Deck 12: Digital Society, Ethics, and Globalization

Full screen (f)
exit full mode
Question
Blogs, discussion groups, and podcasts have provided mouthpieces for anyone with something to say, bringing to light both hidden genius and stupidity.
Use Space or
up arrow
down arrow
to flip the card.
Question
Many high-level jobs have been automated or outsourced to lower-cost workers in developing countries.
Question
Flash mobs organize through cell phone text messaging and e-mail.
Question
The new cell phone generation is more concerned with making formal social plans than previous generations.
Question
It is okay to dial your cell phone while driving or performing other dangerous tasks that require your full attention.
Question
Similar to traditional phones, cell phones allow you to hear the volume of your own voice on the line.
Question
The economic digital divide in the United States has been growing since the turn of the millennium.
Question
Notebooks are designed for ergonomic comfort.
Question
Green computing refers to the efforts of individuals, businesses, and governments to utilize practices both in the manufacturing and the use of digital technologies that are environmentally conscientious.
Question
To increase energy efficiency, software can be written in a manner that requires fewer processor cycles to carry out tasks.
Question
The ENERGY STAR 10 requirements for computers went into effect July 1, 2007 and have the strictest energy requirements to date.
Question
Child pornography goes beyond being indecent and is unlawful in most countries.
Question
Much of the information-gathering about individuals is done without their knowledge.
Question
The government has more information about U.S. citizens than ChoicePoint.
Question
When DARPA's Information Awareness Office proposed a new tracking information system called Total Information Awareness (TIA), privacy advocates supported the new efforts.
Question
Federal laws governing wiretapping are generally the same for all forms of communication.
Question
The increasing numbers of surveillance cameras used for crime detection and prevention by both cities and private businesses leave very few public spaces unmonitored in most cities.
Question
Personal computer ethics is highly subjective except in issues of local, state, and federal law, where ethical issues are clearly defined.
Question
Your feelings toward technology should not reflect your feelings about humankind in general.
Question
Communities are increasingly defined by online blog networks like MySpace, Facebook, and Twitter, and less by those with whom physical space is shared. _________________________
Question
When talking on a cell phone, 5 feet is the minimum distance that should be maintained between you and others while on the phone. _________________________
Question
Repetitive stress injury is an injury such as tendinitis and tennis elbow, caused by a repetitive motion. _________________________
Question
Some psychologists feel that many young people suffer from nature deficit disorder. They believe that people tend to stay healthier when they stay in touch with nature. _________________________
Question
The Energy Cloud program was created in 1992 by the U.S. Environmental Protection Agency in order to inspire energy conservation in electronics products. _________________________
Question
The Environmental Protection Agency estimates that 400,000 tons of e-waste are sent to recycling services each year. _________________________
Question
The Fifth Amendment to the U.S. Constitution guarantees citizens the right to free speech. _________________________
Question
Privacy issues that concern most people include freedom from spying, which is the right to be left alone. _________________________
Question
  -Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________<div style=padding-top: 35px>
-Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________
Question
Global Information Awareness was designed to capture the information signature of people so that the government could track potential terrorists and criminals. _________________________
Question
Actor Edmond O'Brien portrays a citizen in the movie adaptation of George Orwell's book 1974, which depicts a totalitarian society where government monitors citizens in all locations, even in their homes. _________________________
Question
RFID implants and tags have been considered for tracking prisoners around a prison, employees around secure facilities, and grade school students around schools. _________________________
Question
Ethical issues that deal with computer use is called computer ethics. _________________________
Question
The Children's Online Privacy Protection Act of 1998 prohibits businesses from collecting personal data online from children under the age of 18. _________________________
Question
In 2004, the World Economic Forum launched the IT Access for Everyone initiative to develop new models of collaboration to accelerate digital access and inclusion. _________________________
Question
People find ____ space in a daydream, in a book, in a movie, on a cell phone, on the Internet, or when participating in any activity that takes their minds and attentions away from their present physical surroundings.

A) virtual
B) physical
C) imaginary
D) temporary
Question
<strong>  -Referring to the accompanying figure, the picture shows ____ software.</strong> A) nanny-filtering B) content-filtering C) pornography-filtering D) Web-filtering <div style=padding-top: 35px>
-Referring to the accompanying figure, the picture shows ____ software.

A) nanny-filtering
B) content-filtering
C) pornography-filtering
D) Web-filtering
Question
<strong>  -Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.</strong> A) one person B) multiple people C) either a. or b. D) neither a. nor b. <div style=padding-top: 35px>
-Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.

A) one person
B) multiple people
C) either a. or b.
D) neither a. nor b.
Question
Increasing amounts of correspondence between friends and acquaintances take place electronically through ____.

A) text messaging
B) cell phones
C) e-mail
D) all of the above
Question
Most people feel that restaurants, classrooms, concerts, churches, and other ____ are not places for cell phone conversations.

A) public places
B) places where personal space is tight
C) private places
D) only a. and b.
Question
The most common RSI for computer users is carpal ____ syndrome.

A) tunnel
B) nerve
C) pain
D) bone
Question
Some owners of smart phones who type a lot with their thumbs develop RSI in their thumbs, making it painful to type. The injury is common enough to have its own name: "____ Thumb."

A) Texting
B) Smart phone
C) BlackBerry
D) PDA
Question
Internet ____ may exist if people are online for long periods of time, cannot control their online usage, jeopardize their career or family life from excessive Internet usage, and lie to family, friends, and coworkers about excessive Internet usage.

A) illness
B) addiction
C) hyperactivity
D) deficit disorder
Question
Some Internet users become addicted to ____ multiplayer online role-playing games.

A) hugely
B) massively
C) wildly
D) enormously
Question
It has been estimated that ____ percent of Internet content is pornography.

A) 2
B) 12
C) 22
D) 32
Question
The Intergovernmental Panel on ____ Change has determined that the buildup of greenhouse gases resulting from human activity, such as the burning of fossil fuels and deforestation, is primarily responsible for recent trends in global warming.

A) Weather
B) Sky
C) Atmosphere
D) Climate
Question
The ____ diodes used in some newer displays reduce energy use by 80 percent over standard LCD displays.

A) light-subtracting
B) light-emitting
C) color-subtracting
D) color-emitting
Question
Solid state drives (SSD) are poised to replace hard disk drives, providing ____.

A) faster data access
B) dramatic energy savings
C) both a. and b.
D) neither a. nor b.
Question
Computers that are Energy Star certified save ____ percent on energy consumption on average.

A) 10-20
B) 20-30
C) 30-40
D) 40-50
Question
Much of the e-waste sent to recycling services contains dangerous contaminants such as lead, cadmium, beryllium, ____, and brominated flame retardants.

A) PVC
B) LED
C) CRT
D) LHS
Question
Roughly ____ percent of recycled e-waste is shipped (oftentimes illegally) to developing areas of the world, such as Guiyu, China and Lagos, Nigeria.

A) 60
B) 70
C) 80
D) 90
Question
"Current" television network viewers contribute a portion of a network's content over the Internet in two- to seven-minute vlogs, which are called ____ by the network.

A) blogs
B) sections
C) pods
D) snippets
Question
Libel is the ____ act of defamation of character by making false statements about a person.

A) deliberate
B) accidental
C) either a. or b.
D) neither a. nor b.
Question
When a government or authority controls speech and other forms of expression, it is called ____.

A) spying
B) socialism
C) censorship
D) parenting
Question
Content-filtering software works with a ____ to check each Web site for indecent materials and allows only "decent" Web pages to be displayed.

A) Web browser
B) Web user
C) Web server
D) Web e-mail client
Question
Computer technology provides us with the ability to collect and maintain much more information than has ever before been possible. This power has given rise to a seemingly endless number of public and private ____ that include details about many individuals' private matters.

A) databases
B) computer networks
C) ISPs
D) ASPs
Question
Privacy issues that concern most people include freedom from intrusion, freedom from ____, and control over the information collected and kept about one's self.

A) surveillance
B) tracking
C) historical analysis
D) record control
Question
Through the use of ____, Web companies can accumulate immense amounts of information about customers visiting their Web sites.

