Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
Briefly discuss some of the things that avatars can do in an online virtual world.
Q:
Briefly discuss the legality of an employer rejecting a job applicant based on the contents of the individual's social networking profile.
Q:
Discuss how social networking Web sites manage the uploading of inappropriate material.
Q:
__________ is a social networking Web site for friends, family members, and coworkers looking to stay connected through the exchange of messages that are a maximum of 140 characters.
Q:
Most social networking Web sites have policies against uploading videos depicting__________ .
Q:
__________ provide a huge online world in which players take on the role of a character and control that character's action.
Q:
User accounts that violate a Web sites__________ can be terminated.
Q:
__________ involves placing banner ads on a social networking Web site.
Q:
The__________ federal law makes it a crime to transmit any communication in interstate or foreign commerce containing a threat to injure another person.
Q:
__________ combine two highly popular online activities–shopping and social networking.
Q:
__________ is a business-oriented social networking site used for professional networking; users create a network made up of people they know and trust in business.
Q:
Laws prohibiting the use of social networks by registered sex offenders violate the__________ of the sex offenders.
Q:
Creating a Web site or social networking profile to humiliate or threaten an individual is a form of__________ .
Q:
Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.
a. True
b. False
Q:
Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online.
a. True
b. False
Q:
A number of universities are exploring the use of virtual online worlds to improve teaching, learning, and creative expression.
a. True
b. False
Q:
Averaged across all ages, U.S. males spend over 6 hours per month on social networking sites.
a. True
b. False
Q:
MySpace purged__________ sex offenders from its site over a period of two years.a. 25,000b. 65,000c. 90,000d. 113,500
Q:
__________ built a virtual world model of its Salt Lake refinery for training new operators.a. British Petroleumb. Exxon Mobilc. Shelld. Chevron
Q:
__________ is a social shopping Web site that implemented a reward system for members in which they are paid a commission each time another shopper acts on their recommendations to purchase a specific item.a. Buzzillionsb. ZEBOc. Kaboodled. Stuffpit
Q:
The National Center for Victims of Crime advises victims to__________ .a. destroy all evidence of any contact with the cyberstalkerb. meet in a public place with the cyberstalker to talk things out before involving any law enforcement officersc. not consider getting law enforcement officers involved until the stalker threatens violenced. send the stalker a written notice that their contact is unwanted and that further contact should cease
Q:
A majority of social shopping Web sites generate revenue through__________ .a. retailer advertisingb. sharing with retailers data about their members' like and dislikesc. membership feed. Internet service providers
Q:
Briefly discuss the need of medical information Web sites.
Q:
Define the term telemedicine and briefly describe the various forms of telemedicine.
Q:
__________ reduces the need for patients to travel for treatment and allows healthcare professionals to serve more patients in a broader geographic area.
Q:
The Joint Commission on Accreditation of Healthcare Organizations has stated that it is not acceptable for medical professionals to communicate with patients via__________ .
Q:
The__________ was passed as part of the $787 billion 2009 American Recovery and Reinvestment Act economic stimulus plan.
Q:
Some critics believe that the use of EHR may actually have contributed to__________ healthcare costs by making it easier to bill for patient services.
Q:
Live telemedicine usually involves a__________ to establish connection between a patient and healthcare providers at different sites.
Q:
Patient involvement with remote doctors may have a__________ effect on the local doctors' relationships with their patients and could adversely affect patient care.
Q:
__________ requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites.
Q:
Acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation constitute__________ .
Q:
Laypeople can access reliable and objective information on a wide range of medical topics on__________ .
Q:
__________ employs electronic information processing and telecommunications to support at-a-distance health care, provide professional and patient health-related training, and support healthcare administration.
Q:
A(n) __________ is a computer-readable record of health-related information on an individual.
Q:
__________ treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.
Q:
Black-box testing and white-box testing are two forms of__________ .
Q:
If an organization follows widely accepted development methods, __________ on its part is hard to prove.
Q:
An airline's online ticketÂreservation system and an electronic funds transfer system that moves money among banks, are examples of__________.
Q:
The plaintiff must have a valid contract that the supplier did not fulfill in order to win a(n)__________ claim.
Q:
As a result of the lack of consistent quality in software, many organizations avoid buying the__________ release of a major software product.
Q:
A(n) __________ assures buyers or lessees that a product meets certain standards of quality.
Q:
__________ focuses on how to define, measure, and refine the quality of the development process and the products developed during its various stages.
Q:
Defendants in a(n) __________ action may use several legal defenses, including the doctrine of supervening event, the government contractor defense, and an expired statute of limitations.
