TAYS Chapter 6: Changing the World (Module 6)
__________ involves the development of intelligent systems.
AI
A(n) __________ license allows authors to set conditions for the free use and distribution of their work.
Creative Commons
Many websites have ___ areas that should be checked for common questions and their responses.
FAQ
Which of the following companies offers free, ad-supported streaming for music?
Pandora
______________, is a feature of all modern browsers that will delete you history, cache, and cookies the moment you close the browser.
Private browsing
NASA's ___ robot can work alongside astronauts or perform tasks that are too dangerous for humans.
Robonaut 2
A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
acceptable use policy
___ software, such as Tor, will help mask your IP address from websites.
anonymity
Some licenses require that the user provide ___, or credit, to the author wherever the work is used.
attribution
___ occurs when computers or machines can perform the work that was once done by a human.
automation
__________ occurs when computers or machines can perform the work that was once done by a human.
automation
One of the foundation blocks of intellectual property law is the__________, a legal concept that grants rights and control to the owner of any published work.
copyright
Which of the following areas of research is NOT related to biotechnology?
creating robot caretakers
Repeated hostile behavior with intent to harm another individual is known as __________.
cyberbullying
A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.
database administrator
The __________refers to the technology gap that exists between different social and economic classes.
digital divide
__________ is the ability to recognize, understand, and share the feelings of others.
empathy
Human ___ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.
enhancement
__________ is the philosophical study of morality.
ethics
Although unethical, there are no currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
false
Copyright protection lasts for approximately 15 years after the author applies for it.
false
Employers generally restrict or monitor the Internet activity of their employees because the increased Internet use raises the company's ISP rates significantly.
false
In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.
false
It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with.
false
SEO specialists are normally sought after for their expertise in editing photos and designing layouts for websites.
false
__________concentrates on reducing the environmental impact of computers and their widespread use.
green computing
You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.
help desk
Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.
intellectual property
Superficially, ___ can be defined as the processes used in learning, problem solving, and communication.
intelligence
Which of the following fields involves the creation or manipulation of matter at the smallest possible scale?
nanotechnology
The term __________ refers to the set of online behaviors that are considered polite and proper.
netiquette
A ___ is responsible for configuring and maintaining networks and communication systems.
network administrator
___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.
neural networks
When companies outsource functions to another country it is referred to as:
offshoring
In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.
piracy
Online companies typically have a(n) _______________ on their websites that clearly state what information is collected from users and what is done with that information.
privacy policy
___ works may be downloaded and used without obtaining permission from anyone.
public domain
For a computer, "sleep" mode uses less electricity than "hibernate" mode.
sleep
A ___ is responsible for the development of computer software.
software engineer
In which of the following areas are you least likely to find examples of automation?
technical writing
_____________ is the act of being annoying and antagonistic in areas such as online forums.
trolling
A web developer creates and maintains websites for organizations.
true
If a company hires an outside organization to handle its accounting, it is engaged in outsourcing.
true
Many companies are creating a position for social media strategists, which are experts in sales and marketing using the World Wide Web and social media tools.
true
Researchers have discovered ways to make computer chips interact with various areas of the body and brain in order to help those that suffer from conditions such as Parkinson's or blindness.
true
Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech.
true
Top-level managers in the IT field are often given the titles of Chief Information Officer (CIO) or Chief Technology Officer (CTO).
true
__________ is the act of alerting the public about harmful activities that are being hidden by an organization.
whistleblowing