Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIS 3250 Final Exam Practice Questions with Answers, Exams of Nursing

A set of practice questions and answers for a final exam in cis 3250, covering topics such as offshoring, cookies, informed consent, digital divide, technological singularity, and copyright law. The questions are multiple choice and offer a range of options for students to test their understanding of key concepts and terminology.

Typology: Exams

2024/2025

Available from 12/08/2024

Achieverr
Achieverr 🇺🇸

4.3

(7)

9K documents

1 / 21

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CIS 3250 Final Exam with correct
answers
The practice of companies in other countries employing people in the U.S.
is known as:
A. Downsizing
B. Inshoring
C. Offshoring
D. Globalization - ** VERIFIED ANSWERS **✔✔B. Inshoring
What is a cookie?
A. A virus placed on your computer
B. Search features of some web sited
C. Files a web site stores on a visitor's computer
D. A bakery treat - ** VERIFIED ANSWERS **✔✔C. Files a web site stores on
a visitor's computer
Which of the following occupations can sometimes cause Repetitive Strain
Injuries?
A. Musician
B. All of these
C. Sign-language interpreter of the def
D. Computer programmer - ** VERIFIED ANSWERS **✔✔B. All of these
What is Informed Consent?
A. You agree to waive your Constitutional rights
B. In writing you waive your right to have an attorney present during an
arrest
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15

Partial preview of the text

Download CIS 3250 Final Exam Practice Questions with Answers and more Exams Nursing in PDF only on Docsity!

CIS 3250 Final Exam with correct

answers

The practice of companies in other countries employing people in the U.S. is known as: A. Downsizing B. Inshoring C. Offshoring D. Globalization - ** VERIFIED ANSWERS **✔✔B. Inshoring What is a cookie? A. A virus placed on your computer B. Search features of some web sited C. Files a web site stores on a visitor's computer D. A bakery treat - ** VERIFIED ANSWERS **✔✔C. Files a web site stores on a visitor's computer Which of the following occupations can sometimes cause Repetitive Strain Injuries? A. Musician B. All of these C. Sign-language interpreter of the def D. Computer programmer - ** VERIFIED ANSWERS **✔✔B. All of these What is Informed Consent? A. You agree to waive your Constitutional rights B. In writing you waive your right to have an attorney present during an arrest

C. A ruling by the Supreme Court that requires police to obtain written permission before they start questioning you D. You are aware and agree to the data being collected about you - ** VERIFIED ANSWERS **✔✔D. You are aware and agree to the data being collected about you Which of the following factors contribute to security weakness? A. History of the Internet and the Web B. Human nature C. Speed at which new applications develop D. All of these - ** VERIFIED ANSWERS **✔✔D. All of these Digital Divide - ** VERIFIED ANSWERS **✔✔Refers to the fact that some people have access to computers and information technology while others do not Technological Singularity - ** VERIFIED ANSWERS **✔✔Point at which artificial intelligence advances so far that we cannot comprehend what lies on the other side One Laptop per Child - ** VERIFIED ANSWERS **✔✔A nonprofit organization that supplies an inexpensive laptop computers designed for elementary school children in developing countries Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studies are known as: A. Computer entrapment B. Hacker crackdown C. Honeypots D. Digital surveillance - ** VERIFIED ANSWERS **✔✔C. Honeypots Libel tourism does NOT have which of the following characteristics? A. The content was posted on the Web on servers outside of England

  • Corporate Sponsors
  • Paid Advertisement
  • Taxes
  • A reduced capability is free such as smart phone games. The full game or app is paid for and financially supports to free versions.
  • Donations - ** VERIFIED ANSWERS **✔✔All of them Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off? A. All of these B. Lack of imagination about the uses people would find for technology C. Lack of imagination what the public would like D. Lack of imagination about what the public would pay for - ** VERIFIED ANSWERS **✔✔A. All of these Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law? A. Distribute the work B. Copy the work C. Create "derivative works" D. Profit from the work - ** VERIFIED ANSWERS **✔✔D. Profit from the work Which of the following reasons for monitoring email, voice mail, and computer files is considered legal? A. Prevent personal use of employer facilities if prohibited by company policy B. Protect security or proprietary information and data C. All of these D. Investigate complaints of harassment - ** VERIFIED ANSWERS **✔✔C. All of these

