Podcast
Questions and Answers
What is the main purpose of cookies on the Internet?
What is the main purpose of cookies on the Internet?
- Improve website design
- Block access to certain websites
- Identify browser and track visits to site (correct)
- Encrypt sensitive information
What is the function of web beacons (web bugs) on the Internet?
What is the function of web beacons (web bugs) on the Internet?
- Analyze website traffic
- Monitor who is reading e-mail message or visiting site (correct)
- Enhance website security
- Block pop-up ads
What is the purpose of anti-spyware tools?
What is the purpose of anti-spyware tools?
- Block unwanted emails
- Enhance internet speed
- Encrypt online communications
- Detect and remove surreptitiously installed software on a user’s computer (correct)
Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?
Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?
What does the Digital Millennium Copyright Act (DMCA) make illegal?
What does the Digital Millennium Copyright Act (DMCA) make illegal?
What are the negative social consequences of information systems mentioned in the text?
What are the negative social consequences of information systems mentioned in the text?
What is the largest source of repetitive stress injury (RSI) according to the text?
What is the largest source of repetitive stress injury (RSI) according to the text?
What is computer vision syndrome (CVS) related to according to the text?
What is computer vision syndrome (CVS) related to according to the text?
What are some health risks associated with information systems according to the text?
What are some health risks associated with information systems according to the text?
What is the main purpose of 'Do not track' options in browsers according to the text?
What is the main purpose of 'Do not track' options in browsers according to the text?
What is the systems development life cycle used for?
What is the systems development life cycle used for?
What is a software lifecycle model?
What is a software lifecycle model?
What does project planning aim to optimize?
What does project planning aim to optimize?
Why is it difficult to monitor a Software Engineering project?
Why is it difficult to monitor a Software Engineering project?
What does a project plan need to describe at least?
What does a project plan need to describe at least?
What is the systems development life cycle also referred to as?
What is the systems development life cycle also referred to as?
What does a lifecycle model describe?
What does a lifecycle model describe?
What does project planning optimize?
What does project planning optimize?
Why is monitoring a Software Engineering project inherently difficult?
Why is monitoring a Software Engineering project inherently difficult?
Which phase is not part of the Systems Development Lifecycle (SDLC)?
Which phase is not part of the Systems Development Lifecycle (SDLC)?
What is a limitation of the waterfall model in Systems Development?
What is a limitation of the waterfall model in Systems Development?
What approach involves the development of a small part of the system at a time with subsequent iterations and improvements?
What approach involves the development of a small part of the system at a time with subsequent iterations and improvements?
What is a solution to combat content piracy mentioned in the text?
What is a solution to combat content piracy mentioned in the text?
What are the five moral dimensions of the information age mentioned in the text?
What are the five moral dimensions of the information age mentioned in the text?
What principle emphasizes making decisions based on what is best for society as a whole?
What principle emphasizes making decisions based on what is best for society as a whole?
What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?
What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?
What aims to protect personal information and regulate its use in the digital age?
What aims to protect personal information and regulate its use in the digital age?
What are the phases of the Systems Development Lifecycle (SDLC) mentioned in the text?
What are the phases of the Systems Development Lifecycle (SDLC) mentioned in the text?
Which model is mentioned as an alternative to the classic waterfall model in Systems Development Lifecycle (SDLC)?
Which model is mentioned as an alternative to the classic waterfall model in Systems Development Lifecycle (SDLC)?
What are the five moral dimensions of the information age mentioned in the text?
What are the five moral dimensions of the information age mentioned in the text?
Which ethical principle emphasizes making decisions based on what is best for society as a whole?
Which ethical principle emphasizes making decisions based on what is best for society as a whole?
'The Association of Computing Machinery (ACM)' and other professional organizations establish what for their members?
'The Association of Computing Machinery (ACM)' and other professional organizations establish what for their members?
What regulations aim to protect personal information and regulate its use in the digital age?
What regulations aim to protect personal information and regulate its use in the digital age?
Which approach involves developing a small part of the system at a time with subsequent iterations and improvements?
Which approach involves developing a small part of the system at a time with subsequent iterations and improvements?
What is a limitation mentioned for the classic waterfall model in Systems Development Lifecycle (SDLC)?
What is a limitation mentioned for the classic waterfall model in Systems Development Lifecycle (SDLC)?
What is mentioned as a solution to combat content piracy in the text?
What is mentioned as a solution to combat content piracy in the text?
