JPO Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

The field of collecting evidence from computer files and disks is called cybersecurity.

False

The main reason employers have a policy that employees may not install any software on their work computers other than what the employer provides is to save space.

False

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

Honey Pots

In the context of privacy issues, personal information includes any information relating to, or traceable to, an individual person.

True

It's usual for entrepreneurs to work a lot of extra hours to make their businesses successful.

True

Nowadays, operating systems for smartphones, tablets, and some computers have kill switches.

True

Prosecutors dropped charges against the person reponsible for releasing the ILOVEYOU virus in 2000 because the Philippines had no law against releasing a virus at that time.

True

Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.

True

Secondary Use is the use of personal information for a purpose other than the one for which the person supplied it.

True

Skimmers can be installed inside card readers in stores, gas stations, and restaurants to collect debit card numbers.

True

The Communications Decency Act (CDA) of 1996 was found to be unconstitutional due to conflicts with the first amendment.

True

The Electronic Communication Privacy Act (ECPA) does not restrict corporations from reading employees email on company systems.

True

The protection of criminal and antisocial activities, fraud, harassment, and extortion are examples of negative uses of anonymity.

True

Therac-25 - A computerized machine that gave lethal radiation overdoses to some cancer patients.

True

U.S. v. Jones was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.

True

One of the reasons for the delay in the Denver baggage system was insufficient time for development and testing.

True. The time allowed for development and testing of the system was insufficient. Denver made significant changes in specifications after the project began.

If a business follows an "opt-in" policy for handling personal data, information about a customer

may not be released unless the customer gives permission. Under an opt-in policy, the collector of the information may not use it for certain secondary uses unless the person explicitly checks or clicks a box or signs a form permitting the use.

How can you increase your business and entrepreneurial potential? (Select all that apply)

-Business Knowledge -Financial Skills. -Career Exploration. -Community Awareness -Education -Relationships

The freedom of speech guidelines that are used in court to help determine if a censorship law is constitutional include all of the following

-Distinguish speech from action. Advocating illegal acts is (usually) legal. -Laws must not chill expression of legal speech. -Do not reduce adults to reading only what is fit for children. -Solve speech problems by the least restrictive means.

Which of the following reflects the impact that computing technology has on employment?

-Job Destruction and Creation -Changing Skills and Skill Levels

Which of these are factors related to computer system errors?

-Overconfidence -Reuse of software:

From the list, select all people that are known to be entrepreneurs.

-Thomas Edison -P.T. Barnum -Wlliam Harley & Arthur Davidson -Maggie Lena Walker -Ingvar Kamprad -Stephen Wozniak and Steve Jobs -Russell Simmons -Dinah Mohajer

Fair use

1. The purpose and nature of the use, for example, whether it is for commercial or educational purposes (commercial use is less likely to be fair use) or whether it transforms the copied work to something new or simply reproduces it. 2. The nature of the copyrighted work. (Use of creative work, such as a novel, is less likely than use of factual work to be fair use.) 3. The size and significance of the portion used. 4. The effect of the use on the potential market for or value of the copyrighted work. (Uses that reduce sales of the original work are less likely to be considered fair.)

When was the first U.S. copyright law passed?

1790

When a government action or law causes people to avoid legal speech and publication out of fear of prosecution.

Chilling effect

What is self-assessment?

Evaluating your strengths and weaknesses— is an important part of becoming an entrepreneur.

Changes in technology do not have any impact in society.

False

"Net Neutrality" refers to the development of similar laws related to the internet in different countries.

False. "Net neutrality" refers to a variety of proposals for restrictions on how telecommunications companies interact with their broadband customers.

Independeny verification and validation (IV&V) means that the software developers test their own system for errors.

False. An independent company tests and validates the software

The crash of American Airlines flight 965 near Cali, Colombia was caused by a problem with the engine.

False. It was the inconsistent and unclear interface.

Napster was not responsible for copyright infringement because it did not keep copies of songs on its computers.

False. Napster did not take sufficient steps to eliminate unauthorized songs or users who committed violations.

The supreme court ruled that The Children's Internet Protection Act of 2000 (CIPA) violates the first amendment due to the installation of filtering software.

False. The Supreme Court ruled that CIPA does not violate the First Amendment.

Based on a California Law, in 2011, the supreme court was successful in banning the sale or rental of violent video games to minors because of the impact these games could have on children.

False. The Supreme Court ruled that the law violated the First Amendment

Under the concept of copyleft, a programmer who develops a new program from a copylefted work can add restrictions that limit its use.

False. Under copyleft, the developer copyrights the program and releases it under an agreement that allows people to use, modify, and distribute it, or any program developed from it, but only if they apply the same agreement to the new work.

An attitude is a natural ability to do a particular type of work or activity well.

False. An attitude is a way of viewing or thinking about something that affects how you feel about it.

Telemedicine refers to the video broadcast of medical procedures for educational purposes.

False. Telemedicine, or long-distance medicine, refers to remote performance of medical exams, consultations, monitoring, analyses, and procedures using specialized equipment and computer networks.

Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?

Profit from the work.

When an entrepreneur starts a new business, risk is involved. What is risk?

Risk is the chance of losing something.

From an employer's perspective, the most serious risk for using personal accounts or personal devices for work is:

Security.

What is an Entrepreneur?

Someone who creates and runs a business.

Which of the following is not a factor specified in U.S. copyright law for determining fair use?

The for-profit or non-profit status of the copyright holder

Offshoring

The practice of hiring companies or employees in other countries is known as:

Biometrics

They include fingerprints, voice prints, face structure, hand geometry, eye (iris or retina) patterns, and DNA.

The Communications Assistance for Law Enforcement Act (CALEA) said that

This law requires that the design of telecommunications equipment ensure that the government can intercept telephone calls (with a court order or other authorization).

64% of business owners had some college education then they started their business

True

According to a survey by the U.S. Census Bureau, slightly more than half of the business owners who had employees work overtime (more than 40 hours a week).

True

An attitude is a way of viewing or thinking about something that affects how you feel about it. Entrepreneurs tend to be people with positive attitudes

True

Digital Rights Management (DRM) technologies are a collection of techniques that control access to and uses of intellectual property in digital formats.

True

E-Verify is a system that uses data from the Social Security Administration and the Department of Homeland Security to check on a job applicant's legal status.

True

Ethics is the study of what it means to "do the right thing"

True

Hacktivism is the use of hacking to promote a political cause.

True

Socialbot

________________ is an artificial intelligence program that simulates a human being in a social media.

Telecommuting

__________________ means to work for an employer at a computer-equipped space in the employee's home.

In the early days (1960's to the early 1970's), a "hacker" was:

a creative programmer who wrote very elegant and clever programs

Which of the following limits deceptive commercial email and outlines spammer's responsibilities:

the CAN-SPAM Act


Conjuntos de estudio relacionados

TCI Social Studies Chapter 21 [Lesson Game, Definitions, and Learning Targets]

View Set

Microbiology Quiz 1 prep, chapter 1

View Set

World History Semester One Finals

View Set

MGT 301 CH 37 Administrative Law

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

(Ch. 11-22) From Colonies to Country, 1735-1791

View Set

CHAPTER 15 - FEMALE REPRODUCTIVE, MATERNITY & NEWBORNS

View Set