Under the doctrine of supervening event, ____. | the original seller is not liable if the software was materially altered after it left the seller's possession and the alteration caused the injury
QN=173 A(n) ____ requires several standards must be met including; the goods must be fit for the ordinary purpose for which they are used, the quality of the goods must pass without objection in the trade, and the goods must meet a fair average or middle range of quality. | implied warranty of merchantability
QN=174 The plaintiff must have a ____ that the supplier did not fulfill in order to win a breach-of-warranty claim. | valid contract
QN=175 ____ occurs when a seller or lessor either misrepresents the quality of a product or conceals a defect in it. | Intentional misrepresentation
QN=176 ____ is a standard, proven work process that enables project team members to make controlled and orderly progress in developing high-quality software. | Software development methodology
QN=177 One approach to quality assurance is to test the code of a completed unit of software by actually entering test data and comparing the results to the expected results. This is called ____. | dynamic testing
QN=178 After successful unit testing, the software units are combined into an integrated subsystem that undergoes rigorous testing to ensure that the linkages among the various subsystems work successfully. This form of testing is called ____. | integration testing
QN=179 ____ defines five levels of software development maturity and identifies the issues that are most critical to software quality and process improvement. | Capability Maturity Model Integration-Dev
QN=180 After an organization decides to adopt CMMI-DEV, it must ____. | conduct an assessment of its software development practices
QN=181 Even with safety precautions in place, the software associated with safety-critical systems ____. | is vulnerable to errors that can lead to injury or death
QN=182 When developing safety-critical software ____. | a project safety engineer maintains a hazard log
QN=183 Risk involves the measurement or assessment of two parameters, the probability of an undesirable event occurring and ____. | the magnitude of the event's consequences
QN=184 To obtain the ____ certificate, an organization must submit to an examination by an external auditor and have written procedures for all processes, follow those procedures, and prove to an auditor that it has fulfilled these requirements. | ISO 9000
QN=185 ____ describes how a product or process could fail to perform the desired function described by the customer. | FMEA
QN=186 The most widely used measurement of the material standard of living is _____. | gross domestic product per capita
QN=187 In the United States, labor productivity growth has averaged about _____ percent per year for the past century. | 2%
QN=188 Today, organizations are trying to improve IT systems and business processes that have already gone through several rounds of improvement. This makes it difficult to measure significant improvements in _____. | productivity
QN=189 Labor productivity in the United States remained relatively high despite a(n) _____ level of investment in IT from 1999 to 2004. | reduced
QN=190 U.S. regulations make it easier for companies to hire and fire workers and to start and end business activities compared to many other industrialized nations. This flexibility makes it easier for markets to relocate workers to _____ firms and sectors. | more productive
QN=191 The goal of telework is to allow employees to be effective and productive from _____. | wherever they are
QN=192 In the United States, it is estimated that there are roughly _____ employees who telework more than eight hours per week. | 14 million
QN=193 _____ is one of the advantages of teleworking for organizations. | Telework allows for the continuity of business operations in the event of a disaster
QN=194 Of the roughly 1 billion Internet users worldwide, only _____ are estimated to live in less developed nations. | 20 million
QN=195 As of 2007, what percent of all U.S. heads-of-household have never used e-mail? | about 20%
QN=196 _____ is the European country with the greatest percentage of people using the Internet. | The Netherlands
QN=197 _____ is the European country with the smallest percentage of population using the Internet. | Poland
QN=198 The _____ program was launched in recognition that the ability to use computers and access the Internet is a requirement for succeeding in the U.S. educational system and global workforce. | Ed-Tech
QN=199 A University of Chicago study found that the E-Rate program led to _____ in California students' scores in the six subjects covered by the Stanford Achievement Test. | no change
QN=200 One Laptop per Child is a nonprofit organization whose goal is to provide children around the world with low cost computers costing less than _____ to aid in their education. | $100
QN=201 _____ of the roughly 1.0 billion people around the world who earn less than $1,000 USD per year have access to a computer. | Nearly 0%
QN=202 _____ created a competitor to the OLPC laptop computer called the classmate PC. | Intel
QN=203 _____ This is one advantage that a cell phone has over a personal computer that leads industry experts to believe that it will be the cell phone that will ultimately bridge the digital divide. | The infrastructure needed to connect wireless devices to the Internet is easier and less expensive to build.
QN=204 The healthcare industry invests about _____ in IT for each worker, compared with nearly $15,000 per worker in the banking industry. | $3,000
QN=205 A 1999 report by the Institute of Medicine found that 98,000 Americans die annually due to preventable medical errors. A 2009 Consumers Union report claims that we have _____ the number of such deaths. | made no change in
QN=206 A 2006 Institute of Medicine report concluded that more than _____ preventable medication errors per year cost the United States about $3.5 billion annually. | 1.5 million
QN=207 In a Commonwealth Fund study of 41 Texas hospitals that treat a diverse group of patients, researchers found that when physicians electronically entered patient care instructions, there was a _____ reduction in the likelihood of death related to some procedures. | 50%
QN=208 As part of the $787 billion 2009 economic stimulus plan, the federal government earmarked $33 billion in incentives for healthcare providers to implement government certified, interoperable _____ systems by 2015. | Electronic Health Records
QN=209 The two basic forms of telemedicine are _____. | store-and-forward and live
QN=210 A patient should _____ because of something he or she reads on a medical information Web site. | never disregard professional medical advice
QN=211 Twitter _____. | has had problems related to its rapid growth
QN=212 Shortly after the 2009 Iranian election, the U.S. State Department contacted Twitter and asked the company to _____. | delay a scheduled software upgrade that would have cut off daytime service in Iran
QN=213 A _____ is a site whose purpose is to create an online community of Internet users that enables members to break down barriers created by time, distance, and cultural differences. | Social networking Web site
QN=214 Members of a social networking Web site may use the site to interact with _____. | people they know and people who they would like to meet
QN=215 _____ of teenagers in the U.S. use social networking Web sites. | About 65%
QN=216 _____ involves the use of social networks to inform, promote, and communicate the benefits of products and services. | Social network advertising
QN=217 _____ created its own social networking Web site, IdeaStorm, as a means for its millions of customers around the world to talk about new products, services, or improvements they would like. | Dell
QN=218 Hotmail created what is recognized by many as the most successful _____ campaign ever when it first launched its service in 1996. | viral marketing
QN=219 Of those hiring managers who use social networking Web sites to screen candidates, _____ have found information that made them drop a candidate from consideration. | about one-third
QN=220 Employers can legally reject a job applicant based on the contents of the individual's social networking profile as long as the company is not violating federal or state _____ laws. | discrimination
QN=221 _____ is a social shopping Web site that implemented a reward system for members in which they are paid a commission each time another shopper acts on their recommendations to purchase a specific item. | Stuffpit
QN=222 Social shopping Web sites generate revenue through _____. | both retail advertising and sharing with retailers data about their members' likes and dislikes
QN=223 Recent survey results show that _____ of students ages 13-17 had experienced cyberbullying within the last year. | about 43%
QN=224 Several states have enacted laws to curb bullying by calling on schools districts to _____ regarding cyberbullying and punishment. | develop policies
QN=225 When school authorities do get involved in an effort to discipline students for cyberbullying, they are sometimes sued for violating the student's right to free speech, especially if the activity involved _____. | occurred off school premises
QN=226 Estimates from Internet safety groups reveal an increasing number of cyberstalking reports with _____ reports per day for help from victims of cyberstalking. | 50 to 500
QN=227 The National Center for Victims of Crime offers this advice for cyberstalking victims ____. | send the stalker a written notice that their contact is unwanted and that further contact should cease
QN=228 MySpace purged _____ sex offenders from its site over a period of two years. | 90,000
QN=229 Most social networking Web sites have a terms of user agreement that states the Web site has the right to _____. | delete material that violates the site's policies
QN=230 About _____ of material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting. | 10 hours
QN=231 On May 20, 2009, an organized group of users uploaded video clips of _____ to YouTube tagged with child-friendly identifiers. | explicit adult content
QN=232 Avatars can earn virtual money by _____. | performing some task in the virtual world or using real cash to purchase virtual cash
QN=233 Bad deeds done in a virtual online world can be mediated by _____, who can take action according to the rules of the game and with consequences internal to the game | game administrators
QN=234 _____ built a simulation of a Combat Information Center of a command and control ship for the Seventh Fleet in Second Life to provide a real-to-life training experience for its future operators. | Northrop Grumman Corporation
QN=235 Online muggings and sex crimes in a virtual world can cause real life anguish for the human owners of the avatars involved. Such acts _____ rise to the level of a real life crime. | may or may not
QN=236 Which of the following is a true statement about the number of declared undergraduate computer science majors at doctoral granting computer science departments? | there was a decline in enrollment in spite of the forecast for an increased number of workers in this field
QN=237 Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2006 and 2014? | Jobs related to networking and data communications analysis had the highest forecasted growth rate at 50 percent.
QN=238 Which of these statements about contingent workers is true? | A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs.
QN=239 A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called _____. | a coemployment relationship
QN=240 The IT consulting firm with the most employees is _____. | IBM
QN=241 Because contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _____. | training expenses
QN=242 One potential disadvantage of using contingent workers is that _____. | they may not feel a strong connection to the company for which they are working
QN=243 Another disadvantage of using contingent workers is that _____. | contingent workers may pass on information about corporate processes and strategies to subsequent clients who could be competitors
QN=244 The _____ lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime. | Viscaino v. Microsoft
QN=245 The key lesson from Viscaino v. Microsoft is that _____. | even if contractors sign an agreement indicating that they are contractors and not employees, the deciding factor is not the agreement but the degree of control the company exercises over the employees
QN=246 Which of the following actions is recommended to avoid potential coemployment issues with contingent workers _____. | Avoid training contingent workers.
