BBA 350 Final Exam Practice Questions – Flashcards
Unlock all answers in this set
Unlock answersquestion
Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.
answer
False
question
The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.
answer
True
question
The board of directors of an organization is normally responsible for day-to-day management and operations of the organization.
answer
False
question
The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.
answer
True
question
The virtues ethics approach to decision making focuses on how one should behave and think about relationships if he or she is concerned with his or her daily life in the community.
answer
True
question
An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
answer
False
question
Consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization - that it will behave in the future much as it has in the past.
answer
True
question
A rapid increase in the appointment of corporate ethics officers typically follows:
answer
the revelation of a major business scandal.
question
In a(n)_____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year.
answer
social audit
question
In a forprofit organization, it is the primary objective of the _____ to oversee the organization's business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community.
answer
board of directors
question
Someone who stands to gain or lose, depending on how a situation is resolved is called a ________.
answer
stakeholder
question
Which of the following steps in the decision-making process gathers and analyzes facts and also identifies stakeholders affected by the decision?
answer
Develop problem statement
question
Which of the following statements best describes a reason why organizations pursue corporate social responsibility (CSR) goals and promote a work environment in which employees are encouraged to act ethically when making business decisions?
answer
To gain the goodwill of the community
question
______ had one of the lowest software piracy rates in 2011.
answer
New Zealand
question
The Foreign Corrupt Practices Act is a legally binding global treaty to fight bribery and corruption.
answer
False
question
From a legal perspective, there is both a reasonable person standard and a reasonable professional standard to decide whether parties owe a duty of care.
answer
True
question
The core body of knowledge for any profession outlines an agreed-upon code of ethics and practices for those who practice in that profession.
answer
False
question
The United States has adopted labor laws and regulations that require a more precise definition of what is meant by a professional employee.
answer
True
question
Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers.
answer
True
question
A bribe is a crime even if the payment was lawful under the laws of the foreign country in which it was paid.
answer
False
question
When the Business Software Alliance (BSA) finds cases of software piracy, it can assess heavy monetary penalties.
answer
True
question
A ______ states the principles and core values that are essential to the work of a particular occupational group.
answer
professional code of ethics
question
The ______ permits facilitating payments that are made for "routine government actions," such as obtaining permits.
answer
FCPA
question
A(n) ______ is the failure to act as a reasonable person would act.
answer
breach of the duty of care
question
In 1972, the _____ recommended that publicly held organizations establish audit committees.
answer
Securities and Exchange Commission (SEC)
question
_____ In a corporate setting can sometimes be directly traceable to IT users - they might allow it to happen or they might actively engage in it.
answer
Software piracy
question
Which of the following statements is true about licensing of IT workers?
answer
There is no single administrative body to accredit professional education programs for IT.
question
From a legal perspective, IT workers are not recognized as professionals because they are not _____ by the state or federal government.
answer
Licensed
question
The _____ code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
answer
Dropper
question
A(n) ________ works by using the internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.
answer
Virtual private network
question
An antivirus software scans for a specific sequence of bytes, known as a ______, that indicates the presence of specific malware.
answer
Virus signature
question
______ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.
answer
Hackers
question
The _____ policy is a template available from the SANS institute that defines the means to establish a culture of openness, trust, and integrity in business practices.
answer
Ethics
question
_____ have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript.
answer
Macro viruses
question
A _______ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
answer
Distributed denial-of-service
question
Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
answer
False
question
The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective.
answer
True
question
Malicious insiders mean well but have the potential to cause considerable damage through their actions.
answer
False
question
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
answer
False
question
Employees and contract workers must be educated about the importance of security so they will be motivated to understand and follow the security policies.
answer
True
question
Competitive intelligence is conducted by industrial spies.
answer
False
question
Whenever possible, automated system rules should mirror an organization's written policies.
answer
True
question
Electronically stored information includes any form of digital information stored on any form of electronic storage device.
answer
True
question
There is virtually no way to limit the deposit of cookies on a user's hard drive.
answer
False
question
The pretexting rule addresses attempts by people to access personal information without proper authority by such means as impersonating an account holder or phishing.
answer
True
question
Exemptions to the Freedom of Information Act bar disclosure of information that could compromise national security or interfere with an active law enforcement investigation.
answer
True
question
The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.
answer
True
question
The European Union Data Protection Directive requires member countries to ensure that data transferred to non-European Union countries is protected.
answer
True
question
Through the use of cookies, a Web site is able to identify visitors on subsequent visits.
