CPSC 315 Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

72 Terms

1
New cards

The two principal catalysts for the Information Age have been

b. computer and communication networks

2
New cards

The calculating machine of Georg and Edvard Sheutz
a. computed the values of polynomial functions
b. typeset the results of its computations
c. performed calculations faster than they could be done manually
d. performed calculations more reliably than they could be done manually
e. All of the above

a. computed the values of polynomial functions

3
New cards

Punched card tabulation was invented by Herman Hollerith when he was an employee of
a. the Pennsylvania Railroad
b. the Census Bureau
c. the Pennsylvania Steel Company
d. the Burroughs Adding Machine Company
e. IBM

b. the Census Bureau

4
New cards

Which of the following phrases best describes a machine that inputs data, performs one or more calculations, and produces output data?
a. manual calculator
b. digital computer
c. data-processing system
d. difference engine
e. cash register

c. data-processing system

5
New cards

Software that allows multiple users to edit and run their programs simultaneously on the same computer is called
a. a data-processing system
b. an intranet
c. a microprocessor
d. a programming language
e. a time-sharing system

e. a time-sharing system

6
New cards

A semiconductor device containing transistors, capacitors, and resistors is called
a. a difference engine
b. a diode
c. an integrated circuit
d. a radio
e. a transformer

c. an integrated circuit

7
New cards

Who wrote "An Open Letter to Hobbyists," complaining about software theft?
a. Stewart Brand
b. Bob Frankston
c. Bill Gates
d. Steve Jobs
e. Steve Wozniak

c. Bill Gates

8
New cards

A key application that first made personal computers more attractive to business was
a. the spreadsheet program
b. the World Wide Web
c. desktop publishing
d. video editing
e. email

a. the spreadsheet program

9
New cards

The software company that provided IBM with the operating system for its PC was
a. Apple
b. Boeing
c. Microsoft
d. Novell
e. Tandy

c. Microsoft

10
New cards

The power of radio as a medium of mass communication was demonstrated in 1938 when OrsonWelles put on a dramatization of
a. War of the Worlds
b. Hamlet
c. Homer's Odyssey
d. the assassination of Franklin Roosevelt
e. 20,000 Leagues Under the Sea

a. War of the Worlds

11
New cards

One of the first and most important applications of the ARPANET was
a. email
b. voice mail
c. spreading computer viruses
d. disseminating anti-Communist propaganda to American citizens
e. stealing secrets from the Soviet Union

a. email

12
New cards

hat term is used to describe a high-speed Internet connection?
a. broadband
b. hypertext
c. Internet2
d. the Matrix
e. World Wide Web

a. broadband

13
New cards

A common name for a wireless Internet access point is
a. broadband hub
b. hotspot
c. Internet accessory
d. Internet café
e. Wireless Access Point (WAP)

b. hotspot

14
New cards

Enabling a single physical computer to emulate many virtual computing devices is called
a. emulation
b. extension processing
c. parallel processing
d. virtualization
e. the World Wide Web

d. virtualization

15
New cards

A Web browser enables you to
a. view Web pages
b. edit Web pages
c. create Web pages
d. delete Web pages
e. All of the above

a. view Web pages

16
New cards

A program that accepts a list of keywords and returns documents most closely matching them iscalled a(n)
a. folder
b. object-oriented database
c. relational database
d. search engine
e. Web browser

d. search engine

17
New cards

Ethical objectivism is based on the idea that
a. there are no universal moral principles
b. morality has an existence outside the human mind
c. morality and law are identical
d. there is no such thing as free will
e. God does not exist

b. morality has an existence outside the human mind

18
New cards

The divine command theory is an example of
a. relativism
b. ethical objectivism
c. ethical egoism
d. existentialism
e. materialism+

19
New cards

+=According to Kant, the moral value of an action depends upon
a. its consequences
b. the underlying moral rule
c. how closely it aligns with Biblical teachings
d. how closely it aligns with the law
e. the extent to which it produces happiness

b. the underlying moral rule

20
New cards

Utilitarianism does not mean "the greatest good of the greatest number" because
a. it is impossible to calculate "the greatest good"
b. it focuses solely on "the greatest good" and pays no attention to how "the good" is distributed
c. some people have no moral worth
d. it is impossible to maximize "the good" without ruining the environment
e. All of the above

b. it focuses solely on "the greatest good" and pays no attention to how "the good" is distributed

