Final test de computacion parte 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Copyright protection lasts for ___ years after the death of the author.

70

___ robots are those that are created to imitate the appearance or capabilities of humans.

Humanoid

Which of the following statements about recycling and reducing waste is FALSE?

Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based system

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee.

logs

Which of the following statements regarding employee monitoring is FALSE?

most types of employee monitoring and internet restrictions at the workplace are illegal

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:

piracy

Which browser feature will delete your history, cache, and cookies the moment you close the special window?

private browsing

___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems

software engineers

An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as:

Neutral network

The ___ mode on a computer will place it in a low-power state when it is not being used.

Sleep

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

Acceptable use policy

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:

Automation

The use of living organisms to manufacture new products or improve existing ones is called:

Biotechnology

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?

Copyright

___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.

Cyberbullying

___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks.

DRM

Which of the following terms refers to the technology gap between different social and economic classes?

Digital divide

___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.

Ethics

The ___ of a website or forum contains common questions and their responses.

FAQ

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?

Fair use

Which of the following is a government agency that has the capability to monitor the internet and mobile activities of individuals?

NSA

The creation or manipulation of matter at the smallest possible scale is known as:

Nanotechnology

Today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe.

Online

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party.

Outsourcing

Which of the follows companies does NOT offer digital movie rentals?

Pandora

Which of the following is used by many online companies to describe what information is collected from users and what is done with that information?

Privacy policy

For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them.

Prosthetics

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company.

Telecommuting

Which entity passed the GDPR, which forces online companies to adhere to a list of guidelines related to the collection, use, storage, and removal of personal data?

The European Union

One popular test of a machine's ability to think is known as the ___ test.

Turing

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account

Two-factor authentication

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

VPA

Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information?

Watson

The act of alerting the public about harmful activities that are being hidden by an organization is called:

Whistleblowing

There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?

Who you know

Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used.

attribution

Most of the ____ responsibilities are carried out by private companies, such as when YouTube removed a video that violates their terms of service.

censorship


Conjuntos de estudio relacionados

Sexual Assault Prevention for Undergraduates

View Set

Human Resource Management (Chapter 2)

View Set

Langenscheidt Grund- und Aufbauwortschatz Englisch

View Set