CSC 356
The future of jobs article states that changed in educational and learning environments are necessary to help people stay employable in the future
true
a cookie is a file that a web stie stores on a visitors computer
true
Where did facebook start?
Harvard
The communications assistance for law enforcement act(CALEA) said that
telecommunications equipment must be designed to allow the interception of telephone calls
Which of the following limits deceptive commercial email and outlines spanners responsibilities
the CAN-SPAM act
Most of the delay in the opening of the Denver International Airport was because of problems with
the baggage handling system
IMPORTANT Neo Luddites could be right about
the computer revolution does not necessarily make a more beautiful nature and the "ease" that it gives our life may not be moral
Which of the following is NOT a factor specified in US copyright law for determining fair use?
the for-profit or non-profit status of the copyright holder
The legal guidelines for determining whether material is obscene include all of the following EXCEPT
the material is intended for or distributed to persons under the age of 18
In one application of voice recognition system, the system failed to recognize female speakers. A likely reason was
the program was primarily developed and tested by men
Hactivism is
the use of hacking to promote a political cause
To Neo-Luddites what is the purpose of technology?
to eliminate jobs to reduce cost of production
A Neo-Luddite criticism of computers is that they separate humans from nature and destroy the enviroment
true
A barrier many students experience in the culture of STEM is that ones natural ability determines your capacity for STEM learning
true
Free market view avoids restrictive legislation and detailed regulation
true
Negative race and gender stereotypes about ability are particularly impactful in STEM fields and may convey signals around the inherent nature of ability
true
One hopeful major theme of respondents in the future of jobs study was that learners must cultivate 21st century skills, capabilities and attributes.
true
Pew research survey in 2018 shows that about 34% of US adults do not use the internet who have less than a high school education or are 65 years or older
true
Roughly half of major companies in the US sometimes monitor the email or voicemail of their employees on company systems
true
Sega v Accolade (1992) helped determine that reverse engineering was allowable in order to make a compatible product
true
Social capital is acquired through repeated interactions with other individuals or groups of individuals. Doing so regularly online could lead to becoming a digital citizen
true
Technology experts often make extremely wrong predictions due to a lack of imagination about the uses people would find for technology
true
The culture of STEM education has an effect on many students interest, self concept, sense of connectedness and persistence in these disciplines
true
The digital divide refers to the fact that some people have access to computers and information technology while others do not
true
a successful economy creates more jobs than it destroys
true
accelerometers help robots stay upright
true
positive uses of anonymity include protecting political speach
true
researchers are developing brain computer interfaces to enable severely handicapped people to control appliances with their thoughts
true
A free market view on privacy would lean toward emphasizing
usefulness of contracts
a turing test determines the strength of an encryption method
false
Which of the following is NOT a Neo-Luddite criticism of computers?
none of these
The practice of hiring companies or employees in other countries is known as
offshoring
In 2000, a French court ordered Yahoo! to block access by French people to
online auction sites containing Nazi materials
Which of the following is NOT a principle for producing good systems?
Overestimate the costs and time a project will take
Which of the following reasons for monitoring email, voicemail and computer files is considered legitimate for businesses?
-Protect security of proprietary information -investigate complains of harassment -prevent personal use of employer facilities if prohibited by company policy
Which are important principles for producing goods systems?
-design for real users -require a convincing case for safety -require a convincing care for security
Which of the following is an example of a negative right or liberty?
-freedom of speach -freedom of religion -the right to use your labor, skills or mind to create goods and services
-has scanned millions of books -sells ads on trademarked search terms -displays small excerpts on sear terms as fair use
The 1998 DMCA
-prohibits circumventing access controls -prohibits cracking cop-prevention systems -establishes a safe harbor feature
The 4th amendment
-protects a right to privacy from government intrusion -sets limits on governments rights to search our homes -provides privacy protections which are threatened by surveillance technology
Company monitoring of employee location and equipment usage
-provides increased security -allows monitoring of employee movement -are used to track long-haul trucks to reduce theft and optimize
Why did the HealthCare.gov launch fail?
-requirements were not fixed -project managers were inexperienced -software coding was given only 7 months to develop and test the system
Which of the following jobs is subject to repetitive strain injuries?
-sign language interpreter for the deaf -musician -computer programmer
the future of jobs and job training article list 5 themes taken by the experts
-the training ecosystem will evolve -new credentialing systems will arise -training and learning systems will not meet the needs
Why is it difficult to predict the consequences of a new technology?
-unexpected uses are found -our imagination is limited -we do not notice underlying trands
SONY v Universal city studios in 1984
-was a victory for noncommercial fair use -established that copying movies for later viewing was legal -involved betamax video recorders
IMPORTANT What are the 5 themes of the future of jobs article?
1-The training ecosystem will evolve with a mix of innovation in all education formats. 2-Learners must cultivate 21st century skills, capabilities and attributes. 3-New credentialing systems will arise as self directed learning expands. 4-Training and learning systems will not meet 21st century needs by 2026. 5-Jobs?What jobs? Technological forces will fundamentally change work and the economic landscape.
When was the first US copyright law passed?
1790
In the early days of computing (1960's to the early 1970's), a ""hacker"" was
A creative programmer who wrote very elegant or clever programs
Which of the following is an example of bio-metrics?