21
New cards

The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called
a. capitalism
b. communism
c. socialism
d. utilitarianism
e. the difference principle

e. the difference principle

22
New cards

A wiki is
a. An online encyclopedia
b. A personal journal kept on the Web
c. An electronic profile constructed automatically by a Web browser
d. A piece of software that allows ISPs to monitor who visits which Web sites
e. A Web site that allows multiple people to contribute and edit its content

e. A Web site that allows multiple people to contribute and edit its content

23
New cards

A blog is
a. a character in Lineage, a popular online game
b. a personal journal kept on the Web
c. a person who assumes a false identity in a chat room
d. a special symbol visible on displays that show Unicode characters
e. the Web version of a "couch potato"

b. a personal journal kept on the Web

24
New cards

According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when
a. the individual is breaking the law
b. it would clearly be to the benefit of the individual
c. the individual is under 18 or over 65
d. it would prevent harm to others
e. According to Mill, the government should intervene if any of the above conditions aretrue

d. it would prevent harm to others

25
New cards

What is the principal reason why point-of-sale credit card fraud has declined rapidly?
a. More people are going online to purchase major items
b. Credit cards now have embedded chips in them
c. Police are apprehending more identity thieves
d. States increased prison terms for those convicted of identity theft
e. All of the above factors have contributed to the decline in point-of-sale credit card fraud

b. Credit cards now have embedded chips in them

26
New cards

What is one reason why college students are five times more likely than other adults to be victims of identity theft?
a. Most college students use their parents' credit cards
b. Most college students have at most one personal credit card
c. College students are particularly vulnerable to phishing attacks
d. Many students live in close proximity with others and do not do a good job securing checkbooks and financial documents
e. All of the above

c. College students are particularly vulnerable to phishing attacks

27
New cards

The Enlightenment view of addiction is that
a. there is nothing wrong with addiction
b. addiction is not real
c. addiction can never be overcome by will-power alone
d. society is responsible for the bad choices people make
e. people are responsible for the choices they make

e. people are responsible for the choices they make

28
New cards

Which philosopher argued in The Second Treatise of Government that people have a natural right to property?
a. Jeremy Bentham
b. Immanuel Kant
c. John Locke
d. John Stuart Mill
e. Jean-Jacques Rousseau

c. John Locke

29
New cards

Intellectual property is a unique product of the human intellect that
a. has commercial value
b. can be reproduced digitally
c. has been produced on paper
d. can be performed in public
e. cannot be understood by anyone other than the creator

a. has commercial value

30
New cards

The value of intellectual property is recognized
a. in the Constitution of the United States
b. in the free market
c. in legislation passed by the U.S. Congress
d. through court decisions
e. All of the above

e. All of the above

31
New cards

Which of the following rights is not a right of a copyright holder?
a. The right to reproduce the copyrighted work
b. The right to distribute the work to the public
c. The right to perform the work in public
d. The right to prevent others from producing competitive works
e. The right to produce new works derived from the copyrighted work

d. The right to prevent others from producing competitive works

32
New cards

Sometimes it is legal to reproduce a copyrighted work without the permission of the copyrightholder. These circumstances are called
a. fair use
b. noncommercial use
c. piracy
d. public domain
e. reciprocity

a. fair use

33
New cards

The Audio Home Recording Act of 1992
a. protects the right of consumers to make backup copies of CDs
b. requires manufacturers of digital audio records to incorporate the Serial Copyright Management System
c. requires manufacturers of digital audio recording devices and blank digital media to pay a royalty to songwriters and music publishers
d. All of the above
e. None of the above

a. protects the right of consumers to make backup copies of CDs

34
New cards

Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of thefollowing actions is illegal?
a. Copying it onto a CD to give or sell to someone else
b. Preloading it onto the hard disk of a computer being sold
c. Distributing it over the Internet
d. All of the above are illegal
e. None of the above is illegal

d. All of the above are illegal

35
New cards

Patent-holding companies that file lawsuits to enforce their intellectual property rights are often called
a. patent blackmailers
b. patent gangsters
c. patent profiteers
d. patent trolls
e. patent zombies

d. patent trolls

36
New cards

The Linux operating system is an example of
a. free-market software
b. open-source software
c. pirated software
d. proprietary software
e. unreliable software

b. open-source software

37
New cards

The Third Amendment to the United States Constitution has to do with
a. freedom of speech and religion
b. search warrants
c. the right to bear arms
d. quartering of soldiers in private homes
e. self-incrimination

