Technology At Your Service Chapter 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

Copyright protection lasts for ___ years after the death of the author. 10 70 50 20

70

frequently asked questions (FAQ)

A list of common questions and their responses on a website.

information systems manager

A person responsible for managing a diverse team of IT professionals that include programmers, network administrators, and many others.

humanoid robot

A robot that is created to imitate the appearance or capabilities of humans.

authentication

A security measure used to confirm an individual's identity.

digital footprints

A trail of your data, activity, and the locations where devices are used.

__________ involves the development of intelligent systems. AI (artificial intelligence) DRM (digital rights management) SEO (search engine optimization) DBA (database administrator)

AI (artificial intelligence)

__________ occurs when computers or machines can perform the work that was once done by a human. Automation Outsourcing Offshoring Green computing

Automation

attribution

Credit to the author of a work wherever it is used.

The ___ of a website or forum contains common questions and their responses. netiquette FAQ acceptable use policy thread

FAQ

Many websites have __________ areas that should be checked for common questions and their responses. DRM (digital rights management) AUP (acceptable use policy) SEO (search engine optimization) FAQ (frequently asked questions)

FAQ (frequently asked questions)

Copyright protection lasts for approximately 15 years after the author applies for it. True False

False

For a computer, "sleep" mode uses less electricity than "hibernate" mode. True False

False

It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with. True False

False

Is it legal for a company to monitor employees while they work? Is it ethical? Defend your answers.

Legal, yes. Various court cases have demonstrated that employers are generally within their rights to restrict Internet access at work and monitor employee use of the company's computing resources. Ethical, no. Everyone generally agrees about one aspect of monitoring: Employers should always inform employees about what kind of monitoring the company will engage in. This shows respect for the employee's privacy because no one will be caught off guard by monitoring devices.

Which of the following fields involves the creation or manipulation of matter at the smallest possible scale? Biotechnology Nanotechnology Artificial intelligence Robotics

Nanotechnology

flaming

Online social interactions that exhibit anger and/or insults.

Which of the following companies does NOT offer digital movie rentals? Amazon Vudu Apple Pandora

Pandora

__________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser. Do not track Intellectual property Green computing Private browsing

Private browsing

intellectual property

Products of the mind, such as ideas, designs, and expressions of creativity, that may not have any physical form.

___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems. Software engineers Network engineers Computer support specialists Data analysts

Software engineers

Describe at least three ways in which you can recycle and reduce computing-related waste.

Some local and international programs collect old computers to be refurbished and redistributed to individuals or schools that do not have access to computers. Those centers can resell working parts and strip gold or other useful metals from components for recycling. One of the most significant activities that helps reduce waste is going paperless.

digital rights management (DRM)

Technologies used to protect copyrighted material.

Which entity passed the GDPR, which forces online companies to adhere to a list of guidelines related to the collection, use, storage, and removal of personal data? The W3C The State of Georgia The European Union The State of California

The European Union

empathy

The ability to recognize, understand, and share the feelings of others.

automation

The use of computers or machines to perform the work that was once done by a human.

Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech. True False

True

One popular test of a machine's ability to think is known as the ___ test. NAO (autonomous programmable humanoid robot) Watson Turing Hanson

Turing

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources? acceptable use policy search policy privacy policy FAQ policy

acceptable use policy

Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used. ad-support payment attribution DRM (digital rights management)

attribution

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as: telecomuting automation artificial intelligence Turing manufacturing

automation

The use of living organisms to manufacture new products or improve existing ones is called: human enhancement biotechnology quantum computing nanotechnology

biotechnology

Most of the ____ responsibilities are carried out by private companies, such as when YouTube removed a video that violates their terms of service. anti-piracy censorship netiquette acceptable use

censorship

Repeated hostile behavior with intent to harm another individual is known as __________.

cyber bullying

A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.

database administrator

__________ is the ability to recognize, understand, and share the feelings of others.

empathy

___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make. behavior law ethics empathy

ethics

__________ is the philosophical study of morality.

ethics

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission? public domain intellectual property fair use DRM (digital rights management)

fair use

__________ concentrates on reducing the environmental impact of computers and their widespread use.

green computing

You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.

