Deck 12: Digital Society, Ethics, and Globalization

ملء الشاشة (f)
exit full mode
سؤال
Blogs, discussion groups, and podcasts have provided mouthpieces for anyone with something to say, bringing to light both hidden genius and stupidity.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Many high-level jobs have been automated or outsourced to lower-cost workers in developing countries.
سؤال
Flash mobs organize through cell phone text messaging and e-mail.
سؤال
The new cell phone generation is more concerned with making formal social plans than previous generations.
سؤال
It is okay to dial your cell phone while driving or performing other dangerous tasks that require your full attention.
سؤال
Similar to traditional phones, cell phones allow you to hear the volume of your own voice on the line.
سؤال
The economic digital divide in the United States has been growing since the turn of the millennium.
سؤال
Notebooks are designed for ergonomic comfort.
سؤال
Green computing refers to the efforts of individuals, businesses, and governments to utilize practices both in the manufacturing and the use of digital technologies that are environmentally conscientious.
سؤال
To increase energy efficiency, software can be written in a manner that requires fewer processor cycles to carry out tasks.
سؤال
The ENERGY STAR 10 requirements for computers went into effect July 1, 2007 and have the strictest energy requirements to date.
سؤال
Child pornography goes beyond being indecent and is unlawful in most countries.
سؤال
Much of the information-gathering about individuals is done without their knowledge.
سؤال
The government has more information about U.S. citizens than ChoicePoint.
سؤال
When DARPA's Information Awareness Office proposed a new tracking information system called Total Information Awareness (TIA), privacy advocates supported the new efforts.
سؤال
Federal laws governing wiretapping are generally the same for all forms of communication.
سؤال
The increasing numbers of surveillance cameras used for crime detection and prevention by both cities and private businesses leave very few public spaces unmonitored in most cities.
سؤال
Personal computer ethics is highly subjective except in issues of local, state, and federal law, where ethical issues are clearly defined.
سؤال
Your feelings toward technology should not reflect your feelings about humankind in general.
سؤال
Communities are increasingly defined by online blog networks like MySpace, Facebook, and Twitter, and less by those with whom physical space is shared. _________________________
سؤال
When talking on a cell phone, 5 feet is the minimum distance that should be maintained between you and others while on the phone. _________________________
سؤال
Repetitive stress injury is an injury such as tendinitis and tennis elbow, caused by a repetitive motion. _________________________
سؤال
Some psychologists feel that many young people suffer from nature deficit disorder. They believe that people tend to stay healthier when they stay in touch with nature. _________________________
سؤال
The Energy Cloud program was created in 1992 by the U.S. Environmental Protection Agency in order to inspire energy conservation in electronics products. _________________________
سؤال
The Environmental Protection Agency estimates that 400,000 tons of e-waste are sent to recycling services each year. _________________________
سؤال
The Fifth Amendment to the U.S. Constitution guarantees citizens the right to free speech. _________________________
سؤال
Privacy issues that concern most people include freedom from spying, which is the right to be left alone. _________________________
سؤال
   -Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________<div style=padding-top: 35px>

-Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________
سؤال
Global Information Awareness was designed to capture the information signature of people so that the government could track potential terrorists and criminals. _________________________
سؤال
Actor Edmond O'Brien portrays a citizen in the movie adaptation of George Orwell's book 1974, which depicts a totalitarian society where government monitors citizens in all locations, even in their homes. _________________________
سؤال
RFID implants and tags have been considered for tracking prisoners around a prison, employees around secure facilities, and grade school students around schools. _________________________
سؤال
Ethical issues that deal with computer use is called computer ethics. _________________________
سؤال
The Children's Online Privacy Protection Act of 1998 prohibits businesses from collecting personal data online from children under the age of 18. _________________________
سؤال
In 2004, the World Economic Forum launched the IT Access for Everyone initiative to develop new models of collaboration to accelerate digital access and inclusion. _________________________
سؤال
People find ____ space in a daydream, in a book, in a movie, on a cell phone, on the Internet, or when participating in any activity that takes their minds and attentions away from their present physical surroundings.

A) virtual
B) physical
C) imaginary
D) temporary
سؤال
<strong>   -Referring to the accompanying figure, the picture shows ____ software.</strong> A) nanny-filtering B) content-filtering C) pornography-filtering D) Web-filtering <div style=padding-top: 35px>

-Referring to the accompanying figure, the picture shows ____ software.

