Term
When a person visit the website his or her IP and the links here she clicked on are automatically recorded. This is an example of what? |
|
Definition
invisible information gathering |
|
|
Term
What does it mean If a business follows an opt-in policy |
|
Definition
information may not be released unless the customer gives permission |
|
|
Term
|
Definition
the phone number from which an incoming call was made |
|
|
Term
what does the communications assistance for law enforcement act say |
|
Definition
telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) |
|
|
Term
Which of the following requirements was a key provisions of the children's Internet Protection Act? |
|
Definition
Filtering software must be installed on internet terminals in schools and libraries |
|
|
Term
Anonymizer.com provides tools and services to do what? |
|
Definition
send email and surf the Web anonymously |
|
|
Term
Which of the following are the two main arguments against Communications Decency Act accepted by the courts? |
|
Definition
It was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children |
|
|
Term
Which of the following is not an exclusive right granted by copyright law? |
|
Definition
|
|
Term
Which of the following is not a factor in determining fair use? |
|
Definition
The for profit or nonprofit status of the copyright holder |
|
|
Term
In the term “free software”, “free” implies what? |
|
Definition
free of cost free to copy free to modify |
|
|
Term
One of the reasons the Court ruled against Napster was what? |
|
Definition
it knowingly encouraged and assisted in the infringement of copyright |
|
|
Term
|
Definition
Deontological, theories, utilitarianism, right wrong and ok |
|
|
Term
True or False Computer Science is in a continual flux as technologies, infrastructures, and society concerns evolve. Continuous learning on your part to keep up with these developments is necessary to succeed in the workplace at our field continues to evolve. |
|
Definition
|
|
Term
In January 2000 Yahoo!, eBay Amazon E*Trade, and other websites were shut down for what kind of attack? |
|
Definition
|
|
Term
|
Definition
voicemail interception of famous and others by tabloids |
|
|
Term
What is the First Amendment |
|
Definition
free speech part of this constitutional amendment |
|
|
Term
The Fourth Amendment is the protection against what? |
|
Definition
unreasonable search and seizure part of this u.s. constitutional amendment |
|
|
Term
What is Surveillance technology |
|
Definition
pervasive camera systems used at many sites such as ATM's and nau engineering to track thieves. You can also be used to track employees coming to or leaving work. |
|
|
Term
File sharing: MGM v. Grokster |
|
Definition
Supreme Court ruled that intellectual property owners could sue the companies for encouraging copyright infringement |
|
|
Term
|
Definition
|
|
Term
|
Definition
Speech by US Secretary of State Hillary Clinton on the importance of an Internet where information flows freely across international borders freedom of expression and enabling economic success |
|
|
Term
|
Definition
Google and YouTube can choose to take down certain user generated content in countries that may spark controversy or unrest |
|
|
Term
|
Definition
Add-on for Firefox that allows you to see all the third parties that are tracking your movements across the web |
|
|
Term
|
Definition
Law Firm emphasized it that has become tougher today to protect your intellectual property |
|
|
Term
Define ethics in your own words |
|
Definition
moral principles that govern a person's or group's behavior |
|
|
Term
What is the difference between positive and negative rights |
|
Definition
A negative right is a right not to be subjected to an action of another person or group; negative rights permit or oblige inaction.
A positive right is a right to be subjected to an action or another person or group; positive rights permit or oblige action |
|
|
Term
In terms of privacy describe the concept of secondary use and give an example |
|
Definition
a use which, though executed, may change from one to another by circumstances. |
|
|
Term
Describe copyright law and the kind of intellectual property that it protects |
|
Definition
Copyright protects original works of authorship |
|
|
Term
Describe patent law and the kind of intellectual property that it protects |
|
Definition
a patent provides, from a legal standpoint, the right to exclude others[17] from making, using, selling, offering for sale, or importing the patented invention for the term of the patent
A patent is a limited property right |
|
|
Term
Describe the fair use doctrine |
|
Definition
permits limited use of copyrighted material without acquiring permission from the rights holders |
|
|
Term
|
Definition
Digital Millennium Copyright Act |
|
|
Term
Can computer software be copyrighted |
|
Definition
Yes, but it is hard to do. |
|
|
Term
What is your expectation of privacy in the workplace? More specifically do you expect your employer to grant you the same privacy as you would expect at home? |
|
Definition
|
|
Term
You saw case study presentations by your peers addressing often controversial topics. Besides your own presentation which presentation really hit home. |
|
Definition
|
|
Term
Which of the following is an example of biometrics |
|
Definition
DNA, fingerprints, and voice prints |
|
|
Term
Software that monitors in coming communications and filters out those that are from untrusted sites or fit a profile suspicious activity is called |
|
Definition
|
|
Term
In the early days of computing 1960s to the early 1970s a hacker was? |
|
Definition
a creative programmer who wrote very elegant or clever programs |
|
|
Term
Dishonest sellers using online auction site sometimes will bid on their own items to drive up the price this practice is known as |
|
Definition
|
|
Term
