Sunteți pe pagina 1din 40

agreed to pay a $97 million settlement in 2001 to some 10,000 so-called permatemp s, temporary workers employed for an extended

length of time answer: microsoft are a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output answer: Business information systems are harmful programs that reside in the active memory of the computer and duplic ate themselves answer: Worms employs N-version programming to reduce disk sector failures in data storage dev ices answer: IBM executes a virtual 24-hour workday that saves its customers money, speeds projec ts to completion, and provides continuous support for key software application answer: Syntel focuses on how you should behave and think about relationships if you are concer ned with your daily life in a community answer: Virtue ethics ____ gathering has become enough of a science that nearly 25 colleges and univer sities offer courses or entire programs answer: Competitive intelligence ____ has developed a professional exam for electrical engineers and computer eng ineers. answer: The National Council of Engineering Examiners and Surveyors (NCEES) ____ has the lowest piracy rates. answer: Germany ____ in a corporate setting can be directly traceable to IT professionals they m ight allow it to happen or they might actively engage in it. answer: Software piracy ____ investigations are usually triggered by calls to their hotline (888-NO-PIRA CY), reports sent to the Web site, and referrals from member companies. answer: BSA ____ involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown. answer: Black-box testing ____ is a comprehensive health Web site with information on diet and nutrition, disease treatment and therapy, herbal remedies, baby care, sex, and other topics . answer: looksmarthealth.com ____ is a term used to describe works of the mind, such as art, books, films, fo rmulas, inventions, music, and processes, that are distinct and owned or created by a single person or group. answer: Intellectual property ____ is an attempt to steal personal identity data by tricking users into enteri ng the information

on a counterfeit Web site. answer: Phishing ____ is an effort by an employee to attract attention to a negligent, illegal, u nethical, abusive, or dangerous act by a company that threatens the public inter est. answer: Whistle-blowing ____ is an effort to attract public attention to a negligent, illegal, unethical , abusive, or dangerous act by a company that threatens the public interest. answer: Whistle-blowing ____ is an important technique used to develop any ISO 9000-compliant quality sy stem. answer: Failure mode and effects analysis (FMEA) ____ is the country with the highest piracy rate. answer: Vietnam ____ is the crime of obtaining goods, services, or property through deception or trickery. answer: Fraud ____ is the gathering of legally obtainable information to help a company gain a n advantage over its rivals. answer: Competitive intelligence ____ is the legal authority for electronic surveillance outside the United State s. answer: Executive Order 12333 ____ is the probability of an undesirable event occurring times the magnitude of the events consequences if it does happen. answer: Risk ____ is the product of multiplying the likelihood of an event by the impact of i ts occurrence. answer: Risk ____ law guarantees developers the rights to their works for a certain amount of time. answer: Copyright ____ law has proven to be extremely flexible in covering new technologies softwa re, video games, multimedia works, and Web pages can all be protected. answer: Copyright ____ means that the defendant is held responsible for injuring another person, r egardless of negligence or intent. answer: Strict liability ____ occurs when someone steals key pieces of personal information to gain acces s to a persons financial accounts. answer: Identity theft ____ often include others besides people who are directly involved in an issue. answer: Stakeholders ____ protection begins by identifying all the information that must be protected

from undisclosed patent applications to market research and business plans and developing a comprehensive strategy for keeping the information secure. answer: Trade secret ____ refers to any program whose source code is made available for use or modifi cation as users or other developers see fit. answer: Open source code ____ refers to methods within the development cycle that guarantee reliable oper ation of the product. answer: Software quality assurance (QA) ____ refers to the obligation to protect people against any unreasonable harm or risk. answer: Duty of care ____ reveals, for example, that the consumer visited an affiliated book site and requested information about the latest Dean Koontz book. answer: GET data ____ telemedicine involves acquiring data, sound, images, and video from a patie nt and then transmitting it to a medical specialist for assessment later. answer: Store-and-forward deo biet ____ telemedicine often employs videoconferencing. answer: Live ____, which provides credit card payment services for about 100,000 e-commerce f irms, was the target of a massive attack on its payment gateway service that dis rupted customers for several days. answer: Authorize.Net ================================================================================ ======================================= A ____ attack is one in which a malicious hacker takes over computers on the Int ernet and causes them to flood a target site with demands for data and other sma ll tasks. answer: denial-of-service A ____ defines an organizations security requirements and the controls and sanct ions needed to meet those requirements. answer: security policy A ____ highlights an organizations key ethical issues and identifies the overarc hing values and principles that are important to the organization and its decisi on making. answer: code of ethics A ____ is a hardware or software device that serves as a barrier between a compa ny and the outside world and limits access to the companys network based on the organizations Internet usage policy. answer: firewall A ____ is a program that a hacker secretly installs on a computer. answer: spam A ____ stands guard between your organizations internal network and the Internet and limits network access based on the organizations access policy. answer: firewall

A ____ states the principles and core values that are essential to the work of a particular occupational group. answer: professional code of ethics A ____ works by using the Internet to relay communications, but maintains privac y through security procedures and tunneling protocols that encrypt data at the s ending end and decrypt it at the receiving end. answer: VPN A 2004 survey estimated that 104,000 U.S. software and service jobs were moved o verseas in 2003, but thats only ____ percent of the estimated 10.5 million IT jo bs in the United States. answer: 1 A code of ethics cannot gain company-wide acceptance unless it is developed with employee participation and fully endorsed by the organizations leadership answer: T A complex system used in IT is a redundant array of independent disks (RAID), wh ich is commonly used in ____ for file servers. answer: high-volume data storage A complication of the common good approach is that measuring and comparing the v alues of certain benefits and costs is often difficult, if not impossible answer: T A filtering system is available through the ____, a nonprofit organization whose members include Internet industry leaders such as AOL Europe, BellSouth, Britis h Telecom, IBM, Microsoft, and Verizon. answer: Internet Content Rating Association (ICRA) A firewall protects a Web site from a denial-of-service attack answer: F A handful of IT professional organization have emerged as preeminent, so there i s a universal code of ethics for IT professionals answer: F A Maine court forced ____ to issue rebates to many of its customers for outages they experienced during the outbreak of the Slammer worm. answer: Verizon Communications Inc. A primary cause for poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so. answer: T A private key encryption system uses two keys to encode and decode messages. answer: F A professional is a man who can do his best at a time when he doesn't particular ly feel like it. This is a quote from ____. answer: Alistair Cooke A security policy outlines what needs to be done, but not how to do it answer: T A technology, process, or principle that has been patented may be embedded knowi ngly or

unknowingly within a ____. answer: Standard A type of business system is the ____, which is used to improve decision making. answer: decision support system (DSS) A U.S. citizen who posts material on the Internet that is illegal in a foreign c ountry cannot be prosecuted in that country. answer: F A whistle-blower who chooses to pursue the matter legally should do so based on the research and decisions of legal counsel. answer: T A(n) ____ is a language translator that converts computer program statements exp ressed in a source language (such as COBOL, Pascal, or C) into machine language (a series of binary codes of 0s and 1s) that the computer can execute. answer: Compiler A(n) ____ is a text file that a Web site puts on your hard drive so that it can remember your information later. answer: cookie A(n) ____ is software that can be installed with a Web browser to block access t o certain Web sites that contain inappropriate or offensive material. answer: Internet filter A(n) ____ is the failure to act as a reasonable person would act. answer: breach of the duty of care A(n) ____ provision terminates or repeals a law or portions of it after a specif ic date unless further legislative action is taken to extend the law. answer: sunset A(n) ____ requires financial institutions to turn over electronic records about the finances, telephone calls, e-mail, and other personal information of suspect ed terrorists or spies. answer: National Security Letter (NSL) A(n) ____ takes place before the security community or a software developer know s about a vulnerability or has been able to repair it. answer: zero-day attack According to security vendor Finjan Software, a bug in Google could have allowed attackers to grab a Google users ____. answer: cookie According to the BLS, ____ of the 10 occupations with the fastest wage and emplo yment growth will be in the health and information technology fields. answer: nine According to the latest analyses, IT is the only significant factor to influence worker productivity. answer: F Adware creates a record of the keystrokes entered on the computer, enabling the capture of account usernames, passwords, credit card numbers, and other sensitiv e information. answer: F

