Podcast
Questions and Answers
Professional codes of conduct are established to help professions regulate themselves in the interest of society.
Professional codes of conduct are established to help professions regulate themselves in the interest of society.
True
The right of a company to maximize productivity of workers is always prioritized over the workers' right to use the Internet for personal tasks.
The right of a company to maximize productivity of workers is always prioritized over the workers' right to use the Internet for personal tasks.
False
Information rights include individuals claiming to be free from surveillance by other individuals or organizations.
Information rights include individuals claiming to be free from surveillance by other individuals or organizations.
True
Identifying stakeholders is an irrelevant step in resolving ethical dilemmas in information systems.
Identifying stakeholders is an irrelevant step in resolving ethical dilemmas in information systems.
Signup and view all the answers
The potential consequences of options should be considered when facing ethical dilemmas.
The potential consequences of options should be considered when facing ethical dilemmas.
Signup and view all the answers
A digital photo typically requires about 10 Mbytes of storage.
A digital photo typically requires about 10 Mbytes of storage.
Signup and view all the answers
The Bible requires approximately 4.5 Gbytes of storage.
The Bible requires approximately 4.5 Gbytes of storage.
Signup and view all the answers
Lossless compression allows for the recovery of the exact original text or image.
Lossless compression allows for the recovery of the exact original text or image.
Signup and view all the answers
Virtual memory utilizes additional RAM to run programs when there is insufficient main memory.
Virtual memory utilizes additional RAM to run programs when there is insufficient main memory.
Signup and view all the answers
Video consumes about 10 Mbytes of storage for each second of playback at a specified resolution.
Video consumes about 10 Mbytes of storage for each second of playback at a specified resolution.
Signup and view all the answers
Dot-matrix printers typically operate at a resolution of 300 dpi or better.
Dot-matrix printers typically operate at a resolution of 300 dpi or better.
Signup and view all the answers
Laser printers use a drum that is coated with toner and fixed onto the paper with heat.
Laser printers use a drum that is coated with toner and fixed onto the paper with heat.
Signup and view all the answers
Thermal printers are known for producing high-quality prints with complex designs.
Thermal printers are known for producing high-quality prints with complex designs.
Signup and view all the answers
Serif fonts, like Times Roman, are generally better for long lines of printed text.
Serif fonts, like Times Roman, are generally better for long lines of printed text.
Signup and view all the answers
Fixed-pitch fonts have characters that can vary in width, while variable-pitched fonts have equal character widths.
Fixed-pitch fonts have characters that can vary in width, while variable-pitched fonts have equal character widths.
Signup and view all the answers
The size of a font is measured in points, with 1 point being approximately 1/72 inch.
The size of a font is measured in points, with 1 point being approximately 1/72 inch.
Signup and view all the answers
Sans-serif fonts are characterized by having splayed ends on their strokes.
Sans-serif fonts are characterized by having splayed ends on their strokes.
Signup and view all the answers
Uppercase letters are generally better for readability when conveying long strings of text.
Uppercase letters are generally better for readability when conveying long strings of text.
Signup and view all the answers
Moore's law states that processor speed doubles every 12 months.
Moore's law states that processor speed doubles every 12 months.
Signup and view all the answers
Network delays can reduce interactive performance in networked computing.
Network delays can reduce interactive performance in networked computing.
Signup and view all the answers
The Internet was first introduced in 1989 with 10,000 sites.
The Internet was first introduced in 1989 with 10,000 sites.
Signup and view all the answers
The common bottleneck in networked computing is often related to updating graphics displays.
The common bottleneck in networked computing is often related to updating graphics displays.
Signup and view all the answers
TCP stands for Transmission Control Protocol and facilitates communication between machines.
TCP stands for Transmission Control Protocol and facilitates communication between machines.
Signup and view all the answers
Bottlenecks in storage channel bound occur during the transfer of data from memory to disk.
Bottlenecks in storage channel bound occur during the transfer of data from memory to disk.
Signup and view all the answers
Gordon Moore is known for his observation about memory speed doubling every 18 months.
Gordon Moore is known for his observation about memory speed doubling every 18 months.
Signup and view all the answers
The telephone is cited as a good example of effective design in computational systems.
The telephone is cited as a good example of effective design in computational systems.
Signup and view all the answers
JPEG images lose detail in rapid changes and some color.
JPEG images lose detail in rapid changes and some color.