Which of the following is not a factor specified is U.S. copyright law for determining fair use? A. The for-profit or non-profit status of the copyright holder B. The amount and significance of the portion used C. The purpose and nature of the use D. The effect on the market for the copyrighted work - ** VERIFIED ANSWERS **✔✔A. The for-profit or non-profit status of the copyright holder When was the first U.S. copyright law passed? A. In 1970 B. In 1790 C. In 1780 D. In 1880 - ** VERIFIED ANSWERS **✔✔B. In 1790 Which of the following is NOT a principle for producing good systems? A. Understood what success means B. Overestimate the costs and time a project will take C. Include users in the design and testing stages D. Be open and honest about capabilities, safety and limitations of software - ** VERIFIED ANSWERS **✔✔B. Overestimate the costs and time a project will take Which of the following is NOT a Neo-Luddite criticism of computers? A. Use of computers in schools thwarts development of social skills B. Computers separate humans from nature and destroy the environment C. Computers cause social inequity D. None of these - ** VERIFIED ANSWERS **✔✔D. None of these Most of the delay in the opening of the Denver International Airport was because of problems with

The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material. A. No Electronic Theft Act B. U.S. copyright law C. Recording Industry Association of America Act D. Digital Millennium Copyright Act - ** VERIFIED ANSWERS **✔✔D. Digital Millennium Copyright Act In the term "Free Software", "free" implies all of the following except one. Which one? A. Free to modify B. Free to copy C. Free to cost D. Freedom - ** VERIFIED ANSWERS **✔✔C. Free of cost What is the Golden Rule? A. An eye for an eye and a tooth for a tooth B. Treat others as you would have them treat you C. There are no riles, only guidelines D. Each man/women for themselves - ** VERIFIED ANSWERS **✔✔B. Treat others as you would have them treat you When one goes behind Rawl's veil of ignorance, what is one ignorant of? A. Whether someone is telling the truth or not B. Of one's own prejudice C. Other individuals personal feelings D. Each person does not know his/her own gender, race, age, talents, wealth and so on - ** VERIFIED ANSWERS **✔✔D. Each person does not know his/her own gender, race, age, talents, wealth and so on

There are four factors to consider in deciding whether a use of copyrighted material is a fair use. Which of the following is not one of those factors? A. The effect of the use on potential market for or value of the copyrighted work B. The nature of the copyright work C. The amount and significance of the portion used D. The purpose and nature of the use us only for nonprofit organizational purposes - ** VERIFIED ANSWERS **✔✔D. The purpose and nature of the use us only for nonprofit organizational purposes Phishing is defined as which of the following? A. An attack in which hackers overload a target site with requests for information B. Websites that are specifically designed to be attractive to hackers C. Planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site D. Sending millions of emails requesting information to use to impersonate someone and steal money or goods - ** VERIFIED ANSWERS **✔✔D. Sending millions of emails requesting information to use to impersonate someone and steal money or goods What does the term personal information mean? A. Relationship issues B. Personal preference information about things like favorite food or color C. Bits of data that can be used to uniquely identify a person D. Any information relating to, it traceable to, and individual person - ** VERIFIED ANSWERS **✔✔D. Any information relating to, it traceable to, and individual person Select an application referenced in the book for speech recognition A. Teach foreign language B. Answer questions from Apple's Siri

What areas is covered by the topics of Free Speech? A. Other forms of expression and opinion B. Spoken and written Words C. All of these D. Pictures and Art - ** VERIFIED ANSWERS **✔✔C. All of these Which of the following is not an example of biometrics: A. Fingerprints B. Passport C. DNA D. Voice prints - ** VERIFIED ANSWERS **✔✔B. Passport Which of the following is not a way for software to be protected against copyright infringement? A. Hardware B. Registrations C. Make all software free D. Self-destructive software - ** VERIFIED ANSWERS **✔✔C. Make all software free Which of the following is NOT a purpose of monitoring employee communications? A. Initiate complaints of harassment B. Checking compliance with rules of communications C. Measuring or increasing productivity D. Training - ** VERIFIED ANSWERS **✔✔A. Initiate complaints of harassment In 2000,a French court ordered Yahoo! to block access by French people to A. A Website containing instructions for making bombs

B. Online auction sites containing Nazi materials C. Websites containing pornography D. An Al Qaeda manual - ** VERIFIED ANSWERS **✔✔B. Online auction sites containing Nazi materials In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was A. Women do not speak as loudly as men, and the systems used inferior microphones B. The program was specifically designed for men C. The program was primarily developed and tested by men D. Womens voices are inherently harder to recognize - ** VERIFIED ANSWERS **✔✔C. The program was primarily developed and tested by men Honey pots is defined as which of the following? A. Planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site B. Websites that are specifically designed to be attractive to hackers C. Sending millions of emails requesting information to use to impersonate someone and steal money or goods D. An attack in which hackers overload a target site with requests for information - ** VERIFIED ANSWERS **✔✔B. Websites that are specifically designed to be attractive to hackers Which one of the media areas has the most First Amendment protection? A. Broadcast B. Interpersonal communication C. Common Carriers D. Print - ** VERIFIED ANSWERS **✔✔D. Print Lawsuits in 1978 delayed the introduction of technology for consumer CD- recoding devices for music