After an organization decides to adopt ____, it must conduct an assessment of it s software development practices (often using outside resources to ensure object ivity) and determine where they fit in the capability model. answer: CMMI After successful unit testing, the various subsystems are combined to test the e ntire system as a complete entity using ____. answer: integration testing Although people have the right to express opinions, they must exercise care in t heir Internet communications to avoid possible charges of ____. answer: defamation Although smart cards are used widely in the United States, they are not as popul ar in Europe because of the changeover costs for merchants answer: T Although they may implement a speech code, ____ are legally considered agents of the government and therefore must follow the First Amendments prohibition again st speech restrictions based on content or viewpoint. answer: public schools and universities An agency that is concerned with privacy is the Organization for Economic Cooper ation and Development (OECD), an international organization consisting of 70 mem ber countries. answer: F An approach to restricting access to Web sites is to subscribe to a(n) ____ that performs the blocking itself. answer: Internet service provider (ISP) An easy-to-use, $100 laptop is being developed by ____. answer: Media Lab An essential part of ____ is to determine how the organizations security was com promised so that it can be prevented from happening again. answer: follow-up An increasing number of companies conduct social audits of their policies and pr actices answer: T An IPS blocks everything except what you explicitly allow through; firewalls let everything through except what it is told to block answer: F An oral defamatory statement is libel. answer: F An organization typically obtains management workers in two ways: through tempor ary help or employee leasing. answer: F Anonymity on the Internet is practically guaranteed. answer: F Antivirus software scans for a specific sequence of bytes, known as the ____. answer: virus signature

Any intrusion detection system contains information about specific attacks and s ystem vulnerabilities and watches for attempts to exploit these vulnerabilities answer: T Apple, which is notorious for being excessively secretive about its business pla ns and products, reacted to Ciarellis unauthorized announcement of its new produ cts as an attack on its valuable trade secrets. answer: T As the number of Chinese Internet users climbed toward ____ in 2005, the number of personal Web sites exploded. answer: 100 million Bad behavior in libraries did not start and will not end with the Internet. answer: T Before the ____, the U.S. Attorney General or a Deputy Attorney General had to a uthorize each NSL. answer: USA Patriot Act Capability Maturity Model Integration (CMMI) is a software testing approach defi ned by the Software Engineering Institute at Carnegie Mellon University in Pitts burgh. answer: F Certification indicates that a professional possesses a particular set of skills , knowledge, or abilities, in the opinion of the certifying organization answer: T Certifications require passing a written exam, which usually contains multiple-c hoice questions because of legal concerns about whether other types of exams can be graded objectively answer: T CIPAs proponents contend that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify ____. answer: filters Companies that harm a community can harm themselves answer: T Companies whose H-1B contingent makes up more than 5 percent of their workforce face further hurdles before they can hire more. answer: F Computer security firms and software manufacturers are paying hackers to identif y vulnerabilities before they can be exploited answer: T Computer virus has become an umbrella term for many types of malicious code answer: T Congress passed the Childrens Online Protection Act (COPA) in October 1988. answer: F Data collectors favor opt-out policies, and consumer groups favor opt-in policie s. answer: T

Delphi Technologies is an offshore IT outsourcing firm based in ____. answer: Dublin, Ireland Demographic filtering offers consumer recommendations based on the types of prod ucts purchased by other people with similar buying habits. answer: F Despite the importance of ____ in early America, it took nearly 200 years for th e Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights. answer: anonymity During the ____ the real per-capita GDP declined by approximately one-third and the unemployment rate reached 25 percent. answer: 1930s During the Kosovo conflict in 1999, NATO computers were blasted with e-mail cont aining harmful attachments and hit with ____ by cyberterrorists who were protest ing NATO bombings in Kosovo. answer: denial-of-service attacks Employers can use ____ to protect intellectual property from being used by compe titors when key employees leave. answer: noncompete agreements Employers today pay ____ percent more for healthcare insurance than they did in 2000. answer: 78 Ernst & Young, a Dutch financial services giant, selected Indian companies such as Tata Consultancy Services, Infosys Technologies, and Patni Computer Systems a s part of a group of vendors to handle its infrastructure, application developme nt, and maintenance requirements. answer: F Estimates of online credit card fraud rates vary greatly, from 6 percent to 40 p ercent of all online transactions answer: F Failing to hold people accountable for unethical actions can encourage unethical behavior answer: T Failure to act prudently with competitive intelligence can get analysts and comp anies into serious trouble. answer: T For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. answer: TRUSTe Fortunately, denial-of-service attacks involving extortion of e-commerce compani es have not caused a significant impact answer: F From 1995 to 2005, the productivity rate was slightly above the historical avera ge. answer: T From its 2003 report, we learn that Intel contributed more than ____ in cash gif ts worldwide. answer: $100 million

Gifts encourage an obligation for the recipient to act favorably toward the dono r answer: T Government licensing is generally administered at the federal level in the Unite d States answer: F H-1B temporary professionals make up less than 0.5 percent of the U.S. answer: workforce of more than 100 million people, but nearly 80 percent are employed as computer programmers. answer: F Healthcare experts agree that going digital will reduce errors that kill up to 9 8,000 patients a year. answer: T If authors lie when completing the ICRA questionnaire, their site can receive a content label that doesn't accurately reflect the content. answer: T If current salary trends continue, Indian labor rates will equal U.S. costs by 2 010. answer: F If ones work is predominately intellectual and varied in character, and the outp ut or result cannot be standardized in relation to a given period of time, one i s employed in a professional capacity answer: T If senior managers refuse to deal with a legitimate problem, the employees optio ns are to ____ or go outside the organization to try to remedy the situation. answer: drop the matter If the likelihood of an event is high and its potential negative impact is large , the risk is considered low answer: F If the product fails to meet its warranty, the buyer or lessee can sue for ____. answer: breach of warranty In ____, a business outsources all or part of its workforce to a professional em ployer organization. answer: employee leasing In ____, the government of the Peoples Republic of China established the country s first Internet service provider (ISP). answer: 1995 In ____, the U.S. Justice Department published sentencing guidelines that sugges ted more lenient treatment for convicted executives if their companies had ethic s programs. answer: 1991 In 2004, ____ obtained 3248 U.S. patents, the 12th consecutive year it has recei ved more U.S. patents than any other company. answer: IBM

In 2005, a group of performance artists toured the country to increase awareness about ____. answer: swiping In 2005, Congress approved an additional ____ visas beyond the annual cap, speci fically for foreign nationals who have earned graduate degrees at U.S. instituti ons. answer: 20,000 In a ____, companies identify ethical lapses they committed in the past and set directives for avoiding similar missteps in the future. answer: social audit In a(n) ____, the identity of the defendant is temporarily unknown. answer: John Doe lawsuit In a(n) ____, two employers have actual or potential legal rights and duties wit h respect to the same employee or group of employees. answer: coemployment relationship In April 2004, the ACLU and an anonymous ISP filed a lawsuit challenging the FBI s power to issue NSLs. answer: T In China, search engines do not post results for certain terms. answer: F In cryptography, an encryption lock is a variable value that is applied using an algorithm to encrypt or decrypt text. answer: F In general, a worker hired for a highly specific skilled position is less likely to be classified as an independent contractor if the worker sues. answer: F In integration testing, special software programs called static analyzers are ru n against the new code. answer: F In June 2005, ____, Microsoft Corporation, and three government-owned Chinese so ftware development companies announced plans to form a joint venture to provide IT outsourcing services both within China and abroad. answer: Tata Consultancy Services In many cases, good ethics can mean good business and improved profits answer: T In March 2005, more than ____ companies reported deficiencies with their interna l accounting controls, forcing them to delay the filing of annual reports to reg ulators. answer: a dozen In May 2005, Oracle Corporation paid ____ to settle charges that it fraudulently collected fees before providing training for clients and failed to comply with federal travel regulations in billing for travel and expenses. answer: $8 million In most cases, whistle-blowers are employees who act as informants on their comp any, revealing information to enrich themselves or to gain revenge for some perc

