Technology At Your Service Chapter 6
Copyright protection lasts for ___ years after the death of the author. 10 70 50 20
70
frequently asked questions (FAQ)
A list of common questions and their responses on a website.
information systems manager
A person responsible for managing a diverse team of IT professionals that include programmers, network administrators, and many others.
humanoid robot
A robot that is created to imitate the appearance or capabilities of humans.
authentication
A security measure used to confirm an individual's identity.
digital footprints
A trail of your data, activity, and the locations where devices are used.
__________ involves the development of intelligent systems. AI (artificial intelligence) DRM (digital rights management) SEO (search engine optimization) DBA (database administrator)
AI (artificial intelligence)
__________ occurs when computers or machines can perform the work that was once done by a human. Automation Outsourcing Offshoring Green computing
Automation
attribution
Credit to the author of a work wherever it is used.
The ___ of a website or forum contains common questions and their responses. netiquette FAQ acceptable use policy thread
FAQ
Many websites have __________ areas that should be checked for common questions and their responses. DRM (digital rights management) AUP (acceptable use policy) SEO (search engine optimization) FAQ (frequently asked questions)
FAQ (frequently asked questions)
Copyright protection lasts for approximately 15 years after the author applies for it. True False
False
For a computer, "sleep" mode uses less electricity than "hibernate" mode. True False
False
It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with. True False
False
Is it legal for a company to monitor employees while they work? Is it ethical? Defend your answers.
Legal, yes. Various court cases have demonstrated that employers are generally within their rights to restrict Internet access at work and monitor employee use of the company's computing resources. Ethical, no. Everyone generally agrees about one aspect of monitoring: Employers should always inform employees about what kind of monitoring the company will engage in. This shows respect for the employee's privacy because no one will be caught off guard by monitoring devices.
Which of the following fields involves the creation or manipulation of matter at the smallest possible scale? Biotechnology Nanotechnology Artificial intelligence Robotics
Nanotechnology
flaming
Online social interactions that exhibit anger and/or insults.
Which of the following companies does NOT offer digital movie rentals? Amazon Vudu Apple Pandora
Pandora
__________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser. Do not track Intellectual property Green computing Private browsing
Private browsing
intellectual property
Products of the mind, such as ideas, designs, and expressions of creativity, that may not have any physical form.
___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems. Software engineers Network engineers Computer support specialists Data analysts
Software engineers
Describe at least three ways in which you can recycle and reduce computing-related waste.
Some local and international programs collect old computers to be refurbished and redistributed to individuals or schools that do not have access to computers. Those centers can resell working parts and strip gold or other useful metals from components for recycling. One of the most significant activities that helps reduce waste is going paperless.
digital rights management (DRM)
Technologies used to protect copyrighted material.
Which entity passed the GDPR, which forces online companies to adhere to a list of guidelines related to the collection, use, storage, and removal of personal data? The W3C The State of Georgia The European Union The State of California
The European Union
empathy
The ability to recognize, understand, and share the feelings of others.
automation
The use of computers or machines to perform the work that was once done by a human.
Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech. True False
True
One popular test of a machine's ability to think is known as the ___ test. NAO (autonomous programmable humanoid robot) Watson Turing Hanson
Turing
Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources? acceptable use policy search policy privacy policy FAQ policy
acceptable use policy
Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used. ad-support payment attribution DRM (digital rights management)
attribution
Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as: telecomuting automation artificial intelligence Turing manufacturing
automation
The use of living organisms to manufacture new products or improve existing ones is called: human enhancement biotechnology quantum computing nanotechnology
biotechnology
Most of the ____ responsibilities are carried out by private companies, such as when YouTube removed a video that violates their terms of service. anti-piracy censorship netiquette acceptable use
censorship
Repeated hostile behavior with intent to harm another individual is known as __________.
cyber bullying
A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.
database administrator
__________ is the ability to recognize, understand, and share the feelings of others.
empathy
___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make. behavior law ethics empathy
ethics
__________ is the philosophical study of morality.
ethics
What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission? public domain intellectual property fair use DRM (digital rights management)
fair use
__________ concentrates on reducing the environmental impact of computers and their widespread use.
green computing
You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.