help desk

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as: piracy fair use empathy IP (internet protocol)

piracy

In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator. trolling flaming piracy attribution

piracy

Online companies typically have a(n) __________ on their websites that clearly states what information is collected from users and what is done with that information.

privacy policy

Which of the following is used by many online companies to describe what information is collected from users and what is done with that information? sharing policy anonymity policy acceptable use policy privacy policy

privacy policy

Which browser feature will delete your history, cache, and cookies the moment you close the special window? masking private browsing do not track anonymity

private browsing

For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them. biotechnology nanotechnology orthoses prosthetics

prosthetics

Suppose you wanted to watch a Hollywood movie or the entire season of a TV show. List four legal ways in which you could view this content.

purchasing online digital rentals ad supported streaming subscription services

The ___ mode on a computer will place it in a low-power state when it is not being used. sign out sleep green OLPC

sleep

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company. telecommuting outsourcing power management green computing

telecommuting

The act of alerting the public about harmful activities that are being hidden by an organization is called: whistleblowing power management green computing digital divide

whistleblowing

do not track

A browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.

hibernate

A computer state that saves electricity by copying the contents of RAM to your hard drive.

help desk

A department at a company that can repair and troubleshoot systems, as well as provide technical support to employees.

acceptable use policy (AUP)

A document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

log

A file that records activities and events.

copyright

A legal concept that grants rights and control to the owner of any published work.

Creative Commons

A license that allows authors to set conditions for the free use and distribution of their work.

biotechnology

An application of biology that uses living organisms to manufacture new products or improve existing ones.

fair use

An exception to copyright law that provides for a limited set of circumstances where others can use copyrighted material without first obtaining permission.

database administrator (DBA)

An individual who is responsible for configuring, maintaining, and securing an organization's database.

computer support specialist

An individual who is responsible for installing, configuring, and supporting computer systems.

cyberbullying

An online form of aggression that involves repeated hostile behavior with intent to harm another individual.

A(n) __________ license allows authors to set conditions for the free use and distribution of their work. public domain acceptable use DRM (digital rights management) Creative Commons

Creative Commons

___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks. Creative Commons attribution DRM (digital rights management) streaming

DRM (digital rights management)

List four ways in which technology can be integrated with biological systems to repair or improve human functions.

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them. Others act as a sort of exoskeleton that can help paralyzed individuals walk again using motorized leg attachments. Researchers have also discovered ways to make computer chips interact with various areas of the body and brain to help those who suffer from conditions such as Parkinson's or blindness. Some chips areeven able to record new memories, helping those who have suffered damage to parts of the brain or have early-stage memory loss.

artificial intelligence (AI)

Involves the development of intelligent systems or machines that possess capabilities such as learning, problem solving, and communication.

What sort of Internet surveillance does the U.S. government engage in? Name two laws that give government agencies broad surveillance powers.

Many government agencies such as the NSA and FBI monitor the Internet and mobile activities of individuals all over the world. Law enforcement can request warrants and require that online companies turn over records including your email messages, search history, and social networking activity. They can also confiscate and look through any computers belonging to suspects, including smartphones. Patriot Act Foreign Intelligence Surveillance Act (FISA)

How can your online activity affect your ability to find or maintain employment?

Many organizations do not restrict their monitoring to the workplace. They may check the public online activity of their employees for anything that could harm the company. Organizations also check online help you manage it. activity before they hire employees. Yourwords, photos, and videos can say quite abit about you. Anything you post online can affect your ability to get that initial interview.

Which of the following statements about recycling and reducing waste is FALSE? Many retailers offer recycling and trade-in programs for computers, mobile devices, and printer cartridges Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems Some organizations will refurbish computers and distribute them individuals or schools that do not have access to computers.

Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems

Which of the following statements regarding employee monitoring is FALSE? Some organizations check your online activity before they hire you Organizations may check the public, online activity of their employees for anything that could harm the company Most types of employee monitoring and internet restrictions at the work place are illegal Ethically speaking, employers should always inform employees about what kind of monitoring the company will engage in

Most types of employee monitoring and internet restrictions at the work place are illegal

Which of the following is a government agency that has the capability to monitor the internet and mobile activities of individuals? USPTO (United States Patent and Trademark Office) FISA (foreign intelligence surveillance act) NSA (National Security Agency) AUP (acceptable use policy)

NSA (National Security Agency)

List five elements that are typically found in acceptable use policies.