d. quartering of soldiers in private homes

38
New cards

Who wrote that every violation of a "privacy right" is also a violation of another right?
a. Stanley Benn
b. Louis Brandeis
c. Morton Levine
d. Judith Jarvis Thomson
e. Samuel Warren

d. Judith Jarvis Thomson

39
New cards

Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a
a. Constitutional right
b. legal right
c. natural right
d. prudential right
e. social right

d. prudential right

40
New cards

A public record contains information about an incident or action reported to a government agency for the purpose of
a. enhancing public safety
b. informing the public
c. protecting the innocent
d. regulating the economy
e. upholding the law

b. informing the public

41
New cards

An example of a public record is
a. a birth certificate
b. a marriage license
c. a deed to a house
d. a record of a criminal conviction
e. All of the above

e. All of the above

42
New cards

An RFID is
a. a magnetic bar code
b. a microscopic bar code
c. a wireless transmitter
d. a biometric identification devicee. a random field interferometry device

c. a wireless transmitter

43
New cards

What benefit does a company gain by allowing people to login to its app using Facebook Login?
a. It gains access to information from the consumers' Facebook profiles
b. It is paid a royalty from Facebook
c. It suffers less credit card fraud
d. It is more likely to be acquired by Facebook
e. All of the above

a. It gains access to information from the consumers' Facebook profiles

44
New cards

The OnStar system allows
a. a vehicle owner to initiate a conversation with an OnStar representative
b. the vehicle to automatically send a message to an OnStar representative after an accident
c. an OnStar representative to disable the gas pedal of the vehicle without the driver'spermission
d. a and b
e. a, b, and c+

45
New cards

+=The process of searching through many records in one or more databases looking for patterns or relationships is called
a. credit reporting
b. data mining
c. information gathering
d. microtargeting
e. pattern matching

b. data mining

46
New cards

When information collected for one purpose is put to another purpose, that is called a
a. backdoor exploit
b. collaborative filter
c. cookie
d. data leveraging opportunity
e. secondary use of the data

e. secondary use of the data

47
New cards

A policy that requires the consumer to explicitly give permission before an organization can shareinformation with another organization is called
a. fair use
b. full disclosure
c. nondisclosure
d. opt-in
e. opt-out

d. opt-in

48
New cards

The practice of mailing advertisements only to the most likely prospects is called
a. discriminatory mailing
b. focused mailing
c. mail list trimming
d. predatory mailing
e. targeted direct mail

e. targeted direct mail

49
New cards

The OneDOJ database
a. is the first database created by the U.S. government that completely implements the Code of Fair Information Practices
b. gives state and local police officers access to information provided by five federal law enforcement agencies.
c. received the endorsement of the ACLU for its innovative privacy-protection measures.
d. is a national database that consolidates records from federal, state, and local law enforcement agencies
e. combines records from all U.S. governmental agencies into a single database that can be used by data mining by the FBI

b. gives state and local police officers access to information provided by five federal law enforcement agencies.

50
New cards

What was the original purpose of Operation Shamrock?
a. Wiretap all calls made from public telephone booths.
b. Read all letters going between the United States and Ireland.
c. Intercept all international telegrams entering or leaving the United States.
d. Identify Irish-Americans raising money for the IRA.
e. Scan email messages to identify drug dealers.

c. Intercept all international telegrams entering or leaving the United States.

51
New cards

After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order?
a. Federal Bureau of Investigation
b. Department of Homeland Security
c. National Security Agency
d. Central Intelligence Agency
e. Federal Communications Commission

c. National Security Agency

52
New cards

The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent
a. during the Civil War
b. after the attack on Pearl Harbor
c. during the Vietnam War
d. during the first Gulf War
e. after September 11, 2001

b. after the attack on Pearl Harbor

53
New cards

The Internet worm was released by
a. John Barlow
b. Katie Hafner
c. John Markoff
d. Robert Morris, Jr
e. Bruce Sterling

d. Robert Morris, Jr

54
New cards

You may find a virus
a. on a CD-ROM
b. on a thumb drive
c. in an email attachment
d. on a hard disk
e. All of the above

e. All of the above

55
New cards

Sidejacking is
a. taking over a user's computer
b. illegally selling user data
c. hijacking an open web session by capturing a user's cookies
d. hacking into a mainframe

c. hijacking an open web session by capturing a user's cookies

56
New cards

Which of the following are types of malware
a. Viruses
b. Worm
c. Trojan horses
d. Rootkits
e. All of the above

e. All of the above

57
New cards

Anonymous is
a. an activist group that promotes the interests of the Recording Industry Association of America
b. a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites
c. the name given to the People's Liberation Army group that was responsible for more than100 intrusions around the world
d. the name of the group that launched the Stuxnet worm

b. a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites

58
New cards

By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to
a. reduce costs by replacing hardware safety features with software safety features
b. increase the stock price of its subsidiary Digital Equipment Corporation
c. shrink the size of the machine considerably
d. eliminate the need for lead shielding
e. All of the above

a. reduce costs by replacing hardware safety features with software safety features

