Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sign In
- Educators
- Flashcards
- Study Tools
- StudyBlueMinnesotaWinona State UniversityComputer ScienceComputer Science 110Barb Exam 3
- Exam 3
- Computer Science 110 with Barb at Winona State University †
- † The material on this site is created by StudyBlue users. StudyBlue is not affiliated with, sponsored by or endorsed by the academic institution or instructor.
- Get started today for free
- Nicole T.
- Created: 2014-04-16
- Last Modified: 2014-05-06
- Size: 140 Views: 99
- A piece of self-replicating code embedded within another program is called a
- virus
- A self-contained program that spreads through a computer network by exploiting security holes is called a
- worm
- Advertisement
- A program with a benign capability that conceals another, sinister purpose is called a
- Trojan Horse
- You may find a virus
- all of the above
- A software program that responds to commands sent by a command-and-control program located on an external computer is called a
- bot
- Manipulating someone within an organization to gain access to confidential information is called
- social engineering
- An intentional action designed to prevent legitimate users from making use of a computer service is called
- a denial of service attack
- Which of these statements about the National Crime Information Center (NCIC) is true?
- The NCIC databases contain about 40 million records.
- A computer used as a component of a larger system is called
- a embedded system
- Computers that process data from sensors as events occur are called
- real-time systems
- The Ariane 5 satellite launch vehicle failed because
- code that worked correctly on Ariane 4 failed on Ariane 5
- Advertisement
- Which of these problems was not encountered by BAE as it tried to install an automated baggage handling system at Denver International Airport?
- the system encountered all of these problems and more
- Mizuho Securities lost $225 million when
- one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order.
- Some computer experts have spoken out against the conversion to touch-screen voting machines because
- they do not have a paper audit trail
- By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to
- reduce costs by replacing hardware safety features with software safety features.
- Which mistake was not made by AECL, the manufacturer of the Therac-25?
- It continued to sell the Therac-25 after the FDA declared it to be defective.
- Computer simulations can
- can accurately predict the weather a month in advance
- The process of determining if a model is an accurate representation of the real system is called
- validation
- According to the textbook, which of the following careers is not an example of a mature profession?
- software engineer
- The process giving someone the legal right to practice a profession is called
- certification
- Unlike most professionals, the typical software engineer
- does not work directly with individual clients
- According to Aristotle, moral virtue results from
- repetition of appropriate acts
- According to Aristotle, deriving pleasure from a virtuous act is a sign that you
- are egotistical
- According to Aristotle, when people with strong character face a moral problem, they know the right thing to do, because
- the action is consistent with their character
- Whistleblowers
- make an unauthorized discloser about a harmful situation or fraud.
- A principal factor contributing to the loss of the space shuttle Challenger was that
- the weather in Florida was unusually cold.
- Manufacturing employment in the United States peaked
- 1979
- Productivity in the United States doubled between 1945 and 1990. However, the work week didn't get shorter because
- the standard of living increased.
- In medieval England, when wages went up,
- students dropped out of school to take up jobs??
- According to Max Weber, the growth of capitalism was stimulated by a new attitude toward work brought about by
- the Protestant Reformation.
- Artificial intelligence is the field of computer science and engineering that focuses on ways to get machines to exhibit
- intelligent behavior.
- In 1997 IBM supercomputer Deep Blue
- defeated world chess champion Gary Kasparov in a six-game match.
- In 2011 a program named Watson running on an IBM supercomputer
- defeated the two most successful human Jeopardy! champions in a three-game match.
- Globalization is
- the process of creating a worldwide network of businesses and markets.
- The process by which a new technology is assimilated into a society is called
- technological diffusion.
- In some markets a few top performers receive a disproportionate share of the rewards. Frank and Cook call this phenomenon
- the winner-take-all effect.
- The phrase "digital divide" refers to the situation where
- some people have access to information technology and others do not.
- The two principal catalysts for the Information Age have been:
- computers and communication networks.
- Which statement best supports the conclusion that society can control whether to adopt a new technology?
- No new nuclear power plants were built in the United States for 25 years after the accident at Three Mile Island.
- Tablets, abacuses, and manual tables
- are examples of aids to manual calculating.
- Which of the following was NOT a result of the adoption of mechanical calculators?
- Higher salaries of bookkeepers
- Which of the following was NOT a feature of cash registers in the early 1900s?
- Ability to compute amount of change to give customer
- Punched card tabulation was invented by Herman Hollerith, an employee of
- the Census Bureau.