eived wrong. answer: T In November 2004, SunTrust Banks Inc. became one of the first companies to repor t a(n) ____ problem that made it impossible to meet its SOX reporting requiremen ts. answer: accounting In October 1988, the Child Online Protection Act (COPA) was signed into law. answer: F In one lawsuit in the early ____, a financial institution became insolvent becau se defects in a purchased software application caused errors in several of its s ystems. answer: 1990s In recent years, ____ and other Indian outsourcing companies have grown rapidly. answer: Tata In store-and-forward telemedicine each participating hospital is equipped with s pecial endoscopy equipment for examining the inside of the body. answer: F In the 1980 OECD privacy guidelines, the principle of purpose specification has the guideline ____. answer: The purpose for which personal data is collected should be specified and not be changed In the 1980 OECD privacy guidelines, the principle of security safeguards has th e guideline ____. answer: Personal data should be protected against unauthorized access, modificat ion, or disclosure In the spring of 2005, ____ issued alerts about vulnerabilities in its Java Web Start and Java Runtime Environment that could allow applications to grant themse lves permission to write local files or execute other applications. answer: Sun Microsystems Inc In the spring of 2005, RealNetworks Inc. issued patches to ____ vulnerabilities in its RealPlayer media software. answer: four In the spring of 2005, security researchers at ____ discovered a bug in the Micr osoft Internet Explorer browser that an attacker could use to run unauthorized s oftware on a users machine. answer: SEC Consult Unternehmensberatung GmbH In the United States, labor productivity growth has averaged roughly ____ percen t per year for the past century. answer: 2 In the United States, speech that is merely annoying, critical, demeaning, or of fensive enjoys protection under the ____ Amendment. answer: First In the utilitarian approach to dealing with moral issues, ____. answer: the ethical choice produces the greatest excess of benefits over harm

Internet service providers (ISPs) can prevent incoming packets with false IP add resses from being passed on by a process called ____. answer: ingress filtering Internet users who want to remain anonymous can send e-mail to an anonymous Usen et newsgroup. answer: F Intuit, maker of the ____ tax preparation software, currently has facilities in Canada and Great Britain and is setting up another in Bangalore, India. answer: Quicken It is possible to outline a definitive step-by-step procedure of how to behave i n a whistle-blowing situation. answer: F IT vendors have become more careful about protecting themselves from major legal losses by requiring that contracts place a limit on potential damages answer: T Laws provide a complete guide to ethical behavior answer: F Legislation that protects people from ____ abuses by corporations is almost none xistent. answer: data privacy Logic bombs can be triggered by a change in a particular file, by typing a speci fic series of keystrokes, or by a specific time or date answer: T Malicious insiders are fairly easy to detect or stop because they are well-known answer: F Man, when perfected, is the best of animals, but when separated from law and jus tice, he is the worst of all. answer: This is a quote from Aristotle Management may attempt to have the whistle-blower transferred, demoted, or fired for breaking some minor rule, such as arriving late to work or leaving early. answer: T Manufacturers of safety-critical systems must sometimes decide whether to recall a product when data indicates a problem. answer: T Many companies turn to ____ workers to meet critical business needs or to obtain essential technical skills and knowledge that are not readily found in the Unit ed States. answe: H-1B Many IT vendors such as ____, IBM, Microsoft, Sun, and Oracle offer certificatio n programs for their products. answer: Cisco Many of the same ethical issues that arise in considering H-1B and contingent wo rkers apply to offshore outsourcing. answer: T Many organizations cite the high reliability of open source code as their reason

for adopting it. answer: T Many people do not share the ITAAs ____ outlook on the impact of outsourcing. answer: optimistic Many software developers have adopted a standard, proven work process (or ____) that enables those involved to make controlled and orderly progress in developin g high-quality software. answer: software development methodology Miller v. ____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment. answer: California Millions of people have used ____ networks to download music and movies at no ch arge and in apparent violation of copyright laws. answer: peer-to-peer Most people still see encryption as not practical for building into networks, fi le servers, and tape backup systems. answer: F Nicholas Ciarelli is an avid fan of ____ who has operated a popular Web site (ww w.thinksecret.com) since he was 13. answer: Apple Nicholas Ciarelli, whose ____ dishes out information and speculation about Apple , incurred the firms wrath by heralding the arrival of a new Mac mini for $499 t wo weeks before it was officially announced. answer: Site Often, corporations declare their responsibilities in a ____ of their companys p rinciples or beliefs. answer: formal statement On almost all issues, what constitutes ethical behavior is not a matter of opini on answer: F One approach to acting with ____ is to extend to all people the same respect and consideration that you desire. answer: integrity One common decision support system (DSS) captures and records business transacti ons. answer: T One critical issue when considering H-1B is that H-1B workers can require some h elp using English as a second language. answer: T One ethical problem between IT professionals and clients involves IT consultants or auditors who recommend their own products and services or those of an affili ated vendor(seller) to remedy a problem they have detected answer: T One frequent use of encryption for software is to convert an application that ra n on one vendors database to run on anothers (for example, from dBASE to Access or from DB2 to Oracle).

answer: F One of the goals of the ____ program is to assist children in crossing the digit al divide by ensuring that every student is technologically literate by the end of eighth grade. answer: Ed-Tech One of the most widely cited software-related accidents in safety-critical syste ms involved a computerized radiation therapy machine called the ____. answer: Therac-25 One potential solution to consumer privacy concerns is a screening technology ca lled the ____, which shields users from sites that don't provide the level of pr ivacy protection they desire. answer: Platform for Privacy Preferences (P3P) One sequence of events a potential whistle-blower should consider is ____. answer: Attempt to address the situation externally Organizations develop and abide by ____ to create a consistent approach that mee ts the needs of their stakeholders. answer: values Organizations need basic information about customers to serve them better. answer: T Over the years, philosophers have developed a universal approach to deal with mo ral issues answer: T Penalties for violating the FCPA are severe corporations face a fine of up to __ __ per violation. answer: $2 million Penalties for violating the FCPA are severe individual violators may be fined up to ____ and imprisoned for up to five years. answer: $100,000 People can work for a U.S. employer as H-1B employees for a maximum continuous p eriod of ____ years. answer: six People who are trained in the patent process, rather than the inventors themselv es, prepare about 40 percent of all patent applications. answer: F Popular Internet filters include ____, CYBERsitter, NetNanny, and CyberPatrol. answer: ContentProtect Possession of child pornography is a federal offense punishable by up to ____ ye ars in prison. answer: Five POST data is collected. answer: T Potential whistle-blowers should first attempt to address the problem ____. answer: internally Pretty Good Privacy (PGP) is software that uses ____ encryption, the de facto st

andard for Internet e-mail encryption. answer: 128-bit Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects ____ they can be made. answer: before Products, such as statements of requirements, flowcharts, and user documentation , are known as ____. answer: deliverables Recent developments have expanded the scope and power of John Doe Lawsuits to th e point that some believe they now represent a threat to freedom of speech. answer: T Researchers examined a sample of 527 large U.S. firms from 1987 to 1994 and foun d that the benefits of applying IT grow over time and can take at least ____ to fully realize. answer: five to seven years Risk analysis is important for safety-critical systems, but is useful for other kinds of software development as well. answer: T Several ____ executives pleaded guilty to civil and criminal fraud and obstructi on of justice for systematically recording sales revenue before contracts were f inalized, inflating financial results by about $2.2 billion during 2000 and 2001 . answer: Computer Associates (CA) Software suppliers frequently attempt to limit their liability by specifying tha t although software is warranted to run on a given machine configuration, no ass urance is given as to what that software will do. answer: T Software suppliers frequently write ____ to attempt to limit their liability in the event of nonperformance. answer: warranties Some ____ use encryption and routing through multiple remailers to provide a vir tually untraceable level of anonymity. answer: Remailers Some believe that the ____ prevents third parties from revealing information obt ained from people bound by nondisclosure agreements. answer: Uniform Trade Secrets Act Some card issuers are implementing ____, which contain a memory chip that is upd ated with encrypted data every time the card is used. answer: smart cards Some experts argue that ____ creates new opportunities for criminals to conduct check fraud. answer: Check 21 Some potential whistle-blowers who elect to take no further action continue to w restle with their consciences; they can develop ulcers, drug or alcohol problems , or lose peace of mind. answer: ? Some software experts think that too many software patents are being granted and

