Exam 10: Trends in Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are some of the restrictions placed on computer crime investigators?

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

Computer forensic investigators must follow the same ethical codes and guidelines as other investigators. They must follow privacy regulations and obtain warrants. They must document their procedures so that the information they uncover cannot be discredited as fabricated when used in court. They must also examine whether the evidence they find does not support other alternatives, such as an IP address, Web site, or email address being spoofed by a hacker.

Caroline is a marketing executive at a publishing company. She is planning to use the latest technology to plan a mix of phone, print, and Internet marketing campaigns. What should Caroline use to increase the efficiency of her telemarketers?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

A

What are some ethical considerations regarding the use of computer-generated actors?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

Computer-generated scenes and actors are improving to the point that it will be difficult to distinguish between real sets and real actors. One area of concern is the potential creation of doubles for long-dead actors and actresses. Who owns the rights to their virtual likenesses? For actors and actresses who are still alive, can they sign contracts to use a younger likeness of themselves? Film industry professionals technically have the ability to create likenesses of real people and use them to market or 'act' in films in which the person might not have agreed to.

Online banking allows for all of the following except ____.

(Multiple Choice)
4.9/5
(33)

Pixar is the company that developed the technology used in Toy Story and other animated movies.

(True/False)
4.8/5
(31)

Students can use PDAs to learn using educational software.

(True/False)
4.9/5
(35)

Checking accounts were in widespread use as early as the year ____.

(Multiple Choice)
4.7/5
(32)

HDCP was developed by ____ to encrypt data to avoid pirating.

(Multiple Choice)
4.7/5
(34)

The use of cell phones to make bank transactions is in development.

(True/False)
4.9/5
(33)

  ____ is a site similar to the one in the figure above. ____ is a site similar to the one in the figure above.

(Multiple Choice)
4.9/5
(35)

The National Crime Information Center database is maintained by the CIA.

(True/False)
4.8/5
(25)

Johann Gutenberg is credited with the development of ____.

(Multiple Choice)
4.9/5
(40)

Magnetic ink character recognition software for check processing was created by ____.

(Multiple Choice)
4.8/5
(32)

Computer-to-plate technology allows publishers to make changes to accommodate late-breaking news.

(True/False)
4.9/5
(37)

CGI stands for computer-generated ____.

(Multiple Choice)
4.8/5
(25)

"The Oregon Trail" is a computer ____________________ that teaches students about pioneers.

(Short Answer)
4.8/5
(25)

  The person in the figure above is a computer forensic investigator. The person in the figure above is a computer forensic investigator.

(True/False)
4.8/5
(34)

Asynchronous teaching technologies include Web or video conferencing.

(True/False)
4.8/5
(33)

____ marketing establishes a one-on-one relationship with prospective customers.

(Multiple Choice)
4.8/5
(35)

  The site in the figure above is used for ____. The site in the figure above is used for ____.

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 61
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)