59
New cards

The Patriot missile system
a. was designed to shoot down airplanes
b. failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War
c. failed because it had been left running too long
d. failed because of a computer error
e. All of the above

e. All of the above

60
New cards

The Ariane 5 satellite launch vehicle failed because
a. the rocket's on-board computer sent back faulty information to ground control, causing the human controllers to destroy the rocket
b. a bad sensor fed faulty information into the flight control computer, causing it to fail.
c. code that worked correctly on the Ariane 4 failed on the Ariane 5
d. a software failure caused the rocket to self-destruct when in actuality the rocket's flight was going perfectly
e. a faulty on-board computer caused the other computers in the network to crash repeatedly

c. code that worked correctly on the Ariane 4 failed on the Ariane 5

61
New cards

What was one of the main types of software errors for Therac-25?
a. Infinite loop
b. Index out of bounds
c. Race condition
d. Truncation
e. Stack overflow

c. Race condition

62
New cards

A computer used as a component of a larger system is called
a. an embedded system
b. a mainframe computer
c. a network
d. an operating system
e. a personal computer

a. an embedded system

63
New cards

The process giving someone the legal right to practice a profession is called
a. certification
b. licensing
c. matriculation
d. professional ethics
e. professional development

b. licensing

64
New cards

Whistle-blowers
a. make an unauthorized disclosure about a harmful situation or fraud
b. usually gain the respect and admiration of their colleagues
c. typically get promoted to management
d. are usually financially rewarded by their organizations for their integrity
e. All of the above

a. make an unauthorized disclosure about a harmful situation or fraud

65
New cards

The Software Engineering Code of Ethics and Professional Practice was developed by
a. Association for Computing Machinery
b. Institute for Electrical and Electronics Engineers
c. A consortium of computer science departments in the United States, Canada, and Mexico
d. Computer Professionals for Social Responsibility
e. Joint committee of the Association for Computing Machinery and the Institute forElectrical and Electronics Engineers

e. Joint committee of the Association for Computing Machinery and the Institute forElectrical and Electronics Engineers

66
New cards

The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice
a. address every ethical dilemma a software engineer may face
b. provide algebraic formulas for determining the best course of action
c. incorporate every relevant feature into the formulas
d. All of the above
e. None of the above

e. None of the above

67
New cards

Which of the following is not a principle of the code of ethics
a. act consistently with public interest
b. ensure products meet the highest standards
c. strive to maximize profits
d. promote effective product management
e. advance the profession

c. strive to maximize profits

68
New cards

One way automation can lead to the creation of new jobs is by
a. producing products quicker, thus shortening the work week
b. reducing the price of a product, thus increasing people's real income
c. consuming fewer resources, thus improving the environment
d. All of the above
e. None of the above - automation always causes a net loss of jobs

d. All of the above

69
New cards

Globalization is
a. the creation of international computer networks
b. the process of creating a worldwide network of businesses and markets
c. the adoption of global Internet standards
d. the adoption of English as the language of business
e. the way that stock exchanges stay open 24 hours a day

b. the process of creating a worldwide network of businesses and markets

70
New cards

The process by which a new technology is assimilated into a society is called
a. cultural relativism
b. globalization
c. IT leverage
d. social receptivity index
e. technological diffusion

e. technological diffusion

71
New cards

What is the phenomenon called when a few top performers have a disproportionate share of thewealth?
a. Survival of the fittest
b. Winner-take-all
c. Capitalism
d. Free market
e. Spoils of war

b. Winner-take-all

72
New cards

When one store stays open late to gain an advantage, its competitors begin to stay open late, too.At this point the first store is no better off than it was before, but now every store has additional expenses. This illustration is an example of a
a. capitalistic marathon
b. market economy
c. positional arms race
d. struggle for parity
e. virtual conflict

c. positional arms race