that they inhibit new software development. answer: T Spammers break into databases of financial institutions and steal customer infor mation, then use it to commit identity theft, opening new accounts and charging purchases to unsuspecting victims answer: F Standards are extremely useful because they enable hardware and software from di fferent manufacturers to work together. answer: T Students around the world have been caught downloading material from the Interne t and plagiarizing content for their term papers answer: F Studies have shown that simply naming a corporate ethics officer automatically i mproves ethics answer: F The ____ allows wiretapping of aliens and citizens in the United States, based o n a finding of probable cause that the target is a member of a foreign terrorist group or an agent of a foreign power. answer: Foreign Intelligence Surveillance Act of 1978 (FISA) The ____ Amendment of the Constitution protects citizens from unreasonable gover nment searches and is often invoked to protect the privacy of government employe es. answer: Fourth The ____ became law in 1996. Its purpose was to allow freer competition among ph one, cable, and TV companies. answer: Telecommunications Deregulation and Reform Act The ____ can be a deterrent in fighting the dissemination of pornography. answer: CAN-SPAM Act The ____ code of ethics consists of eight general moral imperatives, eight speci fic professional responsibilities, six organizational leadership imperatives, an d two elements of compliance. answer: ACM The ____ declares that no agency of the U.S. government can conceal the existenc e of any personal data record-keeping system. answer: Privacy Act of 1974 The ____ has its roots in Chicago in 1951, when a group of machine accountants g ot together and decided that the future was bright for the TAB machines they wer e operating. answer: AITP The ____ is a computing society founded in 1947 that serves more than 80,000 pro fessionals in more than 100 countries and offers many publications for technolog y professionals. answer: ACM The ____ is a senior-level manager who provides vision and direction in the area of business conduct. answer: corporate ethics officer

The ____ is a trade group that represents the worlds largest software and hardwa re manufacturers. answer: Business Software Alliance (BSA) The ____ is one of the oldest and largest IT professional associations, with mor e than 100,000 members. answer: IEEE-CS The ____ is responsible for the careful and responsible management of an organiz ation. answer: board of directors The ____ of the key used to encode and decode messages determines the strength o f the encryption algorithm. answer: length The ____ offers certifications for software quality engineers who have eight yea rs of professional experience and at least three years in a decision-making posi tion. answer: American Society for Quality Control (ASQC) The ____ permits facilitating payments that are made for routine government acti ons, such as obtaining permits or licenses. answer: FCPA The ____ regulates the operations of credit-reporting bureaus, including how the y collect, store, and use credit information. answer: Fair Credit Reporting Act of 1970 The ____ safeguards workers in the nuclear power and nuclear weapons industries. answer: Energy Reorganization Act The ____ standard serves many industries and organizations as a guide to quality products, services, and management. answer: ISO 9000 The ____ State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent th at courts apply to subpoenas requesting the identity of anonymous Internet speakers. answer: New York ? California ? Florida ? Texas The ____ that socially responsible activities create can make it easier for corp orations to conduct their business. answer: goodwill The ____ to ethical decision making states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected. answer: utilitarian approach The ____ v. ACLU suit, filed in February 1996, challenged the criminalizing of s o-called indecency on the Internet. answer: Reno The ____ was a hotly debated law because it required the telecommunications indu stry to build tools into its products that federal investigators can use after g etting court approval to eavesdrop on conversations. answer: Communications Assistance for Law Enforcement Act (CALEA)

The ____ was developed to combat terrorism by comparing the names and informatio n of 1.4 million daily U.S. airline passengers with data on known or suspected t errorists. answer: Secure Flight airline safety program The ____ worm was released to the Internet in the summer of 2004, barely a month after Microsoft released a patch for the software flaw it exploited. answer: Blaster The ____, also known as the Lincoln Law, was enacted during the U.S. Civil War t o combat fraud by companies that sold supplies to the Union Army. answer: False Claims Act The ____, passed in 1966 and amended in 1974, provides the public with the means to gain access to certain government records. answer: Freedom of Information Act (FOIA) The Anti-bribery Act makes it a crime to bribe a foreign official, a foreign pol itical party official, or a candidate for foreign political office answer: T The availability of technology is an indicator of the standard of living. answer: T The concept of ____ recognizes that managers must use their judgment to ensure t hat the cost of control does not exceed the systems benefits or the risks involv ed. answer: reasonable assurance The cookies involved in a denial-of-service attack are seriously compromised and are left with more enduring problems than their target answer: F The Digital Millennium Copyright Act (DMCA) is implemented in U.S. law by the WI PO Copyright Treaty. answer: F The Digital Millennium Copyright Act (DMCA) was signed into law in November ____ and was written in compliance with the global copyright protection treaty from WIPO. answer: 1998 The DOLs Wage and Hour Division administers ____ to ensure that the foreign work ers wages will not undercut those of an American worker. answer: LCAs The exact number of ____ is unknown, but it probably represents 4 to 7 percent o f the U.S. workforce, a total of 6 to 10 million people. answer: contingent workers The Federal Communications Commission (FCC) ruled that the ____ program would be supported with up to $2.25 billion per year from a fee charged to telephone cus tomers. answer: E-Rate The Fifth Amendment protects the right to freedom of religion and freedom of exp ression from government interference. answer: F The government in China requires ____ to register, which allows it to trace subv

ersive content back to the source. answer: commercial Web sites The idea of a network-based ____ is to provide would-be hackers with fake inform ation about a network by means of a decoy server to confuse them, trace them, or keep a record for prosecution. answer: honeypot The Internet has been a boon to the pornography industry by providing fast, chea p, and convenient access to more than ____ Web sex sites. answer: 60,000 The ISO issued its 9000 series of business management standards in ____. answer: 1988 The liability of manufacturers, sellers, lessors, and others for injuries caused by defective products is commonly referred to as ____. answer: product liability The most widely accepted approach to treating consumer data responsibly is for a company to adopt the Code of Fair Information Practices and the 1980 OECD priva cy guidelines. answer: T The most widely used measurement of the material standard of living is productiv ity. answer: F The number of declared computer science majors and masters candidates has droppe d 16 percent and 12 percent, respectively, since 2002, in spite of the forecast for an increased need for workers in this field. answer: F The only way to make sure people you agree with can speak is to support the righ ts of people you don't agree with. This is a quote from ____. answer: Eleanor Holmes Norton The overall security of federal government computer systems earned a(n) ____ ave rage on the 2004 security report card. answer: D+ The percentage of organizations at the Initial maturity level (process unpredict able, poorly controlled, and reactive) is 36. answer: F The percentage of organizations at the Managed maturity level (focus is on conti nuous process improvement) is ____. answer: 36 The potential compromise of customer data is an outsourcing issue. answer: F The principle of ____ allows people to state their opinions without revealing th eir identity. answer: anonymous expression The question: Has the competitive intelligence organization developed a mission statement, objectives, goals, and a ____? is part of a checklist for running an ethical competitive intelligence operation. answer: code of ethics

The qui tam (who sues on behalf of the king as well as for himself) provision of the False Claims Act allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities wh o receive or use government funds. answer: T The relationship between investment in information technology and U.S. productiv ity growth is more complex than you might think at first. answer: T The Sarbanes-Oxley Act of 2002 is a federal law that provides strong protection for whistleblowers. answer: F The SCO Group, owner of the UNIX operating system, sued IBM for $1 billion, alle ging that IBM used proprietary code from one of their UNIX programs to help crea te ____. answer:Linux The SOX was enacted in response to public outrage over several major accounting scandals, including those at____, WorldCom, Tyco, Adelphia, Global Crossing, and Qwest. answer: Enron The Supreme Court has held that obscene speech, and ____ are not protected by th e First Amendment and may be forbidden by the government. answer: defamation The Supreme Court has ruled that the Fifth Amendment protects the right to speak anonymously as part of the guarantee of free speech. answer: F The term ____ refers to social conventions about right and wrong that are so wid ely shared that they become the basis for an established consensus. answer: morality The Therac-25 case illustrates that accidents usually have a single root cause a nd that if the symptoms of that cause are fixed, future accidents will probably not occur. answer: F The U.S. Code of Federal Regulations defines a person employed in a professional capacity as one who meets all of ____ criteria. answer: four The U.S. Department of Education awarded $480 million in Ed-Tech grants to indiv idual states in 2005. answer: T The U.S. philosophy of addressing privacy concerns with strict federal regulatio n differs greatly from the European philosophy of having no government privacy p olicy. answer: F The U.S. Securities and Exchange Commission (SEC) filed fraud charges against __ __ in June 2002 for inflating its earnings by $11 billion. answer: WorldCom The U.S. Supreme Court has ruled that three classes of items cannot be patented:

