Changing The World Chapter.6 Test Bank Docx - Technology At Your Service 1e Test Bank by Ralph De Arazoza. DOCX document preview.
File: Chapter 06 Changing the World
True-False Questions
[QUESTION]
1. Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
Difficulty: 2 Medium
[QUESTION]
2. Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
Difficulty: 2 Medium
[QUESTION]
3. Creative works such as books, songs, and photographs are protected by copyright law.
Difficulty: 1 Easy
[QUESTION]
4. Copyright protection lasts 20 years after the date of publication or release.
Difficulty: 3 Hard
[QUESTION]
5. Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
Difficulty: 2 Medium
[QUESTION]
6. Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.
Difficulty: 2 Medium
[QUESTION]
7. Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.
Difficulty: 2 Medium
[QUESTION]
8. Repeated hostile behavior with intent to psychological harm another individual is known as cyberterrorism.
Difficulty: 2 Medium
[QUESTION]
9. Like many businesses, schools have acceptable use policies (AUPs) to describe the appropriate use of their computers.
Difficulty: 1 Easy
[QUESTION]
10. Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
Difficulty: 3 Hard
[QUESTION]
11. Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
Difficulty: 1 Easy
[QUESTION]
12. Employers generally restrict or monitor the Internet activity of their employees because the increased use raises the company’s ISP rates significantly.
Difficulty: 2 Medium
[QUESTION]
13. Many employees, from fast-food workers to corporate executives, have been fired for something they posted online because it made their company look negative or careless in the eyes of the public.
Difficulty: 2 Medium
[QUESTION]
14. Nothing posted to social media services or anywhere else on the Internet should be considered private.
Difficulty: 1 Easy
[QUESTION]
15. The sleep mode on a computer generally saves more electricity than hibernate mode.
Difficulty: 2 Medium
[QUESTION]
16. Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.
Difficulty: 2 Medium
[QUESTION]
17. Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S.
Difficulty: 3 Hard
[QUESTION]
18. Employees who engage in telecommuting may find themselves working more hours, especially if their supervisor feels as if they are always ‘‘on the clock.’’
Difficulty: 2 Medium
[QUESTION]
19. For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
Difficulty: 2 Medium
[QUESTION]
20. Researchers have discovered ways to make computer chips interact with various areas of the body and brain in order to help those that suffer from conditions such as Parkinson’s or blindness.
Difficulty: 2 Medium
[QUESTION]
21. Biotechnology researchers have already developed techniques that can modify all of the genes of a developing embryo, effectively allowing parents to ‘‘customize’’ their child before it is born.
Difficulty: 2 Medium
[QUESTION]
22. A web developer creates and maintains websites for organizations.
Difficulty: 1 Easy
[QUESTION]
23. SEO specialists are normally sought after for their expertise in editing photos and designing layouts for websites.
Difficulty: 2 Medium
[QUESTION]
24. Many companies are creating a position for social media strategists, who are experts in sales and marketing using the World Wide Web and social media tools.
Difficulty: 2 Medium
[QUESTION]
25. Today's videos games are quite complex and require programming for user interaction, realistic motion and physics, and even intelligent character behavior.
Difficulty: 2 Medium
Multiple Choice Questions
[QUESTION]
26. _______ is the philosophical study of morality.
A. Empathy
B. Ethics
C. Artificial intelligence
D. Netiquette
Difficulty: 1 Easy
[QUESTION]
27. The ability to recognize, understand, and share the feelings of others is known as:
A. empathy
B. piracy
C. netiquette
D. intelligence
Difficulty: 1 Easy
[QUESTION]
28. In the world of computing, _______ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
A. empathy
B. copyright
C. piracy
D. licensing
Difficulty: 1 Easy
[QUESTION]
29. Copyright law contains an exception known as _______, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
A. fair use
B. netiquette
C. trolling
D. licensing
Difficulty: 2 Medium
[QUESTION]
30. Software is sometimes illegally modified in order to disable _______ technologies such as copy protection and authenticity checks.
A. fair use
B. DRM
C. Turing
D. attribution
Difficulty: 2 Medium
[QUESTION]
31. Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
A. Public domain
B. Digital rentals
C. Subscription services
D. Ad-supported streaming
Difficulty: 2 Medium
[QUESTION]
32. _______, which are products of the mind, can be quite valuable even though they may not always take on a physical form.
