In what year did Apple label phones as smart?
What is 2007?
A legal concept that defines rights to certain kinds of intellectual property is known as what?
What is copyright?
In 1988, a computer program known as what clearly established the vulnerability of the Internet as a whole to malicious hacking?
What is the Internet Worm/Morris Worm?
What is referred to as irresponsible, destructive action performed by a criminal in the digital world?
What is hacking?
This term describes the practice of allowing people to work virtually because of advanced technology.
What is remote work?
Clocks, calculators, calendars, games, radio, watches, and books were replaced by this.
What is a smartphone?
What case was the first case about private, noncommercial copying of copyrighted work concerning videotape recording machines?
What is Sony v Universal City Studios (1984)?
What refers to a variety of proposals for restrictions on how telecommunications companies interact with their broadband customers and how they set charges for services?
What is net neutrality?
What do you call thieves that install recording devices to collect credit and debit card numbers and PINs?
What are skimmers?
This term refers to the gap between those who have access to digital technologies and those who do not.
What is the digital divide?
What is the process of searching and analyzing a large batch of data to identify patterns and extract useful information?
What is Data Mining?
This is the name given to those whose activities are destructive, unethical, and, usually, illegal.
What is a black hat hacker?
What are the three categories in the three-part framework for First Amendment protection?
What are print media, broadcast, and common carriers?
What is the term used for hacking to promote a political cause?
What is hacktivism?
When technology causes problems instead of fixing them, what do we call that?
What is technological backlash?
Intentional, institutional uses of personal information, unauthorized use or release by “insiders,” is a?
What is a threat to privacy?
Under what act is it illegal to access a device, which the federal government has jurisdiction of, without authorization, or to exceed one’s authorization, and read or copy information?
What is the Computer Fraud and Abuse Act (CFAA)?
How many years do patents last in the US?
What is 20 years?
Employers often prioritize this aspect when implementing technology in the workplace, aiming for increased productivity and efficiency.
What is cost-effectiveness?
What is the Coronavirus?
Who is the best-known founder and advocate of the free software movement?
Who is Richard Stallman?
Which Amendment to the U.S. Constitution restricts the power of government, not individuals or private businesses?
What is the First Amendment?
What protects the intellectual property created by artists?
What is a Copyright?
What is a computer program that allows users to store and manage their passwords for local applications or online services?
What is a Password Manager?
This group is often affected by the digital divide due to factors such as socioeconomic status and geographic location.
What is rural communities or low-income individuals?