abstract ideas, laws of nature, and ____. answer: natural phenomena The United States has adopted labor laws and regulations that require a more pre cise definition of what is meant by a professional employee answer: T The United States spends more on defense than on healthcare. answer: T The use of cookies and tracking software is now widely accepted by the public as an effective way for companies to collect valuable information about consumers. answer: F The use of information technology can lead to violations of all four aspects of the right to privacy. answer: T The use of remailers to enable people to commit unethical or even illegal acts i n some states or countries has spurred controversy. answer: T The World Intellectual Property Organization (WIPO), headquartered in ____, is a n agency of the United Nations that was established in 1967. answer: Geneva, Switzerland The WTO developed the ____, to establish minimum levels of protection that each government must provide to the intellectual property of all WTO members. answer: TRIPs Agreement There are many international or national licensing programs for IT professionals answer: T There are various definitions of what constitutes open source code, each with it s own idiosyncrasies. answer: T There is no federal product liability law. answer: T This book is based on one fundamental tenet: the general public has not realized the critical importance of ethics as they apply to IT answer: F To prevent Internet users from bribing cybercafe owners to avoid logging on usin g their state ID cards, the Chinese government has also assembled a cyberspace p olice force, estimated to number ____. answer: 30,000 To receive a(n) ____ visa, the person must have a job offer from an employer who is also willing to offer sponsorship. answer: H-1B Todays hacker commonly is male, in his mid-30s or younger, works full time, has considerable financial resources, and is a social outsider answer: F Tools called reverse engineering compilers or ____ can read the machine language and produce the source code. answer: Decompilers

Trade secret law protects only against the ____ of trade secrets. answer: Misappropriation Trademark protection lasts up to ten years after a mark has ceased to be in use. answer: F Turnitin is a plagiarism detection service. answer: T Under a 1968 federal statute, law enforcement officers can use wiretapping the i nterception of telephone or telegraph communications for purpose of espionage or surveillance if they first obtain a court order. answer: T Under DMCA, Internet service providers (ISPs) are required to remove access to W eb sites that allegedly break copyright laws only after the copyright infringeme nt has been proven. answer: F Under state law, an employee can traditionally be terminated for any reason or n o reason, in the absence of an employment contract. answer: T Under the doctrine of supervening event, the original seller is not liable if th e software was materially altered after it left the sellers possession and the a lteration caused the injury. answer: T Unfortunately, software defects are commonly lethal and many personal injuries a re related to software failures. answer: F Unleashed in April 2004, the Sasser ____ hit IT systems around the world hard an d fast. answer: worm Up to now, few companies and government agencies specify that a company must be ISO 9000-certified to win a contract from them. answer: F User acceptance testing is performed by trained end users to ensure that the sys tem operates as they expect. answer: T Users of ____s AntiVirus Scan Engine versions 4.0 and 4.3 were advised to upgrad e their software to eliminate a critical security bug. answer: Symantec Corporation Utilitarianism fits easily with the concept of value in economics and the use of cost-benefit analysis in business answer: T WebMD.com is sponsored by the National Institutes of Health. answer: F What percentage of Internet users live in less developed nations? answer: 2

What percentage of U.S. hospitals have electronic patient record systems? answer: 13 When a programmer completes a unit of software, one QA measure is to test the co de by actually entering test data and comparing the results to the expected resu lts. This is called ____. answer: dynamic testing When developing safety-critical systems, a key assumption must be that safety __ __ automatically result from following your organizations standard development m ethodology. answer: will not When forced to choose between adding more user features or doing more testing, m ost software development managers decide in favor of more testing. answer: F When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient almost always coincide. answer: F When software is well-designed, programmers make no mistakes in turning design s pecifications into lines of code. answer: F When sued for ____, a software supplier is not held responsible for every produc t defect that causes customer or third-party loss. answer: negligence Which country spends the most on healthcare? answer: United States With ____s annual IT budget currently at $23 billion and growing 15 to 18 percen t per year, many global IT companies have set their sights on this emerging mark et. answer: China With 50,000 new technology graduates a year, China will serve as a source of che ap IT labor and allow the Indian companies to keep their costs down. answer: T Worker productivity was highest during the years ____ in the United States. answer: 1950-1960 ================================================================================ ======================================= Ethics Answer: is a set of beliefs about right and wrong behavior Moral code Answer: rules often expressed in statements about how people should behave Morality Answer: refers to social conventions about right and wrong Integrity Answer: acts in accordance with a personal code of principles Which is the correct statements about ethics and morality

Answer: Ethics is a set of beliefs about right and wrong behavior. Morality is a set of beliefs about right and wrong behavior. Answer: False Ethics is a set of social conventions about right and wrong that are so widely s hared that they become the basis for an established consensus. Answer: False Who is a senior-level manager who provides vision and direction in the area of b usiness conduct? Answer: corporate ethics officer ( corporate compliance officer) What are the correct terms of the following definitions _______: a set of rules that establish the boundaries of generally accepted behavior. _______: refers to social conventions about right and wrong that are so widely shared that they be come the basis for an established consensus. _______: a review of a company's et hical lapses committed in the past and the establishment of directives for avoid ing similar missteps in the future. _______: practice of illegally making copies of software or enabling others to access software to which they are not entitle d. _______: someone who stands to lose or gain from how a situation is resolved. An organization's stakeholders include shareholders, employees, customers, supp liers, and the community. Answer: moral code; morality; social audit; software piracy; stakeholder Moral code: a set of rules that establish the boundaries of generally accepted b ehavior Answer: Moral code Morality: refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus Answer: Morality A review of a company's ethical lapses committed in the past and the establishme nt of directives for avoiding similar missteps in the future. Answer: social audit software piracy: practice of illegally making copies of software or enabling oth ers to access software to which they are not entitled. Answer: software piracy someone who stands to lose or gain from how a situation is resolved. An organiza tion's stakeholders include shareholders, employees, customers, suppliers, and t he community. Answer: stakeholder Which is the decision making approach that is based on a vision of society as a community whose members work together to achieve a common set of values and goal s. Answer: common good The ethical choice treats everyone the same and shows no favoritism or discrimina tion. The above principle refers to which of the following ethical decision makin g approach? Answer: Fairness approach The ethical choice best reflects moral virtues in yourself and your community. The above principle refers to which of the following ethical decision making approa ch? Answer: Virtue ethics approach

What are the correct terms of the following definitions about Ethics for IT Work ers and IT Users ________ - when one party fails to meet the terms of a contract . ________ - the crime of obtaining goods, services, or property through decepti on or trickery. ________ - a calling that requires specialized knowledge and oft en long and intensive academic preparation. ________ - a person whose work requi res advanced training and experience, who exercises discretion and judgment in t heir work, and whose work cannot be standardized. ________ - the act of illegall y making copies of software or enabling others to access software to which they are not entitled. Answer: None of the other;__breach of contract;fraud;profession;professional emp loyee; software piracy All of the following is the reasons that there is no licensing for IT profession als except Answer: None of the others;There is no funding at the federal level for the accr editation process What is not the reason for certification. Answer: To keep abreast of current technology What are the correct statement about a professional Answer: all of the others In relationships between IT workers and suppliers, which ethical issues may aris e? Answer: All of the others In which area the Project Management Institute (PMI) mainly focus on? Answer: Project management What is the method of computing that delivers secure, private, and reliable comp uting experiences based on sound business practices; this is what organizations worldwide are demanding today. Answer: Trustworthy computing Which are most frequently the perpetrators of an attack? Answer: Hackers A firewall does not protect against: Answer: all of the others Which is the written statement that defines an organization's security requireme nts as well as the controls and sanctions used to meet those requirements? Answer: security policy Logic bomb is a kind of: Answer: Trojan horse Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks. The above attack refers to: Answer: Distributed Denial-of-Service (DDoS) attacks All of the following statements are not true except Answer: The use of cookies and tracking software is now widely accepted by the p ublic as an effective way for companies to collect valuable information about co nsumers. All of the following statements are true except