A. Digital footprints
B. Artificial intelligence
C. Digital rights
D. Intellectual property
Difficulty: 1 Easy
[QUESTION]
33. The _______ is a legal concept that grants rights and control to the owner of any published work.
A. attribution
B. patent
C. copyright
D. trademark
Difficulty: 2 Medium
[QUESTION]
34. It is through _______ that a copyright holder can grant usage or distribution rights to others.
A. attribution
B. licensing
C. DRM
D. telecommuting
Difficulty: 2 Medium
[QUESTION]
35. _______ works may be downloaded and used without obtaining permission from anyone.
A. SEO
B. Offshore
C. DRM
D. Public domain
Difficulty: 2 Medium
[QUESTION]
36. A _______ license allows an author to set conditions for the free use and distribution of their work.
A. digital rights
B. private
C. Creative Commons
D. public domain
Difficulty: 2 Medium
[QUESTION]
37. Some licenses require that the user provide _______, or credit, to the author wherever the work is used.
A. attribution
B. licensing
C. fair use
D. empathy
Difficulty: 2 Medium
[QUESTION]
38. Which of the following companies sells and rents movies online?
A. Hulu
B. Spotify
C. Pandora
D. Amazon
Difficulty: 1 Easy
[QUESTION]
39. Which of the following companies offers free, ad-supported streaming for music?
A. Hulu
B. Netflix
C. Pandora
D. Vudu
Difficulty: 1 Easy
[QUESTION]
40. Which of the following companies offers both free and paid subscription streaming for many TV shows?
A. Hulu
B. Netflix
C. Pandora
D. Spotify
Difficulty: 2 Medium
[QUESTION]
41. Which of the following examples is most likely to be in the public domain?
A. A 20-year old song from Canada
B. A cartoon film
C. An “over-the-air” network TV show
D. A photo on NASA’s website
Difficulty: 2 Medium
[QUESTION]
42. The piracy of music and movies is often evident on file-sharing services that use the _______ protocol.
A. BitTorrent
B. VoIP
C. ICMP
D. Tunneling
Difficulty: 3 Hard
[QUESTION]
43. The term _______ refers to the set of online behaviors that are considered polite and proper.
A. netiquette
B. fair use
C. acceptable use
D. attribution
Difficulty: 1 Easy
[QUESTION]
44. Many websites have a(n) _______ area that should be checked for common questions and their responses.
A. AUP
B. FAQ
C. DRM
D. SEO
Difficulty: 1 Easy
[QUESTION]
45. _______ is the act of being annoying and antagonistic in online social interactions.
A. Piracy
B. Attribution
C. Flaming
D. Trolling
Difficulty: 2 Medium
[QUESTION]
46. A(n) _______ is a document containing an organization’s policies for the ethical, secure, and appropriate use of computing resources.
A. acceptable use policy
B. privacy policy
C. fair use policy
D. digital rights policy
Difficulty: 2 Medium
[QUESTION]
47. Online social interactions that exhibit anger and/or insults are known as:
A. piracy
B. telecommuting
C. flaming
D. trolling
Difficulty: 2 Medium
[QUESTION]
48. When using a discussion forum, placing your message in the correct _______ will maximize your chances of getting a reply.
A. FAQ
B. thread
C. log
D. domain
Difficulty: 2 Medium
[QUESTION]
49. Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered _______ by the user community.
A. cyberbullying
B. flaming
C. spam
D. netiquette
Difficulty: 2 Medium
[QUESTION]
50. _______ are files that record activities and events on a computer.
A. Digital footprints
B. Policies
C. Logs
D. Threads
Difficulty: 2 Medium
[QUESTION]
51. Many government agencies, such as the _______, monitor the Internet and mobile activities of individuals all over the world.
A. SEO
B. TSA
C. DBA
D. NSA
Difficulty: 2 Medium
[QUESTION]
52. Online companies typically have a(n) _______ on their websites that clearly states what information is collected from users and what is done with that information.
A. acceptable use policy
B. privacy policy
C. fair use policy
D. whistleblowing policy
Difficulty: 2 Medium
[QUESTION]
53. _______ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
A. Private browsing
B. Do not track
C. Anonymity
D. Automation
Difficulty: 2 Medium
[QUESTION]
54. Laws such as the Patriot Act and _______ give the U.S. government broad surveillance powers.
A. DMCA
B. USPTO
C. SEO
D. FISA
Difficulty: 3 Hard
[QUESTION]
55. You and your devices usually leave digital _______, which is a trail of your data, activity, and even the locations where devices are used.
