Advertisement
Guest User

Untitled

a guest
Oct 24th, 2014
1,625
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.90 KB | None | 0 0
  1.  
  2. Sign In
  3. Educators
  4. Flashcards
  5. Study Tools
  6. StudyBlueMinnesotaWinona State UniversityComputer ScienceComputer Science 110Barb Exam 3
  7. Exam 3
  8. Computer Science 110 with Barb at Winona State University †
  9. † The material on this site is created by StudyBlue users. StudyBlue is not affiliated with, sponsored by or endorsed by the academic institution or instructor.
  10. Get started today for free
  11. Nicole T.
  12. Created: 2014-04-16
  13. Last Modified: 2014-05-06
  14. Size: 140 Views: 99
  15. A piece of self-replicating code embedded within another program is called a
  16. virus
  17. A self-contained program that spreads through a computer network by exploiting security holes is called a
  18. worm
  19. Advertisement
  20.  
  21. A program with a benign capability that conceals another, sinister purpose is called a
  22. Trojan Horse
  23. You may find a virus
  24. all of the above
  25. A software program that responds to commands sent by a command-and-control program located on an external computer is called a
  26. bot
  27. Manipulating someone within an organization to gain access to confidential information is called
  28. social engineering
  29. An intentional action designed to prevent legitimate users from making use of a computer service is called
  30. a denial of service attack
  31. Which of these statements about the National Crime Information Center (NCIC) is true?
  32. The NCIC databases contain about 40 million records.
  33.  
  34. A computer used as a component of a larger system is called
  35. a embedded system
  36. Computers that process data from sensors as events occur are called
  37. real-time systems
  38. The Ariane 5 satellite launch vehicle failed because
  39. code that worked correctly on Ariane 4 failed on Ariane 5
  40. Advertisement
  41.  
  42. Which of these problems was not encountered by BAE as it tried to install an automated baggage handling system at Denver International Airport?
  43. the system encountered all of these problems and more
  44. Mizuho Securities lost $225 million when
  45. one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order.
  46. Some computer experts have spoken out against the conversion to touch-screen voting machines because
  47. they do not have a paper audit trail
  48. By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to
  49. reduce costs by replacing hardware safety features with software safety features.
  50.  
  51. Which mistake was not made by AECL, the manufacturer of the Therac-25?
  52. It continued to sell the Therac-25 after the FDA declared it to be defective.
  53.  
  54. Computer simulations can
  55. can accurately predict the weather a month in advance
  56. The process of determining if a model is an accurate representation of the real system is called
  57. validation
  58.  
  59. According to the textbook, which of the following careers is not an example of a mature profession?
  60. software engineer
  61. The process giving someone the legal right to practice a profession is called
  62. certification
  63. Unlike most professionals, the typical software engineer
  64. does not work directly with individual clients
  65. According to Aristotle, moral virtue results from
  66. repetition of appropriate acts
  67. According to Aristotle, deriving pleasure from a virtuous act is a sign that you
  68. are egotistical
  69. According to Aristotle, when people with strong character face a moral problem, they know the right thing to do, because
  70. the action is consistent with their character
  71. Whistleblowers
  72. make an unauthorized discloser about a harmful situation or fraud.
  73.  
  74. A principal factor contributing to the loss of the space shuttle Challenger was that
  75. the weather in Florida was unusually cold.
  76.  
  77. Manufacturing employment in the United States peaked
  78. 1979
  79. Productivity in the United States doubled between 1945 and 1990. However, the work week didn't get shorter because
  80. the standard of living increased.
  81.  
  82. In medieval England, when wages went up,
  83. students dropped out of school to take up jobs??
  84. According to Max Weber, the growth of capitalism was stimulated by a new attitude toward work brought about by
  85. the Protestant Reformation.
  86.  
  87. Artificial intelligence is the field of computer science and engineering that focuses on ways to get machines to exhibit
  88. intelligent behavior.
  89.  
  90. In 1997 IBM supercomputer Deep Blue
  91. defeated world chess champion Gary Kasparov in a six-game match.
