Deck 6: Clarifying Complexity: The Publics Information Resource

Full screen (f)
exit full mode
Question
_________________ occurs when a hacker shuts down a computer and unlocks it only after the owner has paid a fee.

A) Data mining
B) Ransomeware
C) Share ware
D) Computer matching
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following laws created a comprehensive cybersecurity framework?

A) The Real ID Act of 2005
B) The Homeland Security Act of 2002
C) The Intelligence Reform and Terrorist Prevention Act of 2004
D) The Federal Information Security Management Act of 2002
Question
The three-pronged test used to balance employee privacy rights with an employer's right to legitimate information focuses on

A) truth, justice, and equality
B) probable cause, reasonable suspicion, and totality of the circumstances
C) reasonableness, compelling interest, and job relatedness
D) security, necessity, and policy
Question
In 1977, the Supreme Court recognized a constitutionally protected zone of privacy in which of the following cases?

A) Whalen v. Roe
B) Roe v. Wade
C) Griswold v. Connecticut
D) Ayers v. Fordice
Question
The illegal access to computer databases by unauthorized persons is referred to as

A) spamming
B) blogging
C) hacking
D) wiring
Question
____________________ is the coordination and administration of public policies and procedures for information technology, resources, personnel, and systems in the public sector.

A) Infocracy
B) Knowledge management
C) Decision design
D) Program review
Question
The legislation that provides the basis of federal e-gov by directing all agencies to make as much information as possible available electronically is

A) The Fair Credit Reporting Act of 1970
B) The USA Patriot Act of 2001
C) The Financial Services Modernization Act of 1999
D) The Government Paperwork Elimination Act of 1998
Question
Analytical interactive computer-based technologies used to make decisions by addressing the "what if" scenarios are known as

A) management information systems
B) decision support systems
C) data infrastructure systems
D) environment manipulation systems
Question
Which of the following is not one of the key attributes of successful information security measures?

A) measurable
B) clearly defined
C) actionable
D) broadly applicable
Question
Electronic data processing originated in the public sector.
Question
Ninety percent of outside computer breaches into government computers are detected and the offenders prosecuted.
Question
Nearly all counties and cities have their own website and almost thirty percent of those website allow electronic service requests.
Question
Decision support systems convert data into summary information that administrators use to make more informed decisions.
Question
The Internal Revenue Service (IRS) is forbidden, by law, to share its database of federal taxpayers with other federal agencies.
Question
The majority of citizens find e-gov less convenient that face-to-face interactions with government agencies.
Question
What concerns do many Americans have regarding threats to personal privacy as a result of developments in information technology?
Question
What IT methods are local, state, and federal governments using to bring people closer to them?
Question
The public sector has problems of managing information resources that are unique to it. Please discuss the best practices guidelines for information resource management in the public sector.
Question
How has the interaction between public managers and the public information resource changed the nature of public agency decision making and the future of governing?
Question
Why are citizens more likely to like and trust state and local governments in regards to technology than the federal government?
Question
Digital government has a number of benefits for both citizens and public agencies. What are some of the ways in which e-gov has improved government functions?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Clarifying Complexity: The Publics Information Resource
1
_________________ occurs when a hacker shuts down a computer and unlocks it only after the owner has paid a fee.

A) Data mining
B) Ransomeware
C) Share ware
D) Computer matching
B
2
Which of the following laws created a comprehensive cybersecurity framework?

A) The Real ID Act of 2005
B) The Homeland Security Act of 2002
C) The Intelligence Reform and Terrorist Prevention Act of 2004
D) The Federal Information Security Management Act of 2002
D
3
The three-pronged test used to balance employee privacy rights with an employer's right to legitimate information focuses on

A) truth, justice, and equality
B) probable cause, reasonable suspicion, and totality of the circumstances
C) reasonableness, compelling interest, and job relatedness
D) security, necessity, and policy
C
4
In 1977, the Supreme Court recognized a constitutionally protected zone of privacy in which of the following cases?

A) Whalen v. Roe
B) Roe v. Wade
C) Griswold v. Connecticut
D) Ayers v. Fordice
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
The illegal access to computer databases by unauthorized persons is referred to as

A) spamming
B) blogging
C) hacking
D) wiring
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
____________________ is the coordination and administration of public policies and procedures for information technology, resources, personnel, and systems in the public sector.

A) Infocracy
B) Knowledge management
C) Decision design
D) Program review
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
The legislation that provides the basis of federal e-gov by directing all agencies to make as much information as possible available electronically is

A) The Fair Credit Reporting Act of 1970
B) The USA Patriot Act of 2001
C) The Financial Services Modernization Act of 1999
D) The Government Paperwork Elimination Act of 1998
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
Analytical interactive computer-based technologies used to make decisions by addressing the "what if" scenarios are known as

A) management information systems
B) decision support systems
C) data infrastructure systems
D) environment manipulation systems
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not one of the key attributes of successful information security measures?

A) measurable
B) clearly defined
C) actionable
D) broadly applicable
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
Electronic data processing originated in the public sector.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
Ninety percent of outside computer breaches into government computers are detected and the offenders prosecuted.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
Nearly all counties and cities have their own website and almost thirty percent of those website allow electronic service requests.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
Decision support systems convert data into summary information that administrators use to make more informed decisions.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
The Internal Revenue Service (IRS) is forbidden, by law, to share its database of federal taxpayers with other federal agencies.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
The majority of citizens find e-gov less convenient that face-to-face interactions with government agencies.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
What concerns do many Americans have regarding threats to personal privacy as a result of developments in information technology?
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
What IT methods are local, state, and federal governments using to bring people closer to them?
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
The public sector has problems of managing information resources that are unique to it. Please discuss the best practices guidelines for information resource management in the public sector.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
How has the interaction between public managers and the public information resource changed the nature of public agency decision making and the future of governing?
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
Why are citizens more likely to like and trust state and local governments in regards to technology than the federal government?
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
Digital government has a number of benefits for both citizens and public agencies. What are some of the ways in which e-gov has improved government functions?
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.