A. breadcrumbs
B. footprints
C. dividers
D. logs
Difficulty: 2 Medium
[QUESTION]
56. Google allows users to view and control all their data with a tool known as:
A. Dashboard
B. Control Panel
C. Datacenter
D. Privacy center
Difficulty: 3 Hard
[QUESTION]
57. _______ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.
A. Privacy policy
B. Anonymize
C. Do not track
D. Digital divide
Difficulty: 2 Medium
[QUESTION]
58. _______ software, such as Tor, will help mask your IP address from websites.
A. Public domain
B. Anonymity
C. Do not track
D. DRM
Difficulty: 2 Medium
[QUESTION]
59. Today’s web browsers include a feature that will delete all of your browsing _______ with a single click.
A. settings
B. history
C. connections
D. IPs
Difficulty: 2 Medium
[QUESTION]
60. _______ refers to the technology gap that exists between different social and economic classes.
A. Offshoring
B. Outsourcing
C. Digital divide
D. Green computing
Difficulty: 2 Medium
[QUESTION]
61. _______ is the act of alerting the public about harmful activities that are being hidden by an organization.
A. Flaming
B. Trolling
C. Telecommuting
D. Whistleblowing
Difficulty: 2 Medium
[QUESTION]
62. _______ is a global, online organization that offers whistleblowers an anonymous way of posting information and submitting evidence.
A. OLPC
B. DMCA
C. MtGox
D. WikiLeaks
Difficulty: 2 Medium
[QUESTION]
63. _______ computing concentrates on reducing the environmental impact of computers and their widespread use.
A. Green
B. Ethical
C. Netiquette
D. Social
Difficulty: 1 Easy
[QUESTION]
64. Which of the following words is NOT part of the green computing model?
A. Reduce
B. Reuse
C. Repair
D. Recycle
Difficulty: 2 Medium
[QUESTION]
65. Operating systems use _______ utilities to place computers and devices in low-power states when they are not being used.
A. encryption
B. power management
C. acceptable use
D. optimization
Difficulty: 2 Medium
[QUESTION]
66. Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active?
A. Hibernate
B. Shut down
C. Sleep
D. Log off
Difficulty: 2 Medium
[QUESTION]
67. Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?
A. Hibernate
B. Shut down
C. Sleep
D. Log off
Difficulty: 2 Medium
[QUESTION]
68. Many companies and individuals are going _______, which means they are using technology to lower their consumption and reliance on paper.
A. biotech
B. automated
C. nanotech
D. paperless
Difficulty: 1 Easy
[QUESTION]
69. Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?
A. Have I alerted my supervisor and, if needed, the top-level managers of the organization?
B. Is the activity in question illegal or likely to cause harm to the public?
C. Do I have documented proof of the activities that will cause this alleged harm?
D. Can the exposure of this information put the organization’s reputation at risk?
Difficulty: 3 Hard
[QUESTION]
70. _______ is the process of working for a company without being physically present at the company’s office.
A. Offshoring
B. Outsourcing
C. Telecommuting
D. Green computing
Difficulty: 2 Medium
[QUESTION]
71. _______ occurs when an organization transfers some aspect of their business to a third party.
A. Automation
B. Outsourcing
C. Telecommuting
D. Green computing
Difficulty: 2 Medium
[QUESTION]
72. When companies outsource functions to another country it is referred to as:
A. green computing
B. offshoring
C. telecommuting
D. the digital divide
Difficulty: 2 Medium
[QUESTION]
73. _______ occurs when computers or machines can perform the work that was once done by a human.
A. Automation
B. Outsourcing
C. Telecommuting
D. Green computing
Difficulty: 2 Medium
[QUESTION]
74. _______ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
A. ASIMO
B. Watson
C. Robonaut
D. NAO
Difficulty: 3 Hard
[QUESTION]
75. _______ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
A. AI
B. SEO
C. Nanotechnology
D. Biotechnology
Difficulty: 2 Medium
[QUESTION]
76. _______ involves the creation or manipulation of matter at the smallest possible scale.
