Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 Which of the following is not one of the current key technology trends that raises ethical issues as discussed in Chapter 4 of

QUESTION 1

  1. Which of the following is not one of the current key technology trends that raises ethical issues as discussed in Chapter 4 of Laudon and Laudon?
a. Data storage improvements
b. Increase in data quality
c. Increase in use of mobile devices
d. Data analysis advancements

QUESTION 2

  1. Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of that decision?
a. Kant's categorical imperative
b. the risk aversion principle
c. the Golden Rule
d. the utilitarian principle

QUESTION 3

  1. When a cookie is created during a website visit, it is stored:
a. on the website's server.
b. on the hard drive of the visitor's computer.
c. on the ISP's servers.
d. nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.

\QUESTION 4

  1. Which of the following protects the authors of a book from having their work copied by others?
a. Patent protection
b. Due process
c. Copyright law
d. Fair Use Doctrine

QUESTION 5

  1. Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
a. Digital Millennium Copyright Act
b. Privacy Act
c. Freedom of Information Act
d. Computer Software Copyright Act

QUESTION 6

  1. ______ grants the owner exclusive ownership of the ideas behind an invention for 20 years.
a. Copyright law
b. Trademark law
c. Patent law
d. Trade secret protection

QUESTION 7

  1. Digital media differs from a physical book in all of the following ways except:
a. ease of replication.
b. ease of alteration.
c. ease of global distribution.
d. ease of establishing uniqueness.

QUESTION 8

  1. Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

True

False

QUESTION 9

  1. Based on the discussion in Chapter 5 of Laudon and Laudon, place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.
a. 5, 2, 3, 4, 1
b. 5, 4, 2, 3, 1
c. 4, 5, 2, 3, 1
d. 5, 4, 2, 1, 3

\QUESTION 10

  1. Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?
a. TCP/IP
b. COBOL
c. Ethernet
d.

ASCII

QUESTION 11

  1. ______ states that the value or power of a network grows exponentially as a function of the number of network members.
a. Metcalfe's Law
b. Moore's Law
c. Turing's Law
d. Babbage's Law

QUESTION 12

  1. Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?
a. Cloud computing
b. Virtualization
c. Multicore processing
d. Ubiquitous computing

QUESTION 13

  1. All of the following are cloud computing services except:
a. platform as a service.
b. infrastructure as a service
c. architecture as a service
d. software as a service

QUESTION 14

  1. Which type of software is created and updated by a worldwide community of programmers and available for free?
a. Software packages
b. Mashups
c. Open source
d. Outsourced

QUESTION 15

  1. Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as:
a. web services
b. SOA
c. SOAP
d. SaaS

QUESTION 16

  1. According to Chapter 8 of Laudon and Laudon, all of the following are specific security challenges that threaten corporate servers in a client/server environment except:
a. hacking.
b. sniffing.
c. malware.
d. denial-of-service attacks.

QUESTION 17

  1. CryptoLocker is an example of which of the following?
a. Worm
b. Sniffer
c. Evil twin
d. Ransomware

QUESTION 18

  1. A Trojan horse:
a. is software that appears to be benign but does something other than expected.
b. is a virus that replicates quickly.
c. installs spyware on users' computers.
d. is a type of sniffer used to infiltrate corporate networks.

QUESTION 19

  1. A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
a. phishing.
b. spoofing.
c. evil twins.
d. click fraud.

QUESTION 20

  1. Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
a. Sasser
b. Zeus
c. CryptoLocker
d. Conficker

QUESTION 21

  1. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ______ attack.
a. DDoS
b. DoS
c. phishing
d. SQL injection

QUESTION 22

  1. Evil twins are:
a. e-mail messages that mimic the e-mail messages of a legitimate business.
b. fraudulent websites that mimic a legitimate business's website.
c. bogus wireless network access points that look legitimate to users.
d. computers that fraudulently access a website or network using the IP address and identification of an authorized computer.

QUESTION 23

  1. Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring once this year. What is the annual expected loss from this exposure?
a. $500
b. $1,000
c. $1,250
d. $1,500

QUESTION 24

  1. According to Chapter 11 of Laudon and Laudon, ______ is expertise of organizational members that has not been formally documented.
a. wisdom
b. information
c. data
d. tacit knowledge

QUESTION 25

  1. Which of the following is not one of the main four dimensions of knowledge described in the chapter?
a. Knowledge is a firm asset.
b. Knowledge has different forms.
c. Knowledge has a location.
d. Knowledge is timeless.

QUESTION 26

  1. In a famous 1950 paper, ______ defined an artificial intelligent computer program as one that a human could have a conversation with and not be able to tell if was a computer.
a. Herbert Simon
b. Robert Metcalfe
c. David Filo
d. Alan Turing

QUESTION 27

  1. ______ represent the knowledge of experts as a set of rules that can be programmed to assist human decision makers.
a. Expert systems
b. Neural networks
c. Robotics
d. Natural language processors

QUESTION 28

  1. Software programs that work without direct human intervention to carry out specific tasks for individual users, business processes, or software applications, are called ______.
a. intelligent agents
b. business intelligence
c. AI hybrid systems
d. genetic algorithms

QUESTION 29

  1. ______ is the study of how computer programs can improve their performance without explicit programming.
a. Neural networks
b. Genetic algorithms
c. Machine learning
d. Expert systems

QUESTION 30

  1. A(n) ______ is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.
a. CAD
b. expert system
c. genetic algorithm
d. neural network

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these General Management questions