A) nanny-filtering
B) content-filtering
C) pornography-filtering
D) Web-filtering
سؤال
<strong>   -Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.</strong> A) one person B) multiple people C) either a. or b. D) neither a. nor b. <div style=padding-top: 35px>

-Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.

A) one person
B) multiple people
C) either a. or b.
D) neither a. nor b.
سؤال
Increasing amounts of correspondence between friends and acquaintances take place electronically through ____.

A) text messaging
B) cell phones
C) e-mail
D) all of the above
سؤال
Most people feel that restaurants, classrooms, concerts, churches, and other ____ are not places for cell phone conversations.

A) public places
B) places where personal space is tight
C) private places
D) only a. and b.
سؤال
The most common RSI for computer users is carpal ____ syndrome.

A) tunnel
B) nerve
C) pain
D) bone
سؤال
Some owners of smart phones who type a lot with their thumbs develop RSI in their thumbs, making it painful to type. The injury is common enough to have its own name: "____ Thumb."

A) Texting
B) Smart phone
C) BlackBerry
D) PDA
سؤال
Internet ____ may exist if people are online for long periods of time, cannot control their online usage, jeopardize their career or family life from excessive Internet usage, and lie to family, friends, and coworkers about excessive Internet usage.

A) illness
B) addiction
C) hyperactivity
D) deficit disorder
سؤال
Some Internet users become addicted to ____ multiplayer online role-playing games.

A) hugely
B) massively
C) wildly
D) enormously
سؤال
It has been estimated that ____ percent of Internet content is pornography.

A) 2
B) 12
C) 22
D) 32
سؤال
The Intergovernmental Panel on ____ Change has determined that the buildup of greenhouse gases resulting from human activity, such as the burning of fossil fuels and deforestation, is primarily responsible for recent trends in global warming.

A) Weather
B) Sky
C) Atmosphere
D) Climate
سؤال
The ____ diodes used in some newer displays reduce energy use by 80 percent over standard LCD displays.

A) light-subtracting
B) light-emitting
C) color-subtracting
D) color-emitting
سؤال
Solid state drives (SSD) are poised to replace hard disk drives, providing ____.

A) faster data access
B) dramatic energy savings
C) both a. and b.
D) neither a. nor b.
سؤال
Computers that are Energy Star certified save ____ percent on energy consumption on average.

A) 10-20
B) 20-30
C) 30-40
D) 40-50
سؤال
Much of the e-waste sent to recycling services contains dangerous contaminants such as lead, cadmium, beryllium, ____, and brominated flame retardants.

A) PVC
B) LED
C) CRT
D) LHS
سؤال
Roughly ____ percent of recycled e-waste is shipped (oftentimes illegally) to developing areas of the world, such as Guiyu, China and Lagos, Nigeria.

A) 60
B) 70
C) 80
D) 90
سؤال
"Current" television network viewers contribute a portion of a network's content over the Internet in two- to seven-minute vlogs, which are called ____ by the network.

A) blogs
B) sections
C) pods
D) snippets
سؤال
Libel is the ____ act of defamation of character by making false statements about a person.

A) deliberate
B) accidental
C) either a. or b.
D) neither a. nor b.
سؤال
When a government or authority controls speech and other forms of expression, it is called ____.

A) spying
B) socialism
C) censorship
D) parenting
سؤال
Content-filtering software works with a ____ to check each Web site for indecent materials and allows only "decent" Web pages to be displayed.

A) Web browser
B) Web user
C) Web server
D) Web e-mail client
سؤال
Computer technology provides us with the ability to collect and maintain much more information than has ever before been possible. This power has given rise to a seemingly endless number of public and private ____ that include details about many individuals' private matters.

A) databases
B) computer networks
C) ISPs
D) ASPs
سؤال
Privacy issues that concern most people include freedom from intrusion, freedom from ____, and control over the information collected and kept about one's self.

A) surveillance
B) tracking
C) historical analysis
D) record control
سؤال
Through the use of ____, Web companies can accumulate immense amounts of information about customers visiting their Web sites.

A) cookies
B) bookmarks
C) tabs
D) toolbars
سؤال
Computer profiling is the primary service provided by private information service companies such as ____.

