____ uses computers to test product designs before the physical prototype is built
computer aided engineering (CAE)
A ___ system lets manufacturers purchase and receive components just before they are needed on the assembly line
___ is a technology that allows users connected to a network to transfer money from one bank account to another
Many businesses use a ___ to send bills electronically instead of mailing their customers paper statements
bill presentment process
Which of the following is a disadvantage to using an optical mark recognition system for voting?
the may require a specific type of writing instrument
Which of the following is true of telecommunications as opposed to a standard office job?
requires more discipline & focus
Which group voters is most likely to vote, but least likely to use the internet?
americans 65 or older
Which of the following is NOT true of computerized voting systems?
the provide equal access to every citizen
The US visit database currently stores all of the following types of biometric identifiers except ___
Computer based patient records are entered, stored and maintained with the help of a ___ system
electronic medical record (EMR)
Computers in red-light systems perform all of the following functions EXCEPT ______.
sending an electronic message to the violator
Foreign students with visas to attend US schools must provide personal information to the ______ system
___ Is the use of advanced computer technology to help health care professionals consult with each other and work together on cases regardless of whether the patient, medical professional, and relevant civic data are located.
MRIs take images inside the body by _____
using a powerful magnet & transmitting radio waves through the body
Hundreds of automatic weather stations located in ___ measure weather data and transmit it back to
Which medical Web site provides a database of reference and abstracts from the National Library of Medicine?
The geophysical fluid dynamics Laboratory (GFDL) has pioneered___research for two decades with the goals of better weather phenomena
A (n) ___ creates sound from digital instructions input by the user, wither via a standard computer keyboard or devices resembling.
File __ involves uploading a music file to a file-sharing network with distortion, silence, or copyright law warnings.
In recent years, ________ file-sharing networks exploded in popularity as a means for people to share music, video, and other files stored on their personal computers
A virtual wind tunnel relies on ___ to predict how air will flow around a vehicle.
computational fluid dynamics
After you have created a model for your sculpture, you can use ____ to shape your desired medium
CNC milling machines
Which of the following is not true of todays smart tires?
Transmit tire pressure data from a wireless radio transmitter
A light curtain and treadless are used in an electronic toll collection system to ensure that ___
all cars counted/billed correctly
____ is a special effect in which on video image is transformed into another image over the course of several frames
Which of the following is still performed by human drivers on a civis bus?
modifying bus trajectories
Which of the following is NOT true of computerized car analysis?
is more expensive than physical testing
Smart cars maintain a safe driving interval between your car & other vehicles through a(n) ______ system
adaptive cruise control
Modern airplanes rely on ____ technology to control landing gear, spoilers, and other components of the planes
Which of the following communication tools does not need special software to send or receive mail
____ involves providing direction to review specific content that will help you better understand a topic
A popular way to teach students basic programming is by allowing them to build simple programs in ______.
A ___ virus disguised itself by hiding in fake code sections, which it inserts within working code in a file
The _____ format for a presentation graphics software file includes images of two or more slides on pages
The successful use of integration of technology in the classroom relies on all the following EXCEPT ____.
integration of the factory model
The ___ permits federal prosecution of large scale willful copyright infringement even when the infringer does not act for commercial or personal financial gain
no electronic theft (net) act
The ___ specifies that in the United States, a digital signature has the same weight as a traditional signature written on paper
digital millennium act
A ____ is a destructive program disguised as a real application, such as a screen saver
What is the purpose of the Six/Four software program. It teaches users how to:
It gives users in countries that monitor Internet access - Government does NOT monitor the internet and it supports human rights.
A _____ is a separate area of hard disk that holds an infected file until the infection can be removed
Which of the following protections does the Copyright term extension Act provide?
making ISP's liable
Which of the following statements is true of cyberstalking?
Cyber stalkers typically locate their victims in chat rooms or bulletin boards/news groups
A hacker can use a ____ to scan all messages traveling on a network to look for passwords, credit card numbers, and other sensitive data.
Which of the following statements is NOT true of an ethical decision?
it is universal & applies to everyone in a society
A ___ occurs when the read/write head of a hard disk drive touches the platter that stores the data
U.S. courts are not yet settled in regards to the fair use of copyright material for _____.
The ___ states that advertising in any medium must be truthful & must not mislead customers
Federal Trade Commission Act
Web sites can use third-party cookies to record ___, which Is data about the web pages you visit and the links you click
click stream data
What is the primary objection of the courts towards legislation that limits the distribution of objectionable content?
The govt. has no right to limit free speech if less restrictive measures are available
The ___ outlaws unauthorized access to federal government computers and the transmission of harmful computer code such as viruses
computer fraud & abuse acts
How do news firms counter the ethical concerns over the mixing of advertising links with news stones in user's search results?
The results pages clearly distinguish the sponsored listings from the other search results
A(n) ___ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power
uninterruptible power supply
Who receives the largest percentage of the profits made from downloading music files?
online music provider
A ___ is a computer system or software simulating a computer system, which intentionally is set up with security holes designed to entice an intruder to hack a computer
Online shopping Web sites generally use a ____ to keep track of items in your shopping cart
The ___ protocol allows users to choose an encryption scheme for data that passes between a client and a server
_____ is a packet sniffing program used by the FBI to keep an eye on the e-mail & Web activity of potential criminals
Web sites are prohibited from collection personal information from children under the age of _____.