Digital life and Intellectual Property Issues

Ace your homework & exams now with Quizwiz!

Linux was developed by Linus Torvalds in ____.

1991

In ____, the Digital Millennium Copyright Act was made law

1998

The primary advantage of optical processors is their speed. It has been estimated that optical processors have the potential to be ____ times faster than traditional electronic circuits.

500

Using thumbs for typing for long stretches of time can lead to a form of tendinitis sometimes referred to as ________ Thumb.

BlackBerry

A(n)____ display is a bulky display that makes use of a large vacuum tube in which an electron gun shoots an electron beam rapidly across a fluorescent screen to create moving images.

CRT

The Digital Millennium Copyright Act (DMCA) is a U.S. copyright law designed to reduce illegal digital media copying by criminalizing the production, distribution, and use of technologies designed to circumvent ____ technologies.

DRM

A patent protects an invention by giving the patent holder a monopoly on the use of the invention for 50 years after the patent application was submitted.

False

Although the RIAA has not engaged in lawsuits to the same extent as the MPAA, it is gradually ramping up its efforts as movie file sharing is becoming more common.

False

Each time you use software, listen to music, read a book or newspaper article, or see a movie, you are enjoying your own intellectual property.

False

FairPlay (.m4p), which is used by iTunes, plays only in approved players (Windows Media Player, Napster Player, etc.).

False

The digitization of intellectual property and widespread ____ use have made it very difficult to protect intellectual property from illegal distribution.

Internet

On June 3, 2003, the first recorded flash mob occurred when more than 100 people converged upon the ninth floor of the ____ New York City department store and gathered around a very expensive rug.

Macy's

____ refers to using digital technologies in a manner that is respectful to others.

Netiquette

____ involves the illegal copying, use, and distribution of digital intellectual property such as software, music, and movies.

Privacy

____ is a marketing method for distributing software that allows customers to use software free of charge for a limited time in order to evaluate the software and decide if they wish to purchase it.

Shareware

A copyright protects words, music, and other expressions for the life of the copyright holder plus 70 years.

True

____ computing refers to a culture where digital technologies are embedded in the environment, making interaction with the technologies second nature.

Ubiquitous

is used to store image data for a computer display in order to speed the processing and display of video and graphics images.

VRAM NOTTTTTT

DRM is typically associated with digital _____ files but is also used with other forms of online intellectual property.

audio

__________ make use of the shorter wavelength of blue light to read and write even smaller pits on the optical disc surface for higher capacity.

blu-ray dice

Software ____ consist of one or more defects or problems that prevent the software from working as intended or working at all.

bugs

In July 2005, the RIAA took action with copyright infringement lawsuits against 765 illegal file sharers, predominantly ____, and continued to file thousands of suits each year through 2008.

college students

The term ____ refers to the compulsive use of digital technologies such as the Internet, video games, online gambling, and pornography.

computer addictions

The tip in the Table: Social Media Etiquette and Safety, "Do nothing to embarrass your friends on the network" is an example of the ______ topic.

consideration

A CPU component known as the ____ sequentially accesses program instructions, decodes them, and coordinates the flow of data in different areas.

control unit

____ life refers to the influence of digital technologies on the manner in which people live their lives.

digital

Each person's ________ surpasses the amount of information that an individual person generates in a lifetime.

digital shadow

____ driving occurs when drivers focus on their cell phone or other distractions, rather than on the road, while driving.

distracted

Flash mobs organize through cell phone use, text messaging, and ____ communications.

email

Stealing others' ideas and thoughts and presenting them as your own is a serious breach of _____ matched by serious penalties if you are caught.

ethics

Copy and Paste makes plagiarizing from the web and other digital sources incredibly easy, and therefore ethical.

false

Ecommerce enables mobile phones to be used to purchase merchandise and services online as well as in person.

false

Frame is a pair of lens-free glasses that hold a small transparent display that sits just above one eye.

false

It has been estimated that 52% of Internet content is pornography.

false

Most accidents are the result of texting while driving.

false

Notebook computers, cell phones, and other mobile devices have the same ergonomic issues as a desktop computer.

false

Repetitive stress injury (RSI)is the aggravation of the pathway for nerves that travel through the wrist, typically caused by long hours at the computer keyboard with wrists cocked and fingers typing.

false

The DMCA was designed to implement treaties signed in December 2006 at the United States Intellectual Property Organization conference in Washington, D.C.

false

The average professional spends roughly 42% of his or her week managing email.

false

Users should not go out of their way to be courteous and respectful to others online.

false

Very few of today's relationships are maintained more through electronic than face-to-face communications.

false

Radio ____ ID chips are embedded in products and everyday objects, giving them the ability to connect to networks and other devices to provide information and services.

frequency

Keyboards and mice are examples of a(n) ____ I/O device.

general-purpose

Ergonomics is the study of designing the work environment and positioning computer equipment in a ____ manner.

healthy

An Apple application software used for instant messaging with or without videos is ______.

iChat

One of the greatest challenges of the _____ age is managing the huge and growing amount of data collected from every transaction and activity taking place online.

