What percent of global Internet users use Google Search and other Google services Quizlet

Recommended textbook solutions

U.S. History

1st EditionJohn Lund, Paul S. Vickery, P. Scott Corbett, Todd Pfannestiel, Volker Janssen

567 solutions

The Language of Composition: Reading, Writing, Rhetoric

2nd EditionLawrence Scanlon, Renee H. Shea, Robin Dissin Aufses

661 solutions

America's History for the AP Course

9th EditionEric Hinderaker, James A. Henretta, Rebecca Edwards, Robert O. Self

961 solutions

Tonal Harmony

8th EditionByron Almen, Dorothy Payne, Stefan Kostka

1,383 solutions

Recommended textbook solutions

U.S. History

1st EditionJohn Lund, Paul S. Vickery, P. Scott Corbett, Todd Pfannestiel, Volker Janssen

567 solutions

Tonal Harmony, Workbook

8th EditionByron Almen, Dorothy Payne, Stefan Kostka

1,387 solutions

The Language of Composition: Reading, Writing, Rhetoric

2nd EditionLawrence Scanlon, Renee H. Shea, Robin Dissin Aufses

661 solutions

Ways of the World: A Global History

3rd EditionRobert W. Strayer

232 solutions

Upgrade to remove ads

Only SGD 41.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

n

Terms in this set [180]

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws.

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues.

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

Property rights and obligations

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

Quality of life

Which of the following is not one of the current key technology trends that raises ethical issues?

Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

Information rights and obligations

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

Profiling

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

NORA

Which of the following is not an example of the potential dark side of big data?

Analyzing data from sensors installed in local parks to monitor soil moisture.

________ means that you accept the potential costs and obligations for the decisions you make.

Responsibility

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Accountability

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

All of the following are steps in the process for analyzing an ethical issue except:

assigning responsibility.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?

His action is acceptable, because the higher social value is the survival of the family.

Which of the following best describes Immanuel Kant's categorical imperative?

If an action is not right for everyone to take, it is not right for anyone to take.

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

According to ________, you should take the action that produces the least harm.

the risk aversion principle

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery-slope rule

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

the Golden Rule

In 2010, the FTC added all of the following recommendations to its privacy guidelines except:

firms should limit the length of time that any personal data is stored to six months or less.

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?

The Privacy Act

FIP principles are based on a belief in which of the following?

Mutuality of interest between the record holder and the individual

The FIP principle of Notice/Awareness states that:

websites must disclose their information practices before collecting data.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which of the following is not a U.S. federal law affecting private institutions?

Computer Matching and Privacy Protection Act

All of the following laws apply to actions by the federal government except the:

Children's Online Privacy Protection Act.

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer.

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe harbor

The Online Privacy Alliance:

encourages self-regulation to develop a set of privacy guidelines for its members.

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

opt-out

What percent of global Internet users use Google Search and other Google services?

Nearly 80 percent

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

All of the following are technical solutions to protecting user privacy except:

data use policies.

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.

The NAI is an industry association formed to help with which of the following?

Online privacy issues

Which of the following is not protected by copyright law?

Machines

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following statements about Flash cookies is not true?

Flash cookies are installed only at the user's request.

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

Patent law

TRUSTe is an example of which of the following?

Online seal program

Which of the following is not a difficulty in establishing patent protection?

The requirement that the work must be a secret

Which of the following is not true about the changes to EU data protection rules proposed in 2012?

The new rules would reject the right to be forgotten.

Digital media differs from a physical book in all of the following ways except:

ease of establishing uniqueness.

Which of the following were involved in what has been called the patent trial of the century?

Apple and Samsung

Which of the following is not a file-sharing service?

Pandora

________ are not held liable for the messages they transmit.

Regulated common carriers

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?

A failure of Amazon's cloud computing service

Which of the following is the most common reason that business systems fail?

Data quality

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

Which of the following statements about spam is not true?

Spamming is more tightly regulated in Europe than in the United States.

The U.S. CAN-SPAM Act:

requires commercial email senders to identify themselves.

Which of the five moral dimensions of the information age does spamming involve?

Quality of life

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital divide

CVS refers to:

eyestrain related to computer display screen use

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?

RSI

Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers?

Telecommunications

Which of the following is not an IT infrastructure service component?