help desk
Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as: piracy fair use empathy IP (internet protocol)
piracy
In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator. trolling flaming piracy attribution
piracy
Online companies typically have a(n) __________ on their websites that clearly states what information is collected from users and what is done with that information.
privacy policy
Which of the following is used by many online companies to describe what information is collected from users and what is done with that information? sharing policy anonymity policy acceptable use policy privacy policy
privacy policy
Which browser feature will delete your history, cache, and cookies the moment you close the special window? masking private browsing do not track anonymity
private browsing
For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them. biotechnology nanotechnology orthoses prosthetics
prosthetics
Suppose you wanted to watch a Hollywood movie or the entire season of a TV show. List four legal ways in which you could view this content.
purchasing online digital rentals ad supported streaming subscription services
The ___ mode on a computer will place it in a low-power state when it is not being used. sign out sleep green OLPC
sleep
The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company. telecommuting outsourcing power management green computing
telecommuting
The act of alerting the public about harmful activities that are being hidden by an organization is called: whistleblowing power management green computing digital divide
whistleblowing
do not track
A browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.
hibernate
A computer state that saves electricity by copying the contents of RAM to your hard drive.
help desk
A department at a company that can repair and troubleshoot systems, as well as provide technical support to employees.
acceptable use policy (AUP)
A document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
log
A file that records activities and events.
copyright
A legal concept that grants rights and control to the owner of any published work.
Creative Commons
A license that allows authors to set conditions for the free use and distribution of their work.
biotechnology
An application of biology that uses living organisms to manufacture new products or improve existing ones.
fair use
An exception to copyright law that provides for a limited set of circumstances where others can use copyrighted material without first obtaining permission.
database administrator (DBA)
An individual who is responsible for configuring, maintaining, and securing an organization's database.
computer support specialist
An individual who is responsible for installing, configuring, and supporting computer systems.
cyberbullying
An online form of aggression that involves repeated hostile behavior with intent to harm another individual.
A(n) __________ license allows authors to set conditions for the free use and distribution of their work. public domain acceptable use DRM (digital rights management) Creative Commons
Creative Commons
___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks. Creative Commons attribution DRM (digital rights management) streaming
DRM (digital rights management)
List four ways in which technology can be integrated with biological systems to repair or improve human functions.
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them. Others act as a sort of exoskeleton that can help paralyzed individuals walk again using motorized leg attachments. Researchers have also discovered ways to make computer chips interact with various areas of the body and brain to help those who suffer from conditions such as Parkinson's or blindness. Some chips areeven able to record new memories, helping those who have suffered damage to parts of the brain or have early-stage memory loss.
artificial intelligence (AI)
Involves the development of intelligent systems or machines that possess capabilities such as learning, problem solving, and communication.
What sort of Internet surveillance does the U.S. government engage in? Name two laws that give government agencies broad surveillance powers.
Many government agencies such as the NSA and FBI monitor the Internet and mobile activities of individuals all over the world. Law enforcement can request warrants and require that online companies turn over records including your email messages, search history, and social networking activity. They can also confiscate and look through any computers belonging to suspects, including smartphones. Patriot Act Foreign Intelligence Surveillance Act (FISA)
How can your online activity affect your ability to find or maintain employment?
Many organizations do not restrict their monitoring to the workplace. They may check the public online activity of their employees for anything that could harm the company. Organizations also check online help you manage it. activity before they hire employees. Yourwords, photos, and videos can say quite abit about you. Anything you post online can affect your ability to get that initial interview.
Which of the following statements about recycling and reducing waste is FALSE? Many retailers offer recycling and trade-in programs for computers, mobile devices, and printer cartridges Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems Some organizations will refurbish computers and distribute them individuals or schools that do not have access to computers.
Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems
Which of the following statements regarding employee monitoring is FALSE? Some organizations check your online activity before they hire you Organizations may check the public, online activity of their employees for anything that could harm the company Most types of employee monitoring and internet restrictions at the work place are illegal Ethically speaking, employers should always inform employees about what kind of monitoring the company will engage in
Most types of employee monitoring and internet restrictions at the work place are illegal
Which of the following is a government agency that has the capability to monitor the internet and mobile activities of individuals? USPTO (United States Patent and Trademark Office) FISA (foreign intelligence surveillance act) NSA (National Security Agency) AUP (acceptable use policy)
NSA (National Security Agency)
List five elements that are typically found in acceptable use policies.
Outlawing the use of computing resources to commit crimes, such as hacking and piracy. Restricting particular services, such as file sharing, on their networks. Banning inappropriate and unethical behavior, and guidelines for the organization's netiquette. Stressing the importance of security, especially the creation of a strong password. Explaining the ownership and privacy of email, storage, and other resources that you have access to. Typically, companies reserve the right to monitor your email, web activity, and files stored on company equipment.
Describe three ways in which social media have been used to help bring about political or social change.
Rebels have used mobile devices and social media to coordinate their actions and receive information to aid their cause. In the United States, most politiciansnow have social media accounts and oftenengage their constituents through them. The White House even has a petition form on its website, promising to address any issue from citizens if it receives enough signatures online. Social media also receives extensive use by individuals, groups, and organizations that want to advance a social or political agenda. Whistleblowing
anonymity software
Software that helps mask your IP address from websites.
List three advantages of telecommuting.
The ability to hire or keep workers whose schedule or location would make it impossible for them to work at the company's offices. Reduced costs for office space and utilities. Improved employee morale, which can boost productivity and loyalty.
graphic design
The art or skill of editing photos and designing layouts.
attenuation
The loss of intensity and clarity of a transmitted data signal.
ethics
The philosophical study of morality.
green computing
The principle of reducing the environmental impact of computers.
censorship
The suppression or deletion of content that is considered unacceptable
digital divide
The technology gap that exists between different social and economic classes.
__________ is the act of being annoying and antagonistic in areas such as online forums. Piracy Whistleblowing Flaming Trolling
Trolling
If a company hires an outside organization to handle its accounting, it is engaged in outsourcing. True False
True
Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information? ASIMO (Advanced Step in Innovative Mobility = Honda robot) Watson Robonaut Turing
Watson
Briefly describe the four factors that must be considered for "fair use."
What is the nature of the use? Educational use and commentary are more acceptable than a for-profit use. What is the nature of the work? Copying from a news article (nonfiction) is more acceptable than copying from a popular song or major network TV show (works of fiction). How much of the work is being copied? Using only a few seconds of a song or video is more acceptable than copying the entire thing. How will the copy affect the market? If you are claiming fair use just to avoid paying for a book, song, or movie, then fair use will likely not apply. Remember, the reason for the existence of copyright law is to protect authors and allow them to profit from their creations.
__________ is the act of alerting the public about harmful activities that are being hidden by an organization. Outsourcing Whistleblowing Green computing Turing
Whistleblowing
One of the foundation blocks of intellectual property law is the __________, a legal concept that grants rights and control to the owner of any published work. copyright attribution netiquette acceptable use policy
copyright
What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs? copywrite piracy trademark patent
copywrite
___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide. cyberbullying flaming netiquette trolling
cyberbullying
The __________ refers to the technology gap that exists between different social and economic classes.
digital divide
Which of the following terms refers to the technology gap between different social and economic classes? green computing social change whistle blowing digital divide
digital divide
___ robots are those that are created to imitate the appearance or capabilities of humans. automated haptic humanoid AI
humanoid
Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.
intellectual property
Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee. FISA (foreign intelligence surveillance act) AUPs (acceptable use policy) logs digital footprints
logs
The creation or manipulation of matter at the smallest possible scale is known as: human enhancement biotechnology business intelligence nanotechnology
nanotechnology
The term __________ refers to the set of online behaviors that are considered polite and proper.
netiquette
An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as: neural network biotechnology nanotechnology automation
neural network
Today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe. legal online mobile private
online
When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party. telework outsourcing telecommuting automation
outsourcing