  92.  
  93. In 2011 a program named Watson running on an IBM supercomputer
  94. defeated the two most successful human Jeopardy! champions in a three-game match.
  95.  
  96. Globalization is
  97. the process of creating a worldwide network of businesses and markets.
  98.  
  99. The process by which a new technology is assimilated into a society is called
  100. technological diffusion.
  101. In some markets a few top performers receive a disproportionate share of the rewards. Frank and Cook call this phenomenon
  102. the winner-take-all effect.
  103. The phrase "digital divide" refers to the situation where
  104. some people have access to information technology and others do not.
  105.  
  106. The two principal catalysts for the Information Age have been:
  107. computers and communication networks.
  108. Which statement best supports the conclusion that society can control whether to adopt a new technology?
  109. No new nuclear power plants were built in the United States for 25 years after the accident at Three Mile Island.
  110.  
  111. Tablets, abacuses, and manual tables
  112. are examples of aids to manual calculating.
  113.  
  114. Which of the following was NOT a result of the adoption of mechanical calculators?
  115. Higher salaries of bookkeepers
  116.  
  117. Which of the following was NOT a feature of cash registers in the early 1900s?
  118. Ability to compute amount of change to give customer
  119.  
  120. Punched card tabulation was invented by Herman Hollerith, an employee of
  121. the Census Bureau.
  122.  
  123. Which of the following phrases best describes a system that inputs data, performs one or more calculations, and produces output data?
  124. data-processing system
  125.  
  126. Programming languages were developed in order to
  127. make programming faster and less error-prone.
  128.  
  129. Software that allows multiple users to edit and run their programs simultaneously on the same computer is called
  130. a time-sharing system.
  131.  
  132. Which Cold War program played an important role in advancing integrated circuit technology?
  133. Minuteman II ballistic missile
  134.  
  135. Which company produced the System/360, a family of 19 compatible mainframe computers?
  136. IBM
  137. The company that invented the microprocessor is
  138. Intel
  139. Which of the following was not an activity of the People's Computer Company, a not-for-profit corporation in the San Francisco area?
  140. Developing the world's first graphical user interface
  141.  
  142. Who wrote "An Open Letter to Hobbyists," complaining about software theft?
  143. Bill Gates
  144.  
  145. A key application that first made personal computers more attractive to business was
  146. the spreadsheet program.
  147. The software company that provided IBM with the operating system for its PC was
  148. Microsoft
  149. The first electronic networking technology widely used in the United States was the
  150. telegraph
  151. The Pony Express went out of business when
  152. the transcontinental telegraph was completed.
  153.  
  154. Alexander Graham Bell invented the harmonic or musical telegraph, which enabled
  155. more than one message to be sent over a single telegraph wire at the same time.
  156.  
  157. Nearly all early telephones were installed in businesses, because
  158. leasing a telephone was expensive.
  159.  
  160. The power of radio as a medium of mass communication was demonstrated in 1938 when Orson Welles put on a dramatization of
  161. War of the worlds
  162. ARPA Director J.C.R. Licklider conceived of a Galactic Network that would
  163. facilitate the exchange of programs and data.
  164.  
  165. One of the first and most important applications of the ARPANET was
  166. email
  167. Which country has the fastest broadband connections on average?
  168. Japan/India
  169. In the fourth century the codex replaced the scroll because
  170. it was more durable, and it was much easier to look up a particular passage.
  171.  
  172. Hypertext is supposed to mimic
  173. the associative memory of human beings.
  174.  
  175. The first popular personal computer with a graphical user interface was the
  176. apple macintosh
  177. The World Wide Web is the creation of
  178. Tim Berners-Lee.
  179.  
  180. A Web browser enables you to
  181. view webpages
  182. What is the name of a program that follows hyperlinks, collecting information about Web sites?
  183. spider
  184. According to James Moor, taking "the ethical point of view" means
  185. deciding that other people and their core values are worthy of your respect.
  186.  
  187. Rules of conduct describing what people ought and ought not to do in various situations are called
  188. morality
  189. Ethics is
  190. all of the above
  191. Ethical egoism is
  192. based on determining long-term beneficial consequences.???