The hacker group that broke into the BellSouth computers in the late 1980s was known as |
|
Definition
|
|
Term
|
Definition
is the use of hacking to promote a political cause |
|
|
Term
Websites that look attractive to hackers but are closely monitored so that everything the hacker does at the site is recorded and studied are known as |
|
Definition
|
|
Term
Collecting evidence from computer files and disks is called |
|
Definition
|
|
Term
Types of malicious programs used by hackers to gain access to your computer |
|
Definition
Key loggers, remote access Trojans, and bots |
|
|
Term
True or false? Computer science careers are always advertised as software engineers |
|
Definition
|
|
Term
True or False With the terrific nau computer science program in which you are participating you will not have to learn any new languages systems are tools when you move into industry |
|
Definition
|
|
Term
True or False If you make a choice of a technical or management role in computer science it is pretty much a one-way street making it difficult for you to go back once you make up your mind |
|
Definition
|
|
Term
True or False Job interviews today are as much technical as behavioral |
|
Definition
|
|
Term
True or False to get start in your computer science where you often may have a first assignment to update maintain or even reengineer someone else's code |
|
Definition
|
|
Term
The digital divide is what? |
|
Definition
the participation of large computer companies as well as nonprofits |
|
|
Term
Censorship and political freedom |
|
Definition
A problem even with the World Wide Web
Similar restrictions as with other media
The global nature of the net makes it easier for one nation to impose restrictive standards on others |
|
|
Term
|
Definition
The direction we are heading
Present some coordination challenges for multinational companies
Can cause ethical issues related to offshoring of work |
|
|
Term
|
Definition
Can find Users alienated from a website due to cultural differences
Often requires building a language database that installations at various countries goes smoothly
Typically requires international usability testing |
|
|
Term
To conduct international usability testing |
|
Definition
You can go to the country yourself You can perform it remotely Can hire local usability consultant You can have the work performed by your local branch office |
|
|
Term
In one application of a voice recognition system the system failed to recognize female speakers I likely reason was |
|
Definition
The program was primarily developed and tested by men |
|
|
Term
Which of the following is not a principle for producing good systems? |
|
Definition
Overestimate the cost and time a project will take |
|
|
Term
The ACM code of ethics include |
|
Definition
Students, working professionals and computer science researchers Question is discussed in this chapter these scenarios of professional ethics discussed are not as easy as they seem to resolve |
|
|
Term
The ethics that are discussed for the different scenarios of professional ethics discussed in the powerpoints |
|
Definition
are not as easy as they seem to resolve |
|
|
Term
True or False The digital revolution refers to the advancement of technology from analog electronic and mechanical devices to the digital technology available today |
|
Definition
|
|
Term
A day made of glass 2 show these new technologies |
|
Definition
The smart kitchen appliances and surfaces are all connected. Smooth integration between the automobile and other computer devices. Illustrated as School Work Computer and Service are touch sensitive and smoothly integrated. |
|
|
Term
The builder of the Difference Engine was |
|
Definition
|
|
Term
famous computer architecture input/output CPU and memory was developed by |
|
Definition
|
|
Term
Famous women in computer science |
|
Definition
Ada Lovelace, Grace Hopper, Anita Borg, Marissa Meyer |
|
|
Term
Which of the following reasons for monitoring email voicemail and computer files is considered legitimate |
|
Definition
Protect security of proprietary information and data. Investigate complaints of harassment. Prevent personal use of employer facilities is prohibited by company policy. |
|
|
Term
What does the term logic bomb mean |
|
Definition
Software that destroys critical files such as payroll and inventory records |
|
|
Term
The practice of hiring companies or employees and other countries is known as |
|
Definition
|
|
Term
|
Definition
Work from your car a company provided vehicle. Work from home. Work while on vacation or home recovering from an illness. |
|
|
Term
The Electronic Communications Privacy Act prohibits interception of |
|
Definition
Email and reading stored email without a court order but makes an exception for business systems |
|
|
Term
Which of the following is not a neo Luddite criticism of computers |
|
Definition
None of the above used to describe those who are considered to be anti-technology |
|
|
Term
Ken Olson, president of the Digital Equipment Corp in the late 1970s, Thomas J Watson chairman of IBM in the early 1940s, and Thomas Edison all my predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off. |
|
Definition
Lack of imagination about the uses people would find a for technology. Lack of imagination about what the public would like. Lack of imagination about what the public would pay for. |
|
|
Term
The following is not a current trend in computer access. |
|
Definition
New technologies are Universally available |
|
|
Term
Why do models of complex economic and social systems often get poor or inconsistent results? |
|
Definition
We might not have complete knowledge of the system we are modeling, the data describing current conditions are characteristics might not be complete or accurate, it is difficult if not impossible to numerically quantify variables that represent human values or choices |
|
|
Term
|
Definition
|
|