MIS Quiz 3 example #28663

12 November 2022
5 (224 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
The ethical "no free lunch" rule states that: a) if an action is not right for everyone to take, it is not right for anyone to take b) one can put values in rank order and understand the consequences of various courses of action c) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work d) if an action cannot be taken repeatedly, then it is not right to be taken at any time e) one should take the action that produces the least harm or incurs the least cost
answer
c) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
question
Interpretations of Moore's law assert that: a) transistors decrease in size 50% every two years b) data storage costs decrease by 50% every 18 months c) computing power doubles every 18 months d) computing power will eventually level off e) PCs decrease in market share by 9% every 5 years
answer
c) computing power doubles every 18 months
question
According to ________, you should take the action that produces the least harm. a) Kant's categorical imperative b) the "no free lunch" rule c) the Golden Rule d) the utilitarian principle e) the risk aversion principle
answer
e) the risk aversion principle
question
________ means that you accept the potential costs and obligations for the decisions you make. a) Responsibility b) Accountability c) Duty d) Due process e) Liability
answer
a) Responsibility
question
________ states that the value or power of a network grows exponentially as a function of the number of network members. a) Law of scalability b) Law of networks c) Metcalfe's Law d) Law of outsourcing e) Moore's Law
answer
c) Metcalfe's Law
question
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? a) Spyware b) Phishing c) Spamming d) Profiling e) Targeting
answer
d) Profiling
question
When a cookie is created during a website visit, it is stored: a) on the ISP's servers b) in the browser's application settings c) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site d) on the website's server e) on the hard drive of the visitor's computer
answer
e) on the hard drive of the visitor's computer
question
Which of the following best describes how new information systems can result in legal gray areas? a) they are little understood by politicians or lawyers b) they work with networked, digital data, which are more difficult to control than information stored manually c) they result in new situations that are not covered by old laws d) they are implemented by technicians rather than managers d) they are created from sets of logical and technological rules rather than social or organizational mores.
answer
c) they result in new situations that are not covered by old laws
question
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? a) the slippery-slope rule b) the "No free lunch" rule c) Kant's Categorical Imperative d) the Golden Rule e) the Risk Aversion Principle
answer
c) Kant's Categorical Imperative
question
Digital media differs from a physical book in all of the following ways except: a) ease of transmission b) ease of establishing uniqueness c) ease of alteration d) ease of replication e) ease of global distribution
answer
b) ease of establishing uniqueness
question
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? a) the risk aversion principle b) the utilitarian principle c) Kant's categorical imperative d) the Golden Rule e) the "no free lunch" rule
answer
d) the Golden Rule
question
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. a) Due process b) Accountability c) the judicial system d) Liability e) Responsibility
answer
a) Due process
question
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? a) Scalability b) Disintermediation c) Expandability d) Modality e) Customizability
answer
a) Scalability
question
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? a) Grid b) Edge c) Quantum d) Autonomic e) On-demand
answer
e) On-demand
question
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? a) Copyright b) Trademark c) Patent d) Trade secret e) All forms of intellectual property protection
answer
d) Trade secret
question
Which one is not one of the features of Big Data that makes it powerful? a) zooming in to subsets of the data b) always finding a pattern with a large enough number of variables c) offering a constant stream of new information d) finding unbiased opinions e) making it easy to run A/B tests
answer
b) always finding a pattern with a large enough number of variables
question
Which of the following protects the authors of a book from having their work copied by others? a) Fair Use Doctrine b) Due process c) Copyright law d) Trade Secret law e) Patent protection
answer
c) Copyright law
question
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? a) Lemming rule b) Utilitarian principle c) Slippery-slope rule d) High-failure cost rule e) Golden Rule
answer
c) Slippery-slope rule
question
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. a) Copyright law b) Patent law c) Trademark law d) Trade secret protection e) Privacy law
answer
b) Patent law
question
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. a) opt-out b) opt-in c) PGP d) safe harbour e) P3P
answer
a) opt-out