  • False - ** VERIFIED ANSWERS **✔✔True Redundancy and self-checking are often present in safety-critical systems
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene
  • True
  • False - ** VERIFIED ANSWERS **✔✔False Sweatshop labor is involved in their manufacture is a Luddite criticism of technology
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Accelerometers help robots stay upright
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Golden rules, such as treat others as we want them to treat us, can be found in the Bible
  • True
  • False - ** VERIFIED ANSWERS **✔✔True U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
  • True
  • False - ** VERIFIED ANSWERS **✔✔True

Some computer errors are actually system failures, in that it was the human/computer interface which caused the resulting problem.

  • True
  • False - ** VERIFIED ANSWERS **✔✔True The brainstorming phase discussed in Chapter 9 can generate long discussion with humorous and obviously wrong options.
  • True
  • False - ** VERIFIED ANSWERS **✔✔True All peer-to-peer technologies were found to be illegal as a result of the Napster case.
  • True
  • False - ** VERIFIED ANSWERS **✔✔False White hat hackers use their skills to demonstrate system vulnerabilities and improve security.
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Software designers should include users in the design stages
  • True
  • False - ** VERIFIED ANSWERS **✔✔True In its early years, Internet security was a primary design concern
  • True
  • False - ** VERIFIED ANSWERS **✔✔False Wikipedia relies upon an advertising-based business model
  • True
  • False - ** VERIFIED ANSWERS **✔✔False
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Legacy systems are typically reliable and flexible
  • True
  • False - ** VERIFIED ANSWERS **✔✔False In Katz v. United States (1967) the US Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Telecommuting is most commonly known as working for an employer at a computer-equipped paced in the employee's home
  • True
  • False - ** VERIFIED ANSWERS **✔✔True The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees' stored mail
  • True
  • False - ** VERIFIED ANSWERS **✔✔False The US Supreme Court ruled that requiring content filters on public library computers was unconstitutional
  • True
  • False - ** VERIFIED ANSWERS **✔✔False A zombie computer can send spam to thousands, contribute to denial-of- service attacks, participate in various kinds of online advertising fraud and the actual owner be unaware of what their computer is doing
  • True
  • False - ** VERIFIED ANSWERS **✔✔True In some cases, the government is permitted to monitor online activity of suspected hackers without a court order
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Providing new technology to poor countries is a matter of having enough money to buy the equipment
  • True
  • False - ** VERIFIED ANSWERS **✔✔False In government agencies, email is a part of the official record and not subject to public disclosure (with some exceptions)
  • True
  • False - ** VERIFIED ANSWERS **✔✔False Sega v. Accolade Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Stuxnet was a sophisticated worm, that targets a particular type of control system
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Copyright law protects processes and inventions, while patent laws protects the particular expression of an idea
  • True
  • False - ** VERIFIED ANSWERS **✔✔False
  • False - ** VERIFIED ANSWERS **✔✔True It is always wrong to lie would reflect the utilitarian theory of ethics
  • True
  • False - ** VERIFIED ANSWERS **✔✔False Black hat hackers, for the most part, use their skills to demonstrate system vulnerabilities and improve security for an organization
  • True
  • False - ** VERIFIED ANSWERS **✔✔False In Olmsted v. United States (1928), the US Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion
  • True
  • False - ** VERIFIED ANSWERS **✔✔True A feature of high reliability organizations is rigid structure
  • True
  • False - ** VERIFIED ANSWERS **✔✔False A broad interpretation of the Computer Fraud and Abuse Act might criminalize common activities of millions of people
  • True
  • False - ** VERIFIED ANSWERS **✔✔True US and European pilots are now trained to follow Traffic Collision Avoidance System (TCAS) instructions even if they conflict with instructions from an air traffic controller
  • True
  • False - ** VERIFIED ANSWERS **✔✔True

The USA PATRIOT ACT (2001) gives individuals more protection from governmental intrusion

  • True
  • False - ** VERIFIED ANSWERS **✔✔False Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Overall, telecommuting reduces productivity, but decreases overhead for employers
  • True
  • False - ** VERIFIED ANSWERS **✔✔False "Anticircumvention" and "safe harbor" are the two significant parts of the Digital Millennium Copyright Act
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Hacking to promote political cause is called Hacktivism
  • True
  • False - ** VERIFIED ANSWERS **✔✔True Broadcast media traditionally has had strongest First Amendment protection (meaning the fewest regularity restrictions) wile print media has the weakest First Amendment protection
  • True
  • False - ** VERIFIED ANSWERS **✔✔False What does the Fourth Amendment to the U.S. Constitution state? - ** VERIFIED ANSWERS **✔✔The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and