information

Digital rights management, or DRM, is technology that protects digital forms of _______ property by restricting the number of devices and applications on which a file can be opened, and the number of times that the file can be copied and burned to disk.

intellectual

An application programming ____ is a set of programming tools provided to access an operating system or online service in order to create software based on that operating system or online service

interface

The slope of the __________, the position and design of display screens, and the placement and design of computer tables and chairs have been carefully studied.

keyboard

Intellectual property rights concern the _____ ownership and use of intellectual property such as software, music, movies, data, and information.

legal

When installing an application, you will probably be asked to agree to the terms of the software ____.

license

A ________ defines exclusive rights legally granted to the owner.

mandate NOTTTT

The FSB connects the CPU to the ____, a memory controller hub that controls access to primary storage (RAM), and graphics systems.

north bridge

In 2006, President Bush signed the Unlawful Internet Gambling Enforcement Act, which makes it illegal for U.S. citizens to gamble ______ no matter where the online casino is located

on the internet

The boot sequence for a standard PC includes which of the following steps?

perform power-on self test (POST)

_______ networks—especially cellular and other wireless networks—allow people to access all kinds of information, services, and entertainment, and to communicate with friends and colleagues anywhere and any time.

persuasive

A mouse is an example of a(n) ____ device.

pointing

Video memory is ____ on most desktop PCs.

provided a video or graphics card

Tape is a type of secondary storage that can be classified as _____ access.

sequential

When reading data from or writing data onto a disk, the computer can go directly to the desired place of data by positioning the read/write head over the proper track of the revolving disk, making the disk a ____ storage medium.

sequential access NOTTTTTTT

Within the computer industry, programmers are often called ____.

software engineers

Repetitive ____ injury occurs when a particular physical motion is repeated frequently, to the point of injury.

stress

A Google search reveals many anti-DMCA websites and organizations.

true

A balanced life includes technology time and time away from technology; time alone and time spent in the company of others; time on the phone and time in face-to-face interaction; as well as time indoors and time with nature.

true

A flash mob is a group of people who assemble suddenly in a public place, do something unusual, and then disperse, in order to gain attention or to create confusion and sometimes amusement.

true

Balancing the benefits of digital technologies against the costs, and determining which outweighs the other, is a highly personal and subjective but important activity for individuals and our society.

true

Because DRM has become extremely unpopular with consumers, most recording companies and music distributors have begun selling music without embedded DRM technology

true

Cell phone users should be mindful not to inconvenience or disturb those around them.

true

Citizens benefit from the use of technologies in law enforcement to create safer living conditions, but might pay a price in terms of personal privacy

true

Digital life and ubiquitous computing and communications mean that people are spending increasing amounts of time online.

true

Ergonomics studies all possible ill effects of digital technologies on your body and recommends ways to avoid them.

true

Flexibility is a major component of ergonomics and an important feature of computer devices.

true

Many businesses collect more digital data than they can possibly utilize.

true

Microsoft's WMA and Apple's AAC file formats include DRM technology.

true

People are spending more time interacting with each other through digital technologies.

true

Pervasive computing refers to the ability to access computing and information technologies at any time, in any place.

true

Plagiarism has been an issue of legal and social concern for as long as people have produced intellectual property.

true

Public and private kiosks provide special services to pedestrians and customers from embedded computer terminals.

true

Software such as Turnitin and iThenticate is used by many high school and college teachers to find instances of plagiarism in electronically submitted homework files.

true

Some gamers find the virtual worlds of online games more interesting and rewarding than real life and spend increasing amounts of time in virtual worlds.

true

The Prioritizing Resources and Organization for Intellectual Property Act of 2007, which was signed into law, increases civil and criminal penalties for copyright infringers.

true

The RIAA has been successful in shutting down or helping to shut down most P2P services.

true

The U.S. Department of Transportation has banned texting while driving for all U.S. commercial truck drivers.

true

The music, motion picture, and software industries claim to be losing billions of dollars in sales to piracy

true

The solution to avoiding repetitive stress injury is to carefully gauge the amount of time spent carrying out repetitive motions, take frequent short breaks or change positions, and practice ergonomic methods for reducing strain on the body.

true

Virtual communities and "anywhere-anytime" communications are also affecting traditional social mechanisms.

true

Working and living with computers and digital technologies can lead to potential health problems.

true

Dialing a mobile phone while driving is dangerous enough, but ______ or reading text messages takes drivers' eyes off the road for several seconds at a time.

typing

The amount of digital information in existence surpassed a _____ in 2010.

zetabyte


Related study sets

Chapter 16: Nursing Management During the Postpartum Period

View Set

Chapter 16 - Retailing and Omnichannel Marketing

View Set

NJ Laws, Rules, and Regulations Common to Life, Accident, and Health Property and Casualty

View Set

Medicine Bag CommonLit Questions & A Worn Path (English Week 17, Module 5)

View Set

LIVESTOCK PRODUCTION FALL REVIEW

View Set

ACSR 9 - Marine Coverage, Commercial Excess and Umbrella Liability

View Set