BISM 1200 Chapter 6 Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

. Some licenses require that the user provide ______, or credit, to the author wherever the work is used. A. attributionB. licensingC. fair useD. empathy

A

Copyright law contains an exception known as ______, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission. A. fair useB. netiquetteC. trollingD. licensing

A

The ability to recognize, understand, and share the feelings of others is known as: A. empathyB. piracyC. netiquetteD. intelligence

A

The piracy of music and movies is often evident on file-sharing services that use the _______ protocol. A. BitTorrentB. VoIPC. ICMPD. Tunneling

A

It is through _______ that a copyright holder can grant usage or distribution rights to others. A. attributionB. licensingC. DRMD. telecommuting

B

Software is sometimes illegally modified in order to disable _______ technologies such as copy protection and authenticity checks. A. fair useB. DRMC. TuringD. attribution

B

_______ is the philosophical study of morality. A. EmpathyB. EthicsC. Artificial intelligenceD. Netiquette

B

A _______ license allows an author to set conditions for the free use and distribution of their work. A. digital rightsB. privateC. Creative CommonsD. public domain

C

In the world of computing, _______ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator. A. empathyB. copyrightC. piracyD. licensing

C

The _______ is a legal concept that grants rights and control to the owner of any published work. A. attributionB. patentC. copyrightD. trademark

C

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free? A. Public domainB. Digital rentalsC. Subscription servicesD. Ad-supported streaming

D

_____, which are products of the mind, can be quite valuable even though they may not always take on a physical form. A. Digital footprintsB. Artificial intelligenceC. Digital rightsD. Intellectual property

D

______ works may be downloaded and used without obtaining permission from anyone. A. SEOB. OffshoreC. DRMD. Public domain

D

Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.

F

Biotechnology researchers have already developed techniques that can modify all of the genes of a developing embryo, effectively allowing parents to ''customize'' their child before it is born.

F

Copyright protection lasts 20 years after the date of publication or release.

F

Employers generally restrict or monitor the Internet activity of their employees because the increased use raises the company's ISP rates significantly.

F

Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S. FALSE

F

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.

F

Repeated hostile behavior with intent to psychological harm another individual is known as cyberterrorism.

F

SEO specialists are normally sought after for their expertise in editing photos and designing layouts for websites.

F

The sleep mode on a computer generally saves more electricity than hibernate mode.

F

A web developer creates and maintains websites for organizations.

T

Creative works such as books, songs, and photographs are protected by copyright law.

T

Employees who engage in telecommuting may find themselves working more hours, especially if their supervisor feels as if they are always ''on the clock.''

T

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

T

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.

T

Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.

T

Like many businesses, schools have acceptable use policies (AUPs) to describe the appropriate use of their computers.

T

Many companies are creating a position for social media strategists, who are experts in sales and marketing using the World Wide Web and social media tools.

T

Many employees, from fast-food workers to corporate executives, have been fired for something they posted online because it made their company look negative or careless in the eyes of the public.

T

Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.

T

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

T

Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.

T

Nothing posted to social media services or anywhere else on the Internet should be considered private.

T

Researchers have discovered ways to make computer chips interact with various areas of the body and brain in order to help those that suffer from conditions such as Parkinson's or blindness.

T

Today's videos games are quite complex and require programming for user interaction, realistic motion and physics, and even intelligent character behavior.

T

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.

T

A _______ computer can represent data in states beyond the two bits (0's and 1's) of today. A. quantumB. greenC. nanoD. Turing

a

A _______ is responsible for configuring and maintaining networks and communication systems. A. network administratorB. software engineerC. database administratorD. computer support specialist

a

A(n) _______ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. A. acceptable use policyB. privacy policyC. fair use policyD. digital rights policy

a

Google allows users to view and control all their data with a tool known as: A. DashboardB. Control PanelC. DatacenterD. Privacy center

a

Honda's _______ robot can perform a variety of activities that require a great deal of balance and range of motion. A. ASIMOB. WatsonC. TuringD. X1

a

The term _______ refers to the set of online behaviors that are considered polite and proper. A. netiquetteB. fair useC. acceptable useD. attribution

a

Which of the following companies offers both free and paid subscription streaming for many TV shows? A. HuluB. NetflixC. PandoraD. Spotify

a

Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power? A. HibernateB. Shut downC. SleepD. Log off

a

______ occurs when computers or machines can perform the work that was once done by a human. A. AutomationB. OutsourcingC. TelecommutingD. Green computing

a

______ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans. A. AIB. BiotechnologyC. NanotechnologyD. SEO

a

_______ computing concentrates on reducing the environmental impact of computers and their widespread use. A. GreenB. EthicalC. NetiquetteD. Social

a

_______ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window. A. Private browsingB. Do not trackC. AnonymityD. Automation

a

A _______ is responsible for the development of computer software. A. network administratorB. software engineerC. database administratorD. computer support specialist

b

A _______ specializes in developing plans and recommendations that meet the software and system needs of an organization. A. network administratorB. systems analystC. social media strategistD. computer support specialist

b

Human _______ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions. A. intelligenceB. enhancementC. empathyD. robotics

b

Many websites have a(n) _______ area that should be checked for common questions and their responses. A. AUPB. FAQC. DRMD. SEO

b

Most companies have the need for a _______ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees. A. human resourcesB. help deskC. maintenanceD. facilities

b

Online companies typically have a(n) _______ on their websites that clearly states what information is collected from users and what is done with that information. A. acceptable use policyB. privacy policyC. fair use policyD. whistleblowing policy

b

Operating systems use _______ utilities to place computers and devices in low-power states when they are not being used. A. encryptionB. power managementC. acceptable useD. optimization

