Chapter 1 Assessment

Ace your homework & exams now with Quizwiz!

Social media: prevents two-way dialog between people. is useful only for personal friendships. can't be immediate enough to react to quickly developing issues. is incorporated as part of a political strategy by many politicians.

is incorporated as part of a political strategy by many politicians. Many political issues, like Britain's Brexit vote, are fought in large part on social media battlegrounds.

Using computers and computer networks in a subversive way to promote an agenda is known as: positive psychology. natural language processing. unethical behavior. hacktivism.

hacktivism. Hacktivism (derived from hack and activism) involves using computers and computer networks in a subversive way to promote an agenda usually related to causes such as free speech, human rights, or freedom of information. Essentially, it is using computer hacking to effect some sort of social change.

All of the following are current focuses of AI research EXCEPT: perception. cognitive surplus. natural language processing. knowledge representation.

cognitive surplus. AI's central goals can be grouped into the following categories: Natural Language Processing, perception, knowledge representation, planning, problem solving, and learning.

The move toward access instead of ownership is known as: cognitive surplus. crowdfunding. collaborative consumption. data mining.

collaborative consumption. Collaborative consumption implies that we're joining together as a group to use a specific product more efficiently. We're so constantly connected with each other that we have again found the power of community. There are increasing opportunities to redistribute the things we've purchased and to share the services a product provides instead of owning it outright.

Which of the following statements is FALSE? Unethical behavior is always illegal. Life experience affects an individual's personal ethics. Individuals who have no sense of right or wrong exhibit amoral behavior. Ethical decisions are usually influenced by personal ethics.

Unethical behavior is always illegal. Unethical behavior isn't necessarily illegal. Consider the death penalty. In many U.S. states, putting convicted criminals to death for certain crimes is legal. However, many people consider it unethical to execute a human being for any reason.

Being computer literate includes being able to: avoid spam, adware, and spyware. use the web effectively. diagnose and fix hardware and software problems. All of the above

All of the above Computer literacy means you understand the capabilities and limitations of computers and you know how to use them safely and efficiently.

Intellectual property: is the result of someone's creative work and design. can be protected legally by the patent system. can include works of music, film, or engineering design. All of the above

All of the above Intellectual property is work that is the result of someone's creativity and knowledge, such as music, writing, and software, and that is protected by copyright law and documented by copyrights, patents, and trademarks.

Which of the following actions would NOT help to identify your personal ethics? Describe yourself. Conduct a genealogic study of your extended family. Identify the influences of your work environment. Prepare a list of values that are most important to you.

Conduct a genealogic study of your extended family. As discussed in the text, you can follow these steps to help yourself define a list of personal values (ethics): 1) Describe yourself, 2) List the key principles you believe in, 3) Identify external influences, 4) Consider why and 5) Prepare a statement of values.

Examples of crowdfunding and crowdsourcing include: Ushahidi and Kiva. Call-a-Bike and Zipcar. Kickstarter and ScanLife. Bing and Google.

Kickstarter and ScanLife. Crowdfunding is a way of generating capital to start a business by asking for small donations from a large number of people, often using the Internet. Websites like Kickstarter allow people to post their ideas for community projects, games, and inventions and to ask for funding directly. Crowdsourcing involves gathering opinions from large groups of people to provide better services or products. Apps like ScanLife are used to check people's opinions on the quality of items.

Bike-sharing programs like Citi Bike are an example of: crowdsourcing. a subscription style business model made possible by technology. crowdfunding. principled psychology.

a subscription style business model made possible by technology. Even the idea of ownership is evolving, thanks to new technologies. Items like cars and bikes can become "subscriptions" instead of large one-time purchases. For example, Zipcar allows hundreds of thousands of people to use shared cars, while Citi Bike facilitates the sharing of bicycles.

The branch of computer science that focuses on creating computer systems that have an ability to perform tasks that are usually associated with human intelligence and that are (or were) generally performed by humans is known as: computer vision. supervised learning. knowledge representation. artificial intelligence.

artificial intelligence. Any computer program (or computer-controlled device) that accomplishes something normally thought of as intelligence by humans is considered to have artificial intelligence.

The vast amount of both structured and unstructured data generated daily and available to businesses is known as: big data. cognitive surplus. the Digital Divide. information overload.

big data. Big data describes the vast amounts of both structured and unstructured data that is generated daily. Many AI systems can benefit from analyzing these huge data sets.

Analyzing computer systems with specific techniques designed to gather legal evidence is known as: augmentative reality. affective computing. computer forensics. data mining.

computer forensics. Computer forensics analyzes computer systems with specific techniques to gather potential legal evidence. In many cases, files, videos, and conversations conducted using a computer can be recovered by forensics specialists and can be used as evidence of criminal activity.

Sophisticated modeling software is helping international researchers: create more intricate screenplays and movie scripts. increase the pace of research in finding and producing vaccines. analyze computer systems to gather potential legal evidence. market new types of products to a wider audience.

increase the pace of research in finding and producing vaccines. With newer scientific visualization tools, scientists are developing antibodies for flu viruses and even HIV, viruses that are difficult to target because they continually change shape. Computationally intense modeling software is helping researchers increase the pace of vaccine production.

Web 2.0 has led to a shift from just consuming content toward: new standards for HTML. producing content. less sharing of the work we produce. spending all our time on leisure activities.

producing content. Web 2.0 has fostered a dramatic shift across the world, from simply consuming to having the ability to volunteer and collaborate on projects. Web 2.0 application tools have features and functionality that allow users to contribute content easily.


Related study sets

Chapter 3 GenBA 110 Stacey Lluhilier KSU

View Set

Meta Digital Marketing Associate Exam

View Set

Unit 5 - Writing formulas of Ionic Compounds

View Set

NCSBN Practice Questions 106-120

View Set