chap 6
___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
Biotechnology
___ refers to the technology gap that exists between different social and economic classes.
Digital divide
Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.
NSA
_______ involves the creation or manipulation of matter at the smallest possible scale.
Nanotechnology
____ occurs when an organization transfers some aspect of their business to a third party.
Outsourcing
____ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
Private
_____ is the process of working for a company without being physically present at the company's office.
Telecommuting
_______ is the act of being annoying and antagonistic in online social interactions.
Trolling
Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
fair use
The term _________ refers to the set of online behaviors that are considered polite and proper.
netiquette
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
piracy
______ is the act of alerting the public about harmful activities that are being hidden by an organization.
Whistleblowing
Software is sometimes illegally modified in order to disable _________ technologies such as copy protection and authenticity checks.
drm
Copyright protection lasts 20 years after the date of publication or release.
f
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
f
he sleep mode on a computer generally saves more electricity than hibernate mode.
f
Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users and what is done with that information.
privacy policy
Creative works such as books, songs, and photographs are protected by copyright law.
t
Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals
t
our public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
t
Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
Ad-supported streaming
_____ occurs when computers or machines can perform the work that was once done by a human.
Automation
are files that record activities and events on a computer.
logs
Many websites have a(n) _________ area that should be checked for common questions and their responses.
FAQ
____ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
Watson
(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
acceptable use policy
Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
t
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
t
Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide
t
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
t