  193.  
  194. Which of the following is an argument in favor of ethical egoism?
  195. Ethical egoism is supported by verses in the Bible.
  196.  
  197. According to Kant, our sense of "ought to" is called
  198. dutifulness
  199. According to Kant, the moral value of an action depends upon
  200. the underlying moral rule.
  201.  
  202. According to the second formulation of the Categorical Imperative,
  203. it is wrong for one person to "use" another.
  204.  
  205. The Principle of Utility is also called
  206. the greatest happiness principle
  207. Two philosophers closely associated with utilitarianism are
  208. Jeremy Bentham and John Stuart Mill.
  209.  
  210. Utilitarianism is an example of
  211. a consequentialist theory.??
  212. The problem of moral luck is raised as a criticism of
  213. rule utilitarianism??
  214. Utilitarianism does not mean "the greatest good of the greatest number" because
  215. it focuses solely on "the greatest good" and pays no attention to how "the good" is distributed.
  216.  
  217. Thomas Hobbes called life without rules and a means of enforcing them
  218. the state of nature.
  219.  
  220. An early proponent of the social contract was
  221. Jean-Jacque Rousseau.
  222.  
  223. A right that another can guarantee by leaving you alone to exercise the right is called a
  224. negative right.
  225.  
  226. A right that is guaranteed without exception is called a
  227. absolute right.
  228.  
  229. The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called
  230. the difference principle.
  231.  
  232. Messages embedded in files transferred from one computer to another are commonly called
  233. email
  234. The volume of spam is increasing because
  235. companies have found it to be effective.??
  236.  
  237. A Korean cybercafé where people play on-line, persistent games is called a
  238. computer commons.??
  239. A wiki is
  240. A Web site that allows multiple people to contribute and edit its content.
  241.  
  242. a blog is
  243. a personal journal kept on the internet
  244. Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name
  245. Online networking
  246.  
  247. Which of these is not an example of direct censorship?
  248. All of the above are examples of direct censorship.
  249. According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when
  250. it would prevent harm to others
  251. A Web filter is a piece of software that
  252. prevents certain web pages from being displayed by your browser
  253. Which of the following laws was upheld as constitutional by the U.S. Supreme Court?
  254. Child Internet Protection Act
  255. ??
  256. Sexting is causing a legal crisis because
  257. b & c??
  258. Cyberbullying is defined as inflicting psychological harm on another person using
  259. the internet
  260. Kimberly Young's test for Internet addiction is based on the diagnosis of
  261. pathological gambling.??
  262. The Enlightenment view of addiction is that
  263. people are responsible for the choices they make.
  264.  
  265. Intellectual property is a unique product of the human intellect that
  266. has commercial value
  267. The value of intellectual property is recognized
  268. in the free market.??
  269. The proper noun Kleenex is protected
  270. with a copyright
  271. Which of the following rights is not a right of a copyright holder?
  272. The right to prevent others from producing competitive works.
  273.  
  274. Since the first Copyright Act was passed in 1790
  275. Congress has made more kinds of intellectual property protected under copyright.??
  276. Sometimes it is legal to reproduce a copyrighted work without the permission of the copyright holder. These circumstances are called
  277. fair use??
  278. The U.S. Supreme Court decision in Sony v. Universal City Studios established the concept of
  279. fair use
  280. The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA v. Diamond Multimedia Systems Inc. established the concept of
  281. space shifting
  282. The decision by the U.S. Court of Appeals, Ninth Circuit in Kelly v. Arriba Soft Corporation established that the display of thumbnail images by a search engine
  283. is not a fair use of those images.??
  284. Google Books is
  285. an effort to scan millions of books and make all their words searchable.
  286.  
  287. In 2005 Sony BMG Music Entertainment made headlines by
  288. shipping CDs that secretly installed a rootkit on Windows computers.
  289. After the RIAA sued Napster,
  290. Napster went off-line.
  291. Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of the following actions is illegal?
  292. All of the above are illegal
  293.  