- Which of the following phrases best describes a system that inputs data, performs one or more calculations, and produces output data?
- data-processing system
- Programming languages were developed in order to
- make programming faster and less error-prone.
- Software that allows multiple users to edit and run their programs simultaneously on the same computer is called
- a time-sharing system.
- Which Cold War program played an important role in advancing integrated circuit technology?
- Minuteman II ballistic missile
- Which company produced the System/360, a family of 19 compatible mainframe computers?
- IBM
- The company that invented the microprocessor is
- Intel
- Which of the following was not an activity of the People's Computer Company, a not-for-profit corporation in the San Francisco area?
- Developing the world's first graphical user interface
- Who wrote "An Open Letter to Hobbyists," complaining about software theft?
- Bill Gates
- A key application that first made personal computers more attractive to business was
- the spreadsheet program.
- The software company that provided IBM with the operating system for its PC was
- Microsoft
- The first electronic networking technology widely used in the United States was the
- telegraph
- The Pony Express went out of business when
- the transcontinental telegraph was completed.
- Alexander Graham Bell invented the harmonic or musical telegraph, which enabled
- more than one message to be sent over a single telegraph wire at the same time.
- Nearly all early telephones were installed in businesses, because
- leasing a telephone was expensive.
- The power of radio as a medium of mass communication was demonstrated in 1938 when Orson Welles put on a dramatization of
- War of the worlds
- ARPA Director J.C.R. Licklider conceived of a Galactic Network that would
- facilitate the exchange of programs and data.
- One of the first and most important applications of the ARPANET was
- email
- Which country has the fastest broadband connections on average?
- Japan/India
- In the fourth century the codex replaced the scroll because
- it was more durable, and it was much easier to look up a particular passage.
- Hypertext is supposed to mimic
- the associative memory of human beings.
- The first popular personal computer with a graphical user interface was the
- apple macintosh
- The World Wide Web is the creation of
- Tim Berners-Lee.
- A Web browser enables you to
- view webpages
- What is the name of a program that follows hyperlinks, collecting information about Web sites?
- spider
- According to James Moor, taking "the ethical point of view" means
- deciding that other people and their core values are worthy of your respect.
- Rules of conduct describing what people ought and ought not to do in various situations are called
- morality
- Ethics is
- all of the above
- Ethical egoism is
- based on determining long-term beneficial consequences.???
- Which of the following is an argument in favor of ethical egoism?
- Ethical egoism is supported by verses in the Bible.
- According to Kant, our sense of "ought to" is called
- dutifulness
- According to Kant, the moral value of an action depends upon
- the underlying moral rule.
- According to the second formulation of the Categorical Imperative,
- it is wrong for one person to "use" another.
- The Principle of Utility is also called
- the greatest happiness principle
- Two philosophers closely associated with utilitarianism are
- Jeremy Bentham and John Stuart Mill.
- Utilitarianism is an example of
- a consequentialist theory.??
- The problem of moral luck is raised as a criticism of
- rule utilitarianism??
- Utilitarianism does not mean "the greatest good of the greatest number" because
- it focuses solely on "the greatest good" and pays no attention to how "the good" is distributed.
- Thomas Hobbes called life without rules and a means of enforcing them
- the state of nature.
- An early proponent of the social contract was
- Jean-Jacque Rousseau.
- A right that another can guarantee by leaving you alone to exercise the right is called a
- negative right.
- A right that is guaranteed without exception is called a
- absolute right.
- The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called
- the difference principle.
- Messages embedded in files transferred from one computer to another are commonly called
- email
- The volume of spam is increasing because
- companies have found it to be effective.??
- A Korean cybercafé where people play on-line, persistent games is called a
- computer commons.??
- A wiki is
- A Web site that allows multiple people to contribute and edit its content.
- a blog is
- a personal journal kept on the internet
- Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name
- Online networking
- Which of these is not an example of direct censorship?
- All of the above are examples of direct censorship.
- According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when
- it would prevent harm to others
- A Web filter is a piece of software that
- prevents certain web pages from being displayed by your browser
- Which of the following laws was upheld as constitutional by the U.S. Supreme Court?
- Child Internet Protection Act
- ??
- Sexting is causing a legal crisis because
- b & c??
- Cyberbullying is defined as inflicting psychological harm on another person using
- the internet
- Kimberly Young's test for Internet addiction is based on the diagnosis of
- pathological gambling.??
- The Enlightenment view of addiction is that
- people are responsible for the choices they make.