A) cookies
B) bookmarks
C) tabs
D) toolbars
Question
Computer profiling is the primary service provided by private information service companies such as ____.

A) ChoiceNow
B) ChoiceOnline
C) ChoicePoint
D) ChoiceData
Question
The Privacy Act of ____ is the primary law controlling what many government agencies can and cannot do with the information they hold.

A) 1972
B) 1974
C) 1976
D) 1978
Question
The Family Educational Rights and ____ Act of 2003 restricts the collection of data by federally funded schools.

A) Privacy
B) Security
C) Information
D) Record Keeping
Question
The USA ____ Act of 2002 provides the government with the power to view the customer records of Internet service providers and telephone companies without a court order in cases of terrorist investigations.

A) CITIZEN
B) SUPPORT
C) PATRIOT
D) SOLDIER
Question
<strong>  -The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.</strong> A) offshoring B) outshoring C) offsourcing D) insourcing <div style=padding-top: 35px>
-The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.

A) offshoring
B) outshoring
C) offsourcing
D) insourcing
Question
<strong>  -Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.</strong> A) price-intensive B) material-intensive C) technology-intensive D) labor-intensive <div style=padding-top: 35px>
-Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.

A) price-intensive
B) material-intensive
C) technology-intensive
D) labor-intensive
Question
<strong>  -Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.</strong> A) two B) three C) four D) five <div style=padding-top: 35px>
-Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.

A) two
B) three
C) four
D) five
Question
The Computer ____ and Privacy Protection Act of 1988 regulates cross-references of data between federal agencies.

A) Security
B) Advancement
C) Patching
D) Matching
Question
The ____ Reform Act of 1979 controls the collection and use of certain information collected by the IRS.

A) Tax
B) Bank
C) Investment
D) Retirement
Question
The Right to Financial Privacy Act of ____ restricts the government's access to certain financial records maintained by financial institutions.

A) 1972
B) 1978
C) 1982
D) 1988
Question
The Freedom of ____ Act of 1970 gives citizens the right to view their own personal records maintained by federal agencies.

A) Data
B) Information
C) Records
D) Files
Question
The amount of data stored on virtual servers in the cloud is becoming increasingly difficult to secure. That's why University of Washington computer scientists developed ____, software that enables electronic messages to automatically self-destruct after a certain period of time.

A) Vanish
B) Disappear
C) Magic
D) Self-destruct
Question
The ____ Amendment to the U.S. Constitution was created to guarantee a right to privacy.

A) First
B) Second
C) Third
D) Fourth
Question
An information ____ is any unique information stored about an individual.

A) sign
B) signature
C) fingerprint
D) blueprint
Question
Following the fiasco with Total Information Awareness, in 2002 the U.S. government developed a system called ____.

A) Net Pod
B) Transparency
C) Matrix
D) Mosaic
Question
The federal Wiretap Act, enacted in 1968 and expanded in 1986, sometimes referred to as ____, sets procedures for court authorization of real-time surveillance of all kinds of electronic communications in criminal investigations.

A) Title II
B) Title III
C) Title IV
D) Title V
Question
The Foreign Intelligence ____ Act of 1978 allows wiretapping based on a finding of probable cause to believe that the target is a member of a foreign terrorist group or an agent of a foreign power.

A) Surveillance
B) Security
C) Privacy
D) Monitoring
Question
Perhaps the most advanced video surveillance system can be found in Chicago. The multimillion-dollar system dubbed Operation ____ includes hundreds of street surveillance cameras in Chicago's most crime-ridden neighborhoods.

A) Surveillance
B) Disruption
C) Help
D) Crime Stopper
Question
Experts who have the ____ viewpoint about privacy assert that citizens should be assured of 100 percent privacy. They should have absolute control over what personal information is maintained in public and private databases, and there should be no surveillance of any kind for any purpose.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
Question
With cooperation from Internet service providers, an FBI surveillance system called Carnivore has been used to monitor ____.

A) blog posts
B) credit card usage
C) e-mail correspondence
D) online purchases and shipment
Question
Experts who have the ____ viewpoint about privacy state that citizens should trust governments to provide surveillance in a safe and secure manner that respects privacy rights.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
Question
Experts who have the ____ view of privacy state that all surveillance and information should be accessible to every law-abiding citizen.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
Question
____ computer ethics involves the responsible use of computers outside of professional environments.