A) ChoiceNow
B) ChoiceOnline
C) ChoicePoint
D) ChoiceData
سؤال
The Privacy Act of ____ is the primary law controlling what many government agencies can and cannot do with the information they hold.

A) 1972
B) 1974
C) 1976
D) 1978
سؤال
The Family Educational Rights and ____ Act of 2003 restricts the collection of data by federally funded schools.

A) Privacy
B) Security
C) Information
D) Record Keeping
سؤال
The USA ____ Act of 2002 provides the government with the power to view the customer records of Internet service providers and telephone companies without a court order in cases of terrorist investigations.

A) CITIZEN
B) SUPPORT
C) PATRIOT
D) SOLDIER
سؤال
<strong>   -The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.</strong> A) offshoring B) outshoring C) offsourcing D) insourcing <div style=padding-top: 35px>

-The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.

A) offshoring
B) outshoring
C) offsourcing
D) insourcing
سؤال
<strong>   -Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.</strong> A) price-intensive B) material-intensive C) technology-intensive D) labor-intensive <div style=padding-top: 35px>

-Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.

A) price-intensive
B) material-intensive
C) technology-intensive
D) labor-intensive
سؤال
<strong>   -Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.</strong> A) two B) three C) four D) five <div style=padding-top: 35px>

-Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.

A) two
B) three
C) four
D) five
سؤال
The Computer ____ and Privacy Protection Act of 1988 regulates cross-references of data between federal agencies.

A) Security
B) Advancement
C) Patching
D) Matching
سؤال
The ____ Reform Act of 1979 controls the collection and use of certain information collected by the IRS.

A) Tax
B) Bank
C) Investment
D) Retirement
سؤال
The Right to Financial Privacy Act of ____ restricts the government's access to certain financial records maintained by financial institutions.

A) 1972
B) 1978
C) 1982
D) 1988
سؤال
The Freedom of ____ Act of 1970 gives citizens the right to view their own personal records maintained by federal agencies.

A) Data
B) Information
C) Records
D) Files
سؤال
The amount of data stored on virtual servers in the cloud is becoming increasingly difficult to secure. That's why University of Washington computer scientists developed ____, software that enables electronic messages to automatically self-destruct after a certain period of time.

A) Vanish
B) Disappear
C) Magic
D) Self-destruct
سؤال
The ____ Amendment to the U.S. Constitution was created to guarantee a right to privacy.

A) First
B) Second
C) Third
D) Fourth
سؤال
An information ____ is any unique information stored about an individual.

A) sign
B) signature
C) fingerprint
D) blueprint
سؤال
Following the fiasco with Total Information Awareness, in 2002 the U.S. government developed a system called ____.

A) Net Pod
B) Transparency
C) Matrix
D) Mosaic
سؤال
The federal Wiretap Act, enacted in 1968 and expanded in 1986, sometimes referred to as ____, sets procedures for court authorization of real-time surveillance of all kinds of electronic communications in criminal investigations.

A) Title II
B) Title III
C) Title IV
D) Title V
سؤال
The Foreign Intelligence ____ Act of 1978 allows wiretapping based on a finding of probable cause to believe that the target is a member of a foreign terrorist group or an agent of a foreign power.

A) Surveillance
B) Security
C) Privacy
D) Monitoring
سؤال
Perhaps the most advanced video surveillance system can be found in Chicago. The multimillion-dollar system dubbed Operation ____ includes hundreds of street surveillance cameras in Chicago's most crime-ridden neighborhoods.

A) Surveillance
B) Disruption
C) Help
D) Crime Stopper
سؤال
Experts who have the ____ viewpoint about privacy assert that citizens should be assured of 100 percent privacy. They should have absolute control over what personal information is maintained in public and private databases, and there should be no surveillance of any kind for any purpose.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
سؤال
With cooperation from Internet service providers, an FBI surveillance system called Carnivore has been used to monitor ____.

A) blog posts
B) credit card usage
C) e-mail correspondence
D) online purchases and shipment
سؤال
Experts who have the ____ viewpoint about privacy state that citizens should trust governments to provide surveillance in a safe and secure manner that respects privacy rights.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
سؤال
Experts who have the ____ view of privacy state that all surveillance and information should be accessible to every law-abiding citizen.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
سؤال
____ computer ethics involves the responsible use of computers outside of professional environments.

A) Personal
B) Private
C) Home
D) Standard
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/148
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Digital Society, Ethics, and Globalization
1
Blogs, discussion groups, and podcasts have provided mouthpieces for anyone with something to say, bringing to light both hidden genius and stupidity.
True
2
Many high-level jobs have been automated or outsourced to lower-cost workers in developing countries.
False
3
Flash mobs organize through cell phone text messaging and e-mail.
True
4
The new cell phone generation is more concerned with making formal social plans than previous generations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is okay to dial your cell phone while driving or performing other dangerous tasks that require your full attention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
6
Similar to traditional phones, cell phones allow you to hear the volume of your own voice on the line.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
7
The economic digital divide in the United States has been growing since the turn of the millennium.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
8
Notebooks are designed for ergonomic comfort.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
9
Green computing refers to the efforts of individuals, businesses, and governments to utilize practices both in the manufacturing and the use of digital technologies that are environmentally conscientious.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
10
To increase energy efficiency, software can be written in a manner that requires fewer processor cycles to carry out tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ENERGY STAR 10 requirements for computers went into effect July 1, 2007 and have the strictest energy requirements to date.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
12
Child pornography goes beyond being indecent and is unlawful in most countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
13
Much of the information-gathering about individuals is done without their knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
14
The government has more information about U.S. citizens than ChoicePoint.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
15
When DARPA's Information Awareness Office proposed a new tracking information system called Total Information Awareness (TIA), privacy advocates supported the new efforts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
16
Federal laws governing wiretapping are generally the same for all forms of communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
17
The increasing numbers of surveillance cameras used for crime detection and prevention by both cities and private businesses leave very few public spaces unmonitored in most cities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
18
Personal computer ethics is highly subjective except in issues of local, state, and federal law, where ethical issues are clearly defined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
19
Your feelings toward technology should not reflect your feelings about humankind in general.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
20
Communities are increasingly defined by online blog networks like MySpace, Facebook, and Twitter, and less by those with whom physical space is shared. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
21
When talking on a cell phone, 5 feet is the minimum distance that should be maintained between you and others while on the phone. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
22
Repetitive stress injury is an injury such as tendinitis and tennis elbow, caused by a repetitive motion. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
23
Some psychologists feel that many young people suffer from nature deficit disorder. They believe that people tend to stay healthier when they stay in touch with nature. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Energy Cloud program was created in 1992 by the U.S. Environmental Protection Agency in order to inspire energy conservation in electronics products. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Environmental Protection Agency estimates that 400,000 tons of e-waste are sent to recycling services each year. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
26
The Fifth Amendment to the U.S. Constitution guarantees citizens the right to free speech. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
27
Privacy issues that concern most people include freedom from spying, which is the right to be left alone. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
28
   -Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________

-Referring to the accompanying figure, the stimulus package that President Obama signed into law includes billions of dollars for extending high-speed Internet access to underserved areas of the country. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
29
Global Information Awareness was designed to capture the information signature of people so that the government could track potential terrorists and criminals. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
30
Actor Edmond O'Brien portrays a citizen in the movie adaptation of George Orwell's book 1974, which depicts a totalitarian society where government monitors citizens in all locations, even in their homes. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
31
RFID implants and tags have been considered for tracking prisoners around a prison, employees around secure facilities, and grade school students around schools. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
32
Ethical issues that deal with computer use is called computer ethics. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
33
The Children's Online Privacy Protection Act of 1998 prohibits businesses from collecting personal data online from children under the age of 18. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
34
In 2004, the World Economic Forum launched the IT Access for Everyone initiative to develop new models of collaboration to accelerate digital access and inclusion. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
35
People find ____ space in a daydream, in a book, in a movie, on a cell phone, on the Internet, or when participating in any activity that takes their minds and attentions away from their present physical surroundings.

A) virtual
B) physical
C) imaginary
D) temporary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
36
<strong>   -Referring to the accompanying figure, the picture shows ____ software.</strong> A) nanny-filtering B) content-filtering C) pornography-filtering D) Web-filtering

-Referring to the accompanying figure, the picture shows ____ software.

A) nanny-filtering
B) content-filtering
C) pornography-filtering
D) Web-filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
37
<strong>   -Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.</strong> A) one person B) multiple people C) either a. or b. D) neither a. nor b.

