Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 1 Which of the following is not one of the current key technology trends that raises ethical issues as discussed in Chapter 4 of
QUESTION 1
- Which of the following is not one of the current key technology trends that raises ethical issues as discussed in Chapter 4 of Laudon and Laudon?
a. | Data storage improvements | |
b. | Increase in data quality | |
c. | Increase in use of mobile devices | |
d. | Data analysis advancements |
QUESTION 2
- Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of that decision?
a. | Kant's categorical imperative | |
b. | the risk aversion principle | |
c. | the Golden Rule | |
d. | the utilitarian principle |
QUESTION 3
- When a cookie is created during a website visit, it is stored:
a. | on the website's server. | |
b. | on the hard drive of the visitor's computer. | |
c. | on the ISP's servers. | |
d. | nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site. |
\QUESTION 4
- Which of the following protects the authors of a book from having their work copied by others?
a. | Patent protection | |
b. | Due process | |
c. | Copyright law | |
d. | Fair Use Doctrine |
QUESTION 5
- Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
a. | Digital Millennium Copyright Act | |
b. | Privacy Act | |
c. | Freedom of Information Act | |
d. | Computer Software Copyright Act | |
|
QUESTION 6
- ______ grants the owner exclusive ownership of the ideas behind an invention for 20 years.
a. | Copyright law | |
b. | Trademark law | |
c. | Patent law | |
d. | Trade secret protection |
QUESTION 7
- Digital media differs from a physical book in all of the following ways except:
a. | ease of replication. | |
b. | ease of alteration. | |
c. | ease of global distribution. | |
d. | ease of establishing uniqueness. |
QUESTION 8
- Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
True
False
QUESTION 9
- Based on the discussion in Chapter 5 of Laudon and Laudon, place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.
a. | 5, 2, 3, 4, 1 | |
b. | 5, 4, 2, 3, 1 | |
c. | 4, 5, 2, 3, 1 | |
d. | 5, 4, 2, 1, 3 |
\QUESTION 10
- Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?
a. | TCP/IP | |
b. | COBOL | |
c. | Ethernet | |
d. | ASCII
|
QUESTION 11
- ______ states that the value or power of a network grows exponentially as a function of the number of network members.
a. | Metcalfe's Law | |
b. | Moore's Law | |
c. | Turing's Law | |
d. | Babbage's Law |
QUESTION 12
- Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?
a. | Cloud computing | |
b. | Virtualization | |
c. | Multicore processing | |
d. | Ubiquitous computing |
QUESTION 13
- All of the following are cloud computing services except:
a. | platform as a service. | |
b. | infrastructure as a service | |
c. | architecture as a service | |
d. | software as a service |
QUESTION 14
- Which type of software is created and updated by a worldwide community of programmers and available for free?
a. | Software packages | |
b. | Mashups | |
c. | Open source | |
d. | Outsourced |
QUESTION 15
- Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as:
a. | web services | |
b. | SOA | |
c. | SOAP | |
d. | SaaS |
QUESTION 16
- According to Chapter 8 of Laudon and Laudon, all of the following are specific security challenges that threaten corporate servers in a client/server environment except:
a. | hacking. | |
b. | sniffing. | |
c. | malware. | |
d. | denial-of-service attacks. |
QUESTION 17
- CryptoLocker is an example of which of the following?
a. | Worm | |
b. | Sniffer | |
c. | Evil twin | |
d. | Ransomware |
QUESTION 18
- A Trojan horse:
a. | is software that appears to be benign but does something other than expected. | |
b. | is a virus that replicates quickly. | |
c. | installs spyware on users' computers. | |
d. | is a type of sniffer used to infiltrate corporate networks. |
QUESTION 19
- A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
a. | phishing. | |
b. | spoofing. | |
c. | evil twins. | |
d. | click fraud. |
QUESTION 20
- Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
a. | Sasser | |
b. | Zeus | |
c. | CryptoLocker | |
d. | Conficker |
QUESTION 21
- Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ______ attack.
a. | DDoS | |
b. | DoS | |
c. | phishing | |
d. | SQL injection |
QUESTION 22
- Evil twins are:
a. | e-mail messages that mimic the e-mail messages of a legitimate business. | |
b. | fraudulent websites that mimic a legitimate business's website. | |
c. | bogus wireless network access points that look legitimate to users. | |
d. | computers that fraudulently access a website or network using the IP address and identification of an authorized computer. |
QUESTION 23
- Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring once this year. What is the annual expected loss from this exposure?
a. | $500 | |
b. | $1,000 | |
c. | $1,250 | |
d. | $1,500 |
QUESTION 24
- According to Chapter 11 of Laudon and Laudon, ______ is expertise of organizational members that has not been formally documented.
a. | wisdom | |
b. | information | |
c. | data | |
d. | tacit knowledge |
QUESTION 25
- Which of the following is not one of the main four dimensions of knowledge described in the chapter?
a. | Knowledge is a firm asset. | |
b. | Knowledge has different forms. | |
c. | Knowledge has a location. | |
d. | Knowledge is timeless. |
QUESTION 26
- In a famous 1950 paper, ______ defined an artificial intelligent computer program as one that a human could have a conversation with and not be able to tell if was a computer.
a. | Herbert Simon | |
b. | Robert Metcalfe | |
c. | David Filo | |
d. | Alan Turing |
QUESTION 27
- ______ represent the knowledge of experts as a set of rules that can be programmed to assist human decision makers.
a. | Expert systems | |
b. | Neural networks | |
c. | Robotics | |
d. | Natural language processors |
QUESTION 28
- Software programs that work without direct human intervention to carry out specific tasks for individual users, business processes, or software applications, are called ______.
a. | intelligent agents | |
b. | business intelligence | |
c. | AI hybrid systems | |
d. | genetic algorithms |
QUESTION 29
- ______ is the study of how computer programs can improve their performance without explicit programming.
a. | Neural networks | |
b. | Genetic algorithms | |
c. | Machine learning | |
d. | Expert systems |
QUESTION 30
- A(n) ______ is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.
a. | CAD | |
b. | expert system | |
c. | genetic algorithm | |
d. | neural network |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started