1/71
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
The two principal catalysts for the Information Age have been
computer and communication networks
The calculating machine of Georg and Edvard Sheutz
computed the values of polynomial functions
Punched card tabulation was invented by Herman Hollerith when he was an employee of
the Census Bureau
Which of the following phrases best describes a machine that inputs data, performs one or more calculations, and produces output data?
data-processing system
Software that allows multiple users to edit and run their programs simultaneously on the same computer is called
a time-sharing system
A semiconductor device containing transistors, capacitors, and resistors is called
an integrated circuit
Who wrote "An Open Letter to Hobbyists," complaining about software theft?
Bill Gates
A key application that first made personal computers more attractive to business was
the spreadsheet program
The software company that provided IBM with the operating system for its PC was
Microsoft
The power of radio as a medium of mass communication was demonstrated in 1938 when OrsonWelles put on a dramatization of
War of the Worlds
One of the first and most important applications of the ARPANET was
hat term is used to describe a high-speed Internet connection?
broadband
A common name for a wireless Internet access point is
hotspot
Enabling a single physical computer to emulate many virtual computing devices is called
virtualization
A Web browser enables you to
view Web pages
A program that accepts a list of keywords and returns documents most closely matching them is called a(n)
search engine
Ethical objectivism is based on the idea that
morality has an existence outside the human mind
The divine command theory is an example of
Ethical Objectivism
According to Kant, the moral value of an action depends upon
the underlying moral rule
Utilitarianism does not mean "the greatest good of the greatest number" because
it focuses solely on "the greatest good" and pays no attention to how "the good" is distributed
The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called
the difference principle
A wiki is
A Web site that allows multiple people to contribute and edit its content
A blog is
a personal journal kept on the Web
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when
it would prevent harm to others
What is the principal reason why point-of-sale credit card fraud has declined rapidly?
Credit cards now have embedded chips in them
What is one reason why college students are five times more likely than other adults to be victims of identity theft?
College students are particularly vulnerable to phishing attacks
The Enlightenment view of addiction is that
people are responsible for the choices they make
Which philosopher argued in The Second Treatise of Government that people have a natural right to property?
John Locke
Intellectual property is a unique product of the human intellect that
has commercial value
The value of intellectual property is recognized
All of the above
Which of the following rights is not a right of a copyright holder?
The right to prevent others from producing competitive works
Sometimes it is legal to reproduce a copyrighted work without the permission of the copyrightholder. These circumstances are called
fair use
The Audio Home Recording Act of 1992
protects the right of consumers to make backup copies of CDs
Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of the following actions is illegal?
All of the above
Patent-holding companies that file lawsuits to enforce their intellectual property rights are often called
patent trolls
The Linux operating system is an example of
open-source software
The Third Amendment to the United States Constitution has to do with
quartering of soldiers in private homes
Who wrote that every violation of a "privacy right" is also a violation of another right?
Judith Jarvis Thomson
Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a
prudential right
A public record contains information about an incident or action reported to a government agency for the purpose of
informing the public
An example of a public record is
All of the above
An RFID is
a wireless transmitter
What benefit does a company gain by allowing people to login to its app using Facebook Login?
It gains access to information from the consumers' Facebook profiles
The OnStar system allows
All of the above
The process of searching through many records in one or more databases looking for patterns or relationships is called
data mining
When information collected for one purpose is put to another purpose, that is called a
secondary use of the data
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called
opt-in
The practice of mailing advertisements only to the most likely prospects is called
targeted direct mail
The OneDOJ database
gives state and local police officers access to information provided by five federal law enforcement agencies.
What was the original purpose of Operation Shamrock?
Intercept all international telegrams entering or leaving the United States.
After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order?
National Security Agency
The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent
after the attack on Pearl Harbor
The Internet worm was released by
Robert Morris, Jr
You may find a virus
All of the above
Sidejacking is
hijacking an open web session by capturing a user's cookies
Which of the following are types of malware
All of the above
Anonymous is
a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites
By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to
reduce costs by replacing hardware safety features with software safety features
The Patriot missile system
All of the above
The Ariane 5 satellite launch vehicle failed because
code that worked correctly on the Ariane 4 failed on the Ariane 5
What was one of the main types of software errors for Therac-25?
Race condition
A computer used as a component of a larger system is called
an embedded system
The process giving someone the legal right to practice a profession is called
licensing
Whistle-blowers
make an unauthorized disclosure about a harmful situation or fraud
The Software Engineering Code of Ethics and Professional Practice was developed by
Joint committee of the Association for Computing Machinery and the Institute forElectrical and Electronics Engineers
The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice
None of the above
Which of the following is not a principle of the code of ethics
strive to maximize profits
One way automation can lead to the creation of new jobs is by
All of the above
globalization
the process of creating a worldwide network of businesses and markets
The process by which a new technology is assimilated into a society is called
technological diffusion
What is the phenomenon called when a few top performers have a disproportionate share of the wealth?
Winner-take-all
When one store stays open late to gain an advantage, its competitors begin to stay open late, too.At this point the first store is no better off than it was before, but now every store has additional expenses. This illustration is an example of a
positional arms race