QN=247 An H-1B visa is a temporary visa granted for people who _____. | work in specialty occupations that require at least a four-year bachelor's degree
QN=248 An H-1B worker can work for a U.S. employer for a maximum continuous period of _____ years. | six
QN=249 After a worker's H-1B visa expires, the foreigner must _____. | remain outside the United States for one year before another H-1B petition will be approved
QN=250 Congress has set the number of H-1B visas to be granted at _____ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees. | 65,000
QN=251 When considering the use of H-1B workers, companies should take into account that even highly skilled and experienced H-1B workers may required help with _____. | their English
QN=252 Heads of U.S. companies continue to complain that they have trouble finding _____ and have urged the USCIS to loosen the reins on visas for qualified workers. | enough qualified IT workers
QN=253 Before a company can apply for an H-1B visa worker, it must file _____. | a Labor Condition Statement
QN=254 Companies applying for H-1B visas must offer a wage that is not _____ less than the average salary for the occupation. | 5%
QN=255 _____ is a form of outsourcing in which services are provided by an organization whose employees are in a foreign country. | Offshore outsourcing
QN=256 _____ is a country known as a leading offshore outsourcing country that is close to the United States, has no language barriers, and has a highly skilled labor pool. | Canada
QN=257 The cost advantage for offshore outsourcing to India used to be 6:1 or more. It is estimated that once this advantage shrinks to _____ or less, cost savings would no longer be an incentive for U.S. offshore outsourcing to India. | 1.5:1
QN=258 The _____ is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement. | statement on Auditing Standards No. 70
QN=259 The _____ allows a private citizen to file a sit in the name of the U.S. government. | qui tam provision
QN=260 The United States has _____ federal law(s) protecting the export of toxic waste. | no
vacation policy; time off for a funeral or illness in the family; tuition reimbursement, can be in... | Relationships Between IT Workers and Employers
this evaluation may indicate that further refinements are needed., can be found in | evaluate the results
indentify the loss events or the risks or threats that could occur, such as a distributed denial-of-service attack or insider fraud, is step....of risk assessment | 2
the code of ethics focusses employees on areas of ethical risk relating to their role in the organization, offers guidance to help them recognize and deal with ethical issues | true
an increasing number of web sites lock visitors out ... they allow cook-ies to be deposited on their hard drives | unless
determine the impact of each threat occurring. Would the threat have a minor impact on the organization, or could it keep the organization from carrying out its mission for a lengthy period of | 4
software piracy in a corporate setting in sometimes directly traceable to... | it staff members
if an intrusion occurs, there must be a clear reaction plan that addresses... | notification, evidence protection, containment, eradication, activity log maintenance, and recovery
in ....when, and if, the identity becomes known, the complaint is modified to show the correct name(s) of the defendant(s) | john doe lawsuits
provide leadership to overcome resistance to change can be found in step....of ethical decision making | 4
a possible compromise for public libraries with multi- ple computers would be to allow ... internet use for adults but to provide computers with only ... access for children | unrestricted, limited
opponents of the law were concerned that it transferred power over education to ... who develop the internet filters and define which sites to block | private software companies
assess the feasibility of implementing the mitigation options, is step....of risk assessment | 6
a code of ethics cannot gain company-wide acceptance unless it is developed with... | employee participation
utilitarian approach can be applied to the business world by equating the virtues of a good businessperson with those of a good person | false
in relationships between it workers and clients, each party agrees to provide something of secured to the other | false
a good.... answers the following questions: what do people observe that causes them to think there is a problem | problem statement
trustworthy computing is a method of computing that delivers secure, private, and reliable computing experiences based on sound business pratices | true
the sarbanes-oxley act of 2001 was passed in response to public outrage over several major accounting acandals, including those at enron, worldcom | false
the electronic frontier foundation (EFF) represented .... of the john does whose identities were subpoenaed | 2
... occurs when a person consciously decides to induce another person to rely and act on the misrepresentation | Fraudulent misrepresentation
An ... is software that can be used to block access to certain Web sites that con- tain material deemed inappropriate or offensive | Internet filter
It is ideal to enlist the help of others. including ...., to identify several alternative solutions to the problem | Stake- holders
The use of cookies and tracking software is ... because companies can collect information about consumers without their explicit permission | controversial
Congress specifically defined which content or Web sites should be forbidden or which measures should be used�these decisions were left to individual school districts and library systems | FALSE
A code of ethics is a statement that highlights an organization's key ethical issues and iden- tifies the overarching values and principles that are important to the organization and its.... | decision making
A... defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements | security policy
....can include the design of new software code, hardware designs. business plans. the design of a user interface to a computer program. and manufacturing processes | Trade secrets
The IT security group must lead the effort to increase security breaches by implementing security policies and procedures, as well as effectively employing available hardware and software tools | FALSE
Implementing CIPA in libraries is much more easier because a library's services are open to people of all age | True
Board members must create an environment in which employees feel they can seek advice about appropriate business conduct raise issues, and report .... through appropriate channels | misconduct
Ethics training not only makes employees more aware of a company's code of ethics and how to apply it, but also ... | demonstrates that the company intends to operate in an ethical manner
Evaluate alternatives based on multiple criteria, can be found in step....of ethical decision making | 3
It augments click- stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions. is ... | Demographic filtering
The customer changes the scope of the project or the system requirements. can be found in relationship of... | IT Workers and Clients
CIPA does not require the tracking of Internet use by minors or adults | TRUE
In.... additional information such as age and location can be used as ad-selection criteria | Demographic filtering
Falsify the results of a quality assurance test can be found in... | Relationships Between IT Workers and Employers
A group of Web sites served by a single advertising net- work is called a collection of... | affiliated Web sites
Organizations should implement ... systems to catch intruders in the act | detection
Board members are expected to conduct themselves according to the highest standards for personal and professional .... | integrity
Some librarians say they wish they could simply focus on ... | training students and adults to use the Internet safely and wisely.
The goal of is to identify which investments of time and resources will best protect the organization from its most likely and serious threats | risk assessment
There are .. ways to limit or even stop the deposit of cookies on your hard drive | 4
The project manager may want to keep resources flowing into the project and hope that problems can be corrected before anyone notices | TRUE
Marketers use .... to recognize return visitors to their sites and to store useful informa-tion aboutthem | cookies
Schools subject to COPA are required to adopt a policy to monitor the online activities of minors. | FALSE
The responsibility for decision making is shared between client and IT worker | TRUE
Responsibility for compliance�that is. ensuring that ethical procedures are put into place and inconsistently adhered to throughout the organization | FALSE
In a social audit, an organization reviews ... meeting its ethical and social responsibility goals. and communicates its new goals for the upcoming year | how well it is
The security of any system or network is a combination of technology. policy, and rules and requires a wide range of activities to be effective | FALSE
The common good approach to decision making is based on a vision of society as a community whose members work together to achieve a common set of values and goals | TRUE
The goal of personalization software is to turn first-time visitors to a site into ... and to facilitate greater cross-selling activities. | paying customers
Brainstorming with just one other person will reduce your chances of identifying a broad range of alternatives and deter- mining the best solution, can be found in... | Identify Alternatives
This is much easier said than done, since people tend to resist change. can be found in phase... of ethical decision making | Implement Decision
Utilitarian approach focuses on how fairly actions and policies distribute benefits and burdens among people affected by the decision | FALSE
Offers consumer recommendations based on the types of products purchased by other people with similar buying habits. | Collaborative filtering
1) The Fifth Amendment protects | FALSE
2) Today, cryptography is a key | FALSE
3) __ is a tern used to describe works of the mind, such as art, books | Intellectual property
4) __ is the legal authority for electronic | Executive Order 12333
5) According to a study conducted | FALSE
6) The term __ refers to social conventions | morality
7) __ is the science of encoding messages so that only | Cryptography
8) The ancient Greek philosophers | TRUE
9) In September 1999, __ obtained | Amazon.com
10) __ is the crime of obtaining goods | Fraud
11) The term ____ distinguishes the person | IT user
12) The Supreme Court | FALSE
13) The __ was a hotly debated law | Communication Assistance for Law Enforcement Act (CALEA)
14) The __v.ACLU suit | Reno
15) Popular Internet filters include __ | ContentProtect
16) During the Kosovo confict in 1999 | denial-of-service attacks
17) The U.S.Securities | WorldCom
18) In March 2005 | a dozen
19) Despite the importance | anonymity
20) In 1997, Cleveland State | ERP
21) Several cases brought | DMCA
22) An approach to restricting | Internet service provider(ISP)
23) From a legal perspective | licensed
24) Computer virus has became | TRUE
25) Organizations must be on guard | libelous
26) Penalties | $100,000
27) As the number | 100 million
28) A form of inconsistency | moral standards
29) Although smart card are used | TRUE
30) A bribe is a crime even | FALSE
31) Organizations often employ | spoof
32) __,which provides credit card | Authorize.net
33) In August 2005 | Blaster
34) Since the early 1980s | 20,000
35) Penalties for | $2 million
36) Any intrusion detection system | TRUE
37) The use of remailers to enable | TRUE
38) Organizations need basic information | TRUE
39) __ is an effort by an employee | Whistle-blowing
40) bribe made directly from donor to recipient? | FALSE
41) To prevent Internet users | 30,000
42) The Digital Millennium Copyright Act(DMCA) | 1998
43) Gifts encourage | TRUE
44) A __ attack is one in which | denial-of-service
45) __ use illegal means to obtain | Industrial spies
46) The __ to ethical desicion decision | utilitarian appoach
47) The primary functions of a corporate ethics | standards
48) __ gathering has become enough | Competitive intelligence
49) A(n)__ is software | Internet filter
50) An increasing number of companies | TRUE
51) __ is the country | Vietnam
52) Nicholas Ciarelli is an | Apple
53) __ is a distinct possibility | Wireless spamming
54) A(n) __ is a text file | cookie
55) "Man, when perfected," | Aristotle
56) In the utilitarian | the ethical chooice product...
