CS111_SR
Many Internet security concerns today can be categorized as computer wars
Many Internet security concerns today can be categorized as computer wars
False
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
True
Computer crime is sometimes referred to as ____.
Computer crime is sometimes referred to as ____.
Cybercrime
A password like the one in the accompanying figure should have at least ____ characters.
A password like the one in the accompanying figure should have at least ____ characters.
Eight
____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
Encryption
System failure can occur because of a hardware problem, software problem, or computer virus
System failure can occur because of a hardware problem, software problem, or computer virus
True
Electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
Electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
True
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
Recovery
____ are used for sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
____ are used for sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
Marketing databases
Computer tracking software is sometimes called ____________________.
Computer tracking software is sometimes called ____________________.
Stealth tracking software
Pirated copies of movies are often created today by videotaping them with a camcorder during a prerelease screening or on the opening day of a movie.
Pirated copies of movies are often created today by videotaping them with a camcorder during a prerelease screening or on the opening day of a movie.
True
Vaporware is a term sometimes used to designate software and hardware products that have been announced and advertised, but are not yet—and may never be—available.
Vaporware is a term sometimes used to designate software and hardware products that have been announced and advertised, but are not yet—and may never be—available.
True
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.
Cybersquatting
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of ____ financial data.
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of ____ financial data.
corporate
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing ____________________.
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing ____________________.
Plagiarism
Currently, the most common form of addictive behavior is e-mailing.
Currently, the most common form of addictive behavior is e-mailing.
False
In the United States, studies show that the digital divide may be lessening, as people of every income, education, race, ethnicity, and gender continue to go online at increased rates.
In the United States, studies show that the digital divide may be lessening, as people of every income, education, race, ethnicity, and gender continue to go online at increased rates.
True
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____a state of fatigue or frustration brought about by overwork.
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____a state of fatigue or frustration brought about by overwork.
Burnout
The average CRT monitor alone contains about eight pounds of ____.
The average CRT monitor alone contains about eight pounds of ____.
Lead
____________________ is a type of flat panel display device that attempts to mimic the look of ordinary printed paper.
____________________ is a type of flat panel display device that attempts to mimic the look of ordinary printed paper.
E-paper
Intelligent Agents called entertainment bots provide entertainment, such as a virtual pet to take care of or an animated character to play games with.
Intelligent Agents called entertainment bots provide entertainment, such as a virtual pet to take care of or an animated character to play games with.
True
Holographic data storage systems are particularly suited to applications in which large amounts of data need to be stored, retrieved quickly, and are often changed.
Holographic data storage systems are particularly suited to applications in which large amounts of data need to be stored, retrieved quickly, and are often changed.
False
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
Optical
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations--for example, the systems that check products for defects at manufacturing plants.
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations--for example, the systems that check products for defects at manufacturing plants.
Vision
____________________ is the science of creating tiny computers and components by working at the individual atomic and molecular levels.
____________________ is the science of creating tiny computers and components by working at the individual atomic and molecular levels.
Nanotechnology
____________________ are devices, controlled by a person or a computer, that can move and react to sensory input.
____________________ are devices, controlled by a person or a computer, that can move and react to sensory input.
Robots
Team 1 |
 |
|
 |
|
Team 2 |
 |
|
 |
|
Team 3 |
 |
|
 |
|
Team 4 |
 |
|
 |
|
Team 5 |
 |
|
 |
|
Team 6 |
 |
|
 |
|
Team 7 |
 |
|
 |
|
Team 8 |
 |
|
 |
|
Team 9 |
 |
|
 |
|
Team 10 |
 |
|
 |
|
What Would You Like To Risk?
Team 1 |
 |
|
 |
|
Team 2 |
 |
|
 |
|
Team 3 |
 |
|
 |
|
Team 4 |
 |
|
 |
|
Team 5 |
 |
|
 |
|
Team 6 |
 |
|
 |
|
Team 7 |
 |
|
 |
|
Team 8 |
 |
|
 |
|
Team 9 |
 |
|
 |
|
Team 10 |
 |
|
 |
|
Go To The Final Question
Final Score:
Team 1 |
 |
|
 |
|
Team 2 |
 |
|
 |
|
Team 3 |
 |
|
 |
|
Team 4 |
 |
|
 |
|
Team 5 |
 |
|
 |
|
Team 6 |
 |
|
 |
|
Team 7 |
 |
|
 |
|
Team 8 |
 |
|
 |
|
Team 9 |
 |
|
 |
|
Team 10 |
 |
|
 |
|
Edit This Game:

|
|