CGS CHAPTER 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

footprints

Digital ______________ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.

true

Ethics involves a rational analysis of the coluntary, moral choices that individuals make.

true

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.

false

In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.

piracy

In the world of computing, _________ means aquiring or exchanging copies of protected digital creations without payment or permission from their creator.

licensing

Is it through _______ that a copyright holder can grant usage or distribution rights to others.

false

The sleep mode on a computer generally saves more electricity than hibernate mode.

netiquette

The term _________ refers to the set of online behaviors that are considered polite and proper.

Ad-supported streaming

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

Nanotechnology

___ involves the creation or manipulation of matter at the smallest possible scale.

Private browsing

___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Biotechnology

___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

acceptable use policy

A(n) ____ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

fair use

Copyright law contains an exception known as ________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

false

Copyright protection lasts 20 years after the date of publication or release.

true

Creative works such as books, songs, and photographs are protected by copyright law.

NSA (National Security Agency)

Many government agencies; such as the ___, monitor the Internet and mobile activities of individuals all over the world.

FAQ (Frequently asked Questions)

Many websites have a(n) ___ area that should be checked for common questions and their responses.

true

Most Creative Commons licneses require, at a minimum, that the user provide attribution to the author wherever the work is used.

false

Most experts recommend that companies monitor their employeed secretly in order to prevent workers from curcumventing the technologies used to track them.

privacy policy

Online companies typically have a(n) ____________ on their websites that clearly state what information is collected from users and what is done with that information.

DRM

Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.

Repair

Which of the following words is NOT part of the green computing model?

true

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.

Logs

___ are files that record activities and events on a computer.

Whistleblowing

___ is the act of alerting the public about harmful activities that are being hidden by an organization.

Ai

______ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans

Digital divide

_______ refers to the technology gap that exists between social and economic classes.

Watson

__________ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Trolling

__________ is the act of being annoying and antagonistic in online social interactions.

Outsourcing

__________ occurs when an organization transfers some aspect of their business to a third party.

Telecommuting

______________ is the proccess of working for a company without being physically present at the company's office.

Automation

_________occurs when computers or machines can perform the work that was once done by a human.


Conjuntos de estudio relacionados

Chapter 12 - Managing Inventories in Supply Chains

View Set

ACCY 501 Internal Audit Flint Test 1

View Set

CHAPTER 12: TRANSPORT ACROSS CELL MEMBRANES

View Set

EQUINE AND LARGE ANIMAL RADIOGRAPHY CH 24.

View Set

Christianity - Jesus of Nazareth

View Set

Unit 17: Alternative Investments and Other Assets

View Set