CGS chapter 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

__ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.

AI

__ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Biotechnology

___ is the act of alerting the public about harmful activities that are being hidden by an organization.

whistleblowing

A(n) __ is a document containing an organizations policies for the ethical, secure, and appropriate use of computing recourses.

Acceptable use policy - AUP

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

Ad-supported streaming

Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.

DRM

Many websites have a(n) ___ area that should be checked for common questions and their responses.

FAQ

Copyright protection lasts 20 years after the date of publication or release. T/F

False

In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN. T/F

False

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them. T/F

False

The sleep mode on a computer generally saves more electricity than hibernate mode. T/F

False

___ are files that record activities and events on a computer.

Logs

Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.

NSA

___ involves the creation or manipulation of matter at the smallest possible scale.

Nanotechnology

___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.

Neutral networks

__ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Private browsing

Which of the following is NOT part of the green computing model?

Repair

__ is the process of working for a company without being physically present at the company's office.

Telecommuting

Creative works such as book, songs, and photographs are protected by copyright law. T/F

True

Ethics involves a rational analysis of the voluntary, moral choices that individuals make. T/F

True

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them. T/F

True

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used. T/F

True

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless. T/F

True

___ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Watson

__ occurs when computers or machines can perform the work that was once done by a human.

automation

___ refers to the technology gap that exists between different social and economic classes.

digital divide

Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

fair use

Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.

footprints

It is through ___ that a copyright holder can grant usage or distribution rights to others.

licensing

The term __ refers to the set of online behaviors that are considered polite and proper.

netiquette

__ occurs when an organization transfers some aspect of their business to a third party.

outsourcing

In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

piracy

Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.

privacy policy

___ is the act of being annoying and antagonistic in online social interactions.

trolling


Ensembles d'études connexes

Adaptations to Strength Training

View Set

Mental Health Test Bank (Chapter 4, 5, 6)

View Set