ITM 102 MIDTERM PREP QUESTIONS
WITH COMPLETE SOLUTIONS
what are the six steps in evaluating software tools - Answer-identify your firm's
collaboration challenges, identify what kind of solutions are available, analyze available
product costs and benefits, evaluate security risk, consult users for implementation and
training issues, evaluate product vendors
who is apart of the information systems department - Answer-often handled by,
programmers, system analyst, information systems managers, end users
what is it governance - Answer-strategies and policies for using it in the organization,
decision rights, accountability, organizations up information systems functions
What is ethics? - Answer-principles of right and wrong that individuals, acting as free
moral agents, used to make choices to guide their behaviours
what are the five moral dimensions of the information age - Answer-information rights
and obligations, property rights and obligations, accountability and control, system
quality, quality of life
key technology trends that raise ethical issues - Answer-computing power doubles
every 18 months, data storage cost rapidly declined, data analyst and fences,
networking advances, mobile device growth impact
what is profiling - Answer-combining data from multiple sources to create dozers of
detailed information on individuals
non-obvious relationship awareness (NORA) - Answer-combining data from multiple
sources to find obscure hidden connections that might help identify criminals or
terrorists
what is responsibility - Answer-accepting the potential costs, duties, and obligations for
decisions
what is accountability - Answer-mechanics for identifying responsible parties
what is liability - Answer-permits individuals to recover damages done to them
what is due process - Answer-laws are well known and understood with an ability to
appeal to higher authorities
, what is the five-step process for ethical analyst - Answer-identify and clearly describe
the facts, define the conflict or dilemma and identify the higher-order values and fall,
identify the stakeholders, identify the options that you can reasonably take, identify the
potential consequences of your actions
what is the Golden rule - Answer-do unto others as you would have them do unto you
immanuel rule - Answer-if an action is not right for everyone to take, it is not right for
anyone
slippery slope rule - Answer-if an action cannot be taken repeatedly, it is not right to
take it all
utilitarian principle - Answer-take the action that achieves the higher or greater value
risk aversion principle - Answer-take the action that produces the least harm or potential
cost
ethical no free lunch rule - Answer-assume that virtually all tangible and intangible
objects are owned by someone unless there is a specific declaration otherwise
What is privacy? - Answer-claims of an individual to be left alone, free from surveillance
or interference from other individuals
where are the FTC FIP principles - Answer-notice / awareness, choice / consent,
access participation, security, enforcement
what are heavy fines - Answer-4% of global daily revenue
what is intellectual property - Answer-tangible and intangible products of the mind
created by individuals or corporations
what are the four main ways to protect property rights - Answer-copyright, patents,
trademarks, trade secrets
what is an acceptable, technologically feasible level of system quality - Answer-Flawless
software is economically unfeasible.
what are the three principal sources of poor system performance - Answer-software
bugs, errors and hardware or facility failures, Port input data quality
what is an IT infrastructure - Answer-set of physical devices and software required to
operate an Enterprise
WITH COMPLETE SOLUTIONS
what are the six steps in evaluating software tools - Answer-identify your firm's
collaboration challenges, identify what kind of solutions are available, analyze available
product costs and benefits, evaluate security risk, consult users for implementation and
training issues, evaluate product vendors
who is apart of the information systems department - Answer-often handled by,
programmers, system analyst, information systems managers, end users
what is it governance - Answer-strategies and policies for using it in the organization,
decision rights, accountability, organizations up information systems functions
What is ethics? - Answer-principles of right and wrong that individuals, acting as free
moral agents, used to make choices to guide their behaviours
what are the five moral dimensions of the information age - Answer-information rights
and obligations, property rights and obligations, accountability and control, system
quality, quality of life
key technology trends that raise ethical issues - Answer-computing power doubles
every 18 months, data storage cost rapidly declined, data analyst and fences,
networking advances, mobile device growth impact
what is profiling - Answer-combining data from multiple sources to create dozers of
detailed information on individuals
non-obvious relationship awareness (NORA) - Answer-combining data from multiple
sources to find obscure hidden connections that might help identify criminals or
terrorists
what is responsibility - Answer-accepting the potential costs, duties, and obligations for
decisions
what is accountability - Answer-mechanics for identifying responsible parties
what is liability - Answer-permits individuals to recover damages done to them
what is due process - Answer-laws are well known and understood with an ability to
appeal to higher authorities
, what is the five-step process for ethical analyst - Answer-identify and clearly describe
the facts, define the conflict or dilemma and identify the higher-order values and fall,
identify the stakeholders, identify the options that you can reasonably take, identify the
potential consequences of your actions
what is the Golden rule - Answer-do unto others as you would have them do unto you
immanuel rule - Answer-if an action is not right for everyone to take, it is not right for
anyone
slippery slope rule - Answer-if an action cannot be taken repeatedly, it is not right to
take it all
utilitarian principle - Answer-take the action that achieves the higher or greater value
risk aversion principle - Answer-take the action that produces the least harm or potential
cost
ethical no free lunch rule - Answer-assume that virtually all tangible and intangible
objects are owned by someone unless there is a specific declaration otherwise
What is privacy? - Answer-claims of an individual to be left alone, free from surveillance
or interference from other individuals
where are the FTC FIP principles - Answer-notice / awareness, choice / consent,
access participation, security, enforcement
what are heavy fines - Answer-4% of global daily revenue
what is intellectual property - Answer-tangible and intangible products of the mind
created by individuals or corporations
what are the four main ways to protect property rights - Answer-copyright, patents,
trademarks, trade secrets
what is an acceptable, technologically feasible level of system quality - Answer-Flawless
software is economically unfeasible.
what are the three principal sources of poor system performance - Answer-software
bugs, errors and hardware or facility failures, Port input data quality
what is an IT infrastructure - Answer-set of physical devices and software required to
operate an Enterprise