Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Provide some examples of Biometrics |
DNA, Fingerprints, Voice Prints |
|
T/F- The government can monitor the online activity of suspected hackers without a court order |
False, a court order is required for online activity surveillance |
|
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as __________. |
Honey Pots |
|
T/F- The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees' stored email. |
False- Businesses are the exception to this law when employees are using company emails or computers |
|
T/F- In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work. |
True |
|
The practice of hiring companies or employees in other countries is known as _________. |
Offshoring |
|
T/F- Simplifications and assumptions are always made when designing a computer model. |
True |
|
T/F- Providing new technology to poor countries is a matter of having enough money to buy equipment. |
False |
|
Most of the delay in the opening of the Denver International Airport was because of problems with __________. |
The baggage handling system |
|
T/F-Redundancy and self-checking are often present in safety-critical systems |
True |
|
T/F- A feature of high reliability organizations is loose structure. |
True |
|
What does CFAA stand for? |
Computer Fraud and Abuse Act |
|
What kind of hackers use their skills to cause damage or crimes? |
Black hat hackers |
|
In which country is the display and sale of Nazi memorabilia illegal? |
France (also Germany, but the question only gave France as an answer) |
|
How many laws are in Asimov's Laws of Robotics? |
3 |
|
How many people worldwide use the internet? |
2 billion |
|
The __________ predates social networks, smartphones, and sophisticated invisible information collection about our activities in cyberspace. |
CPA |
|
What is it called when a company pays another company for services instead of performing those tasks itself? |
Outsourcing |
|
Electronic Communications Privacy Act of 1986 (ECPA) |
Prohibits interception of email and reading of stored email without a court order, but makes an exception for business systems |
|
Speech Act of 2010 |
Makes foreign libel judgements unenforceable in the US |
|
Technical Singularity |
The hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization. |
|
What is not an advantage of telecommuting? |
Security risks of having work and home computer being the same device (In the actual question, it gives multiple advantages of telecommuting. The above is a disadvantage, and therefor the correct answer) |
|
Digital Divide |
The gulf between those who have ready access to computers and the Internet, and those who do not. |
|
What kind of government does Poland have? |
Democracy |
|
What is not a purpose for monitoring employee communication? |
Checking employees' social calendars (In the actual question, it gives multiple examples of legitimate purposes for monitoring. The above is not a legitimate purpose, it's just creepy) |
|
Stuxnet |
A computer worm that targeted industrial control systems that was used against Iran's nuclear testing program |