A) Personal
B) Private
C) Home
D) Standard
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/148
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Digital Society, Ethics, and Globalization
1
Blogs, discussion groups, and podcasts have provided mouthpieces for anyone with something to say, bringing to light both hidden genius and stupidity.
True
2
Many high-level jobs have been automated or outsourced to lower-cost workers in developing countries.
False
3
Flash mobs organize through cell phone text messaging and e-mail.
True
4
The new cell phone generation is more concerned with making formal social plans than previous generations.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
5
It is okay to dial your cell phone while driving or performing other dangerous tasks that require your full attention.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
6
Similar to traditional phones, cell phones allow you to hear the volume of your own voice on the line.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
7
The economic digital divide in the United States has been growing since the turn of the millennium.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
8
Notebooks are designed for ergonomic comfort.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
9
Green computing refers to the efforts of individuals, businesses, and governments to utilize practices both in the manufacturing and the use of digital technologies that are environmentally conscientious.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
10
To increase energy efficiency, software can be written in a manner that requires fewer processor cycles to carry out tasks.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
11
The ENERGY STAR 10 requirements for computers went into effect July 1, 2007 and have the strictest energy requirements to date.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
12
Child pornography goes beyond being indecent and is unlawful in most countries.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
13
Much of the information-gathering about individuals is done without their knowledge.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
14
The government has more information about U.S. citizens than ChoicePoint.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
15
When DARPA's Information Awareness Office proposed a new tracking information system called Total Information Awareness (TIA), privacy advocates supported the new efforts.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
16
Federal laws governing wiretapping are generally the same for all forms of communication.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
17
The increasing numbers of surveillance cameras used for crime detection and prevention by both cities and private businesses leave very few public spaces unmonitored in most cities.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
18
Personal computer ethics is highly subjective except in issues of local, state, and federal law, where ethical issues are clearly defined.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
19
Your feelings toward technology should not reflect your feelings about humankind in general.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
20
Communities are increasingly defined by online blog networks like MySpace, Facebook, and Twitter, and less by those with whom physical space is shared. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
21
When talking on a cell phone, 5 feet is the minimum distance that should be maintained between you and others while on the phone. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
22
Repetitive stress injury is an injury such as tendinitis and tennis elbow, caused by a repetitive motion. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
23
Some psychologists feel that many young people suffer from nature deficit disorder. They believe that people tend to stay healthier when they stay in touch with nature. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
24
The Energy Cloud program was created in 1992 by the U.S. Environmental Protection Agency in order to inspire energy conservation in electronics products. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
25
The Environmental Protection Agency estimates that 400,000 tons of e-waste are sent to recycling services each year. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
26
The Fifth Amendment to the U.S. Constitution guarantees citizens the right to free speech. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
27
Privacy issues that concern most people include freedom from spying, which is the right to be left alone. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
28
  -Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________
-Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
29
Global Information Awareness was designed to capture the information signature of people so that the government could track potential terrorists and criminals. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
30
Actor Edmond O'Brien portrays a citizen in the movie adaptation of George Orwell's book 1974, which depicts a totalitarian society where government monitors citizens in all locations, even in their homes. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
31
RFID implants and tags have been considered for tracking prisoners around a prison, employees around secure facilities, and grade school students around schools. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
32
Ethical issues that deal with computer use is called computer ethics. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
33
The Children's Online Privacy Protection Act of 1998 prohibits businesses from collecting personal data online from children under the age of 18. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
34
In 2004, the World Economic Forum launched the IT Access for Everyone initiative to develop new models of collaboration to accelerate digital access and inclusion. _________________________
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
35
People find ____ space in a daydream, in a book, in a movie, on a cell phone, on the Internet, or when participating in any activity that takes their minds and attentions away from their present physical surroundings.

A) virtual
B) physical
C) imaginary
D) temporary
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
36
<strong>  -Referring to the accompanying figure, the picture shows ____ software.</strong> A) nanny-filtering B) content-filtering C) pornography-filtering D) Web-filtering
-Referring to the accompanying figure, the picture shows ____ software.

