Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Mathematic
Q:
Software-as-a-service is an easy way to get temporary software when you are on the road.
Q:
_____ is a three-dimensional computer simulation in which you actively and physically participate.
Q:
ASPs can provide software on a pay per use basis.
Q:
A(n) _____ is an input device that captures and records the shape and movement of your hand and fingers and the strength of your hand and finger movements.
Q:
SpeedPass is an example of using GPS.
Q:
Retailers are planning to use RFID in their supply chain management.
Q:
EPC using RFID is the next generation of UPC.
Q:
Nanotechnology is a discipline that seeks to control matter at the atomic and subatomic levels for the purpose of building devices on the same scale.
Q:
Biotechnology encourages atoms to "self-assemble" into new forms.
Q:
A multi-state CPU can process letters and special characters without converting them to their binary equivalents.
Q:
Holographic storage devices store information in a two-dimensional surface.
Q:
IWave uses a computer-connected camera to measure the saccadic motion of the eyes of someone while watching a TV ad.
Q:
According to some experts, eye-tracking studies are among the most reliable measures of consumer behavior.
Q:
_____ is an environment in which businesses and organizations come to you with information, services, and product offerings based on your profile.
Q:
_____ is the use of your physiological characteristics such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath to provide identification.
Q:
_____ occurs when the ASR system captures your words as your speak into a microphone, eliminates any background noise, and converts the digital signals of your speech in phonemes (syllables).
Q:
_____ occurs when the ASR system matches your spoken phonemes to a phoneme sequence stored in an acoustic model database.
Q:
There are two fundamental factors that determine you're your ethical reaction to dilemmas. What is the other one?
A.Laws
B.Your maturity level
C.The circumstances surrounding the dilemma
D.Your maturity level and educational background
Q:
There are different levels of uncertainty when faced with ethical decisions; each creates a sort of ring around the dilemma. What is true of the inside level or ring?
A.Choices or decisions regarding the ethical dilemma become harder to make; uncertainty is high
B.You are more certain of what is right or wrong; decisions become easier to make
C.Illegal and/or unethical behavior become less tolerated by society
D.Choices become harder to make and illegal and/or unethical behavior less tolerated
Q:
Your decisions about an ethical dilemma are influenced by practical circumstances. Which of the following is not considered an influencing circumstance?
A.Consequences
B.Society's opinion
C.Likelihood of effect
D.Time from action
Q:
If you were concerned about how a person would feel because of something you did, you would be experiencing what type of influencing circumstance?
A.Consequences
B.Likelihood of effect
C.Relatedness
D.Reach of result
Q:
Data warehouse technology is often used with push technology to notify you of special services.
Q:
ASR permits you to speak in a normal voice.
Q:
With ASR, you must insert clear pauses between each sentence.
Q:
A haptic interface adds a sense of smell to virtual reality.
Q:
A glove is an input device that captures and records hand and finger movements.
Q:
A holographic device such as a CAVE can display objects in true four-dimensional form.
Q:
The abbreviation CAVE stands for Concave Automatic Virtual Environment.
Q:
CAVEs require even more special gear than does virtual reality.
Q:
The best form of biometric security encompasses two factors: what you know and who you are.
Q:
Future transaction processing systems may incorporate biometric processing systems to capture personal characteristics of the person performing the transaction.
Q:
What are the principles and standards that guide our behavior toward other people?
A.Personal Morals
B.Ethics
C.Organizational culture
D.Laws
Q:
Multi-state CPUs work with information represented by more than 2 states, where each state can represent a digit between 0 and 9. This requires the CPU to do more computations than before.
Q:
There are two fundamental factors that determine your ethical reaction to dilemmas. What is one of them?
A.Your basic ethical structure
B.Your age
C.Your religious education
D.Your perceptions and intuitions
Q:
A holographic storage device will store information on a storage medium of 3-D crystal-like objects.
Q:
A(n) _____ captures screen images.
Q:
A(n) _____ examines information passing through switches, hubs, or routers.
Q:
_____ occurs when someone forges your identity for fraudulent purposes.
Q:
_____ is a technique used to gain personal information for the purpose of identity theft.
Q:
_____ is unsolicited e-mail that advertises goods and services.
Q:
_____ is software you do not want hidden inside software you do want.
Q:
_____ software detects and removes or quarantines computer viruses.
Q:
Hardware and/or software that protects computers from outsides is called a(n) _____.
Q:
_____ use physical characteristics to assess access rights.
Q:
Enacted in 1996, _____ requires that the health care industry formulate and implement the first regulations to keep patient information confidential.
Q:
_____ is software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web.
Q:
_____ is software that comes hidden in free downloadable software and collects information about you and your computer and reports it to someone without your permission.
Q:
A(n) _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
Q:
With respect to the circumstances that surround making an ethical decision, _____ refers to how much or how little benefit or harm will come from a particular decision.
Q:
A(n) _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
Q:
With respect to the circumstances that surround making an ethical decision, how much you identify with the person or persons who will receive the benefit or suffer the harm of your actions is termed _____.
Q:
_____ applies to the implementation of an idea.
Q:
_____ is the unauthorized use, duplication, distribution or sale of copyrighted software.
Q:
_____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Q:
_____ is a program, when installed on a computer, records every keystroke and mouse click.
Q:
_____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Q:
A(n) _____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.
Q:
_____ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
Q:
_____ scrambles the contents of a file so you can't read it without having the right decryption key.
Q:
A(n) _____ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic.
Q:
Public key encryption utilizes two keysonly a person with both keys can encrypt a message or file.
Q:
A(n) _____ attack floods a Web site with so many requests for service that it slows down or crashes.
Q:
Security-auditing software presents a false target for hackers, then logs their key strokes.
Q:
_____ are generally very knowledgeable computer users who use their knowledge to invade other people's computers.
Q:
Denial-of-service means not being able to log on because of an invalid password.
Q:
A _____ is a type of hacker who is engaged in corporate espionage.
Q:
Firewalls are used to block access to private information from invalid users.
Q:
A hacker who has been stealing credit card number would be considered a _____ hacker.
Q:
_____ are the principles and standards that guide our behavior toward other people.
Q:
With respect to the circumstances that surround making an ethical decision, your perception of what society thinks of your intended action is called _____.
Q:
_____ is intangible creative work that is embodied in physical form.
Q:
_____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
Q:
The _____ says that you may use copyrighted material in certain situations for example, in the creation of new work or, within certain limits, for teaching purposes.
Q:
It is illegal for companies to monitor employee e-mail.
Q:
Companies can monitor employee e-mail by using software to scan for specific words in the text or subject line.
Q:
Companies can monitor employee e-mail by using software to track the amount of e-mail activity associated with specific addresses.
Q:
Downloading a song or album from the Internet is usually not a violation of intellectual property laws.
Q:
A cookie a small file created by a Web page and stored on your computer.
Q:
Copyright applies to the implementation of an idea.
Q:
Spam is unsolicited e-mail that advertises goods and services.