CSC 356

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The future of jobs article states that changed in educational and learning environments are necessary to help people stay employable in the future

true

a cookie is a file that a web stie stores on a visitors computer

true

Where did facebook start?

Harvard

The communications assistance for law enforcement act(CALEA) said that

telecommunications equipment must be designed to allow the interception of telephone calls

Which of the following limits deceptive commercial email and outlines spanners responsibilities

the CAN-SPAM act

Most of the delay in the opening of the Denver International Airport was because of problems with

the baggage handling system

IMPORTANT Neo Luddites could be right about

the computer revolution does not necessarily make a more beautiful nature and the "ease" that it gives our life may not be moral

Which of the following is NOT a factor specified in US copyright law for determining fair use?

the for-profit or non-profit status of the copyright holder

The legal guidelines for determining whether material is obscene include all of the following EXCEPT

the material is intended for or distributed to persons under the age of 18

In one application of voice recognition system, the system failed to recognize female speakers. A likely reason was

the program was primarily developed and tested by men

Hactivism is

the use of hacking to promote a political cause

To Neo-Luddites what is the purpose of technology?

to eliminate jobs to reduce cost of production

A Neo-Luddite criticism of computers is that they separate humans from nature and destroy the enviroment

true

A barrier many students experience in the culture of STEM is that ones natural ability determines your capacity for STEM learning

true

Free market view avoids restrictive legislation and detailed regulation

true

Negative race and gender stereotypes about ability are particularly impactful in STEM fields and may convey signals around the inherent nature of ability

true

One hopeful major theme of respondents in the future of jobs study was that learners must cultivate 21st century skills, capabilities and attributes.

true

Pew research survey in 2018 shows that about 34% of US adults do not use the internet who have less than a high school education or are 65 years or older

true

Roughly half of major companies in the US sometimes monitor the email or voicemail of their employees on company systems

true

Sega v Accolade (1992) helped determine that reverse engineering was allowable in order to make a compatible product

true

Social capital is acquired through repeated interactions with other individuals or groups of individuals. Doing so regularly online could lead to becoming a digital citizen

true

Technology experts often make extremely wrong predictions due to a lack of imagination about the uses people would find for technology

true

The culture of STEM education has an effect on many students interest, self concept, sense of connectedness and persistence in these disciplines

true

The digital divide refers to the fact that some people have access to computers and information technology while others do not

true

a successful economy creates more jobs than it destroys

true

accelerometers help robots stay upright

true

positive uses of anonymity include protecting political speach

true

researchers are developing brain computer interfaces to enable severely handicapped people to control appliances with their thoughts

true

A free market view on privacy would lean toward emphasizing

usefulness of contracts

a turing test determines the strength of an encryption method

false

Which of the following is NOT a Neo-Luddite criticism of computers?

none of these

The practice of hiring companies or employees in other countries is known as

offshoring

In 2000, a French court ordered Yahoo! to block access by French people to

online auction sites containing Nazi materials

Which of the following is NOT a principle for producing good systems?

Overestimate the costs and time a project will take

Which of the following reasons for monitoring email, voicemail and computer files is considered legitimate for businesses?

-Protect security of proprietary information -investigate complains of harassment -prevent personal use of employer facilities if prohibited by company policy

Which are important principles for producing goods systems?

-design for real users -require a convincing case for safety -require a convincing care for security

Which of the following is an example of a negative right or liberty?

-freedom of speach -freedom of religion -the right to use your labor, skills or mind to create goods and services

Google

-has scanned millions of books -sells ads on trademarked search terms -displays small excerpts on sear terms as fair use

The 1998 DMCA

-prohibits circumventing access controls -prohibits cracking cop-prevention systems -establishes a safe harbor feature

The 4th amendment

-protects a right to privacy from government intrusion -sets limits on governments rights to search our homes -provides privacy protections which are threatened by surveillance technology

Company monitoring of employee location and equipment usage

-provides increased security -allows monitoring of employee movement -are used to track long-haul trucks to reduce theft and optimize

Why did the HealthCare.gov launch fail?

-requirements were not fixed -project managers were inexperienced -software coding was given only 7 months to develop and test the system

Which of the following jobs is subject to repetitive strain injuries?

-sign language interpreter for the deaf -musician -computer programmer

the future of jobs and job training article list 5 themes taken by the experts

-the training ecosystem will evolve -new credentialing systems will arise -training and learning systems will not meet the needs

Why is it difficult to predict the consequences of a new technology?

-unexpected uses are found -our imagination is limited -we do not notice underlying trands

SONY v Universal city studios in 1984

-was a victory for noncommercial fair use -established that copying movies for later viewing was legal -involved betamax video recorders

IMPORTANT What are the 5 themes of the future of jobs article?

1-The training ecosystem will evolve with a mix of innovation in all education formats. 2-Learners must cultivate 21st century skills, capabilities and attributes. 3-New credentialing systems will arise as self directed learning expands. 4-Training and learning systems will not meet 21st century needs by 2026. 5-Jobs?What jobs? Technological forces will fundamentally change work and the economic landscape.

When was the first US copyright law passed?

1790

In the early days of computing (1960's to the early 1970's), a ""hacker"" was

A creative programmer who wrote very elegant or clever programs

Which of the following is an example of bio-metrics?