- Intellectual property is a unique product of the human intellect that
- has commercial value
- The value of intellectual property is recognized
- in the free market.??
- The proper noun Kleenex is protected
- with a copyright
- Which of the following rights is not a right of a copyright holder?
- The right to prevent others from producing competitive works.
- Since the first Copyright Act was passed in 1790
- Congress has made more kinds of intellectual property protected under copyright.??
- Sometimes it is legal to reproduce a copyrighted work without the permission of the copyright holder. These circumstances are called
- fair use??
- The U.S. Supreme Court decision in Sony v. Universal City Studios established the concept of
- fair use
- The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA v. Diamond Multimedia Systems Inc. established the concept of
- space shifting
- The decision by the U.S. Court of Appeals, Ninth Circuit in Kelly v. Arriba Soft Corporation established that the display of thumbnail images by a search engine
- is not a fair use of those images.??
- Google Books is
- an effort to scan millions of books and make all their words searchable.
- In 2005 Sony BMG Music Entertainment made headlines by
- shipping CDs that secretly installed a rootkit on Windows computers.
- After the RIAA sued Napster,
- Napster went off-line.
- Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of the following actions is illegal?
- All of the above are illegal
- The Digital Millennium Copyright Act is controversial, in part, because
- it extends copyright protection to music broadcast over the Internet.??
- Compared with other peer-to-peer networks, BitTorrent takes advantage of the fact that broadband Internet connections
- provide higher speeds for downloading than for uploading.??
- The Linux operating system is an example of
- open-source software.
- The Third Amendment to the U.S. Constitution has to do with
- quartering of soldiers in private homes.
- Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?
- Warren and Brandeis
- Who wrote that every violation of a "privacy right" is also a violation of another right?
- Judith Jarvis Thomson
- Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a
- prudential right.
- An RFID is
- a wireless transmitter.
- The OnStar system allows
- a b & c
- Flash cookies are controversial, in part, because
- they are not controlled by the privacy controls of most Web browsers.
- The process of searching through many records in one or more databases looking for patterns or relationships is called
- data mining
- When information is put to another purpose, that is called a
- secondary use of the data
- A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called
- fair use
- According to the Employee Polygraph Protection Act, which organization(s) cannot administer lie detector tests to job applicants?
- private employers
- The Children's Online Privacy Protection Act
- requires online services to obtain parental consent before collecting any information from children 12 years old and younger.
- The Genetic Information Nondiscrimination Act
- all of the above
- The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent
- after the attack on pearl harbor
- The FBI's National Crime Information Center database
- contains more than 39 million records.
- The Fourth Amendment to the U.S. Constitution has to do with
- search warrants
- Which of the following laws does not provide some sort of authorization for governmental wiretapping?
- USA Patriot act
- After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order?
- NSA
- Which of the following precepts is NOT part of the Code of Fair Information Practices?
- There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system.
- The Fair Credit Reporting Act
- gives consumers the right to request a free copy of their credit report every year.
- The Financial Services Modernization Act
- all of the above
- The Family Education Rights and Privacy Act
- all of the above
- The Video Privacy Protection Act
- prohibits video stores from disclosing rental records without the written consent of the customer.
- The Health Insurance Portability and Accountability Act
- attempts to limit the exchange of information among health care providers to that information necessary to care for the patient
- After Congress ruled that wiretapping was illegal
- the FBI ceased all wiretapping activity
- Want to see the other 140 Flashcards in Exam 3?
- JOIN TODAY FOR FREE!
- MARSHALL'S BACKPACK
- JOIN WITH GOOGLE
- JOIN with EMAIL
- Words From the Students
- "I was able to maintain that level of academic achievement and graduate with honors!"
- Jennifer Felicity Brush
- Colorado School of Mines
- Sign In
- Educators
- Flashcards
- Study Tools
- Get started today for free
- GET STUDYBLUE
- iPhone
- iPad
- Android
- Web
- Evernote
- Teachers
- STUDY MATERIALS
- Online Flashcards
- High School
- College
- International
- By Date
- COMPANY
- About Us
- Press Releases
- Careers
- Blog
- Contact
- Show & Tell
- Refer Friends
- Student Stories
- SUPPORT
- Help Center
- Copyright
- Legal
- Privacy
- Terms of Use
- SOCIAL
- Twitter
- Facebook
- Pinterest
- Instagram
- Google +
- StudyBlue is not sponsored or endorsed by any college, university, or instructor.
- © 2014 StudyBlue Inc. All rights reserved.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement