1/72
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Broadband
high speed internet connection
makes feasible transfer of very large files
growth in file-swapping growth parallels growth in broadband
Information age catalyst
low cost computers
high speed communication networks
Assembly Language
Symbolic representation of machine instructions. Programs just as long as machine language programs
FORTRAN
First higher-level language
Designed for scientific applications
COBOL
US Department of Defense standard
Designed for business applications
BASIC
Popular language for teaching programming
Transistor
Replacement for vacuum tube
Integrated circuit
Semiconductor containing transistors, capacitors, and resistors
Time Sharing systems
Divide computer time among multiple users
Users connect to computer via terminals
Cost of ownership spread among more people
Gave many more people access to computers
Objectivism
Morality has an existence outside the human mind
Examples of Objectivism
Divine command theory
Ethical Egoisim
Kantianism
Utilitarianism
Social contract Theory
Cultural Relativism
What is right or wrong depends upon a society’s actual moral guidelines
Divine command theory
Good actions: those aligned with God’s will
Ethical Egoism
Each person should focus exclusively on his or her self-interest
Kantianism
Good will: the desire to do the right thing
Act Utilitarianism
An action is right or wrong to the extent that it increases or decreases the total happiness of the affected parties
Social Contract Theory
We implicitly accept a social contract
Rawl’s difference principle
Be the greatest benefit of the least advantaged members of society
Virtue Ethics
A right action is an action that a virtuous person, acting in character, would do in the same circumstance
Definition of a computer
Input, process, output
Robots
Imitate human activities
What made spreadsheets “killer apps” for personal computers
They enabled financial calculations and modeling to be done faster and more accurately
Automation increases income
By reducing repetitive labor and improving efficiency
Deep Blue
Defeated the world chess champion in the year 1997
Watson
Won Jeopardy in 2011
Direct censorship
Government monopolization
Prepublication review
Licensing and registration
Intellectual property
Any unique product of the human intellect that has commercial value
Trade Secret
Confidential piece of intellectual property that gives company a competitive advantage
Trademark
Identifies goods
Service mark
Identifies services
Patent
A public document that provides detailed description of invention
Copyright
Provides owner of an original work 5 rights
Reproduction
Distribution
Public display
Public performance
Production of derivative works
Fair use
Sometimes legal to reproduce a copyrighted work without permission
Examples:
Sony v Universal City Studios: Time Shifting
Kelly v. Arriba Soft
Digital Millennium Copyright Act
Made it illegal for anyone to circumvent encryption schemes placed on digital media and copy control
Apple v Franklin Computer
Established that object programs are copyrightable
Audio Home Recording Act of 1922
Protects rights of consumers to make copies of analog or digital recordings for personal, noncommercial use
Backup copy
Give to family member
Illegal downloading =
Copyright violation
Public record
Information about an incident or action reported to a government agency for purpose of informing the public
Private Record
Credit card purchase
Purchase made with loyalty cards
OneDOJ Database
Database constructed by the US Department of Justice. Gives state and local police officers access to information provided by fiver federal law enforncement agencies
Federal Communications Act
Made wiretapping illegal
FBI continue secret wiretapping
Operation Shamrock
Continuation of WW2 interception of international telegrams
NSA access to telephone records
Foreign Intelligence Surveillance Court had ordered Verizon to provide NSA with all of its telephone metadata for 3-month period in 2013
Examples of information dissemination
Freedom of Information Act
Carpenter Ruling
The givernment generally needs a warrant based on probable cause to access a person’s cell-site location information
Identity Theft
When someone steals and uses your personal or financial information without permission to commit fraud or impersonate for illegal activites
Census Breach WW2
The US provided confidential data, including names, addresses, and ancestry to military and intelligence agencies
Epic v Facebook
Complaint by EPIC against Facebook for violating user privacy through deceptive practices
Conficker Worm
Appeared in 2008 on Windows computers. Difficult to eradicate. Millions of copies of worm are circulating. Purpose of worm still unkown
Botnet
Collection of bot-infected computers controlled by the same command and control program
Social engineering
Psychological manipulation technique used to deceive individuals into divulging confidential information
Antivirus
Allow computer users to detect and destroy viruses
Password Donts
Do not use a word from the dictionary
How viruses spread
Diskettes or CDs
Files downloaded from internet
Patriot Missile
One battery failed to shoot at Scud that killed 28 soldiers
Ariane 5
40 seconds into maiden flight, the rocket self-destructed. A statement assigning a floating-point value to integer raised exception
Mars Climate Orbirter
Disintegrated in Martian atmosphere because Lockheed design used English units and JPL design used metric units
Therac-25
Hardware safety features replaced with software
Validation
Does the model accurately represent the real system
Verification
Does the program correctly implement the model?
Code of Ethics
Act consistently with public intererst
Act in best interest of client and employer
Ensure products meet highest standards
Maintain integrity and professional judgement
Promote effective project management
Advance the profession
be fair to and supportive of colleagues
Participate in lifelong learning
Characteristics of a profession
Initial professional education
Accreditation
Skills development
Certification
Licensing
Professional development
Code of Ethics
Professional society
Reducing winner-take-all effects
Businesses form cooperative agreements to reduce positional arms races
Ex: salary caps on pro sports teams
Employee Polygraph Protection Act
Federal law that generally prevents most private employers from using lie detector test for per-employment screening or during employment
Globalization
Process of creating a worldwide network of businesses and markets
Economy depends on
gig work
False Positive
The system says something is present when it actually is not
False Negative
The system says nothing is present when it actually is
Technological Diffusion
The process by which a new technology is adopted, spreads, and becomes widely used
Deep Linking Legality
Is legal as long as it does not involve copying, misrepresenting, or bypassing protections
Zombie (Bot)
A device that has been infected with malware, controlled remotely by an attacker
File manager
viewed as an inventory of assets
Chip cards reduce
Counterfeit fraud