CGS chp. 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following words is NOT part of the green computing model?

Repair

The ___ is a legal concept that grants rights and control to the owner of any published work.

copyright

A ___ is responsible for the development of computer software.

software engineer

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

true

Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.

true

Nothing posted to social media services or anywhere else on the Internet should be considered private.

true

Researchers have discovered ways to make computer chips interact with various areas of the body and brain in order to help those that suffer from conditions such as Parkinson's or blindness.

true

Today's videos games are quite complex and require programming for user interaction, realistic motion and physics, and even intelligent character behavior.

true

Top-level managers in the IT field are often given the titles of Chief Information Officer (CIO) or Chief Technology Officer (CTO).

true

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.

true

ndividuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.

true

Which of the following examples is most likely to be in the public domain?

A photo on NASA's website

__ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.

AI

Honda's ___ robot can perform a variety of activities that require a great deal of balance and range of motion.

ASIMO

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

Ad-supported streaming

Which of the following companies sells and rents movies online?

Amazon

__ software, such as Tor, will help mask your IP address from websites.

Anonymity

Which of the following areas of research is NOT related to biotechnology?

Creating robotic caretakers

A(n) ___ license allows an author to set conditions for the free use and distribution of their work

Creative Commons

Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.

DRM

Google allows users to view and control all their data with a tool known as:

Dashboard

__ refers to the technology gap that exists between different social and economic classes.

Digital divide

_ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.

Do not track

__ is the philosophical study of morality.

Ethics

Many websites have a(n) ___ area that should be checked for common questions and their responses.

FAQ

Laws such as the Patriot Act and ___ give the U.S. government broad surveillance powers.

FISA

Biotechnology researchers have already developed techniques that can modify all of the genes of a developing embryo, effectively allowing parents to ''customize'' their child before it is born.

False

In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.

False

___ involves activities such as editing photos and designing layouts.

Graphic design

__ computing concentrates on reducing the environmental impact of computers and their widespread use.

Green

___ involves the creation or manipulation of matter at the smallest possible scale.

Nanotechnology

_ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.

Neural networks

__ occurs when an organization transfers some aspect of their business to a third party.

Outsourcing

Which of the following companies offers free, ad-supported streaming for music?

Pandora

__ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Private browsing

__ works may be downloaded and used without obtaining permission from anyone.

Public domain

NASA's ___ robot can work alongside astronauts or perform tasks that are too dangerous for humans.

Robonaut 2

__ involves improving the ranking of a website when users enter relevant keywords in a search engine.

SEO

Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active?

Sleep

In which of the following areas are you least likely to find examples of automation?

Technical writing

__ is the process of working for a company without being physically present at the company's office.

Telecommuting

_ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Watson

__ is the act of alerting the public about harmful activities that are being hidden by an organization.

Whistleblowing

___ is a global, online organization that offers whistleblowers an anonymous way of posting information and submitting evidence.

WikiLeaks

A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

acceptable use policy

Some licenses require that the user provide ___, or credit, to the author wherever the work is used.

attribution

Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.

business intelligence

Repeated hostile behavior with intent to psychological harm another individual is known as cyberterrorism.

false

A web developer creates and maintains websites for organizations.

true

__ occurs when computers or machines can perform the work that was once done by a human.

Automation

__ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Biotechnology

The piracy of music and movies is often evident on file-sharing services that use the ___ protocol.

BitTorrent

Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?

Can the exposure of this information put the organization's reputation at risk?

Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?

Hibernate

Which of the following companies offers access to a large library of TV shows to users who pay a monthly subscription fee?

Hulu

__ robots are those that are created to imitate the appearance or capabilities of humans.

Humanoid

__ are responsible for managing a diverse team of IT professionals and making top-level decisions regarding the purchasing of software and hardware for an organization.

Information systems managers

Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.

NSA

__ is the act of being annoying and antagonistic in online social interactions.

Trolling

Which of the following is a popular test of a system's ability to think?

Turing test

A ___ excels when it comes to installing, configuring, and supporting computer systems.

computer support specialist

A ___ is responsible for configuring, maintaining, and securing an organization's database.

database administrator

The ability to recognize, understand, and share the feelings of others is known as:

empathy

Human ___ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.

enhancement

Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

fair use

Although unethical, there are no currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.

false

Copyright protection lasts 20 years after the date of publication or release.

false

Employers generally restrict or monitor the Internet activity of their employees because the increased Internet use raises the company's ISP rates significantly.

false

Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S.

false

SEO specialists are normally sought after for their expertise in editing photos and designing layouts for websites.

false

The sleep mode on a computer generally saves more electricity than hibernate mode.

false

Online social interactions that exhibit anger and/or insults are known as:

flaming

Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.

footprints

Most companies have the need for a ___ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees.

help desk

The term ___ refers to the set of online behaviors that are considered polite and proper.

netiquette

A ___ is responsible for configuring and maintaining networks and communication systems.

network administrator

When companies outsource functions to another country it is referred to as:

offshoring

Many companies and individuals are going ___, which means they are using technology to lower their consumption and reliance on paper.

paperless

In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

piracy

Operating systems use ___ utilities to place computers and devices in low-power states when they are not being used.

power management

Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.

privacy policy

A(n) ___ computer can represent data in states beyond the two bits (0's and 1's) of today.

quantum

Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered ___ by the user community.

spam

A ___ specializes in developing plans and recommendations that meet the software and system needs of an organization.

systems analyst

When using a discussion forum, placing your message in the correct ___ will maximize your chances of getting a reply.

thread

Creative works such as books, songs, and photographs are protected by copyright law.

true

Employees who engage in telecommuting may find themselves working more hours, especially if their supervisor feels as if they are always ''on the clock.''

true

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

true

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.

true

Like many businesses, schools have acceptable use policies (AUPs) to describe the appropriate use of their computers.

true

Many companies are creating a position for social media strategists, which are experts in sales and marketing using the World Wide Web and social media tools.

true

Many employees, from fast-food workers to corporate executives, have been fired for something they posted online because it made their company look negative or careless in the eyes of the public.

true

Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.

true

__, which are products of the mind, can be quite valuable even though they may not always take on a physical form.

Intellectual property

__ are files that record activities and events on a computer.

Logs

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.

false

Today's web browsers include a feature that will delete all of your browsing ___ with a single click.

history

Superficially, ___ can be defined as the processes used in learning, problem solving, and communication.

intelligence

It is through ___ that a copyright holder can grant usage or distribution rights to others.

licensing


Set pelajaran terkait

Strategic Management Basics Quiz

View Set

Greatest Common Factor (GCF) and Least Common Multiple (LCM)

View Set

7th Grade Math: Benchmark Assessment #1 Review

View Set

New Testament Lit Exam 1 Study Guide

View Set