CPSC 315

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

73 Terms

1
New cards

Broadband

  • high speed internet connection

  • makes feasible transfer of very large files

  • growth in file-swapping growth parallels growth in broadband

2
New cards

Information age catalyst

  • low cost computers

  • high speed communication networks

3
New cards

Assembly Language

Symbolic representation of machine instructions. Programs just as long as machine language programs

4
New cards

FORTRAN

  • First higher-level language

  • Designed for scientific applications

5
New cards

COBOL

  • US Department of Defense standard

  • Designed for business applications

6
New cards

BASIC

Popular language for teaching programming

7
New cards

Transistor

Replacement for vacuum tube

8
New cards

Integrated circuit

Semiconductor containing transistors, capacitors, and resistors

9
New cards

Time Sharing systems

  • Divide computer time among multiple users

  • Users connect to computer via terminals

  • Cost of ownership spread among more people

  • Gave many more people access to computers

10
New cards

Objectivism

Morality has an existence outside the human mind

11
New cards

Examples of Objectivism

  1. Divine command theory

  2. Ethical Egoisim

  3. Kantianism

  4. Utilitarianism

  5. Social contract Theory

12
New cards

Cultural Relativism

What is right or wrong depends upon a society’s actual moral guidelines

13
New cards

Divine command theory

Good actions: those aligned with God’s will

14
New cards

Ethical Egoism

Each person should focus exclusively on his or her self-interest

15
New cards

Kantianism

Good will: the desire to do the right thing

16
New cards

Act Utilitarianism

An action is right or wrong to the extent that it increases or decreases the total happiness of the affected parties

17
New cards

Social Contract Theory

We implicitly accept a social contract

18
New cards

Rawl’s difference principle

Be the greatest benefit of the least advantaged members of society

19
New cards

Virtue Ethics

A right action is an action that a virtuous person, acting in character, would do in the same circumstance

20
New cards

Definition of a computer

Input, process, output

21
New cards

Robots

Imitate human activities

22
New cards

What made spreadsheets “killer apps” for personal computers

They enabled financial calculations and modeling to be done faster and more accurately

23
New cards

Automation increases income

By reducing repetitive labor and improving efficiency

24
New cards

Deep Blue

Defeated the world chess champion in the year 1997

25
New cards

Watson

Won Jeopardy in 2011

26
New cards

Direct censorship

  • Government monopolization

  • Prepublication review

  • Licensing and registration

27
New cards

Intellectual property

Any unique product of the human intellect that has commercial value

28
New cards

Trade Secret

Confidential piece of intellectual property that gives company a competitive advantage

29
New cards

Trademark

Identifies goods

30
New cards

Service mark

Identifies services

31
New cards

Patent

A public document that provides detailed description of invention

32
New cards

Copyright

Provides owner of an original work 5 rights

  1. Reproduction

  2. Distribution

  3. Public display

  4. Public performance

  5. Production of derivative works

33
New cards

Fair use

Sometimes legal to reproduce a copyrighted work without permission

Examples:

Sony v Universal City Studios: Time Shifting

Kelly v. Arriba Soft

34
New cards

Digital Millennium Copyright Act

Made it illegal for anyone to circumvent encryption schemes placed on digital media and copy control

35
New cards

Apple v Franklin Computer

Established that object programs are copyrightable

36
New cards

Audio Home Recording Act of 1922

Protects rights of consumers to make copies of analog or digital recordings for personal, noncommercial use

  • Backup copy

  • Give to family member

37
New cards

Illegal downloading =

Copyright violation

38
New cards

Public record

Information about an incident or action reported to a government agency for purpose of informing the public

39
New cards

Private Record

  • Credit card purchase

  • Purchase made with loyalty cards

40
New cards

OneDOJ Database

Database constructed by the US Department of Justice. Gives state and local police officers access to information provided by fiver federal law enforncement agencies

41
New cards

Federal Communications Act

Made wiretapping illegal

  • FBI continue secret wiretapping

42
New cards

Operation Shamrock

Continuation of WW2 interception of international telegrams

43
New cards

NSA access to telephone records

Foreign Intelligence Surveillance Court had ordered Verizon to provide NSA with all of its telephone metadata for 3-month period in 2013

44
New cards

Examples of information dissemination

Freedom of Information Act

45
New cards

Carpenter Ruling

The givernment generally needs a warrant based on probable cause to access a person’s cell-site location information

46
New cards

Identity Theft

When someone steals and uses your personal or financial information without permission to commit fraud or impersonate for illegal activites

47
New cards

Census Breach WW2

The US provided confidential data, including names, addresses, and ancestry to military and intelligence agencies

48
New cards

Epic v Facebook

Complaint by EPIC against Facebook for violating user privacy through deceptive practices

49
New cards

Conficker Worm

Appeared in 2008 on Windows computers. Difficult to eradicate. Millions of copies of worm are circulating. Purpose of worm still unkown

50
New cards

Botnet

Collection of bot-infected computers controlled by the same command and control program

51
New cards

Social engineering

Psychological manipulation technique used to deceive individuals into divulging confidential information

52
New cards

Antivirus

Allow computer users to detect and destroy viruses

53
New cards

Password Donts

Do not use a word from the dictionary

54
New cards

How viruses spread

  • Diskettes or CDs

  • Email

  • Files downloaded from internet

55
New cards

Patriot Missile

One battery failed to shoot at Scud that killed 28 soldiers

56
New cards

Ariane 5

40 seconds into maiden flight, the rocket self-destructed. A statement assigning a floating-point value to integer raised exception

57
New cards

Mars Climate Orbirter

Disintegrated in Martian atmosphere because Lockheed design used English units and JPL design used metric units

58
New cards

Therac-25

Hardware safety features replaced with software

59
New cards

Validation

Does the model accurately represent the real system

60
New cards

Verification

Does the program correctly implement the model?

61
New cards

Code of Ethics

  1. Act consistently with public intererst

  2. Act in best interest of client and employer

  3. Ensure products meet highest standards

  4. Maintain integrity and professional judgement

  5. Promote effective project management

  6. Advance the profession

  7. be fair to and supportive of colleagues

  8. Participate in lifelong learning

62
New cards

Characteristics of a profession

  1. Initial professional education

  2. Accreditation

  3. Skills development

  4. Certification

  5. Licensing

  6. Professional development

  7. Code of Ethics

  8. Professional society

63
New cards

Reducing winner-take-all effects

Businesses form cooperative agreements to reduce positional arms races

  • Ex: salary caps on pro sports teams

64
New cards

Employee Polygraph Protection Act

Federal law that generally prevents most private employers from using lie detector test for per-employment screening or during employment

65
New cards

Globalization

Process of creating a worldwide network of businesses and markets

66
New cards

Economy depends on

gig work

67
New cards

False Positive

The system says something is present when it actually is not

68
New cards

False Negative

The system says nothing is present when it actually is

69
New cards

Technological Diffusion

The process by which a new technology is adopted, spreads, and becomes widely used

70
New cards

Deep Linking Legality

Is legal as long as it does not involve copying, misrepresenting, or bypassing protections

71
New cards

Zombie (Bot)

A device that has been infected with malware, controlled remotely by an attacker

72
New cards

File manager

viewed as an inventory of assets

73
New cards

Chip cards reduce

Counterfeit fraud