Operating system software

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

technology standards.

A[n]________ is used to communicate between a user and an organization's back-end systems.

application server

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.

5, 4, 2, 3, 1

The introduction of the minicomputer:

allowed computers to be customized to the specific needs of departments or business units.

A client computer networked to a server computer, with processing split between the two types of machines, is called a[n]:

two-tiered client/server architecture.

In a multi-tiered network:

the work of the entire network is balanced over several levels of servers.

Interpretations of Moore's law assert that:

computing power doubles every 18 months.

Today's nanotechnology-produced computer transistors are roughly equivalent in size to:

a virus.

Which of the following is a multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms?

Unix

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?

Ethernet

The development of TCP/IP occurred during the ________ era.

enterprise computing

Which of the following became the standard PC in the Personal Computer Era?

Wintel PC

________ uses individual atoms and molecules to create computer chips and other devices.

Nanotechnology

________ states that the value or power of a network grows exponentially as a function of the number of network members.

Metcalfe's Law

Which of the following factors does not help explain why computing resources today are even more available than in previous decades?

Widespread rejection of technology standards

Which of the following is a leading networking hardware provider?

Cisco

Software that manages the resources of the computer is called:

operating system software.

A SAN is a ________ network.

storage area

Which of the following is an example of a legacy system?

Transaction processing system running on a mainframe

Which of the following is not an example of a wearable computing device?

Smartphones

________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.

Blade servers

________ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard.

Multitouch

Which of the following is not an example of the mobile digital platform?

CRM

All of the following are current hardware platform trends except:

Unix.

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of:

quantum computing

Which of the following is a recent addition to the mobile digital platform?

Wearable computing devices

At what percent of capacity do most servers operate?

15-20%

Which of the following enables a single physical resource [such as a server or a storage device] to appear to the user as multiple logical resources?

Virtualization

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

On-demand

All of the following are cloud computing services except:

virtualization as a service.

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

The marketplace for computer hardware:

has become increasingly concentrated in top firms.

Which of the following is the most popular mobile operating system?

Linux

Which of the following is not one of the NIST defined characteristics of cloud computing?

Reduced elasticity

Which of the following is not an example of the consumerization of IT?

Amazon Web Services

A[n] ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.

multicore processor

SaaS refers to:

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

Green computing

ZipRealty, which combines Google Maps with real estate data, is an example of:

a mashup.

Which type of software is created and updated by a worldwide community of programmers and available for free?

Open source

Which of the following is not one of the current software platform trends?

Multicore processors

Linux is:

an example of open-source software.

Which of the following statements about Linux is not true?

It has garnered 20 percent of the server operating system market.

Running a Java program on a computer requires:

a Java Virtual Machine to be installed on that computer.

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:

browser.

Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as:

web services.

Which of the following is the foundation technology for web services?

XML

Which of the following refers to a set of self-contained services that communicate with each other to create a working software application?

SOA

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:

software packages.

________ are created by combining and customizing components from different online software applications.

Web mashups

The practice of contracting custom software development to an outside firm is commonly referred to as:

outsourcing.

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a[n]:

SLA.

________ provides a standard format for data exchange, enabling web services to pass data from one process to another.

XML

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

Scalability

Hardware and software acquisition costs account for about ________ percent of TCO.

20

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

Total cost of ownership

How would you determine the market demand for your firm's IT services?

Hold focus groups to assess your services

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?

Your firm's organizational culture

Which of the following best illustrates the relationship between entities and attributes?

the entity CUSTOMER with the attribute PURCHASE

All of the following are issues with the traditional file environment except:

inability to develop specialized applications for functional areas.

A characteristic or quality that describes a particular database entity is called a[n]:

attribute.

A ________ is an example of pre-digital data storage that is comparable to a database.

library card catalog

________ creates confusion that hampers the creation of information systems that integrate data from different sources.

Data redundancy

Data ________ occurs when the same data is duplicated in multiple files of a database.

redundancy

Which of the following occurs when the same attribute in related data files has different values?

Data inconsistency

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

Field

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?

Lack of flexibility

Which of the following enables a DBMS to reduce data redundancy and inconsistency?

Ability to minimize isolated files with repeated data

A DBMS makes the:

physical database available for different logical views.