A) nanny-filtering
B) content-filtering
C) pornography-filtering
D) Web-filtering
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
37
<strong>  -Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.</strong> A) one person B) multiple people C) either a. or b. D) neither a. nor b.
-Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.

A) one person
B) multiple people
C) either a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
38
Increasing amounts of correspondence between friends and acquaintances take place electronically through ____.

A) text messaging
B) cell phones
C) e-mail
D) all of the above
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
39
Most people feel that restaurants, classrooms, concerts, churches, and other ____ are not places for cell phone conversations.

A) public places
B) places where personal space is tight
C) private places
D) only a. and b.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
40
The most common RSI for computer users is carpal ____ syndrome.

A) tunnel
B) nerve
C) pain
D) bone
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
41
Some owners of smart phones who type a lot with their thumbs develop RSI in their thumbs, making it painful to type. The injury is common enough to have its own name: "____ Thumb."

A) Texting
B) Smart phone
C) BlackBerry
D) PDA
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
42
Internet ____ may exist if people are online for long periods of time, cannot control their online usage, jeopardize their career or family life from excessive Internet usage, and lie to family, friends, and coworkers about excessive Internet usage.

A) illness
B) addiction
C) hyperactivity
D) deficit disorder
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
43
Some Internet users become addicted to ____ multiplayer online role-playing games.

A) hugely
B) massively
C) wildly
D) enormously
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
44
It has been estimated that ____ percent of Internet content is pornography.

A) 2
B) 12
C) 22
D) 32
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
45
The Intergovernmental Panel on ____ Change has determined that the buildup of greenhouse gases resulting from human activity, such as the burning of fossil fuels and deforestation, is primarily responsible for recent trends in global warming.

A) Weather
B) Sky
C) Atmosphere
D) Climate
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
46
The ____ diodes used in some newer displays reduce energy use by 80 percent over standard LCD displays.

A) light-subtracting
B) light-emitting
C) color-subtracting
D) color-emitting
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
47
Solid state drives (SSD) are poised to replace hard disk drives, providing ____.

A) faster data access
B) dramatic energy savings
C) both a. and b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
48
Computers that are Energy Star certified save ____ percent on energy consumption on average.

A) 10-20
B) 20-30
C) 30-40
D) 40-50
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
49
Much of the e-waste sent to recycling services contains dangerous contaminants such as lead, cadmium, beryllium, ____, and brominated flame retardants.

A) PVC
B) LED
C) CRT
D) LHS
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
50
Roughly ____ percent of recycled e-waste is shipped (oftentimes illegally) to developing areas of the world, such as Guiyu, China and Lagos, Nigeria.

A) 60
B) 70
C) 80
D) 90
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
51
"Current" television network viewers contribute a portion of a network's content over the Internet in two- to seven-minute vlogs, which are called ____ by the network.

A) blogs
B) sections
C) pods
D) snippets
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
52
Libel is the ____ act of defamation of character by making false statements about a person.

A) deliberate
B) accidental
C) either a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
53
When a government or authority controls speech and other forms of expression, it is called ____.

A) spying
B) socialism
C) censorship
D) parenting
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
54
Content-filtering software works with a ____ to check each Web site for indecent materials and allows only "decent" Web pages to be displayed.

A) Web browser
B) Web user
C) Web server
D) Web e-mail client
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
55
Computer technology provides us with the ability to collect and maintain much more information than has ever before been possible. This power has given rise to a seemingly endless number of public and private ____ that include details about many individuals' private matters.

A) databases
B) computer networks
C) ISPs
D) ASPs
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
56
Privacy issues that concern most people include freedom from intrusion, freedom from ____, and control over the information collected and kept about one's self.

A) surveillance
B) tracking
C) historical analysis
D) record control
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
57
Through the use of ____, Web companies can accumulate immense amounts of information about customers visiting their Web sites.

A) cookies
B) bookmarks
C) tabs
D) toolbars
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
58
Computer profiling is the primary service provided by private information service companies such as ____.

