CGS HW 6
_________ refers to the technology gap that exists between different social and economic classes.
Digital Divide
When companies outsource functions to another country it is referred to as:
Offshoring
_________ occurs when an organization transfers some aspect of their business to a third party.
Outsourcing
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
Piracy
_________ works may be downloaded and used without obtaining permission from anyone.
Public Domain
_________ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.
AI
Honda's _________ robot can perform a variety of activities that require a great deal of balance and range of motion.
ASIMO
Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
Ad-Supported Streaming
Which of the following companies sells and rents movies online?
Amazon
_________ software, such as Tor, will help mask your IP address from websites.
Anonymity
Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?
Can the exposure of this information put the organization's reputation at risk?
A _________ excels when it comes to installing, configuring, and supporting computer systems.
Computer Support Specialist
A _________ license allows an author to set conditions for the free use and distribution of their work.
Creative Commons
Software is sometimes illegally modified in order to disable _________ technologies such as copy protection and authenticity checks.
DRM
A _________ is responsible for configuring, maintaining, and securing an organization's database.
Database Administrator
_________ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.
Do not track
The ability to recognize, understand, and share the feelings of others is known as:
Empathy
_________ is the philosophical study of morality.
Ethics
Many websites have a(n) _________ area that should be checked for common questions and their responses.
FAQ
Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
Fair Use
Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
False
Employers generally restrict or monitor the Internet activity of their employees because the increased use raises the company's ISP rates significantly.
False
The sleep mode on a computer generally saves more electricity than hibernate mode.
False
Online social interactions that exhibit anger and/or insults are known as:
Flaming
Most companies have the need for a _________ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees.
Help Desk
Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?
Hibernate
Which of the following companies offers both free and paid subscription streaming for many TV shows?
Hulu
_________ robots are those that are created to imitate the appearance or capabilities of humans.
Humanoid
_________ are responsible for managing a diverse team of IT professionals and making top-level decisions regarding the purchasing of software and hardware for an organization.
Information Systems Managers
_________, which are products of the mind, can be quite valuable even though they may not always take on a physical form.
Intellectual Property
Superficially, _________ can be defined as the processes used in learning, problem solving, and communication.
Intelligence
It is through _________ that a copyright holder can grant usage or distribution rights to others.
Licensing
Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.
NSA
Which of the following words is NOT part of the green computing model?
Repair
_________ involves improving the ranking of a website when users enter relevant keywords in a search engine.
SEO
Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered _________ by the user community.
Spam
A web developer creates and maintains websites for organizations.
True
Creative works such as books, songs, and photographs are protected by copyright law.
True
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
True
Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.
True
Like many businesses, schools have acceptable use policies (AUPs) to describe the appropriate use of their computers.
True
Many companies are creating a position for social media strategists, who are experts in sales and marketing using the World Wide Web and social media tools.
True
Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.
True
Nothing posted to social media services or anywhere else on the Internet should be considered private.
True
Researchers have discovered ways to make computer chips interact with various areas of the body and brain in order to help those that suffer from conditions such as Parkinson's or blindness.
True
Today's videos games are quite complex and require programming for user interaction, realistic motion and physics, and even intelligent character behavior.
True
Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
True
_________ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
Watson
_________ is the act of alerting the public about harmful activities that are being hidden by an organization.
Whistleblowing
_________ is a global, online organization that offers whistleblowers an anonymous way of posting information and submitting evidence.
WikiLeaks