  294. The Digital Millennium Copyright Act is controversial, in part, because
  295. it extends copyright protection to music broadcast over the Internet.??
  296. Compared with other peer-to-peer networks, BitTorrent takes advantage of the fact that broadband Internet connections
  297. provide higher speeds for downloading than for uploading.??
  298. The Linux operating system is an example of
  299. open-source software.
  300.  
  301. The Third Amendment to the U.S. Constitution has to do with
  302. quartering of soldiers in private homes.
  303.  
  304. Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?
  305. Warren and Brandeis
  306. Who wrote that every violation of a "privacy right" is also a violation of another right?
  307. Judith Jarvis Thomson
  308.  
  309. Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a
  310. prudential right.
  311.  
  312. An RFID is
  313. a wireless transmitter.
  314.  
  315. The OnStar system allows
  316. a b & c
  317. Flash cookies are controversial, in part, because
  318. they are not controlled by the privacy controls of most Web browsers.
  319.  
  320. The process of searching through many records in one or more databases looking for patterns or relationships is called
  321. data mining
  322. When information is put to another purpose, that is called a
  323. secondary use of the data
  324. A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called
  325. fair use
  326. According to the Employee Polygraph Protection Act, which organization(s) cannot administer lie detector tests to job applicants?
  327. private employers
  328. The Children's Online Privacy Protection Act
  329. requires online services to obtain parental consent before collecting any information from children 12 years old and younger.
  330.  
  331. The Genetic Information Nondiscrimination Act
  332. all of the above
  333. The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent
  334. after the attack on pearl harbor
  335. The FBI's National Crime Information Center database
  336. contains more than 39 million records.
  337.  
  338. The Fourth Amendment to the U.S. Constitution has to do with
  339. search warrants
  340. Which of the following laws does not provide some sort of authorization for governmental wiretapping?
  341. USA Patriot act
  342. After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order?
  343. NSA
  344. Which of the following precepts is NOT part of the Code of Fair Information Practices?
  345. There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system.
  346.  
  347. The Fair Credit Reporting Act
  348. gives consumers the right to request a free copy of their credit report every year.
  349.  
  350. The Financial Services Modernization Act
  351. all of the above
  352.  
  353. The Family Education Rights and Privacy Act
  354. all of the above
  355. The Video Privacy Protection Act
  356. prohibits video stores from disclosing rental records without the written consent of the customer.
  357.  
  358. The Health Insurance Portability and Accountability Act
  359. attempts to limit the exchange of information among health care providers to that information necessary to care for the patient
  360. After Congress ruled that wiretapping was illegal
  361. the FBI ceased all wiretapping activity
  362. Want to see the other 140 Flashcards in Exam 3?
  363. JOIN TODAY FOR FREE!
  364. MARSHALL'S BACKPACK
  365.  
  366. JOIN WITH GOOGLE
  367. JOIN with EMAIL
  368. Words From the Students
  369. "I was able to maintain that level of academic achievement and graduate with honors!"
  370.  
  371. Jennifer Felicity Brush
  372. Colorado School of Mines
  373. Sign In
  374. Educators
  375. Flashcards
  376. Study Tools
  377. Get started today for free
  378. GET STUDYBLUE
  379. iPhone
  380. iPad
  381. Android
  382. Web
  383. Evernote
  384. Teachers
  385. STUDY MATERIALS
  386. Online Flashcards
  387. High School
  388. College
  389. International
  390. By Date
  391. COMPANY
  392. About Us
  393. Press Releases
  394. Careers
  395. Blog
  396. Contact
  397. Show & Tell
  398. Refer Friends
  399. Student Stories
  400. SUPPORT
  401. Help Center
  402. Copyright
  403. Legal
  404. Privacy
  405. Terms of Use
  406. SOCIAL
  407. Twitter
  408. Facebook
  409. Pinterest
  410. Instagram
  411. Google +
  412. StudyBlue is not sponsored or endorsed by any college, university, or instructor.
  413.  
  414. © 2014 StudyBlue Inc. All rights reserved.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement