Unit 7 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

copyright; trademark

A software program would be protected by _____ law, while a corporate logo would be protected by _____ law.

digital watermark

A subtle alteration of digital content that identifies the copyright holder

Computer hoax

A warning about a nonexistent virus spread via e-mail

surge suppressor

A(n) _____ protects a computer system from damage due to electrical fluctuations.

False

All unethical acts are illegal. True or False

False

As computer use has become more common, the potential for stress related to computer use has decreased. T/F?

False

Assistive technology is hardware and software designed to help all beginning computer users learn how to use a computer. T/F?

ethics

Can vary from another's depending on his or her values, culture, and so forth

True

Carpal tunnel syndrome can be caused by using a computer keyboard. T/F?

True

Changing the background behind a television newscaster to make it appear that he or she is reporting on location instead of from inside the television studio would be an example of digital manipulation. T/F?

False

Computer monitoring software used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed is an illegal breach of privacy. T/F?

True

Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. T/F?

True

Encryption can be used for privacy purposes, in addition to security purposes. T/F?

assistive technology

Hardware and software specifically designed for use by individuals with physical disabilities is called _____.

employee monitoring

Observing or reviewing employees' actions while they are on the job is _____.

True

The digital divide refers to discrepancies in access to technology by individuals within a country, as well as to compare access from country to country. T/F?

Plagiarism

Turning in a copy of a poem you found on a Web site as your original composition for a poetry class assignment is an example of _____.

False

Unsolicited, bulk e-mail sent over the Internet is phishing. T/F?

False

Very few major U.S. companies monitor the online activities of their employees. T/F?

Copyright

What the symbol © stands for

video surveillance

_____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related purposes or crime-prevention.

information privacy

_____ refers to the rights of individuals and companies to control how information about them is collected and used.


संबंधित स्टडी सेट्स

Saunders NCLEX-RN Musculoskeletal System Practice Questions

View Set

Body Fluid Distribution (Compartments)

View Set

Chapter 6 (Operant Conditioning)

View Set

SU 19: Retirement Plans for Small Businesses

View Set

Criminal Justice: Reasonable Expectation of Privacy

View Set