· Question 1 2 out of 2 points Restricting websites to collect data about childr
ID: 378983 • Letter: #
Question
· Question 1
2 out of 2 points
Restricting websites to collect data about children under the age of 13 is covered by what legislation?
· Question 2
2 out of 2 points
Why do IT organizations outsource work?
· Question 3
2 out of 2 points
"In Everett Roger’s Technology Adoption User Types, which group of users are the first to adopt new technologies?"
· Question 4
2 out of 2 points
The simplest way to document a process it to ________
· Question 5
2 out of 2 points
What is the critical path in a project plan?
· Question 6
2 out of 2 points
"When a company ""exports jobs"" overseas, the company is __________________."
· Question 7
2 out of 2 points
This implementation methodology is the most risky.
· Question 8
2 out of 2 points
A series of tasks that are completed in order to accomplish a goal for a business is known as a ______.
· Question 9
2 out of 2 points
What are the primary business benefits of an ERP system?
· Question 10
0 out of 2 points
David Andersen created an abstract art painting that he considers his best work. He then sells the painting to Melissa Warren. Melissa decides to make copies of the work and then resell it. What below is true about this?
· Question 11
2 out of 2 points
A future trend in information systems that stems from the extensive data sharing is known as _______.
· Question 12
2 out of 2 points
"Cyberbullying, driving while using a cell phone and identity theft are all examples of "
· Question 13
0 out of 2 points
"If Wendy posts a YouTube video of entire episodes of Empire on her YouTube account, YouTube is not responsible for her violation of Empire’s copyright. This is known as ___________."
· Question 14
2 out of 2 points
Globalization involves:
· Question 15
2 out of 2 points
The productivity paradox refers to _______.
· Question 16
2 out of 2 points
What are a few emerging areas in information technology?
· Question 17
2 out of 2 points
In the value chain model, which of the following is not a support activity?
· Question 18
2 out of 2 points
How has information technology changed the structure of the organization?
· Question 19
0 out of 2 points
A knowledgebase for the help desk is what?
· Question 20
2 out of 2 points
What is competitive advantage?
· Question 21
2 out of 2 points
What was one of the results of the Sony Bono Copyright Term Extension Act?
· Question 22
2 out of 2 points
What is NOT true about a professional code of ethics?
· Question 23
2 out of 2 points
This implementation methodology is the most expensive in transitioning to a new system.
· Question 24
2 out of 2 points
What do patents protect? Pick the best answer.
· Question 25
2 out of 2 points
Has inequality between 20% of the world's richest and 20% of the world's poorest changed during globalization 2.0 and 3.0?
· Question 26
2 out of 2 points
People are important for information systems in what way?
· Question 27
2 out of 2 points
A software application with a centralized database that can be used to run an entire company is known as a(n) ___________.
· Question 28
0 out of 2 points
What is the advantage of using a Web Service?
· Question 29
2 out of 2 points
The economic divide refers to:
· Question 30
2 out of 2 points
Which of the following is not characteristic of globalization?
· Question 31
2 out of 2 points
A _________________ is responsible for maintaining the databases and data warehouses for a company.
· Question 32
2 out of 2 points
What is the logical relationship that exists between the project tasks?
· Question 33
2 out of 2 points
_______ can be thought of as an intentional effort to plan, document, and distribute an organization’s business processes with the support of information technology.
· Question 34
2 out of 2 points
"In the article titled “IT Doesn’t Matter,” the author claims that it has become less of a differentiator in obtaining and sustaining competitive advantage because it is _______."
· Question 35
2 out of 2 points
A person who keeps projects on-time and within-budget is called the _____________.
· Question 36
2 out of 2 points
Which out of the following is an example of global trade barrier?
· Question 37
2 out of 2 points
Globalization is defined as the process of countries becoming _______ open to foreign trade and ______ open to foreign investment.
· Question 38
2 out of 2 points
Joe writes a program that helps him get a free copy of Assassins Creed X.
· Question 39
2 out of 2 points
What is the Systems Development Life Cycle (SDLC) stand for?
· Question 40
2 out of 2 points
"David Andersen created an abstract art painting that he considers his best work. He then sells the painting to Melissa Warren. After a few years, Melissa decides to destroy the painting. What below is true about this?"
· Question 41
2 out of 2 points
The requirement to manage process documentation has been one of the driving forces behind the creation of the _______.
· Question 42
2 out of 2 points
Which of the following is NOT considered intellectual property?
· Question 43
2 out of 2 points
A person who translates business requirements into technical systems requirements is a ___________.
· Question 44
2 out of 2 points
A big disadvantage with purchasing software off-the-shelf is ______________.
· Question 45
2 out of 2 points
Restricting access to people’s health information is covered by what legislation?
· Question 46
2 out of 2 points
"In the value chain, the term “service” refers to _________."
· Question 47
2 out of 2 points
How long does a trademark last?
· Question 48
2 out of 2 points
What is true about the help desk?
· Question 49
2 out of 2 points
Rapid Application Development (RAD) relies heavily on ____________.
· Question 50
2 out of 2 points
Janet Jones writes out her own lyrics to a song in a notebook every day. Which statement below is true.
· Question 51
2 out of 2 points
Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?
· Question 52
2 out of 2 points
The textbooks suggest that there are two paths you can follow in your career if you are in the IT field. These are _____________________.
· Question 53
2 out of 2 points
Which of the following are components of Agile methodology?
· Question 54
2 out of 2 points
What is enterprise resource planning?
· Question 55
2 out of 2 points
What is a consideration when a company decides to purchase off-the-shelf software or build it in-house?
· Question 56
0 out of 2 points
__________ is a term used to ensure that the same process is used throughout all locations of an organization.
· Question 57
0 out of 2 points
"The following are drivers of globalization, except:"
· Question 58
0 out of 2 points
Business process engineering encourages personnel within businesses to improve upon their methods by ______.
· Question 59
0 out of 2 points
Which of the following represents the phases in the SDLC?
· Question 60
0 out of 2 points
"In the Porter’s Five Forces model, the threat of substitute products refers to ______."
Restricting websites to collect data about children under the age of 13 is covered by what legislation?
Explanation / Answer
Hello, in the interest of time, I answered the below questions.
1. It is covered under the Children's Online Privacy Protection Act of 1998.
2. To reduce the costs of controlling and operating a few tasks. To increase the focus of the company of its main objectives. To provide more time and bandwidth to the internal resources for other major tasks. To share the risks with it's partner company.
3.Innovators : They are the first ones to react to a new technology. They are risk-taking, young and considerable financial bandwidth and freedom.
4. The simplest way to document a process it to create a list of the steps involved in the process. Creating a simple and unambiguous list saves time and is straightforward. For complex processes, create a draft list and document it as a diagram having arrows showing which leads to what.
5. A Critical Path is simply the overall sequence of activities in a project plan. This has to be completed in time to meet the project's goals and expectations. It is important since, when the path and sequences are identified, resourcing and time to spend on each activity also can be identified.
6. It is Outsourcing. It is outsourcing the Human resources from other countries.
7. The "direct cutover" method is the most risky. In this, the system is tested and once ready, it is directly transferred to the organization in one day. Although it saves time and costs, if the system fails or gives any problems, the entire organization is effected.
8. Process. Since it has a series of tasks and all the sub-tasks in the process in a sequence is directed towards achieving the goal.
9. a) 'Streamlined business processes' - It brings all the data in one place. b) 'Promotes strongly coupled organization' - Big organizations may foster a detachment between departments. ERP system may prevent such departmental overlooks. c) 'Better tracking' - more control and tracing of products. (both digital and physical)
10. It is infringing the copyrights ( if David got one legally ) and also not acceptable socially if David did not give permission to Melissa or had partner-shipped with her for business. It is Plagiarism.
11. Big data. These data sets are so huge that of techniques of data processing are incapable of dealing with them.
12. examples of how technology is affecting the behaviour of humans and in the result of it, modifying and creating new laws.
13. I am not very sure of the right terminology so would not want to give incorrect answer, however the person posting the videos by violating copyrights will face the laws and not youtube.
14. Business with the entire world. Investing in foreign countries, importing goods, making financial and trade deals etc.
15. A slowdown in the growth of productivity. Which means the graph of productivity will slowly reach a flat stage, even with growth and development in technology.
16. a) The increase in number of devices connected to the internet. b) Social media - able to share information with a larger audience in a quicker and efficient way. c) Data security - bigger the data, easier to access - more need to security.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.