Answer: Most people still see encryption as not practical for building into netw orks, file servers, and tape backup systems. Select the right term of the following action: Someone steals key pieces of pers onal information to gain access to a person's financial accounts. Answer: Identity theft What is the definition of the following statement?: "The right to be left alonethe most comprehensive of rights, and the right most valued by a free people." Answer: the right of privacy According to the right of privacy definition, what is communications privacy? Answer: Ability to communicate with others without being monitored by other pers ons or organizations Stealing personal identity data by tricking users into entering information on a counterfeit Web site. What is the name of the above identity theft approach? Answer: Phishing Which is the act that can be a deterrent in fighting the dissemination of pornog raphy? Answer: CAN-SPAM Act All of the following statements about freedom of expression are true except Answer: In China, search engines do not post results for certain terms Which of the following Acts aims at protecting children from pornography? Answer: Communications Decency Act (CDA) Which of the following ways can be used to control access to information on the Internet? Answer: All of the others Some organizations allow employees to create their own personal blogs to _______ ____ Answer: All of the others Which is not a step which organizations do to stop employee access pornography s ites in the workplace? Answer: Identify pornography sites All of the followings can be copyrighted except Answer: A Web page Select the one that is not one of the four tests of patent eligibility? Answer: It must be mechanical. According to the copyright law, which rights the creators of the work can do? Answer: All of the others. According to Sonny Bono Copyright Term Extension Act, For work created but not p ublished or registered before 1/1/78, life of the author plus 70 years; no expir ation before: Answer: 12/31/2004 "No time limitations" is a character of _____________ Answer: Trade Secrets Which are trademark? Answer: All of the others

Select the maturity level of the organization base on CMMI if its process is mea sured and controlled Answer: Quantitatively Managed Select the maturity level of the organization base on CMMI if its process is cha racterized for projects and is often reactive Answer: Managed Which of the following is primary cause for poor software quality? Answer: Many developers do not know how to design quality into software from the start. How many levels Capability Maturity Model Integration (CMMI) defines for softwar e development maturity? Answer: Five levels Who are strictly liable for injuries caused by the product and may be sued? Answer: All of the others Who are not the large software project roles? Answer: Graphic specialists Which of the followings is the measurement of a nation's material standard of li ving? Answer: GDP What are the additional factors that can affect national productivity rates? Answer: All of the others Ensure that every student is technologically literate by the end of eighth grade. The above goal refers to: Answer: Enhancing Education Through Technology (Ed-Tech) program Help schools and libraries obtain access to state-of-the-art services and technol ogies and discounted rates. The above goal refers to: Answer: Education Rate (E-Rate) program The consequences of the lacking of patient data transparency are _______________ __ Answer: All of the others Which technology requires the presence of patient and healthcare provider at the same? Answer: Live telemedicine All of the followings are social network advertising strategies except Answer: None of the others Which is the harassment, torment, humiliation, or threatening of one minor by an other minor or group of minors via the Internet or cell phone. Answer: Cyberbullying Which of the following is a form of cyberbullying? Answer: All of the others. Which of the following is not a form of cyberbullying? Answer: None of the others The social online shopping web sites are great way for ___________

Answer: Small business Select the correct statement: Answer: Cyberstalking is adult version of cyberbullying The last step a person should consider in whistle-blowing process Answer: Live with the Consequences The first step a person should consider in whistle-blowing process Answer: Assess the seriousness of the situation Contingent workers do not include: Answer: Permanent contract workers Workers who are hired for the life of the project only are called: Answer: Contingent Workers Which is not the source of nontraditional workers? Answer: None of the others Which is a disadvantage of contingent workers? Answer: Low commitment to the company and its projects The term __morality __ refers to social conventions about right and wrong that a re so widely shared that they become the basis for an established consensus. Answer: morality ____ Risk is the product of multiplying the likelihood of an event by the impact of its occurrence. Answer: Risk The rules that establish the boundaries of generally accepted behavior are often expressed in statements about how people should behave, and they fit together t o form the __moral code__ by which a society lives. Answer: moral code The _utilitarian approach__ to ethical decision making states that you should ch oose the action or policy that has the best overall consequences for all people who are directly or indirectly affected. Answer: utilitarian approach Often, corporations declare their responsibilities in a _formal statement___ of their companys principles or beliefs. Answer: formal statement ___Virtue ethics_ focuses on how you should behave and think about relationships if you are concerned with your daily life Answer: Virtue ethics Companies that harm a community can harm themselves Answer: True 1. A professional is someone who: a. requires advanced training and experience b. must exercise discretion and judgment in the course of his or her work c. does work that cannot be standardized d. all of the above Answer: d. all of the above 4. Reporting a trade secret is an effort by an employee to attract attention to

a negligent, illegal,unethical, abusive, or dangerous act by a company that thre atens the public interest. Answer: False 6. Rsum inflation is a usual and customary practice tolerated by employers. False Answer: False 7. Society expects professionals to act in a way that: a. causes no harm to society b. provides significant benefits c. establishes and maintains professional standards that protect the public d. all of the above Answer: d. all of the above 9. _________________ is a process that one undertakes voluntarily to prove compe tency in set of skills. a. Licensing b. Certification c. Registering d. all of the above Answer: Certification 10. There are many industry associations and vendor certificate programs for IT workers. Answer: True A code serves as a guideline for ethical decision making, promotes high standard s of practice and ethical behavior, enhances trust and respect from the general public,and provides an evaluation benchmark. Answer: A code serves as a guideline for ethical decision making, promotes high standards of practice and ethical behavior, enhances trust and respect from the general public,and provides an evaluation benchmark. Many people believe that the licensing and certification of IT workers would inc rease the reliability and effectiveness of information systems. Answer: Many people believe that the licensing and certification of IT workers w ould increase the reliability and effectiveness of information systems. Licensing and certification raise many issues, including the following: (1) ther e is no universally accepted core body of knowledge on which to test people; (2) it is unclear who should manage the content and administration of licensing exa ms; (3) there is no administrative body to accredit professional education progr ams; and (4) there is no administrative body to assess and ensure competence of individual professionals. Answer: Licensing and certification raise many issues, including the following: (1) there is no universally accepted core body of knowledge on which to test peo ple; (2) it is unclear who should manage the content and administration of licen sing exams; (3) there is no administrative body to accredit professional educati on programs; and (4) there is no administrative body to assess and ensure compet ence of individual professionals. Several IT-related professional organizations have developed a code of ethics, i ncluding ACM, AITP, IEEE-CS, PMI, and SANS. Answer: Several IT-related professional organizations have developed a code of e thics, including ACM, AITP, IEEE-CS, PMI, and SANS. These codes have two main parts the first outlines what the organization aspires to become, and the second typically lists rules and principles that members are expected to live by. They also include a commitment to continuing education for those who practice the profession.

Answer: These codes have two main parts the first outlines what the organization aspires to become, and the second typically lists rules and principles that mem bers are expected to live by. They also include a commitment to continuing educa tion for those who practice the profession. ================================================================================ ======================================= Total liability means that the defendant is held responsible for injuring anothe r person, regardless of negligence or intent. The plaintiff is not required to p rove that the manufacturer was careless or negligent. answer: F Software suppliers frequently write warranties in such a way as to limit their l iability in the event of nonperformance answer: T A software defect is a tragic error that even if partially removed would not pro duce software capable of meeting user needs answer: F Software manufacturers are under extreme pressure to reduce the time-to-market o f their products answer: T Business information systems refer primarily to the hardware, networks, and soft ware used to handle business transactions, but does not include people or other procedural issues answer: F Since many contingent workers already are specialists in performing a particular task, the firm does not customarily incur training costs answer: T Depending on how closely workers are supervised and how the job is structured, c ontingent workers can be viewed as permanent employees by the Internal Revenue S ervice answer: T Individuals can work in H-1B status for a United States employer for a total of six years answer: T Companies whose work force consists of more than 15 percent H-1B workers must pr ove that they first tried to find United States workers before they can hire mor e H-1B workers. answer: T One federal law that does provide protection for whistle-blowers is the False Cl aims Act answer: T As a result of the lack of quality in software, many organizations avoid buying the ____ release of a major software product or prohibit its use in mission-crit ical systems answer: first Another type of business system is the ____ support system (DSS), which is used to improve decision-making effectiveness answer: decision

