CGS 1060C Midterm Complete Questions And
Answers With Real Set
___ are files that record activities and events on a computer. ANS Logs
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever
the work is used. ANS True
Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others
can use portions of copyrighted material without first obtaining permission. ANS Fair use
Copyright protection lasts 20 years after the date of publication or release. ANS False
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of
movements by simply projecting a thought to them. ANS True
Most experts recommend that companies monitor their employees secretly in order to prevent workers from
circumventing the technologies used to track them. ANS False
___ involves the creation or manipulation of matter at the smallest possible scale. ANS Nanotechnology
___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the
private window. ANS Private Browsing
___ refers to the technology gap that exists between different social and economic classes. ANS Digital divide
Ethics involves a rational analysis of the voluntary, moral choices that individuals make. ANS True
___ occurs when computers or machines can perform the work that was once done by a human. ANS
Automation
___ is the act of being annoying and antagonistic in online social interactions. ANS Trolling
,__ systems can include anything from sophisticated programs that answer questions to futuristic robots that can
think and act like humans. ANS AL
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
ANS Footprints
___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
ANS Biotechnology
Online companies typically have a(n) ___ on their websites that clearly state what information is collected from
users and what is done with that information. ANS private policy
___ is the process of working for a company without being physically present at the company's office. ANS
Telecommuting
___ displays a form of artificial intelligence with its astounding capability to understand complex questions and
quickly find the answers using large databases of information. ANS Watson
Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing
your job if you make your company look negative or careless. ANS true
In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without
payment or permission from their creator. ANS piracy
Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the
world. ANS NSA
The sleep mode on a computer generally saves more electricity than hibernate mode. ANS false
___ is the act of alerting the public about harmful activities that are being hidden by an organization. ANS
Whistleblowing
Creative works such as books, songs, and photographs are protected by copyright law. ANS true
, A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of
computing resources. ANS acceptable use policy
It is through ___ that a copyright holder can grant usage or distribution rights to others. ANS licensing
In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to
assume that you have complete anonymity when browsing websites with a VPN. ANS false
Which of the following words is NOT part of the green computing model? ANS repair
The term ___ refers to the set of online behaviors that are considered polite and proper. ANS netiquette
Which of the following alternatives to piracy will allow you to listen to your favorite songs for free? ANS Ad-
supported streaming
___ occurs when an organization transfers some aspect of their business to a third party. ANS Outscoring
Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and
authenticity checks. ANS DRM
___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human
brain. ANS Nanotechnology
Many websites have a(n) ___ area that should be checked for common questions and their responses. ANS FAQ
___ is a type of malware which is designed to report activity on your computer to another party. ANS Spyware
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
ANS bandwidth
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Nipsey. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.