A. AI
B. SEO
C. Nanotechnology
D. Biotechnology
Difficulty: 2 Medium
[QUESTION]
77. In which of the following areas are you least likely to find examples of automation?
A. Microprocessor manufacturing
B. Cleanup efforts in a toxic environment
C. Technical writing
D. Retail store checkout lines
Difficulty: 3 Hard
[QUESTION]
78. _______ robots are those that are created to imitate the appearance or capabilities of humans.
A. Biotech
B. Humanoid
C. Turing
D. Intellectual
Difficulty: 1 Easy
[QUESTION]
79. Honda’s _______ robot can perform a variety of activities that require a great deal of balance and range of motion.
A. ASIMO
B. Watson
C. Turing
D. X1
Difficulty: 2 Medium
[QUESTION]
80. NASA’s _______ robot can work alongside astronauts or perform tasks that are too dangerous for humans.
A. ASIMO
B. NAO
C. Robonaut 2
D. X1
Difficulty: 2 Medium
[QUESTION]
81. ______ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.
A. AI
B. Biotechnology
C. Nanotechnology
D. SEO
Difficulty: 1 Easy
[QUESTION]
82. Which of the following is a popular test of a system’s ability to think?
A. Empathy test
B. Turing test
C. Benchmark
D. PassMark
Difficulty: 2 Medium
[QUESTION]
83. Superficially, _______ can be defined as the processes used in learning, problem solving, and communication.
A. biotechnology
B. emotion
C. empathy
D. intelligence
Difficulty: 1 Easy
[QUESTION]
84. Which of the following areas of research is NOT related to biotechnology?
A. Developing new medications
B. Mapping human genes
C. Creating robotic caretakers
D. Increasing crop yields
Difficulty: 2 Medium
[QUESTION]
85. A _______ computer can represent data in states beyond the two bits (0’s and 1’s) of today.
A. quantum
B. green
C. nano
D. Turing
Difficulty: 2 Medium
[QUESTION]
86. Human _______ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.
A. intelligence
B. enhancement
C. empathy
D. robotics
Difficulty: 2 Medium
[QUESTION]
87. A _______ is responsible for the development of computer software.
A. network administrator
B. software engineer
C. database administrator
D. computer support specialist
Difficulty: 1 Easy
[QUESTION]
88. A _______ specializes in developing plans and recommendations that meet the software and system needs of an organization.
A. network administrator
B. systems analyst
C. social media strategist
D. computer support specialist
Difficulty: 2 Medium
[QUESTION]
89. A _______ is responsible for configuring, maintaining, and securing an organization’s database.
A. network administrator
B. software engineer
C. database administrator
D. computer support specialist
Difficulty: 1 Easy
[QUESTION]
90. A _______ is responsible for configuring and maintaining networks and communication systems.
A. network administrator
B. software engineer
C. database administrator
D. computer support specialist
Difficulty: 1 Easy
[QUESTION]
91. A _______ excels when it comes to installing, configuring, and supporting computer systems.
A. network administrator
B. software engineer
C. database administrator
D. computer support specialist
Difficulty: 1 Easy
[QUESTION]
92. Most companies have the need for a _______ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees.
A. human resources
B. help desk
C. maintenance
D. facilities
Difficulty: 2 Medium
[QUESTION]
93. ______ are responsible for managing a diverse team of IT professionals and making top-level decisions regarding the purchasing of software and hardware for an organization.
A. Computer support specialists
B. SEO specialists
C. Information systems managers
D. CFOs
Difficulty: 2 Medium
[QUESTION]
94. _______ involves improving the ranking of a website when users enter relevant keywords in a search engine.
A. Social media
B. SEO
C. Graphic design
D. Automation
Difficulty: 2 Medium
[QUESTION]
95. _______ involves activities such as editing photos and designing layouts.
A. Social media
B. SEO
C. Graphic design
D. Systems analysis
Difficulty: 1 Easy
Short Answer Questions
[QUESTION]
96. List the four questions that should be asked when considering whether "fair use" applies.
Difficulty: 3 Hard
[QUESTION]
97. Describe four alternatives to piracy when it comes to music and movies.
Difficulty: 3 Hard
[QUESTION]
98. List five items that you might find in an organization’s acceptable use policy (AUP).
Difficulty: 3 Hard
[QUESTION]
99. Describe various ways in which technology has become an important tool for revolution and social action.
Difficulty: 3 Hard
[QUESTION]
100. List three advantages of telecommuting.
Difficulty: 2 Medium