57) IT vendors have become | TRUE
58) Many organizations that operate | TRUE
59) A(n) __ provision terminates | sunset
A(n) _________________ is a moral habit that inclines people to do what is considered acceptable | virtue
The _________________ that socially responsible activities create can make it easier for corporations to conduct their business | goodwill
_________________ means that employees know what is expected of them, and they can employ the organizational values to help them in their decision making | consistency
That an employer can be held responsible for the acts of its employee even if the employee acts in a manner contrary to corporate policy and the employer's direction is based on the principle called _________________ | respondeat superior or "let the master answer"
The public _________________ of an organization strongly influences the value of its stock, how consumers regard its products and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation it receives from its business partners | reputation
The corporate ethics officer provides the organization with _________________ and _________________ in the area of business conduct | vision and leadership
The _________________ is responsible for the careful and responsible management of an organization | Section 406 of the Sarbanes-Oxley Act
The goal of the Sarbanes-Oxley Act was to _________________. | renew investor's trust in the content and preparation of disclosure documents by public companies
_________________ highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision-making process | code of ethics
A(n) _________________ enables an organization to review how well it is meeting its ethical and social responsibility goals, and communicate new goals for the upcoming year. | social audit
_________________ makes employees more aware of a company's code of ethics and how to apply it, as well as demonstrates that the company intends to operate in an ethical manner | formal ethics training
The most important part of the decision-making process is _________________ | problem definition
The _________________ approach to ethical decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected | utilitarian
_________________ is a process for generating a number of alternative solutions to a problem | brainstorming
A professional is someone who | all of the above
Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to _________________ | IT staff
The mission of the Business Software Alliance is to _________________. | stop the unauthorized copying of software produced by its members
Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest | False
_________________ is the crime of obtaining goods, services, or property through deception or trickery | Fraud
R�sum� inflation is a usual and customary practice tolerated by employers. True or False? | False
Society expects professionals to act in a way that | all of the above
_________________ involves providing money, property, or favors to someone in business or government to obtain a business advantage | Bribery
_________________ is a process that one undertakes voluntarily to prove competency in a set of skills | Certification
There are many industry associations and vendor certificate programs for IT workers. True or False | True
_________________ has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do | Negligence
A _________________ states the principles and core values that are essential to the work of a particular occupational group | code of ethics
A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected Web sites. True or False? | True
An attack on an information system that takes advantage of a vulnerability is called a(n) _________________. | exploit
A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is called a(n) _________________. | botnet
A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called a(n): | rootkit
_________________ forces unwanted and often objectionable materials into e-mail boxes, detracts from the ability of Internet users to communicate effectively, and costs Internet users and service providers millions of dollars annually | spam
Software that generates and grades tests that humans can pass but that all but the most sophisticated computer programs cannot is called _________________. | CAPTCHA
A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is called a cyberterrorist. True or False? | False
To date, there are no documented cases of cyberterrorism. True or False? | False
A type of attacker that is extremely difficult to detect or stop because he or she is often authorized to access the very systems being abused is called a(n) _________________. | malicious insider
Concern over potential cyberterrorism began well before the attacks of 9/11. True or False? | True
_________________ is a method of computing that delivers secure, private, and reliable computing experiences | trustworthy computing
The process of assessing security-related risks from both internal and external threats to an organization's computers and networks is called a(n) _________________. | risk assessment
The written statement that defines an organization's security requirements as well as the controls and sanctions used to meet those requirements is known as a: | security policy
Implementation of a strong firewall provides adequate security for almost any network. True or False? | False
A device that works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the company network is called a(n): | intrusion prevention system
A person's virtues and vices help define that ..... | person's ethics
Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a .... | manner that will protect them against anticipated punishment.
Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will NOT protect them against anticipated punishment. | FALSE
An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are .... | important to the organization and its decision making
It is difficult to apply principles and codes of ethics inconsistently across cultures. | FALSE
Companies that are viewed as harmful to their community may find that negative publicity reduces sales, impedes relationships with some business partners, and ... | attracts unwanted government attention.
Companies that are viewed as harmful to their community may find that positive publicity reduces sales, impedes relationships with some business partners, and attracts unwanted government attention. | FALSE
An organization with a successful ethics program is one in which employees are will- ing to seek advice about ethical issues that arise | TRUE
An organization with a successful ethics program is one in which employees are will- ing to ... | post advice about ethical issues that arise
An organization with a successful ethics program is one in which employees are will- ing to seek post advice about unethical issues that arise | FALSE
An organization with a successful ethics program is one in which employees are will- ing to seek advice about unethical issues that arise | FALSE
Managers' behavior and expectations can... employees' ethical behavior | strongly influence
Most of us have developed a simple decision-making model that includes ..... steps | 5
Managers' behavior and expectations can partly influence employees' ethical behavior | FALSE
Most of us have developed a simple decision-making model that includes 4 steps | FALSE
Organizations have at least .... good reasons for promoting a work environment in which they encourage employees to act ethically | 5
Even within the same society, people can have strong .... over important moral issues | disagreements
Even within the same society, people can have strong agreements over important moral issues | FALSE
Four common philosophies are the virtue ethics approach, the utilitarian approach, the fairness approach, and the.... | common good approach
Four common philosophies are the virtue ethics approach, the utilitarian approach, the fairness approach, and the common good approach | TRUE
Even within the same society, people can have ... | strong disagreements over important moral issues
.... can strongly influence employees' ethical behavior | Managers' behavior and expectations
... is one in which employees are will- ing to seek advice about ethical issues that arise | An organization with a successful ethics program
....ensures that ethical procedures are installed and consistently adhered to throughout the organization | The corporate ethics officer
The corporate ethics officer ensures that ethical procedures are installed and consistently adhered to throughout the organization | TRUE
Many courts have ruled that IT workers are not liable for malpractice because ... | they do not meet the legal definition of a professional
IT user is the person for whom a hardware or software product is designed, and that it is the IT professional's duty to deliver products and services that best unmet the users' needs. | TRUE
The key distinguishing factor between a gift and a bribe is that gift should be hidden. | FALSE
Material breach of contract occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract. | TRUE
Mispresentation of contract occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract. | FALSE
From a legal perspective, IT workers are recognized as professionals because they are not licensed by the state or federal government | FALSE
From a legal perspective, IT workers are not recognized as professionals because they are not ... | licensed by the state or federal government
Whistle-blowing is another area that causes problems between employers and IT professionals because whistle-blowers frequently have no special information related to their position. | FALSE
A trade secret is information, generally unknown to the public, that .... | a company has taken strong measures to keep confidential.
A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at ... | the state level and often requires that the recipient pass a test of some kind.
A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the state level and often requires that the recipient pass a test of some kind. | TRUE
A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the national level and often requires that the recipient pass a test of some kind. | FALSE
As a member of the professional services industry, IT workers must be cognizant of ..... major factors that are transforming the professional services industry | 7
..... Is a major factors that are transforming the professional services industry | increased client sophistication
Decreased service sophistication is a major factors that are transforming the professional services industry | FALSE
Increased need for modularization is a major factors that are transforming the professional services industry | TRUE
R�sum� inflation is to ..... | Overpromote candidate's information
Reading news, and playing music in working time means ..... | inappropriate use of IT resources
Give friend way to access your working pc means ..... | inappropriate sharing of information
Install free software in working pc means ..... | inappropriate sharing of information
Install cracked software in working pc means ..... | software piracy
View films and share access to view on cracked software in working pc means ..... | all the above
A code serves as a guideline for ethical decision making, promotes high standards of practice and ethical behavior, enhances trust and respect from the general public, and provides an evaluation benchmark | TRUE
Installation of a(n) firewall is ... | the most common computer security precaution taken by businesses.
The security of information technology used in business is of the utmost importance, but it must be ... against other business needs and issues | balanced
The dropper code portion of a rootkit gets the rootkit installation started and can be easily activated by ... | clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.
Trustworthy computing is a method of computing that delivers secure, private, and reliable computing experiences | secure, private, and reliable
Trustworthy computing is a method of computing that delivers secure, private computing experiences | TRUE
E-mail spam is (are) the abuse of e-mail systems to send .... | Unsolicited e-mail to large numbers of people.
