CGS chp. 6
Which of the following words is NOT part of the green computing model?
Repair
The ___ is a legal concept that grants rights and control to the owner of any published work.
copyright
A ___ is responsible for the development of computer software.
software engineer
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
true
Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.
true
Nothing posted to social media services or anywhere else on the Internet should be considered private.
true
Researchers have discovered ways to make computer chips interact with various areas of the body and brain in order to help those that suffer from conditions such as Parkinson's or blindness.
true
Today's videos games are quite complex and require programming for user interaction, realistic motion and physics, and even intelligent character behavior.
true
Top-level managers in the IT field are often given the titles of Chief Information Officer (CIO) or Chief Technology Officer (CTO).
true
Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
true
ndividuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.
true
Which of the following examples is most likely to be in the public domain?
A photo on NASA's website
__ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.
AI
Honda's ___ robot can perform a variety of activities that require a great deal of balance and range of motion.
ASIMO
Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
Ad-supported streaming
Which of the following companies sells and rents movies online?
Amazon
__ software, such as Tor, will help mask your IP address from websites.
Anonymity
Which of the following areas of research is NOT related to biotechnology?
Creating robotic caretakers
A(n) ___ license allows an author to set conditions for the free use and distribution of their work
Creative Commons
Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.
DRM
Google allows users to view and control all their data with a tool known as:
Dashboard
__ refers to the technology gap that exists between different social and economic classes.
Digital divide
_ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.
Do not track
__ is the philosophical study of morality.
Ethics
Many websites have a(n) ___ area that should be checked for common questions and their responses.
FAQ
Laws such as the Patriot Act and ___ give the U.S. government broad surveillance powers.
FISA
Biotechnology researchers have already developed techniques that can modify all of the genes of a developing embryo, effectively allowing parents to ''customize'' their child before it is born.
False
In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.
False
___ involves activities such as editing photos and designing layouts.
Graphic design
__ computing concentrates on reducing the environmental impact of computers and their widespread use.
Green
___ involves the creation or manipulation of matter at the smallest possible scale.
Nanotechnology
_ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.
Neural networks
__ occurs when an organization transfers some aspect of their business to a third party.
Outsourcing
Which of the following companies offers free, ad-supported streaming for music?
Pandora
__ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
Private browsing
__ works may be downloaded and used without obtaining permission from anyone.
Public domain
NASA's ___ robot can work alongside astronauts or perform tasks that are too dangerous for humans.
Robonaut 2
__ involves improving the ranking of a website when users enter relevant keywords in a search engine.
SEO
Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active?
Sleep
In which of the following areas are you least likely to find examples of automation?
Technical writing
__ is the process of working for a company without being physically present at the company's office.
Telecommuting
_ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
Watson
__ is the act of alerting the public about harmful activities that are being hidden by an organization.
Whistleblowing
___ is a global, online organization that offers whistleblowers an anonymous way of posting information and submitting evidence.
WikiLeaks
A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
acceptable use policy
Some licenses require that the user provide ___, or credit, to the author wherever the work is used.
attribution
Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.
business intelligence
Repeated hostile behavior with intent to psychological harm another individual is known as cyberterrorism.
false
A web developer creates and maintains websites for organizations.
true
__ occurs when computers or machines can perform the work that was once done by a human.
Automation
__ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
Biotechnology
The piracy of music and movies is often evident on file-sharing services that use the ___ protocol.
BitTorrent
Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?
Can the exposure of this information put the organization's reputation at risk?
Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?
Hibernate
Which of the following companies offers access to a large library of TV shows to users who pay a monthly subscription fee?
Hulu
__ robots are those that are created to imitate the appearance or capabilities of humans.
Humanoid
__ are responsible for managing a diverse team of IT professionals and making top-level decisions regarding the purchasing of software and hardware for an organization.
Information systems managers
Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.
NSA
__ is the act of being annoying and antagonistic in online social interactions.
Trolling
Which of the following is a popular test of a system's ability to think?
Turing test
A ___ excels when it comes to installing, configuring, and supporting computer systems.
computer support specialist
A ___ is responsible for configuring, maintaining, and securing an organization's database.
database administrator
The ability to recognize, understand, and share the feelings of others is known as:
empathy
Human ___ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.
enhancement
Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
fair use
Although unethical, there are no currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
false
Copyright protection lasts 20 years after the date of publication or release.
false
Employers generally restrict or monitor the Internet activity of their employees because the increased Internet use raises the company's ISP rates significantly.
false
Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S.
false
SEO specialists are normally sought after for their expertise in editing photos and designing layouts for websites.
false
The sleep mode on a computer generally saves more electricity than hibernate mode.
false
Online social interactions that exhibit anger and/or insults are known as:
flaming
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
footprints
Most companies have the need for a ___ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees.
help desk
The term ___ refers to the set of online behaviors that are considered polite and proper.
netiquette
A ___ is responsible for configuring and maintaining networks and communication systems.
network administrator
When companies outsource functions to another country it is referred to as:
offshoring
Many companies and individuals are going ___, which means they are using technology to lower their consumption and reliance on paper.
paperless
In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
piracy
Operating systems use ___ utilities to place computers and devices in low-power states when they are not being used.
power management
Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.
privacy policy
A(n) ___ computer can represent data in states beyond the two bits (0's and 1's) of today.
quantum
Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered ___ by the user community.
spam
A ___ specializes in developing plans and recommendations that meet the software and system needs of an organization.
systems analyst
When using a discussion forum, placing your message in the correct ___ will maximize your chances of getting a reply.
thread
Creative works such as books, songs, and photographs are protected by copyright law.
true
Employees who engage in telecommuting may find themselves working more hours, especially if their supervisor feels as if they are always ''on the clock.''
true
Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
true
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
true
Like many businesses, schools have acceptable use policies (AUPs) to describe the appropriate use of their computers.
true
Many companies are creating a position for social media strategists, which are experts in sales and marketing using the World Wide Web and social media tools.
true
Many employees, from fast-food workers to corporate executives, have been fired for something they posted online because it made their company look negative or careless in the eyes of the public.
true
Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.
true
__, which are products of the mind, can be quite valuable even though they may not always take on a physical form.
Intellectual property
__ are files that record activities and events on a computer.
Logs
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
false
Today's web browsers include a feature that will delete all of your browsing ___ with a single click.
history
Superficially, ___ can be defined as the processes used in learning, problem solving, and communication.
intelligence
It is through ___ that a copyright holder can grant usage or distribution rights to others.
licensing