Chapter 6
____ systems can include sophisticated programs that answer questions to futuristic robots that can think and act like humans.
AI
An _____ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
Acceptable use policy
which piracy alternative will allow you to listen to your favorite songs for free?
Ad-supported streaming
software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.
DRM
many websites have a ____ area to check common questions and their responses.
FAQ
_______ are files that record activities and events on computers.
Logs
Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.
NSA
________ involves the creation or manipulation of matter at the smallest possible scale.
Nanotechnology
__________ aim to revolutionize AI by asking computers to process data and learn in a manner inspired by the brain.
Neural network
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
True
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
True
__________ occurs when computers or machines can perform the work of humans
automation
_______ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
biotechnology
_______ refers to the technology gap that exists between different social and economic classes.
digital divide
Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
fair use
Copyright protection only lasts 20 years after of publication/ release:
false
Digital ______ are effectively a trail of your data, activities, location with phone.
footprints
It is through _____ that a copyright holder can grant usage or distribution rights to others.
licensing
the term ____ refers to the set of online behaviors: proper and polite
netiquette
_______ occurs when an organization transfers some aspect of business to 3rd party.
outsourcing
In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
piracy
Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.
privacy policy
________ is a feature of all modern browsers that delete history, cache, and cookies.
private browsing
Which of the following is NOT part of the green computing model?
repair
________ is the process of working for a company without being physically present at the company's office.
telecommuting
________ is the act of being annoying and antagonistic in online social interactions.
trolling
creative work-books, songs, photos are copyright protected:
true
ethics involves a rational analysis of the voluntary moral choices that individuals make:
true
your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make a negative/ careless impression on the company.
true
______ displays AI with astounding capability to understand complex questions and quickly find answers with large database information.
watson
__________ is the act of alerting public about harmful activities that are being hidden by an organization.
whistleblowing
In the United States , there are laws to prevent VPN providers from keeping logs on your activity, so anonymity when browsing VPN is assumed:
False
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them
False
The sleep mode on a computer generally saves more electricity than hibernate mode.
False