Sunday, December 29, 2019

Standardized Testing Should Not Be Applied For College

Since the 1800’s standardize testing has been used to evaluate individuals to see how well they are retaining the knowledge being taught or if they possess skills needed to perform the job at hand correctly and accurately. With that being said colleges look at test score from tests such as the ACT or SAT to predict how successful the student will be at the college they are applying for. This comes as a disadvantage at most times and can often lead to misjudgements based on assumptions of one test a student takes. Standardize testing should not be used in the determining factor of whether or not being accepted into college. Applying for college generally starts around the summer of junior year as a high school student. Individual†¦show more content†¦Not only can ACT score make or break your admission but it also impact the amount of scholarship being received. According to Peterson’s staff on its website perterson.com states, â€Å"Test scores are just one of a number of factors that are taken into account when you apply to college. That being said, schools wouldn t ask to see them if they didn t matter. Put some time into getting ready because they will have an impact on the admissions decision†! With looking at standardized test score colleges can not see how well rounded the student is so they must look at other aspects. Another major area that is critical to college applications is an individual’s grade point average (G.P.A.). A G.P.A. is number representing an average of the accumulated grades an individual acquires over time. A G.P.A let’s colleges know that the student was or was not committed to their school work. It also shows the challenging classes and how well a student performed in the harder classes. Not only do college care about academics they also want to make sure individuals maintain a balance of academics and extracurricular activities. Colleges think that it is important that students show they ca n focus on multiple things at once and help the college add more diverse groups and clubs to its campus. College look at so many college applications a year they must set a guideline to what makes people automatically accepted and what disqualifies

Saturday, December 21, 2019

Example Research Critical Discourse Analysis - 9514 Words

18 Critical Discourse Analysis TEUN A. VAN DIJK 0 Introduction: What Is Critical Discourse Analysis? Critical discourse analysis (CDA) is a type of discourse analytical research that primarily studies the way social power abuse, dominance, and inequality are enacted, reproduced, and resisted by text and talk in the social and political context. With such dissident research, critical discourse analysts take explicit position, and thus want to understand, expose, and ultimately resist social inequality. Some of the tenets of CDA can already be found in the critical theory of the Frankfurt School before the Second World War (Agger 1992b; Rasmussen 1996). Its current focus on language and discourse was initiated with the critical†¦show more content†¦1979; van Dijk 1993b). 1 Conceptual and Theoretical Frameworks Since CDA is not a specific direction of research, it does not have a unitary theoretical framework. Within the aims mentioned above, there are many types of CDA, and these may be theoretically and analytically quite diverse. Critical analysis of conversation is very different from an analysis of news reports in the press or of lessons and teaching at school. Yet, given the common perspective and the general aims of CDA, we may also find overall conceptual and theoretical frameworks that are closely related. As suggested, most kinds of CDA will ask questions about the way specific 354 Teun A. van Dijk discourse structures are deployed in the reproduction of social dominance, whether they are part of a conversation or a news report or other genres and contexts. Thus, the typical vocabulary of many scholars in CDA will feature such notions as power, dominance, hegemony, ideology, class, gender, race, discrimination, interests, reproduction, institutions, social structure, and social order, besides the more familiar discourse analytical notions. In this section, I focus on a number of basic conceptsShow MoreRelatedAn Investigation Of Verbal Communication1580 Words   |  7 Pagesmethodologies. The expression ‘Conversation Analysis’ is at this point solidly settled as the name for a specific worldview in the investigation of verbal communication that was started in the 1960s by Harvey Sacks, as a team with Emanuel Schegloff and Gail Jefferson. In Conversation Analysis the attention is on the procedural examination of talk-in-cooperation, how members deliberately sort out their connections to take care of a scope of authoritative issues, for example, the dispersion of turns at talkingRead MoreBlack Masculinity Through The Media923 Words   |  4 PagesThis research will investigate black masculinity through the mass media in the United States of America. The social perception of black men through the media becomes a social understand. Qualitative research develops a deeper understanding on the lived experience of the individual. Qualitative research relays on the experience and the researcher’s interpretation of the experience to created universal un derstand of a social issue. Qualitative method interpreted the visual experience which requiresRead MoreThe Concept Of Abductive Methodology786 Words   |  4 Pagesunderstanding of a phenomena (Chong Ho Yu, 2005), while the logic of induction provides empirical backing to conceptual knowledge (Chong Ho Yu, 2005). â€Å"In other words, abduction, deduction, and induction work together to explore, refine and substantiate research questions† (Chong Ho Yu, 2005). Some philosophers of science such as Popper and Hempel proposed