Flashcards in Notes From Practice Test 1A Deck (38)
_________ tools cloak a person's identity and make it possible to exercise freedom of speech in situations where reprisals might repress it.
What is another name for a criminal hacker?
Voice over IP (VoIP) refers to voice conversations that are:
routes over the Internet
the illegal copying and distribution of copyrighted material
______ is a term that refers to objects and entities that exist largely within computer networks.
________ is a process by which several technologies with distinct functionalities evolve to form a single product.
________ is the process of converting text, numbers, sound, animations, photos, and video into data that can be processed by digital devices.
Computer ownership suddenly accelerated in the mid-1990s after the _______ opened for commercial use.
The ______ is a global computer network originally developed as a military project, and then handed over to the National Science Foundation for research and academic use.
The world's first programmer- this person programmed punch cards in the 1850s to program a weaving loom
Augusta Ada Byron Lovelace
This person was in charge of the Us Census in 1890 and created machines to tabulate the data. He went on to found IBM.
In 1977 this was the network that led to the creation of the Internet
Where the graphical user interface (GUI) and mouse were developed
The Russian satellite that led to the "space race" and the US commitment to develop more sophisticated computing devices
the founders of Apple Computer
Steve Jobs and Steve Wozniak
the founder of Microsoft
the lawyer who created the "Creative Commons" license that spurred on the open source movement
the gap between people who have access to technology and the people who do not
the Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries
copying a file from a remote computer to a local computer's hard disk
a collection of linked documents, graphics, and sounds that can be accessed over the Internet
tools that hide a person's identity to make it possible to exercise freedom of speech where reprisals might repress it. It can also be used by hackers or others to hide their identitiy
the ownership of certain types of information, ideas, or represenations
an ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet
a form of electronic communication
a group of computers linked by wired or wireless technology to share data and resources
places where members can post comments and questions that can be read and responded to by others. This is often a feature included in LMS
personal journals posted online for general public address
blogs (short for web logs)
T or F
The US Supreme Court has ruled that citizens have the right to privacy or the "right to be left alone" in a free country