How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Bizhelp Your Own Question

Bizhelp
Bizhelp, CPA
Category: Homework
Satisfied Customers: 5884
Experience:  Bachelors Degree and CPA with Accounting work experience
23848519
Type Your Homework Question Here...
Bizhelp is online now
A new question is answered every 9 seconds

For jk cpa Tonight 11:30 PM EST

This answer was rated:

1. The introduction of new information technology has a: (Points: 5)


        dampening effect on the discourse of business ethics.


        ripple effect raising new ethical, social, and political issues.


        beneficial effect for society as a whole, while raising dilemmas for consumers.


        waterfall effect in raising ever more complex ethical issues.


 


 


2. A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? (Points: 5)


        Kant's Categorical Imperative


        The Golden Rule


        The Risk Aversion Principle


        The "No free lunch" rule


 


 


3. A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is: (Points: 5)


        acceptable, because the grocer suffers the least harm.


        acceptable, because the higher value is the survival of the family.


        wrong, because the man would not want the grocery to steal from him.


        wrong, because if everyone were to do this, the concept of personal property is defeated.


 


 


4. The ethical "no free lunch" rule states that: (Points: 5)


        if an action cannot be taken repeatedly, then it is not right to be taken at any time.


        one should take the action that produces the least harm or incurs the least cost.


        one can put values in rank order and understand the consequences of various courses of action.


        everything is owned by someone else, and that the creator wants compensation for this work.


 


 


5. Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? (Points: 5)


        Privacy Act of 1974


        Gramm-Leach-Bliley Act of 1999


        Freedom of Information Act


        HIPAA of 1996


 


 


6. FIP principles are based on the notion of the: (Points: 5)


        accountability of the record holder.


        responsibility of the record holder.


        mutuality of interest between the record holder and the individual.


        privacy of the individual.


 


 


7. The Federal Trade Commission FIP principle of Notice/Awareness states that: (Points: 5)


        customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.


        data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.


        there is a mechanism in place to enforce FIP principles.


        Web sites must disclose their information practices before collecting data.


 


 


8. Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? (Points: 5)


        HIPAA


        Gramm-Leach-Bliley Act


        Privacy Protection Act


        Freedom of Information Act


 


 


9. European privacy protection is __________ than in the United States. (Points: 5)


        less far-reaching


        less liable to laws


        much less stringent


        much more stringent


 


 


10. The "do anything anywhere" computing environment can: (Points: 5)


        make work environments much more pleasant.


        create economies of efficiency.


        centralize power at corporate headquarters.


        blur the traditional boundaries between work and family time.


 


 


11. Today's nanotechnology-produced computer transistors are roughly equivalent in size to: (Points: 5)


        the width of a fingernail.


        a human hair.


        a virus.


        an atom.


 


 


12. Specifications that establish the compatibility of products and the ability to communicate in a network are called: (Points: 5)


        network standards.


        telecommunications standards.


        technology standards.


        Internet standards.


 


 


13. __________ unleash powerful economies of scale and result in declines in manufactured computer products. (Points: 5)


        Internet and web technologies


        Technology standards


        Linux and open-source software


        Client/server technologies


 


 


14. Software that manages the resources of the computer is called: (Points: 5)


        operating system software.


        application software.


        data management software.


        network software.


 


 


15. A SAN is a __________ network. (Points: 5)


        server area


        storage area


        scalable architecture


        service-oriented architecture


 


 


16. As referred to in the text, legacy systems are: (Points: 5)


        traditional mainframe-based business information systems.


        electronic spreadsheets used on a PC.


        any pre-1990 Wintel systems.


        systems found on older ASPs.


 


 


17. Legacy systems are still used because they: (Points: 5)


        can only be run on the older mainframe computers.


        are too expensive to redesign.


        integrate well using new Web services technologies.


        contain valuable data that would be lost during redesign.


 


 


18. Software applications that are based on combining different online software applications are called: (Points: 5)


        integrated software.


        Ajax.


        mashups.


        virtual software.


 


 


19. The practice of contracting custom software development to an outside firm is commonly referred to as: (Points: 5)


        outsourcing.


        scaling.


        service-oriented architecture.


        application integration.


 


 


20. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? (Points: 5)


        Modality


        Scalability


        Expandability


        Disintermediation

THIS ANSWER IS LOCKED!

You need to spend $3 to view this post. Add Funds to your account and buy credits.
Bizhelp and other Homework Specialists are ready to help you