Outlawing the use of computing resources to commit crimes, such as hacking and piracy. Restricting particular services, such as file sharing, on their networks. Banning inappropriate and unethical behavior, and guidelines for the organization's netiquette. Stressing the importance of security, especially the creation of a strong password. Explaining the ownership and privacy of email, storage, and other resources that you have access to. Typically, companies reserve the right to monitor your email, web activity, and files stored on company equipment.

Describe three ways in which social media have been used to help bring about political or social change.

Rebels have used mobile devices and social media to coordinate their actions and receive information to aid their cause. In the United States, most politiciansnow have social media accounts and oftenengage their constituents through them. The White House even has a petition form on its website, promising to address any issue from citizens if it receives enough signatures online. Social media also receives extensive use by individuals, groups, and organizations that want to advance a social or political agenda. Whistleblowing

anonymity software

Software that helps mask your IP address from websites.

List three advantages of telecommuting.

The ability to hire or keep workers whose schedule or location would make it impossible for them to work at the company's offices. Reduced costs for office space and utilities. Improved employee morale, which can boost productivity and loyalty.

graphic design

The art or skill of editing photos and designing layouts.

attenuation

The loss of intensity and clarity of a transmitted data signal.

ethics

The philosophical study of morality.

green computing

The principle of reducing the environmental impact of computers.

censorship

The suppression or deletion of content that is considered unacceptable

digital divide

The technology gap that exists between different social and economic classes.

__________ is the act of being annoying and antagonistic in areas such as online forums. Piracy Whistleblowing Flaming Trolling

Trolling

If a company hires an outside organization to handle its accounting, it is engaged in outsourcing. True False

True

Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information? ASIMO (Advanced Step in Innovative Mobility = Honda robot) Watson Robonaut Turing

Watson

Briefly describe the four factors that must be considered for "fair use."

What is the nature of the use? Educational use and commentary are more acceptable than a for-profit use. What is the nature of the work? Copying from a news article (nonfiction) is more acceptable than copying from a popular song or major network TV show (works of fiction). How much of the work is being copied? Using only a few seconds of a song or video is more acceptable than copying the entire thing. How will the copy affect the market? If you are claiming fair use just to avoid paying for a book, song, or movie, then fair use will likely not apply. Remember, the reason for the existence of copyright law is to protect authors and allow them to profit from their creations.

__________ is the act of alerting the public about harmful activities that are being hidden by an organization. Outsourcing Whistleblowing Green computing Turing

Whistleblowing

One of the foundation blocks of intellectual property law is the __________, a legal concept that grants rights and control to the owner of any published work. copyright attribution netiquette acceptable use policy

copyright

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs? copywrite piracy trademark patent

copywrite

___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide. cyberbullying flaming netiquette trolling

cyberbullying

The __________ refers to the technology gap that exists between different social and economic classes.

digital divide

Which of the following terms refers to the technology gap between different social and economic classes? green computing social change whistle blowing digital divide

digital divide

___ robots are those that are created to imitate the appearance or capabilities of humans. automated haptic humanoid AI

humanoid

Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.

intellectual property

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee. FISA (foreign intelligence surveillance act) AUPs (acceptable use policy) logs digital footprints

logs

The creation or manipulation of matter at the smallest possible scale is known as: human enhancement biotechnology business intelligence nanotechnology

nanotechnology

The term __________ refers to the set of online behaviors that are considered polite and proper.

netiquette

An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as: neural network biotechnology nanotechnology automation

neural network

Today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe. legal online mobile private

online

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party. telework outsourcing telecommuting automation

outsourcing


Conjuntos de estudio relacionados

ECON 103 Exam practice questions

View Set

Econ 201 Billy Lemus, HW19 - Chapter 19 Questions 1-20

View Set

Negotiation Chapter 7, Negotiation - Chapter 10, Negotiation - Chapter 11

View Set

Intro to Fraud Exam- Spring 2020 (exam 1)

View Set

Chapter 8 Lifting and Moving Patients

View Set

Nrs 111 Chronic Neuro- NCLEX Questions

View Set