-Referring to the accompanying figure, this type of software is ideal for situations where ____ is/are responsible for setting the rules and defining what is allowable and not.

A) one person
B) multiple people
C) either a. or b.
D) neither a. nor b.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
38
Increasing amounts of correspondence between friends and acquaintances take place electronically through ____.

A) text messaging
B) cell phones
C) e-mail
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
39
Most people feel that restaurants, classrooms, concerts, churches, and other ____ are not places for cell phone conversations.

A) public places
B) places where personal space is tight
C) private places
D) only a. and b.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
40
The most common RSI for computer users is carpal ____ syndrome.

A) tunnel
B) nerve
C) pain
D) bone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
41
Some owners of smart phones who type a lot with their thumbs develop RSI in their thumbs, making it painful to type. The injury is common enough to have its own name: "____ Thumb."

A) Texting
B) Smart phone
C) BlackBerry
D) PDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
42
Internet ____ may exist if people are online for long periods of time, cannot control their online usage, jeopardize their career or family life from excessive Internet usage, and lie to family, friends, and coworkers about excessive Internet usage.

A) illness
B) addiction
C) hyperactivity
D) deficit disorder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
43
Some Internet users become addicted to ____ multiplayer online role-playing games.

A) hugely
B) massively
C) wildly
D) enormously
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
44
It has been estimated that ____ percent of Internet content is pornography.

A) 2
B) 12
C) 22
D) 32
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
45
The Intergovernmental Panel on ____ Change has determined that the buildup of greenhouse gases resulting from human activity, such as the burning of fossil fuels and deforestation, is primarily responsible for recent trends in global warming.

A) Weather
B) Sky
C) Atmosphere
D) Climate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
46
The ____ diodes used in some newer displays reduce energy use by 80 percent over standard LCD displays.

A) light-subtracting
B) light-emitting
C) color-subtracting
D) color-emitting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
47
Solid state drives (SSD) are poised to replace hard disk drives, providing ____.

A) faster data access
B) dramatic energy savings
C) both a. and b.
D) neither a. nor b.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
48
Computers that are Energy Star certified save ____ percent on energy consumption on average.

A) 10-20
B) 20-30
C) 30-40
D) 40-50
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
49
Much of the e-waste sent to recycling services contains dangerous contaminants such as lead, cadmium, beryllium, ____, and brominated flame retardants.

A) PVC
B) LED
C) CRT
D) LHS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
50
Roughly ____ percent of recycled e-waste is shipped (oftentimes illegally) to developing areas of the world, such as Guiyu, China and Lagos, Nigeria.

A) 60
B) 70
C) 80
D) 90
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
51
"Current" television network viewers contribute a portion of a network's content over the Internet in two- to seven-minute vlogs, which are called ____ by the network.

A) blogs
B) sections
C) pods
D) snippets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
52
Libel is the ____ act of defamation of character by making false statements about a person.

A) deliberate
B) accidental
C) either a. or b.
D) neither a. nor b.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
53
When a government or authority controls speech and other forms of expression, it is called ____.

A) spying
B) socialism
C) censorship
D) parenting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
54
Content-filtering software works with a ____ to check each Web site for indecent materials and allows only "decent" Web pages to be displayed.

A) Web browser
B) Web user
C) Web server
D) Web e-mail client
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
55
Computer technology provides us with the ability to collect and maintain much more information than has ever before been possible. This power has given rise to a seemingly endless number of public and private ____ that include details about many individuals' private matters.

A) databases
B) computer networks
C) ISPs
D) ASPs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
56
Privacy issues that concern most people include freedom from intrusion, freedom from ____, and control over the information collected and kept about one's self.

A) surveillance
B) tracking
C) historical analysis
D) record control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
57
Through the use of ____, Web companies can accumulate immense amounts of information about customers visiting their Web sites.

A) cookies
B) bookmarks
C) tabs
D) toolbars
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
58
Computer profiling is the primary service provided by private information service companies such as ____.

A) ChoiceNow
B) ChoiceOnline
C) ChoicePoint
D) ChoiceData
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
59
The Privacy Act of ____ is the primary law controlling what many government agencies can and cannot do with the information they hold.

