Unit 7 Quiz
copyright; trademark
A software program would be protected by _____ law, while a corporate logo would be protected by _____ law.
digital watermark
A subtle alteration of digital content that identifies the copyright holder
Computer hoax
A warning about a nonexistent virus spread via e-mail
surge suppressor
A(n) _____ protects a computer system from damage due to electrical fluctuations.
False
All unethical acts are illegal. True or False
False
As computer use has become more common, the potential for stress related to computer use has decreased. T/F?
False
Assistive technology is hardware and software designed to help all beginning computer users learn how to use a computer. T/F?
ethics
Can vary from another's depending on his or her values, culture, and so forth
True
Carpal tunnel syndrome can be caused by using a computer keyboard. T/F?
True
Changing the background behind a television newscaster to make it appear that he or she is reporting on location instead of from inside the television studio would be an example of digital manipulation. T/F?
False
Computer monitoring software used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed is an illegal breach of privacy. T/F?
True
Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. T/F?
True
Encryption can be used for privacy purposes, in addition to security purposes. T/F?
assistive technology
Hardware and software specifically designed for use by individuals with physical disabilities is called _____.
employee monitoring
Observing or reviewing employees' actions while they are on the job is _____.
True
The digital divide refers to discrepancies in access to technology by individuals within a country, as well as to compare access from country to country. T/F?
Plagiarism
Turning in a copy of a poem you found on a Web site as your original composition for a poetry class assignment is an example of _____.
False
Unsolicited, bulk e-mail sent over the Internet is phishing. T/F?
False
Very few major U.S. companies monitor the online activities of their employees. T/F?
Copyright
What the symbol © stands for
video surveillance
_____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related purposes or crime-prevention.
information privacy
_____ refers to the rights of individuals and companies to control how information about them is collected and used.