Term
| When a person visit the website his or her IP and the links here she clicked on are automatically recorded. This is an example of what? |
|
Definition
| invisible information gathering |
|
|
Term
| What does it mean If a business follows an opt-in policy |
|
Definition
| information may not be released unless the customer gives permission |
|
|
Term
|
Definition
| the phone number from which an incoming call was made |
|
|
Term
| what does the communications assistance for law enforcement act say |
|
Definition
| telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) |
|
|
Term
| Which of the following requirements was a key provisions of the children's Internet Protection Act? |
|
Definition
| Filtering software must be installed on internet terminals in schools and libraries |
|
|
Term
| Anonymizer.com provides tools and services to do what? |
|
Definition
| send email and surf the Web anonymously |
|
|
Term
| Which of the following are the two main arguments against Communications Decency Act accepted by the courts? |
|
Definition
| It was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children |
|
|
Term
| Which of the following is not an exclusive right granted by copyright law? |
|
Definition
|
|
Term
| Which of the following is not a factor in determining fair use? |
|
Definition
| The for profit or nonprofit status of the copyright holder |
|
|
Term
| In the term “free software”, “free” implies what? |
|
Definition
free of cost free to copy free to modify |
|
|
Term
| One of the reasons the Court ruled against Napster was what? |
|
Definition
| it knowingly encouraged and assisted in the infringement of copyright |
|
|
Term
|
Definition
| Deontological, theories, utilitarianism, right wrong and ok |
|
|
Term
| True or False Computer Science is in a continual flux as technologies, infrastructures, and society concerns evolve. Continuous learning on your part to keep up with these developments is necessary to succeed in the workplace at our field continues to evolve. |
|
Definition
|
|
Term
| In January 2000 Yahoo!, eBay Amazon E*Trade, and other websites were shut down for what kind of attack? |
|
Definition
|
|
Term
|
Definition
| voicemail interception of famous and others by tabloids |
|
|
Term
| What is the First Amendment |
|
Definition
| free speech part of this constitutional amendment |
|
|
Term
| The Fourth Amendment is the protection against what? |
|
Definition
| unreasonable search and seizure part of this u.s. constitutional amendment |
|
|
Term
| What is Surveillance technology |
|
Definition
| pervasive camera systems used at many sites such as ATM's and nau engineering to track thieves. You can also be used to track employees coming to or leaving work. |
|
|
Term
| File sharing: MGM v. Grokster |
|
Definition
| Supreme Court ruled that intellectual property owners could sue the companies for encouraging copyright infringement |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Speech by US Secretary of State Hillary Clinton on the importance of an Internet where information flows freely across international borders freedom of expression and enabling economic success |
|
|
Term
|
Definition
| Google and YouTube can choose to take down certain user generated content in countries that may spark controversy or unrest |
|
|
Term
|
Definition
| Add-on for Firefox that allows you to see all the third parties that are tracking your movements across the web |
|
|
Term
|
Definition
| Law Firm emphasized it that has become tougher today to protect your intellectual property |
|
|
Term
| Define ethics in your own words |
|
Definition
| moral principles that govern a person's or group's behavior |
|
|
Term
| What is the difference between positive and negative rights |
|
Definition
A negative right is a right not to be subjected to an action of another person or group; negative rights permit or oblige inaction.
A positive right is a right to be subjected to an action or another person or group; positive rights permit or oblige action |
|
|
Term
| In terms of privacy describe the concept of secondary use and give an example |
|
Definition
| a use which, though executed, may change from one to another by circumstances. |
|
|
Term
| Describe copyright law and the kind of intellectual property that it protects |
|
Definition
| Copyright protects original works of authorship |
|
|
Term
| Describe patent law and the kind of intellectual property that it protects |
|
Definition
a patent provides, from a legal standpoint, the right to exclude others[17] from making, using, selling, offering for sale, or importing the patented invention for the term of the patent
A patent is a limited property right |
|
|
Term
| Describe the fair use doctrine |
|
Definition
| permits limited use of copyrighted material without acquiring permission from the rights holders |
|
|
Term
|
Definition
| Digital Millennium Copyright Act |
|
|
Term
| Can computer software be copyrighted |
|
Definition
| Yes, but it is hard to do. |
|
|
Term
| What is your expectation of privacy in the workplace? More specifically do you expect your employer to grant you the same privacy as you would expect at home? |
|
Definition
|
|
Term
| You saw case study presentations by your peers addressing often controversial topics. Besides your own presentation which presentation really hit home. |
|
Definition
|
|
Term
| Which of the following is an example of biometrics |
|
Definition
| DNA, fingerprints, and voice prints |
|
|
Term
| Software that monitors in coming communications and filters out those that are from untrusted sites or fit a profile suspicious activity is called |
|
Definition
|
|
Term
| In the early days of computing 1960s to the early 1970s a hacker was? |
|
Definition
| a creative programmer who wrote very elegant or clever programs |
|
|
Term
| Dishonest sellers using online auction site sometimes will bid on their own items to drive up the price this practice is known as |
|
Definition
|
|
Term
