Deck 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment

Full screen (f)
exit full mode
Question
To present someone else's work as your own is plagiarism, which is both a violation of patent law and an unethical act.
Use Space or
up arrow
down arrow
to flip the card.
Question
DRM software is used to control the use of a work.
Question
Extensive mouse use has also been associated with CVS.
Question
According to the American Institute of Stress, stress costs U.S. employers more than $300 billion each year in healthcare, missed work, and stress-reduction services provided to employees.
Question
Research has shown that having an academic honor code does not effectively reduce cheating.
Question
Ethics with respect to the use of computers are referred to as digital ethics.
Question
Pirated copies of movies are often created today by videotaping them with a camcorder during a prerelease screening or on the opening day of a movie.
Question
The eBay Web site states that it prohibits the sale of some controversial or sensitive items, in addition to illegal items.
Question
In reaction to scandals at Enron, Tyco International, and WorldCom, Congress passed the Sarbanes-Oxley Act of 2002.
Question
Use a light touch on the keyboard to prevent backache.
Question
In general, according to recent reports by the Pew Internet & American Life Project, individuals with a lower level of income or a lower level of education are more likely to go online.
Question
In some countries, bootleg copies of music CDs and movie DVDs are sold openly.
Question
Currently, the most common form of computer / Internet addictive behavior is e-mailing.
Question
Braille printers print embossed output in Braille format on paper.
Question
Employees who reveal wrongdoing within an organization to the public or to authorities are referred to as whistle-blowers.
Question
Some human resources departments view college degrees from online diploma mills or other nonaccredited organizations as a form of digital manipulation.
Question
Efficiently managing your incoming e-mail is a way to avoid computer / Internet addiction.
Question
To date, the MPAA has not pursued civil litigation against movie pirates.
Question
Registration is required for copyright protection, especially if you need to prove ownership of a copyright, such as during a copyright-infringement lawsuit.
Question
The monitor should be placed directly in front of the user about an arm's length away, the top of the screen should be no more than 12 inches above the user's eyes once the user's chair is adjusted.
Question
Computer glasses are optimized for viewing in the intermediate zone of vision where a computer monitor usually falls. _________________________
Question
A ____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.

A) trademark
B) watermark
C) patent
D) copyright
Question
The legal concept of limited use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, news reporting, teaching, and research. _________________________
Question
Corporate integrity, as it relates to accounting practices and proper disclosure, is a(n) personal ethics topic that has come to the forefront because of the many recent incidents involving corporate scandals and bankruptcies. _________________________
Question
For CTS, the most common symptoms are eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, blurred vision, headaches, and pain in the shoulders, neck, or back. _________________________
Question
A ____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.

A) digital patent
B) digital trademark
C) digital watermark
D) digital copyright
Question
Although some publications allow the use of "photo illustrations," others have strict rules about digital manipulation- especially for news photojournalists. _________________________
Question
A(n) copyright is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. _________________________
Question
Digital Copy is a new option for taking your legally purchased movies with you on your computer or portable digital media player. _________________________
Question
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.

A) cyberinvasion
B) cyberintrusion
C) digital invasion
D) cybersquatting
Question
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.

A) trademark
B) copyright
C) patent
D) intellectual ownership right
Question
People who refer to written documents while working on their PCs should use document holders to keep their documents close to their monitors. _________________________
Question
Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidentally arrive at the site when trying to type the URL of the legitimate site. _________________________
Question
Keyboard supports lower the keyboard, enabling the user to keep his or her forearms parallel to the floor more easily. _________________________
Question
Members of the movie industry hire special firms, such as BayTSP, that specialize in monitoring P₂P networks, Web sites, and other Internet resources in order to identify their clients' copyrighted material that is being misused on the Internet. _________________________
Question
____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.

A) WIPO
B) DRM
C) OLPC
D) USPTO
Question
Copyrights apply to both published and unpublished works and remain in effect until ____.

A) 10 years after the creation of the work
B) 70 years after the creation of the work
C) 10 years after the creator's death
D) 70 years after the creator's death
Question
  The keys on the keyboard shown in the accompanying figure contain Braille overlays. _________________________<div style=padding-top: 35px>
The keys on the keyboard shown in the accompanying figure contain Braille overlays. _________________________
Question
The three main types of intellectual property rights are copyrights, trademarks, and ____.

A) warranties
B) patents
C) wills
D) cyber rights
Question
Early signs of CTS include a feeling of emotional and physical exhaustion. _________________________
Question
A teacher sharing a poem with a class, leading the class to believe the poem was his original work constitutes ____.

A) bad manners
B) plagiarism
C) trademark theft
D) patent infringement
Question
A ____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.

A) code of security
B) code of conduct
C) privacy policy
D) piracy policy
Question
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is ____.

A) copyright law
B) religion
C) vaporware
D) corporate missions
Question
While a keyboard, mouse, monitor, and printer can be connected to a portable computer directly, a ____ is a device designed to more easily connect a portable computer to peripheral devices.

A) notebook holder
B) laptop station
C) notebook stand
D) docking station
Question
____ is increasingly being tied to crime and even death in some countries.

A) Internet addiction
B) CAD
C) CVS
D) OLPC
Question
With more than 78% of its population online, ____ is the leading world region in Internet users.

A) Middle East
B) Europe
C) Africa
D) North America
Question
Adding to the problem of unethical ____ is the use of digital cameras today, which eliminate the photo negatives that could be used with film cameras to show what photographs actually looked like at the time they were taken.

A) cybersquatting
B) digital counterfeiting
C) identity theft
D) digital manipulation
Question
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.

A) one-tenth
B) one-half
C) one-third
D) 80%
Question
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the ____ (ADA).

A) American Data Act
B) Assistive Data Act
C) American Democracy Act
D) Americans with Disabilities Act
Question
The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.

A) OX
B) Simputer
C) OLPC
D) InternetWorld
Question
One controversial patent granted to Google in 2013 is for "____" advertising-a business model for charging advertisers according to the number of views an ad receives via a "head mounted gaze tracking device" (speculated to be Google Glass).

A) pay-to-look
B) pay-for-play
C) pay-for-gaze
D) pay-to-view
Question
A condition known as ____ has been linked to the repetitive finger movements made when using a keyboard.

A) ergonomics
B) carpal tunnel syndrome (CTS)
C) burnout
D) computer hand syndrome (CHS)
Question
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company's disclosures.

A) CEOs and CIOs
B) CEOs and CFOs
C) SOAs and DRMs
D) CCVs and DRMs
Question
In addition to being annoying and a waste of time, ____ bog(s) down e-mail systems and clog users' Inboxes.

A) computer worms
B) Trojan horses
C) e-mail hoaxes
D) digital manipulation
Question
To catch people who are sharing movies illegally on the Internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and then identifies the responsible individual by using the ____ of the computer being used to share the movie.

A) IP address
B) broadcast flag
C) RAM
D) serial port
Question
In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs-even create false or misleading photographs.

A) digital counterfeiting
B) identity theft
C) plagiarism
D) digital manipulation
Question
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.

A) DRM
B) AACSB
C) patents
D) RSI
Question
Heavy use of computers, combined with information overload and 24 / 7 accessibility via technology, can lead to ____-a state of fatigue or frustration brought about by overwork.

A) burnout
B) CTS
C) CVS
D) RSI
Question
<strong>  The accompanying figure shows a ____.</strong> A) document holder B) vertical mouse C) trackball D) mouse stand <div style=padding-top: 35px>
The accompanying figure shows a ____.

A) document holder
B) vertical mouse
C) trackball
D) mouse stand
Question
The term ____ refers to the gap between those who have access to information and communications technology and those who do not.

A) digital have not
B) digital divide
C) Internet divide
D) bit divide
Question
____ is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling.

A) Green Grid Alliance
B) Energy Star Alliance
C) Paperless Library
D) Extended producer responsibility
Question
What is a computer hoax?
Question
What is ergonomics?
Question
Carpal Tunnel Syndrome is an example of a(n) _________________________ injury.
Question
To help identify and prosecute a "cammer," most movie studios now embed invisible _________________________ in each print released to a theater.
Question
_________________________ are written with the purpose of being circulated to as many people as possible.
Question
DeQuervain's _________________________ is a condition in which the tendons on the thumb side of the wrists are swollen and irritated.
Question
____ is an example of assistive output devices.

A) One-handed keyboard
B) Head-pointing system with puff switch
C) Voice input system
D) Screen reader software
Question
Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then ____ and resold.

A) reprogrammed
B) refurbished
C) recharged
D) recycled
Question
A(n) _________________________ is a policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.
Question
View your _________________________ as a temporary location only; after reading an e-mail message, immediately delete it, flag it, or file it in an e-mail folder.
Question
  The accompanying figure shows a label that can be displayed when hardware uses between 30% and 65% less _________________________.<div style=padding-top: 35px>
The accompanying figure shows a label that can be displayed when hardware uses between 30% and 65% less _________________________.
Question
Sometimes a different lens prescription or special computer _________________________ can be used to reduce eyestrain while working on a PC.
Question
A(n) _________________________ is designed primarily to elevate the display screen of a notebook or tablet computer to the proper height.
Question
The U.S. Anticybersquatting Act makes ____ cybersquatting illegal.

A) IP address
B) domain name
C) URL
D) Web site name
Question
Give some examples of ethically questionable business practices that have been in the news.
Question
The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as _________________________, is both dishonest and unethical.
Question
In 1992, the U.S. Environmental Protection Agency (EPA) introduced ____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions.

A) ENERGY STAR
B) Eco-Label
C) VeriChip
D) the Green Power Initiative
Question
Explain how patents work.
Question
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing _________________________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment
1
To present someone else's work as your own is plagiarism, which is both a violation of patent law and an unethical act.
True
2
DRM software is used to control the use of a work.
True
3
Extensive mouse use has also been associated with CVS.
False
4
According to the American Institute of Stress, stress costs U.S. employers more than $300 billion each year in healthcare, missed work, and stress-reduction services provided to employees.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Research has shown that having an academic honor code does not effectively reduce cheating.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Ethics with respect to the use of computers are referred to as digital ethics.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
Pirated copies of movies are often created today by videotaping them with a camcorder during a prerelease screening or on the opening day of a movie.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
The eBay Web site states that it prohibits the sale of some controversial or sensitive items, in addition to illegal items.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
In reaction to scandals at Enron, Tyco International, and WorldCom, Congress passed the Sarbanes-Oxley Act of 2002.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Use a light touch on the keyboard to prevent backache.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
In general, according to recent reports by the Pew Internet & American Life Project, individuals with a lower level of income or a lower level of education are more likely to go online.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
In some countries, bootleg copies of music CDs and movie DVDs are sold openly.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Currently, the most common form of computer / Internet addictive behavior is e-mailing.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Braille printers print embossed output in Braille format on paper.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Employees who reveal wrongdoing within an organization to the public or to authorities are referred to as whistle-blowers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Some human resources departments view college degrees from online diploma mills or other nonaccredited organizations as a form of digital manipulation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Efficiently managing your incoming e-mail is a way to avoid computer / Internet addiction.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
To date, the MPAA has not pursued civil litigation against movie pirates.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Registration is required for copyright protection, especially if you need to prove ownership of a copyright, such as during a copyright-infringement lawsuit.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
The monitor should be placed directly in front of the user about an arm's length away, the top of the screen should be no more than 12 inches above the user's eyes once the user's chair is adjusted.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Computer glasses are optimized for viewing in the intermediate zone of vision where a computer monitor usually falls. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.

A) trademark
B) watermark
C) patent
D) copyright
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
The legal concept of limited use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, news reporting, teaching, and research. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Corporate integrity, as it relates to accounting practices and proper disclosure, is a(n) personal ethics topic that has come to the forefront because of the many recent incidents involving corporate scandals and bankruptcies. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
For CTS, the most common symptoms are eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, blurred vision, headaches, and pain in the shoulders, neck, or back. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.

A) digital patent
B) digital trademark
C) digital watermark
D) digital copyright
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Although some publications allow the use of "photo illustrations," others have strict rules about digital manipulation- especially for news photojournalists. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) copyright is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
Digital Copy is a new option for taking your legally purchased movies with you on your computer or portable digital media player. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.

A) cyberinvasion
B) cyberintrusion
C) digital invasion
D) cybersquatting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.

A) trademark
B) copyright
C) patent
D) intellectual ownership right
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
People who refer to written documents while working on their PCs should use document holders to keep their documents close to their monitors. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidentally arrive at the site when trying to type the URL of the legitimate site. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
Keyboard supports lower the keyboard, enabling the user to keep his or her forearms parallel to the floor more easily. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Members of the movie industry hire special firms, such as BayTSP, that specialize in monitoring P₂P networks, Web sites, and other Internet resources in order to identify their clients' copyrighted material that is being misused on the Internet. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.

A) WIPO
B) DRM
C) OLPC
D) USPTO
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Copyrights apply to both published and unpublished works and remain in effect until ____.

A) 10 years after the creation of the work
B) 70 years after the creation of the work
C) 10 years after the creator's death
D) 70 years after the creator's death
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
  The keys on the keyboard shown in the accompanying figure contain Braille overlays. _________________________
The keys on the keyboard shown in the accompanying figure contain Braille overlays. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
The three main types of intellectual property rights are copyrights, trademarks, and ____.

A) warranties
B) patents
C) wills
D) cyber rights
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Early signs of CTS include a feeling of emotional and physical exhaustion. _________________________
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
A teacher sharing a poem with a class, leading the class to believe the poem was his original work constitutes ____.

A) bad manners
B) plagiarism
C) trademark theft
D) patent infringement
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
A ____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.

A) code of security
B) code of conduct
C) privacy policy
D) piracy policy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is ____.

A) copyright law
B) religion
C) vaporware
D) corporate missions
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
While a keyboard, mouse, monitor, and printer can be connected to a portable computer directly, a ____ is a device designed to more easily connect a portable computer to peripheral devices.

A) notebook holder
B) laptop station
C) notebook stand
D) docking station
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
____ is increasingly being tied to crime and even death in some countries.

A) Internet addiction
B) CAD
C) CVS
D) OLPC
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
With more than 78% of its population online, ____ is the leading world region in Internet users.

A) Middle East
B) Europe
C) Africa
D) North America
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Adding to the problem of unethical ____ is the use of digital cameras today, which eliminate the photo negatives that could be used with film cameras to show what photographs actually looked like at the time they were taken.

A) cybersquatting
B) digital counterfeiting
C) identity theft
D) digital manipulation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.

A) one-tenth
B) one-half
C) one-third
D) 80%
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the ____ (ADA).

A) American Data Act
B) Assistive Data Act
C) American Democracy Act
D) Americans with Disabilities Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.

A) OX
B) Simputer
C) OLPC
D) InternetWorld
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
One controversial patent granted to Google in 2013 is for "____" advertising-a business model for charging advertisers according to the number of views an ad receives via a "head mounted gaze tracking device" (speculated to be Google Glass).

A) pay-to-look
B) pay-for-play
C) pay-for-gaze
D) pay-to-view
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
A condition known as ____ has been linked to the repetitive finger movements made when using a keyboard.

A) ergonomics
B) carpal tunnel syndrome (CTS)
C) burnout
D) computer hand syndrome (CHS)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company's disclosures.

A) CEOs and CIOs
B) CEOs and CFOs
C) SOAs and DRMs
D) CCVs and DRMs
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
In addition to being annoying and a waste of time, ____ bog(s) down e-mail systems and clog users' Inboxes.

A) computer worms
B) Trojan horses
C) e-mail hoaxes
D) digital manipulation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
To catch people who are sharing movies illegally on the Internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and then identifies the responsible individual by using the ____ of the computer being used to share the movie.

A) IP address
B) broadcast flag
C) RAM
D) serial port
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs-even create false or misleading photographs.

A) digital counterfeiting
B) identity theft
C) plagiarism
D) digital manipulation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.

A) DRM
B) AACSB
C) patents
D) RSI
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Heavy use of computers, combined with information overload and 24 / 7 accessibility via technology, can lead to ____-a state of fatigue or frustration brought about by overwork.

A) burnout
B) CTS
C) CVS
D) RSI
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
<strong>  The accompanying figure shows a ____.</strong> A) document holder B) vertical mouse C) trackball D) mouse stand
The accompanying figure shows a ____.

A) document holder
B) vertical mouse
C) trackball
D) mouse stand
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
The term ____ refers to the gap between those who have access to information and communications technology and those who do not.

A) digital have not
B) digital divide
C) Internet divide
D) bit divide
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
____ is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling.

A) Green Grid Alliance
B) Energy Star Alliance
C) Paperless Library
D) Extended producer responsibility
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
What is a computer hoax?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
What is ergonomics?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Carpal Tunnel Syndrome is an example of a(n) _________________________ injury.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
To help identify and prosecute a "cammer," most movie studios now embed invisible _________________________ in each print released to a theater.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
_________________________ are written with the purpose of being circulated to as many people as possible.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
DeQuervain's _________________________ is a condition in which the tendons on the thumb side of the wrists are swollen and irritated.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
____ is an example of assistive output devices.

A) One-handed keyboard
B) Head-pointing system with puff switch
C) Voice input system
D) Screen reader software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then ____ and resold.

A) reprogrammed
B) refurbished
C) recharged
D) recycled
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) _________________________ is a policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
View your _________________________ as a temporary location only; after reading an e-mail message, immediately delete it, flag it, or file it in an e-mail folder.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
  The accompanying figure shows a label that can be displayed when hardware uses between 30% and 65% less _________________________.
The accompanying figure shows a label that can be displayed when hardware uses between 30% and 65% less _________________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Sometimes a different lens prescription or special computer _________________________ can be used to reduce eyestrain while working on a PC.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) _________________________ is designed primarily to elevate the display screen of a notebook or tablet computer to the proper height.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
The U.S. Anticybersquatting Act makes ____ cybersquatting illegal.

A) IP address
B) domain name
C) URL
D) Web site name
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
Give some examples of ethically questionable business practices that have been in the news.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as _________________________, is both dishonest and unethical.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
In 1992, the U.S. Environmental Protection Agency (EPA) introduced ____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions.

A) ENERGY STAR
B) Eco-Label
C) VeriChip
D) the Green Power Initiative
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
Explain how patents work.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing _________________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.