A) ChoiceNow
B) ChoiceOnline
C) ChoicePoint
D) ChoiceData
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
59
The Privacy Act of ____ is the primary law controlling what many government agencies can and cannot do with the information they hold.

A) 1972
B) 1974
C) 1976
D) 1978
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
60
The Family Educational Rights and ____ Act of 2003 restricts the collection of data by federally funded schools.

A) Privacy
B) Security
C) Information
D) Record Keeping
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
61
The USA ____ Act of 2002 provides the government with the power to view the customer records of Internet service providers and telephone companies without a court order in cases of terrorist investigations.

A) CITIZEN
B) SUPPORT
C) PATRIOT
D) SOLDIER
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
62
<strong>  -The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.</strong> A) offshoring B) outshoring C) offsourcing D) insourcing
-The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.

A) offshoring
B) outshoring
C) offsourcing
D) insourcing
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
63
<strong>  -Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.</strong> A) price-intensive B) material-intensive C) technology-intensive D) labor-intensive
-Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.

A) price-intensive
B) material-intensive
C) technology-intensive
D) labor-intensive
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
64
<strong>  -Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.</strong> A) two B) three C) four D) five
-Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.

A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
65
The Computer ____ and Privacy Protection Act of 1988 regulates cross-references of data between federal agencies.

A) Security
B) Advancement
C) Patching
D) Matching
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
66
The ____ Reform Act of 1979 controls the collection and use of certain information collected by the IRS.

A) Tax
B) Bank
C) Investment
D) Retirement
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
67
The Right to Financial Privacy Act of ____ restricts the government's access to certain financial records maintained by financial institutions.

A) 1972
B) 1978
C) 1982
D) 1988
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
68
The Freedom of ____ Act of 1970 gives citizens the right to view their own personal records maintained by federal agencies.

A) Data
B) Information
C) Records
D) Files
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
69
The amount of data stored on virtual servers in the cloud is becoming increasingly difficult to secure. That's why University of Washington computer scientists developed ____, software that enables electronic messages to automatically self-destruct after a certain period of time.

A) Vanish
B) Disappear
C) Magic
D) Self-destruct
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
70
The ____ Amendment to the U.S. Constitution was created to guarantee a right to privacy.

A) First
B) Second
C) Third
D) Fourth
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
71
An information ____ is any unique information stored about an individual.

A) sign
B) signature
C) fingerprint
D) blueprint
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
72
Following the fiasco with Total Information Awareness, in 2002 the U.S. government developed a system called ____.

A) Net Pod
B) Transparency
C) Matrix
D) Mosaic
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
73
The federal Wiretap Act, enacted in 1968 and expanded in 1986, sometimes referred to as ____, sets procedures for court authorization of real-time surveillance of all kinds of electronic communications in criminal investigations.

A) Title II
B) Title III
C) Title IV
D) Title V
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
74
The Foreign Intelligence ____ Act of 1978 allows wiretapping based on a finding of probable cause to believe that the target is a member of a foreign terrorist group or an agent of a foreign power.

A) Surveillance
B) Security
C) Privacy
D) Monitoring
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
75
Perhaps the most advanced video surveillance system can be found in Chicago. The multimillion-dollar system dubbed Operation ____ includes hundreds of street surveillance cameras in Chicago's most crime-ridden neighborhoods.

A) Surveillance
B) Disruption
C) Help
D) Crime Stopper
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
76
Experts who have the ____ viewpoint about privacy assert that citizens should be assured of 100 percent privacy. They should have absolute control over what personal information is maintained in public and private databases, and there should be no surveillance of any kind for any purpose.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
77
With cooperation from Internet service providers, an FBI surveillance system called Carnivore has been used to monitor ____.

A) blog posts
B) credit card usage
C) e-mail correspondence
D) online purchases and shipment
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
78
Experts who have the ____ viewpoint about privacy state that citizens should trust governments to provide surveillance in a safe and secure manner that respects privacy rights.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
79
Experts who have the ____ view of privacy state that all surveillance and information should be accessible to every law-abiding citizen.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
80
____ computer ethics involves the responsible use of computers outside of professional environments.

A) Personal
B) Private
C) Home
D) Standard
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 148 flashcards in this deck.