Unit 5: Impact of Computing

Showing 37 of 37 questions

Q1
MULTIPLE_CHOICEMedium

Which of the following is an example of computing bias?

Q2
MULTIPLE_CHOICEMedium

Which of the following is a potential benefit of collecting large amounts of user data?

Q3
MULTIPLE_CHOICEMedium

A company collects location data from its users' smartphones. Which of the following is a privacy concern related to this practice?

Q4
MULTIPLE_CHOICEHard

What is an unintended consequence of using algorithms to filter content shown to users on social media?

Q5
MULTIPLE_CHOICEMedium

What is intellectual property (IP) in the context of computing?

Q6
MULTIPLE_CHOICEHard

A machine learning algorithm is trained on historical hiring data from a company. The algorithm is then used to screen new job applicants. Which of the following is a potential concern?

Q7
MULTIPLE_CHOICEMedium

Which of the following is an example of how computing innovations have had a beneficial impact?

Q8
MULTIPLE_CHOICEHard

What is "net neutrality"?

Q9
MULTIPLE_CHOICEEasy

Which of the following is a risk of sharing personal information on social media?

Q10
MULTIPLE_CHOICEMedium

How can computing innovations have both beneficial and harmful effects?

Q11
MULTIPLE_CHOICEHard

Which of the following best describes the "right to be forgotten"?

Q12
MULTIPLE_CHOICEMedium

Which of the following is an example of how automation has affected employment?

Q13
MULTIPLE_CHOICEHard

A self-driving car must make a split-second decision: swerve to avoid a pedestrian (risking the passenger) or stay on course (risking the pedestrian). This scenario illustrates which concept?

Q14
MULTIPLE_CHOICEMedium

Which of the following is an example of how the global nature of the Internet raises legal challenges?

Q15
MULTIPLE_CHOICEEasy

What is multifactor authentication?

Q16
MULTIPLE_CHOICEHard

A researcher uses a large dataset of social media posts to study public opinion on a topic. Which of the following is a limitation of this approach?

Q17
MULTIPLE_CHOICEMedium

Which of the following best describes the concept of "safe computing"?

Q18
MULTIPLE_CHOICEHard

Which of the following is an undecidable problem?

Q19
MULTIPLE_CHOICEEasy

Phishing is a cybersecurity attack that:

Q20
MULTIPLE_CHOICEEasy

Personally Identifiable Information (PII) includes:

Q21
MULTIPLE_CHOICEMedium

Algorithmic bias can occur when:

Q22
MULTIPLE_CHOICEEasy

A keylogger is malware that:

Q23
MULTIPLE_CHOICEMedium

Fair use allows limited use of copyrighted material without permission for purposes such as:

Q24
MULTIPLE_CHOICEMedium

Symmetric encryption uses:

Q25
MULTIPLE_CHOICEEasy

Multifactor authentication improves security by:

Q26
MULTIPLE_CHOICEMedium

A Distributed Denial of Service (DDoS) attack works by:

Q27
MULTIPLE_CHOICEMedium

Which raises the greatest privacy concern?

Q28
MULTIPLE_CHOICEEasy

Browser cookies are primarily used to:

Q29
MULTIPLE_CHOICEEasy

A negative impact of social media includes:

Q30
MULTIPLE_CHOICEMedium

Automation through computing most directly affects the workforce by:

Q31
MULTIPLE_CHOICEEasy

A computing innovation can have:

Q32
MULTIPLE_CHOICEMedium

A social media company uses an algorithm to recommend content to users based on their past viewing history. Which of the following is the most likely unintended consequence of this algorithm?

Q33
MULTIPLE_CHOICEHard

A city government uses a machine learning model trained on historical arrest data to predict where crimes are most likely to occur. Officers are then deployed to those areas. Which of the following concerns is most directly related to this use of computing?

Q34
MULTIPLE_CHOICEHard

A social media company uses an algorithm to recommend content to users based on their viewing history. Which of the following is a potential harmful effect of this algorithm?

Q35
MULTIPLE_CHOICEMedium

A city government makes its public transportation data freely available through an API. This is an example of

Q36
MULTIPLE_CHOICEHard

A machine learning system trained to screen job applications is found to reject significantly more female applicants than male applicants. Which of the following is the most likely cause?

Q37
MULTIPLE_CHOICEMedium

A hospital stores patient records digitally. Which of the following practices would best protect patient privacy while still allowing doctors to access records?

Advertisement