Which of the following is not true about e books

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only A$47.99/year

  1. Social Science
  2. Sociology

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (52)

________ allows only limited use of media that has been legally purchased.

digital rights management

When does copyright protection begin?

When a work is created and fixed into a digital or physical form.

When the application for the copyright has been approved.

When a work is begun.

When the application for the copyright has been submitted.

when a work is created and fixed into a digital or physical form

Pictures you find on the Google image search are considered in the public domain.

false

Which of the following is NOT an example of a digital music file format?

.wma
.aac
.mp3
.accdb

.accdb

The Apple logo would be considered a(n) ________.

Copyright
Trademark
Service mark
Patent

trademark

A(n) ________ cable carries all audio and video information from devices to a connected TV.

HDMI

Many cameras support wireless connections so you can transfer images without connecting cables.

true

Which of the following is NOT true about e-books?

You can annotate them with your own notes.
Amazon sells more e-books now than printed books.
They are always PDF file format.
You can borrow them from the library.

you can borrow them from the library

YouTube is the entity legally responsible for its content, rather than the person who uploaded the content.

false

Which is NOT a reason someone might risk violating a copyright?

It is hard to prove the copyright in court.

I am just one person.

Everyone else is doing it.

The risk of being caught is very low.

its hard to prove the copyright in court

A copyright holder cannot loan, rent, or give away the work.

false

Which of the following digital image formats compresses the image file?
.mpeg

.raw

.pdf

.jpeg

pdf

DRM-free music can legally be moved from system to system

true

RAW files are larger in size than JPEG files.

true

Intangible personal property has no value.

true

To protect a movie, what category of intellectual property would be used?

copyright

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

A denial-of-service attack can be used to deny hackers access to a computer system.

false

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

true

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

Viruses, adware and spyware are referred to collectively as ________.

grayware

A time bomb virus can be triggered on a certain date.

true

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

The terms virus and worm mean the same thing.

true

A stealth virus is designed to infect multiple file types to fool the antivirus software.

false

An encryption virus replicates itself onto a hard drive's master boot record.

false

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

Currently, there are no antivirus programs for mobile devices.

false

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

launch a DOS attack on your computer

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

false

A worm does NOT require human interaction to spread to other computers.

true

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

worm

Regarding computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

Ethical hackers are also known as white-hat hackers.

false

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

DDoS attack

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

Using your computer for non-work activities while you are being paid to work is known as ________.

cyberloafing

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming

A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate for the object-oriented programming language C/C++.

true

Which of the following provides a visual representation of the patterns of an algorithm?

flowchart

A data-flow diagram provides a visual representation of an algorithm.

false

A popular programming language which is known for having a large number of free libraries is ________.

python

________ enables users to define their own data-based tags and facilitates the exchange of information between websites.

XML

The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.

control structures

Prolog is an example of a fourth-generation programming language.

true

Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

beta

Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks.

false

When programmers need to create several different examples of a class, each is known as an object.

true

Second-generation languages are also known as assembly languages.

true

Which of the following would NOT be used to build websites with interactive capabilities?

fortran

Syntax errors are caught only when a program executes.

false

Which is NOT a key factor a programmer uses in selecting the language for a project?

number of inputs required

Sets with similar terms

Chapter 9 Practice Multiple Choice

30 terms

isabelladavis1

ITM Chapter 9

34 terms

Kenz36twin

Chapter 9

46 terms

ashleeg95

Chapter 9

25 terms

elizabeth_mott6

Sets found in the same folder

Chapter 9 tia

46 terms

khaight15

Chapter 8 Questions

30 terms

bawinz

DN-INTERNET TECH SPRING 2016

98 terms

kilipit

CIM 1 Ch. 4 Quiz

32 terms

HailFire_Aj

Other sets by this creator

CIS231 Final Exam Review

65 terms

jennaevandusen

Med Term Final

58 terms

jennaevandusen

CIS 150

106 terms

jennaevandusen

DAN 200 Midterm

44 terms

jennaevandusen

Verified questions

SOCIOLOGY

What are your beliefs on capital punishment? Defend your viewpoint.

Verified answer

SOCIOLOGY

Expressed powers are those that are? A) Specifically granted in the Constitution. B) Held by both the federal government and the states. C) Considered the basis for the “necessary and proper” clause. D) Inferior compared to powers directly given by Congress.

Verified answer

SOCIOLOGY

Sociologists define three types of family structures. List and describe those structures.

Verified answer

SOCIOLOGY

Which of the following describes what is meant by differential association? a. Crime is more likely to occur among individuals who have been treated differently b. People may become criminals through close association with criminals c. Crime is not transmitted culturally d. crime comes from conflict between two cultures

Verified answer

Other Quizlet sets

CS6 Quiz 2

36 terms

aalco005

Nado CSI Chapter 17 homework

27 terms

Dennis_Yandow3

Ch. 1-4

76 terms

Riley_Garrison6

MIS Quiz Questions

62 terms

meganpeterson1234

Related questions

QUESTION

Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?

6 answers

QUESTION

Messages from the Internet, related to Windows File Sharing, use which conceptual doorway?

15 answers

QUESTION

This requires that enterprises must guard protected health information and implement policies and procedures to safeguard it.

2 answers

QUESTION

The reliability of cloud services can be a problem if an organization 's cloud vendor has a service disruption

5 answers

What happens after 180 days to e

What happens after 180 days to e-books rented through VitalSource? they disappear from your device.

Which is a disadvantage of e

One disadvantage of e-books is that if you make a mistake when highlighting, there is no way to undo it. What should you read first when previewing a reading assignment?

What happens after 180 days to e

What happens after 180 days to e-books rented through VitalSource? They disappear from your device.

Which of the following digital formats compresses an image file?

JPEG, which stands for Joint Photographic Experts Groups is a “lossy” format meaning that the image is compressed to make a smaller file.