The logical view of a database:

presents data as they would be perceived by end users.

Which of the following is a DBMS for desktop computers?

Microsoft Access

A[n] ________ represent data as two-dimensional tables.

relational DBMS

Microsoft SQL Server is a[n]:

DBMS for midrange computers.

In a table for customers, the information about a single customer resides in a single:

row.

In a relational database, a record is referred to in technical terms as a[n]:

tuple.

A field identified in a table as holding the unique identifier of the table's records is called the:

primary key.

A field identified in a record as holding the unique identifier for that record is called the:

key field.

In a relational database, the three basic operations used to develop useful sets of data are:

select, project, and join.

The select operation:

creates a subset consisting of all records in the file that meet stated criteria.

The join operation:

combines relational tables to provide the user with more information than is otherwise available.

The project operation:

creates a subset consisting of columns in a table.

Microsoft Access's data dictionary displays all of the following information about a field except the:

the organization within the organization that is responsible for maintaining the data.

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which of the following is a specialized language that programmers use to add and change data in the database?

Data manipulation language

Which of the following is the most prominent data manipulation language today?

SQL

DBMSs typically include report generating tools in order to:

display data in an easier-to-read format.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization.

A schematic of the entire database that describes the relationships in a database is called a[n]:

entity-relationship diagram.

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with:

a crow's foot topped by a short mark.

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

Airport code

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:

in two short marks.

The term big data refers to all of the following except:

datasets with fewer than a billion records.

Which of the following technologies would you use to analyze the social media data collected by a major online retailer?

Hadoop

Which of the following is not one of the techniques used in web mining?

Server mining

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?

Identify sequences

You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use the data mining software you are using to do which of the following?

Classify data

A data warehouse is composed of:

historic and current internal data.

All of the following are technologies used to analyze and manage big data except:

cloud computing.

A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?

Sentiment analysis software

Which of the following tools enables users to view the same data in different ways using multiple dimensions?

OLAP

OLAP enables:

users to obtain online answers to ad-hoc questions in a rapid amount of time.

Data mining allows users to:

find hidden relationships in data.

In the context of data relationships, the term associations refers to:

occurrences linked to a single event.

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships.

Text mining

Which of the following enables you to create a script that allows a web server to communicate with a back-end database?

CGI

Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?

Application server software

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

Forecasting

In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules?

Classifications

In data mining, which of the following involves events linked over time?

Sequences

MongoDB and SimpleDB are both examples of:

NoSQL databases.

Which of the following would you use to find patterns in user interaction data recorded by a web server?

Web usage mining

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a[n]:

information policy

In a large organization, which of the following functions would be responsible for physical database design and maintenance?

Database administration

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?

Data inconsistency

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data scrubbing.

Data cleansing not only corrects errors but also:

enforces consistency among different sets of data.

Which of the following is not a method for performing a data quality audit?

Surveying data definition and query files

In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources?

Data administration

Sets with similar terms

MIS Chapter 4

60 terms

lexee_miller8

MIS Chapter 6

60 terms

Jcpruitt42

MIS Exam 2- Thomas WVU

88 terms

snmelniczenko

MIS Exam 2- Thomas WVU

88 terms

paris_vennis

Other sets by this creator

Statistics Exam 2

16 terms

Sam_Deaton

Statistics Test 1

19 terms

Sam_Deaton

Business Data Communications

120 terms

Sam_Deaton

Database Management

18 terms

Sam_Deaton

Recommended textbook solutions

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

What percent of global Internet users use Google search and other Google services ref 4 45?

Google Search is by far the most widely used search engine on desktop and mobile devices.

Which of the following restricts the information that the US federal government can collect about an individual and regulates what It can do with the information?

The Privacy Act of 1974, as amended, 5 U.S.C. § 552a, establishes a code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies.

Which of the following terms refers to significant disparities in access to computers and the Internet?

The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology [ICT], and those that don't or have restricted access. This technology can include the telephone, television, personal computers and internet connectivity.

Is a data analysis technology that finds hidden connections between data in disparate sources?

Nonobvious relationship awareness [NORA] is a new data analysis technology that can take data about people from many sources and correlate relationships to find hidden connections to identify potential criminals and terrorists.

Chủ Đề