What are some deliverables involved in systems development according to the text?
What are some deliverables involved in systems development according to the text?
What is the main purpose of project planning in software engineering?
What is the main purpose of project planning in software engineering?
Why is it inherently difficult to monitor a Software Engineering project?
Why is it inherently difficult to monitor a Software Engineering project?
What does a project plan need to describe at least?
What does a project plan need to describe at least?
What is the purpose of a software lifecycle model?
What is the purpose of a software lifecycle model?
What does project planning aim to optimize?
What does project planning aim to optimize?
What are the main activities described in a software lifecycle model?
What are the main activities described in a software lifecycle model?
What is a limitation of the waterfall model in Systems Development?
What is a limitation of the waterfall model in Systems Development?
What is the art of scheduling necessary activities in order to optimize various factors in project planning?
What is the art of scheduling necessary activities in order to optimize various factors in project planning?
What do other engineers (e.g. civil, electronic) produce that makes monitoring their projects easier compared to software engineers?
What do other engineers (e.g. civil, electronic) produce that makes monitoring their projects easier compared to software engineers?
What is the purpose of 'Right to be forgotten' in the context of Internet privacy?
What is the purpose of 'Right to be forgotten' in the context of Internet privacy?
What does the Digital Millennium Copyright Act (DMCA) make illegal?
What does the Digital Millennium Copyright Act (DMCA) make illegal?
What is the largest source of Repetitive Stress Injury (RSI) according to the text?
What is the largest source of Repetitive Stress Injury (RSI) according to the text?
Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?
Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?
What is a key function of 'Web beacons' (Web bugs) as described in the text?
What is a key function of 'Web beacons' (Web bugs) as described in the text?
Which phase involves producing design documents, reports, and project meetings in addition to the final information system in Systems Development Lifecycle (SDLC)?
Which phase involves producing design documents, reports, and project meetings in addition to the final information system in Systems Development Lifecycle (SDLC)?
What is a limitation of the waterfall model in large projects?
What is a limitation of the waterfall model in large projects?
What are the five moral dimensions of the information age mentioned in the text?
What are the five moral dimensions of the information age mentioned in the text?
What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?
What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?
What principle emphasizes making decisions based on what is best for society as a whole?
What principle emphasizes making decisions based on what is best for society as a whole?
What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?
What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?
What regulations aim to protect personal information and regulate its use in the digital age?
What regulations aim to protect personal information and regulate its use in the digital age?
What is computer vision syndrome (CVS) related to according to the text?
What is computer vision syndrome (CVS) related to according to the text?
What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?
What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?
What is the largest source of Repetitive Stress Injury (RSI) according to the text?
What is the largest source of Repetitive Stress Injury (RSI) according to the text?
What does the Digital Millennium Copyright Act (DMCA) make illegal?
What does the Digital Millennium Copyright Act (DMCA) make illegal?
'Web beacons' (Web bugs) serve what main purpose on the Internet?
'Web beacons' (Web bugs) serve what main purpose on the Internet?
'Right to be forgotten' in the context of Internet privacy primarily aims to:
'Right to be forgotten' in the context of Internet privacy primarily aims to:
What is the main purpose of cookies on the Internet?
What is the main purpose of cookies on the Internet?
What are some health risks associated with information systems according to the text?
What are some health risks associated with information systems according to the text?
What are the negative social consequences of information systems mentioned in the text?
What are the negative social consequences of information systems mentioned in the text?
What is the purpose of project planning in software engineering?
What is the purpose of project planning in software engineering?
What is a limitation of the classic waterfall model in Systems Development Lifecycle (SDLC)?
What is a limitation of the classic waterfall model in Systems Development Lifecycle (SDLC)?
What are the key components that a project plan must describe?
What are the key components that a project plan must describe?
Why is it inherently difficult to monitor a Software Engineering project?
Why is it inherently difficult to monitor a Software Engineering project?
'The systems development life cycle' is also referred to as:
'The systems development life cycle' is also referred to as:
Flashcards are hidden until you start studying
Study Notes
-
Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.
-
Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.
-
The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.
-
Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.
-
Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
-
Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.
-
Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.
-
The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.
-
Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.
-
Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.
-
Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.
-
The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.
-
Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.
-
Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
-
Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.
-
Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.
-
The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.
-
Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.
-
Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.
-
Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.
-
The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.
-
Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.
-
Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
-
Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.
-
Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.
-
The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.
-
Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.