b

Today's web browsers include a feature that will delete all of your browsing _______ with a single click. A. settingsB. historyC. connectionsD. IPs

b

When companies outsource functions to another country it is referred to as: A. green computingB. offshoringC. telecommutingD. the digital divide

b

When using a discussion forum, placing your message in the correct _______ will maximize your chances of getting a reply. A. FAQB. threadC. logD. domain

b

Which of the following is a popular test of a system's ability to think? A. Empathy testB. Turing testC. BenchmarkD. PassMark

b

You and your devices usually leave digital ______, which is a trail of your data, activity, and even the locations where devices are used. A. breadcrumbsB. footprintsC. dividersD. logs

b

______ software, such as Tor, will help mask your IP address from websites. A. Public domainB. AnonymityC. Do not trackD. DRM

b

_______ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information. A. ASIMOB. WatsonC. RobonautD. NAO

b

_______ involves improving the ranking of a website when users enter relevant keywords in a search engine. A. Social mediaB. SEOC. Graphic designD. Automation

b

_______ occurs when an organization transfers some aspect of their business to a third party. A. AutomationB. OutsourcingC. TelecommutingD. Green computing

b

_______ robots are those that are created to imitate the appearance or capabilities of humans. A. BiotechB. HumanoidC. TuringD. Intellectual

b

A _______ is responsible for configuring, maintaining, and securing an organization's database. A. network administratorB. software engineerC. database administratorD. computer support specialist

c

In which of the following areas are you least likely to find examples of automation? A. Microprocessor manufacturingB. Cleanup efforts in a toxic environmentC. Technical writingD. Retail store checkout lines

c

NASA's _______ robot can work alongside astronauts or perform tasks that are too dangerous for humans. A. ASIMOB. NAOC. Robonaut 2D. X1

c

Online social interactions that exhibit anger and/or insults are known as: A. piracyB. telecommutingC. flamingD. trolling

c

Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered _______ by the user community. A. cyberbullyingB. flamingC. spamD. netiquette

c

Which of the following areas of research is NOT related to biotechnology? A. Developing new medicationsB. Mapping human genesC. Creating robotic caretakersD. Increasing crop yields

c

Which of the following companies offers free, ad-supported streaming for music? A. HuluB. NetflixC. PandoraD. Vudu

c

Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active? A. HibernateB. Shut downC. SleepD. Log off

c

Which of the following words is NOT part of the green computing model? A. ReduceB. ReuseC. RepairD. Recycle

c

_____ are responsible for managing a diverse team of IT professionals and making top-level decisions regarding the purchasing of software and hardware for an organization. A. Computer support specialistsB. SEO specialistsC. Information systems managersD. CFOs

c

_______ are files that record activities and events on a computer. A. Digital footprintsB. PoliciesC. LogsD. Threads

c

_______ involves activities such as editing photos and designing layouts. A. Social mediaB. SEOC. Graphic designD. Systems analysis

c

_______ involves the creation or manipulation of matter at the smallest possible scale. A. AIB. SEOC. NanotechnologyD. Biotechnology

c

_______ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies. A. Privacy policyB. AnonymizeC. Do not trackD. Digital divide

c

_______ is the process of working for a company without being physically present at the company's office. A. OffshoringB. OutsourcingC. TelecommutingD. Green computing

c

_______ refers to the technology gap that exists between different social and economic classes. A. OffshoringB. OutsourcingC. Digital divideD. Green computing

c

A _______ excels when it comes to installing, configuring, and supporting computer systems. A. network administratorB. software engineerC. database administratorD. computer support specialist

d

Laws such as the Patriot Act and _______ give the U.S. government broad surveillance powers. A. DMCAB. USPTOC. SEOD. FISA

d

Many companies and individuals are going ______, which means they are using technology to lower their consumption and reliance on paper. A. biotechB. automatedC. nanotechD. paperless

d

Many government agencies, such as the ______, monitor the Internet and mobile activities of individuals all over the world. A. SEOB. TSAC. DBAD. NSA

d

Superficially, _______ can be defined as the processes used in learning, problem solving, and communication. A. biotechnologyB. emotionC. empathyD. intelligence

d

Which of the following companies sells and rents movies online? A. HuluB. SpotifyC. PandoraD. Amazon

d

Which of the following examples is most likely to be in the public domain? A. A 20-year old song from CanadaB. A cartoon filmC. An "over-the-air" network TV showD. A photo on NASA's website

d

Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves? A. Have I alerted my supervisor and, if needed, the top-level managers of the organization?B. Is the activity in question illegal or likely to cause harm to the public?C. Do I have documented proof of the activities that will cause this alleged harm?D. Can the exposure of this information put the organization's reputation at risk?

d

______ is a global, online organization that offers whistleblowers an anonymous way of posting information and submitting evidence. A. OLPCB. DMCAC. MtGoxD. WikiLeaks

d

_______ is an application of biology that uses living organisms to manufacture new products or improve existing ones. A. AIB. SEOC. NanotechnologyD. Biotechnology

d

_______ is the act of alerting the public about harmful activities that are being hidden by an organization. A. FlamingB. TrollingC. TelecommutingD. Whistleblowing

d

_______ is the act of being annoying and antagonistic in online social interactions. A. PiracyB. AttributionC. FlamingD. Trolling

d


संबंधित स्टडी सेट्स

APES TOPICS 1.1-1.11 & Skills 1:A & B,2:A and B and C:6

View Set

Nursing Application: Antianginals

View Set

Jensen: Chapter 13 - Eyes Assessment

View Set

Fin 3400 Chapter 9 Net present value

View Set

Environmental Science 150: Chapter 8

View Set

Chapter 52 - Integumentary Dysfunction

View Set