• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back

Provide some examples of Biometrics

DNA, Fingerprints, Voice Prints

T/F- The government can monitor the online activity of suspected hackers without a court order

False, a court order is required for online activity surveillance

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as __________.

Honey Pots

T/F- The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees' stored email.

False- Businesses are the exception to this law when employees are using company emails or computers

T/F- In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work.

True

The practice of hiring companies or employees in other countries is known as _________.

Offshoring

T/F- Simplifications and assumptions are always made when designing a computer model.

True

T/F- Providing new technology to poor countries is a matter of having enough money to buy equipment.

False

Most of the delay in the opening of the Denver International Airport was because of problems with __________.

The baggage handling system

T/F-Redundancy and self-checking are often present in safety-critical systems

True

T/F- A feature of high reliability organizations is loose structure.

True

What does CFAA stand for?

Computer Fraud and Abuse Act

What kind of hackers use their skills to cause damage or crimes?

Black hat hackers

In which country is the display and sale of Nazi memorabilia illegal?

France (also Germany, but the question only gave France as an answer)

How many laws are in Asimov's Laws of Robotics?

3

How many people worldwide use the internet?

2 billion

The __________ predates social networks, smartphones, and sophisticated invisible information collection about our activities in cyberspace.

CPA

What is it called when a company pays another company for services instead of performing those tasks itself?

Outsourcing

Electronic Communications Privacy Act of 1986 (ECPA)

Prohibits interception of email and reading of stored email without a court order, but makes an exception for business systems

Speech Act of 2010

Makes foreign libel judgements unenforceable in the US

Technical Singularity

The hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization.

What is not an advantage of telecommuting?

Security risks of having work and home computer being the same device




(In the actual question, it gives multiple advantages of telecommuting. The above is a disadvantage, and therefor the correct answer)

Digital Divide

The gulf between those who have ready access to computers and the Internet, and those who do not.

What kind of government does Poland have?

Democracy

What is not a purpose for monitoring employee communication?

Checking employees' social calendars




(In the actual question, it gives multiple examples of legitimate purposes for monitoring. The above is not a legitimate purpose, it's just creepy)

Stuxnet

A computer worm that targeted industrial control systems that was used against Iran's nuclear testing program