The security of any system is a combination of technology, policy, and people, and it requires a wide range of activities to be effective | TRUE
The security of any system is a combination of technology, policy, and people, and it requires a ... | wide range of activities to be effective
The IT security group must lead the effort to implement security policies and proce- dures, along with ... | hardware and software tools to help prevent security breaches
The key to prevention of a computer security incident is to ..... solution to make computer break-ins so difficult that an attacker eventually gives up | implement a layered security
No security system is perfect, so systems and procedures must be... | monitored to detect a possible intrusion
If an intrusion occurs, there must be a clear reaction plan that addresses notification, evidence protection, activity log maintenance, and... | containment, eradication, and recovery
If an intrusion occurs, there must be a clear reaction plan that addresses notification, evidence protection, activity log maintenance, containment, eradication, and recovery | TRUE
If an intrusion occurs, there must be a clear reaction plan that addresses notification, evidence protection, activity log maintenance, containment, enrollment, and uncovered | FALSE
Viruses differs from worm is.... | Worm can self-multiply, virus not
Hacker differs from cracker is.... | Hacker can find limits, cracker intrudes from limits
The written statement that defines an organization's security requirements as well as the controls and sanctions used to meet those requirements is known as a...... | security policy
According to the "2008 CSI Computer Crime and Security Survey," which of the following was the most common security incident? | virus attack
A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected Web sites | TRUE
An attack on an information system that takes advantage of a vulnerability is called a(n)... | exploit
A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is called a(n) .... | botnet
A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called a(n) .... | rootkit
.....forces unwanted and often objectionable materials into e-mail boxes, detracts from the ability of Internet users to communicate effectively, and costs Internet users and service providers millions of dollars annually | spam
Software that generates and grades tests that humans can pass but that all but the most sophisticated computer programs cannot is called.... | capcha
The use of information technology in business requires balancing the needs of those who use the information that is collected against .... | the rights and desires of the people whose information is being used
The Health Insurance Portability and Accountability Act defined numerous standards to improve the portability and continuity of health insurance coverage | TRUE
The Health Insurance Portability and Accountability Act defined numerous standards to improve the ... | portability and continuity of health insurance coverage
The USA PATRIOT Act modified ..... existing statutes and gave sweeping new powers both to domestic law enforcement and to international intelligence agencies | 15
....protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees. | The Fourth Amendment
The Fourth Amendment protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees. | TRUE
The Freedom of Information Act (FOIA) grants citizens the right to ... | access certain information and records of the federal government upon request
Identity theft occurs when someone .... | steals key pieces of personal information to impersonate a person
Identity thieves often create data breaches, purchase personal data, employ phish- ing, and ... | install spyware to capture personal data
Companies use many different methods to collect personal data about visitors to their Web sites, including ... | depositing cookies on visitors' hard drives and capturing click-stream
Marketers use personalization software to optimize the number, frequency, and mix- ture of their ad placements | TRUE
Marketers use ..... software to optimize the number, frequency, and mix- ture of their ad placements | personalization
.... has become a major marketing issue�companies that can- not protect or do not respect customer information have lost business | Consumer data privacy
One approach to treating consumer data responsibly is to adopt the ....; some companies also appoint a chief privacy officer | Fair Information Practices
... is the combination of communications privacy and data privacy. | information privacy
Legislation that protects people from data privacy abuses by ... is almost non- existent | private industry
An act designed to promote accuracy, fairness, and privacy of information in the files of credit-reporting companies is the.... | Gramm-Leach-Bliley Act
If someone refuses to give an institution the right to collect and share personal data about oneself, he or she is said to .... | opt-out
According to the Children's Online Privacy Protection Act, a Web site that caters to children must.... | all of the above
Which of the following identifies the numbers dialed for outgoing calls? | pen register
.... gave sweeping new powers to law enforcement agencies to search telephone, e-mail, medical, financial, and other records; it also eased restrictions on foreign intelligence gathering in the United States | USA PATRIOT Act
Business Software Alliance gave sweeping new powers to law enforcement agencies to search telephone, e-mail, medical, financial, and other records; it also eased restrictions on foreign intelligence gathering in the United States | FALSE
Which of the following is not a technique frequently employed by identity thieves? | trap and trace
... is used by marketers to optimize the number, frequency, and mixture of their ad placements. | personalization software
The most basic legal guarantee to the right of freedom of expression in the United States is contained in the.... | First Amendment
A written statement that is false and that harms another person is called.... | libel
The Child Online Protection Act prohibited dissemination of harmful material to minors and was ruled ..... | unconstitutional.
The right to freedom of expression has been broadened by the Supreme Court to include nonverbal, visual, and symbolic forms of expression. | TRUE
An organization's IT department can set up a(n) firewall to .... | prohibit employees from accessing remailers.
Anonymous expression, or the expression of opinions by people who do not reveal their identities, has been found to be unconstitutional. | FALSE
The best Internet filters rely on the use of.... | dynamic content filtering
A lawsuit in which the true identity of the defendant is temporarily unknown is called a.... | John Doe lawsuit
In the United States, speech that is merely annoying, critical, demeaning, or .... | offensive enjoys protection under the First Amendment.
Legal recourse is possible only when hate speech turns into clear threats and intimidation against ... | specific citizens
The First Amendment is often used to protect distributors of adult pornography over ... | the Internet
The First Amendment is often used to protect distributors of adult pornography over the Internet | TRUE
There are fewer than 60,000 Web sex sites | FALSE
About one in six regular Internet users visits a Web sex site at least once per month | FALSE
In contrast to adult pornography, few federal laws address child pornography. | FALSE
The.... Act specifies requirements that commercial e-mailers must follow in sending out messages that advertise or promote a commercial product or service. | CAN-SPAM
The Supreme Court has ruled that the First Amendment also protects the right to speak anonymously | TRUE
Obscene speech, defamation, incitement of panic, incitement to crime, "fighting words," and sedition are not protected by the First Amendment and may be .... by the government. | forbidden
Organizations and governments have attempted to establish policies and laws to help guide Internet use as well as ... | protect their own interests
The .... is that it is difficult to restrict children's Internet access without also restricting adults' access. | conundrum
The Children's Internet Protection Act requires federally financed schools and librar- ies to use filters to block computer access to ... | any material considered harmful to minors
Many businesses monitor the Web for the public expression of opinions that might ... | hurt their reputations
Numerous organizations allow employees to create their own... relating to their employment as a means to reach out to partners, customers, and other employees and to improve their corporate image | personal blogs
Organizations may file a ..... to enable them to gain subpoena power in an effort to learn the identity of anonymous Internet users who have caused some form of harm through their postings | John Doe lawsuit
Organizations are advised to formulate and publish employee blogging policies to avoid potential ... from employee criticism of corporate policies and decisions | negative consequences
Which of the following is an example of intellectual property? | a business process for the efficient handling of medical insurance claims
The term of a copyright, originally 28 years, has been extended many times and now can be as long as the life of the author plus 70 years | TRUE
The ... established four factors for courts to consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty. | fair use doctrine
The ... was signed into law in 1998 and was written in compliance with the global copyright protection treaty from WIPO; the law makes it illegal to circumvent a technical protection of copyrighted materials or to develop and provide tools that allow others to access a technologically protected work. | Digital Millennium Copyright Act
Not only does a patent prevent copying, but it also prevents independent creation, unlike a copyright | TRUE
A patent is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. | FALSE
A ... is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. | trade mark
The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will | go the extra mile to protect American innovation.
Many large software companies have cross-licensing agreements in which each agrees not to sue the other over patent infringements | TRUE
Many large software companies have cross-licensing agreements in which each agrees not to sue the other over.... | patent infringements
A copy is a form of protection for intellectual property that does not require any disclosures or filing of an application | FALSE
d) trademark | C
.... established minimum levels of protection that each government must provide to the intellectual property of all WTO members. | Trade-Related Aspects of Intellectual Property Rights ( TRIPS) Agreement
A customer list can be considered a trade secret if an organization treats the information as valuable and takes measures to safeguard it | TRUE
A customer list can be considered a trade secret if an organization treats the information as .... | valuable and takes measures to safeguard it
Open source code advocates believe that the quality of open source code is on par with that of commercial software | TRUE
There is only one definition of open source code | FALSE
A very limited amount of open source code is in use today | FALSE
Putting source code into the public domain with no copyright is equivalent to creating open source code | FALSE
Almost all the data needed for competitive intelligence can be collected either from carefully examining published information or through interviews | TRUE
The main tactic used to circumvent cybersquatting is to register numerous domain name variations as soon as an organization thinks it might want to develop a Web presence | TRUE
The Internet enables a worldwide exchange of news, ideas, opinions, rumors, and information. Its broad accessibility, open discussions, and anonymity make it a pow- erful communications medium | TRUE
The impact of a software defect can be quite subtle or very serious | TRUE
......is any error that, if not removed, could cause a software system to fail to meet its users' needs | Software defect
The impact of a software defect can NOT be quite subtle or very serious | FALSE
Which of the following is not a major cause of poor software quality? | Many organizations avoid buying the first release of a major software product
A type of system used to control many industrial processes in an effort to reduce costs, eliminate human error, improve quality, and shorten the time it takes to make products is called... | process control system
There is a federal product liability law governing product liability | FALSE
A standard, proven work process for the development of high-quality software is called a bug | FALSE
A standard, proven work process for the development of high-quality software is called a... | software development methodology
The cost to identify and remove a defect in an early stage of software development can be up to 100 times less than the cost of removing a defect in an operating piece of software after it has been ..... | distributed to many customers
Methods within the development cycle designed to guarantee reliable operation of the product are known as ____. | software quality assurance
A form of software testing that involves viewing a software unit as a device that has expected input and output behaviors but whose internal workings are unknown is known as ____. | black-box testing
An approach that defines the essential elements of an effective process and outlines a sys- tem for continuously improving software development is____. | CMMI-DEV
Special measures must be taken in the development of safety-critical systems | TRUE
The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called____. | Redundancy
FMEA requiring organizations to develop formal quality management systems that focus on identifying and meeting the needs, desires, and expectations of their customers are the standards. | FALSE
A reliability evaluation technique that can determine the effect of system and equipment failures is____. | Failure Mode and Effects Analysis
....requiring organizations to develop formal quality management systems that focus on identifying and meeting the needs, desires, and expectations of their customers. | ISO 9000
In a lawsuit alleging________, responsibility is limited to harmful defects that could have been detected and corrected through "reasonable" software development practices. | Negligence
In a lawsuit alleging risk, responsibility is limited to harmful defects that could have been detected and corrected through "reasonable" software development practices. | FALSE
In a lawsuit alleging negligence, responsibility is limited to harmful defects that could have been detected and corrected through "reasonable" software development practices. | TRUE
CMM requiring organizations to develop formal quality management systems that focus on identifying and meeting the needs, desires, and expectations of their customers. | FALSE
A reliability evaluation technique that can determine the effect of system and equipment failures is risk | FALSE
The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called redundancy | TRUE
The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called risk | FALSE
A standard, proven work process for the development of high-quality software is called a software development methodology | TRUE
Standard of living varies greatly from nation to nation | TRUE
Industrialized nations generally have a higher standard of living than ... | developing countries
The decade of 1990-2000 demonstrated the greatest rate of increase in worker productivity in the history of the United States. | FALSE
The amount of output produced per unit of input is called.... | productivity
_________________ is a term used to describe the gulf between those who do and those who don't have access to modern information and communications technology such as cell phones, personal computers, and the Internet | Digital divide
It is frequently measured using the ... per capita | GDP
It is frequently measured using the GDP per capita | TRUE
It is difficult to quantify how much the use of IT has contributed to worker ... | productivity
It is difficult to quantify how much the use of IT has contributed to worker productivity | TRUE
It exists not only between more and less developed countries but also within countries among age groups, economic classes, and people who live in cities versus those in ... | rural areas
It exists not only between more and less developed countries but also within countries�among age groups, economic classes, and people who live in cities versus those in rural areas | TRUE
Only about 20 million of the world's 1 billion Internet users live in less developed nations | TRUE
The number of PCs per 1,000 people in the Middle East and Africa is more than in China | FALSE
In many of India's rural communities, one must travel more than 5 miles to the nearest telephone | TRUE
Which of the following is a valid reason for trying to reduce the digital divide? | All of the above
Ready access to information and communications technology can provide a country with a wealth of economic opportunities and give its industries a competitive advantage is a valid reason for trying to reduce the digital divide | TRUE
Much of the vital information that people need to manage their retirement, health, and safety is increasingly provided by the Internet is a valid reason for trying to reduce the digital divide | TRUE
Health, crime, and other emergencies could be resolved more quickly if people in trouble had access to a communications network is a valid reason for trying to increase the digital divide | FALSE
The No Child Left Behind Act requires that each state have an _________________ program to improve academic achievement through the use of technology in schools | Ed-Tech
It is estimated that more than 1 billion personal computers will be connected to the Internet by 2010, leaving more than 5.5 billion people unconnected. _________________ is the standard of living characteristic that most of the 5.5 billion people have in common | A low income
wo main reasons have been advanced as the cause of rising healthcare costs: the use of more expensive technology and the _________________ of patients from the true costs of medical care. | Shielding
The healthcare industry spends less per employee on IT than private industry | True
The healthcare industry spends less per employee on IT than public industry | F
Two main reasons have been advanced as the cause of rising healthcare costs: the use of more expensive technology and the E-Computing of patients from the true costs of medical care. | False
As 2012-2013 stat, Twitter is the social networking Web site with the ... | not largest number of adult U.S. Internet users
Facebook is a popular business-oriented Web site that is used by professionals for networking | FALSE
_________________ is a popular business-oriented Web site that is used by professionals for networking | LinkedIn
Social network advertising has become big business, with some social networking Web sites earning more than $200 million in ad revenue. | TRUE
Hotmail employed a direct marketing campaign when it first launched its service, with each e-mail sent by a Hotmail user containing a short message that promoted Hotmail's free e-mail service | FALSE
Hotmail employed a indirect marketing campaign when it first launched its service, with each e-mail sent by a Hotmail user containing a short message that promoted Hotmail's free e-mail service | FALSE
Employers can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not violating discrimination laws | TRUE
Hotmail employed a ..... campaign when it first launched its service, with each e-mail sent by a Hotmail user containing a short message that promoted Hotmail's free e-mail service | viral marketing
Which of the following approaches to social network advertising involves placing a banner ad on a Web site? | direct advertising
There are around 700,000 registered sex offenders in the United States, and 90,000 of them were found on and subsequently banned from the social networking Web site Facebook | F
There are around 700,000 registered sex offenders in the United States, and 90,000 of them were found on and subsequently banned from the social networking Web site .... | MySpace
Cyberbullying is more common among 15- and 16-year-old males than any other group of social networking users | F
It is not unusual for cyberstalking to escalate to vandalism, physical stalking, and even _________________ | physical assault
To date, no practical business applications of online virtual worlds have been implemented | False
Social shopping Web sites generate money primarily through advertising and by selling _________________ | sharing with retailers data about their members' likes and dislikes
Social shopping Web sites generate money primarily through advertising and by selling cyberstalking | F
It is not unusual for cyberstalking to escalate to vandalism, physical stalking, and even cyberstalking | F
It is not unusual for cyberstalking to escalate to vandalism, physical stalking, and even physical assault | T
Social shopping Web sites generate money primarily through advertising and by selling cyberbullying | False
Employers can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not ... | violating discrimination laws
.... can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not violating discrimination laws | Employers
Police can legally reject a job applicant based on the content of the individual's social networking Web site as long as the company is not violating discrimination laws | False
To date, practical business applications of online virtual worlds have been implemented | T
To date, practical business applications of online physical worlds have been implemented | T
Contingent work is a job situation in which an individual does not have an explicit or implicit contract for long-term employment | TRUE
Contingent work is a job situation in which an individual does not have... | Explicit or implicit contract for long-term employment
The contingent workforce includes ... | Temporary workers
An H-1B is a .... work visa granted by the U.S. Citizenship and Immigration Services (USCIS) | temporary work
An H-1B is a permanent work visa granted by the U.S. Citizenship and Immigration Services (USCIS) | False
The contingent workforce includes dependent workers | F
The European Union passed the Restriction of Hazardous Substances Directive which restricts the use of many hazardous materials in computer manufacturing. | T
H1B contract need jobs that require at least a ...... bachelor's degree in a specific field, or equivalent experience | four-year
H-1B workers may also be used when there are temporary shortages of needed skills | TRUE
H-1B workers may also be used when there are no temporary shortages of needed skills | F
Others believe that the use of H-1B workers is required to .... | keep the United States competitive.
Outsourcing is a...... that has expertise in providing a specific func- tion | long-term business arrangement in which a company contracts for services with an outside organization
Outsourcing is a long-term business arrangement in which a company contracts for services with an inside organization that has expertise in providing a specific func- tion | FALSE
Outsourcing is a long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific func- tion | True
Outsourcing and offshore outsourcing are used to meet staffing needs while ... | potentially reducing and speeding up project schedules
Outsourcing and offshore outsourcing are used to meet staffing needs while potentially reducing and speeding up project schedules | T
Outsourcing and offshore outsourcing are used to meet staffing needs while potentially reducing and slowing down project schedules | F
Whistle-blowing is an effort to attract public attention to a negligent, abusive and... | unethical
A potential whistle-blower must consider many ethical implications, including whether ... | the high price of whistle-blowing is worth it
A potential whistle-blower must consider many ethical implications, including whether the high price of whistle-blowing is worth it | True
A potential whistle-blower must consider many ethical implications, including whether the high price of whistle-blowing is not worth it | F
Computer companies looking to manufacture green computers are challenged to produce computers that ... | use less electricity
Computer companies looking to manufacture green computers are challenged to produce computers that use less electricity | T
Computer companies looking to manufacture green computers are challenged to produce computers that use no electricity | F
EPEAT (Electronic Product Environmental Assessment Tool) is a system that enables purchasers to evaluate, compare, and select electronic products based on ..... environmental criteria | 51
QN=1 Pretexting involves the use of false pretenses to gain access to the personal records of individuals. | True
QN=2 The stock price of Hewlett-Packard dropped dramatically as a result of a scandal involving the leaking of information about HP's long term strategy to the news media. | False
QN=3 Morality refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus. | True
QN=4 There is near universal opposition to the practice of illegally making copies of software or enabling others to access software to which they are not entitled. | False
QN=5 An individual who exhibits few vices and many virtues is said to be a person of high integrity. | False
QN=6 Ethics defines one's personal beliefs about right and wrong. | False
QN=7 The United States has one of the lowest software piracy rates in the world, along with Luxembourg and New Zealand. | True
QN=8 The risks associated with inappropriate behavior have decreased, both in their likelihood and in their potential negative impact. | False
QN=9 A stakeholder is someone who stands to gain or lose, depending on how a situation is resolved. | True
QN=10 Companies that are viewed as harmful to their community may find that negative publicity reduces sales, impedes relationships with some business partners, and attracts unwanted government attention. | True
QN=11 Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in. | False
QN=12 Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment. | True
QN=13 The United States Supreme Court has established that an employer cannot be held responsible for the acts of its employees if the employees act in a manner contrary to corporate policy and their employer's directions. | False
QN=14 The Department of Justice has established sentencing guidelines that suggest stiffer penalties for convicted executives if their companies have ethics programs. | False
QN=15 A rapid increase in the appointment of corporate ethics officers typically follows the revelation of a major business scandal. | True
QN=16 An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making | False
QN=17 Apple was the highest rated U.S.-based, publicly held IT company by Business Ethics magazine based on its performance between 2000 and 2007. | False
QN=18 The goal of the Sarbanes-Oxley Act was to renew investor's trust in corporate executives and their firm's financial reports following numerous financial scandals in the early 2000's. | True
QN=19 Lawrence Kohlberg found that many factors stimulate a person's moral development, but one of the most crucial is monetary reward for good behavior. | False
QN=20 Well over half of all organizations include ethical conduct as part of an employee's performance appraisal. | False
QN=21 An individual's manager has very little impact on his/her ethical behavior. | False
QN=22 Most of us have developed a decision-making process we use almost automatically, without thinking about the steps we go through. | True
QN=23 The development of a good problem statement is the most critical step in the | True
QN=24 Problem stakeholders who stand to lose or gain from a situation should be kept out of the decision making process as they will simply introduce their personal biases. | False
QN=25 The utilitarian approach to ethical decision making treats everyone the same and shows no favoritism or discrimination. | False
QN=26 The virtue ethics approach to decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected. | False
QN=27 If the desired results are not achieved upon implementation of the solution, one should return to the "identify alternatives" step of the decision making process and rework the decision. | False
QN=28 To the detriment of all concerned, the importance of ethics and human values have been over emphasized in the midst of many IT breakthroughs in recent years. | False
QN=29 The general public does not understand the critical importance of ethics as they apply to IT, as too much emphasis has been placed on technical issues. | True
QN=30 In the business world, important IT decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions. | True
QN=31 Dorothea Perry and Robert Gross were put on probation and subsequently fired for job-performance issues by their employer, Collegis, shortly after reporting that they found child pornography on the computer of a professor at New York Law School. | True
QN=32 Professionals require advanced training and experience, they must exercise discretion and judgment in the course of their work; and their work can be easily standardized. | False
QN=33 Many professional roles carry special rights and responsibilities. | True
QN=34 From a legal perspective, IT workers are not recognized as professionals because they are not licensed by the state or federal government. | True
QN=35 There has been a lowering of expectations for the clients of professional service organizations. They are less aware of what they need from service providers and less willing to look outside their own organization to get the best possible services. | False
QN=36 Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to IT staff members. | True
QN=37 The Business Software Alliance is a trade group that represents the world's largest software and hardware manufacturers and whose goal is to stop unauthorized software produced by its members. Each year it receives over 25,000 piracy reports. | False
QN=38 The cost of "getting legal" by acquiring the correct number of software licenses is many times more expensive than the cost of criminal or civil penalties to a corporation or the people involved in software piracy. | False
QN=39 The design of new software code and computer hardware cannot be treated as a trade secret. | False
QN=40 Whistle-blowing is an effort by an organization's marketing people to call attention to a new product or new feature in an existing product. | False
QN=41 The relationship between IT workers and clients is usually documented in a contract that specifies who does what, when the work begins, how long it will take, and how much the client will pay. However, decision making is solely the responsibility of the IT worker. | False
QN=42 Theft is the crime of obtaining goods, services, or property through deception or | False
QN=43 Fraud is the misstatement or incomplete statement of a material fact. | False
QN=44 Bribery involves providing money, property, or favors to someone in business or government to obtain a business advantage. | True
QN=45 The key distinguishing factor between a gift and a bribe is that no gift should be hidden. | True
QN=46 Studies have shown that around 10 percent of all job applicants seriously misrepresent their backgrounds on their resumes. | True
QN=47 IT workers cannot be held responsible for creating an environment that supports the ethical behavior of IT users. | False
QN=48 IT workers have a duty to understand a user's needs and capabilities and to deliver products and services that best meet those needs without regard for the costs and time involved. | False
QN=49 Most codes of ethics created by professional organizations have two main parts: one part outlines what the professional organization aspires to become, and the other part lists rules and principles by which members of the organization are expected to abide. | True
QN=50 Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business. | True
QN=51 Participation in an IT professional organization does little to help IT workers stay on top of the many new developments in their field. | False
QN=52 The Association of Information Technology Professionals (AITP) was founded in 1947 and has 24,000 student members and 68,000 professional members in more than 100 countries. | False
QN=53 Licensing applies to both people and products, and indicates that a professional possesses a particular set of skills, knowledge, or abilities. | False
QN=54 Certifications that are tied to a vendor's product are relevant for job roles with very specific requirements or certain aspects of broader roles. Sometimes, however, vendor certifications are too focused on technical details of the vendor's technology and do not address more general concepts. | True
QN=55 The requirements for certification generally require that the individual has the prerequisite education and experience, sits for and passes an exam, and commits to and abides by a code of ethics established by the organization providing the certification. | True
QN=56 The lack of agreement on the core body of knowledge for various IT roles is a primary reason for the lack of international or national licensing programs for IT professions. | True
QN=57 A breach of duty of care addresses only the failure to act as a reasonable person would act. It does not address the failure to act when there is a duty to do so. | False
QN=58 No policy can stop wrongdoers from taking inappropriate actions, but it can set forth the general rights and responsibilities of all IT users, establish boundaries of acceptable and unacceptable behavior and enable management to punish violators. | True
QN=59 There is little organizations can do to stop employees who participate in chat rooms, view pornographic sites, and play computer games while at work. | False
QN=60 Organizations must implement systems and procedures to provide access to all organizational data by all employees no matter where they are located. | False
QN=61 Societe Generale, France's second largest banking establishment, had long had a reputation for having poor internal controls. It is no wonder that a relatively inexperienced trader was able to take advantage of the bank's system of weak internal controls to exceed his trading limit and cause the bank to lose more than �4.9 billion. | False
QN=62 Although the necessity of security is obvious, it must often be balanced against other business needs and issues. As a result, most organizations spend 5 percent or less of their overall IT budget on information security. | True
QN=63 According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident. | True
QN=64 A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday. | False
QN=65 Unlike a computer worm, which requires users to spread infected files to other users, a virus is a harmful program that resides in the active memory of the computer and duplicates itself. A virus can propagate without human intervention. | False
QN=66 The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion. | True
QN=67 A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target. | True
QN=68 Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers. | True
QN=69 The cost of creating an e-mail campaign for a product or a service can easily exceed the cost of a direct-mail campaign. Such an e-mail campaign also typically takes longer to develop. | False
QN=70 Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack. | False
QN=71 A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units. | False
QN=72 Crackers break into other people's networks and systems to cause harm�defacing Web pages, crashing computers, and spreading harmful programs or hateful messages. | True
QN=73 Fraud often involves some form of collusion, or cooperation, between an employee and an outsider. | True
QN=75 The use of smart cards which contain a memory chip that is updated with encrypted data every time the card is used, is much more popular in the United States than Europe. | False
QN=76 The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists. | True
QN=77 Individuals committed to trustworthy computing take a pledge to not send viruses and worms and to refrain from spamming others. | False
QN=78 The Computer Fraud and Abuse Act addresses identity theft. | False
QN=79 The security of any system or network is a combination of technology, policy, and people and requires a surprisingly narrow range of activities to be effective. | False
QN=80 A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. | True
QN=81 A security policy details exactly what needs to be done and how it must be accomplished. | False
QN=82 Whenever possible, automated system rules should mirror an organization's written policies. | True
QN=83 While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors. | False
QN=84 Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks. | False
QN=85 Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network. | False
QN=86 Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster. | False
QN=87 It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs. | True
QN=88 An intrusion prevention system is software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization. | False
QN=89 An organization can never be prepared for the worst�a successful attack that defeats all or some of a system's defenses and damages data and information systems. | False
QN=90 Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well. | True
QN=91 The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used. | True
QN=92 One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in online privacy. | True
QN=93 The right to personal privacy is explicitly spelled out in the Constitution. | False
QN=94 The right to privacy is closely associated with the Second Amendment to the Constitution. | False
QN=95 Roger Clark, director of the ACLU, first coined the term information privacy which is the combination of communications privacy and data privacy. | False
QN=96 The Gramm-Leach-Bliley Act repealed the prohibition of any one institution from offering investment, commercial banking, and insurance services. It also included three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule. | True
QN=97 HIPPA requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet. | True
QN=98 The Children's Online Privacy Protection Act requires a Web site that caters to children to offer comprehensive privacy policies and to receive parental consent before collecting any personal information from children under 18 years of age. | False
QN=99 Title III of the Omnibus Crime Control and Safe Streets Act is also know as the Wiretap Act and authorizes wiretapping and electronic eavesdropping without the requirement of first obtaining a warrant from a judge. | False
QN=100 The Foreign Intelligence Surveillance Act allows the surveillance and collection of information about foreign governments or agents of foreign governments or organizations, only if a warrant is obtained from the FISA court within 72 hours after surveillance begins. | False
QN=101 A pen register is a device that records the originating number of incoming calls for a particular phone number. | False
QN=102 The Electronic Communications Privacy Act of 1986 required the communications industry to build tools into its products that federal investigators could use�after obtaining a court order�to eavesdrop on conversations and intercept electronic communications. | False
QN=103 Under the PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order but only if the FBI believed the individual to be a foreign spy. | False
QN=104 A sunset provision extends a law beyond a specific date unless further legislative action is taken to repeal the law. | False
QN=105 The European Union Data Protection Directive requires member countries to ensure that data transferred is protected. It has no impact on non-European Union countries | False
QN=106 The U.S. approach to data privacy involves strict government regulation while the European approach relies on self-regulation. | False
QN=107 The Freedom of Information Act prohibits the government from concealing the existence of any personal data record-keeping systems. | False
QN=108 A Freedom of Information Act request prevents disclosure of records if it would invade someone's privacy. A balancing test must be applied to evaluate whether the privacy interests at stake are outweighed by competing public interests. | True
QN=109 Incidents of identity theft exceeded 4% of the overall U.S. adult population in 2008 resulting in losses of some $48 billion. | False
QN=110 The cost of a data breach can be quite expensive, by some estimates nearly $500 for each record lost. Nearly half the cost is due to lost business opportunity associated with customers who've been lost due to the incident. | False
QN=111 There is no federal law requiring that organizations reveal a data breach, however, more than half the states have implemented such legislation. | True
QN=112 Spyware frequently employs sophisticated methods to avoid detection by popular software packages that are specifically designed to combat it. | True
QN=113 The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission. | True
QN=114 Cookies allow marketers to collect click-stream data�information gathered by monitoring a consumer's online activity. | True
QN=116 There is virtually no way to limit the deposit of cookies on your hard drive. | False
QN=117 Demographic filtering augments click-stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions. | True
QN=118 Companies that can't protect or don't respect customer information often lose business and some become defendants in class action lawsuits stemming from privacy violations. | True
QN=119 Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees. | True
QN=120 Advocates of advanced surveillance technology argue that people have no legitimate expectation of privacy in a public place. | True
QN=121 According to a survey by the National Campaign to Prevent Teen and Unplanned Pregnancy, one in five teenagers have engaged in sexting. | True
QN=122 In some states, sexting can result in felony charges and first-time offenders can be registered as sex offenders. | True
QN=123 The Second Amendment to the U.S. Constitution was adopted to guarantee the right to freedom of expression. | False
QN=124 Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First Amendment. | True
QN=125 The Supreme Court has ruled that the First Amendment does not protect the right of individuals to speak anonymously. | False
QN=126 Obscene speech is not protected by the First Amendment. | True
QN=127 Mason v. California is the 1973 Supreme Court case that established a test to determine if material is obscene. | False
QN=128 Making either an oral or a written statement of alleged fact that is false and harms another is called slander. | False
QN=129 The Communications Decency Act was aimed at protecting children from revealing personal information about themselves or their parents. | False
QN=130 In Reno v. ACLU, the Supreme Court ruled that the same free-speech protections apply to communication over the Internet as exists for print communication. | True
QN=131 The Child Online Protection Act was an attempt to protect children from online pornography while preserving the rights of adults. | True
QN=132 After a temporary injunction as well as numerous hearings and appeals, the Supreme Court ruled that the Child Online Protection Act was constitutional. | False
QN=133 Web dynamic filtering uses keywords or phrases to block access to Web sites. | False
QN=134 Employees who are unwillingly exposed to pornography or other objectionable material while using their work computer would have a strong case for sexual harassment. | True
QN=135 In the ICRA rating system, Web authors fill out an online questionnaire to describe the content of their site. | True
QN=136 The Children's Internet Protection Act required federally financed schools and libraries to use some form of technological protection to block computer access to obscene material, pornography, and anything else considered harmful to minors. | True
QN=137 The Children's Internet Protection Act was eventually found to be unconstitutional. | False
QN=138 Anonymous expression is a relatively new phenomena that came shortly after the arrival of the Internet allowed people to express their opinions without revealing their identity. | False
QN=139 One of the early Supreme Court rulings that addressed anonymity as an aspect of the Bill of Rights was NAACP v. Alabama in which the court ruled that the NAACP did not have to turn its membership list over to the state of Alabama. | True
QN=140 The IP address can be used to identify the sender of an ordinary e-mail or online posting. | True
QN=141 Once a John Doe lawsuit is filed and the court grants permission, the plaintiff can serve subpoenas on any third party�such as an Internet service provider or a Web site hosting firm�that may have information about the true identity of the defendant. | True
QN=142 Anonymity on the Internet is guaranteed. | False
QN=143 The New York State Court in Pre-Paid v. Sturtz et al. set a legal precedent that refined the criteria that the courts apply when deciding whether or not to approve subpoenas requesting the identity of anonymous Web posters. | False
QN=144 In the United States, speech that is annoying, critical, demeaning, or offensive is not protected under the First Amendment. | False
QN=145 Many Internet service providers reserve the right to remove content that, in their judgment, does not meet their standards documented in some form of user agreement or guidelines. However, the pulling of such content violates the subscriber's First Amendment rights. | False
QN=146 Although they may implement a speech code, public schools and universities are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint. | True
QN=147 Fewer and fewer organizations are allowing their employees to create their own personal blogs relating to their employment. | False
QN=148 Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the Children's Internet Protection Act. | False
QN=149 The CAN-SPAM Act clearly defines the conditions under which the sending of spam is legal. | True
QN=150 The Federal Trade Commission is charged with enforcing the CAN-SPAM act but has done little to enforce the act. | True
QN=151 Copyright law protects authored works such as art, books, and film. | True
QN=152 Formulas, inventions, and processes are not considered forms of intellectual property. | False
QN=153 Protecting computer software has proven to be difficult because it is has not been well categorized under the law. | True
QN=154 A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. The author may not grant this exclusive right to others. | False
QN=155 Copyright law guarantees developers the rights to their works for a certain amount of time. Over the years, the term of copyright has been extended several times from its original limit of 17 1/2 years. | False
QN=156 Art, architecture, graphics, and sculptures cannot be copyrighted. | False
QN=157 Software, video games, multimedia works, and Web pages can all be copyrighted. | True
QN=158 The fair use doctrine allows portions of patented materials to be used with permission under certain circumstances. | False
QN=159 Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing the other's copyright. | True
QN=160 The PRO-IP Act of 2008 increased trademark and copyright enforcement, and substantially increased penalties for infringement. | True
QN=161 The World Trade Organization developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the maximum penalties to be meted out for patent and copyright infringement. | False
QN=162 The WIPO Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media. | False
QN=163 The Digital Millennium Copyright Act made it an offense to circumvent a technical protection of copyrighted material. | True
QN=164 A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators. | False
QN=165 Software cannot be patented. | False
QN=166 A few of the larger software companies have cross-licensing agreements in which each party agrees not to sue the other over trademark infringements. | False
QN=167 A patent demon is a firm that acquires patents with no intention of manufacturing anything, instead licensing the patents to others. | False
QN=168 A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential. | False
QN=169 The Economic Espionage Act imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets. | True
QN=170 Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding nondisclosure clauses to employment contracts. | True
QN=171 Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own. | False
QN=172 Plagiarism software checks for matching text in different documents as a means of identifying potential plagiarism. | True
QN=173 Reverse engineering can only be applied to computer hardware, not computer software. | False
QN=174 Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. | True
QN=175 Only a small amount of open source code is available for use. | False
QN=176 Competitive intelligence involves the gathering and analysis of the trade secrets of your competitors. | False
QN=177 Industrial espionage and competitive intelligence are essentially the same. | False
QN=178 Competitive intelligence analysts must be authorized to take unethical or illegal actions in the normal course of their job. | False
QN=179 Procter & Gamble admitted publicly that it unethically gained information about Unilever, its competitor in the multibillion-dollar hair-care business. | True
QN=180 Cybersquatters are individuals who registered domain names for famous trademarks or company names to which they had no connection. | True
QN=181 There have been many delays in the development of the new Boeing 787 Dreamliner including problems with the software that controls and monitors the aircraft's braking system. | True
QN=182 Software manufacturers face economic, ethical, and organizational challenges associated with improving the quality of their software. | True
QN=183 A software feature is any error that, if not removed, could cause a software system to fail to meet its users' needs. | False
QN=184 The impact of a software defect is catastrophic and leads to death or serious injury. | False
QN=185 Software defect is the degree to which a software product meets the needs of its users. | False
QN=186 The various products created during the software development process such as a statement of requirements, flowcharts, and user documentation are called developments. | False
QN=187 According to one study, even experienced software developers unknowingly inject an average of one design or implementation defect for every 15 - 20 lines of code. | False
QN=188 The Microsoft Vista operating system took over seven years to develop and consists of more than 100 million lines of code. | False
QN=189 The extreme pressure that software companies feel to reduce the time to market for their products has little impact on the quality of the software. | False
QN=190 The accurate, thorough, and timely processing of business transactions is a key requirement for business information systems. A software defect in such a system can be devastating, resulting in lost customers and reduced revenue. | True
QN=191 The decision support system is used to improve the decision making in a variety of industries. | True
QN=192 A defect in process control software can lead to decreased product quality, increased waste and costs, or even unsafe operating conditions for employees. | True
QN=193 The liability of manufacturers, sellers, lessors, and others for injuries caused by defective products is commonly referred to as negligence. | False
QN=194 Contributory negligence means that the defendant is held responsible for injuring another person, regardless of negligence or intent. | False
QN=195 Strict liability is the failure to do what a reasonable person would do, or doing something that a reasonable person would not do. | False
QN=196 A warranty assures buyers or lessees that a product meets certain standards of quality. | True
QN=197 If the product fails to meet the terms of its warranty, the buyer or lessee can sue for contributory negligence. | False
QN=198 Breach of warranty occurs when a seller or lessee either misrepresents the quality of a product or conceals a defect in it. | False
QN=199 A software development methodology is a standard, proven work process that enables systems analysts, programmers, project managers, and others to make controlled and orderly progress in developing high-quality software. | True
QN=200 Quality assurance refers to methods within the development cycle designed to guarantee reliable operation of the product. | True
QN=201 White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. | False
QN=202 There are two forms of dynamic testing�black-box testing and white-box testing. | True
QN=203 User acceptance testing is a process improvement approach that defines the essential elements of effective processes. | False
QN=204 The Capability Maturity Model Integration-Development process improvement approach defines six levels of software development maturity. | False
QN=205 As the software maturity level increases, the organization improves its ability to deliver good software on time and on budget. | True
QN=206 The safe operation of many safety-critical systems relies on the flawless performance of software. | True
QN=207 Many shortcuts can be taken when safety-critical software is being developed. | False
QN=208 Redundancy, the provision of multiple interchangeable components to perform a single function, is a key element of the standard decision support system. | False
QN=209 Reliability is the probability of a component or system performing without failure over its product life. | True
QN=210 Failure mode and effects analysis is an important technique used to develop ISO 9000-compliant systems by both evaluating reliability and determining the effects of system and equipment failures. | True
1. Dorothea Perry and Robert Gross were put on probation and subsequently fired for job-performance issues by their employer, Collegis, shortly after reporting that they found child pornography on the computer of a professor at New York Law School. | a
2. Professionals require advanced training and experience, they must exercise discretion and judgment in the course of their work; and their work can be easily standardized. | b
3. Many professional roles carry special rights and responsibilities. | a
4. From a legal perspective, IT workers are not recognized as professionals because they are not licensed by the state or federal government. | a
5. There has been a lowering of expectations for the clients of professional service organizations. They are less aware of what they need from service providers and less willing to look outside their own organization to get the best possible services. | b
6. Although end users often get the blame when it comes to using illegal copies of commercial software, software piracy in a corporate setting is sometimes directly traceable to IT staff members. | a
7. The Business Software Alliance is a trade group that represents the world's largest software and hardware manufacturers and whose goal is to stop unauthorized software produced by its members. Each year it receives over 25,000 piracy reports. | b
8. The cost of "getting legal" by acquiring the correct number of software licenses is many times more expensive than the cost of criminal or civil penalties to a corporation or the people involved in software piracy. | b
9. The design of new software code and computer hardware cannot be treated as a trade secret. | b
10. Whistle-blowing is an effort by an organization's marketing people to call attention to a new product or new feature in an existing product. | b
11. The relationship between IT workers and clients is usually documented in a contract that specifies who does what, when the work begins, how long it will take, and how much the client will pay. However, decision making is solely the responsibility of the IT worker. | b
12. Theft is the crime of obtaining goods, services, or property through deception or trickery. | b
13. Fraud is the misstatement or incomplete statement of a material fact. | b
14. Bribery involves providing money, property, or favors to someone in business or government to obtain a business advantage. | a
15. The key distinguishing factor between a gift and a bribe is that no gift should be hidden. | a
16. Studies have shown that around 10 percent of all job applicants seriously misrepresent their backgrounds on their resumes. | a
17. IT workers cannot be held responsible for creating an environment that supports the ethical behavior of IT users. | b
18. IT workers have a duty to understand a user's needs and capabilities and to deliver products and services that best meet those needs without regard for the costs and time involved. | b
19. Most codes of ethics created by professional organizations have two main parts: one part outlines what the professional organization aspires to become, and the other part lists rules and principles by which members of the organization are expected to abide. | a
20. Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to- day business. | a
21. Participation in an IT professional organization does little to help IT workers stay on top of the many new developments in their field | b
22. The Association of Information Technology Professionals (AITP) was founded in 1947 and has 24,000 student members and 68,000 professional members in more than 100 countries. | b
23. Licensing applies to both people and products, and indicates that a professional possesses a particular set of skills, knowledge, or abilities. | b
24. Certifications that are tied to a vendor's product are relevant for job roles with very specific requirements or certain aspects of broader roles. Sometimes, however, vendor certifications are too focused on technical details of the vendor's technology and do not address more general concepts. | a
25. The requirements for certification generally require that the individual has the prerequisite education and experience, sits for and passes an exam, and commits to and abides by a code of ethics established by the organization providing the certification. | a
26. The lack of agreement on the core body of knowledge for various IT roles is a primary reason for the lack of international or national licensing programs for IT professions. | a
27. A breach of duty of care addresses only the failure to act as a reasonable person would act. It does not address the failure to act when there is a duty to do so. | b
28. No policy can stop wrongdoers from taking inappropriate actions, but it can set forth the general rights and responsibilities of all IT users, establish boundaries of acceptable and unacceptable behavior and enable management to punish violators. | a
29. There is little organizations can do to stop employees who participate in chat rooms, view pornographic sites, and play computer games while at work. | b
30. Organizations must implement systems and procedures to provide access to all organizational data by all employees no matter where they are located. | b
31. From a legal perspective, IT workers are not recognized as professionals because they are not ____ by the state or federal government. | d
32. Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional. | b
33. As a result of increased ____, clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices. | c
34. As a result of improved ____, clients are able to break down their business processes into their fundamental steps and decide which they will perform themselves and which they will outsource to service providers. | d
35. The mission of the Business Software Alliance is to ____. | c
36. Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work. | c
37. A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential. | b
38. Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____. | b
39. Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____. | a
40. To prove fraud in a court of law, prosecutors must demonstrate that ____. | b
41. ____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract. | d
42. Accepting payment of entry fees for a golf tournament from a supplier is ____. | c
43. The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____. | c
44. The Foreign Corrupt Practices Act permits facilitating payments so that an official performs or makes a(n) ____. | b
45. Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume | b
46. An IT professional organization whose mission is to provide superior leadership and education in information technology and that has a goal to help its members make themselves more marketable within their industry is ____. | c
47. Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the ____. | b
48. A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the ____ level and often requires that the recipient pass a test of some kind. | b
49. The obligation to protect people against any unreasonable harm or risk is called ____. | b
50. Because there are no ____ against which to compare a software engineer's professional behavior, he or she cannot be subject to malpractice lawsuits. | d
51. A device that limits access to the company's network based on the organization's Internet usage policy is called a(n) ____. | c
52. Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making. | c
53. IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____. | a
54. A feature that is associated with a bribe is that a bribe ____. t | d
55. If misrepresentation causes a party to enter into a contract, that party may have the legal right to ____. | c
QN=1 Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the ____ by which a society lives. | moral code
QN=2 A set of beliefs about right and wrong behavior within a society is called ____. | ethics
QN=3 Arthur Andersen, once a major international accounting firm, was indicted for obstruction of justice, lost its auditing license, and eventually closed its U.S. offices based on the actions of a few employees even though they were performing in a manner contrary to corporate policy and their employer�s directions. This is an example of the principle called respondeat superior or ____. | �let the master answer.�
QN=4 In 2007, ____ of all software in circulation worldwide was pirated. | around 38%
QN=5 ____ had one of the highest software piracy rates in 2007. | Armenia
QN=6 Habits that incline people to do what is acceptable are called ____. | virtues
QN=7 ____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs. | Morals
QN=8 ____ is a system of rules that tells us what we can and cannot do. | Laws
QN=9 ____ hired private investigators to identify members of its board of directors who were responsible for leaking confidential company information to the press. | Hewlett-Packard
QN=10 Someone who stands to gain or lose, depending on how a situation is resolved is called a(n) ____. | stakeholder
QN=11 Companies that develop and maintain strong employee relations ____. | suffer lower turnover rates
QN=12 A judge found ____ guilty of not providing timely on-site technical support that customers were entitled to and, as a result, lost its place as the world�s largest computer manufacturer. | Dell
QN=13 The Department of Justice established sentencing guidelines that suggest more ____ treatment for convicted executives if their companies have ethics programs. | lenient
QN=14 One characteristic of an organization that has a successful ethics program is that ____. | employees are rewarded for ethical behavior.
QN=15 A rapid increase in the appointment of corporate ethics officers typically follows | the revelation of a major business scandal.
QN=16 In a for-profit organization, it is the primary objective of the ____ to oversee the organization�s business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community. | Board of Directors
QN=17 While nearly half of all employees surveyed saw some form of ethical misconduct in 2007, less than ____ of those employees reported the misconduct to management. | 60%
QN=18 In a(n) ____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communications its new goals for the upcoming year. | social audit
QN=19 Ethical conduct criteria that could be used in an employee�s performance evaluation includes ____. | operating effectively in a multicultural environment
QN=20 ____ is a likely cause of employees feeling �No one will ever know the difference, and if they do, so what?� | Management failing to hold people accountable for unethical actions
QN=21 The step in the five-step decision-making process during which the decision maker (s) consider laws, guidelines, policies, and principles that might apply to the decision is the ____ step. | evaluate and choose alternative
QN=22 The step of the five-step decision process during which those who will be affected by the decision are identified is the ____ step. | develop problem statement
QN=23 Part of developing a good problem statement includes ____. | determining who is directly affected by the problem
QN=24 An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a common set of values and goals is the ____ approach. | common good
QN=25 An approach to ethical decision making that states you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected is the ____ approach. | utilitarian
QN=26 From a legal perspective, IT workers are not recognized as professionals because they are not ____ by the state or federal government. | licensed
QN=27 Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional. | malpractice
QN=28 As a result of increased ____, clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices. | connectivity
QN=29 As a result of improved ____, clients are able to break down their business processes into their fundamental steps and decide which they will perform themselves and which they will outsource to service providers. | modularization
QN=30 The mission of the Business Software Alliance is to ____. | stop the unauthorized copying of software
QN=31 Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work. | $100,000
QN=32 A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential. | trade secret
QN=33 Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____. | public interest
QN=34 Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____. | the company
QN=35 To prove fraud in a court of law, prosecutors must demonstrate that ____. | the accused made a false representation of a material fact
QN=36 ____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract. | Material breach of contract
QN=37 Accepting payment of entry fees for a golf tournament from a supplier is ____. | could be perceived as a bribe
QN=38 The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____. | lawful under the laws of the foreign country in which it was paid
QN=39 The Foreign Corrupt Practices Act permits facilitating payments so that an official performs or makes a(n) ____. | official function faster
QN=40 Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume. | 30%
QN=41 An IT professional organization whose mission is to provide superior leadership and education in information technology and that has a goal to help its members make themselves more marketable within their industry is ____. | AITP
QN=42 Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the ____. | certifying organization
QN=43 A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the ____ level and often requires that the recipient pass a test of some kind. | state
QN=44 The obligation to protect people against any unreasonable harm or risk is called ____. | duty of care
QN=45 Because there are no ____ against which to compare a software engineer�s professional behavior, he or she cannot be subject to malpractice lawsuits. | uniform standards
QN=46 A device that limits access to the company�s network based on the organization�s Internet usage policy is called a(n) ____. | firewall
QN=47 Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making. | core values and beliefs
QN=48 IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____. | information
QN=49 A feature that is associated with a bribe is that a bribe ____. | encourages an obligation for the recipient
QN=50 If misrepresentation causes a party to enter into a contract, that party may have the legal right to ____. | cancel the contract and seek reimbursement for damages
QN=51 The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some �4.9 billion was ____. | Jerome Kerviel
QN=52 ____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007. | Instant messaging abuse
QN=53 A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability. | exploit
QN=54 Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem. | patch
QN=55 Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user�s data or turn them into remote-controlled bots. | exploits
QN=56 ____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates. | Macro
QN=57 ____ was a worm that was released in 2007 and caused billions of dollars in damages. | Storm
QN=58 ____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date. | Logic bomb
QN=59 A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in. | distributed denial-of-service
QN=60 It is estimated that about one in ____ personal computers in the United States is part of a botnet. | four
QN=61 The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file. | dropper
QN=62 Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____. | valid test results
QN=63 ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people. | E-mail spam
QN=64 Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts. | bot
QN=65 Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act. | CAN-SPAM
QN=66 ____ have become the primary means for distributing spam, malware, and phishing scams. | Botnets
QN=67 The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain. | cybercriminal
QN=68 ____ is an annual gathering in Las Vegas of computer hackers. | DEFCON
QN=69 Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____. | cyberterrorism
QN=70 The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications. | US Code Title 18, Part I, Chapter 121
QN=71 ____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing. | Microsoft
QN=72 A strong security program begins by ____. | assessing the threats to an organization�s computers and network
QN=73 Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations. | mitigated
QN=74 The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system�s benefits or the risks involved. | reasonable assurance
QN=75 A security policy outlines what needs to be done but not ____ to do it. | how
QN=76 The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services. | National Institute of Standards and Technology
QN=77 Installation of a(n) ____ is the most common computer security precaution taken by businesses. | firewall
QN=78 The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation�s Internet infrastructure against cyberattacks. | U.S. Computer Emergency Readiness Team