CPSC Final 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

72 Terms

1
New cards

The two principal catalysts for the Information Age have been

computer and communication networks

2
New cards

The calculating machine of Georg and Edvard Sheutz

computed the values of polynomial functions

3
New cards

Punched card tabulation was invented by Herman Hollerith when he was an employee of

the Census Bureau

4
New cards

Which of the following phrases best describes a machine that inputs data, performs one or more calculations, and produces output data?

data-processing system

5
New cards

Software that allows multiple users to edit and run their programs simultaneously on the same computer is called

a time-sharing system

6
New cards

A semiconductor device containing transistors, capacitors, and resistors is called

an integrated circuit

7
New cards

Who wrote "An Open Letter to Hobbyists," complaining about software theft?

Bill Gates

8
New cards

A key application that first made personal computers more attractive to business was

the spreadsheet program

9
New cards

The software company that provided IBM with the operating system for its PC was

Microsoft

10
New cards

The power of radio as a medium of mass communication was demonstrated in 1938 when OrsonWelles put on a dramatization of

War of the Worlds

11
New cards

One of the first and most important applications of the ARPANET was

email

12
New cards

hat term is used to describe a high-speed Internet connection?

broadband

13
New cards

A common name for a wireless Internet access point is

hotspot

14
New cards

Enabling a single physical computer to emulate many virtual computing devices is called

virtualization

15
New cards

A Web browser enables you to

view Web pages

16
New cards

A program that accepts a list of keywords and returns documents most closely matching them is called a(n)

search engine

17
New cards

Ethical objectivism is based on the idea that

morality has an existence outside the human mind

18
New cards

The divine command theory is an example of

Ethical Objectivism

19
New cards

According to Kant, the moral value of an action depends upon

the underlying moral rule

20
New cards

Utilitarianism does not mean "the greatest good of the greatest number" because

it focuses solely on "the greatest good" and pays no attention to how "the good" is distributed

21
New cards

The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called

the difference principle

22
New cards

A wiki is

A Web site that allows multiple people to contribute and edit its content

23
New cards

A blog is

a personal journal kept on the Web

24
New cards

According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

it would prevent harm to others

25
New cards

What is the principal reason why point-of-sale credit card fraud has declined rapidly?

Credit cards now have embedded chips in them

26
New cards

What is one reason why college students are five times more likely than other adults to be victims of identity theft?

College students are particularly vulnerable to phishing attacks

27
New cards

The Enlightenment view of addiction is that

people are responsible for the choices they make

28
New cards

Which philosopher argued in The Second Treatise of Government that people have a natural right to property?

John Locke

29
New cards

Intellectual property is a unique product of the human intellect that

has commercial value

30
New cards

The value of intellectual property is recognized

All of the above

31
New cards

Which of the following rights is not a right of a copyright holder?

The right to prevent others from producing competitive works

32
New cards

Sometimes it is legal to reproduce a copyrighted work without the permission of the copyrightholder. These circumstances are called

fair use

33
New cards

The Audio Home Recording Act of 1992

protects the right of consumers to make backup copies of CDs

34
New cards

Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of the following actions is illegal?

All of the above

35
New cards

Patent-holding companies that file lawsuits to enforce their intellectual property rights are often called

patent trolls

36
New cards

The Linux operating system is an example of

open-source software

37
New cards

The Third Amendment to the United States Constitution has to do with

quartering of soldiers in private homes

38
New cards

Who wrote that every violation of a "privacy right" is also a violation of another right?

Judith Jarvis Thomson

39
New cards

Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a

prudential right

40
New cards

A public record contains information about an incident or action reported to a government agency for the purpose of

informing the public

41
New cards

An example of a public record is

All of the above

42
New cards

An RFID is

a wireless transmitter

43
New cards

What benefit does a company gain by allowing people to login to its app using Facebook Login?

It gains access to information from the consumers' Facebook profiles

44
New cards

The OnStar system allows

All of the above

45
New cards

The process of searching through many records in one or more databases looking for patterns or relationships is called

data mining

46
New cards

When information collected for one purpose is put to another purpose, that is called a

secondary use of the data

47
New cards

A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called

opt-in

48
New cards

The practice of mailing advertisements only to the most likely prospects is called

targeted direct mail

49
New cards

The OneDOJ database

gives state and local police officers access to information provided by five federal law enforcement agencies.

50
New cards

What was the original purpose of Operation Shamrock?

Intercept all international telegrams entering or leaving the United States.

51
New cards

After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order?

National Security Agency

52
New cards

The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent

after the attack on Pearl Harbor

53
New cards

The Internet worm was released by

Robert Morris, Jr

54
New cards

You may find a virus

All of the above

55
New cards

Sidejacking is

hijacking an open web session by capturing a user's cookies

56
New cards

Which of the following are types of malware

All of the above

57
New cards

Anonymous is

a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites

58
New cards

By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to

reduce costs by replacing hardware safety features with software safety features

59
New cards

The Patriot missile system

All of the above

60
New cards

The Ariane 5 satellite launch vehicle failed because

code that worked correctly on the Ariane 4 failed on the Ariane 5

61
New cards

What was one of the main types of software errors for Therac-25?

Race condition

62
New cards

A computer used as a component of a larger system is called

an embedded system

63
New cards

The process giving someone the legal right to practice a profession is called

licensing

64
New cards

Whistle-blowers

make an unauthorized disclosure about a harmful situation or fraud

65
New cards

The Software Engineering Code of Ethics and Professional Practice was developed by

Joint committee of the Association for Computing Machinery and the Institute forElectrical and Electronics Engineers

66
New cards

The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice

None of the above

67
New cards

Which of the following is not a principle of the code of ethics

strive to maximize profits

68
New cards

One way automation can lead to the creation of new jobs is by

All of the above

69
New cards

globalization

the process of creating a worldwide network of businesses and markets

70
New cards

The process by which a new technology is assimilated into a society is called

technological diffusion

71
New cards

What is the phenomenon called when a few top performers have a disproportionate share of the wealth?

Winner-take-all

72
New cards

When one store stays open late to gain an advantage, its competitors begin to stay open late, too.At this point the first store is no better off than it was before, but now every store has additional expenses. This illustration is an example of a

positional arms race