Which of the following statements is true under strict liability a. The plaintiff must prove only that the software product is defective or unrea sonably dangerous and that the defect caused the injury. b. The plaintiff is not required to prove that the manufacturer was careless or negligent. c. The plaintiff is not required to prove who caused the product to become defec tive. d. All of the above answer: all Defendants against a strict liability action may use which of the following lega l defenses? a. Doctrine of supervening event b. The government contractor defense c. An expired statute of limitations d. All of the above answer: all ____ misrepresentation occurs when a seller or lessor either misrepresents the q uality of a product or conceals a defect in it. answer: Intentional Many organizations for which the development of high-quality software is importa nt have adopted a standard, proven work process, or software development ____, t hat enables systems analysts, programmers, project managers, and others to make controlled and orderly progress in developing high-quality software. answer: methodology A software ____ is any error that, if not removed, would cause a software system to fail to meet the needs of its users answer: defect ____ management addresses how to define, measure, and refine the quality of the information systems development process and the products (such as statements of requirements, flowcharts, and user documentation) developed during the various s tages of the process answer: Quality Which of the following is a factor causing poor-quality software? answer: Software manufacturers are under extreme pressure to reduce the time-tomarket of their products. ____ information systems are composed of a set of interrelated components includ ing hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output. answer: Business The liability of manufacturers, sellers, lessors, and others for injuries caused by defective products is commonly referred to as ____ liability. answer: product A(n) ____ assures buyers or lessees that a product meets certain standards of qu ality answer: warranty ____-box testing involves viewing the software unit as a device that has expecte d input and output behaviors but whose internal workings are unknown answer: black

____-box testing treats the software unit as a device that has expected input an d output behaviors but whose internal workings, unlike the unit in black-box tes ting, are known. answer: white ____ is the probability of an undesirable event occurring times the magnitude of the consequence of the event happening (damage to property, loss of money, inju ry to people, loss of life, and so on). answer: Risk ____ is the probability of a component or system performing its mission over a c ertain length of time. answer: Reliability ____ is an important technique used to develop any ISO 9000-compliant quality sy stem. answer: Failure Mode and Effects Analysis There are approximately _______ ISO 9000-certified organizations in over 150 cou ntries answer: 350,000 One of the most important and difficult areas of safety-critical system design i s the _________. answer: human-system interface According to studies done at the Software Engineering Institute, the highest per centage of companies assessed as of December, 2001 had reached and maintained wh ich of the following software maturity levels? answer: Managed The term "permatemps" refers to temporary workers ____. answer: employed for an extended length of time ____ is the deciding factor in classifying whether a worker is a contractor or a n employee answer: How much control the company has over how the work is performed The H-1B visa is a temporary working visa for people who work in specialty occup ations, which are jobs that require ____ answer: a four-year bachelors degree or higher in a specific field, or the equiva lent experience The H-1B visa is a temporary working visa granted by ____ for people who work in specialty occupations. answer: the Immigration and Naturalization Service (INS) The first stage in the application process for a H-1B visa is to ____. answer: file a Labor Condition Attestation (LCA) with the Labor Department Individuals can work in H-1B status for a United States employer for a total of ____ years. answer: six How does the typical hourly wage of a temporary worker compare to a full-time em ployee in the same position? answer: Higher than the full-time employee The Vizcaino v. Microsoft lawsuit illustrates the cost of ____. answer: misclassifying an employee and violating laws covering taxes, overtime,

and other employee benefits alary abuse occurs even though companies applying for H-1B visas must offer a wa ge that is not less than ____ percent below the average salary for the occupatio n. answer: five The American Competitiveness in the Twenty-First Century Act contains a provisio n that allows current H-1B holders to ____. answer: start working for an employer as soon as his or her petition is filed Which of the following is a true statement concerning whistle-blower protection laws? answer: There is no comprehensive federal law that protects all whistle-blowing activities. A qui tam plaintiff can receive between 15 and 30 percent of the total recovery from the defendant, depending on ____. answer: how helpful the individual was to the success of the case Which of the following is NOT a federal law created to protect the environment? answer: The Save the Ozone Act In qui tam actions, the government has the right to ____ answer: intervene and join the legal action Which of the following is a function of the National Whistle-blower Center? answer: Provide education about the rights of whistle-blowers A co-employment relationship exists in ____. answer: employee leasing While H-1B temporary professionals comprise less than .1 percent of the United S tates workforce of more than 140 million people, a large percentage of them are employed as ____. answer: computer programmers With ____, services are provided to one company by an outside organization that has expertise in operating a specific client function. a. outsourcing b. managed services c. facilities management answer: all// outsourcing// managed services// facilities management If a whistle-blower wants to remain unknown, the safest course of action is to _ ___. answer: leak information anonymously to the press The statute of limitations is generally held to start ____. answer: at the time an employee first learns that he or she will be retaliated a gainst ================================================================================ ========================================== Attitudes toward the illegal copying of software (software piracy) range from st rong opposition to acceptance as a standard approach to business. answer: T The payment of a bribe is still a crime even if the payment was lawful under the

laws of the foreign country in which it was paid. answer: F It is not permissible under the FCPA to pay an official to perform some official function faster. answer: F Stakeholders can only include those directly involved in an issue. answer: F The virtue ethics approach defines an exact formula for ethical decision making. answer: F A shareholder is someone who stands to gain or lose from how a particular situat ion is resolved. answer: F Virtue ethics is a philosophical approach to ethical decision-making that focuse s on how we ought to behave and how we should think about relationships if we ar e concerned with our daily life in a community. answer: T The goal of the utilitarian approach of ethical decision-making is to find the s ingle greatest good to benefit the interests of the organization primary stakeho lders. answer: F The fairness approach to ethical decision-making is the one that treats everyone the same and shows no favoritism or discrimination. answer: T Operating ethically always guarantees business success to any organization anywh ere in the world. answer: F The ACM Council in a May 1999 meeting stated that it supported the licensing of software engineers. answer: F Professionals feel a degree of loyalty to the other members of their profession. As a result, they are slow to criticize one another in public. answer: T We can expect a professional code of ethics to provide the complete answer, beca use a code can be the definitive collection of behavioral standards. answer: F There exists a universally accepted core body of knowledge for IT professionals. answer: F The AITP standards of conduct have often been used to censure practicing IT prof essionals. answer: F A breach of duty may only consist of an action, and not a failure to act. answer: F It is piracy when an IT employee brings home a software package from work and lo ads onto his/her personal computer at home. answer: T

It is crucial that organizations implement systems and procedures that limit the access to data to those employees who have a need to know. answer: T A firewall can serve as an effective barrier to incoming e-mail from certain Web sites, companies, or individuals. answer: T A professional is someone who requires advanced training and experience, must ex ercise discretion and judgment in the course of his or her work, and whose work cannot be standardized. answer: T The "Deceptive Duo" were cyberterrorists seeking to cause destruction in order t o bring attention to their cause. answer: F Fortunately, the number of IT-related security incidents is increasing only in t he United States. answer: F Security incidents can take many forms, but one of the most frequent kinds of in cident is an attack on a networked computer from a malicious insider. answer: F Most security experts recommend against giving out specific information about a compromise in public forums such as news reports, conferences, professional meet ings, and online discussion groups. answer: T Education of users to the risks involved and the actions they must take to preve nt a security incident is a key part of any successful security program answer: T A denial-of-service attack requires a break-in at the target computer before it can cause any real harm to the target site. answer: F Malicious insiders are not necessarily employees; they can be consultants and co ntractors as well. However, they need to be working in IT-related positions. answer: F Since hackers break into systems to just "look around", they never cause any rea l damage that is irreparable. answer: F Cracking, unlike "hacking", is not a criminal activity. answer: F Obtaining title to property through deception or trickery constitutes the crime of criminal fraud. answer: T The term ____ refers to social conventions about right and wrong that are so wid ely shared that they are the basis for an established common consensus. a. etiquette b. immunity c. morality d. loyalty

answer: morality In 1998, ____ percent of all software in circulation worldwide was pirated. answer: 38 Ethical behavior refers to behavior that conforms to generally accepted social _ ___. answer: norms ____ are habits that incline us to do what is acceptable and ____ are habits tha t incline us to do what is unacceptable. answer: Virtues, vices ____ is the product of multiplying the likelihood of a negative event happening by the impact of such an event happening. answer: Risk In 1991, the United States Justice Department published sentencing guidelines th at suggested more lenient treatment for convicted corporate executives if their companies had ____. answer: established ethics programs Fines can be lowered by as much as ____ percent if the organization has implemen ted an ethics management program and cooperates with authorities. answer: 80 Penalties for violating the FCPA are quite severe. For corporations, it is up to $____ million per violation. answer: 2 Which of the following approaches states that when we have a choice between alte rnative actions or social policies, we choose the action or policy that has the best overall consequences for all persons directly or indirectly affected? answe: Utilitarian Which of the following is a problem associated with the utilitarian approach? answer: It is often difficult, if not impossible, to measure and compare the val ues of certain benefits and costs. Which of the following is a problem associated with the virtue ethics approach? answer: It doesn't provide much of a guide for action. Which of the following approaches is based on a vision of society as a community whose members work together to achieve a common set of values and goals? answer: common good Which of the following actions is taken by corporations to reduce business ethic s risks? a. Appoint a corporate ethics officer b. Establish a corporate code of conduct c. Set ethical standards at a high organizational level answer: All of the above Why are corporations interested in fostering good business ethics? a. To protect the company and its employees from legal action b. To create an organization that operates consistently c. To avoid negative publicity answer: All of the above

A person's virtues and vices help define that person's ____, the complex scheme of moral values by which one chooses to live. answer: value system If a person acts with ____, that person acts in ways that are consistent with hi s or her own code of principles. answer: integrity One approach to acting with ____ is to extend to all persons the same respect an d consideration that you yourself desire. answer: integrity If the likelihood of an event happening is high and the potential negative impac t is large, the risk is considered ____. answer: great The United States ____ makes it a crime to bribe a foreign official, a foreign p olitical party official, or a candidate for foreign political office. answer: FCPA Penalties for violating the FCPA are quite severe. Individuals may be fined up t o $100,000 and imprisoned for up to ____ years. answer: 5 A firm's business practices and its accounting information systems are frequentl y audited by ____ to ensure that they meet certain accounting standards. answer: both internal and outside auditors The FCPA ____ facilitating payments that are made for routine government actions , such as obtaining permits or licenses. answer: permits Which one of the following actions is NOT permissible under FCPA? answer: Giving a gift in such a way as to make the recipient feel obligated to a lter his or her behavior in some way favorable to the donor Which of the following statements is NOT true with gifts? answer: Gifts are often made indirectly through a third party. The ____ officer is a senior-level manager responsible for improving the ethical behavior of the members of an organization. answer: corporate ethics Trade secrets can include which of the following items? a. The design of new software code b. Hardware designs c. Business plans answer: all The goal of whistle-blowing is to ____. answer: fix a serious problem when working within the company to address the is sue that has failed A computing society founded in ____, the ACM serves more than 80,000 professiona ls in over 100 countries and offers more than 24 publications for technology pro fessionals answer: 1947 ACM stands for ____. answer: Association for Computing Machinery

ACM's newest publication, Ubiquity, is a(n) ____ magazine. answer: forum and opinion ACM does NOT offer which of the following services? answer: insurance for IT professional against legal lawsuits The ____ code consists of eight general moral imperatives, eight specific profes sional responsibilities, six organizational leadership imperatives, and two elem ents of compliance answer: ACM The ____ publishes a monthly newsletter, The Information Executive, that focuses on current industry topics with contributions from industry experts, practition ers, and educators. answer: AITP In 1993, the ____ formed a Joint Steering Committee for the Establishment of Sof tware Engineering as a Profession. answer: IEEE-CS and the ACM Because certification ____, hiring managers have become rather cynical on the su bject. answer: is no substitute for experience The Institute for Certification of Computing Professionals (ICCP) offers the fol lowing levels of certification--Certified Associate Computing Professional and C ertified ____ Professional. answer: Computing Which of the following programs has a certification process for a software quali ty engineer? answer: ASQC Which of the following is NOT a reason why there are currently no international or national licensing programs for IT professionals? answer: The committee cannot agree on the language in which to administer the ex ams. ____ refers to the obligation that we not cause any unreasonable harm or risk of harm to others. answer: duty of care The courts decide whether a duty of care is owed in specific cases by applying a (n) ____ person standard. answer: reasonable Defendants with a particular expertise or competence are measured against a reas onable ____ standard. answer: professional Software engineers cannot be subject to malpractice a. software engineering is not a uniformly licensed tes b. software companies often have engineers residing c. software engineers often share responsibility in answer: all lawsuits because ____. profession in the United Sta in different states the compilation of a product

A(n) ____ is a hardware and/or software device that serves as a barrier between a company and the outside world and limits access into and out of the company's

network based on the organizations Internet usage policy. answer: firewall A(n) ____ can be configured to serve as an effective deterrent to non-work-relat ed Web surfing by blocking access to specific, objectionable Web sites. answer: firewall The ASQC certification requirements include ____ years of professional experienc e with at least three years in a decision-making position. answer: 8 ASQC certification requirements do NOT include which of the following? answer: A bachelors degree Certifications granted by industry associations generally ensure a certain level of experience and ____ than vendor certifications. answer: a broader perspective The IT professional must ____. a. understand the needs and capabilities of the user b. establish an environment supportive of ethical behavior by the user c. develop or help establish an effective system usage policy for users answer: all Which of the following is a typical ethical issue or problem of the IT professio nal-client relationship? answer: Project status reports may be less than fully accurate Which of the following is NOT a typical job title for an IT professional or spec ialist? answer: CFO The "Deceptive Duo" were ____. answer: hackers Which of the following was able to escape harm from the ILOVEYOU bug? answer: none Code Red, SirCam, and Nimda are ____ that resulted in over $500 million in damag es in 2001. answer: worms Which of the following is a drawback of a having a firewall installed? answer: It slows down online-processing systems. When a charge is made fraudulently in a retail store, who must pay the fraudulen t charges? answer: The bank that issued the credit card One security technique for reducing the potential for online credit card fraud i s to ask for a(n) ____, which is the three-digit number above the signature pane l on the back of a credit card. answer: card verification value (CVV) Which of the following serves as a clearinghouse for news on new viruses, worms, and other computer security topics? answer: The Computer Emergency Response Team (CERT) It is crucial that anti-virus software be continually updated with the latest vi rus detection information, called ____.

answer: definitions Installation of a(n) ____ is the most common security precaution taken by busine sses. answer: corporate firewall Cute.exe is an example of a ____. answer: trojan horse ____ viruses have become the most common and easily created viruses. These virus es can use Visual Basic or VBScript to create programs that infect documents and templates. answer: Macro Which of the following can propagate without human intervention? answer: a worm A common profile for today's ____ is one of a male who is in his mid-twenties or younger, has lots of spare time, has minimal financial resources, and is a soci al outsider. answer: hacker A typical cybercriminal's objective is to seek financial gain. What level of ris k is this type of perpetrator usually willing to take? answer: moderate Which of the following is NOT a necessary element in proving fraud? answer: The innocent party was not negligent. Which of the following are actions that can reduce the threat of attack by malic ious insiders? a. Promptly delete the login IDs and passwords of departing employees b. Create roles and user accounts so that users have the authority to perform th eir responsibilities and no more c. Rotate people in sensitive positions answer: all The idea of a network-based ____ is to provide would-be hackers with fake inform ation about a network by means of a decoy server to confuse them, trace them, or keep a record for prosecution. answer: honeypot What is the fastest growing form of fraud in the United States? answer: Identiy fraud The United States government conducts frequent security assessments of its agenc ies - usually with ____ results. answer: disappointing With ____-based intrusion detection systems, a model of normal behavior of the s ystem and its users is developed from reference information collected by various means. answer: behavior the U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign offic ial unless they payment was ______. answer: lawful under the laws of the foreign country in which it was paid

S-ar putea să vă placă și