that there is no logic of discovery because discovery relies on creative imagination (As cited in Chong Ho Yu, 2005). Chong Ho Yu (2005) analyzed thatRead MoreData Analysis : Information Analysis859 Words   |  4 PagesData Analysis: As I spent the first week in collecting data, it is time to analyse the collected data in the second week of my professional work placement. Data analysis method is a way to organize and map my collected data in a pattern that could be interpreted (Bell, 2010). It should be able to assist me finding answers for my research question by asking myself, â€Å"Did my data analysis add new concepts and practices about the inclusive education, or open the gate for a more questions? Is it takingRead MoreAn Analysis Of The Calgary Herald1196 Words   |  5 Pages(i) Research Design How can meaningful and revolutionary change be achieved when we keep using the same words to address climate change in the same old ways? The answer lies in study existing forms of communications to uncover how certain messages can be reworked in order to engage the public. The Calgary Herald is the medium that will be studied because Calgary is the largest metropolitan area in the province and it is where the majority of Canada’s oil companies are headquartered. As such, theRead MoreEssay about Research Methodology Report1448 Words   |  6 PagesResearch Methodology Report My themed research project will centre its focus upon the link between Riot Grrrl and its relation to Third-Wave Feminism. Primarily I aim to analyse Riot Grrrl’s music scene, but also its subculture mentioning its DIY punk ethic, political activism and most importantly its influential Zine network. However the purpose of this report is to demonstrate a grounded understanding in three research methodologies and how I will apply each one in regards to my own projectRead MoreAnalysis Of Alison Lester s 2009-2010 Book Series1312 Words   |  6 PagesResearch question: Using an analysis of Alison Lester’s 2007-2008 book series, Bonnie and Sam, it is the aim to investigate if representations continue to construct and naturalise ‘traditionally acceptable models of gender’ in contemporary Australian children’s literature. Research background: Since the 1970s, there has been a significant increasing in academic interest surrounding gender in children’s literature. Peter Hunt (2009) argues literature has gained academic focus as society comes toRead MoreThe Department of Psychology at State University1668 Words   |  7 Pagesdepartment of State University is considered an academic discourse community. They have a stated purpose, requirements for membership, and exercise intercommunication techniques. Furthermore, they have shared common knowledge that they use to advance their discipline and attract new members. Eleanor Kutz, a leading expert in the field of language and literacy, argues that academic discourse communities differ from informal ones in the critical area of assumed shared knowledge. She states, â€Å"buildingRead MoreOrganizational Issues In Criminal Justice1009 Words   |  5 Pagesaddressing justice issues would be to strive for more adequate research; that is, to conduct studies which are not only methodologically sound, but also operationally comparable. At this present time, there is a great need for critical scholarship, research and learning models within the field of administration of justice to bring forth issues that are normally not visible such as white collar crime. This research critically explores discourse in justice-related literature and verbal contexts to increaseRead MoreOne of the Main Divisions Between Mainstream and Critical Social Psychology Is That of the Methods Adopted. Discuss with Reference to the Cognitive Social and at Least One Other Social Psychological Perspective.1698 Words   |  7 Pagesmainstream and critical social psychology is that of the methods adopted. Discuss with reference to the cognitive social and at least one other social psychological perspective. Social psychology has existed for about 100 years, before which psychology was a branch of philosophy. Social psychology studies individuals in their social contexts. It is a diverse discipline made up of many theoretical perspectives and variety of different methods are used in social psychological research. This assignment

Friday, December 13, 2019

Midterm for Information System Free Essays

string(68) " internal information as well as information from external sources\." MIS EXAM – QUESTIONS 1) Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes. Answer: True False 2) A fully digital firm produces only digital goods or services. Answer: True False 3) A business model describes how a company produces, delivers, and sells a product or service to create wealth. We will write a custom essay sample on Midterm for Information System or any similar topic only for you Order Now Answer: True False 4) Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed. Answer: True False 5) Computers are only part of an information system. Answer: True False 6) The dimensions of information systems are management, organizations, and information technology. Answer: True False 7) In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company. Answer: True False 8) Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization. Answer: True False ) A substantial part of management responsibility is creative work driven by new knowledge and information. Answer: True False 10) Intranets allow firms to work easily with third-party suppliers and vendors. Answer: True False 11) An IT infrastructure provides the platform on which the firm can build its information systems. Answer: True False 12) The six important business objectives of information technology are new products, services, and business models; custo mer and supplier intimacy; survival; competitive