answer
True
question
The _____ presumes that a student's records are private and not available to the public without the consent of the student.
answer
Family Educational Rights and Privacy Act
question
Under the ______, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.
answer
Gramm-Leach-Bliley Act
question
The Children's Online Privacy Protection Act _____.
answer
does not cover the dissemination of information to children
question
The ______ restricted the government's ability to secretly intercept communications.
answer
Communications Act of 1934
question
The ______ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.
answer
Fourth Amendment
question
The ______ prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites.
answer
Electronic Communications Privacy Act
question
The ______ allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies.
answer
Fair and Accurate Credit Transactions Act
question
The Fifth Amendment protects American's rights to freedom of religion and freedom of expression.
answer
False
question
Anonymous political expression played an important role in the early formation of the United States.
answer
True
question
The Communications Decency Act was aimed at protecting children from pornography, but it was found unconstitutional.
answer
True
question
Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain cases.
answer
True
question
Most countries other than the United States do not provide constitutional protection for hate speech.
answer
True
question
The Children's Internet Protection Act (CIPA) was an attempt to protect children from accessing pornography and other explicit material online.
answer
True
question
Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity laws.
answer
True
question
______ involves the examination of internet records in an attempt to reveal the identity of an anonymous poster.
answer
Doxing
question
Section 230 of the _____ provides immunity to an internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider.
answer
Communications Decency Act
question
Possession of child pornography is a federal offense punishable by up to ______ years in prison.
answer
Five
question
Which of the following can provide a virtually untraceable level of anonymity to email messages?
answer
Remailers
question
U.S. laws do not allow a person to be _____ for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country.
answer
Extradited
question
In the U.S., speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the _____ Amendment.
answer
First
question
Which of the following statements is true of the Communications Decency Act (CDA)?
answer
The problem with the CDA was its broad language and vague definition of "indecency", as a standard that was left to individual committees to determine.
question
The _______ of 2008 increased trademark and copyright enforcement and substantially increased penalties for infringement.
answer
Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act
question
Motion picture companies supported the development and worldwide licensing of the ______, which enables a DVD player or a computer drive to decrypt, unscramble and play back motion pictures on DVDs, but not copy them.
answer
Content Scramble System (CSS)
question
The U.S. Supreme Court has ruled that there are ______ classes of items that cannot be patented.
answer
Three
question
The concept that an idea cannot be copyrighted but the _____ of an idea can be is key to understanding copyright protection.
answer
Expression
question
Firefox and OpenOffice are all examples of _____.
answer
open source software
question
A(n) _______ can read the machine language of a software program and produce the source code.
answer
Decompiler
question
Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.
answer
Digital Millennium Copyright Act (DMCA)
question
The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process of obtaining a trademark, and the penalties associated with trademark infringement.
answer
True
question
The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
answer
False
question
Competitive intelligence involves gathering and analysis of the trade secrets of your competitors.
answer
False
question
The Nominative Fair Use Doctrine is a defense often employed by the defendant in trademark infringement cases.
answer
True
question
Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding non-compete clauses to employment contracts.
answer
True
question
The World Trade Organization (WTO) developed the Agreement on Trade-Related Aspects of Intellectual Property Rights to establish the minimum levels of protection that each government must provide to the intellectual property of all WTO members.
answer
True
question
Defining and controlling the appropriate level of access to intellectual property are complex tasks.
answer
True
question
Which of the following is true of the International Organization for Standardization?
answer
It is a worldwide federation standards bodies from 161 countries.
question
Products, such as statements of requirements, flowcharts, and user documentation, are known as _____
answer
Deliverables
question
Which of the following is true of software testing?
answer
Static testing involves software programs called static analyzers which are run against new code.
question
In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is.
answer
22.1
question
Software quality is defined as the degree to which a software product meets:
answer
the needs of its users
question
_______ is common in airplane and spacecraft control systems.
answer
Triple version programming
question
When sued for _______ , a software supplier is not held responsible for every product defect that causes customer or third-party loss.
answer
Negligence
question
In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.
answer
False
question
In integration testing, special software programs called static analyzers are run against the new code.
answer
False
question
Software quality is the degree to which a software product meets the needs of its users.
answer
True
question
Software product litigation first occurred in 2000.
answer
False
question
When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.
answer
False
question
Software developers do not typically work closely with safety and software engineers.
answer
False
question
Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes.
answer
True
question
Since businesses implemented automated payroll systems, fewer accounting employees are needed.