Signup and view all the answers
MP3 audio files retain the accuracy of all notes within a music track.
MP3 audio files retain the accuracy of all notes within a music track.
Signup and view all the answers
ASCII uses an 8-bit encoding system for each letter and character.
ASCII uses an 8-bit encoding system for each letter and character.
Signup and view all the answers
UTF-8 is a simplified version of the SGML character set.
UTF-8 is a simplified version of the SGML character set.
Signup and view all the answers
Compression techniques for images serve to increase storage requirements.
Compression techniques for images serve to increase storage requirements.
Signup and view all the answers
Xerox's 'do what I mean' (DWIM) system is a forgiving indexing method.
Xerox's 'do what I mean' (DWIM) system is a forgiving indexing method.
Signup and view all the answers
Processing speed limitations can complicate user interface design.
Processing speed limitations can complicate user interface design.
Signup and view all the answers
Cursor overshooting occurs when the system processes input too slowly.
Cursor overshooting occurs when the system processes input too slowly.
Signup and view all the answers
Study Notes
Professional Codes of Conduct
- Codes established by professional associations (e.g., AMA, ABA, AITP, ACM).
- Aim to self-regulate in the interests of society.
Ethical Dilemmas in Information Systems
- Conflicts arise between competing interests (e.g., company productivity vs. workers' Internet use for personal tasks).
Moral Dimensions of Information Systems
- Privacy: Individuals' right to be free from surveillance or interference.
- Conflicts between information rights and organizational needs.
Information System Stakeholders
- Companies, employees, consumers, regulatory bodies, and technology providers.
Options for Ethical Decisions
- Review different courses of action considering policies, stakeholder impact, and ethical duties.
Consequences of Options
- Assess potential outcomes of decisions affecting productivity, privacy rights, and workplace dynamics.
Printing Technologies
- Dot-matrix printers: Use inked ribbons and pins for printing; resolution typically 80-120 dpi.
- Inkjet and bubble-jet printers: Emit tiny ink droplets; resolution usually 300 dpi or better.
- Laser printers: Employ electrostatic charge and toner; resolution typically 600 dpi or better.
- Thermal printers: Use heat-sensitive paper; simpler but lower quality.
Font Characteristics
- Types of Fonts: Examples include Courier, Helvetica, Palatino, Times Roman.
- Font Size: Measured in points; 1 pt is approximately 1/72".
- Pitch: Fixed-pitch (same width per character) vs. variable-pitched (different widths).
- Serif vs. Sans-serif: Serif fonts have embellishments; sans-serif are simpler.
Readability
- Lowercase fonts improve shape recognition; uppercase better for isolated characters.
- Serif fonts enhance readability in long texts; sans-serif fonts work better on screens.
Page Description Languages
- Complex pages can be converted to bitmaps for printing, but file sizes can become large.
Storage and Speed Concerns
- Virtual memory: Extends RAM by using disk space, but can slow down performance due to swapping.
-
Compression: Two types:
- Lossless (e.g., GIF, ZIP) recovers exact data.
- Lossy (e.g., JPEG, MP3) compromises some detail for reduced size.
Text Storage Formats
- ASCII: 7-bit binary code representation.
- UTF-8: 8-bit encoding for extensive character sets.
- XML: A simplified markup language for web applications.
Media Storage Formats
- Various formats for images (e.g., JPEG, TIFF) and audio/video (e.g., WAV, MPEG).
Accessing Information
- Indexed data allows for faster searches.
- Forgiving systems enable user-friendly interaction (e.g., DWIM, SOUNDEX).
Processing Speed Limitations
- Increases in interface complexity can lead to user frustration.
- Designers should account for real-world processing limits.
Moore's Law
- Processor speed is expected to double approximately every 18 months.
- Memory capacity doubles every 12 months; significant growth observed since the 1980s.
Networking and Performance
- Networked computing enables access to shared resources but can introduce delays.
- Possible performance bottlenecks include data transfer speeds and graphics updates.
Internet Development
- Originated in 1969 with DARPANET, growth from 4 to 10,000 sites by 1989.
- Uses TCP/IP protocols for communication and functionality (e.g., email, HTTP).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores ethical and social issues in information systems as discussed in Chapter 4 of Management Information Systems. It focuses on identifying facts, conflicts, stakeholders, options, and potential consequences involved in ethical decision-making. Test your understanding of professional codes of conduct in an information society.