JPO Final
The field of collecting evidence from computer files and disks is called cybersecurity.
False
The main reason employers have a policy that employees may not install any software on their work computers other than what the employer provides is to save space.
False
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:
Honey Pots
In the context of privacy issues, personal information includes any information relating to, or traceable to, an individual person.
True
It's usual for entrepreneurs to work a lot of extra hours to make their businesses successful.
True
Nowadays, operating systems for smartphones, tablets, and some computers have kill switches.
True
Prosecutors dropped charges against the person reponsible for releasing the ILOVEYOU virus in 2000 because the Philippines had no law against releasing a virus at that time.
True
Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.
True
Secondary Use is the use of personal information for a purpose other than the one for which the person supplied it.
True
Skimmers can be installed inside card readers in stores, gas stations, and restaurants to collect debit card numbers.
True
The Communications Decency Act (CDA) of 1996 was found to be unconstitutional due to conflicts with the first amendment.
True
The Electronic Communication Privacy Act (ECPA) does not restrict corporations from reading employees email on company systems.
True
The protection of criminal and antisocial activities, fraud, harassment, and extortion are examples of negative uses of anonymity.
True
Therac-25 - A computerized machine that gave lethal radiation overdoses to some cancer patients.
True
U.S. v. Jones was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
True
One of the reasons for the delay in the Denver baggage system was insufficient time for development and testing.
True. The time allowed for development and testing of the system was insufficient. Denver made significant changes in specifications after the project began.
If a business follows an "opt-in" policy for handling personal data, information about a customer
may not be released unless the customer gives permission. Under an opt-in policy, the collector of the information may not use it for certain secondary uses unless the person explicitly checks or clicks a box or signs a form permitting the use.
How can you increase your business and entrepreneurial potential? (Select all that apply)
-Business Knowledge -Financial Skills. -Career Exploration. -Community Awareness -Education -Relationships
The freedom of speech guidelines that are used in court to help determine if a censorship law is constitutional include all of the following
-Distinguish speech from action. Advocating illegal acts is (usually) legal. -Laws must not chill expression of legal speech. -Do not reduce adults to reading only what is fit for children. -Solve speech problems by the least restrictive means.
Which of the following reflects the impact that computing technology has on employment?
-Job Destruction and Creation -Changing Skills and Skill Levels
Which of these are factors related to computer system errors?
-Overconfidence -Reuse of software:
From the list, select all people that are known to be entrepreneurs.
-Thomas Edison -P.T. Barnum -Wlliam Harley & Arthur Davidson -Maggie Lena Walker -Ingvar Kamprad -Stephen Wozniak and Steve Jobs -Russell Simmons -Dinah Mohajer
Fair use
1. The purpose and nature of the use, for example, whether it is for commercial or educational purposes (commercial use is less likely to be fair use) or whether it transforms the copied work to something new or simply reproduces it. 2. The nature of the copyrighted work. (Use of creative work, such as a novel, is less likely than use of factual work to be fair use.) 3. The size and significance of the portion used. 4. The effect of the use on the potential market for or value of the copyrighted work. (Uses that reduce sales of the original work are less likely to be considered fair.)
When was the first U.S. copyright law passed?
1790
When a government action or law causes people to avoid legal speech and publication out of fear of prosecution.
Chilling effect
What is self-assessment?
Evaluating your strengths and weaknesses— is an important part of becoming an entrepreneur.
Changes in technology do not have any impact in society.
False
"Net Neutrality" refers to the development of similar laws related to the internet in different countries.
False. "Net neutrality" refers to a variety of proposals for restrictions on how telecommunications companies interact with their broadband customers.
Independeny verification and validation (IV&V) means that the software developers test their own system for errors.
False. An independent company tests and validates the software
The crash of American Airlines flight 965 near Cali, Colombia was caused by a problem with the engine.
False. It was the inconsistent and unclear interface.
Napster was not responsible for copyright infringement because it did not keep copies of songs on its computers.
False. Napster did not take sufficient steps to eliminate unauthorized songs or users who committed violations.
The supreme court ruled that The Children's Internet Protection Act of 2000 (CIPA) violates the first amendment due to the installation of filtering software.
False. The Supreme Court ruled that CIPA does not violate the First Amendment.
Based on a California Law, in 2011, the supreme court was successful in banning the sale or rental of violent video games to minors because of the impact these games could have on children.
False. The Supreme Court ruled that the law violated the First Amendment
Under the concept of copyleft, a programmer who develops a new program from a copylefted work can add restrictions that limit its use.
False. Under copyleft, the developer copyrights the program and releases it under an agreement that allows people to use, modify, and distribute it, or any program developed from it, but only if they apply the same agreement to the new work.
An attitude is a natural ability to do a particular type of work or activity well.
False. An attitude is a way of viewing or thinking about something that affects how you feel about it.
Telemedicine refers to the video broadcast of medical procedures for educational purposes.
False. Telemedicine, or long-distance medicine, refers to remote performance of medical exams, consultations, monitoring, analyses, and procedures using specialized equipment and computer networks.
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?
Profit from the work.
When an entrepreneur starts a new business, risk is involved. What is risk?
Risk is the chance of losing something.
From an employer's perspective, the most serious risk for using personal accounts or personal devices for work is:
Security.
What is an Entrepreneur?
Someone who creates and runs a business.
Which of the following is not a factor specified in U.S. copyright law for determining fair use?
The for-profit or non-profit status of the copyright holder
Offshoring
The practice of hiring companies or employees in other countries is known as:
Biometrics
They include fingerprints, voice prints, face structure, hand geometry, eye (iris or retina) patterns, and DNA.
The Communications Assistance for Law Enforcement Act (CALEA) said that
This law requires that the design of telecommunications equipment ensure that the government can intercept telephone calls (with a court order or other authorization).
64% of business owners had some college education then they started their business
True
According to a survey by the U.S. Census Bureau, slightly more than half of the business owners who had employees work overtime (more than 40 hours a week).
True
An attitude is a way of viewing or thinking about something that affects how you feel about it. Entrepreneurs tend to be people with positive attitudes
True
Digital Rights Management (DRM) technologies are a collection of techniques that control access to and uses of intellectual property in digital formats.
True
E-Verify is a system that uses data from the Social Security Administration and the Department of Homeland Security to check on a job applicant's legal status.
True
Ethics is the study of what it means to "do the right thing"
True
Hacktivism is the use of hacking to promote a political cause.
True
Socialbot
________________ is an artificial intelligence program that simulates a human being in a social media.
Telecommuting
__________________ means to work for an employer at a computer-equipped space in the employee's home.
In the early days (1960's to the early 1970's), a "hacker" was:
a creative programmer who wrote very elegant and clever programs
Which of the following limits deceptive commercial email and outlines spammer's responsibilities:
the CAN-SPAM Act