answer
True
question
Mastering the use of cell phones has a significant learning curve.
answer
False
question
In the early days of IT in the 1960s, productivity improvements were difficult to measure.
answer
False
question
The digital divide cannot exist within countries.
answer
False
question
Telework increases ad hoc work requests and disruptions from fellow workers.
answer
False
question
A disadvantage of teleworking is that the contributions of teleworkers may not be fully recognized and credited.
answer
True
question
Online tools offered by medical insurers enable patients to compare the quality, safety, and cost information on hospitals nationwide.
answer
True
question
The _______ is a low-cost laptop introduced by Intel and Lenovo designed for use in kindergarten through high school classrooms in developing countries.
answer
Classmate+
question
It can take _______ for IT investment to result in a significant increase in productivity.
answer
five to seven years
question
Compared to personal computers, cell phones
answer
come with an extended battery life
question
The _______ is a low-cost computer that runs a Linux-based operating system and comes with a suite of 300 or so learning applications called Sugar.
answer
OLPC XO-4
question
In 2006, _______ introduced a low-cost laptop called the Classmate PC.
answer
Intel
question
The full name of the E-Rate program is _______ .
answer
Schools and Libraries Program of the Universal Service Fund
question
The Bureau of Labor Statistics tracks U.S. productivity on a(n) _______ basis.
answer
quarterly
question
An advantage social network advertising has over more traditional advertising media is that it allows advertisers to create an opportunity to generate a conversation with ad viewers.
answer
True
question
Averaged across all ages, U.S. males spend over 6 hours per month on social networking sites.
answer
True
question
There are a number of ethical issues associated with using social network advertising to send messages to an individual's network of friends.
answer
True
question
The recommended approach to put an end to cyberstalking is to insist that the cyberstalker meet face-to-face with the victim to talk things out.
answer
False
question
A survey found that 92 percent of respondents either use or plan to use some form of social media in their recruiting.
answer
True
question
Cyberbullying can be easily identified and abolished.
answer
False
question
In some virtual worlds, an avatar can earn virtual world money by performing some task in the virtual world and convert their virtual world money into real world cash.
answer
True
question
_______ built a virtual world model of its Salt Lake refinery for training new operators.
answer
Chevron
question
Most social networking Web sites have terms of use agreement that states the Web site has the right to _______ .
answer
delete material that violates the site's policies
question
_______ is a social networking site where entrepreneurs and small-business people collaborate to help each other to succeed.
answer
Biznik
question
Unless organizations _______ social networks, their customers are left to resolve their issues and questions on their own, often in ways that are not ideal.
answer
monitor
question
Hotmail created what is recognized by many as the most successful _______ campaigns ever when it first launched its service in 1996.
answer
viral marketing
question
The popularity of social networking is increasing most rapidly _______ .
answer
over all ages
question
_______ of video material is being uploaded to YouTube every minute making it difficult to review all video material submitted for posting.
answer
More than 100 hours
question
Electronics manufacturing employees and suppliers at all steps along the supply chain and manufacturing process are at risk of unhealthy exposure to potentially harmful materials.
answer
True
question
According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-granting computer science departments has declined dramatically from 2004 to 2009
answer
True
question
Contingent workers, H-1B workers, and outsourced offshore workers are examples of nontraditional workers
answer
True
question
The European Union's Restriction of Hazardous Substances Directive restricts the use of many hazardous materials in computer manufacturing.
answer
True
question
The U.S. Congress has approved the granting of an unlimited number of H-1B visas.
answer
False
question
A person can work for a U.S. employer as an H-1B employee for a maximum continuous period of ten years.
answer
False
question
Outsourcing is a short-term business arrangement in which a company contracts for services with an overseas organization that has expertise in providing a specific function.
answer
False
question
One potential disadvantage of using contingent workers is that _______ .
answer
they may not feel a strong connection to the company for which they are working
question
The _______ in Egypt reduced the attractiveness of that country as a source of IT outsourcing.
answer
political unrest
question
Before a company can apply for an H-1B visa worker, it must file _______.
answer
a Labor Condition Application
question
Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur _______ .
answer
training costs
question
The False Claims Act was enacted during _______ .
answer
the U.S. Civil War
question
Congress has set the number of H-1B visas to be granted at _______ per year each year since 2004 with another 20,000 visas available for only foreign graduates of U.S. universities with advanced degrees.
answer
65,000
question
The ________ requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging.
answer
European Union's Restriction of Hazardous Substances Directive