Unit 5: Impact of Computing
Showing 37 of 37 questions
Which of the following is an example of computing bias?
Which of the following is a potential benefit of collecting large amounts of user data?
A company collects location data from its users' smartphones. Which of the following is a privacy concern related to this practice?
What is an unintended consequence of using algorithms to filter content shown to users on social media?
What is intellectual property (IP) in the context of computing?
A machine learning algorithm is trained on historical hiring data from a company. The algorithm is then used to screen new job applicants. Which of the following is a potential concern?
Which of the following is an example of how computing innovations have had a beneficial impact?
What is "net neutrality"?
Which of the following is a risk of sharing personal information on social media?
How can computing innovations have both beneficial and harmful effects?
Which of the following best describes the "right to be forgotten"?
Which of the following is an example of how automation has affected employment?
A self-driving car must make a split-second decision: swerve to avoid a pedestrian (risking the passenger) or stay on course (risking the pedestrian). This scenario illustrates which concept?
Which of the following is an example of how the global nature of the Internet raises legal challenges?
What is multifactor authentication?
A researcher uses a large dataset of social media posts to study public opinion on a topic. Which of the following is a limitation of this approach?
Which of the following best describes the concept of "safe computing"?
Which of the following is an undecidable problem?
Phishing is a cybersecurity attack that:
Personally Identifiable Information (PII) includes:
Algorithmic bias can occur when:
A keylogger is malware that:
Fair use allows limited use of copyrighted material without permission for purposes such as:
Symmetric encryption uses:
Multifactor authentication improves security by:
A Distributed Denial of Service (DDoS) attack works by:
Which raises the greatest privacy concern?
Browser cookies are primarily used to:
A negative impact of social media includes:
Automation through computing most directly affects the workforce by:
A computing innovation can have:
A social media company uses an algorithm to recommend content to users based on their past viewing history. Which of the following is the most likely unintended consequence of this algorithm?
A city government uses a machine learning model trained on historical arrest data to predict where crimes are most likely to occur. Officers are then deployed to those areas. Which of the following concerns is most directly related to this use of computing?
A social media company uses an algorithm to recommend content to users based on their viewing history. Which of the following is a potential harmful effect of this algorithm?
A city government makes its public transportation data freely available through an API. This is an example of
A machine learning system trained to screen job applications is found to reject significantly more female applicants than male applicants. Which of the following is the most likely cause?
A hospital stores patient records digitally. Which of the following practices would best protect patient privacy while still allowing doctors to access records?
Advertisement