advantage; operational excellence; and A) improved flexibility. B) improved decision making. C) improved business practices. D) improved efficiency. Answer: B 13) Which of the following choices may lead to competitive advantage: (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 Answer: D 14) The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective? A) improved efficiency B) customer and supplier intimacy C) survival D) competitive advantage Answer: C 15) The three activities in an information system that produce the information organizations use to control operations are A) information retrieval, research, and analysis. B) input, output, and feedback. C) input, processing, and output. D) data analysis, processing, and feedback. Answer: C 16) Output A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used. Answer: D 17) Converting raw data into a more meaningful form is called A) capturing. B) processing. C) organizing. D) feedback. Answer: B 18) The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company’s members is called its A) culture. B) environment. C) atmosphere. D) values. Answer: A 19) The hardware and software used to transfer data in an organization is called A) data management technology. B) networking and data management technology. C) data and telecommunications technology. D) networking and telecommunications technology. Answer: D 20) Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization’s A) data management environment. B) networked environment. C) IT infrastructure. D) information system. Answer: C 21) From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called A) the information value chain. B) the IT value chain. C) information processing. D) feedback. Answer: A 22) The costs for firms operating on a global scale have been drastically reduced by A) networking technology. B) investments in organizational complementary assets. C) the Internet. D) the rise of digital content. Answer: C 23) Which of the following are key corporate assets? A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm’s tangible assets, such as goods or services D) time and knowledge Answer: A 25) Overproduction or underproduction of goods and services, misallocation of resources, and poor response times are the results of a firm’s having A) poor relationships with suppliers. B) poor relationships with customers. C) inadequate information. D) a surplus of information. Answer: C 25) A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? A) customer intimacy B) operational excellence C) survival D) improved reporting Answer: C 6) Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information. Answer: True False 27) You would use an MIS to help decide whether to introduce a new product line. Answer: True False 28) Transaction processing systems are most commonly used by the senior management level of an organization. Answer: True False 29) A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business. Answer: True False 0) Management information systems typically support nonroutine decision making. Answer: True False 31) Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems. Answer: True False 32) Managers need TPSs to monitor the status of internal operations and the firm’s relations with the external environment. Answer: True False 33) Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance. Answer: True False 34) Decision-support systems use internal information as well as information from external sources. You read "Midterm for Information System" in category "Papers" Answer: True False 35) ESSs are designed to serve the middle management of the organization. Answer: True False 36) ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS. Answer: True False 37) Enterprise systems often include transactions with customers and vendors. Answer: True False 38) Supply chain management systems are more externally oriented than enterprise systems. Answer: True False 39) Which of the following is an example of a cross-functional business process? A) identifying customers B) creating a new product C) assembling a product D) paying creditors Answer: B 40) Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? A) ESS B) TPS C) MIS D) DSS Answer: B 41) To monitor the status of internal operations and the firm’s relations with the external environment, managers need ________ systems. A) decision-support B) knowledge C) transaction processing D) management information Answer: C 2) Which systems are typically a major source of data for other systems? A) transaction processing systems B) management information systems C) executive support systems D) decision-support systems Answer: A 43) Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time? A) ESS B) TPS C) MIS D) DSS Answer: C 44) A relocation control syst em that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of A) knowledge management systems. B) transaction processing systems. C) executive support systems. D) management information systems. Answer: D 45) The term â€Å"management information systems† designates a specific category of information systems serving A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) middle management functions. Answer: D 46) Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system ? A) MIS B) TPS C) ESS D) DSS Answer: D 47)________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance. A) Management information B) Transaction processing C) Decision-support D) Knowledge management Answer: C 48) Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) DSS Answer: D 49) ESS are specifically designed to serve which level of the organization? A) operational B) end-user C) middle management D) senior management Answer: D 50) Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision-making and administrative activities of middle managers. D) day-to-day processes of production. Answer: A 51) Which type of system would you use to determine what trends in your supplier’s industry will affect your firm the most in five years? A) ESS B) TPS C) MIS D) DSS Answer: A 52) What is the most important function of an enterprise application? A) increasing speed of communicating B) enabling business functions and departments to share information C) enabling a company to work collaboratively with customers and suppliers D) enabling cost-effective e-business processes Answer: B 53) ________ are designed to support organization-wide process coordination and integration. A) Decision-support systems B) Management information systems C) CRM systems D) Enterprise applications Answer: D 54) Enterprise systems are also known as ________ systems. A) resource planning B) enterprise resource planning C) enterprise support D)management information Answer: B 55) ________ systems are designed to help firms manage their relationships with their customers. A) CRM B) MIS C) CLE D) CLU Answer: A 56) Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making? A) TPS B) extranets C) KMS D) CRM Answer: C 57) Which of the following types of system helps expedite the flow of information between the firm and its suppliers and customers? A) intranet B) extranet C) KMS D) TPS Answer: B 8) Which of the following is not one of the fifteen categories of collaborative software tools? A) file sharing B) event scheduling C) white boarding D) extranets Answer: D 59) You work for a highly successful advertiser that is just about to expand nationally. Of utmost importance will be finding a way to store and disseminate their clients’ continually updated branding guides, which include multiple image files and text documents, to all of the firm’s branches. What system will best serve these needs? A) an intranet with KMS capabilities B) an extranet with KMS capabilities C) a TPS with KMS capabilities D) a CRM Answer: B 60) You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor’s information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities Answer: C 1) The interaction between information systems and organizations is influenced A) primarily by the decision making of middle- and senior-managers. B) by many factors, including structure, politics, culture, and environment. C) by two main microeconomic forces: capital and labor. D) primarily by the organization’s business processes and culture. Answer: B 62) An organization is a A) stable, formal social structure that takes resources from the environment and processes them to produce outputs. B) formal, legal entity with internal rules and procedures that must abide by laws. C) collection of social elements. D) B and C E) A, B, and C Answer: E 63) How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm? A) It sees information systems as a way to rearrange the inputs and outputs of the organization. B) It sees capital and labor as primary production factors. C) It sees the inputs and outputs, labor and capital, as being infinitely malleable. D) It sees the organization as a social structure similar to a machine. Answer: C 64) All of the following are major features of organizations that impact the use of information systems EXCEPT for A) business processes B) environments C) goals D) agency costs Answer: D 65) Business processes are collections of A) informal practices and behaviors. B) formalized and documented practices. C) routines. D) rights and privileges. Answer: C 66) The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as A) switching costs. B) transaction costs. C) procurement. D) agency costs. Answer: B 67) Which of the following statements is NOT true about information technology’s impacts on business firms? A) It helps firms expand in size. B) It helps firms lower the cost of market participation. C) It helps reduce internal management costs. D) It helps reduce transaction costs. Answer: A 68) According to agency theory, the firm is viewed as a(n) A) unified, profit-maximizing entity. B) task force organization that must respond to rapidly changing environments. C) entrepreneurial endeavor. D) â€Å"nexus of contracts† among self-interested individuals. Answer: D 69) The ________ model is used to describe the interaction of external forces that affect an organization’s strategy and ability to compete. A) network economics B) competitive forces C) competitive advantage D) demand control Answer: B 70) Which of the following industries has a low barrier to entry? A) automotive B) computer chip C) restaurant D) airline Answer: C 71) Which of the following is NOT one of the competitive forces? A) suppliers B) other competitors C) external environment D) customers Answer: C 72) A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force. A) product differentiation B) traditional competitors C) low number of suppliers D) new market entrants Answer: D 3) A firm can exercise greater control over its suppliers by having A) more suppliers. B) fewer suppliers. C) global suppliers. D) local suppliers. Answer: A 74) The four major types of competitive strategy are A) low-cost leadership; substitute products and services; customers; and suppliers. B) low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy. C) new market entrants; substitute products and services; customers; and suppliers. D) low-cost leadership; new market entrants; product differentiation; and focus on market niche. Answer: B 75) When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A) product differentiation B) market niche C) mass customization D) process efficiency Answer: B 76) ________ is the ability to offer individually tailored products or services using the same production resources as bulk production. A) Mass customization B) Size customization C) Magnitude customization D) Dimension customization Answer: A 77) Hilton Hotels’ use of customer information software to identify