A) 1972
B) 1974
C) 1976
D) 1978
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
60
The Family Educational Rights and ____ Act of 2003 restricts the collection of data by federally funded schools.

A) Privacy
B) Security
C) Information
D) Record Keeping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
61
The USA ____ Act of 2002 provides the government with the power to view the customer records of Internet service providers and telephone companies without a court order in cases of terrorist investigations.

A) CITIZEN
B) SUPPORT
C) PATRIOT
D) SOLDIER
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
62
<strong>   -The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.</strong> A) offshoring B) outshoring C) offsourcing D) insourcing

-The accompanying photo shows a Chinese workforce eager to work for low wages. This is an example of ____.

A) offshoring
B) outshoring
C) offsourcing
D) insourcing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
63
<strong>   -Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.</strong> A) price-intensive B) material-intensive C) technology-intensive D) labor-intensive

-Referring to the accompanying figure, many business consultants recommend that U.S. companies offshore ____ operations in order to stay competitive.

A) price-intensive
B) material-intensive
C) technology-intensive
D) labor-intensive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
64
<strong>   -Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.</strong> A) two B) three C) four D) five

-Referring to the accompanying figure, China's population is more than ____ times that of the United States, and presents a growing customer base for U.S. products.

A) two
B) three
C) four
D) five
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
65
The Computer ____ and Privacy Protection Act of 1988 regulates cross-references of data between federal agencies.

A) Security
B) Advancement
C) Patching
D) Matching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
66
The ____ Reform Act of 1979 controls the collection and use of certain information collected by the IRS.

A) Tax
B) Bank
C) Investment
D) Retirement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
67
The Right to Financial Privacy Act of ____ restricts the government's access to certain financial records maintained by financial institutions.

A) 1972
B) 1978
C) 1982
D) 1988
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
68
The Freedom of ____ Act of 1970 gives citizens the right to view their own personal records maintained by federal agencies.

A) Data
B) Information
C) Records
D) Files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
69
The amount of data stored on virtual servers in the cloud is becoming increasingly difficult to secure. That's why University of Washington computer scientists developed ____, software that enables electronic messages to automatically self-destruct after a certain period of time.

A) Vanish
B) Disappear
C) Magic
D) Self-destruct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
70
The ____ Amendment to the U.S. Constitution was created to guarantee a right to privacy.

A) First
B) Second
C) Third
D) Fourth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
71
An information ____ is any unique information stored about an individual.

A) sign
B) signature
C) fingerprint
D) blueprint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
72
Following the fiasco with Total Information Awareness, in 2002 the U.S. government developed a system called ____.

A) Net Pod
B) Transparency
C) Matrix
D) Mosaic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
73
The federal Wiretap Act, enacted in 1968 and expanded in 1986, sometimes referred to as ____, sets procedures for court authorization of real-time surveillance of all kinds of electronic communications in criminal investigations.

A) Title II
B) Title III
C) Title IV
D) Title V
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
74
The Foreign Intelligence ____ Act of 1978 allows wiretapping based on a finding of probable cause to believe that the target is a member of a foreign terrorist group or an agent of a foreign power.

A) Surveillance
B) Security
C) Privacy
D) Monitoring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
75
Perhaps the most advanced video surveillance system can be found in Chicago. The multimillion-dollar system dubbed Operation ____ includes hundreds of street surveillance cameras in Chicago's most crime-ridden neighborhoods.

A) Surveillance
B) Disruption
C) Help
D) Crime Stopper
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
76
Experts who have the ____ viewpoint about privacy assert that citizens should be assured of 100 percent privacy. They should have absolute control over what personal information is maintained in public and private databases, and there should be no surveillance of any kind for any purpose.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
77
With cooperation from Internet service providers, an FBI surveillance system called Carnivore has been used to monitor ____.

A) blog posts
B) credit card usage
C) e-mail correspondence
D) online purchases and shipment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
78
Experts who have the ____ viewpoint about privacy state that citizens should trust governments to provide surveillance in a safe and secure manner that respects privacy rights.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
79
Experts who have the ____ view of privacy state that all surveillance and information should be accessible to every law-abiding citizen.

A) Full privacy
B) Full trust
C) Full transparency
D) Full freedom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
80
____ computer ethics involves the responsible use of computers outside of professional environments.

A) Personal
B) Private
C) Home
D) Standard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 148 في هذه المجموعة.