___ ___ ___ __ (CMMI) are collections of exceptional practices that help companies improve
their techniques. CMMI-DEV is used to evaluate and improve software development
practices
CMMI defines 5 tiers of software improvement maturity:
1. ___
2. ____
three. _____
4. ____ ____
5. _____ - ANS-Capability Maturity Model Integration, preliminary, managed, described,
quantitatively managed, optimizing
___ ___ ___ defines what statistics may be amassed by using authorities companies. It
permits for the tangential collection of U.S. Citizen statistics—even when the ones citizens
are not especially centered. - ANS-Executive Order 12333
___ ___ ___ terminated bulk collection of smartphone metadata - ANS-USA Freedom Act
___ ___ is the diploma to which a software program product meets the desires of its users.
___ ___ specializes in refining the exceptional of the development system and the goods
advanced - ANS-Software exceptional, exceptional management
____ ___ ___ ___ ___ ___ ___ __ ___ __ ____ regulates the interception of wire (phone)
and oral communications (a.Okay.A wiretap act) - ANS-Title III of the Omnibus Crime Control
and Safe Streets Act
_____ _____ is a technique designed to offer guarantee for the effectiveness and
performance of operations, the reliability of economic reporting, and compliance with laws
and guidelines.
The intention of ___ ____ in IT security is to make certain that the ____ of control does now
not exceed the ____ or ____. - ANS-Internal manage, reasonable guarantee, fee, benefits,
risk
_____ - morally proper or incorrect based totally on defined policies, regardless of their
results (primarily based on purpose... Not law)
____ - moves are morally right if they gain the majority
___ ___ - focuses on character (an movement is only proper if it's miles an movement that a
virtuous character could carry out inside the equal situations... Choice is ideal if it focuses on
development of ethical individual + values)
_____ - truths, values, or morality are relative
_____ - whether some thing is good or bad relies upon on its results - ANS-Deontology,
utilitarianism, distinctive feature ethics, relativism, consequentialism
, ____-____ ___ ___ ___ modified the U.S. Patent device from a "first-to-invent" to a
"first-inventor-to report" machine and improved the definition of ___ ___, that's used to
decide the newness of an invention and whether it may be
patented. - ANS-Leahy-Smith America Invents Act, prior art
4 factors to do not forget while determining whether or not or not use of copyrighted
belongings is honest and permissible:
1. ___ and ___ of the use
2. ____ of the copyrighted paintings
3. The portion of the ___ ___ used
four. The ____ of the use at the cost of the copyrighted paintings - ANS-Purpose, man or
woman, nature, copyrighted work, effect
A ___ ___ ___ is a hard and fast of interrelated additives that collects and techniques
records and disseminates the output. - ANS-Business statistics gadget
A organisation offers device studying software that enables judges make decisions in parole
hearings with the aid of assigning all and sundry up for parole a rating estimating the
probability that they will commit some other crime if paroled. The model changed into
educated at the profiles of incarcerated humans and records on whether they were
despatched back to prison after launch. Race become no longer a variable that turned into
included in the training information. However, it was uncovered that the version gave higher
probabilities to participants of certain races. It turned into observed that a proxy variable was
inadvertently covered.Which facts factor inside the incarcerated peoples' profiles turned into
possibly the variable understood by using the device mastering models as a proxy for race?
- ANS-Zip code
A information steward wishes to discover and articulate ways to apply corporate facts to
create aggressive benefits in the marketplace. Customers shared their records for a selected
purpose however have no longer given consent to use the information beyond that.Which
moral principle is the organisation compromising with additional information use? -
ANS-Privacy
A developer creates video video games primarily based on real warfare situations and
designs characters that mimic real human beings from global events. The video game has
content material perceived as excessively violent and rewards gamers who inflict the
maximum harm on other gamers' digital characters. The developer is aware of that those are
simulated acts that depict actual battle scenarios to create an immersive experience for
gamers however is worried approximately the effect on their moral man or woman.Which
ethical concept does this example constitute? - ANS-Virtue
A government contractor is rebuilding a telecommunications network. One of the contractor's
employees discovers that the corporation is taking part in unlawful and unethical acts to
defraud the authorities. The worker considers filing a lawsuit towards the agency on behalf of
the government. Which regulation protects the worker if the lawsuit is filed? - ANS-False
Claims Act