Computer Science- Chapter 6
quantum
A _________ computer can represent data in states beyond the two bits (0's and 1's) of today.
software engineer
A _________ is responsible for the development of computer software.
False
Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
fair use
Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
false
Copyright protection lasts 20 years after the date of publication or release.
true
Employees who engage in telecommuting may find themselves working more hours, especially if their supervisor feels as if they are always "on the clock."
true
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
Dashboard
Google allows users to view and control all their data with a tool known as:
true
Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.
FISA
Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.
paperless
Many companies and individuals are going _________, which means they are using technology to lower their consumption and reliance on paper.
true
Many employees, from fast-food workers to corporate executives, have been fired for something they posted online because it made their company look negative or careless in the eyes of the public.
NSA
Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.
true
Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.
FAQ
Many websites have a(n) _________ area that should be checked for common questions and their responses.
false
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
true
Nothing posted to social media services or anywhere else on the Internet should be considered private.
false
Repeated hostile behavior with intent to psychological harm another individual is known as cyberterrorism.
offshoring
When companies outsource functions to another country it is referred to as:
Can the exposure of this information put the organization's reputation at risk?
Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?
Turing test
Which of the following is a popular test of a system's ability to think?
footprints
You and your devices usually leave digital _________, which is a trail of your data, activity, and even the locations where devices are used.
true
Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
SEO
_________ involves improving the ranking of a website when users enter relevant keywords in a search engine.
Nanotechnology
_________ involves the creation or manipulation of matter at the smallest possible scale.