Q:
A(n) __________ is any error that, if not removed, could cause a software system to fail to meet its users' needs.
Q:
The use of software introduces__________ that concern many executives.
Q:
Software suppliers frequently write__________ to attempt to limit their liability in the event of nonperformance.
a. manuals
b. warnings
c. warranties
d. sureties
Q:
__________ can be oral, written, or inferred from the seller's conduct.
a. Indemnity
b. Strict liabilities
c. Warranty tolling
d. Express warranties
Q:
When sued for__________ , a software supplier is not held responsible for every product defect that causes customer or third-party loss.
a. breach of warranty
b. misrepresentation
c. strict liability
d. negligence
Q:
__________ means that the defendant is held responsible for injuring another person, regardless of negligence or intent.
a. Contributory negligence
b. Misrepresentation
c. Strict liability
d. Breach of warranty
Q:
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for__________.
a. breach of warranty
b. comparative negligence
c. contributory negligence
d. strict liability
Q:
In one lawsuit in the early__________, a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems.
a. 1990s
b. 1980s
c. 1970s
d. 1960s
Q:
Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect product__________.
a. quality
b. delivery
c. testing
d. development
Q:
A type of business system is the__________, which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio.
a. upgrade management system
b. decision support system
c. executive information system
d. data information system
Q:
Which of the following is true of software testing? a. White-box testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. b. Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in whitebox testing, are known. c. Static testing involves software programs called static analyzers which are run against new code.d. Integration testing involves independent testing that is performed by trained end users to ensure that the system operates as they expect.
Q:
Which of the following is true of strategies for engineering quality software?a. High-quality software systems are tough to learn and use because they perform slowly.c. Developers develop high-quality software instantaneously without a set of principles. b. Software defects never lead to injury.d. The first release of any software rarely meets all its users' expectations.
Q:
Software quality is defined as the degree to which a software product meets:
a. the needs of its users.
b. the standards of its competitors.
c. sustainability and environmental protection needs.
d. the minimum financial return standards.
Q:
Motion picture companies supported the development and worldwide licensing of the__________, which enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them.
a. Time Warner Cable system
b. RIAA
c. DeCSS
d. Content Scramble System (CSS)
Q:
The concept that an idea cannot be copyrighted but the__________of an idea can be is key to understanding copyright protection.
a. expression
b. summary
c. variation
d. illustration
Q:
A patent is a grant of a property right issued by the__________to an inventor.
a. USPS
b. USPTO
c. FTC
d. SEC
Q:
Copyright and patent protection was established through__________.
a. the Bill of Rights
b. the U.S. Federal Codes and Statutes
c. the U.S. Constitution
d. various state laws
Q:
The U.S. Supreme Court has ruled that there are__________classes of items that cannot be patented.
a. two
b. three
c. four
d. five
Q:
__________ is the existing body of knowledge available to a person of ordinary skill in the art.
a. Prior experience
b. Known facts
c. Body of practice
d. Prior art
Q:
__________ is the process of taking something apart in order to understand it, build a copy of it, or improve it. a. Plagiarism b. Patent infringement c. Reverse engineering d. Decompiling
Q:
The __________of 1996 imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets.a. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act b. The Economic Espionage Act (EEA)c. Agreement on Trade-Related Aspects of Intellectual Property Rights d. The Lanham Act
Q:
Patent law protects__________.
a. art and film
b. information critical to an organization's success
c. books
d. inventions
Q:
The Digital Millennium Copyright Act (DMCA) was signed into law in__________.
a. 1992
b. 1998
c. 1990
d. 1996
Q:
Programs with open source code can be adapted to meet new needs, and bugs can be rapidly identified and fixed.
a. True
b. False
Q:
In the early days of the Web, many cybersquatters registered domain names for famous trademarks or company names to which they had no connection.
a. True
b. False
Q:
The first state to enact the Uniform Trade Secrets Act was Illinois.
a. True
b. False
Q:
Competitive intelligence analysts must be authorized to take unethical or illegal actions in the normal course of their job.
a. True
b. False
Q:
Competitive intelligence involves the gathering and analysis of the trade secrets of your competitors.
a. True
b. False
Q:
A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.
a. True
b. False
Q:
Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.
a. True
b. False
Q:
Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application.
a. True
b. False
Q:
Reverse engineering can only be applied to computer hardware, not computer software.
a. True
b. False
Q:
Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding non-compete clauses to employment contracts.
a. True
b. False
Q:
A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.
a. True
b. False
Q:
The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
a. True
b. False
Q:
A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
a. True
b. False