the most rofitable customers to direct services to is an example of using information systems to A) strengthen customer intimacy. B) differentiate their service. C) focus on market niche. D) increase efficiency. Answer: C 78) An information system can enable a company to focus on a market niche through A) complex trend forecasting. B) tailoring products to the client. C) intensive product trend analysis. D) intensive custo mer data analysis. Answer: D 79) Upon which of the following industries has the Internet as a whole been a disruptive technology? A) bill payments B) air travel C) books D) real estate Answer: B 80) Internet technology A) makes it easy for rivals to compete on price alone. B) imposes a significant cost of entry, due to infrastructure requirements. C) increases the difference between competitors because of the wide availability of information. D) makes it easy to sustain operational advantages. Answer: A 81) The Internet raises the bargaining power of customers by A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs. Answer: C 82) A virtual company A) uses the capabilities of other companies without being physically tied to those companies. B) uses Internet technology to maintain a virtual storefront. C) uses Internet technology to maintain a networked community of users. D) provides entirely Internet-driven services, or virtual products. Answer: A 83) The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) ________. A) advances in wireless networking B) international standards for data protection C) networking advances and the Internet D) increased ease in file sharing and copying Answer: C 84) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling. B) phishing. C) spamming. D) targeting. Answer: A 85) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as A) responsibility. B) accountability. C) liability. D) due process. Answer: A 6) The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as A) accountability. B) responsibility. C) due process. D) liability. Answer: D 87) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called A) due process. B) accountability . C) the courts of appeal. D) the judicial system. Answer: B 88) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) Assign responsibility. B) Identify the stakeholders. C) Identify the options you can reasonably take. D) Identify and clearly describe the facts. Answer: A 89) The ethical â€Å"no free lunch† rule states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) everything is owned by someone else, and that the creator wants compensation for this work. Answer: D 0) European privacy protection is ________ than in the United States. A) less far-reaching B) less liable to laws C) much less stringent D) much more stringent Answer: D 91) The Internet has made the protection of intellectual property A) more difficult, because of the lack of enforcable regulations. B) easier, because of the proliferation of creative and professional software. C) more difficult, because of the ease of copying and transmitting digitized media. D) easier, because of the ability to track user behavior and visits to Web sites and file-sharing services. Answer: C 92) When a cookie is created during a Web site visit, it is stored A) on the Web site computer. B) on the visitor’s computer. C) on the ISP’s computer. D) in a Web directory. Answer: B 93) The Online Privacy Alliance A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with Web sites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. Answer: A 4) Intellectual property can best be described as A) intangible property created by individuals or corporations. B) the expression of an intangible idea. C) unique creative work or ideas. D) tangible or intangible property created from a unique idea. Answer: A 95) A limitation of trade secret protection for software is that A) it does not protect against copying the underlying ideas behind the software. B) it is difficult to compare one piece of software to anothe r. C) it is difficult to prevent the ideas in the work from falling into the public domain. D) few software programs contain truly unique elements. Answer: C 96) The strength of patent protection is that it A) puts the strength of law behind copyright. B) allows protection from Internet theft of ideas put forth publicly. C) is easy to define. D) grants a monopoly on underlying concepts and ideas. Answer: D 97) One of the difficulties of patent protection is A) that only the underlying ideas are protected. B) digital media cannot be patented. C) preventing the ideas from falling into public domain. D) the years of waiting to receive it. Answer: D 8) In general, it is very difficult to hold software producers liable for their software products when those products are considered to be A) part of a machine. B) similar to books. C) services. D) artistic expressions. Answer: B 99) The most common source of business system failure is A) software bugs. B) software errors. C) hardware or facilities failures. D) data quality. Answer: D 100) Two of the three principal sources of poor system performance are A) software bugs and errors and outdated standards. B) hardware or facility failures and malware. C) hardware or facility failures and poor input data quality. D) poor input data quality and insufficient integration with legacy systems. Answer: C 101) The practice of spamming has been growing because A) telephone solicitation is no longer legal. B) it is good advertising practice and brings in many new customers. C) it helps pay for the Internet. D) it is so inexpensive and can reach so many people. Answer: D 102) Which of the five moral dimensions of the information age does spamming raise? A) quality of life B) system quality C) accountability and control D) information rights and obligations Answer: A How to cite Midterm for Information System, Papers