All of these -DNA -Fingerprints -Voice prints

U.S. laws and court actions on employers monitoring employees

Correct puts heavy weight on usage of company systems provided for business purposes

Wev sites that look attractive to hackers but are closely monitored so that everything the hacker does at the site is recorded and studied are known as

Honey pots

Which of the following is NOT a malicious program used by hackers to gain access to your computer

Honey pots

Which of the following is NOT a provision of the CAN-SPAM act that applies to commercial emailers?

It requires commercial emailers register with the FTC

Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off?

Lack of imagination about the uses people would find for technology Lack of imagination about what the public would like Lack of imagination about what the public would pay for

IMPORTANT The 4 tiers of NIST

Partial-low implementation- reactive Risk informed- implemented through management Repeatable- formal implementation and response as part of policy Adaptive- prediction and pre-implementation of safegaurds

Telecommuting has the following benefits:

Reduces overhead for employers

Microsoft removed several words from its thesaurus in word 2000 that had been listed as synonyms for fool. Which was NOT removed?

Trick

Why do models of complex economic and social systems often give poor or inconsistent results?

We might not have complete knowledge of the system we are modeling. The data describing current conditions or characteristics might not be complete or accurate. It is difficult, if not impossible, to numerically quantify variables that represent human values or choices.

A cookie is

a file that a web site stores on a visitors computer

One of the sources of failure common to BOT the Therac25 and the Araine 5 rocket were

a reuse of software from previous versions of the system

Lee Rainie's (pew research) talk describes some factores related to internet non use

age and disability

Patents for software inventions

are collected by patent trolls

Net neutrality advocates

argue for equal treatment of all customers

IMPORTANT veil of ignorance

behind the veil a person would not know their age, sex, race, etc. and could create fair policies

Employers screening prospective employees

can protect and applicants privacy by hiring a third party company to do searches

Digital rights management

controls usage of intellectual property

A successful economy

creates more jobs than it destroys uses computers to make tasks more efficient is flexible and adaptive

when a person visits a web site their IP address and the links they click on are automatically recorded, this is an example of

data mining

In 2016 Paypal, twitter, git, airbnb and other web sites count not be accessed due to what kind of attack?

denial of service

the GNU project

developed the concept of ceopyleft was used by Linus Torvalds to run linux os started in the 1980's headed by Richard Stallman

1st amendment protections include prohibiting private businesses from curtailing free speech

false

A consensus amount respondents in the future of jobs study was that AI and machine learning could replicate virtually all human skills in the next 10 years

false

Access to and usage of the internet is relatively equal around the world

false

Broadcast media traditionally has had the strongest 1st amendment protection while print media has the weakest

false

Computers were first built in the 1950's

false

Little or no research is needed to understand whether STEM gateway courses continue to negatively impact STEM student persistence

false

Providing new technology to poor countries is a matter of having enough money to buy equipment

false

Simplifications and assumptions must not be made when designing an effective computer model

false

The US supreme court ruled that requiring content filters on public library computers was unconstitutional

false

The electronic communications privacy act prohibits employers from intercepting and reading employees stored email

false

Unemployment in the US is largely due to computers and automation

false

all peer to peer technologies were found to be illegal as a result of the napster case

false

computer profiling combines and compares information from different databases to match records

false

copyright law protects processes and inventions while patent law protects the particular expression of an idea

false

The privacy act of 1974 established rules to regulate

federal government databases onlly

Which of the following requirements was a key provision of the childrens internet protection act(CIPA)?

filtering software must be installed on internet terminals in schools and libraries

In the term j"free software" free implies all of thee following except one

free of cost

Wikipedia is

funded through donations

Ethical theories include all of these EXCEPT

governmental laws

IMPORTANT The five functions of NIST cyber security framework

identify-understand risk protect- develop and implement safegaurds detect- develop and implement activities of event respond-take action on incident recover-plan for resilience and restore capabilities

Claim rights or positive rights

impose an obligation on some people to provide certain things for others

The 1st amendment governmental regulatory framework from the 20th century has three categories, EXCEPT

internet

When a person visits a web site, their IP address and the links they click on are automatically recorded. This is an example of

invisible information gathering

One of the reasons the court ruled against Napster was

it knowingly encouraged and assisted in the infringement of copyrights

Which of the following are the 2 main arguments against the communications Decency Act accepted by the courts?

it was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children

social contract theory is best described by

justice as fairness

News publishers in the United States DO NOT need to do which of the following when their articles are available online:

make certain that all libel (written defamation) is true in order to win libel cases overseas.

If a business follows an "opt in" policy for handling personal data, information about a customer

may not be released unless the customer gives pers=mission

Wikileaks made publicd

military and diplomatic documents

The hong kong an kuala lumpur airports suffered from computer system failures on their opening days. What was to blame for these failures?

people typing in incorrecct information

Which of the following is NOT an exclusive right granted by copyright law?

profit from the work

What is the most sensible and effective way to close the digital divide in poor countries?

promote spread of mobile phones

Robots are best described as

relying on software and smart sensors

Which US group is twice as likely to never use the internet?

rural compared to urban and suburban

Anonymizers allow a user to

send email and surf the web anonymously


Set pelajaran terkait

Ap History "Industrial development"

View Set

Learning Curve 4b. Infancy and Childhood

View Set

5.2 & 10.3, Natural selection & Speciation

View Set

Cuban Missile Crisis 10 Questions

View Set

Microbiology Final Exam HW Questions

View Set