All of these -DNA -Fingerprints -Voice prints
U.S. laws and court actions on employers monitoring employees
Correct puts heavy weight on usage of company systems provided for business purposes
Wev sites that look attractive to hackers but are closely monitored so that everything the hacker does at the site is recorded and studied are known as
Honey pots
Which of the following is NOT a malicious program used by hackers to gain access to your computer
Honey pots
Which of the following is NOT a provision of the CAN-SPAM act that applies to commercial emailers?
It requires commercial emailers register with the FTC
Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off?
Lack of imagination about the uses people would find for technology Lack of imagination about what the public would like Lack of imagination about what the public would pay for
IMPORTANT The 4 tiers of NIST
Partial-low implementation- reactive Risk informed- implemented through management Repeatable- formal implementation and response as part of policy Adaptive- prediction and pre-implementation of safegaurds
Telecommuting has the following benefits:
Reduces overhead for employers
Microsoft removed several words from its thesaurus in word 2000 that had been listed as synonyms for fool. Which was NOT removed?
Trick
Why do models of complex economic and social systems often give poor or inconsistent results?
We might not have complete knowledge of the system we are modeling. The data describing current conditions or characteristics might not be complete or accurate. It is difficult, if not impossible, to numerically quantify variables that represent human values or choices.
A cookie is
a file that a web site stores on a visitors computer
One of the sources of failure common to BOT the Therac25 and the Araine 5 rocket were
a reuse of software from previous versions of the system
Lee Rainie's (pew research) talk describes some factores related to internet non use
age and disability
Patents for software inventions
are collected by patent trolls
Net neutrality advocates
argue for equal treatment of all customers
IMPORTANT veil of ignorance
behind the veil a person would not know their age, sex, race, etc. and could create fair policies
Employers screening prospective employees
can protect and applicants privacy by hiring a third party company to do searches
Digital rights management
controls usage of intellectual property
A successful economy
creates more jobs than it destroys uses computers to make tasks more efficient is flexible and adaptive
when a person visits a web site their IP address and the links they click on are automatically recorded, this is an example of
data mining
In 2016 Paypal, twitter, git, airbnb and other web sites count not be accessed due to what kind of attack?
denial of service
the GNU project
developed the concept of ceopyleft was used by Linus Torvalds to run linux os started in the 1980's headed by Richard Stallman
1st amendment protections include prohibiting private businesses from curtailing free speech
false
A consensus amount respondents in the future of jobs study was that AI and machine learning could replicate virtually all human skills in the next 10 years
false
Access to and usage of the internet is relatively equal around the world
false
Broadcast media traditionally has had the strongest 1st amendment protection while print media has the weakest
false
Computers were first built in the 1950's
false
Little or no research is needed to understand whether STEM gateway courses continue to negatively impact STEM student persistence
false
Providing new technology to poor countries is a matter of having enough money to buy equipment
false
Simplifications and assumptions must not be made when designing an effective computer model
false
The US supreme court ruled that requiring content filters on public library computers was unconstitutional
false
The electronic communications privacy act prohibits employers from intercepting and reading employees stored email
false
Unemployment in the US is largely due to computers and automation
false
all peer to peer technologies were found to be illegal as a result of the napster case
false
computer profiling combines and compares information from different databases to match records
false
copyright law protects processes and inventions while patent law protects the particular expression of an idea
false
The privacy act of 1974 established rules to regulate
federal government databases onlly
Which of the following requirements was a key provision of the childrens internet protection act(CIPA)?
filtering software must be installed on internet terminals in schools and libraries
In the term j"free software" free implies all of thee following except one
free of cost
Wikipedia is
funded through donations
Ethical theories include all of these EXCEPT
governmental laws
IMPORTANT The five functions of NIST cyber security framework
identify-understand risk protect- develop and implement safegaurds detect- develop and implement activities of event respond-take action on incident recover-plan for resilience and restore capabilities
Claim rights or positive rights
impose an obligation on some people to provide certain things for others
The 1st amendment governmental regulatory framework from the 20th century has three categories, EXCEPT
internet
When a person visits a web site, their IP address and the links they click on are automatically recorded. This is an example of
invisible information gathering
One of the reasons the court ruled against Napster was
it knowingly encouraged and assisted in the infringement of copyrights
Which of the following are the 2 main arguments against the communications Decency Act accepted by the courts?
it was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children
social contract theory is best described by
justice as fairness
News publishers in the United States DO NOT need to do which of the following when their articles are available online:
make certain that all libel (written defamation) is true in order to win libel cases overseas.
If a business follows an "opt in" policy for handling personal data, information about a customer
may not be released unless the customer gives pers=mission
Wikileaks made publicd
military and diplomatic documents
The hong kong an kuala lumpur airports suffered from computer system failures on their opening days. What was to blame for these failures?
people typing in incorrecct information
Which of the following is NOT an exclusive right granted by copyright law?
profit from the work
What is the most sensible and effective way to close the digital divide in poor countries?
promote spread of mobile phones
Robots are best described as
relying on software and smart sensors
Which US group is twice as likely to never use the internet?
rural compared to urban and suburban
Anonymizers allow a user to
send email and surf the web anonymously