| The hacker group that broke into the BellSouth computers in the late 1980s was known as |
|
Definition
|
|
Term
|
Definition
| is the use of hacking to promote a political cause |
|
|
Term
| Websites that look attractive to hackers but are closely monitored so that everything the hacker does at the site is recorded and studied are known as |
|
Definition
|
|
Term
| Collecting evidence from computer files and disks is called |
|
Definition
|
|
Term
| Types of malicious programs used by hackers to gain access to your computer |
|
Definition
| Key loggers, remote access Trojans, and bots |
|
|
Term
| True or false? Computer science careers are always advertised as software engineers |
|
Definition
|
|
Term
| True or False With the terrific nau computer science program in which you are participating you will not have to learn any new languages systems are tools when you move into industry |
|
Definition
|
|
Term
| True or False If you make a choice of a technical or management role in computer science it is pretty much a one-way street making it difficult for you to go back once you make up your mind |
|
Definition
|
|
Term
| True or False Job interviews today are as much technical as behavioral |
|
Definition
|
|
Term
| True or False to get start in your computer science where you often may have a first assignment to update maintain or even reengineer someone else's code |
|
Definition
|
|
Term
| The digital divide is what? |
|
Definition
| the participation of large computer companies as well as nonprofits |
|
|
Term
| Censorship and political freedom |
|
Definition
A problem even with the World Wide Web
Similar restrictions as with other media
The global nature of the net makes it easier for one nation to impose restrictive standards on others |
|
|
Term
|
Definition
The direction we are heading
Present some coordination challenges for multinational companies
Can cause ethical issues related to offshoring of work |
|
|
Term
|
Definition
Can find Users alienated from a website due to cultural differences
Often requires building a language database that installations at various countries goes smoothly
Typically requires international usability testing |
|
|
Term
| To conduct international usability testing |
|
Definition
You can go to the country yourself You can perform it remotely Can hire local usability consultant You can have the work performed by your local branch office |
|
|
Term
| In one application of a voice recognition system the system failed to recognize female speakers I likely reason was |
|
Definition
| The program was primarily developed and tested by men |
|
|
Term
| Which of the following is not a principle for producing good systems? |
|
Definition
| Overestimate the cost and time a project will take |
|
|
Term
| The ACM code of ethics include |
|
Definition
Students, working professionals and computer science researchers Question is discussed in this chapter these scenarios of professional ethics discussed are not as easy as they seem to resolve |
|
|
Term
| The ethics that are discussed for the different scenarios of professional ethics discussed in the powerpoints |
|
Definition
| are not as easy as they seem to resolve |
|
|
Term
| True or False The digital revolution refers to the advancement of technology from analog electronic and mechanical devices to the digital technology available today |
|
Definition
|
|
Term
| A day made of glass 2 show these new technologies |
|
Definition
| The smart kitchen appliances and surfaces are all connected. Smooth integration between the automobile and other computer devices. Illustrated as School Work Computer and Service are touch sensitive and smoothly integrated. |
|
|
Term
| The builder of the Difference Engine was |
|
Definition
|
|
Term
| famous computer architecture input/output CPU and memory was developed by |
|
Definition
|
|
Term
| Famous women in computer science |
|
Definition
| Ada Lovelace, Grace Hopper, Anita Borg, Marissa Meyer |
|
|
Term
| Which of the following reasons for monitoring email voicemail and computer files is considered legitimate |
|
Definition
| Protect security of proprietary information and data. Investigate complaints of harassment. Prevent personal use of employer facilities is prohibited by company policy. |
|
|
Term
| What does the term logic bomb mean |
|
Definition
| Software that destroys critical files such as payroll and inventory records |
|
|
Term
| The practice of hiring companies or employees and other countries is known as |
|
Definition
|
|
Term
|
Definition
| Work from your car a company provided vehicle. Work from home. Work while on vacation or home recovering from an illness. |
|
|
Term
| The Electronic Communications Privacy Act prohibits interception of |
|
Definition
| Email and reading stored email without a court order but makes an exception for business systems |
|
|
Term
| Which of the following is not a neo Luddite criticism of computers |
|
Definition
None of the above used to describe those who are considered to be anti-technology |
|
|
Term
| Ken Olson, president of the Digital Equipment Corp in the late 1970s, Thomas J Watson chairman of IBM in the early 1940s, and Thomas Edison all my predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off. |
|
Definition
| Lack of imagination about the uses people would find a for technology. Lack of imagination about what the public would like. Lack of imagination about what the public would pay for. |
|
|
Term
| The following is not a current trend in computer access. |
|
Definition
| New technologies are Universally available |
|
|
Term
| Why do models of complex economic and social systems often get poor or inconsistent results? |
|
Definition
| We might not have complete knowledge of the system we are modeling, the data describing current conditions are characteristics might not be complete or accurate, it is difficult if not impossible to numerically quantify variables that represent human values or choices |
|
|
Term
|
Definition
|
|