Ch 6: Changing the World Review
computer support specialist
A ________ _______ __________ excels when it comes to installing, configuring, and supporting computer systems.
Creative Commons
A ________ _______ license allows authors to set conditions for the free use and distribution of their work.
database administrator
A ________ _____________ is responsible for configuring, maintaining, and securing an organization's database.
dashboard
Google allows users to view and control all their data with a tool known as:
ASIMO
Honda's _____ robot can perform a variety of activities that require a great deal of balance and range of motion.
piracy
In the world of computing, ______ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.
FISA
Laws such as the Patriot Act and ____ give the U.S. government broad surveillance powers.
intellectual property
Legal concepts have been created and refined to help protect ____________ ________, which are essentially products of the mind.
paperless
Many companies and individuals are going _________, which means they are using technology to lower their consumption and reliance on paper.
FAQ
Many websites have ___ areas that should be checked for common questions and their responses.
copyright
One of the foundation blocks of intellectual property law is the__________, a legal concept that grants rights and control to the owner of any published work.
privacy policy
Online companies typically have a _______ ______ on their websites that clearly state what information is collected from users and what is done with that information.
cyberbullying
Repeated hostile behavior with intent to harm another individual is known as _____________.
false
T/F: Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
false
T/F: Biotechnology researchers have already developed techniques that can modify all of the genes of a developing embryo, effectively allowing parents to "customize" their child before it is born.
false
T/F: Copyright protection lasts for approximately 15 years after the author applies for it.
false
T/F: For a computer, "sleep" mode uses less electricity than "hibernate" mode.
true
T/F: If a company hires an outside organization to handle its accounting, it is engaged in outsourcing.
false
T/F: Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S.
false
T/F: It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with.
true
T/F: Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech.
digital divide
The _______ ______ refers to the technology gap that exists between different social and economic classes.
netiquette
The term __________ refers to the set of online behaviors that are considered polite and proper.
nanotechnology
Which of the following fields involves the creation or manipulation of matter at the smallest possible scale?
help desk
You might find a computer support specialist at a company's ____ ____, troubleshooting systems and providing technical support to employees.
AI
__ involves the development of intelligent systems.
green computing
______ _________ concentrates on reducing the environmental impact of computers and their widespread use.
ethics
______ is the philosophical study of morality.
private browsing
_______ ________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser.
empathy
_______ is the ability to recognize, understand, and share the feelings of others.
automation
__________ occurs when computers or machines can perform the work that was once done by a human.
trolling
_____________ is the act of being annoying and antagonistic in areas such as online forums.
whistleblowing
______________ is the act of alerting the public about harmful activities that are being hidden by an organization.